Site Map - skillsoft.digitalbadges.skillsoft.com
- User Authentication
- Asad Ijaz's Credentials
- Asad Ijaz's Wallet
- Microsoft Azure Security Technologies: Managing Key Vault Secrets
- Microsoft Azure Security Technologies: Lab Scenario Review
- Microsoft Azure Security Technologies: Enabling Resource Locking
- Microsoft Azure Security Technologies: Securing Azure with Defender & Sentinel
- Microsoft Azure Security Technologies: Monitoring Azure Services
- Microsoft Azure Security Technologies: Managing Azure Policies
- Microsoft Azure Security Technologies: Implementing Data Security
- Microsoft Azure Security Technologies: Ensuring Business Continuity
- Microsoft Azure Security Technologies: Implementing Data Security
- Microsoft Azure Security Technologies: Working with Azure Applications
- Microsoft Azure Security Technologies: Managing Azure Files Shares
- Microsoft Azure Security Technologies: Securing Azure Databases
- Microsoft Azure Security Technologies: Managing Azure Storage
- Microsoft Azure Security Technologies: Managing Azure Virtual Machines
- Microsoft Azure Security Technologies: Securing Network Access with VPNs
- Microsoft Azure Security Technologies: Implementing Azure Network Security
- Microsoft Azure Security Technologies: Configuring Azure Networking
- Microsoft Azure Security Technologies: Managing Azure AD
- Microsoft Azure Security Technologies: Restricting Resource Access with Roles
- Microsoft Azure Security Technologies: Working with Azure AD Features
- Microsoft Azure Security Technologies: Managing Azure AD Groups
- Microsoft Azure Security Technologies: Managing Azure AD Users
- Microsoft Azure Security Technologies: Securing Azure AD Users
- Microsoft Azure Security Technologies: Exercising Governance Principles
- Security Analyst to Security Architect
- Security Architect
- Forensics Analyst
- Microsoft Azure Fundamentals: AZ-900 Exam Preparation
- CISSP February 2023 Bootcamp: Session 2 Replay
- CISSP February 2023 Bootcamp: Session 1 Replay
- Vulnerability Analyst
- Security Analyst
- OWASP Top 10: Discovering & Exploiting Web App Vulnerabilities
- Final Exam: OWASP Top 10 Mitigations
- Track 1: OWASP Top 10 Mitigations
- Web App Vulnerability Analyst
- OWASP Top 10: Web Application Security
- OWASP Top 10: A5 - Broken Access Control
- OWASP Top 10: A6 - Security Misconfiguration
- OWASP Top 10: A9 - Using Components with Known Vulnerabilities
- OWASP Top 10: A10 - Insufficient Logging & Monitoring
- OWASP Top 10: A2 - Broken Authentication
- OWASP Top 10: A4 - XML External Entities
- OWASP Top 10: A3 - Sensitive Data Exposure
- OWASP Top 10: A8 - Insecure Deserialization
- OWASP Top 10: A7 - Cross-site Scripting
- OWASP Top 10: A1 - Injection
- CompTIA PenTest+: Application-based Attacks
- Defensive Programmer: Defensive Concepts
- Secure Programmer: Vulnerabilities
- CISSP 2021: Software Development Security
- Introduction to Secure Programming
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Secure Software Testing
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Testing Types
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Supply Chain & Software Acquisition
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Software Deployment & Management
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Governance, Risk, and Compliance
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Secure Lifecycle Management
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Testing for Security & Quality Assurance
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Security Vulnerabilities
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Secure Coding Practices
- Making an Impact with Non-verbal Communication
- Communicating with Confidence
- The Art and Science of Communication
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Secure Design Principles
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Technologies
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Architectural Risk & Modeling
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Security Architecture
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Privacy
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Threat Modeling
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Abuse Cases & RTMs
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Security Requirements
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Security Design Principles
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Data Classification
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Core Concepts
- Ethical Hacker: Common Web App Threats Part 2
- Ethical Hacker: Practical Web App Hacking
- Ethical Hacker: Hidden Files & Covering Tracks
- Security Incident Triage
- Final Exam: Security Architect
- Unified Security: Playbook Approach to Security
- Security Architect: Ethical Hacking Best Practices
- Data Security Breach Notification Process
- Security Program Regulatory Integration
- Intelligent Orchestration: Automating Security Incident Processing
- Security Rules: Rules of Engagement
- Information Security: Honeypots
- Defensible Security
- Final Exam: Vulnerability Analyst
- Security Architect: Secure Coding Concepts
- Incident Tracking & Response
- Security Topologies: Developing Secure Networks
- Intrusion Prevention: Best Practices
- Authentication & Encryption: Best Practices
- Security Vulnerabilities: Managing Threats & Vulnerabilities
- Intrusion Detection Best Practices
- Cryptography: Introduction to PKI
- Final Exam: Forensics Analyst
- Cyber Security Audits
- Cryptography: Introduction to Cryptography Services
- Security Software Assessments
- Risk Analysis: Security Risk Management
- Digital Forensic Techniques & Investigative Approaches
- Ethics & Privacy: Digital Forensics
- Anomaly Detection: Network Anomaly Detection
- Anomaly Detection: Aspects of Anomaly Detection
- End-User Security: The Security Administrator Perspective
- End-User Security: Securing End Users against Attackers
- End-User Security: The End-User Perspective
- Information Security: Security Governance
- Information Security: Pen Testing
- Information Security: Continual Infrastructure Testing
- Information Security: Securing Networking Protocols
- Final Exam: Security Analyst
- Information Security: Subnetting & DNS for Security Architects
- Information Security: APT Defenses
- Information Security: NACs & Gateways
- An Executive's Guide to Security: Understanding Security Threats
- An Executive's Guide to Security: Protecting Your Information
- Auditing & Incident Response
- Session & Risk Management
- CISSP Bootcamp: Session 2 Replay
- CISSP Bootcamp: Session 1 Replay
- Asad Ijaz's Transcript
- Asad Ijaz's Wallet
- About Accredible