Login
Download
Skill UI
Browse and discover
7129+
curated skills
All
Development
Artificial Intelligence
Design & Creative
Product & Business
Data Science
Marketing
Soft Skills
Productivity
Engineering
Languages
Search
R
, found
4524
results
Default
Newest
Most Downloaded
MITRE Attack Coverage Mapping
implementing-mitre-attack-coverage-mapping
mukul975/Anthropic-Cybersecurity-Skills
393
Implements MITRE ATT&CK coverage mapping by exporting SIEM detection rules, building coverage matrices, scoring techniques, and surfacing gaps so SOC teams can prioritize rule development and track detection maturity.
View Details
Enterprise Mobile App Management
implementing-mobile-application-management
mukul975/Anthropic-Cybersecurity-Skills
363
Implements Mobile Application Management controls like Intune App Protection Policies, selective wipe, app configuration, and DLP to protect corporate data on BYOD Android and iOS devices without full MDM, enforcing data separation and conditional access for enterprise apps.
View Details
Zero Trust mTLS Setup
implementing-mtls-for-zero-trust-services
mukul975/Anthropic-Cybersecurity-Skills
101
Configures mutual TLS authentication between microservices using Python cryptography and ssl modules, generating CA/service certificates, validating chains, checking expiration, and auditing deployment status to enforce zero-trust service-to-service security.
View Details
NERC CIP Compliance Controls
implementing-nerc-cip-compliance-controls
mukul975/Anthropic-Cybersecurity-Skills
458
Provides a structured approach for implementing NERC CIP compliance controls across BES cyber systems, covering categorization, electronic security perimeters, security and configuration management, supply chain risk, and the 2025 MFA plus low-impact asset updates.
View Details
802.1X Network Access Control
implementing-network-access-control
mukul975/Anthropic-Cybersecurity-Skills
495
Implements 802.1X NAC via FreeRADIUS, PacketFence, and switch configurations to enforce identity-based access, posture assessment, and dynamic VLAN assignment for authorized endpoints.
View Details
Cisco ISE Network Access Control
implementing-network-access-control-with-cisco-ise
mukul975/Anthropic-Cybersecurity-Skills
167
Guide to deploying Cisco Identity Services Engine for wired and wireless 802.1X, MAC Authentication Bypass, posture compliance, and dynamic VLAN and SGT policies for enterprise network access control.
View Details
Honeypot Network Deception Deployment
implementing-network-deception-with-honeypots
mukul975/Anthropic-Cybersecurity-Skills
301
Guide to deploying OpenCanary, Cowrie, or T-Pot honeypots to detect unauthorized access, lateral movement, and reconnaissance while forwarding alerts to a SIEM for faster incident response.
View Details
Suricata IPS Deployment
implementing-network-intrusion-prevention-with-suricata
mukul975/Anthropic-Cybersecurity-Skills
321
Guide to deploy Suricata as an inline IPS, set up NFQUEUE or AF_PACKET modes, configure Emerging Threats rules, tune threading/stream settings, and integrate logging for real-time network threat blocking.
View Details
Kubernetes Network Policy Guide
implementing-network-policies-for-kubernetes
mukul975/Anthropic-Cybersecurity-Skills
264
Documents how to enforce Kubernetes NetworkPolicies using CNI plugins to establish default-deny, service-specific, namespace-aware, egress, and metadata protections, helping teams segment pods for hardened clusters and compliance-driven deployments.
View Details
OT Network Segmentation
implementing-network-segmentation-for-ot
mukul975/Anthropic-Cybersecurity-Skills
165
Guides OT teams through designing and deploying Purdue-based network segmentation, covering VLANs, OT-aware firewalls, DMZs, and migration plans so critical infrastructure stays isolated yet operationally connected.
View Details
Firewall Zone Network Segmentation
implementing-network-segmentation-with-firewall-zones
mukul975/Anthropic-Cybersecurity-Skills
98
Design and implement firewall zone-based network segmentation with VLANs, ACLs, and microsegmentation to limit lateral movement, support compliance, and segment east-west traffic for zero-trust environments.
View Details
Arkime Network Traffic Analysis
implementing-network-traffic-analysis-with-arkime
mukul975/Anthropic-Cybersecurity-Skills
257
Deploy Arkime to capture full packets, query sessions via the v3 API, detect beaconing and TLS anomalies, inspect DNS/HTTP flows, and export PCAPs for forensic review.
View Details
Prev
1
2
3
...
301
302
303
304
305
306
307
...
375
376
377
Next
Language
简体中文
English