Site Map - skillsoft.digitalbadges.skillsoft.com
- User Authentication
- Bhushan Suresh Patil's Credentials
- Bhushan Suresh Patil's Wallet
- Ethical Hacker: Incident Response
- CISSP 2021: (ISC)2 & the CISSP Exam
- System Security Certified Practitioner (SSCP 2018): Network Security
- CCSP 2019: Identity & Access Management
- CEH v11: \nVulnerability Assessment Types, Models, Tools & Reports
- Ethical Hacker: Pentesting, Laws, & Standards
- Defining a Project Scope and Team
- Packaging in DevOps: Application Packaging Mechanism
- Being an Effective Team Member
- Software Design and Development: Methodologies
- CompTIA A+ Core 2: Information Management & Change Management Processes
- CISSP: Software Development Security
- Business Analysis Overview
- Software Design and Development: Software Engineering & SDLC Phases
- AWS Developer Associate: Amazon Elastic Compute Cloud
- Cloud Security Fundamentals: Cloud Application Security
- Top 10 List Items
- SOLID & GRASP
- Agile & TDD Best Practices for APIs: Test-driven Development Strategy
- Automated Software Testing
- Security Programming: System Essentials
- OWASP Top 10: Securing Web Applications
- OWASP Top 10: A01:2021-Broken Access Control
- OWASP Top 10: A02:2021-Cryptographic Failures
- OWASP Top 10: A03:2021-Injection
- OWASP Top 10: A09:2021-Security Logging & Monitoring Failures
- OWASP Top 10: A08:2021-Software & Data Integrity Failures
- OWASP Top 10: A10:2021-Server-Side Request Forgery (SSRF)
- Networking Devices
- Ports, Protocols, & the OSI Model
- Communication and Web Protocols
- Introduction to Cyber Operations
- An Executive's Guide to Security: Understanding Security Threats
- Cryptographic Methods
- Defining Cryptography
- Incident Response, Backup and Recovery Strategies, and Documentation
- Trends in Cybersecurity
- Software Engineering, Security and Vulnerabilities
- Physical Security, Safety Procedures, and Access Control
- Environment Monitoring, Retention, and Data Logging
- CompTIA Server+: Server Components
- CompTIA Server+: Servers & Cloud Computing
- CompTIA Server+: Server Storage
- CompTIA Server+: Deploying Cloud IaaS
- CompTIA Server+: File System Security
- CompTIA Server+: Role-specific Server Deployment
- CompTIA Server+: Configuring Server Components
- CompTIA Server+: Deploying Cloud PaaS & SaaS
- CompTIA Server+: Server Roles
- CompTIA Server+: Network Directory Services
- CompTIA Server+: Network Communications
- CompTIA Server+: Working with TCP/IP
- Modes of Operation & Algorithms
- Social Engineering Threats and Prevention
- CyberOps Windows Hardening: Windows Server Hardening Best Practices
- CyberOps Windows Hardening: Windows Workstation Hardening Best Practices
- Cryptography: Introduction to PKI
- Cryptography: Introduction to Cryptography Services
- Encryption Use & Analysis
- Identity Management, Directory Services, and Federation
- Securing Information using Cryptography
- Network Hardening, Network Segmentation, and Secure Connections
- Public Key Infrastructure and Certificate Distribution
- Fundamentals of Malware Analysis and Remediation
- Legal Considerations and Cybercrime Investigations
- Cybersecurity Awareness: Getting Started with Security Foundations
- Cybersecurity Awareness: Information Security Fundamentals
- Cybersecurity Awareness: Exposure to Security Risks
- Cybersecurity Awareness: Key Security Terms & Concepts
- Security Architecture
- Systems Hardening
- Governance and Policy
- Secure Application and Data Architecture Design
- Risk Assessment and Management
- Governance, Risk Management, and Compliance
- Governance and Corportate Culture
- Frameworks, Life Cycles, and Architecture
- Cybersecurity Awareness and Threat Vectors
- Network Discovery Tools and Techniques
- Vulnerabilities, Systems Scanning and Exploitation
- Cybersecurity and Networking Fundamentals
- Discovery and Attack Vectors
- Malware Analysis
- Security Architecture Documentation and Alternative Architectures
- Access Control and Security Architecture Design
- The Guiding Principles of the Service Value System and Continual Improvement Model
- The Service Value Chain and General Management Practices
- Event, Incident, and Problem Management
- Service Desk, IT Asset, Service Configuration, and Change Control Management
- Release, Service Level, and Availability Management
- Saving Time by Setting Goals
- Sharpening Your Focus to Stay on Track
- Managing Your Time So It Doesn’t Manage You
- Maximize Your Productivity by Managing Time and Tasks
- Taking Effective and Professional Notes
- Listening Even When It's Difficult to Listen
- Using Active Listening in Workplace Situations
- The Art of Staying Focused
- Make The Time You Need: Get Organized
- Aligning Goals and Priorities To Manage Time
- Troublesome Words and Phrases: Usage Mistakes in Writing
- Creating Well-constructed Sentences
- ITIL® 4 Foundation: Key Concepts of Service Management
- ITIL® 4 Foundation: Introduction
- Key Concepts and the Four Dimensions of Service Management
- Using Punctuation Marks
- Abbreviating, Capitalizing, and Using Numbers
- Expert Insights on Time Management
- Become a Great Listener
- Getting the Details Right: Spelling Basics
- Expert Insights on Listening
- Using the Parts of Speech
- Bhushan Suresh Patil's Transcript
- Bhushan Suresh Patil's Wallet
- About Accredible