Cybersec Skills 101
Master the 5 frameworks behind 754 cybersecurity skills for AI agents
v1 · slides for instructor-led sessions
ENalso in ภาษาไทย
What we'll cover
- The library — what it is, why it exists
- MITRE ATT&CK — the offensive lens
- NIST CSF 2.0 — the lifecycle lens
- ATLAS, D3FEND, AI RMF — the AI & defense lenses
- Cross-mapping — one skill, five frameworks
- Walk a real skill, then build your own
Ten modules. We'll close with a capstone.
Why this course exists
Generic L-L-Ms can write code. They cannot run an investigation.
- A senior analyst doesn't ask "what tool?" — they ask "when, why, what next?"
- That decision-making lives in playbooks, not in models
- The library encodes those playbooks for agents to use
Module 1 — what is the library?
An open-source library of cybersecurity skills, designed for A-I agents, mapped to five industry frameworks.
- 754 production-grade skills, Apache-2.0
- 26 security domains — cloud, threat hunting, forensics, more
- Repo:
mukul975/Anthropic-Cybersecurity-Skills
The counts that matter
| Metric | Value |
| Total skills | 754 |
| Domains | 26 |
| Tokens to scan one skill | ~30 |
| Tokens to fully load one | 500–2,000 |
Progressive disclosure. Up to 5 frameworks per skill. Scan all 754 in one pass.
The agentskills.io standard
- Open standard for portable agent skills
- YAML frontmatter for sub-second discovery
- Markdown body for step-by-step execution
- Reference files for deep technical context
- Works zero-config on 26+ A-I platforms
agentskills dot io defines the shape. The library follows it.
Install in one command
# recommended
npx skills add mukul975/Anthropic-Cybersecurity-Skills
# fallback — clone it
git clone https://github.com/mukul975/Anthropic-Cybersecurity-Skills.git
cd Anthropic-Cybersecurity-Skills
Works on Claude Code, Copilot, Cursor, Gemini CLI, Cline, MCP agents.
Module 2 — MITRE ATT&CK
A globally-accessible knowledge base of cyber adversary behavior.
- The "how" of real-world attacks
- 14 tactics (the why) → techniques (the how) → sub-techniques
- The most-mapped framework in the library
The 14 Enterprise tactics
Get in & stay in
Reconnaissance · Resource Development · Initial Access · Execution · Persistence · Privilege Escalation
Operate & cause harm
Defense Evasion · Credential Access · Discovery · Lateral Movement · Collection · C2 · Exfiltration · Impact
v19 (April 2026) splits Defense Evasion into Stealth + Impair Defenses.
Library coverage of ATT&CK
- 291 unique techniques across all 14 tactics
- Defense Evasion deepest (48), Persistence next (36)
- Impact thinnest (6) — outcome-focused, fewer skills
- Top technique: T1059.001 PowerShell — 26 skills
- Ships an ATT&CK Navigator layer file with v1.0.0
Module 3 — NIST CSF 2.0
Where in our cybersecurity program does this skill apply?
- Six core functions, lifecycle-shaped
- 22 categories · 106 subcategories
- Published February 2024 — added Govern; expanded beyond critical infra
The 6 core functions
| Code | Function | Library skills |
| GV | Govern | ~54 |
| ID | Identify | ~115 |
| PR | Protect | ~160 |
| DE / RS / RC | Detect / Respond / Recover | ~102 / ~111 / ~29 |
Recover is shallowest at ~29. Protect + Detect run deepest.
How CSF shows up in a skill
name: acquiring-disk-image-with-dd-and-dcfldd
domain: cybersecurity
subdomain: digital-forensics
nist_csf:
- RS.AN-01 # Incident Analysis
- RS.AN-03
- DE.AE-02 # Adverse Event Analysis
- RS.MA-01 # Incident Management
Frontmatter declares which CSF subcategories a skill supports.
Module 4 — MITRE ATLAS
ATT&CK, but for A-I and machine learning systems.
- Adversarial tactics specific to M-L pipelines, models, agents
- 16 tactics · 84 techniques (v5.4)
- Recent additions cover agentic A-I — context poisoning, tool abuse, MCP compromise
Honest source-coverage note
High confidence
ATLAS exists · library declares 81 skills mapped · `atlas_techniques` is a real frontmatter field · key technique IDs identified
Indicative, not exhaustive
Per-technique tables not yet captured · v5.4 vs v5.5 disagreement in our sources · we lack a `mappings/atlas/README` snapshot
Key ATLAS techniques in the library
- AML.T0051 — L-L-M Prompt Injection (Execution)
- AML.T0054 — L-L-M Jailbreak (Privilege Escalation)
- AML.T0070 — RAG Poisoning (Persistence)
- AML.T0080 — A-I Agent Context Poisoning (Persistence)
- AML.T0010 — A-I Supply Chain Compromise (Initial Access)
Frontmatter field: atlas_techniques
Module 5 — MITRE D3FEND
Defensive countermeasures — the inverse of ATT&CK.
- NSA-funded knowledge graph of defenses
- 267 defensive techniques, 7 tactical categories
- Bidirectional mapping to ATT&CK techniques
Honest source-coverage note
High confidence
D3FEND exists · `d3fend_techniques` is a real frontmatter field · sample skills declare it · derives from ATT&CK mappings
Indicative, not exhaustive
Library maps only ~11 skills — smallest of the five · field accepts both IDs and friendly names · per-technique tables not captured
Defends-against in practice
name: analyzing-threat-actor-ttps-with-mitre-attack
d3fend_techniques:
- Executable Denylisting
- Execution Isolation
- File Metadata Consistency Validation
- Content Format Conversion
- File Content Analysis
Friendly names here. Other skills use D3- IDs. Both are accepted.
Module 6 — NIST AI RMF
Govern. Map. Measure. Manage.
- Four core functions for trustworthy A-I development
- 72 subcategories total · 12 GenAI risk categories (AI 600-1, July 2024)
- Colorado A-I Act gives legal safe harbor for compliance — Feb 2026
Honest source-coverage note
High confidence
Framework exists · 4 functions correctly named · library maps 85 skills · `nist_ai_rmf` field is real
Indicative, not exhaustive
72 subcategory list not enumerated in our sources · 12 GenAI risk categories not enumerated · GenAI Profile vs ATLAS overlap unresolved
Why governance lives next to security
- Cyber risk and A-I risk overlap — prompt injection is both
- Boards and regulators want one framework story, not five
- A-I R-M-F gives the governance language; ATT&CK + ATLAS give the threat language
- Skills tagged with both let one document satisfy both audits
Module 7 — cross-mapping
One skill. Five frameworks. Five compliance checkboxes from one playbook.
- The library's signature value proposition
- Encoded directly in skill frontmatter
- Coverage tracks relevance, not a scoreboard
The canonical example
analyzing-network-traffic-of-malware
| Framework | Mapping |
| MITRE ATT&CK | T1071 — Application Layer Protocol |
| NIST CSF 2.0 | DE.CM — Continuous Monitoring |
| MITRE ATLAS / D3FEND | AML.T0047 / D3-NTA |
| NIST AI RMF | MEASURE-2.6 |
Reality — most skills aren't 5-of-5
| Skill | Frameworks declared |
| acquire-disk-image | NIST CSF only |
| threat-actor-ttps | NIST CSF + D3FEND |
| cloud-siem-with-sentinel | CSF + ATLAS + AI RMF |
| analyzing-network-traffic | all 5 (the headline) |
Coverage tracks relevance. Disk imaging doesn't need ATLAS.
Module 8 — walk a real skill
acquiring-disk-image-with-dd-and-dcfldd
- Domain: digital-forensics
- Author: mahipal · Apache-2.0 · v1.0
- The unglamorous skill that any I-R team needs first
The frontmatter
name: acquiring-disk-image-with-dd-and-dcfldd
description: Forensically sound bit-for-bit images
domain: cybersecurity
subdomain: digital-forensics
version: "1.0"
author: mahipal
license: Apache-2.0
tags: [forensics, disk-imaging, dd, dcfldd, hash-verification]
nist_csf: [RS.AN-01, RS.AN-03, DE.AE-02, RS.MA-01]
When to use it
- You need a forensic copy of a suspect drive
- I-R is preserving volatile evidence
- Legal proceedings require verified bit-for-bit
- Before any destructive analysis
- Imaging physical drives, U-S-B, memory cards
Trigger conditions, written for the agent to match against the prompt.
The workflow — six steps
# 1. Identify the source
lsblk; fdisk -l /dev/sdb
# 2. Write-protect
blockdev --setro /dev/sdb
# 3. Document source
hdparm -I /dev/sdb; smartctl -a /dev/sdb
# 4. Acquire with hash
dcfldd if=/dev/sdb hash=sha256 of=case.dd
# 5. Verify
sha256sum case.dd
# 6. Package case folder
Module 9 — build your own skill
A skill is a folder. Predictable shape. You can ship one in an afternoon.
- One
SKILL.md with frontmatter + body
- Optional
references/, scripts/, assets/
- Body sections: When to Use · Prerequisites · Workflow · Verification
On-disk structure
my-skill/
├── SKILL.md ← required
├── references/
│ ├── standards.md ← optional, deep context
│ └── workflows.md
├── scripts/
│ └── process.py ← optional helpers
└── assets/
└── template.md ← optional outputs
Author checklist
- Pick a real workflow you've actually done
- Write 5 trigger conditions for "When to Use"
- Map to ≥1 framework — start with NIST CSF
- Workflow as commands, not prose
- Verification step the agent can run
- Submit P-R — review usually within 48 hours
Module 10 — capstone
Ship one custom security skill mapped to all 5 frameworks.
- Pick something you'd actually use at work
- The cross-mapping is what separates a skill from a script
- Two to three sessions of focused work
5 deliverables
SKILL.md with full frontmatter + body
- At least one reference file in
references/
- Optional script in
scripts/ if it earns its keep
- All 5 framework fields populated where relevant
- Test prompt — show your agent loading + running it
Pacing
| Sprint | Modules | Sessions |
| Foundation | 1 | 1 |
| Frameworks tour | 2–6 | 5 |
| Composition + walk | 7, 8 | 2–3 |
| Build + Capstone | 9, 10 | 4–5 |
12–14 sessions · ~12–18 learner-hours total.
Ship checklist
- Frontmatter validates against the standard
- Workflow runs end to end on a clean machine
- Verification step actually verifies something
- Framework mappings each cite a justification
- Tested with at least one A-I agent
What's next
- Wiki — 15 pages, ground truth for every claim
- Course — full self-paced version with labs
- Library — clone it, browse it, contribute
- Frameworks — read the originals, not just our summaries
- Build something — that's where it sticks
Questions?
Cybersec Skills 101 · v1 · slides for instructor-led sessions
ENalso in ภาษาไทย