Site Map - skillsoft.digitalbadges.skillsoft.com
- User Authentication
- Giovanni Pironti's Credentials
- Giovanni Pironti's Wallet
- CompTIA Cloud+: Cloud Automation & Orchestration
- CompTIA Cloud+: Cloud Disaster Recovery
- CompTIA Cloud+: Troubleshooting Cloud Deployments
- CompTIA Cloud+: Cloud Troubleshooting Methodologies
- CompTIA Cloud+: Troubleshooting Cloud Security Issues
- CompTIA Cloud+: Provisioning Cloud Storage
- CompTIA Cloud+: Cloud Network Deployments
- CompTIA Cloud+: Cloud Migrations
- CompTIA Cloud+: Cloud Logging, Monitoring, Alerting & Optimization
- CompTIA Cloud+: Cloud Operations Management
- CompTIA Cloud+: Cloud Security Controls
- CompTIA Cloud+: Data Security & Compliance Controls
- CompTIA Cloud+: Cloud Component Integration
- CompTIA Cloud+: Cloud Network Security
- CompTIA Cloud+: Cloud Identity & Access Management
- CompTIA Cloud+: Cloud Solution Design
- CompTIA Cloud+ : Cloud High Availability & Scaling
- CompTIA Cloud+: Cloud Capacity Planning
- CompTIA Cloud+: Cloud Architecture & Models
- Professional Cloud Security Engineer
- AWS Cloud Practitioner 2022: Access Management
- Microsoft Azure Fundamentals: Management Tools
- Microsoft Azure Architect Design: Azure Monitoring
- Microsoft Azure Security Technologies: Monitoring, Logging, & Alerts
- Microsoft Azure Architect Design: Azure Key Vault and Key Design
- Implementations with BigQuery for Big Data
- Enterprise Services: Machine Learning Implementation on Google Cloud Platform
- DevOps Support Administrator: Exploring Cloud Service Models
- GCP Engineering & Streaming Architecture
- Storage Solutions
- Container, Compute, & App Engine
- Fundamentals of BigQuery
- Serverless Applications in the Cloud: Implementation Using Cloud Run
- Cloud Platform Security: Incident Response & Remediation
- DevOps Cloud Automation: DevOps with Google Cloud Platform
- Deeper through GCP Analytics & Scaling
- Cloud Data Platforms: AWS, Azure, & GCP Comparison
- GCP Network Data Processing Models
- DevOps Pipelines: Configuring a GCP Pipeline
- The DevOps Deployment Pipeline: Pipeline Implementation Using GCP
- Serverless App Development: Implementation in Google Cloud Platform
- Serverless App Development: Implementation with Google App Engine
- Serverless App Development: Applications with Google Cloud Functions
- Google Associate Cloud Engineer: Managing Google Kubernetes Engine
- GCP DevOps: CloudOps with Google Cloud Platform
- Google Associate Cloud Engineer: Implementing Google App Engine
- Google Associate Cloud Engineer: Google Cloud Load Balancing
- Google Associate Cloud Engineer: Implementing Google Compute Engine
- CloudOps with Google Cloud Platform Tools
- Ethics and Project Management
- Google Cloud Architect: Web Applications & Name Resolution
- Quality Validation & Project Management
- Professional Cloud Architect
- Ethical Hacker: Security Standards
- Ethical Hacker: Risk Assessment
- Ethical Hacker: Incident Response
- Ethical Hacker: Account Creation
- Ethical Hacker: Secure Technology & Applications
- Ethical Hacker: Cryptography Concepts Part 3
- Ethical Hacker: Cryptography Attacks
- Ethical Hacker: Cloud Computer Attacks
- Ethical Hacker: Cryptography Concepts
- Ethical Hacker: Cryptography Concepts Part 2
- Ethical Hacker: IoT Attacks
- Ethical Hacker: IoT Hacking & Countermeasures
- Ethical Hacker: Cloud Computing Concepts
- Ethical Hacker: Cracking & Mobile Hacking
- Ethical Hacker: IoT Concepts
- Ethical Hacker: Wireless Hacking Common Threats
- Ethical Hacker: Wireless Hacking Tools
- Ethical Hacker: Wireless Hacking Concepts
- Ethical Hacker: SQL Injection
- Ethical Hacker: SQL Injection Types & Tools
- Ethical Hacker: Practical Web App Hacking
- Ethical Hacker: Common Web App Threats Part 2
- Ethical Hacker: Common Web App Threats
- Ethical Hacker: Hacking Web Servers
- Ethical Hacker: Evading IDS, Firewall, & Honeypots Part 2
- Ethical Hacker: Evading IDS, Firewall, & Honeypots Part 3
- Ethical Hacker: Evading IDS, Firewall, & Honeypots
- Ethical Hacker: Session Hijacking
- Ethical Hacker: Social Engineering
- Ethical Hacker: Denial of Service
- Ethical Hacker: Network Sniffing
- Ethical Hacker: Malware Distribution
- Ethical Hacker: Malware Threats
- Ethical Hacker: Privilege Escalation
- Ethical Hacker: Covert Data Gathering
- Ethical Hacker: Hidden Files & Covering Tracks
- Ethical Hacker: Password Attacks Part 2
- Ethical Hacker: Password Attacks
- Ethical Hacker: ProxyChains & Enumeration
- Ethical Hacker: Vulnerability Analysis Concepts & Tools
- Ethical Hacker: Host Discovery & Scanning with Nmap
- Google Associate Cloud Engineer: Implementing Google Kubernetes Engine
- Google Associate Cloud Engineer: Managing Google App Engine
- Ethical Hacker: Footprinting
- Ethical Hacker: Pentesting, Laws, & Standards
- Ethical Hacker: Security Controls Part 2
- Ethical Hacker: Overview & Threats
- Ethical Hacker: Hacking Concepts
- Ethical Hacker: Security Controls
- Cloud Data Platforms: Cloud Computing
- Managing Your Time So It Doesn’t Manage You
- Information Asset Security
- Google Associate Cloud Engineer: Google Cloud Platform Ecosystem
- Google Associate Cloud Engineer: Configuring Google Cloud
- Google Associate Cloud Engineer: Google Cloud Resource Manager
- Google Associate Cloud Engineer: Managing Google Compute Engine
- Cloud Services: Cloud Computing Concepts
- CCSP 2019: Cloud Infrastructure
- CCSP 2019: Cloud System Architecture Design
- Google Cloud Architect: CLI Cloud Resource Management
- Google Cloud Architect: Virtual Machine Configuration
- Google Cloud Architect: Troubleshooting
- Google Cloud Architect: Cloud Design
- Google Cloud Architect: Virtual Machine Deployment
- Google Cloud Architect: Monitoring & Logging
- Google Cloud Architect: Solution Management & Testing
- Storage & Analytics
- APIs & Machine Learning
- Google Associate Cloud Engineer: Implementing Google Cloud Storage
- Google Associate Cloud Engineer: Managing Google Cloud Storage
- Google Associate Cloud Engineer: Google Virtual Private Cloud
- Google Associate Cloud Engineer: Google Identity & Access Management (IAM)
- Google Associate Cloud Engineer: Google Cloud Operations Suite
- Dataproc
- Make The Time You Need: Get Organized
- Maximize Your Productivity by Managing Time and Tasks
- Expert Insights on Time Management
- Associate Cloud Engineer
- Network Components
- Data Storage
- Cloud Identity Management
- Cloud Security Administration: Hardened Cloud Security
- Running Kubernetes on Google Cloud Platform
- GCP Big Data & Security
- Programmatic Access
- Cloud Platform Security: System Monitoring & Protection
- Cloud Basics
- Cloud Platform Security: Designing Secure Access
- Platform Fundamentals
- Security
- Google Cloud: Getting Started
- Types of Malware
- Giovanni Pironti's Transcript
- Giovanni Pironti's Wallet
- About Accredible