Site Map - skillsoft.digitalbadges.skillsoft.com
- User Authentication
- Canaan Dyriz Padua's Credentials
- Canaan Dyriz Padua's Wallet
- CompTIA Security+: Social Engineering Techniques & Other Attack Types
- SRE Metric Management: Software Reliability Metrics
- Core Skills for Site Reliability Engineers: SRE Collaboration & Communication
- SRE Engagement: Production Readiness Review
- SRE Metric Management: Software Reliability Monitoring and Reporting
- SRE Engagement: The SRE Engagement Model
- SRE Data Pipelines & Integrity: Data Integrity
- SRE Team Management: Managing Operational Loads
- SRE Team Management: Operational Overload
- SRE Data Pipelines & Integrity: Pipeline Design
- SRE Testing Tasks: Software Reliability & Testing
- Cloud and Containers for the SRE: Cloud Architectures & Solutions
- SRE Team Management: Scaling the Team
- SRE Data Pipelines & Integrity: Data Pipelines
- An Executive's Guide to Security: Understanding Security Threats
- SRE Products at Scale: Product Launches
- Cloud Computing Fundamentals: Security
- Security
- Securing the Azure Environment
- Securing AWS: Infrastructure Security
- Infrastructure Security
- Application Security Awareness & Validation
- API Security
- Top 10 List Items
- Software Security Best Practices
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Core Concepts
- Secure Programmer: Security Concepts
- End-User Security: The Security Administrator Perspective
- Cloud Access Control
- Cryptography: Introduction to PKI
- Cloud Presence & Privacy
- Information Security Governance Part I
- Information Security Governance Part II
- Secure Concepts
- Authentication & Security
- AWS Professional Solutions Architect 2020: IAM Users & Groups
- Cloud Security Fundamentals: Cloud Infrastructure Security
- Cloud Security Administration: Cloud Data & Application Security
- Introduction to Server Security
- Security Devices, Wireless Security, & Access Control
- Microsoft 365 Identity and Services: Migrating Users & Data
- Authorization & Registration
- Fundamental Security Concepts
- Logon, Logoff & Password Policies
- CompTIA Security+: Implementing Identity and Account Management & AAA Solutions
- System Security Certified Practitioner (SSCP 2018): Identity Management
- Microsoft 365 Identity and Services: Manage Azure AD Identities
- Microsoft Azure Architect Design: Azure Security Governance
- Integrating & Troubleshooting Advanced AAA Technologies
- Microsoft Azure Architect Technologies: Azure AD Connect & Authentication
- Cloud Security Management: Operations Security
- Microsoft 365 Identity and Services: Authentication
- Information Systems Operations Management
- Certified Information Systems Auditor (CISA) 2019: IAM & Data Classification
- Authoring Tool Accessibility Guidelines (ATAG)
- Authentication
- Microsoft Azure Security Technologies: Azure AD User Management
- Software Design Technologies
- Authentication & Encryption: Best Practices
- Security Best Practices: Network Appliance Security
- Social Engineering & Related Attacks
- The Present Threat Landscape
- Windows 10: Active Directory Management
- Secure System, Application Design, & Deployment
- Identity & Access Services
- AWS Associate Solutions Architect 2020: Identity & Access Management
- Business Impact Analysis & Risk Management
- Cloud Computing, Virtualization, & Resiliency
- Penetration Testing & Vulnerability Scanning
- Frameworks, Guidelines, & Physical Security
- Types of Malware
- Public Key Infrastructure
- Security Assessment Using Software Tools
- Wireless Security Settings
- Cryptographic & Wireless Attacks
- CompTIA Cybersecurity Analyst+: Protecting Network Resources
- Analyzing Output from Security Technologies
- Managing Modern Desktops: Dynamic Deployments
- Software Acceptance, Deployment, Operations, & Maintenance
- CompTIA Security+: Cryptography
- AWS Professional Solutions Architect 2020: IAM Configurations
- Secure Application Architecture & IAM
- Deploying Mobile Devices Securely
- Common Account Management Practices
- Components Supporting Organizational Security
- Impacts from Vulnerability Types
- Application & Service Attacks
- Implementing a Secure Network Architecture
- Identity and Access Management (IAM)
- Policies, Plans, & Procedures
- Microsoft 365 Fundamentals: Azure AD & Access Management
- Microsoft Azure Security Technologies: Identity & Access Management
- Access Controls
- Data Security
- CompTIA Cybersecurity Analyst+: User Account Security
- Microsoft 365 Identity and Services: Application Access
- Incident Response, Forensics, Recovery, & Security Controls
- Microsoft 365 Mobility & Security: Threat Management
- Microsoft Azure Architect Design: Azure AD & RBAC Design
- Cloud Blockchains: Single Organization Networks on Amazon Managed Blockchain
- Securing AWS: Identity & Access Management
- Designing for Data Access & Protection
- Security, Access Control, Provisioning, & Code Signing
- ITIL® 4 Foundation: Service Management Practices (Part 2)
- ITIL® 4 Foundation: The Service Value Chain
- ITIL® 4 Foundation: General Management Practices
- ITIL® 4 Foundation: Service Management Practices (Part 1)
- ITIL® 4 Foundation: The Guiding Principles
- Identity & Access Management Controls
- CCSP 2019: Identity & Access Management
- CompTIA A+ 220-1002: Security Fundamentals
- CompTIA Security+: Authentication & Authorization Design Concepts
- Virtual Machines & Identity & Access Management
- (ISC)² & Security Fundamentals
- Implementing Secure Protocols
- Active Directory
- Troubleshooting Common Security Issues
- CompTIA A+ 220-1002: Critical Security Concepts
- Using Microsoft Identity Management & BYOD Solutions
- Azure Fundamentals: Azure Data Privacy
- Azure Fundamentals: Big Data Analytics
- Azure Fundamentals: IoT & AI
- Azure Fundamentals: Virtual Machines
- Azure Fundamentals: Database Solutions
- Azure Fundamentals: Cloud Computing
- Azure Fundamentals: Network Components
- Azure Fundamentals: Storage Components
- Azure Fundamentals: The Ecosystem
- ITIL® 4 Foundation: The Service Value System
- ITIL® 4 Foundation: Key Concepts
- ITIL® 4 Foundation: Introduction
- Microsoft Azure Administrator: Azure App Service & Batch Jobs
- Microsoft Azure Administrator: Availability Solutions
- Microsoft Azure Administrator: Monitoring Azure Resources
- Microsoft Azure Administrator: Managing Azure Storage Accounts
- Microsoft Azure Administrator: Managing Azure Files
- Microsoft Azure Administrator: Managing Azure Virtual Machines
- Microsoft Azure Administrator: Managing Azure Network Solutions
- Microsoft Azure Administrator: Azure Policies
- Microsoft Azure Administrator: Managing Azure Roles & Tags
- Microsoft Azure Administrator: Manage Azure AD Subscriptions and Costs
- Microsoft Azure Administrator: Manage Azure AD Groups & Devices
- Microsoft Azure Administrator: Managing Azure DNS & Network Security
- Microsoft Azure Administrator: Manage Azure AD Users
- Facing Virtual Team Challenges
- Establishing Effective Virtual Teams
- Managing Pressure and Stress to Optimize Your Performance
- Take a Deep Breath and Manage Your Stress
- Expert Insights on Managing Stress
- Expert Insights on Managing Virtual Teams
- Navigating Your Own Emotions
- Navigating Other People's Emotions
- Expert Insights on Emotional Intelligence
- Navigating the Workplace with Emotional Intelligence
- Expert Insights on Working Effectively on a Team
- Being an Effective Team Member
- Strategies for Building a Cohesive Team
- Contributing as a Virtual Team Member
- Expert Insights on Presentation Skills
- Genius Partnerships
- Effective Team Communication
- Developing Emotional Intelligence
- The Essentials for Anger Management
- Become a Great Listener
- Making an Impact with Non-verbal Communication
- Capturing the Attention of Senior Executives
- Choosing the Right Interpersonal Communication Method to Make Your Point
- Communicating with Confidence
- Do We Have A Failure to Communicate?
- Establishing Self-confidence for Life
- Trust Building through Effective Communication
- The Art and Science of Communication
- Effective Stakeholder Communications for Technology Professionals
- Self-improvement for Lifelong Success
- Building Your Presentation
- Proven Techniques for Technical Communication
- Getting Your Pitch Heard
- Uncovering and Utilizing Your Talents and Skills
- Presentation Mastery Series
- Expert Insights on Discovering Your Strengths
- Expert Insights on Leading Effective Meetings
- Planning an Effective Presentation
- Ensuring Successful Presentation Delivery
- Planning Meetings Fit for Purpose
- Telling a Business Story
- Running Meetings in Better Directions
- User Security Features & Configuration
- Memory Tuning Techniques
- Metrics & Monitoring
- Relational Database Concepts
- Backup Strategies
- Backup & Recovery Options
- Backing Up & Recovering Data
- Connecting to & Configuring a Database Instance
- Performing & Managing Backups
- Managing a Database Instance
- Oracle Database Instance Overview
- Importing & Exporting Data
- Database Maintenance
- Networking
- Network File Systems
- File Management
- Job Scheduling
- File Permissions
- Remote Access
- User & Group Management
- Using grep
- Processes, Services, & Daemons
- System Booting & Shutdown
- Bash Scripting
- Kickstart & First-run Issues
- SELinux
- Directory Services
- Logical Volume Management
- Configuring Gnome
- Boot Process
- Linux Installation
- Using Linux Shells
- File Systems & Partitions
- Windows Server 2016 Networking: DHCP Configuration
- Installing Linux & Apache
- SRE Simplicity: Software System Complexity
- Cloud and Containers for the SRE: Implementing Container Solutions
- Cloud and Containers for the SRE: Containers
- Distributed Reliability: SRE Critical State Management
- Distributed Reliability: SRE Distributed Periodic Scheduling
- SRE Load Balancing Techniques: Data Center Load Balancing
- SRE Load Balancing Techniques: Front-end Load Balancing
- Site Reliability Engineering: Scenario Planning
- SRE Simplicity: Simple Software Systems
- Backup & Recovery: Windows Client Backup and Recovery Tools
- Best Practices for the SRE: Automation
- Data Access & Governance Policies: Data Access Governance & IAM
- Best Practices for the SRE: Use Cases for Automation
- Build & Release Engineering Best Practices: Release Management
- SRE Emergency & Incident Response: Responding to Emergencies
- SRE Emergency & Incident Response: Incident Response
- Site Reliability Engineer: Managing Overloads
- Site Reliability Engineer: Managing Cascading Failures
- SRE Troubleshooting: Tools
- SRE Postmortums: Blameless Postmortem Culture Creation
- Backup & Recovery: Business Continuity & Disaster Recovery
- Backup & Recovery: Enterprise Backup Strategies
- Describing Distributed Systems
- SRE Troubleshooting Processes
- Monitoring Distributed Systems
- Site Reliability: Engineering
- Site Reliability: Tools & Automation
- Canaan Dyriz Padua's Transcript
- Canaan Dyriz Padua's Wallet
- About Accredible