Site Map - skillsoft.digitalbadges.skillsoft.com
- User Authentication
- Abhinav Srivastava's Credentials
- Abhinav Srivastava's Wallet
- Git & GitHub: Introduction
- Exploring Business Process Automation
- Hybrid Environment Pipelines: Hybrid Cloud Transformation
- Automation Design & Robotics
- CCSP 2022: Cloud Security Concepts & Design Principles
- Leading Security Teams for GenAI Solutions: Use of Generative AI
- Responsible Use of AI
- Code Quality, Testing, & Development
- Embracing Agile at Scale
- PRINCE2® Project Management Overview (2017 Update)
- Testing Methods
- Being an Effective Team Member
- Agile Project Planning
- Effective Team Communication
- Identifying Risk (PMBOK® Guide Sixth Edition)
- Software Design and Development: Design Patterns & SOLID Principles
- Generative AI APIs for Practical Applications: An Introduction
- Artificial Intelligence and Machine Learning
- Agile & TDD Best Practices for APIs: Test-driven Development Strategy
- Need for Design Patterns & the Principles Guiding Design Patterns
- CompTIA Security+: Security Assessment & Penetration Testing Techniques
- DevOps Security Considerations: DevSecOps Principles
- Incident Tracking & Response
- Cloud Computing Fundamentals: Security
- CCSP 2019: Identity & Access Management
- Social Engineering Threats and Prevention
- Incident Response & Recovery
- Cultivating Enterprise Agile
- Becoming a Successful Collaborator
- CISSP: Software Development Security
- Encryption & Malware
- Establishing Self-confidence for Life
- Ensuring Successful Presentation Delivery
- CompTIA Cybersecurity Analyst+: Monitoring Tools & Analytics
- Fundamental Security Concepts
- Malware Removal: Reporting Findings & Preventing Future Infections
- Malware Removal: Identifying Malware Types & Classification Approaches
- Agile Principles and Methodologies
- Using the Parts of Speech
- IVM - SOC Analyst
- TechLeap - IVM - School - ECSA
- Ethical Hacker: Security Standards
- Ethical Hacker: Risk Assessment
- Ethical Hacker: Incident Response
- Ethical Hacker: Account Creation
- Ethical Hacker: Secure Technology & Applications
- Ethical Hacker: Password Attacks Part 2
- Ethical Hacker: Footprinting
- Ethical Hacker: Overview & Threats
- Ethical Hacker: Host Discovery & Scanning with Nmap
- Ethical Hacker: Network Sniffing
- Ethical Hacker: Evading IDS, Firewall, & Honeypots Part 2
- Ethical Hacker: ProxyChains & Enumeration
- Ethical Hacker: Evading IDS, Firewall, & Honeypots Part 3
- Ethical Hacker: Vulnerability Analysis Concepts & Tools
- Ethical Hacker: Social Engineering
- Ethical Hacker: Common Web App Threats Part 2
- Ethical Hacker: Hacking Concepts
- Ethical Hacker: Denial of Service
- Ethical Hacker: Evading IDS, Firewall, & Honeypots
- Ethical Hacker: Wireless Hacking Common Threats
- Ethical Hacker: Wireless Hacking Concepts
- Ethical Hacker: Wireless Hacking Tools
- Ethical Hacker: Cracking & Mobile Hacking
- Ethical Hacker: IoT Concepts
- Ethical Hacker: Session Hijacking
- Ethical Hacker: IoT Attacks
- Ethical Hacker: Privilege Escalation
- Ethical Hacker: Security Controls Part 2
- Ethical Hacker: SQL Injection
- Ethical Hacker: Pentesting, Laws, & Standards
- Ethical Hacker: Security Controls
- Ethical Hacker: IoT Hacking & Countermeasures
- Ethical Hacker: Password Attacks
- Ethical Hacker: Cloud Computing Concepts
- Ethical Hacker: Common Web App Threats
- Ethical Hacker: Hacking Web Servers
- Ethical Hacker: Malware Distribution
- Ethical Hacker: Covert Data Gathering
- Ethical Hacker: Hidden Files & Covering Tracks
- Ethical Hacker: SQL Injection Types & Tools
- Ethical Hacker: Cloud Computer Attacks
- Ethical Hacker: Cryptography Concepts
- Ethical Hacker: Cryptography Concepts Part 2
- Ethical Hacker: Cryptography Concepts Part 3
- Ethical Hacker: Cryptography Attacks
- Ethical Hacker: Practical Web App Hacking
- Ethical Hacker: Malware Threats
- Pen Testing: End-user Behavior
- Threat Intelligence & Attribution Best Practices: Threat Intelligence Concepts
- Intelligent Orchestration: Automating Security Incident Processing
- CompTIA Cybersecurity Analyst+: Threat Monitoring
- Backup & Recovery: Business Continuity & Disaster Recovery
- Policy & Governance: Incident Response
- Security Incident Triage
- Data Access & Governance Policies: Data Classification, Encryption, & Monitoring
- Cyber Security Audits
- Information Security Incident Management Part II
- Implementing Governance Strategies
- Data Compliance Issues & Strategies
- OWASP Top 10: A1 - Injection
- OWASP Top 10: A2 - Broken Authentication
- OWASP Top 10: A4 - XML External Entities
- OWASP Top 10: Web Application Security
- OWASP Top 10: A3 - Sensitive Data Exposure
- OWASP Top 10: A5 - Broken Access Control
- OWASP Top 10: A8 - Insecure Deserialization
- OWASP Top 10: A6 - Security Misconfiguration
- OWASP Top 10: A7 - Cross-site Scripting
- OWASP Top 10: A9 - Using Components with Known Vulnerabilities
- OWASP Top 10: A10 - Insufficient Logging & Monitoring
- OWASP Top 10: Discovering & Exploiting Web App Vulnerabilities
- Networking Devices
- Security Programming: System Essentials
- Secure Corporate Communications & Networking
- IT Security Fundamentals
- Using Corporate Devices Securely
- Ports, Protocols, & the OSI Model
- Client & Email Security
- Integrating Security Controls for Host Devices
- Network Discovery Tools and Techniques
- SECFND: Endpoint Security
- Communication and Web Protocols
- Key Concepts and the Four Dimensions of Service Management
- The Guiding Principles of the Service Value System and Continual Improvement Model
- The Service Value Chain and General Management Practices
- Event, Incident, and Problem Management
- Service Desk, IT Asset, Service Configuration, and Change Control Management
- Release, Service Level, and Availability Management
- ITIL® 4 Foundation: Introduction
- Introduction to Server Security
- CompTIA Server+: Server Storage
- CompTIA Server+: Deploying Cloud IaaS
- CompTIA Server+: File System Security
- CompTIA Server+: Role-specific Server Deployment
- CompTIA Server+: Deploying Cloud PaaS & SaaS
- CompTIA Server+: Server Roles
- CompTIA Server+: Network Directory Services
- CompTIA Server+: Network Communications
- CompTIA Server+: Working with TCP/IP
- CompTIA Server+: Server Components
- CompTIA Server+: Servers & Cloud Computing
- CompTIA Server+: Configuring Server Components
- ITIL® 4 Foundation: Key Concepts of Service Management
- API Security
- Top 10 List Items
- Cloud Computing Fundamentals: Introduction
- Agile Software Development - Scrum
- Agile Test-Driven Development
- The Language of DevOps: DevOps Tools & Processes
- Cloud Security Fundamentals: Cloud Application Security
- Using Kanban in IT & Software Development
- Software Data Analysis: Project Management Metrics
- Release & Sprint Planning
- Using Docker for DevOps: Introduction to Docker
- Jenkins for DevOps: Jenkins Configuration for DevOps
- Software Testing for DevOps: DevOps Test Tools
- Developing the Product & Sprint Backlogs
- SOLID & GRASP
- IINS 3.0: SIEM Technology & Security Terminology
- Automated Software Testing
- CISM 2020: Detecting Security Anomalies
- Abhinav Srivastava's Transcript
- Abhinav Srivastava's Wallet
- About Accredible