Login
Download
Skill UI
Browse and discover
6581+
curated skills
All
Development
Artificial Intelligence
Design & Creative
Product & Business
Data Science
Marketing
Soft Skills
Productivity
Engineering
Languages
Search
ty
, found
2014
results
Default
Newest
Most Downloaded
GCP Binary Authorization
implementing-gcp-binary-authorization
mukul975/Anthropic-Cybersecurity-Skills
438
Implements Google Cloud Binary Authorization to enforce deploy-time security checks, requiring signed attestations before GKE or Cloud Run accepts container images, and integrates with KMS, Container Analysis, and Cloud Build pipelines.
View Details
GCP Organization Policy Guards
implementing-gcp-organization-policy-constraints
mukul975/Anthropic-Cybersecurity-Skills
135
Implement GCP Organization Policy constraints to enforce security guardrails across an entire resource hierarchy, restricting risky configurations, enforcing encryption, and auditing compliance programmatically at organization, folder, and project scopes.
View Details
GitHub Advanced Security Scanning
implementing-github-advanced-security-for-code-scanning
mukul975/Anthropic-Cybersecurity-Skills
470
Implements GitHub Advanced Security with CodeQL to provide automated static analysis, secret detection, dependency review, and push protection across repositories, enabling enterprise-scale vulnerability monitoring and compliance-aligned controls.
View Details
Google Workspace Security Hardening
implementing-google-workspace-admin-security
mukul975/Anthropic-Cybersecurity-Skills
294
Guides admins through hardening Google Workspace via console configuration, phishing-resistant MFA, DLP, OAuth controls, email authentication, and sharing restrictions to secure enterprise cloud office environments.
View Details
Google Workspace Phishing Defense
implementing-google-workspace-phishing-protection
mukul975/Anthropic-Cybersecurity-Skills
235
Guide for configuring Google Workspace advanced phishing and malware protections through Gmail safety settings, attachment safeguards, spoofing checks, enhanced browsing, and APP enrollment to harden high-risk accounts.
View Details
Google Workspace SSO Setup
implementing-google-workspace-sso-configuration
mukul975/Anthropic-Cybersecurity-Skills
82
Guide to configure SAML 2.0 SSO for Google Workspace with a third-party IdP, centralizing authentication, enforcing MFA, and managing scoped profile assignments, network masks, and testing flows to secure organizational access.
View Details
Ransomware Honeypot Deployment
implementing-honeypot-for-ransomware-detection
mukul975/Anthropic-Cybersecurity-Skills
438
Deploys honeypot shares, canary files, and Thinkst Canary appliances to detect ransomware activity early via deception alerts tied to file access and modification.
View Details
Implementing Identity Governance
implementing-identity-governance-with-sailpoint
mukul975/Anthropic-Cybersecurity-Skills
135
Deploy SailPoint IdentityNow or IdentityIQ to automate identity lifecycle management, access requests, certification campaigns, role mining, and SoD enforcement while generating compliance-ready reporting for enterprise IAM environments.
View Details
Zero Trust Identity Verification
implementing-identity-verification-for-zero-trust
mukul975/Anthropic-Cybersecurity-Skills
169
Guides teams through implementing continuous identity verification for zero trust: phishing-resistant MFA (FIDO2/WebAuthn), risk-based conditional access, and identity governance aligned with the CISA Zero Trust maturity framework.
View Details
IEC 62443 OT Segmentation
implementing-iec-62443-security-zones
mukul975/Anthropic-Cybersecurity-Skills
263
Guides designing IEC 62443-3-2 compliant OT security zones and conduits, covering risk-based partitioning, Security Level targets, conduit controls, microsegmentation with industrial firewalls, and validating the zone architecture through traffic analysis and testing.
View Details
Cosign Image Provenance
implementing-image-provenance-verification-with-cosign
mukul975/Anthropic-Cybersecurity-Skills
484
Use Sigstore Cosign to sign, attest, and verify container images with keyless OIDC signing, SBOM/vulnerability attestations, and CI/CD admission enforcement for supply chain provenance security.
View Details
IaC Security Scan Setup
implementing-infrastructure-as-code-security-scanning
mukul975/Anthropic-Cybersecurity-Skills
69
Automates scanning Terraform, CloudFormation, Kubernetes, and Helm IaC with Checkov/tfsec/KICS, enforces policy-as-code, and integrates into CI/CD to stop misconfigurations before deployment.
View Details
Prev
1
2
3
...
132
133
134
135
136
137
138
...
166
167
168
Next
Language
简体中文
English