Site Map - skillsoft.digitalbadges.skillsoft.com
- User Authentication
- Gaurav Singh Jagdish Singh's Credentials
- Gaurav Singh Jagdish Singh's Wallet
- Artificial Intelligence and Machine Learning
- Software Design and Development: Design Patterns & SOLID Principles
- Effective Team Communication
- PRINCE2® Project Management Overview (2017 Update)
- Being an Effective Team Member
- Identifying Risk (PMBOK® Guide Sixth Edition)
- Embracing Agile at Scale
- Agile Project Planning
- Establishing Self-confidence for Life
- Incident Response & Recovery
- Malware Removal: Identifying Malware Types & Classification Approaches
- CompTIA Cybersecurity Analyst+: Monitoring Tools & Analytics
- Developing the Product & Sprint Backlogs
- Transition to Scrum: Agile Foundation to Scrum
- Automated Software Testing
- Release & Sprint Planning
- Using Kanban in IT & Software Development
- Software Data Analysis: Project Management Metrics
- Agile & TDD Best Practices for APIs: Test-driven Development Strategy
- SOLID & GRASP
- Using Docker for DevOps: Introduction to Docker
- Software Testing for DevOps: DevOps Test Tools
- The Language of DevOps: DevOps Tools & Processes
- Cloud Computing Fundamentals: Introduction
- Ethical Hacker: Security Standards
- Ethical Hacker: Risk Assessment
- Ethical Hacker: Incident Response
- Ethical Hacker: Secure Technology & Applications
- Ethical Hacker: Host Discovery & Scanning with Nmap
- Ethical Hacker: Evading IDS, Firewall, & Honeypots Part 2
- Ethical Hacker: Denial of Service
- Ethical Hacker: Evading IDS, Firewall, & Honeypots
- Ethical Hacker: Cracking & Mobile Hacking
- Ethical Hacker: Session Hijacking
- Ethical Hacker: IoT Attacks
- Ethical Hacker: SQL Injection Types & Tools
- Ethical Hacker: Cryptography Concepts
- Ethical Hacker: Cryptography Concepts Part 3
- Ethical Hacker: Practical Web App Hacking
- Ethical Hacker: Account Creation
- Ethical Hacker: Common Web App Threats Part 2
- Ethical Hacker: Wireless Hacking Common Threats
- Ethical Hacker: Wireless Hacking Concepts
- Ethical Hacker: Wireless Hacking Tools
- Ethical Hacker: IoT Concepts
- Ethical Hacker: SQL Injection
- Ethical Hacker: IoT Hacking & Countermeasures
- Ethical Hacker: Cloud Computing Concepts
- Ethical Hacker: Common Web App Threats
- Ethical Hacker: Cloud Computer Attacks
- Ethical Hacker: Cryptography Concepts Part 2
- Ethical Hacker: Cryptography Attacks
- Ethical Hacker: Evading IDS, Firewall, & Honeypots Part 3
- Ethical Hacker: Social Engineering
- Ethical Hacker: Hacking Web Servers
- Ethical Hacker: Malware Threats
- Ethical Hacker: Password Attacks Part 2
- Ethical Hacker: Network Sniffing
- Ethical Hacker: Privilege Escalation
- Ethical Hacker: Password Attacks
- Ethical Hacker: Malware Distribution
- Ethical Hacker: Covert Data Gathering
- Ethical Hacker: Hidden Files & Covering Tracks
- Ethical Hacker: Overview & Threats
- Ethical Hacker: ProxyChains & Enumeration
- Ethical Hacker: Vulnerability Analysis Concepts & Tools
- Ethical Hacker: Hacking Concepts
- Ethical Hacker: Security Controls Part 2
- Ethical Hacker: Pentesting, Laws, & Standards
- Ethical Hacker: Security Controls
- Pen Testing: End-user Behavior
- Intelligent Orchestration: Automating Security Incident Processing
- Threat Intelligence & Attribution Best Practices: Threat Intelligence Concepts
- Wireless Security Settings
- Deploying Mobile Devices Securely
- Cloud Computing, Virtualization, & Resiliency
- CompTIA Security+: Monitoring, Visibility, & Reporting
- CompTIA Security+: Risk Management, Privacy, & Sensitive Data Security
- CompTIA Security+: Incident Response, Digital Forensics, & Supporting Investigations
- CompTIA Security+: Security Policies, Regulations, Standards, & Frameworks
- Public Key Infrastructure
- The Present Threat Landscape
- CompTIA Cybersecurity Analyst+: Threat Monitoring
- Backup & Recovery: Business Continuity & Disaster Recovery
- Policy & Governance: Incident Response
- Security Incident Triage
- Cyber Security Audits
- OWASP Top 10: A01:2021-Broken Access Control
- OWASP Top 10: A02:2021-Cryptographic Failures
- OWASP Top 10: A03:2021-Injection
- OWASP Top 10: A04:2021-Insecure Design
- OWASP Top 10: A05:2021-Security Misconfiguration
- OWASP Top 10: A06:2021-Vulnerable & Outdated Components
- OWASP Top 10: A07:2021-Identification & Authentication Failures
- OWASP Top 10: A09:2021-Security Logging & Monitoring Failures
- OWASP Top 10: A08:2021-Software & Data Integrity Failures
- OWASP Top 10: A10:2021-Server-Side Request Forgery (SSRF)
- Secure Corporate Communications & Networking
- IT Security Fundamentals
- Using Corporate Devices Securely
- Client & Email Security
- Integrating Security Controls for Host Devices
- OWASP Top 10: Securing Web Applications
- Information Security Incident Management Part II
- Information Security Incident Management Part I
- IINS 3.0: SIEM Technology & Security Terminology
- Implementing Governance Strategies
- Data Compliance Issues & Strategies
- Networking Devices
- SECFND: Endpoint Security
- Communication and Web Protocols
- Ports, Protocols, & the OSI Model
- Security Programming: System Essentials
- CompTIA Server+: File System Security
- CompTIA Server+: Network Directory Services
- CompTIA Server+: Role-specific Server Deployment
- CompTIA Server+: Server Roles
- CompTIA Server+: Servers & Cloud Computing
- CompTIA Server+: Configuring Server Components
- Introduction to Server Security
- ITIL® 4 Foundation: Introduction
- Jenkins for DevOps: Jenkins Configuration for DevOps
- Identity and Access Management (IAM)
- Gaurav Singh Jagdish Singh's Transcript
- Gaurav Singh Jagdish Singh's Wallet
- About Accredible