Community Skills
24641 community skills Β· Page 538 of 986
Passed automated security scans.
Azure Mgmt Fabric Py
Manages Azure Fabric resources using Python SDK, enabling automation of deployments and configurations within Azure Arc environments.
Gcp Cost Optimizer
Provides Google Cloud guidance and assistance for deploying and managing cloud infrastructure.
Docker
Helps with AI, Docker as part of deploying and managing cloud infrastructure workflows.
Docker Workflow
Automates complex Docker container deployments, builds, and orchestration workflows using predefined templates and configurations.
Docker Kubectl Deploy
Helps with Docker, deployment as part of deploying and managing cloud infrastructure workflows.
Dockerfile
Generates Dockerfiles from project descriptions, streamlining container image creation and deployment for efficient application packaging.
Docker
Automates Docker container deployment and management on cloud platforms using fellipeutaka's optimized configurations.
Creating Kubernetes Deployments
Generates Kubernetes deployment YAML files based on provided application specifications and infrastructure details.
Kubernetes Patterns
Helps with Kubernetes, patterns as part of deploying and managing cloud infrastructure workflows.
Generating Security Audit Reports
Helps with security, auditing as part of implementing security and authentication workflows.
Posthog Security Basics
Enforces PostHog security best practices like feature flag access controls and data masking to minimize risk.
Security Assessment
Identifies potential vulnerabilities and misconfigurations in systems and code, providing prioritized remediation recommendations.
Wsdiscovery
Wsdiscovery analyzes network traffic to identify running Windows services and their versions, aiding in vulnerability assessments & security audits.
Firecrawl Security Basics
Identifies common web vulnerabilities like SQL injection and XSS using basic automated checks.
Telnetshell
Telnetshell allows you to execute commands on remote systems via Telnet, useful for reconnaissance and potentially bypassing security controls.
Instantly Security Basics
Provides clear, concise explanations of essential cybersecurity concepts and best practices for immediate understanding.
Security Review 3
Helps with security, code review as part of implementing security and authentication workflows.
Security Integration Tests
Helps with security, integration as part of implementing security and authentication workflows.
Security
Analyzes text for sensitive data exposure, identifying PII, credentials, and vulnerabilities based on custom rulesets.
Finding Security Misconfigurations
Identifies common cloud and infrastructure misconfigurations based on industry best practices and JeremyLongshore's expertise.
Software Security
Identifies and remediates software vulnerabilities in code using automated analysis and secure coding best practices.
Enterprise Security
Identifies and mitigates enterprise security threats using real-time analysis of logs, vulnerabilities, and network activity.
Iotnet
Iotnet analyzes network traffic for IoT device vulnerabilities and anomalies, proactively identifying potential security risks.
Security Audit Owasp Top 10
Helps with security, auditing as part of implementing security and authentication workflows.
Security Audit
Helps with security, auditing as part of implementing security and authentication workflows.