Site Map - skillsoft.digitalbadges.skillsoft.com
- User Authentication
- Iftekhar Chowdhury's Credentials
- Iftekhar Chowdhury's Wallet
- CompTIA Security+: Threat Actors, Intelligence Sources, & Vulnerabilities
- CompTIA Security+: Security Assessment & Penetration Testing Techniques
- CompTIA Security+: Analyzing Application & Network Attacks
- CompTIA Security+: Social Engineering Techniques & Other Attack Types
- CompTIA Cybersecurity Analyst+: Intrusion Detection & Traffic Analysis
- CompTIA Cybersecurity Analyst+: IT Security Risk Mitigation
- CompTIA Cybersecurity Analyst+: Network Scanning & Traffic Analysis
- CISSP 2021: Risk Management
- CompTIA Cybersecurity Analyst+: Encryption & Hashing
- CompTIA Cybersecurity Analyst+: Network Infrastructure Security
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Testing Types
- CompTIA Cybersecurity Analyst+: Attack Types
- CompTIA Cybersecurity Analyst+: Data Privacy
- Information Security Governance Part I
- CompTIA Cybersecurity Analyst+: Software Development Security
- CompTIA Cybersecurity Analyst+: User Account Security
- CompTIA Cybersecurity Analyst+: Threat Monitoring
- CompTIA Cybersecurity Analyst+: Digital Forensics
- Communication & Network Security
- CompTIA Cybersecurity Analyst+: Malware Threats
- CompTIA Cybersecurity Analyst+: Business Continuity
- CompTIA Cybersecurity Analyst+: Hardware & Security
- CompTIA Cybersecurity Analyst+: Cloud Computing
- CompTIA Cybersecurity Analyst+: Threat Intelligence
- Positive Atmosphere: Establishing a Positive Work Environment
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Secure Design Principles
- CISSP 2021: Identity and Access Management Principles
- CISSP 2021: Security Assessment & Testing
- CISSP 2021: Security Policy
- CISSP 2021: Security Governance Principles
- CISSP 2021: Fundamental Concepts & Principles
- CISSP 2021: Software Development Security
- CISSP 2021: Secure Design Principles
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Technologies
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Architectural Risk & Modeling
- Cybersecurity Awareness: Information Security Fundamentals
- An Executive's Guide to Security: Understanding Security Threats
- Governance and Policy
- Secure Application and Data Architecture Design
- Frameworks, Life Cycles, and Architecture
- Security Architecture Documentation and Alternative Architectures
- Access Control and Security Architecture Design
- Cybersecurity Awareness: Getting Started with Security Foundations
- Secure Programmer: Attacks
- Microsoft Security: Compliance Concepts & Methodologies
- Defensive Programmer: Defensive Techniques
- Microsoft Security: Basic Azure AD Identity Services & Types
- Microsoft Security: Microsoft 365 Insider Risk, eDiscovery, & Auditing
- Microsoft Security: Compliance, Information Protection, & Governance
- Security Programming: Command Line Essentials
- Microsoft Security: Microsoft 365 Security & Security Management
- Microsoft Security: Azure AD Authentication, Access, & Identity
- Introduction to Cyber Operations
- Ethical Hacker: Overview & Threats
- HTML5 with JavaScript & CSS3: Data Flow, Consuming, & Transmitting Data
- Microsoft Security: Azure Security Capabilities & Management
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Security Architecture
- SCOR: Security Basics & Common Threats
- SSCP 2021: Business Continuity Planning
- SSCP 2021: \nNetwork Attacks & Countermeasures
- Defensive Programmer: Defensive Concepts
- Security Incident Triage
- Security Software Assessments
- Secure Programmer: Coding Practices
- Secure Programmer: Software Modeling Techniques
- Secure Programmer: Software Design Techniques
- Security Architecture
- Network Hardening, Network Segmentation, and Secure Connections
- Incident Response, Backup and Recovery Strategies, and Documentation
- Public Key Infrastructure and Certificate Distribution
- Software Engineering, Security and Vulnerabilities
- Legal Considerations and Cybercrime Investigations
- Securing Information using Cryptography
- Identity Management, Directory Services, and Federation
- Environment Monitoring, Retention, and Data Logging
- Physical Security, Safety Procedures, and Access Control
- Fundamentals of Malware Analysis and Remediation
- Systems Hardening
- Network Discovery Tools and Techniques
- Malware Analysis
- Vulnerabilities, Systems Scanning and Exploitation
- Social Engineering Threats and Prevention
- Cybersecurity Awareness and Threat Vectors
- Discovery and Attack Vectors
- Trends in Cybersecurity
- Cybersecurity and Networking Fundamentals
- Application Security in .NET
- Secure Programmer: Intro to Programming Standards
- Secure Programmer: Security Concepts
- .NET Development with Visual Studio
- Introduction to Secure Programming
- Introduction to ASP.NET Core 1.0
- SSCP 2021: Asset & Change Management Lifecycles
- SSCP 2021: Basic Security Concepts
- SSCP 2021: Security Controls
- VBA: Leveraging VBA to Work with Charts, Stocks, & MS Access
- SSCP 2021: Malware & Countermeasures
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Threat Modeling
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Privacy
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Abuse Cases & RTMs
- VBA: Getting Started with VBA in Excel
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Data Classification
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Core Concepts
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Security Design Principles
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Security Requirements
- Application Security Awareness & Validation
- Software Development Security & Life Cycle
- Iftekhar Chowdhury's Transcript
- Iftekhar Chowdhury's Wallet
- About Accredible