Site Map - skillsoft.digitalbadges.skillsoft.com
- User Authentication
- Arpan Tripathy's Credentials
- Arpan Tripathy's Wallet
- Microsoft Azure Security Technologies: Managing Azure AD Groups
- Microsoft Azure Security Technologies: Securing Azure AD Users
- Microsoft Azure Security Technologies: Managing Azure AD Users
- Microsoft Azure Security Technologies: Exercising Governance Principles
- Microsoft Azure Fundamentals: Cloud Computing
- Git & GitHub: Introduction
- Data Access & Governance Policies: Data Classification, Encryption, & Monitoring
- CCSP 2019: Identity & Access Management
- CCSP 2022: Cloud Security Concepts & Design Principles
- Leading Security Teams for GenAI Solutions: Use of Generative AI
- Responsible Use of AI
- Exploring Business Process Automation
- Automation Design & Robotics
- CompTIA Cloud Essentials+: Essential Cloud Principles
- Testing Methods
- Being an Effective Team Member
- Effective Team Communication
- Identifying Risk (PMBOK® Guide Sixth Edition)
- Code Quality, Testing, & Development
- Software Design and Development: Design Patterns & SOLID Principles
- PRINCE2® Project Management Overview (2017 Update)
- OWASP Top 10: Securing Web Applications
- SOLID & GRASP
- Using Docker for DevOps: Introduction to Docker
- Jenkins for DevOps: Jenkins Configuration for DevOps
- The Language of DevOps: DevOps Tools & Processes
- Cloud Computing Fundamentals: Introduction
- Automated Software Testing
- Agile & TDD Best Practices for APIs: Test-driven Development Strategy
- Transition to Scrum: Agile Foundation to Scrum
- Release & Sprint Planning
- Software Data Analysis: Project Management Metrics
- Using Kanban in IT & Software Development
- Agile Best Practices for Tech Leaders: Scrum Artifacts
- CompTIA Cybersecurity Analyst+: Intrusion Detection & Traffic Analysis
- CompTIA Cybersecurity Analyst+: IT Security Risk Mitigation
- CompTIA Cybersecurity Analyst+: Digital Forensics
- CompTIA Cybersecurity Analyst+: Network Scanning & Traffic Analysis
- CompTIA Cybersecurity Analyst+: Malware Threats
- CompTIA Cybersecurity Analyst+: Cloud Computing
- CompTIA Cybersecurity Analyst+: Threat Intelligence
- CompTIA Cybersecurity Analyst+: Data Privacy
- CompTIA Cybersecurity Analyst+: Threat Monitoring
- CompTIA Cybersecurity Analyst+: Attack Types
- CompTIA Cybersecurity Analyst+: User Account Security
- CompTIA Cybersecurity Analyst+: Business Continuity
- CompTIA Cybersecurity Analyst+: Encryption & Hashing
- CompTIA Cybersecurity Analyst+: Software Development Security
- CompTIA Cybersecurity Analyst+: Hardware & Security
- CompTIA Cybersecurity Analyst+: Network Infrastructure Security
- Defensible Security
- DevOps Security Considerations: Securing DevOps Pipeline
- Microsoft Azure Fundamentals: Security & Compliance
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Threat Modeling
- AWS Cloud Practitioner 2019: Cloud Security & Compliance
- Cloud Security Fundamentals: Cloud Application Security
- CEH v11: \nSocial Engineering, Insider Threats & Identity Theft
- CEH v11: Web Application Hacking & Login Attacks
- CEH v11: SQL Injection & SQLMap
- CEH v11: \nDoS, DDoS, Volumetric & Protocol Attacks
- CEH v11: \nApp Layer Attacks, Botnets & DoS Countermeasures
- CEH v11: Wireless Concepts, Threats & Hacking Tools
- CEH v11: Web Application Attacks & Vulnerabilities
- CEH v11: Intrusion Prevention and Detection, Firewalls & Honeypots
- CEH v11: Hijacking Concepts & Countermeasures
- CEH v11: Web Server Hacking, Attacks & Attack Methodologies
- CEH v11: CSRF, IDOR, LFI & RFI Attacks
- CEH v11: XSS, Web Shells, APIs & Webhooks
- CEH v11: SQL Injection Concepts & Attacks
- CEH v11: Wireless Hacking & Countermeasures
- CEH v11: PKI, Cryptanalysis & Attack Countermeasures
- CEH v11: Mobile Hacking, OS Security & Device Management
- CEH v11: IoT Threats, Vulnerabilities, Attack Tools & Countermeasures
- CEH v11: Cryptography, Algorithms Implementations & Tools
- CEH v11: Cloud Computing, Containers, Hacking & Security Controls
- CEH v11: Operational Technology Concepts, Attack Tools & Countermeasures
- CEH v11: Recon Tools & Tactics
- CEH v11: Nmap TCP Scans
- CEH v11: Metadata, Wordlists, Email, WHOIS & DNS Recon
- CEH v11: Scan Optimization, OS Identification & IDS/Firewall Evasion
- CEH v11: Footprinting and Social Engineering Recon & Countermeasures
- CEH v11: Nmap IP Scans
- CEH v11: Network Scanning, TCP, Host Discovery & Port/Service Scanning
- CEH v11: Vulnerability Assessment, Management & Classification
- CEH v11: \nPasswords Attacks, Extraction & Cracking
- CEH v11: \nSteganography & Avoiding Detection
- CEH v11: \nVulnerability Assessment Types, Models, Tools & Reports
- CEH v11: \nCEH Hacking Methodology & Windows Authentication
- CEH v11: \nNetBIOS, SMB, SNMP & LDAP Enumeration
- CEH v11: \nFileless Malware, Malware Analysis & Countermeasures
- CEH v11: \nBuffer Overflows, Privilege Escalation & System Access
- CEH v11: Sniffing & Poisoning
- CEH v11: \nMalware, Threats, Trojans & Viruses
- CEH v11: \nNTP, NFS, SMTP & FTP Enumeration
- CEH v11: Cybersecurity Basics, Attacks & Information Warfare
- CEH v11: Risk Management, Cyber Threat Intelligence & Threat Modeling
- CEH v11: Cyber Kill Chain, TTPs, Behaviors & Threat Hunting
- CEH v11: Footprinting, Google Dorks, Search Engines & Sub-domains
- CEH v11: Hacking Phases & Concepts
- CEH v11: Incident Management, ML, AI & Regulations
- Cloud Security Fundamentals: Architectural & Design Concepts
- Security Architect: Secure Coding Concepts
- Security Architecture
- CISSP 2021: Software Development Security
- Defensive Programmer: Defensive Techniques
- Defensive Programmer: Defensive Concepts
- Defensive Programmer: Cryptography
- Secure Programmer: Coding Practices
- Secure Programmer: Software Testing
- Defensive Programmer: Advanced Concepts
- Secure Programmer: Software Modeling Techniques
- CISSP: Software Development Security
- Introduction to Secure Programming
- Defensive Programmer: Code Samples
- Defensive Programmer: Secure Testing
- Secure Programmer: Software Design Techniques
- Secure Programmer: Intro to Programming Standards
- CompTIA Network+: Troubleshooting Network Issues
- CompTIA Network+: Network Troubleshooting Methodologies & Tools
- CompTIA Network+: Physical Security & Network Hardening
- CompTIA Network+: Security Concepts & Threats
- CompTIA Network+: Disaster Recovery & High Availability Concepts
- CompTIA Network+: Network Operations
- CompTIA Network+: Ethernet Switching & Wireless Standards
- CompTIA Network+: Network Implementations
- CompTIA Network+: Cloud Concepts
- CompTIA Network+: Network Services & Data Center Architectures
- CompTIA Network+: Well-known Ports & Protocols
- CompTIA Network+: Registered Ports
- CompTIA Network+: IP Addressing Schemes and Subnetting
- CompTIA Network+: Cables & Connectors
- CompTIA Network+: Network Types
- CompTIA Network+: OSI Model Layers & Data Encapsulation
- Trends in Cybersecurity
- Arpan Tripathy's Transcript
- Arpan Tripathy's Wallet
- About Accredible