Login
Download
Skill UI
Browse and discover
6556+
curated skills
All
Development
Artificial Intelligence
Design & Creative
Product & Business
Data Science
Marketing
Soft Skills
Productivity
Engineering
Languages
Search
Auth
, found
581
results
Default
Newest
Most Downloaded
Email Authentication Pillars
implementing-dmarc-dkim-spf-email-security
mukul975/Anthropic-Cybersecurity-Skills
321
Step-by-step reference for deploying SPF, DKIM, and DMARC so organizations can stop spoofing, validate signed mail, and define handling policies while auditing DNS records and automating DMARC report parsing.
View Details
Email Authentication Audit
implementing-email-security-with-dmarc-dkim-spf
mukul975/Anthropic-Cybersecurity-Skills
164
Audits a domain’s email authentication by querying SPF, DKIM, and DMARC DNS records using dnspython, validating syntax/counts, flagging common spoofing risks, and producing remediation guidance.
View Details
GCP Binary Authorization
implementing-gcp-binary-authorization
mukul975/Anthropic-Cybersecurity-Skills
154
Guide to enable and enforce GCP Binary Authorization for GKE and Cloud Run so only attested container images pass deploy-time checks, covering attestor creation, policy tuning, and CI/CD attestations.
View Details
Google Workspace Security Hardening
implementing-google-workspace-admin-security
mukul975/Anthropic-Cybersecurity-Skills
202
Harden Google Workspace admin security by configuring super-admin protections, phishing-resistant MFA, email authentication (SPF/DKIM/DMARC), DLP, OAuth controls, and sharing restrictions for enterprise compliance and BEC mitigation.
View Details
Google Workspace SSO Setup
implementing-google-workspace-sso-configuration
mukul975/Anthropic-Cybersecurity-Skills
129
Guide to configuring SAML 2.0 single sign-on for Google Workspace via third-party IdPs so organizations can centralize authentication, enforce MFA/policies, and streamline compliance through prep, console settings, and testing.
View Details
Honeytokens Breach Detection
implementing-honeytokens-for-breach-detection
mukul975/Anthropic-Cybersecurity-Skills
294
Implements deception-based breach detection by deploying Canarytokens API-backed honeytokens (fake AWS keys, DNS canaries, document beacons, DB records) and webhook alerts to surface unauthorized access during security operations or compliance exercises.
View Details
Secure JWT Signing
implementing-jwt-signing-and-verification
mukul975/Anthropic-Cybersecurity-Skills
175
Implement JWT signing and verification using HMAC-SHA256, RSA-PSS, and EdDSA, handle claims, expiration, and defend against algorithm/none attacks to secure authentication flows.
View Details
Secure mTLS Service Authentication
implementing-mtls-for-zero-trust-services
mukul975/Anthropic-Cybersecurity-Skills
463
Sets up mutual TLS between microservices by generating CA and service certificates with Python’s cryptography library, configuring ssl contexts, and validating chains, enabling zero-trust service-to-service authentication and compliance-ready deployment.
View Details
Network Access Control
implementing-network-access-control
mukul975/Anthropic-Cybersecurity-Skills
226
Deploys 802.1X port-based NAC using FreeRADIUS, PacketFence, and switch configurations to enforce identity, posture, and automatic VLAN policies for authenticated devices, supporting zero-trust and compliance-focused environments.
View Details
Cisco ISE Network Access Control
implementing-network-access-control-with-cisco-ise
mukul975/Anthropic-Cybersecurity-Skills
327
Guide for deploying Cisco Identity Services Engine to enforce 802.1X/MAB authentication, posture assessment, and dynamic VLAN tagging so organizations can secure wired and wireless access.
View Details
Microsoft Entra Passwordless
implementing-passwordless-auth-with-microsoft-entra
mukul975/Anthropic-Cybersecurity-Skills
202
Guides security teams through deploying Microsoft Entra passwordless authentication by enabling FIDO2, Windows Hello for Business, Microsoft Authenticator passkeys, and certificate-based methods via Microsoft Graph policy updates and conditional access strength policies.
View Details
FIDO2 Passwordless Authentication
implementing-passwordless-authentication-with-fido2
mukul975/Anthropic-Cybersecurity-Skills
499
Deploy and operate FIDO2/WebAuthn passwordless authentication with security keys and platform authenticators, covering API integration, server setup, passkey enrollment, and biometric migration to meet NIST AAL3 guidance.
View Details
Prev
1
2
3
...
37
38
39
40
41
42
43
...
47
48
49
Next
Language
简体中文
English