Site Map - skillsoft.digitalbadges.skillsoft.com
- User Authentication
- Cyra Golwalla's Credentials
- Cyra Golwalla's Wallet
- Cloud Security Fundamentals: Cloud Data Security
- Cloud Security Fundamentals: Cloud Application Security
- Cloud Security Fundamentals: Legal & Compliance
- Microsoft Azure Administrator: Azure App Service
- Microsoft Azure Administrator: Azure Policy & Compliance
- Microsoft Azure Administrator: Azure Resource Locking
- Microsoft Azure Administrator: Azure Template Deployments
- Microsoft Azure Administrator: Role-based Access Control
- Microsoft Azure Administrator: Azure Virtual Machine Management
- Microsoft Azure Administrator: Azure Application Containers
- Microsoft Azure Administrator: Storage Account Security
- Microsoft Azure Administrator: Azure Files
- Installation
- Microsoft Azure Administrator: Managing Storage Accounts & Blobs
- Microsoft Azure Administrator: Azure Network Security
- Microsoft Azure Administrator: Azure Network Infrastructure
- Microsoft Azure Administrator: Azure Network Connectivity
- Microsoft Azure Administrator: Entra ID Groups & Conditional Access
- Microsoft Azure Administrator: Entra ID Users & Entra Connect
- Cloud Security Fundamentals: Cloud Infrastructure Security
- Cyber Security Audits
- Saving & Sharing Presentations in PowerPoint 365
- Establishing AI Guardrails and Governance
- AI Change Management: Understanding Drivers and Impact
- Clean Coding Techniques: Defensive Programming, MVC, & DDD
- Clean Coding Techniques: Architecture & Testable Code
- Clean Coding Techniques: Introduction
- Using Microsoft Cloud Services
- Leveraging AI as a Team Member
- Fostering a Growth Mindset in the Age of AI
- Leveraging Analytical and Critical Thinking to Implement AI
- Embracing Risk and Learning from Setbacks with AI Projects
- Harnessing AI for Marketing Success
- Leveraging AI in Human Resources
- Responsible Use of AI
- Smart AI in Product Management
- Maximizing Customer Service with AI
- AI-enhanced Sales Strategies
- AI in the Workplace
- Artificial Intelligence: Basic AI Theory
- Fundamentals of AI & ML: Introduction to Artificial Intelligence
- CISM 2022: Cloud Computing & Coding
- Cloud Security Fundamentals: Architectural & Design Concepts
- Leading in the Age of Generative AI
- Encouraging Innovation and Experimentation with AI
- Cloud Security Fundamentals: Basics of Cloud Operations
- Generative AI and Its Impact to Everyday Business
- Harnessing the Disruption of Generative AI
- SNCF: NGFW Modes, Interface Types, & Link Redundancy
- SNCF: Cisco Firewall, IPS Systems, & the FMCv in AWS
- SNCF: Network Discovery, Identity and DNS Policies, & Correlation
- SNCF: FMCv Deployment & Initial Setup
- SNCF: Deploying NGFWv & Adding It to the FMCv
- SNCF: Dashboards, Reporting, Troubleshooting, Packet Capture, & Cisco AMP
- SNCF: Failover, Multi-instance Deployments, & Clustering
- SNCF: Access Control, FTD, & Prefilter Policies
- SNCF: FMC Settings, Object Management, & Intrusion Rules
- SCOR: Security Basics & Common Threats
- SCOR: VPNs, Security Intelligence, & Social Engineering Attacks
- SCOR: SDN APIs & Security Appliance API Calls
- SCOR: PKI & IKE
- SCOR: Security Models & Frameworks
- SCOR: DHCP Snooping, DAI, IP Source Guard, Private VLANs, & Storm Control
- SCOR: Cisco Firepower, Traffic Management, Identity, & Authentication
- SCOR: Network Access & Secure Network Management
- SCOR: Configuring and Verifying VPN & IPsec
- SCOR: Device Compliance, Exfiltration, Telemetry, & Security Products
- SCOR: Working with ESA, CES, & WSA
- SCOR: Port Security, VLAN Hopping, Network Hardening, & Access Control
- SCOR: Cloud Deployment, Service Models, Responsibilities, & Security
- SCOR: Cisco Umbrella & Endpoint Security
- SCOR: MDM, MFA, & Endpoint Solutions
- SCOR: Guest Services, BYOD, 802.1X, & CoA
- Business Intelligence: Project Data Analysis
- Software Data Analysis: Project Management Metrics
- Business Orientation: Strategic Organizational Goals
- Stakeholder Communication: Software Projects & Stakeholder Communication
- Business Analysis for Project Management: Practices for Later Project Stages
- CAPM®: Common Project Management Methods
- CAPM®: Project Management Key Concepts
- CAPM®: Project Lifecycles
- Agile Software Projects: Estimation Methods
- Unified Security: Playbook Approach to Security
- DevOps with Ansible: Introduction to Playbooks & Testing
- Information Security Management
- Driving Change: A Playbook of Best Practices for a Digital Transformation
- Site Collection Security
- Social Computing & Business Data Connectivity
- Designing a Logical Architecture
- Farm & Web Application Security
- Taxonomy & Managed Metadata Service (MMS)
- Search Management
- MS-300 - Deploying Microsoft 365 Teamwork: Integrate Microsoft 365 Workloads
- Getting to Know the Platform in Microsoft PowerApps
- Sharing & Collaborating on an App in Microsoft PowerApps
- Planning Installation
- Inserting Elements in an App in Microsoft PowerApps
- Creating & Saving Apps in Microsoft PowerApps
- Building your App in Microsoft PowerApps
- Creating your first apps in Power Apps 2024
- Building a canvas app from scratch in Power Apps 2024
- Windows Exploits and Forensics: Post Exploitation
- SCOR: Security Vulnerabilities, Attack Mitigations, & Cryptographic Solutions
- SecOps Tools and 2021 Security Incidents: Microsoft Exchange Server Data Breach
- CompTIA Cybersecurity Analyst+: Cloud Computing & Cybersecurity
- Mitigating Security Risks: Handling Natural Threats
- Exploring SecOps Tools: Digital Forensic Collection with Autopsy
- Exploring SecOps Tools: Using the Social-Engineer Toolkit
- SQL Injection Testing Using sqlmap
- CompTIA Cybersecurity Analyst+: Secure Coding & Digital Forensics
- Mitigating Security Risks: Managing Information, Cloud, & Data Security Risks
- Mitigating Security Risks: Information, Cloud, & Data Security Risk Considerations
- Mitigating Security Risks: Managing Physical Security Risks
- CCSP 2022: Cloud Computing Concepts & Reference Architectures
- Security Programming: Command Line Essentials
- Security Programming: System Essentials
- Azure Developer: PaaS Web Applications
- CompTIA Server+: Deploying Cloud PaaS & SaaS
- SNCF: NAT, QoS, VPN, & Device Management
- SNCF: Security Intelligence & Policies
- CLDFND: IaaS, PaaS, & SaaS
- Managing Sales Data in Salesforce Lightning (2018 update)
- Keeping Track of Activities in Salesforce Lightning (2018 update)
- Leads, Opportunities & Accounts in Salesforce Lightning (2018 update)
- Contact Management & Communication in Salesforce Lightning (2018 update)
- Sign-in & Setup in Salesforce Lightning (2018 update)
- Contact Management & Communication in Salesforce Lightning
- Sign-in & Setup with Salesforce Lightning
- Leads, Opportunities, & Accounts in Salesforce Lightning
- Keeping Track of Activities in Salesforce Lightning
- Managing Sales Data in</br> Salesforce Lightning
- CompTIA Cybersecurity Analyst+: User Account Security
- Reports & Dashboards
- Workflows, Logic, & Testing
- Creating Apps
- Data, Layouts, & Views
- Mobile, Security, & Users
- CompTIA CASP+: Industrial Computing Environments
- Vulnerabilities, Systems Scanning and Exploitation
- CompTIA Cybersecurity Analyst+: Threat Intelligence Information
- Windows Exploits and Forensics: Intelligence Gathering
- Exploring SecOps Tools: Securing Passwords with hashcat
- Certified in Cybersecurity (CC): Incident Response
- Certified in Cybersecurity (CC): Logical Access Controls
- Certified in Cybersecurity (CC): Physical Access Controls
- Malware Removal: Reporting Findings & Preventing Future Infections
- Core DevOps Skills: DevOps Principles & Practices
- Core DevOps Skills: Agile & DevOps
- Core DevOps Skills: Moving toward DevOps
- Cyra Golwalla's Transcript
- Cyra Golwalla's Wallet
- About Accredible