Provides basic steps to secure a home Wi-Fi network against unauthorized access and common vulnerabilities.
Task: Provide a step-by-step guide on how to secure a home Wi-Fi network. Context: Focus on basic, actionable steps for a non-technical user. Output Format: Numbered list of instructions.
Generate simple firewall rules for common network services to establish a basic security posture.
Develop a comprehensive zero trust architecture blueprint for an organization, detailing core principles, key components, implementation phases, and expected benefits.
Develop a detailed playbook for proactive threat hunting, specifying methodologies, tools, and expected outcomes for a given threat vector.