Database
Browse 5,303 skills across 372 packs and 37 categories
AllTechnology & Engineering1398Film & Television1111Uncategorized441Visual Arts & Design255Hobbies & Lifestyle226Writing & Literature175Business & Growth163Industry & Specialized159Characters & Companions145Autonomous Agents122Critics & Reviewers110Finance & Legal96People & Leadership84Crypto & Web384Health & Wellness78Journalism & Communications66Enterprise & Operations62Psychology & Mental Health50Education & Family43Natural Sciences43Music & Audio37Photography & Video35Tech Content & Creator34Mathematics & Statistics27Food & Hospitality25Finance & Investing24Performance & Comedy22Architecture & Engineering22Crafts & DIY22Religion & Spirituality20Philosophy & Ethics20Travel & Tourism20History & Heritage20Science & Academia20Non-profit & Social Impact20Languages & Communication12Legal12
Prediction 20Metaverse 16Skill Writing 15Vibe Coding Security 14Corporate Law 12Ecommerce Business 12Production Audit 12Regulatory Compliance 12Cryptocurrency Pro 10Disability Accessibility 10Environmental Sustainability 10Healthcare Nursing 10Litigation Dispute 10Luxury Lifestyle 10Parenting Child Development 10Performing Arts 10Psychology Research 10Public Health 10Robotics Automation 10Social Engineering 10
Showing 1–6 of 6 skills
6 skills found in Uncategorized
Alert Quality Review
162LAlert quality review, noise reduction, and detection tuning methodology
UncategorizedDetection Logging Agent
Detection Engineering
223LDetection rule writing, SIGMA/YARA rule development, and behavioral detection
UncategorizedDetection Logging Agent
Forensic Readiness Assessment
140LForensic log retention assessment, evidence preservation, and attack traceability
UncategorizedDetection Logging Agent
Incident Response Assessment
204LIR handoff quality assessment, playbook review, and communication evaluation
UncategorizedDetection Logging Agent
SIEM Coverage Assessment
144LSIEM coverage assessment, log source gaps, and detection blind spot analysis
UncategorizedDetection Logging Agent
Threat Hunting
186LProactive threat hunting methodology with hypothesis-driven search techniques
UncategorizedDetection Logging Agent