Login
Download
Skill UI
Browse and discover
7568+
curated skills
All
Development
Artificial Intelligence
Design & Creative
Product & Business
Data Science
Marketing
Soft Skills
Productivity
Engineering
Languages
Search
R
, found
4832
results
Default
Newest
Most Downloaded
Google Workspace Security Hardening
implementing-google-workspace-admin-security
mukul975/Anthropic-Cybersecurity-Skills
219
Guides admins through hardening Google Workspace via console configuration, phishing-resistant MFA, DLP, OAuth controls, email authentication, and sharing restrictions to secure enterprise cloud office environments.
View Details
Google Workspace Phishing Defense
implementing-google-workspace-phishing-protection
mukul975/Anthropic-Cybersecurity-Skills
308
Guide for configuring Google Workspace advanced phishing and malware protections through Gmail safety settings, attachment safeguards, spoofing checks, enhanced browsing, and APP enrollment to harden high-risk accounts.
View Details
Google Workspace SSO Setup
implementing-google-workspace-sso-configuration
mukul975/Anthropic-Cybersecurity-Skills
294
Guide to configure SAML 2.0 SSO for Google Workspace with a third-party IdP, centralizing authentication, enforcing MFA, and managing scoped profile assignments, network masks, and testing flows to secure organizational access.
View Details
Vault Dynamic Secrets
implementing-hashicorp-vault-dynamic-secrets
mukul975/Anthropic-Cybersecurity-Skills
328
Implements HashiCorp Vault dynamic secrets engines to issue short-lived database, AWS IAM, and PKI credentials with lease management and automatic rotation, eliminating static secrets in applications.
View Details
Ransomware Honeypot Deployment
implementing-honeypot-for-ransomware-detection
mukul975/Anthropic-Cybersecurity-Skills
145
Deploys honeypot shares, canary files, and Thinkst Canary appliances to detect ransomware activity early via deception alerts tied to file access and modification.
View Details
Honeytoken Breach Detection
implementing-honeytokens-for-breach-detection
mukul975/Anthropic-Cybersecurity-Skills
405
Deploys canary tokens and honeytokens across critical systems to trigger alerts via webhook when attackers touch fake AWS credentials, DNS entries, documents, or database records, enabling deception-based early warnings for intrusion detection teams.
View Details
Tofino ICS Firewall Deployment
implementing-ics-firewall-with-tofino
mukul975/Anthropic-Cybersecurity-Skills
414
Deploys Belden/Hirschmann Tofino appliances to enforce DPI-aware zone firewalls around PLCs/SCADA, define zone-conduit policies, and govern Modbus, EtherNet/IP, OPC, and S7comm flows with granular access rules and change control.
View Details
Implementing Identity Governance
implementing-identity-governance-with-sailpoint
mukul975/Anthropic-Cybersecurity-Skills
204
Deploy SailPoint IdentityNow or IdentityIQ to automate identity lifecycle management, access requests, certification campaigns, role mining, and SoD enforcement while generating compliance-ready reporting for enterprise IAM environments.
View Details
Zero Trust Identity Verification
implementing-identity-verification-for-zero-trust
mukul975/Anthropic-Cybersecurity-Skills
332
Guides teams through implementing continuous identity verification for zero trust: phishing-resistant MFA (FIDO2/WebAuthn), risk-based conditional access, and identity governance aligned with the CISA Zero Trust maturity framework.
View Details
Cosign Image Provenance
implementing-image-provenance-verification-with-cosign
mukul975/Anthropic-Cybersecurity-Skills
439
Use Sigstore Cosign to sign, attest, and verify container images with keyless OIDC signing, SBOM/vulnerability attestations, and CI/CD admission enforcement for supply chain provenance security.
View Details
Immutable Backup Strategy With Restic
implementing-immutable-backup-with-restic
mukul975/Anthropic-Cybersecurity-Skills
152
Implements an immutable backup workflow with Restic, S3-compatible Object Lock, and automated verification to harden ransomware protection and ensure reliable recovery testing.
View Details
IaC Security Scan Setup
implementing-infrastructure-as-code-security-scanning
mukul975/Anthropic-Cybersecurity-Skills
400
Automates scanning Terraform, CloudFormation, Kubernetes, and Helm IaC with Checkov/tfsec/KICS, enforces policy-as-code, and integrates into CI/CD to stop misconfigurations before deployment.
View Details
Prev
1
2
3
...
303
304
305
306
307
308
309
...
401
402
403
Next
Language
简体中文
English