Site Map - skillsoft.digitalbadges.skillsoft.com
- User Authentication
- Gavin Fellows's Credentials
- Gavin Fellows's Wallet
- AWS Solutions Architect Associate 2022: Cost Management
- AWS Solutions Architect Associate 2022: Data & Service Availability
- AWS Solutions Architect Associate 2022: Network Security Services
- AWS Solutions Architect Associate 2022: Directory Services Authentication
- AWS Solutions Architect Associate 2022: Identity & Access Management
- AWS Solutions Architect Associate 2022: Security & Data Privacy
- AWS Solutions Architect Associate 2022: App & Coding Services
- AWS Solutions Architect Associate 2022: AWS Cryptography & PKI
- AWS Solutions Architect Associate 2022: Managing EC2 Instances
- AWS Solutions Architect Associate 2022: Compute & Data Analysis Services
- AWS Solutions Architect Associate 2022: Connectivity & Name Resolution
- AWS Solutions Architect Associate 2022: Managing Network Infrastructure
- AWS Solutions Architect Associate 2022: Architecture & Tools
- AWS Solutions Architect Associate 2022: Data Storage Services
- AWS Solutions Architect Associate 2022: Managing S3 Buckets
- Azure AI Fundamentals: Artificial Intelligence & Machine Learning
- Zero trust Networking Replay
- Risk Analysis: Security Risk Management
- Risk Assessment and Management
- Digital Forensic Techniques & Investigative Approaches
- Anomaly Detection: Network Anomaly Detection
- Ethics & Privacy: Digital Forensics
- End-User Security: Securing End Users against Attackers
- Anomaly Detection: Aspects of Anomaly Detection
- Final Exam: Security Analyst
- End-User Security: The End-User Perspective
- Information Security: Pen Testing
- End-User Security: The Security Administrator Perspective
- Information Security: Honeypots
- Information Security: Security Governance
- Information Security: Subnetting & DNS for Security Architects
- Information Security: Continual Infrastructure Testing
- Information Security: Securing Networking Protocols
- Information Security: Hardened Security Topologies
- An Executive's Guide to Security: Understanding Security Threats
- Auditing & Incident Response
- Information Security: APT Defenses
- Information Security: NACs & Gateways
- An Executive's Guide to Security: Protecting Your Information
- Cloud Security Architect
- Network Security Specialist to CloudOps Security Architect
- Cloud Platform Security: Incident Response & Remediation
- Session & Risk Management
- Final Exam: Cloud Security Architect
- Cloud Platform Security: Infrastructure Protection
- Cloud Platform Security: Designing Secure Access
- Cloud Platform Security: Platform & Infrastructure Security
- Cloud Platform Security: System Monitoring & Protection
- Security Admin
- Cloud Security Admin
- Securing AWS: Infrastructure Security
- Final Exam: Cloud Security Admin
- Final Exam: Security Admin
- Securing AWS: Identity & Access Management
- Securing AWS: Data Protection
- Cloud Security Management: Legal & Compliance
- Cloud Security Management: Platform & Infrastructure Security
- Cloud Security Management: Risk Management
- Securing AWS: Fundamentals
- Cloud Security Management: Data Security
- Cloud Security Management: Operations Security
- Cloud Security Management: Architecture Security
- Core DevOps Skills: Moving toward DevOps
- Core DevOps Skills: DevOps Principles & Practices
- Core DevOps Skills: Continuous Principles
- DevOps and Security: DevSecOps Principles
- Executive's Guide to DevSecOps Replay
- OWASP Top 10: A02:2021-Cryptographic Failures
- OWASP Top 10: A04:2021-Insecure Design
- Securing Information using Cryptography
- Certified in Cybersecurity (CC): Physical Access Controls
- Certified in Cybersecurity (CC): Security Best Practices & Security Awareness
- Certified in Cybersecurity (CC): Security Governance, Policies, & Controls
- Certified in Cybersecurity (CC): Incident Response
- Certified in Cybersecurity (CC): Business Continuity Planning
- Certified in Cybersecurity (CC): Core Security Principles & Risk Management
- Cybersecurity Awareness: Getting Started with Security Foundations
- Security Architecture
- Security for Engineering Leaders: Data Security for Engineering Projects
- Security for Engineering Leaders: Defining Security
- DevOps for Engineering Leaders: Introduction to DevOps
- Network Security Specialist
- Final Exam: Network Security Specialist
- Business Continuity: Secure Cloud Computing
- Cloud Services: Cloud Computing Concepts
- Cloud Management
- Business Continuity: Cloud Integration
- SecOps Engineer: Security Engineering
- SecOps Tools and 2021 Security Incidents: Facebook Data Breach
- SecOps Tool Landscape: The Kali Linux Security Platform
- Security Architecture Documentation and Alternative Architectures
- Service Oriented Architecture (SOA) Governance
- Architectural Artifacts & the Enterprise Continuum
- Security Architecture
- Architecture Capability Basics
- Content Framework
- Enterprise Architecture Planning & Implementation
- Enterprise Architecture Basics
- Certified Information Systems Manager (CISM) bootcamp: Session 1 Replay
- Variables
- Provisioning and Modules
- Infrastructure
- Configurations
- Introduction to Automation
- Microsoft Azure Administrator: Import & Export Service
- Microsoft Azure Administrator: Role-based Access Control
- Microsoft Azure Administrator: ARM Templates
- Microsoft Azure Administrator: Cost Management
- Microsoft Azure Administrator: Policy & Resource Locking
- Microsoft Azure Administrator: Firewall Solutions
- Microsoft Azure Administrator: Virtual Machines
- Microsoft Azure Administrator: App Services
- Microsoft Azure Administrator: Application Containers
- Microsoft Azure Administrator: Business Continuity
- Microsoft Azure Administrator: Monitoring
- Microsoft Azure Administrator: Azure Files Shared Folders
- Microsoft Azure Administrator: Network Infrastructure Services
- Microsoft Azure Administrator: Network Connectivity
- Microsoft Azure Administrator: Azure AD User & Group Management
- Microsoft Azure Administrator: Subscriptions & AD Tenants
- Microsoft Azure Administrator: Authentication & Authorization
- Microsoft Azure Administrator: Management Groups & Resource Groups
- Microsoft Azure Administrator: Storage Account Access
- Microsoft Azure Administrator: Storage Account Blob Management
- CISM 2020: Detecting Security Anomalies
- CISM 2020: Managing IT Risk
- CISM 2020: TCP/IP Configuration
- CISM 2020: Network Infrastructure Security
- CISM 2020: IT Security Policies
- CISM 2020: Business Continuity
- CISM 2020: Server Roles
- CISM 2020: Identity & Access Management
- CISM 2020: Security Testing
- CISM 2020: Digital Forensics
- CISM 2020: Cryptography & PKI
- Cloud Security Administration: Continuous Operational Improvement
- Getting Started with Python: Introduction
- AWS Certified Machine Learning: Advanced SageMaker Functionality
- AWS Certified Machine Learning: Feature Engineering Overview
- Social Engineering & Related Attacks
- Microsoft Azure Security Technologies: Application Containers
- The Present Threat Landscape
- Microsoft Azure Security Technologies: VM Security
- Microsoft Azure Security Technologies: Azure Storage Account Security
- Microsoft Azure Security Technologies: Database User Access
- Microsoft Azure Security Technologies: VPNs
- Microsoft Azure Security Technologies: Azure Database Security
- Microsoft Azure Security Technologies: Network Security
- Microsoft Azure Security Technologies: Azure Security Center
- Microsoft Azure Security Technologies: Data Classification
- Microsoft Azure Security Technologies Bootcamp: Session 2 Replay
- Microsoft Azure Security Technologies Bootcamp: Session 3 Replay
- Microsoft Azure Security Technologies Bootcamp: Session 1 Replay
- Techniques & Tools
- Testing Approaches
- Agile Methodologies
- SECFND: Basic Networking Protocols
- Ethical Hacker: Social Engineering
- SECFND: Network Addressing
- Types of Malware
- Identity and Access Management (IAM)
- Top 10 List Items
- Communication & Network Security
- Ethical Hacker: Network Sniffing
- Ethical Hacker: Malware Distribution
- Ethical Hacker: Malware Threats
- Ethical Hacker: Covert Data Gathering
- Ethical Hacker: Hidden Files & Covering Tracks
- Ethical Hacker: Password Attacks
- Ethical Hacker: Password Attacks Part 2
- Ethical Hacker: Privilege Escalation
- Ethical Hacker: ProxyChains & Enumeration
- Ethical Hacker: Footprinting
- Ethical Hacker: Vulnerability Analysis Concepts & Tools
- Ethical Hacker: Host Discovery & Scanning with Nmap
- Ethical Hacker: Pentesting, Laws, & Standards
- Ethical Hacker: Overview & Threats
- Ethical Hacker: Hacking Concepts
- Ethical Hacker: Security Controls
- Ethical Hacker: Security Controls Part 2
- Cloud Security Administration: Regulatory Conformance
- Cloud Security Administration: Hardened Cloud Security
- Cloud Security Administration: Cloud Data & Application Security
- Cloud Security Administration: Introduction
- Cloud Security Administration: Infrastructure Planning
- Cloud Computing Fundamentals: Risk Management
- Cloud Computing Fundamentals: Security
- Cloud Computing Fundamentals: Presence & Privacy
- Cloud Security Fundamentals: Legal & Compliance
- Cloud Security Fundamentals: Cloud Data Security
- Cloud Security Fundamentals: Cloud Application Security
- Cloud Security Fundamentals: Cloud Infrastructure Security
- Cloud Security Fundamentals: Basics of Cloud Operations
- Cloud Security Fundamentals: Architectural & Design Concepts
- CCSP 2019: Application Development & Security
- CCSP 2019: Implementing Data Discovery & Classification
- CCSP 2019: Operational Controls & Standards
- CCSP 2019: Identity & Access Management
- CCSP 2019: Managing & Securing Cloud Infrastructure
- CCSP 2019: Data Center Security
- CCSP 2019: Cloud Infrastructure
- CCSP 2019: Cloud System Architecture Design
- CCSP 2019: Secure Cloud Computing
- CCSP 2019: Data Security Technologies
- CCSP 2019: Data Retention & Events
- Pen Testing for Software Development: Penetration Testing SDLC, Team Structure, & Web Services
- Gavin Fellows's Transcript
- Gavin Fellows's Wallet
- About Accredible