Site Map - skillsoft.digitalbadges.skillsoft.com
- User Authentication
- Geronimo Tomas Santacruz's Credentials
- Geronimo Tomas Santacruz's Wallet
- ChatGPT Prompt Engineering Examples & Use Cases
- Generative AI APIs for Practical Applications: An Introduction
- Artificial Intelligence and Machine Learning
- The Language of DevOps: DevOps Principles & Practices
- DevOps Mindset: Understanding DevOps Tools
- DevOps Mindset: DevOps Principles & Implementation Approach
- Developing Solutions for Microsoft Azure: Implementing User Authentication & Authorization
- Developing Solutions for Microsoft Azure: Blob Storage
- Developing Solutions for Microsoft Azure: Development with Cosmos DB
- Developing Solutions for Microsoft Azure: Managing IaaS
- Developing Solutions for Microsoft Azure: Implementing Azure Functions
- Developing Solutions for Microsoft Azure: Azure App Service Web Apps
- Developing Solutions for Microsoft Azure: Implementing IaaS Solutions
- SecOps Engineer: Threat Mitigation
- Final Exam: SecOps Engineer
- SecOps Engineer
- Penetration Tester to SecOps Engineer
- SecOps Engineer: Cloud & IoT security
- SecOps Engineer: Security Engineering
- SecOps Engineer: Secure Coding
- SecOps Engineer: System Infrastructure Security
- Final Exam: Ethical Hacker
- Ethical Hacker
- Ethical Hacker: Secure Technology & Applications
- Ethical Hacker: Account Creation
- Ethical Hacker: Security Standards
- Ethical Hacker: Incident Response
- Ethical Hacker: Risk Assessment
- Incident Response Leader
- Regulation Conformance for Incidence Response
- Final Exam: Incident Response Leader
- Patch Management Strategies
- Monitoring & Securing System Configuration
- Security Best Practices: Network Appliance Security
- Preemptive Troubleshooting: Concepts & Strategies
- Planning Measures: Incident Response Planning
- Policy & Governance: Incident Response
- Penetration Tester
- Advanced Pen Testing Techniques
- Final Exam: Penetration Tester
- PenTesting for Physical Security
- Wi-Fi Penetration Testing
- Pen Testing: End-user Behavior
- Security Measures: Implementing Security Controls
- Pen Testing Awareness: Results Management
- Penetration Testing Fundamentals
- Threat Intelligence & Attribution Best Practices: Threat Intelligence Concepts
- Threat Intelligence & Attribution Best Practices: Attribution Analysis
- CyberOps Windows Hardening: Windows Server Hardening Best Practices
- CyberOps Windows Hardening: Windows Workstation Hardening Best Practices
- Final Exam: Security Threat Intelligence
- Security Threat Intelligence
- Security Threat Intelligence
- Forensic Analysis: Cybercrime Investigations
- Network & Host Analysis: Network Operations
- Network & Host Analysis: Network Analysis Formats
- Network & Host Analysis: Network Observations
- Network & Host Analysis: Network Protocols
- Network & Host Analysis: Protocol Analysis
- Network Survey & Extraction: Network Analysis
- Network Survey & Extraction: Network Monitoring
- Malware Removal: Reporting Findings & Preventing Future Infections
- Malware Removal: Remediating an Infected System
- Malware Removal: Analyzing an Infected System
- Malware Removal: Identifying Malware Types and Classification Approaches
- Security Programming: System Essentials
- Security Programming: Scripting Essentials
- Security Programming: Code Identification
- Security Programming: Command Line Essentials
- Introduction to CyberOps
- Secure Application Architecture & IAM
- Top 10 List Items
- Application Security Awareness & Validation
- API Security
- An Executive's Guide to Security: Understanding Security Threats
- Ruby Full Stack Development: Threads & Security
- Ruby Full Stack Development: Unit Testing & Behavior Driven Development
- Ethical Hacker: Security Controls
- Ethical Hacker: Hacking Concepts
- Ethical Hacker: Overview & Threats
- IP Addressing
- Ruby Full Stack Development: RegEx & I/O with Ruby
- Ruby Full Stack Development: Object-Oriented Programming
- Ruby Full Stack Development: Flow Control & Data Types
- Ruby Full Stack Development: Introduction
- Getting Started with Python: Introduction
- Concepts & Characteristics of Networking
- Ports, Protocols, & the OSI Model
- Functions in Go
- Go Language Basics
- Azure Fundamentals: Network Components
- Azure Fundamentals: Cloud Computing
- Geronimo Tomas Santacruz's Transcript
- Geronimo Tomas Santacruz's Wallet
- About Accredible