Site Map - skillsoft.digitalbadges.skillsoft.com
- User Authentication
- Jay Heinrich Triol's Credentials
- Jay Heinrich Triol's Wallet
- Generative AI APIs for Practical Applications: An Introduction
- Artificial Intelligence and Machine Learning
- OWASP Top 10: Securing Web Applications
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Secure Software Testing
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Threat Modeling
- CCSP 2019: Application Development & Security
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Secure Design Principles
- CISSP: Risk Management
- Application Security Awareness & Validation
- OWASP Top 10: A05:2021-Security Misconfiguration
- OWASP Top 10: A06:2021-Vulnerable & Outdated Components
- OWASP Top 10: A07:2021-Identification & Authentication Failures
- OWASP Top 10: A09:2021-Security Logging & Monitoring Failures
- OWASP Top 10: A08:2021-Software & Data Integrity Failures
- OWASP Top 10: A10:2021-Server-Side Request Forgery (SSRF)
- OWASP Overview
- OWASP Top 10: A01:2021-Broken Access Control
- OWASP Top 10: A02:2021-Cryptographic Failures
- OWASP Top 10: A03:2021-Injection
- OWASP Top 10: A04:2021-Insecure Design
- Policies, Plans, & Procedures
- Business Impact Analysis & Risk Management
- Secure System, Application Design, & Deployment
- Incident Response, Forensics, Recovery, & Security Controls
- Cloud Computing, Virtualization, & Resiliency
- Identity & Access Services
- Frameworks, Guidelines, & Physical Security
- Identity & Access Management Controls
- Implementing a Secure Network Architecture
- Common Account Management Practices
- CompTIA Security+: Cryptography
- Troubleshooting Common Security Issues
- Implementing Secure Protocols
- Analyzing Output from Security Technologies
- Public Key Infrastructure
- Wireless Security Settings
- Deploying Mobile Devices Securely
- Components Supporting Organizational Security
- Security Assessment Using Software Tools
- Impacts from Vulnerability Types
- Cryptographic & Wireless Attacks
- Types of Malware
- The Present Threat Landscape
- Application & Service Attacks
- Social Engineering & Related Attacks
- Penetration Testing & Vulnerability Scanning
- Jay Heinrich Triol's Transcript
- Jay Heinrich Triol's Wallet
- About Accredible