Site Map - skillsoft.digitalbadges.skillsoft.com
- User Authentication
- DANNY KEITH's Credentials
- DANNY KEITH's Wallet
- Using Generative AI Tools to Learn Python
- Final Exam: Prompt Engineering for Programmers to Learn Python
- Complex Data Types in Python: Working with Lists & Tuples in Python
- Fundamentals of Python
- Introduction to the Computer Science Career Path
- Getting Started with Python: Introduction
- CompTIA Security+: Vulnerability Management
- Introduction to Cloud Computing
- CCNA 2020: IPv4 Subnetting
- CCNA 2020: IP Addressing Basics & Configuration
- CyberOps Windows Hardening: Windows Workstation Hardening Best Practices
- CCNA 2020: Network Topology Architectures
- CCNA 2020: Network Topology Architectures - WAN, Cloud, & SOHO
- CCNA 2020: Layer 1 Physical & Configuration Issues
- CCNA 2020: Networking Components - NGFW, NGIPS, & Cisco DNA Center
- CCNA 2020: Networking Protocols
- CompTIA IT Fundamentals: Software Development Concepts
- CCNA 2024: Enterprise Security Fundamentals
- CCNA 2020: Networking Components
- Track 4: Malware Removal
- Defining Cloud Computing for Decision-makers: Cloud Computing Principles
- Microsoft Azure Fundamentals: Cloud Computing
- Python Fundamentals Bootcamp CST June 2024: Session 1 Replay
- MD-102: Implementing a Provisioning Strategy
- MD-102: Managing Images Using the Microsoft Deployment Toolkit
- Microsoft 365 Fundamentals: Cloud Services & Principles
- CompTIA CASP+: Vulnerabilities & Hardening
- CCNA 2024: Network Address Translation (NAT)
- Common TCP and UDP Applications and VoIP
- 18. APPLIANCES (SERVERS)
- CompTIA CASP+: Digital Forensics
- CompTIA CASP+: IT Governance & Security Compliance
- CompTIA CASP+: Business Continuity
- CompTIA CASP+: Storage & Network Security
- Cloud Security Administration: Hardened Cloud Security
- Cloud Security Fundamentals: Cloud Data Security
- CompTIA IT Fundamentals: CIA Triad
- CompTIA IT Fundamentals: Privacy & Encryption
- CompTIA IT Fundamentals: Operating Systems
- CompTIA IT Fundamentals: Networking & Wireless Technologies
- CompTIA IT Fundamentals: Internet, Storage, & Computer Systems
- Agile Organizations: Cloud for Agile Software Development
- CompTIA IT Fundamentals: Basic IT Concepts
- CompTIA CASP+: Cryptography & PKI
- CompTIA A+ 220-1001: Network Types
- CompTIA CASP+: Secure Cloud Computing
- CISSP Overview
- Certified Information Systems Security Professional
- CompTIA CASP+: Assessing & Managing Risk
- CompTIA Network+: Troubleshooting Network Issues
- Basic: Network+
- 441 Network Operations Specialist
- CompTIA Network+: Network Troubleshooting Methodologies & Tools
- CompTIA Network+: Disaster Recovery & High Availability Concepts
- CompTIA Network+: Network Implementations
- CompTIA Network+: Cloud Concepts
- CompTIA Network+: Network Operations
- CompTIA Network+: Ethernet Switching & Wireless Standards
- CompTIA Network+: Network Services & Data Center Architectures
- CompTIA Network+: Registered Ports
- CompTIA Network+: IP Addressing Schemes and Subnetting
- CompTIA Network+: Physical Security & Network Hardening
- 15. INTERNET PROTOCOL (IP) NETWORKING (TACTICAL)
- Basic: A+
- 411 Technical Support Specialist Basic Certification Journey
- CompTIA Network+: OSI Model Layers & Data Encapsulation
- CompTIA Network+: Network Types
- CompTIA Network+: Security Concepts & Threats
- CompTIA A+ Core 2: Communication Techniques, Licensing, & Policy Concepts
- 451 System Administrator
- 521 Cyber Defense Infrastructure Support Specialist Basic Certification Journey
- Basic: A+
- Basic: A+
- CompTIA A+ Core 2: Backup & Recovery Methods
- CompTIA A+ Core 2: Information Management & Change Management Processes
- SecOps Engineer: System Infrastructure Security
- CompTIA A+ Core 2: Mobile OS Application & Application Security Issues
- CompTIA A+ Core 2: Best Practice Procedures for Malware Removal
- CompTIA A+ Core 2: Securing SOHO Networks & Browser Security
- CompTIA A+ Core 2: Windows OS Problems & Personal Computer Security
- CompTIA A+ Core 2: Mobile & Embedded Device Security
- CompTIA A+ Core 2: Scripting & Remote Technologies
- CompTIA A+ Core 2: Operating System Security Best Practices
- CompTIA A+ Core 2: Social Engineering Attacks
- CompTIA A+ Core 2: Malware Detection, Removal, & Prevention
- CompTIA A+ Core 2: Wireless Security Protocols & Authentication Methods
- CompTIA A+ Core 2: Operating System & Network Management
- CompTIA A+ Core 2: Physical Security Measures
- CompTIA A+ Core 2: Linux, macOS, & Windows File Systems
- CompTIA A+ Core 1: Troubleshooting Wired & Wireless Networks
- CompTIA A+ Core 1: Troubleshooting & Resolving Printer Issues
- CompTIA A+ Core 1: Multifunction Devices & Printer Consumables
- CompTIA A+ Core 1: Client-side Virtualization
- CompTIA A+ Core 1: Best Practices for Resolving Problems
- CompTIA A+ Core 1: Power Supplies
- CompTIA A+ Core 1: Motherboards, CPUs, & Add-on Cards
- SSCP 2021: Authentication & Trust Architectures
- SSCP 2021: Identity Management & Access Control Models
- SSCP 2021: Asset & Change Management Lifecycles
- SSCP 2021: Physical Security Operations
- SSCP 2021: Understanding & Applying Cryptography
- CompTIA A+ Core 1: RAM & Storage Solutions
- CompTIA A+ Core 1: Cable Types & Connectors
- CompTIA A+ Core 1: Mobile Device Accessories & Network Connectivity
- CompTIA A+ Core 1: Wireless Networking & Services
- CompTIA A+ Core 1: Networking Concepts & Configurations
- CompTIA A+ Core 1: Networking Fundamentals
- CompTIA A+ Core 1: Cloud Computing Concepts
- CompTIA Cybersecurity Analyst+: Virtualization & Container Security
- CompTIA A+ Core 1: Installing Hardware & Display Components
- CompTIA Cybersecurity Analyst+: Cloud Computing & Cybersecurity
- CompTIA Cybersecurity Analyst+: Managing Network Settings
- CompTIA A+ Core 2: Safety Procedures & Environmental Impacts
- 6. Enterprise Systems/Programs
- 1. Cyber Defense Operations
- CompTIA Cybersecurity Analyst+: Network Security Concepts
- Windows Environments
- CompTIA CASP+: Industrial Computing Environments
- Vulnerabilities, Systems Scanning and Exploitation
- CompTIA CASP+: Virtualization Security
- Windows Client: Advanced Windows 10 Settings
- 8. APPLIANCES (SERVERS) DEFENSE
- 9. CLIENT SYSTEMS
- CISM 2020: IT Security Policies
- CompTIA CASP+: Monitoring & Incident Response
- 6. NETWORK FUNDAMENTALS
- 12. INFORMATION PROTECTION OPERATIONS
- 2. PUBLICATIONS & DIRECTIVES
- 3. CYBER ENCLAVE
- 4. ENTERPRISE SYSTEMS/PROGRAMMING
- 5. CYBER SECURITY
- 24. NETWORKING AND NETWORK MONITORING
- Monitoring & Securing System Configuration
- 26. DIAMOND MODEL OF INTRUSION ANAYSIS
- CompTIA Cybersecurity Analyst+: Threat Monitoring
- CISM 2020: Detecting Security Anomalies
- 28. BASELINE OF SYSTEMS METHODOLOGIES
- 29. CYBER INTELLIGENCE
- Policy & Governance: Incident Response
- CEH v11: Risk Management, Cyber Threat Intelligence & Threat Modeling
- CEH v11: Cyber Kill Chain, TTPs, Behaviors & Threat Hunting
- 27. CYBER KILL CHAIN
- PenTesting for Physical Security
- CEH v11: Cybersecurity Basics, Attacks & Information Warfare
- Windows Exploits and Forensics: Intelligence Gathering
- CyberOps Windows Hardening: Windows Server Hardening Best Practices
- Forensic Analysis: Cybercrime Investigations
- Network & Host Analysis: Network Operations
- Configuration, Advanced Help, & Queries
- Remote Management
- Output Formatting, Modules, & Customization
- Network & Host Analysis: Network Analysis Formats
- Network & Host Analysis: Network Protocols
- Network & Host Analysis: Network Observations
- Aliases, Providers, & Objects
- Malware Removal: Reporting Findings & Preventing Future Infections
- Malware Removal: Remediating an Infected System
- Network Survey & Extraction: Network Analysis
- Network Survey & Extraction: Network Monitoring
- Malware Removal: Analyzing an Infected System
- Malware Removal: Identifying Malware Types & Classification Approaches
- CompTIA A+ 220-1001: Configuring a Wired/Wireless Network
- CompTIA A+ 220-1001: Networking
- Communication and Web Protocols
- Routing and Wide Area Networks
- Requirements Engineering: An Introduction
- Security Measures: Implementing Security Controls
- Understanding Attacks & Prevention Practices
- Microsoft Security: Basic Azure AD Identity Services & Types
- Fundamental Security Concepts
- Network & Host Analysis: Protocol Analysis
- Legal Considerations and Cybercrime Investigations
- Optimizing Virtual Collaboration
- CEH v11: Intrusion Prevention and Detection, Firewalls & Honeypots
- CEH v11: \nMalware, Threats, Trojans & Viruses
- Security Programming: Code Identification
- Security Programming: System Essentials
- Managing for Operational Excellence
- Cloud Models & Storage
- Ethical Hacker: Security Controls
- Site Reliability: Engineering
- Site Reliability: Tools & Automation
- Introduction to PowerShell 5.0
- Cmdlet Structure & Help
- Syntax, Help, & Conditionals
- Cloud Security Fundamentals: Architectural & Design Concepts
- Developing Azure & Web Services: Introduction
- CompTIA Security+: Implementing Identity and Account Management & AAA Solutions
- CompTIA Security+: Implementing Secure Protocols & Application Security Solutions
- CompTIA Network+: Well-known Ports & Protocols
- Security Programming: PowerShell Scripting Essentials
- Updating to Server 2019: Server Roles
- Cloud Security Fundamentals: Cloud Application Security
- MySQL Database Development: Database Design Fundamentals
- Network Attacks
- Shell Scripting
- Cloud Computing Fundamentals: Migrating to the Cloud
- CompTIA Server+: Server Roles
- CompTIA A+ Core 2: Desktop, Server, & Mobile Operating Systems
- CLDFND: IaaS, PaaS, & SaaS
- Ports, Protocols, & the OSI Model
- Backup & Recovery: Enterprise Backup Strategies
- CompTIA A+ 220-1001: Virtualization
- Windows Server 2016 - Install, Store, & Compute: Server Storage Solutions
- Integrating Cloud & Virtualization Technologies in the Enterprise
- CompTIA Server+: Server Components
- CLDFND: Storage Provisioning
- 1. MISSION DEFENSE ACTIVITIES (MDA)
- Microsoft 365 Fundamentals: Understanding Cloud Concepts
- Microsoft 365 Fundamentals: Cloud Benefits & Considerations
- Windows 10: Active Directory Management
- Exploring the interface in Visio Professional 2019
- Cloud Services: Cloud Computing Concepts
- Cloud Security Fundamentals: Basics of Cloud Operations
- Windows 11 Backup & Recovery Options
- RSTECH: Troubleshooting, Upgrading, Recovering, & Resetting
- RSTECH: Cisco Memory Functions & Removing Cisco Devices
- RSTECH: OS Types, IOS Access, & Terminal Emulation
- RSTECH: IOS Commands, Startup-Config, & IOX-XE Modes
- TCP, UDP, Support and Management Protocols
- RSTECH: Cisco Equipment, Components, & Port Characteristics
- IP Addressing and IPv4 Subnetting
- Cyber Defense Infrastructure Support Specialist
- Multi-cloud Load Balancing: Load Balancing Design Strategies
- Network Security and Emerging Technologies
- CompTIA Linux+: Graphical User Interfaces
- Senior Professional in Human Resources: Risk Management
- Cyber Instructor
- System Administrator
- CompTIA A+ 220-1001: Random Access Memory
- RSTECH: Networking Hardware, Models, & Technologies
- RSTECH: Network Responsibilities, Addressing, & Utilities
- 6. ENCRYPTION / DECRYPTION
- CompTIA Network+: Cables & Connectors
- Final Exam: Network Admin
- CCNA 2020: Cisco WLC Configuration & Wireless Management Access
- CCNA 2020: WLCs, Access Points, Servers, & Endpoints
- Wireless LANs
- Ethernet LANs and Switching
- 1. ENTERPRISE OPERATIONS CAREER FIELD
- 2. MAINTENANCE PRACTICES
- 19. TEMPEST PROGRAM MANAGEMENT
- 3. IP NETWORKING
- 6. ENCRYPTION/DECRYPTION
- 16. IDENTITY CREDENTIALING & ACCESS MANAGEMENT (ICAM)
- Network Operations Specialist
- Technical Support Specialist
- 2. SAFETY / RISK MANAGEMENT (RM)
- 1. EXPEDITIONARY COMMUNICATIONS CAREER FIELD
- Introduction to Networking
- Networking Standards and Connections
- CompTIA A+ 220-1001: Working with Peripheral Devices
- Event, Incident, and Problem Management
- Deploying Microsoft 365 Teamwork: Guest Access
- Working with Document Libraries in SharePoint Online
- Creating a Team Site in SharePoint Online
- Working with SharePoint Apps in SharePoint Online
- Building Web Pages in SharePoint Online
- Illustrating Web Pages in SharePoint Online
- Release, Service Level, and Availability Management
- Problem Solving: Choosing and Implementing the Right Solution
- InfoSec Crisis Management & Incident Response
- Information Security Practices: InfoSec Vendor Management
- 1 AF SharePoint Site Owner
- Information Security Practices: Budgeting & Forecasting for InfoSec
- Information Security Practices: Multi-year InfoSec Planning
- Track 2: InfoSec Leadership
- Information Security for Decision-Makers and Leaders
- Managing Enterprise InfoSec Risks & Risk Tolerance
- Information Security for Leaders: Elements of an InfoSec Team
- Track 1: Elements of InfoSec
- Final Exam: InfoSec Leadership
- Proactive InfoSec Leadership
- Information Security for Leaders: Elements of InfoSec
- Final Exam: Elements of InfoSec
- Signing in & Setting Up in SharePoint Online
- Working with Communication Sites in SharePoint Online
- Programming Fundamentals: Object-oriented Programming
- CCNA 2020: Layer 1 Interfaces & Cabling
- Critical Thinking: Challenging Assumptions
- 1. Data Operations
- 3. Data Literacy
- 5. SOFTWARE DEVELOPMENT FUNDAMENTALS
- Information Security for Leaders: An Introduction to InfoSec
- Security Programming: Command Line Essentials
- Taking Your Team to the Next Level with Delegation
- Developing and Supporting an Agile Mindset
- Listening Even When It's Difficult to Listen
- Programming Fundamentals: Systematic Design with Pseudocode
- Programming Fundamentals: Algorithms, Sorting, & Searching
- Introduction to Cyber Operations
- Confronting Your Assumptions
- Identifying Risks in Your Organization
- Managing a Project to Minimize Risk and Maximize Quality
- Programming Fundamentals: Introduction to Programming
- Security Analyst to Security Architect
- Security Architect
- Security Incident Triage
- Security Program Regulatory Integration
- Final Exam: Security Threat Intelligence
- Data Security Breach Notification Process
- Unified Security: Playbook Approach to Security
- Programming Fundamentals : Command Line Interface & Operating System Commands
- Microsoft Security: Compliance Concepts & Methodologies
- Vulnerability Analyst
- Forensics Analyst
- Final Exam: Security Architect
- Incident Tracking & Response
- Security Software Assessments
- Security Architect: Ethical Hacking Best Practices
- End-User Security: The End-User Perspective
- Cryptography: Introduction to PKI
- Digital Forensic Techniques & Investigative Approaches
- End-User Security: Securing End Users against Attackers
- Cryptography: Introduction to Cryptography Services
- Security Rules: Rules of Engagement
- Risk Analysis: Security Risk Management
- End-User Security: The Security Administrator Perspective
- Anomaly Detection: Aspects of Anomaly Detection
- Anomaly Detection: Network Anomaly Detection
- Cyber Security Audits
- Ethics & Privacy: Digital Forensics
- Final Exam: Forensics Analyst
- Defensible Security
- Final Exam: Vulnerability Analyst
- Intelligent Orchestration: Automating Security Incident Processing
- Maintaining Windows 11 Systems
- Final Exam: Windows Desktop Administration
- Security Architect: Secure Coding Concepts
- Security Analyst
- Security Topologies: Developing Secure Networks
- Authentication & Encryption: Best Practices
- Intrusion Prevention: Best Practices
- Information Security: Pen Testing
- Security Vulnerabilities: Managing Threats & Vulnerabilities
- Intrusion Detection: Best Practices
- Information Security: Honeypots
- Information Security: Continual Infrastructure Testing
- Information Security: Security Governance
- Information Security: Securing Networking Protocols
- Information Security: Hardened Security Topologies
- Information Security: APT Defenses
- Information Security: Subnetting & DNS for Security Architects
- Information Security: NACs & Gateways
- An Executive's Guide to Security: Understanding Security Threats
- An Executive's Guide to Security: Protecting Your Information
- Final Exam: Security Analyst
- Auditing & Incident Response
- Session & Risk Management
- SSCP 2021: Basic Security Concepts
- SSCP 2021: Security Controls
- CEH v12: Incident Management, ML, AI, and Regulations
- CEH v12: Hacking Methodology, MITRE ATT&CK Framework, and Diamond Model
- CEH v12: Cyber Kill Chain, TTPs, Behaviors, and Threat Hunting
- CEH v12: Risk Management, Cyber Threat Intelligence, and Threat Modeling
- CEH v12: Cybersecurity Concepts, Attacks, and Information Warfare
- DANNY KEITH's Transcript
- DANNY KEITH's Wallet
- About Accredible