Login
Download
Skill UI
Browse and discover
6191+
curated skills
All
Development
Artificial Intelligence
Design & Creative
Product & Business
Data Science
Marketing
Soft Skills
Productivity
Engineering
Languages
Search
Monitor
, found
494
results
Default
Newest
Most Downloaded
Secure API Key Controls
implementing-api-key-security-controls
mukul975/Anthropic-Cybersecurity-Skills
439
Implements secure API key lifecycle controls—generation, hashing, storage, validation, rotation, scope/rate limits, and monitoring—to protect server-to-server credentials from leakage or abuse.
View Details
Apigee API Threat Protection
implementing-api-threat-protection-with-apigee
mukul975/Anthropic-Cybersecurity-Skills
197
Implement Google Apigee policies such as JSON/XML validation, regex monitoring, SpikeArrest rate limiting, OAuth2 token checks, and API key verification to shield APIs from OWASP API Security Top 10 threats before requests reach backend services.
View Details
CloudTrail Log Analysis
implementing-cloud-trail-log-analysis
mukul975/Anthropic-Cybersecurity-Skills
109
Implements AWS CloudTrail log analysis with Athena, CloudWatch Logs Insights, and SIEM feeds to monitor API activity, detect privilege escalation, unauthorized access, and support forensic investigations across AWS environments.
View Details
Cloud Workload Protection
implementing-cloud-workload-protection
mukul975/Anthropic-Cybersecurity-Skills
259
Implements cloud workload protection using boto3 and google-cloud APIs for runtime monitoring, anomaly detection, file integrity checks, and resource audits to hunt cryptominers, reverse shells, and unauthorized binaries on EC2 and GCE workloads.
View Details
Canarytoken Deception Detection
implementing-deception-based-detection-with-canarytoken
mukul975/Anthropic-Cybersecurity-Skills
102
Automates Canary Tokens via the Thinkst Canary API to deploy web bugs, DNS, document, and AWS key tokens, monitor alerts, and report deception coverage for breach detection and response.
View Details
BitLocker Disk Encryption
implementing-disk-encryption-with-bitlocker
mukul975/Anthropic-Cybersecurity-Skills
461
Automates full-disk protection on Windows endpoints via BitLocker, covering prerequisite checks, GPO/Intune policies, TPM/PIN setup, recovery key escrow, and fleet monitoring for compliance-driven deployments and mobile workstation hardening.
View Details
DMARC DKIM SPF Setup
implementing-dmarc-dkim-spf-email-security
mukul975/Anthropic-Cybersecurity-Skills
138
Step-by-step guide to implement SPF, DKIM, and DMARC so administrators can authenticate outbound mail, block spoofing, and monitor compliance through DNS records and reporting scripts.
View Details
Dragos OT Monitoring Deployment
implementing-dragos-platform-for-ot-monitoring
mukul975/Anthropic-Cybersecurity-Skills
297
Deploy and configure the Dragos Platform to monitor OT networks with industrial protocol parsing, intelligence-driven threat detection, asset visibility, and SIEM integration for ICS-focused SOCs.
View Details
Proofpoint Email Sandboxing
implementing-email-sandboxing-with-proofpoint
mukul975/Anthropic-Cybersecurity-Skills
442
Configures Proofpoint TAP to detonate suspicious attachments/URLs, tune sandbox policies, monitor dashboards, and feed SIEM for phishing and zero-day malware defense—ideal when deploying secure email flows or proving compliance.
View Details
File Integrity Monitoring
implementing-file-integrity-monitoring-with-aide
mukul975/Anthropic-Cybersecurity-Skills
164
Guide to installing and configuring AIDE for host-based file integrity monitoring, covering baseline initialization, integrity checks, change parsing, automated cron checks, and compliance reporting.
View Details
GCP VPC Firewall Control
implementing-gcp-vpc-firewall-rules
mukul975/Anthropic-Cybersecurity-Skills
290
Guide for auditing and enforcing GCP VPC firewall rules, covering restrictive ingress/egress policies, hierarchical organization policies, and VPC Flow Log monitoring to keep workloads segmented and compliant.
View Details
Mobile Application Protection
implementing-mobile-application-management
mukul975/Anthropic-Cybersecurity-Skills
282
Implements Mobile Application Management policies to protect enterprise data on BYOD and managed mobile devices via Intune app protection settings, app configuration, conditional access and monitoring workflows.
View Details
Prev
1
2
3
...
34
35
36
37
38
39
40
41
42
Next
Language
简体中文
English