Site Map - skillsoft.digitalbadges.skillsoft.com
- User Authentication
- amit pandey's Credentials
- amit pandey's Wallet
- Microsoft Azure Security Technologies: Managing Azure Files Shares
- Microsoft Azure Security Technologies: Securing Azure Databases
- Microsoft Azure Security Technologies: Managing Azure Virtual Machines
- Microsoft Azure Security Technologies: Securing Network Access with VPNs
- Microsoft Azure Security Technologies: Implementing Azure Network Security
- Microsoft Azure Security Technologies: Configuring Azure Networking
- Microsoft Azure Security Technologies: Restricting Resource Access with Roles
- Microsoft Azure Security Technologies: Working with Azure AD Features
- Microsoft Azure Security Technologies: Managing Azure AD
- Microsoft Azure Security Technologies: Managing Azure AD Groups
- Microsoft Azure Security Technologies: Securing Azure AD Users
- Microsoft Azure Security Technologies: Managing Azure AD Users
- CEH v12: Vulnerability Assessment Types, Models, Tools, and Reports
- CEH v12: Steganography and Avoiding Detection
- CEH v12: Buffer Overflows, Privilege Escalation, and System Access
- CEH v12: AD Enumeration, Mimikatz, and Pivoting Techniques
- CEH v12: Passwords Attacks, Extraction, and Cracking
- CEH v12: Malware, Threats, Trojans, and Viruses
- CEH v12: Windows Authentication
- Basic: CEH
- 511 Cyber Defense Analyst
- Basic: CEH
- 541 Vulnerability Assessment Analyst Basic Certification Journey
- CEH v12: Vulnerability Assessment, Management, and Classification
- CEH v12: NTP, NFS, SMTP, and FTP Enumeration
- CEH v12: NetBIOS, SMB, SNMP, and LDAP Enumeration
- CEH v12: Scan Optimization, OS Identification, and IDS/Firewall Evasion
- CEH v12: Network Scanning, TCP, Host Discovery, and Port/Service Scanning
- CEH v12: Nmap IDLE IPID, UDP, and SCTP Scans
- CEH v12: Nmap TCP Scans
- CEH v12: Hacking Methodology, MITRE ATT&CK Framework, and Diamond Model
- CEH v12: Footprinting, Google Dorks, Search Engines, and Subdomains
- CEH v12: Footprinting and Social Engineering Recon and Countermeasures
- CEH v12: Recon Tools and Tactics
- CEH v12: Incident Management, ML, AI, and Regulations
- CEH v12: Risk Management, Cyber Threat Intelligence, and Threat Modeling
- CEH v12: Cyber Kill Chain, TTPs, Behaviors, and Threat Hunting
- CEH v12: Cybersecurity Concepts, Attacks, and Information Warfare
- CEH v12: PKI, Cryptanalysis, and Attack Countermeasures
- CEH v12: Cryptography, Algorithms, Implementations, and Tools
- CEH v12: Cloud Computing, Containers, Hacking, and Security Controls
- CEH v12: IoT Threats, Vulnerabilities, Attack Tools, and Countermeasures
- CEH v12: Operational Technology Concepts, Attack Tools, and Countermeasures
- CEH v12: Mobile Hacking, OS Security, and Device Management
- CEH v12: Wireless Hacking and Countermeasures
- CEH v12: Wireless Concepts, Threats, and Hacking Tools
- CEH v12: SQL Injection and SQLMap
- CEH v12: SQL Injection Concepts and Attacks
- CEH v12: IDOR Attacks, File Inclusion Attacks, Web APIs, and Webhooks
- CEH v12: Web App Hacking Methodology, CSRF Attacks, and Input Filter Evasion
- CEH v12: Web Application Attacks and Vulnerabilities
- CEH v12: Web Server Hacking, Attacks, and Attack Methodologies
- CEH v12: Intrusion Detection and Prevention, Firewalls, and Honeypots
- CEH v12: Hijacking Concepts and Countermeasures
- CEH v12: App Layer Attacks, Botnets, and DoS Countermeasures
- CEH v12: Social Engineering, Insider Threats, and Identity Theft
- CEH v12: DoS, DDoS, Volumetric, and Protocol Attacks
- Unix Hardening & Maintenance
- Shell Scripting
- Configuring Network Services
- DSC with Linux & JEA
- Securing Unix Systems
- Unix Software Management
- Users, Groups, and Authentication
- DSC & Azure
- CEH v12: Sniffing and Poisoning
- Resource Creation & Configuration
- Creating and Managing Unix File Systems
- CEH v12: Fileless Malware, Malware Analysis, and Countermeasures
- The Unix Command Line & GUI
- DSC, Configurations, & Repositories
- DSC Resources
- Installing Unix
- Local Configuration Manager (LCM)
- Users, Groups, & Environment Variables
- Desired State Configuration (DSC)
- Unix Input, Output, & Piping
- Configuration, Advanced Help, & Queries
- GNU & Unix Commands
- File Permissions & Links
- Output Formatting, Modules, & Customization
- Track 1: Prompt Engineering with Generative AI Tools
- Prompt Engineering with Generative AI Tools
- Final Exam: Prompt Engineering with Generative AI Tools
- Case Studies in Prompt Engineering
- Automation Using Bash & Expect
- Remote Management
- CompTIA Linux+: Introduction to Linux & the Command Line
- Aliases, Providers, & Objects
- Bash Advanced Scripting & File I/O
- Exploring Prompt Engineering Techniques
- Bash Scripting Flow Control & Data Types
- Syntax, Help, & Conditionals
- Cmdlet Structure & Help
- Introduction to Bash Scripting
- Exploring the OpenAI Playground
- Introduction to PowerShell 5.0
- Getting Started with Prompt Engineering
- Enhancing Enterprise Security with AI
- Track 1: Leveraging AI in Enterprise Security
- Final Exam: Enhancing Enterprise Security with Generative AI and AI
- Enterprise Security: Using AI for Intrusion Detection & Prevention
- Enterprise Security: AI in Authentication & Detection of Security Threats
- Prompt Engineering for Ethical Hacking
- Track 1: AI in Ethical Hacking
- Final Exam: Prompt Engineering for Ethical Hacking
- Prompt Engineering: Covering Tracks with GenAI
- Enterprise Security: Leveraging AI to Protect & Validate User Data
- Prompt Engineering: Mobile Platform Security in the GenAI Era
- Prompt Engineering: Cloud Computing & IoT Hacking in the Era of GenAI
- Enterprise Security: Leveraging AI in Identity Security
- Enterprise Security: Leveraging AI to Enhance Email Security
- Prompt Engineering: Web Application & Database Hacking in the Age of GenAI
- Enterprise Security: Leveraging Generative AI with Common Security Tools
- Prompt Engineering: GenAI’s Impact on Network & Perimeter Ethical Hacking
- Prompt Engineering: Generative AI for Malware & Social Engineering
- Prompt Engineering: Generative AI for System Hacking
- Enterprise Security: Artificial Intelligence, Generative AI, & Cybersecurity
- Prompt Engineering: Generative AI for Scanning & Enumeration
- Prompt Engineering: Generative AI for Reconnaissance
- Prompt Engineering: Ethical Hacking & Generative AI Fusion
- CompTIA Linux+: Troubleshooting with systemd
- CompTIA Linux+: Permissions Issues & Restoring the Linux OS
- CompTIA Linux+: Solving Storage & Network Problems
- CompTIA Linux+: Solving CPU, Memory, Boot, & Performance Issues
- CompTIA Linux+: Infrastructure as Code and Git
- OWASP Top 10: A05:2021-Security Misconfiguration
- Final Exam: OWASP Top 10 Mitigations - 2021
- Web App Vulnerability Analyst - 2022 Update
- Track 1: OWASP Top 10 Mitigations
- CompTIA Linux+: Application Containers
- CompTIA Linux+: Shell Scripting with Bash
- OWASP Top 10: A10:2021-Server-Side Request Forgery (SSRF)
- OWASP Top 10: A09:2021-Security Logging & Monitoring Failures
- CompTIA Linux+: Managing SELinux
- OWASP Top 10: A08:2021-Software & Data Integrity Failures
- CompTIA Linux+: Securing Linux
- CompTIA Linux+: Firewalls & Monitoring
- OWASP Top 10: A07:2021-Identification & Authentication Failures
- CompTIA Linux+: Authentication & Authorization
- CompTIA Linux+: Security Threats & Cryptography
- OWASP Top 10: A06:2021-Vulnerable & Outdated Components
- CompTIA Linux+: Shells, Variables, & Configuration Files
- OWASP Top 10: A04:2021-Insecure Design
- CompTIA Linux+: Software Management
- OWASP Top 10: A03:2021-Injection
- OWASP Top 10: A02:2021-Cryptographic Failures
- CompTIA Linux+: Network Services
- CompTIA Linux+: Daemons & Processes
- OWASP Top 10: Securing Web Applications
- OWASP Top 10: A01:2021-Broken Access Control
- CompTIA Linux+: File Systems & Permissions Management
- CompTIA Linux+: Network Connectivity
- Security Threat Intelligence
- Security Threat Intelligence
- CompTIA Linux+: Storage & File systems
- Final Exam: Security Threat Intelligence
- Threat Intelligence & Attribution Best Practices: Threat Intelligence Concepts
- Threat Intelligence & Attribution Best Practices: Attribution Analysis
- CyberOps Windows Hardening: Windows Workstation Hardening Best Practices
- CompTIA Linux+: Installation & File System Navigation
- CyberOps Windows Hardening: Windows Server Hardening Best Practices
- OS Exploits
- Track 1: OS Exploits
- Forensic Analysis: Cybercrime Investigations
- Final Exam: OS Exploits
- Network & Host Analysis: Network Operations
- Network & Host Analysis: Network Analysis Formats
- Linux Exploits & Mitigation: Linux Exploit Architecture
- Network & Host Analysis: Network Observations
- Linux Exploits & Mitigation: Penetration Tools
- Network & Host Analysis: Network Protocols
- Linux Exploits & Mitigation: Memory and Pointer Vulnerabilities
- Network & Host Analysis: Protocol Analysis
- Linux Exploits & Mitigation: String Vulnerability Analysis
- Network Survey & Extraction: Network Monitoring
- Linux Exploits & Mitigation: Program Essentials
- Network Survey & Extraction: Network Analysis
- Malware Removal: Reporting Findings & Preventing Future Infections
- Malware Removal: Remediating an Infected System
- Linux Exploits & Mitigation: Staging for Exploit Analysis
- Malware Removal: Analyzing an Infected System
- Windows Exploits and Forensics: Post Exploitation
- Malware Removal: Identifying Malware Types & Classification Approaches
- Windows Exploits and Forensics: Legacy Systems & Third Party Applications
- Security Programming: Scripting Essentials
- Security Programming: System Essentials
- Windows Exploits and Forensics: SMB & PsExec
- Windows Exploits and Forensics: FTP, RDP, & Other Services
- Security Programming: Code Identification
- Windows Environments
- Security Programming: Command Line Essentials
- Windows Exploits and Forensics: Intelligence Gathering
- An Executive's Guide to Security: Understanding Security Threats
- Trends in Cybersecurity
- Cybersecurity and Networking Fundamentals
- Discovery and Attack Vectors
- Risk Assessment and Management
- Governance, Risk Management, and Compliance
- Governance and Corportate Culture
- Incident Response, Backup and Recovery Strategies, and Documentation
- Physical Security, Safety Procedures, and Access Control
- Network Discovery Tools and Techniques
- Cybersecurity Awareness and Threat Vectors
- Frameworks, Life Cycles, and Architecture
- Access Control and Security Architecture Design
- Cybersecurity Awareness: Exposure to Security Risks
- Cybersecurity Awareness: Key Security Terms & Concepts
- Introduction to Cyber Operations
- Cybersecurity Awareness: Getting Started with Security Foundations
- Cybersecurity Awareness: Information Security Fundamentals
- CCSP 2019: Application Development & Security
- CCSP 2019: Managing & Securing Cloud Infrastructure
- CCSP 2019: Identity & Access Management
- CCSP 2019: Operational Controls & Standards
- CCSP 2019: Cloud Infrastructure
- CCSP 2019: Data Center Security
- CCSP 2019: Data Retention & Events
- CCSP 2019: Implementing Data Discovery & Classification
- CCSP 2019: Cloud System Architecture Design
- CCSP 2019: Data Security Technologies
- CCSP 2019: Secure Cloud Computing
- CompTIA Cybersecurity Analyst+: Network Scanning & Traffic Analysis
- CompTIA PenTest+: Vulnerability Scanning
- CompTIA Cybersecurity Analyst+: Data Privacy
- CompTIA Cybersecurity Analyst+: Digital Forensics
- CompTIA Cybersecurity Analyst+: Threat Monitoring
- CompTIA Cybersecurity Analyst+: Encryption & Hashing
- CompTIA Cybersecurity Analyst+: Attack Types
- CompTIA Cybersecurity Analyst+: Business Continuity
- CompTIA Cybersecurity Analyst+: Threat Intelligence
- CompTIA Security+: Monitoring, Visibility, & Reporting
- CompTIA Security+: Security Policies, Regulations, Standards, & Frameworks
- CompTIA Security+: Incident Response, Digital Forensics, & Supporting Investigations
- CompTIA Security+: Wireless, Mobile, & Embedded Device Security
- CompTIA Security+: Organizational Security Assessment Tools & Mitigation Controls
- CompTIA Security+: Implementing Secure Network Designs
- CompTIA Security+: Implementing Secure Protocols & Application Security Solutions
- CompTIA Security+: Basic Cryptography & Public Key Infrastructure
- CompTIA Security+: Implementing Identity and Account Management & AAA Solutions
- CompTIA Security+: Physical Security Controls
- CompTIA Security+: Authentication & Authorization Design Concepts
- CompTIA Security+: Controls & Application Development, Deployment, & Automation
- CompTIA Security+: Security Concepts in an Enterprise Environment
- CompTIA Security+: Implementing Cybersecurity Resilience
- CompTIA Security+: Security Assessment & Penetration Testing Techniques
- CompTIA Security+: Threat Actors, Intelligence Sources, & Vulnerabilities
- CompTIA Security+: Analyzing Application & Network Attacks
- CompTIA Security+: Social Engineering Techniques & Other Attack Types
- CompTIA Cybersecurity Analyst+: Intrusion Detection & Traffic Analysis
- CompTIA Cybersecurity Analyst+: IT Security Risk Mitigation
- CompTIA Cybersecurity Analyst+: Software Development Security
- CompTIA Cybersecurity Analyst+: Network Infrastructure Security
- CompTIA CASP+: Virtualization Security
- CompTIA Cybersecurity Analyst+: Malware Threats
- CompTIA Security+: Risk Management, Privacy, & Sensitive Data Security
- CompTIA Cybersecurity Analyst+: Cloud Computing
- CompTIA Cybersecurity Analyst+: User Account Security
- CompTIA Cybersecurity Analyst+: Hardware & Security
- CompTIA Security+: Virtualization, Cloud Computing, & Cloud Cybersecurity Solutions
- Python Novice
- Python Novice to Pythonista
- Pythonista
- Final Exam: Pythonista
- Python Design Patterns: Working with Structural Design Patterns
- Python Design Patterns: Working with Behavioral Design Patterns
- Python Design Patterns: Working with Creational Design Patterns
- Python Design Patterns: Principles of Good Design
- Socket Programming in Python: Advanced Topics
- Socket Programming in Python: Introduction
- Excel with Python: Constructing Data Visualizations
- Excel with Python: Performing Advanced Operations
- Excel with Python: Working with Excel Spreadsheets from Python
- Introduction to Using PyCharm IDE
- Python Journeyman
- Final Exam: Python Journeyman
- Python Concurrent Programming: Asynchronous Executions in Python
- Python Concurrent Programming: Multithreading in Python
- Python Concurrent Programming: Multiprocessing in Python
- Python Concurrent Programming: Introduction to Concurrent Programming
- Flask in Python: User Authentication in a Flask Application
- Flask in Python: Building a Simple Web Site Using Flask
- Flask in Python: User Interactions in Flask Applications
- Python Requests: HTTP Requests with Python
- Flask in Python: An Introduction to Web Frameworks & Flask
- Python Unit Testing: Testing Python Code Using doctest
- Python Unit Testing: Testing Python Code Using pytest
- Python Unit Testing: Advanced Python Testing Using the unittest Framework
- Python Unit Testing: An Introduction to Python's unittest Framework
- Python Apprentice
- Final Exam: Python Apprentice
- Data Structures & Algorithms in Python: Implementing Trees & Graphs
- Data Structures & Algorithms in Python: Trees & Graphs
- Data Structures & Algorithms in Python: Implementing Sorting Algorithms
- Data Structures & Algorithms in Python: Sorting Algorithms
- Data Structures & Algorithms in Python: Implementing Data Structures
- Data Structures & Algorithms in Python: Fundamental Data Structures
- Python Classes & Inheritance: Advanced Functionality Using Python Classes
- Python Classes & Inheritance: Working with Inheritance in Python
- Python Classes & Inheritance: Getting Started with Classes in Python
- Python Classes & Inheritance: Introduction
- Advanced Python Topics: Migrating from Python 2 to Python 3
- Advanced Python Topics: Modules & Virtual Environments
- Advanced Python Topics: Exceptions & Command Line Arguments
- Advanced Python Topics: File Operations in Python
- Final Exam: Python Novice
- Getting Started with Python: Introduction
- Complex Data Types in Python: Working with Dictionaries & Sets in Python
- Complex Data Types in Python: Working with Lists & Tuples in Python
- Functions in Python: Gaining a Deeper Understanding of Python Functions
- Functions in Python: Working with Advanced Features of Python Functions
- Functions in Python: Introduction
- Conditional Statements & Loops: While Loops in Python
- Conditional Statements & Loops: Advanced Operations Using for Loops in Python
- Conditional Statements & Loops: The Basics of for Loops in Python
- Conditional Statements & Loops: If-else Control Structures in Python
- Complex Data Types in Python: Shallow & Deep Copies in Python
- Power BI Bootcamp: Session 1 Replay
- Power BI Bootcamp: Session 2 Replay
- Power BI Bootcamp: Session 3 Replay
- Power BI Bootcamp: Session 4 Replay
- amit pandey's Transcript
- amit pandey's Wallet
- About Accredible