Login
Download
Skill UI
Browse and discover
9469+
curated skills
All
Development
Artificial Intelligence
Design & Creative
Product & Business
Data Science
Marketing
Soft Skills
Productivity
Engineering
Languages
Total
9469
skills
Default
Newest
Most Downloaded
Enterprise Mobile App Management
implementing-mobile-application-management
mukul975/Anthropic-Cybersecurity-Skills
293
Implements Mobile Application Management controls like Intune App Protection Policies, selective wipe, app configuration, and DLP to protect corporate data on BYOD Android and iOS devices without full MDM, enforcing data separation and conditional access for enterprise apps.
View Details
Zero Trust mTLS Setup
implementing-mtls-for-zero-trust-services
mukul975/Anthropic-Cybersecurity-Skills
216
Configures mutual TLS authentication between microservices using Python cryptography and ssl modules, generating CA/service certificates, validating chains, checking expiration, and auditing deployment status to enforce zero-trust service-to-service security.
View Details
NERC CIP Compliance Controls
implementing-nerc-cip-compliance-controls
mukul975/Anthropic-Cybersecurity-Skills
230
Provides a structured approach for implementing NERC CIP compliance controls across BES cyber systems, covering categorization, electronic security perimeters, security and configuration management, supply chain risk, and the 2025 MFA plus low-impact asset updates.
View Details
802.1X Network Access Control
implementing-network-access-control
mukul975/Anthropic-Cybersecurity-Skills
124
Implements 802.1X NAC via FreeRADIUS, PacketFence, and switch configurations to enforce identity-based access, posture assessment, and dynamic VLAN assignment for authorized endpoints.
View Details
Cisco ISE Network Access Control
implementing-network-access-control-with-cisco-ise
mukul975/Anthropic-Cybersecurity-Skills
424
Guide to deploying Cisco Identity Services Engine for wired and wireless 802.1X, MAC Authentication Bypass, posture compliance, and dynamic VLAN and SGT policies for enterprise network access control.
View Details
Honeypot Network Deception Deployment
implementing-network-deception-with-honeypots
mukul975/Anthropic-Cybersecurity-Skills
408
Guide to deploying OpenCanary, Cowrie, or T-Pot honeypots to detect unauthorized access, lateral movement, and reconnaissance while forwarding alerts to a SIEM for faster incident response.
View Details
Suricata IPS Deployment
implementing-network-intrusion-prevention-with-suricata
mukul975/Anthropic-Cybersecurity-Skills
454
Guide to deploy Suricata as an inline IPS, set up NFQUEUE or AF_PACKET modes, configure Emerging Threats rules, tune threading/stream settings, and integrate logging for real-time network threat blocking.
View Details
Kubernetes Network Policy Guide
implementing-network-policies-for-kubernetes
mukul975/Anthropic-Cybersecurity-Skills
237
Documents how to enforce Kubernetes NetworkPolicies using CNI plugins to establish default-deny, service-specific, namespace-aware, egress, and metadata protections, helping teams segment pods for hardened clusters and compliance-driven deployments.
View Details
OT Network Segmentation
implementing-network-segmentation-for-ot
mukul975/Anthropic-Cybersecurity-Skills
299
Guides OT teams through designing and deploying Purdue-based network segmentation, covering VLANs, OT-aware firewalls, DMZs, and migration plans so critical infrastructure stays isolated yet operationally connected.
View Details
Firewall Zone Network Segmentation
implementing-network-segmentation-with-firewall-zones
mukul975/Anthropic-Cybersecurity-Skills
76
Design and implement firewall zone-based network segmentation with VLANs, ACLs, and microsegmentation to limit lateral movement, support compliance, and segment east-west traffic for zero-trust environments.
View Details
Arkime Network Traffic Analysis
implementing-network-traffic-analysis-with-arkime
mukul975/Anthropic-Cybersecurity-Skills
441
Deploy Arkime to capture full packets, query sessions via the v3 API, detect beaconing and TLS anomalies, inspect DNS/HTTP flows, and export PCAPs for forensic review.
View Details
Network Traffic Baselining
implementing-network-traffic-baselining
mukul975/Anthropic-Cybersecurity-Skills
400
Analyzes NetFlow/IPFIX exports with Python pandas to model hourly/daily traffic baselines, per-host stats, protocol distributions, and z-score/IQR alerts so SOC teams can spot exfiltration spikes or beaconing patterns.
View Details
Prev
1
2
3
...
465
466
467
468
469
470
471
...
788
789
790
Next
Language
简体中文
English