Site Map - skillsoft.digitalbadges.skillsoft.com
- User Authentication
- John Macasio's Credentials
- John Macasio's Wallet
- Cloud Security Management: Operations Security
- Cloud Security Management: Platform & Infrastructure Security
- Cloud Security Management: Architecture Security
- Cloud Security Fundamentals: Cloud Data Security
- Cloud Security Fundamentals: Cloud Application Security
- Cloud Security Fundamentals: Legal & Compliance
- Cloud Security Fundamentals: Architectural & Design Concepts
- Cloud Security Fundamentals: Cloud Infrastructure Security
- Cloud Security Fundamentals: Basics of Cloud Operations
- End-User Security: The End-User Perspective
- Session & Risk Management
- Security Architecture
- Security Architecture Documentation and Alternative Architectures
- Frameworks, Life Cycles, and Architecture
- Access Control and Security Architecture Design
- Exploring SecOps Tools: Network Scanning Using Nmap
- Information Security for Leaders: Elements of InfoSec
- Information Security for Leaders: Elements of an InfoSec Team
- Security Architecture
- Secure Application and Data Architecture Design
- CRISC 2023: Cryptography
- CRISC 2023: Authorization
- CRISC 2023: Authentication
- CRISC 2023: Public Key Infrastructure
- CRISC 2023: Network Security
- Ethical, Privacy, & Intellectual Property Considerations for ChatGPT
- CRISC 2023: Risk Management
- CRISC 2023: Data Classification
- CRISC 2023: Data Privacy
- CRISC 2023: IT Governance
- CRISC 2023: IT Baselines
- CRISC 2023: Security Controls
- Enterprise Security: Leveraging Generative AI with Common Security Tools
- Prompt Engineering: Mobile Platform Security in the GenAI Era
- Enterprise Security: Leveraging AI in Identity Security
- Prompt Engineering: Generative AI for Reconnaissance
- Prompt Engineering: Generative AI for Malware & Social Engineering
- SecOps Tools: The Role of AI in SecOps
- Prompt Engineering: Ethical Hacking & Generative AI Fusion
- Prompt Engineering: Generative AI for System Hacking
- Enterprise Security: Artificial Intelligence, Generative AI, & Cybersecurity
- Ansible for DevOps: Practical Uses of Ansible
- Chef for DevOps: The Basics of Chef
- Jenkins for DevOps: The Basics of Jenkins
- Jenkins for DevOps: Practical Uses of Jenkins
- Working with Containers: Introduction to Docker
- Working with Containers: Introduction to Kubernetes
- Final Exam: Core DevOps Skills
- Track 1: Core DevOps Skills
- Core DevOps Skills: Continuous Principles
- Core DevOps Skills: Case Studies in DevOps
- Working with Containers: Container Theory & Operational Models
- Core DevOps Skills: Moving toward DevOps
- Core DevOps Skills: DevOps Principles & Practices
- Core DevOps Skills: Agile & DevOps
- Track 3: Mitigating Security Risks
- Security Essentials for Decision-makers and Leaders
- Mitigating Security Risks: Maintaining a Secure Workplace
- Mitigating Security Risks: Managing Security in a Hybrid Workplace
- Mitigating Security Risks: Managing Risks from Internal Stakeholders
- Mitigating Security Risks: Handling Natural Threats
- Mitigating Security Risks: Maintaining Business Continuity
- Final Exam: Mitigating Security Risks
- Mitigating Security Risks: Managing Information, Cloud, & Data Security Risks
- Mitigating Security Risks: Cyber Security Risks
- Mitigating Security Risks: Information, Cloud, & Data Security Risk Considerations
- Mitigating Security Risks: Managing Social Engineering Risks
- Track 1: Becoming Security Aware
- Track 2: Evaluating and Planning for Security Risks
- Cybersecurity Awareness: Exposure to Security Risks
- Mitigating Security Risks: Managing Network & Infrastructure Security Risks
- Final Exam: Becoming Security Aware
- Mitigating Security Risks: Managing Physical Security Risks
- Security Risks: Planning for Security Risk Management
- Final Exam: Evaluating and Planning for Security Risks
- Security Risks: Performing Security Risk Assessments
- Cybersecurity Awareness: Information Security Fundamentals
- Cybersecurity Awareness: Key Security Terms & Concepts
- Cybersecurity Awareness: Getting Started with Security Foundations
- Mitigating Security Risks: Managing the Incidents
- Security Risks: Key Risk Terms & Concepts
- Security Risks: Performing Security Risk Identification
- Mitigating Security Risks: Information Security Governance
- Best Practices for Digital Transformation
- Exploring SecOps Tools: Web Application Hardening via Burp Suite
- CCSP February 2023 Bootcamp: Session 2 Replay
- CCSP February 2023 Bootcamp: Session 3 Replay
- CCSP February 2023 Bootcamp: Session 1 Replay
- SecOps Tools and 2021 Security Incidents: Colonial Pipeline
- SecOps Tools and 2021 Security Incidents: JBS Ransomware Attack
- SecOps Tools and 2021 Security Incidents: Kaseya Ransomware Attack
- SecOps Tools and 2021 Security Incidents: Facebook Data Breach
- SecOps Tools and 2021 Security Incidents: Log4Shell Exploit
- SecOps Tool Landscape: Intro to Security Tools (SecTools)
- SecOps Tool Landscape: The Kali Linux Security Platform
- CISSP February 2023 Bootcamp: Session 5 Replay
- SecOps Tools and 2021 Security Incidents: Microsoft Exchange Server Data Breach
- Track 4: Agile Organization
- Agile for Software Development
- Agile Organizations: Building an Agile Culture
- Agile Key Exam Concepts
- Final Exam: Agile Organization
- Agile Organizations: Agile Models & Scaling Agile
- Agile Organizations: DevOps & Agile
- Agile Organizations: Cloud for Agile Software Development
- Track 3: Software Development & Testing with Agile
- Development & Testing with Agile: Agile Self-organizing Teams
- Development & Testing with Agile: Team Meetings
- Development & Testing with Agile: Project Management
- Final Exam: Software Development and Testing with Agile
- CISSP February 2023 Bootcamp: Session 4 Replay
- Development & Testing with Agile: Agile Methodologies in Software Development
- Development & Testing with Agile: Extreme Programming
- Track 2: Software Requirements & Design with Agile
- Agile Software Projects: Estimation Methods
- Final Exam: Software Project Requirements & Design with Agile
- Agile Software Projects: Software Design
- Track 1: Agile Foundations
- Agile Foundations: Scrum Methodology
- Final Exam: Agile Foundations
- Creating & Setting Up Projects in Jira Cloud
- Configuring & Managing Boards in Jira Cloud
- Planning & Working on a Software Project in Jira Cloud
- Reporting in Jira Software
- CISSP February 2023 Bootcamp: Session 3 Replay
- Agile Software Projects: Software Requirements
- Agile Software Development: Agile Project Management Techniques
- CISSP February 2023 Bootcamp: Session 2 Replay
- CISSP February 2023 Bootcamp: Session 1 Replay
- Agile Foundations: Fundamentals
- Agile Software Development: Agile Development Life Cycle
- Agile Fundamentals: Backlog, Impediments, Releases, and Agile in the Organization
- Agile Fundamentals: User Stories and the Iteration and Release Plan
- Advanced Agile: Tools & Techniques
- Agile Fundamentals: Stakeholders, Success Criteria, Users, and the Agile Team
- Data Science for Managers Bootcamp: Session 2 Replay
- Data Science for Managers Bootcamp: Session 4 Replay
- Data Science for Managers Bootcamp: Session 3 Replay
- Advanced Agile: Leadership Techniques
- Agile Fundamentals: Developing a Basic Understanding of Agile
- Agile Fundamentals: Project Risk, Communication, and Iteration Planning
- Data Science for Managers Bootcamp: Session 1 Replay
- Exploring and setting up Microsoft Teams 2021
- Managing teams & channels in Teams 2022
- How to be successful in your Digital Transformation: Closing the Knowing-Doing Gap: Session Replay
- Understanding the Digital Customer
- Leadership Insights on Leading in the Digital Era
- Leading in the Digital Era
- Google Cloud Architect: CLI Cloud Resource Management
- Google Cloud Architect: Troubleshooting
- The BA Planning and Monitoring Knowledge Area
- Google Cloud Architect: Solution Management & Testing
- Google Cloud Architect: Cloud Basics
- Google Cloud Architect: Virtual Machine Configuration
- Google Cloud Architect: Security
- Google Cloud Architect: Network Components
- Google Cloud Architect: Identity Management
- Google Cloud Architect: Data Storage
- Google Cloud Architect: Cloud Design
- Google Cloud Architect: Web Applications & Name Resolution
- Google Cloud Architect: Virtual Machine Deployment
- Google Cloud Architect: Programmatic Access
- Google Cloud Architect: Monitoring & Logging
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Secure Design Principles
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Technologies
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Secure Coding Practices
- CompTIA Cybersecurity Analyst+: Threat Intelligence
- CompTIA Cybersecurity Analyst+: Business Continuity
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Threat Modeling
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Data Classification
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Security Architecture
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Architectural Risk & Modeling
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Security Requirements
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Privacy
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Abuse Cases & RTMs
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Security Design Principles
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Governance, Risk, and Compliance
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Core Concepts
- Managing Project Risks (2021 Update)
- Leading the Team (2021 Update)
- Performing Risk Analysis (2021 Update)
- Defining and Identifying Project Risk (2021 Update)
- Building and Training the Project Team (2021 Update)
- Communicating Effectively (2021 Update)
- Engaging Team Members and Stakeholders (2021 Update)
- Exploring Project Management, Then and Now (2021 Update)
- Supporting Agile Team Performance (2021 Update)
- Implementation
- Selecting a Project Management Approach (2021 Update)
- Engaging Stakeholders (2021 Update)
- Architecture & Enterprise Governance
- Stakeholder Needs & Framework Integration
- Principles
- Ethical Hacker: Social Engineering
- Ethical Hacker: Network Sniffing
- Ethical Hacker: Malware Distribution
- Ethical Hacker: Malware Threats
- Ethical Hacker: Hidden Files & Covering Tracks
- Ethical Hacker: ProxyChains & Enumeration
- Ethical Hacker: Privilege Escalation
- Ethical Hacker: Covert Data Gathering
- Ethical Hacker: Pentesting, Laws, & Standards
- Security Architect: Ethical Hacking Best Practices
- PRINCE2® Project Management Overview (2017 Update)
- Ethical Hacker: Password Attacks
- Ethical Hacker: Password Attacks Part 2
- Ethical Hacker: Footprinting
- Ethical Hacker: Vulnerability Analysis Concepts & Tools
- Ethical Hacker: Host Discovery & Scanning with Nmap
- Ethical Hacker: Overview & Threats
- Ethical Hacker: Hacking Concepts
- Knowing When to Take Strategic Risks
- Ethical Hacker: Security Controls
- Ethical Hacker: Security Controls Part 2
- Rethinking Business Models to Enable Digital Transformation
- Working with Data for Effective Decision Making
- Motivating Action with a Compelling and Data-driven Story
- Framing Opportunities for Effective Data-driven Decision Making
- Preparing Impactful Presentations that Drive Decision Makers to Action
- Positioning Powerful Messages to Enable Action
- Harnessing the Benefits of Platform as a Service
- Define and Sequence Activities (PMBOK® Guide Sixth Edition)
- Validate and Control Scope (PMBOK® Guide Sixth Edition)
- Develop the Project Schedule (PMBOK® Guide Sixth Edition)
- Plan and Define Project Scope (PMBOK® Guide Sixth Edition)
- Create Work Breakdown Structure (PMBOK® Guide Sixth Edition)
- Agile Project Scheduling and Monitoring
- Certified Information Systems Auditor (CISA) 2019: IT Management Frameworks
- Certified Information Systems Auditor (CISA) 2019: Information System Auditing
- CISM 2020: Identity & Access Management
- CISM 2020: Server Roles
- CISM 2020: IT Security Policies
- CISM 2020: Security Testing
- CISM 2020: Detecting Security Anomalies
- CISM 2020: Business Continuity
- CISM 2020: Digital Forensics
- Certified Information Systems Auditor (CISA) 2019: Data Privacy & Risk
- Security Architecture and Engineering
- Software Development Security
- Data Security Breach Notification Process
- Risk Management, Privacy, & Sensitive Data Security
- CISM 2020: TCP/IP Configuration
- CISM 2020: Network Infrastructure Security
- Project Changes and Closing (PMBOK® Guide Sixth Edition)
- Cryptographic Client-based Systems
- Vulnerability Assessment & Mitigation
- Security Assessment & Testing
- Communication & Network Security
- Site & Facility Security Controls
- Monitoring & Reporting
- Identity and Access Management (IAM)
- ITIL® 4 Foundation: The Service Value Chain
- ITIL® 4 Foundation: Key Concepts of Service Management
- Azure Fundamentals: Azure Data Privacy
- Managing Project Work<br/>(PMBOK® Guide Sixth Edition)
- Project Initiation and Planning (PMBOK® Guide Sixth Edition)
- ITIL® 4 Foundation: Key Concepts
- Azure Fundamentals: Cloud Computing
- AWS Cloud Practitioner 2020: Cloud Architecture Design Principles
- AWS Cloud Practitioner 2020: Security Support Resources
- AWS Cloud Practitioner 2020: Cloud Deployment & Operation
- AWS Cloud Practitioner 2020: Core Services
- AWS Cloud Practitioner 2020: Technology Support Resources
- AWS Cloud Practitioner 2020: Cloud and the Value Proposition
- AWS Cloud Practitioner 2020: Cloud Economics
- CISSP: Risk Management
- CompTIA Security+: Organizational Security Assessment Tools & Mitigation Controls
- Planning Measures: Incident Response Planning
- CompTIA Security+: Security Policies, Regulations, Standards, & Frameworks
- CompTIA Cybersecurity Analyst+: Data Privacy
- Policy & Governance: Incident Response
- AWS Cloud Practitioner 2019: Cloud Security & Compliance
- (ISC)² & Security Fundamentals
- AWS Cloud Practitioner 2020: Access Management
- Agile Stakeholder Engagement and Team Development
- Agile Project Planning
- Agile Principles and Methodologies
- Conducting Incident Management
- Guiding the Analysis for Effective Data-driven Decision Making
- Security Operations
- Information Security Incident Management Part I
- Information Security Incident Management Part II
- Data Driven Organizations
- CISSP: Security
- Making Data-driven Decisions
- Technology Landscape & Tools for Data Management
- SCOR: Security Models & Frameworks
- ITIL® 4 Foundation: Service Management Practices (Part 2)
- ITIL® 4 Foundation: General Management Practices
- ITIL® 4 Foundation: The Service Value System
- ITIL® 4 Foundation: Service Management Practices (Part 1)
- ITIL® 4 Foundation: The Guiding Principles
- ITIL® 4 Foundation: Introduction
- The Process Groups (PMBOK® Guide Sixth Edition)
- CISM 2020: Information Security & Business Process Alignment
- CISM 2020: Cryptography & PKI
- CISM 2020: Managing IT Risk
- Project Fundamentals (PMBOK® Guide Sixth Edition)
- Business Analysis Overview
- An Executive's Guide to Security: Understanding Security Threats
- Information Risk Management Part II
- Information Risk Management Part I
- Best Practices for Digital Transformation
- Information Security Governance Part II
- Information Security Governance Part I
- John Macasio's Transcript
- John Macasio's Wallet
- About Accredible