Site Map - skillsoft.digitalbadges.skillsoft.com
- User Authentication
- Borislav Lukanov's Credentials
- Borislav Lukanov's Wallet
- CompTIA Cloud+: Cloud Component Integration
- Microsoft Azure Fundamentals: Cloud Computing
- Microsoft Azure Fundamentals: Azure Management Tools
- SRE Troubleshooting: Tools
- Network Admin
- Site Reliability Engineering: Scenario Planning
- Final Exam: Network Admin
- Monitoring Distributed Systems
- Backup & Recovery: Windows Client Backup and Recovery Tools
- Describing Distributed Systems
- Backup & Recovery: Enterprise Backup Strategies
- Backup & Recovery: Business Continuity & Disaster Recovery
- OS Deployment Strategies: Maintaining & Managing Modern Systems
- OS Deployment Strategies: Deploying Modern Systems
- OS Deployment Strategies: Upgrading & Maintaining Systems
- Site Reliability: Tools & Automation
- Navigating AI Ethical Challenges and Risks
- Getting Started with Prompt Engineering
- Azure AI Fundamentals: Azure Machine Learning Fundamentals
- IT Infrastructure Automation: Automation & Scalability
- SRE Team Management: Scaling the Team
- SRE Troubleshooting Processes
- Build & Release Engineering Best Practices: Release Engineering
- Site Reliability: Engineering
- AI in IT Automation: Integrating AI Automation in IT Operations
- AI in IT Automation: Developing AI-powered IT Solutions
- Final Exam: IT Automation with Generative AI
- IT Automation with Generative AI
- Track 1: IT Automation with Generative AI
- Generative AI Foundations: Ethical & Responsible Use of AI in IT
- Generative AI Foundations: Advanced Generative AI Techniques for IT
- Generative AI Foundations: IT Integration with Generative AI
- CompTIA Cloud+: Data Security & Compliance Controls
- CompTIA Cloud+: Cloud Security Controls
- CompTIA Cloud+: Cloud Network Security
- CompTIA Cloud+: Cloud Identity & Access Management
- CompTIA Cloud+: Cloud Capacity Planning
- CompTIA Cloud+ : Cloud High Availability & Scaling
- CompTIA Cloud+: Cloud Solution Design
- SCOR: Security Basics & Common Threats
- CompTIA Security+: Security Goals & Controls
- CompTIA CASP+: Assessing & Managing Risk
- CompTIA CASP+: Virtualization Security
- SSCP 2021: Basic Security Concepts
- CISSP 2024: Professional Ethics & Security Concepts
- CompTIA Cloud+: Cloud Architecture & Models
- CompTIA Network+: Troubleshooting Network Issues
- CompTIA Network+: Physical Security & Network Hardening
- CompTIA Network+: Network Troubleshooting Methodologies & Tools
- CompTIA Network+: Security Concepts & Threats
- CompTIA Network+: Disaster Recovery & High Availability Concepts
- CompTIA Network+: Network Operations
- CompTIA Network+: Ethernet Switching & Wireless Standards
- CompTIA Network+: Network Implementations
- CompTIA Network+: Cloud Concepts
- CompTIA Network+: Network Services & Data Center Architectures
- CompTIA Network+: Registered Ports
- 411 Technical Support Specialist Basic Certification Journey
- CompTIA Network+: Well-known Ports & Protocols
- CompTIA Network+: IP Addressing Schemes and Subnetting
- CompTIA Network+: Cables & Connectors
- CompTIA Network+: Network Types
- Business Analysis Overview
- CompTIA Network+: OSI Model Layers & Data Encapsulation
- 451 System Administrator
- CompTIA A+ Core 2: Communication Techniques, Licensing, & Policy Concepts
- CompTIA A+ Core 2: Scripting & Remote Technologies
- Basic: A+
- Basic: A+
- CompTIA A+ Core 2: Safety Procedures & Environmental Impacts
- CompTIA A+ Core 2: Mobile OS Application & Application Security Issues
- CompTIA A+ Core 2: Backup & Recovery Methods
- CompTIA A+ Core 2: Information Management & Change Management Processes
- CompTIA A+ Core 2: Best Practice Procedures for Malware Removal
- CompTIA A+ Core 2: Windows OS Problems & Personal Computer Security
- CompTIA A+ Core 2: Mobile & Embedded Device Security
- CompTIA A+ Core 2: Securing SOHO Networks & Browser Security
- CompTIA A+ Core 2: Operating System Security Best Practices
- CompTIA A+ Core 2: Social Engineering Attacks
- CompTIA A+ Core 2: Malware Detection, Removal, & Prevention
- CompTIA A+ Core 2: Wireless Security Protocols & Authentication Methods
- CompTIA A+ Core 2: Physical Security Measures
- CompTIA A+ Core 2: Operating System & Network Management
- CompTIA A+ Core 2: Desktop, Server, & Mobile Operating Systems
- CompTIA A+ Core 2: Linux, macOS, & Windows File Systems
- CompTIA A+ Core 1: Troubleshooting Wired & Wireless Networks
- CompTIA A+ Core 1: Troubleshooting & Resolving Printer Issues
- CompTIA A+ Core 1: Client-side Virtualization
- CompTIA A+ Core 1: Cloud Computing Concepts
- CompTIA A+ Core 1: Best Practices for Resolving Problems
- CompTIA A+ Core 1: Power Supplies
- CompTIA A+ Core 1: Multifunction Devices & Printer Consumables
- CompTIA A+ Core 1: RAM & Storage Solutions
- CompTIA A+ Core 1: Motherboards, CPUs, & Add-on Cards
- CompTIA A+ Core 1: Cable Types & Connectors
- CompTIA A+ Core 1: Networking Concepts & Configurations
- CompTIA A+ Core 1: Wireless Networking & Services
- CompTIA A+ Core 1: Networking Fundamentals
- CompTIA A+ Core 1: Mobile Device Accessories & Network Connectivity
- AI Apprentice to AI Architect
- AI Architect
- AI in Industry
- Explainable AI
- Evaluating Current and Future AI Technologies and Frameworks
- Final Exam: AI Architect
- Leveraging Reusable AI Architecture Patterns
- AI Practitioner
- Elements of an Artificial Intelligence Architect
- AI Enterprise Planning
- AI Practitioner: Practical BERT Examples
- Using Intelligent Information Systems in AI
- AI Practitioner: BERT Best Practices & Design Considerations
- Final Exam: AI Practitioner
- Using Apache Spark for AI Development
- Extending Amazon Machine Learning
- Working With the Keras Framework
- The AI Practitioner: Tuning AI Solutions
- Advanced Functionality of Microsoft Cognitive Toolkit (CNTK)
- CompTIA A+ Core 1: Installing Hardware & Display Components
- AI Developer
- Working with Google BERT: Elements of BERT
- The AI Practitioner: Optimizing AI Solutions
- The AI Practitioner: Role & Responsibilities
- Final Exam: AI Developer
- Implementing AI Using Cognitive Modeling
- Applying AI to Robotics
- Implementing AI With Amazon ML
- Introducing Apache Spark for AI Development
- Keras - a Neural Network Framework
- Working With Microsoft Cognitive Toolkit (CNTK)
- AI Framework Overview: Development Frameworks
- AI Apprentice
- Cognitive Models: Approaches to Cognitive Learning
- AI Framework Overview: AI Developer Role
- Final Exam: AI Apprentice
- Cognitive Models: Overview of Cognitive Models
- Computer Vision: AI & Computer Vision
- Computer Vision: Introduction
- Python AI Development: Practice
- Python AI Development: Introduction
- Artificial Intelligence: Human-computer Interaction Methodologies
- Artificial Intelligence: Types of Artificial Intelligence
- Artificial Intelligence: Human-computer Interaction Overview
- Artificial Intelligence: Basic AI Theory
- Alerts & Capacity Planning
- Data Models & Pivot Reports
- Splunk Administration
- Searching for Data & Saving Reports
- Fundamental Concepts
- Splunk: Getting Started
- Patch Management Strategies
- Monitoring & Securing System Configuration
- Security Best Practices: Network Appliance Security
- Preemptive Troubleshooting: Concepts & Strategies
- Planning Measures: Incident Response Planning
- Penetration Tester
- Policy & Governance: Incident Response
- Advanced Pen Testing Techniques
- PenTesting for Physical Security
- Wi-Fi Penetration Testing
- Final Exam: Penetration Tester
- Pen Testing: End-user Behavior
- Security Measures: Implementing Security Controls
- Event, Incident, and Problem Management
- Service Desk, IT Asset, Service Configuration, and Change Control Management
- Release, Service Level, and Availability Management
- ITIL® 4 Foundation: Key Concepts of Service Management
- Key Concepts and the Four Dimensions of Service Management
- The Guiding Principles of the Service Value System and Continual Improvement Model
- The Service Value Chain and General Management Practices
- Pen Testing Awareness: Results Management
- Penetration Testing Fundamentals
- Security Analyst to Security Architect
- Security Architect
- Security Incident Triage
- Data Security Breach Notification Process
- Unified Security: Playbook Approach to Security
- Final Exam: Security Architect
- Security Program Regulatory Integration
- Security Architect: Ethical Hacking Best Practices
- Intelligent Orchestration: Automating Security Incident Processing
- Security Rules: Rules of Engagement
- Vulnerability Analyst
- Defensible Security
- Incident Tracking & Response
- Authentication & Encryption: Best Practices
- Security Architect: Secure Coding Concepts
- Security Topologies: Developing Secure Networks
- Final Exam: Vulnerability Analyst
- Security Vulnerabilities: Managing Threats & Vulnerabilities
- Intrusion Detection: Best Practices
- Intrusion Prevention: Best Practices
- Forensics Analyst
- Cryptography: Introduction to PKI
- Cryptography: Introduction to Cryptography Services
- Cyber Security Audits
- Security Software Assessments
- Risk Analysis: Security Risk Management
- Digital Forensic Techniques & Investigative Approaches
- Ethics & Privacy: Digital Forensics
- Final Exam: Forensics Analyst
- Anomaly Detection: Aspects of Anomaly Detection
- Anomaly Detection: Network Anomaly Detection
- End-User Security: The End-User Perspective
- End-User Security: Securing End Users against Attackers
- End-User Security: The Security Administrator Perspective
- Security Analyst
- Information Security: Pen Testing
- Information Security: Honeypots
- Information Security: Security Governance
- Information Security: Continual Infrastructure Testing
- Final Exam: Security Analyst
- Information Security: Subnetting & DNS for Security Architects
- Information Security: Securing Networking Protocols
- Information Security: Hardened Security Topologies
- Information Security: NACs & Gateways
- Information Security: APT Defenses
- An Executive's Guide to Security: Understanding Security Threats
- An Executive's Guide to Security: Protecting Your Information
- Auditing & Incident Response
- Session & Risk Management
- ITIL® 4 Foundation: Introduction
- Contact Tools in Outlook 2016 for Windows
- Organizing Email in Outlook 2016 for Windows
- Illustrating Email in Outlook 2016 for Windows
- Formatting Email in Outlook 2016 for Windows
- Sending & Receiving Email in Outlook 2016 for Windows
- Setting Up in Outlook 2016 for Windows
- Configuring Network & Share Settings
- Managing User Accounts in macOS Sierra
- ITIL® Service Operation Concepts
- Accessing & Managing Files in macOS Sierra
- Overview of the ITIL® Service Lifecycle
- Sign-in & Setup in Convo
- Value-driven Delivery: Delivering Value in Agile Projects
- Business Strategy: Managing Organizational Value
- Business Orientation: Strategic Organizational Goals
- Agile Hybrid Approaches
- Project Management: Scrum Framework for Software Development
- Advanced Scrum for Project Management
- Introduction to the Agile Principles and Mindset Bootcamp: Session 1 Replay
- Agile Software Development: Agile Project Management Techniques
- Agile Software Development: Agile Development Life Cycle
- Agile for Software Development: Lean, Agile, & Scrum Methodologies
- Agile Project Planning
- Agile Project Scheduling and Monitoring
- Agile Stakeholder Engagement and Team Development
- Agile Principles and Methodologies
- Borislav Lukanov's Transcript
- Borislav Lukanov's Wallet
- About Accredible