Site Map - skillsoft.digitalbadges.skillsoft.com
- User Authentication
- Emran Moradian's Credentials
- Emran Moradian's Wallet
- Packaging in DevOps: Application Packaging Mechanism
- SCCM Administration
- Managing Clients
- Certified Information Systems Auditor (CISA) 2019: Performance & Management
- Managing Inventory & Reporting
- Microsoft Azure Administrator: Azure Virtual Machines (VMs)
- Google Cloud Architect: Virtual Machine Configuration
- Google Cloud Architect: Network Components
- Google Cloud Architect: Data Storage
- Google Cloud Architect: Cloud Design
- Google Cloud Architect: Web Applications & Name Resolution
- Google Cloud Architect: Virtual Machine Deployment
- VMware Tools, Power Options, & Snapshots
- Creating, Cloning, & Importing VMs
- Windows Client: Windows Hyper-V
- Virtual Machine Management
- VMware VCP-DCV vSphere 7: DRS Clusters & High Availability
- VMware VCP-DCV vSphere 7: VM Customization, Management, & Snapshots
- VMware VCP-DCV vSphere 7: Baselines, Cluster Image Validation, & VM Upgrades
- VMware VCP-DCV vSphere 7: vSphere HA Clusters & Fault Tolerance
- VMware VCP-DCV vSphere 7: Virtualization, SDDC, & ESXi Hosts
- VMware VCP-DCV vSphere 7: ESXi Host Configuration
- VMware VCP-DCV vSphere 7: Managing & Deploying VMs
- VMware VCP-DCV vSphere 7: vCenter Domains, Identity Sources, Access, & Backup
- VMware VCP-DCV vSphere 7: VM Provisioning, Tools, Files, & Containers
- VMware VCP-DCV vSphere 7: vSphere Terminology & Standard Switches
- Kubernetes Administrator: Kubernetes Fundamentals for Administrators
- Kubernetes Administrator: Cluster Installation & Configuration
- Building Customer Relationships in a Virtual Environment
- System Center Configuration Manager Introduction & Planning
- Installing System Center Configuration
- SCOM Introduction
- Managing VMM
- Client Access Services
- Deploying Mailbox Servers
- Planning, Configuration, & Collaboration
- Recovery Strategies
- Mail Flow Rules & Auditing
- CompTIA CASP+: Vulnerabilities & Hardening
- CompTIA Security+: Wireless, Mobile, & Embedded Device Security
- CompTIA Cybersecurity Analyst+: Software Development Security
- CompTIA Cybersecurity Analyst+: Hardware & Security
- Microsoft Azure Fundamentals: Databases & Data Analytics
- Updating to Server 2019: PowerShell for Windows Server
- CompTIA A+ 220-1001: Basic Cable Types
- Introduction to PowerShell 5.0
- CompTIA CASP+: Mobile & Embedded Devices
- CompTIA CASP+: Emerging Technologies & SecDevOps
- Azure Data Scientist Associate: High Availability & Disaster Recovery
- CompTIA Linux+: Introduction to Linux & the Command Line
- CompTIA Linux+: Boot Process & Kernel
- CompTIA Linux+: Security Best Practices
- CompTIA Linux+: Using vi/vim to Edit Files
- CompTIA Linux+: Logical Volumes & Filesystem Hierarchy
- CompTIA Linux+: File Access & Permissions
- CompTIA Linux+: Scheduling Tasks
- CompTIA Linux+: Bourne-again Shell & Scripting
- CompTIA Linux+: Locating & Manipulating Files
- CompTIA Linux+: Searching& Manipulating File Contents
- CompTIA Linux+: Git Version Control
- CompTIA Linux+: Managing Users & Groups
- CompTIA Linux+: TCP/IP & Networking
- CompTIA Linux+: Troubleshooting Network Connections
- CompTIA Linux+: Managing Services
- CompTIA Linux+: Installing CentOS
- CompTIA Linux+: Installing Ubuntu
- CompTIA Linux+: Disk Partitions & File Systems
- CompTIA Linux+: Troubleshooting Services
- CompTIA Linux+: Managing & Configuring Hardware
- CompTIA Linux+: Graphical User Interfaces
- CompTIA Linux+: Installing & Managing Software
- CompTIA Linux+: Installing Software from Source Code
- CompTIA Network+: Security Concepts & Threats
- CompTIA Linux+: Network Firewall & Traffic Filtering
- CompTIA Linux+: Backup & Restore
- CompTIA Linux+: SELinux & AppArmor
- Microsoft Azure Infrastructure Solutions: Data Solutions
- CompTIA A+ Core 1: Networking Fundamentals
- CompTIA A+ Core 2: Physical Security Measures
- CompTIA A+ Core 1: Mobile Device Accessories & Network Connectivity
- CompTIA A+ Core 2: Mobile & Embedded Device Security
- CompTIA A+ Core 1: Cable Types & Connectors
- CompTIA A+ Core 2: Mobile OS Application & Application Security Issues
- CompTIA A+ Core 2: Safety Procedures & Environmental Impacts
- Security, Service, & Mobile Device Management
- SSCP 2021: Endpoint Protection & Mobile Device Management
- CEH v11: Mobile Hacking, OS Security & Device Management
- SNCF: NAT, QoS, VPN, & Device Management
- CompTIA Security+: Security Assessment & Penetration Testing Techniques
- vCenter Server Installation
- Powershell 4: Administration
- Using iOS 12 for iPhone
- Security Programming: PowerShell Scripting Essentials
- PowerShell Remoting
- New Project Manager Essentials
- Google Cloud Architect: Cloud Basics
- Ethical Standards and PMI® Core Values
- Strategically Focused Project Management
- Ethics and Project Management
- CCNA 2020: Network Access, VLAN Configuration, & Interswitch Connectivity
- Mitigating Security Risks: Cyber Security Risks
- Malware Analysis
- CompTIA A+ Core 2: Malware Detection, Removal, & Prevention
- CISM 2020: Managing IT Risk
- CISM 2020: Network Infrastructure Security
- CISM 2020: Security Testing
- Mobile Security Threats
- Product Management: Understanding and Developing Customers
- Managing a Project to Minimize Risk and Maximize Quality
- Security Architecture
- CCNA 2020: Networking Components
- CCNA 2020: Network Topology Architectures
- CCNA 2020: Layer 1 Interfaces & Cabling
- Ethical Hacker: Host Discovery & Scanning with Nmap
- CCNA 2020: Network Topology Architectures - WAN, Cloud, & SOHO
- CCNA 2020: WLCs, Access Points, Servers, & Endpoints
- CCNA 2020: Layer 1 Physical & Configuration Issues
- CCNA 2020: Networking Components - NGFW, NGIPS, & Cisco DNA Center
- Ethical Hacker: Social Engineering
- CCNA 2020: Networking Protocols
- Ethical Hacker: Hacking Concepts
- CCNA 2020: IPv6 Addressing & Configuration
- CCNA 2020: IP Addressing Basics & Configuration
- CCNA 2020: Spanning Tree Protocol
- Ethical Hacker: Pentesting, Laws, & Standards
- Ethical Hacker: Hacking Web Servers
- Vulnerabilities, Systems Scanning and Exploitation
- Key Concepts and the Four Dimensions of Service Management
- The Guiding Principles of the Service Value System and Continual Improvement Model
- The Service Value Chain and General Management Practices
- Event, Incident, and Problem Management
- Service Desk, IT Asset, Service Configuration, and Change Control Management
- Release, Service Level, and Availability Management
- CEH v11: Cybersecurity Basics, Attacks & Information Warfare
- CompTIA Server+: Network Communications
- CEH v11: Web Application Attacks & Vulnerabilities
- CompTIA Server+: Network Security Protocols
- ITIL® 4 Foundation: Key Concepts of Service Management
- ITIL® 4 Foundation: Introduction
- Cloud Security Management: Data Security
- Cloud Security Administration: Cloud Data & Application Security
- Cloud Security Management: Operations Security
- Data Engineering on Microsoft Azure: Data Factory
- Cloud Security Management: Legal & Compliance
- Infrastructure Security
- Azure Fundamentals: Network Components
- AWS SysOps Associate 2021: Storage Management
- Cloud Security Management: Risk Management
- Security Fundamentals: Firewalls
- Cloud Platform Security: System Monitoring & Protection
- Planning for Mailbox Servers
- AWS SysOps Associate 2021: EC2 Instance Deployment & Sizing
- AWS Developer Associate 2021: \nAmazon Elastic Compute Cloud (EC2)
- CompTIA Server+: Network Firewalls
- CEH v11: Intrusion Prevention and Detection, Firewalls & Honeypots
- AWS Cloud Practitioner 2022: Cloud & the Value Proposition
- AWS Cloud Practitioner 2022: Cloud Deployment & Operation
- AWS Solutions Architect Professional 2022: Deploying EC2 Instances
- AWS SysOps Associate 2021: Management Tools
- AWS SysOps Associate 2021: EC2 Instance Management
- Conducting an Effective Hiring Interview
- Emran Moradian's Transcript
- Emran Moradian's Wallet
- About Accredible