Site Map - skillsoft.digitalbadges.skillsoft.com
- User Authentication
- Jordy Kalle's Credentials
- Jordy Kalle's Wallet
- CEH v12: Risk Management, Cyber Threat Intelligence, and Threat Modeling
- 511 Cyber Defense Analyst
- Basic: CEH
- Microsoft Azure Fundamentals: Managing the Microsoft Azure Hierarchy
- Microsoft Azure Fundamentals: Cloud Computing
- Microsoft Azure Fundamentals: Azure Management Tools
- Security Architect: Ethical Hacking Best Practices
- Security Rules: Rules of Engagement
- Claroty Technical Sales Professional - IND
- Claroty Implementation Engineer - IND
- Claroty Sales Professional
- Claroty Implementation Engineer - Healthcare
- CISSP 2024: Implement Disaster Recovery
- CGI Annual Tour F2025
- Claroty Technical Sales Professional - Healthcare
- An Executive's Guide to Security: Understanding Security Threats
- Business Continuity Programs
- CEH v12: Hacking Methodology, MITRE ATT&CK Framework, and Diamond Model
- CEH v12: Footprinting, Google Dorks, Search Engines, and Subdomains
- CEH v12: Footprinting and Social Engineering Recon and Countermeasures
- CEH v12: NTP, NFS, SMTP, and FTP Enumeration
- CEH v12: Scan Optimization, OS Identification, and IDS/Firewall Evasion
- CEH v12: NetBIOS, SMB, SNMP, and LDAP Enumeration
- CEH v12: Vulnerability Assessment Types, Models, Tools, and Reports
- CEH v12: Steganography and Avoiding Detection
- CEH v12: Buffer Overflows, Privilege Escalation, and System Access
- CEH v12: Passwords Attacks, Extraction, and Cracking
- CEH v12: Malware, Threats, Trojans, and Viruses
- CEH v12: Windows Authentication
- CEH v12: Fileless Malware, Malware Analysis, and Countermeasures
- CEH v12: Hijacking Concepts and Countermeasures
- CEH v12: DoS, DDoS, Volumetric, and Protocol Attacks
- CEH v12: Web Server Hacking, Attacks, and Attack Methodologies
- CEH v12: IDOR Attacks, File Inclusion Attacks, Web APIs, and Webhooks
- CEH v12: Web App Hacking Methodology, CSRF Attacks, and Input Filter Evasion
- CEH v12: Web Application Attacks and Vulnerabilities
- CEH v12: SQL Injection Concepts and Attacks
- CEH v12: IoT Threats, Vulnerabilities, Attack Tools, and Countermeasures
- CEH v12: SQL Injection and SQLMap
- CEH v12: Cryptography, Algorithms, Implementations, and Tools
- CEH v12: Wireless Hacking and Countermeasures
- CEH v12: Mobile Hacking, OS Security, and Device Management
- CEH v12: Wireless Concepts, Threats, and Hacking Tools
- CEH v12: Recon Tools and Tactics
- CEH v12: Network Scanning, TCP, Host Discovery, and Port/Service Scanning
- CEH v12: Nmap IDLE IPID, UDP, and SCTP Scans
- CEH v12: Nmap TCP Scans
- CEH v12: Vulnerability Assessment, Management, and Classification
- CEH v12: AD Enumeration, Mimikatz, and Pivoting Techniques
- CEH v12: Sniffing and Poisoning
- CEH v12: App Layer Attacks, Botnets, and DoS Countermeasures
- CEH v12: Cyber Kill Chain, TTPs, Behaviors, and Threat Hunting
- CEH v12: Incident Management, ML, AI, and Regulations
- CEH v12: Cybersecurity Concepts, Attacks, and Information Warfare
- CEH v12: Social Engineering, Insider Threats, and Identity Theft
- CEH v12: Intrusion Detection and Prevention, Firewalls, and Honeypots
- CEH v12: Cloud Computing, Containers, Hacking, and Security Controls
- CEH v12: PKI, Cryptanalysis, and Attack Countermeasures
- CEH v12: Operational Technology Concepts, Attack Tools, and Countermeasures
- Windows Exploits and Forensics: Intelligence Gathering
- Vulnerability Analyst
- Authentication & Encryption: Best Practices
- Incident Tracking & Response
- Security Vulnerabilities: Managing Threats & Vulnerabilities
- Security Architect: Secure Coding Concepts
- Defensible Security
- Intrusion Detection: Best Practices
- Intrusion Prevention: Best Practices
- Security Topologies: Developing Secure Networks
- Final Exam: Vulnerability Analyst
- Generative AI and Its Impact to Everyday Business
- Establishing AI Guardrails and Governance
- Security Threat Intelligence
- Security Threat Intelligence
- Final Exam: Security Threat Intelligence
- The Art of Staying Focused
- Forensic Analysis: Cybercrime Investigations
- Network & Host Analysis: Network Operations
- Network & Host Analysis: Network Analysis Formats
- Malware Removal: Reporting Findings & Preventing Future Infections
- Threat Intelligence & Attribution Best Practices: Threat Intelligence Concepts
- Malware Removal: Remediating an Infected System
- Malware Removal: Analyzing an Infected System
- Network & Host Analysis: Network Protocols
- Threat Intelligence & Attribution Best Practices: Attribution Analysis
- CyberOps Windows Hardening: Windows Workstation Hardening Best Practices
- Network & Host Analysis: Protocol Analysis
- Network Survey & Extraction: Network Analysis
- Network Survey & Extraction: Network Monitoring
- Network & Host Analysis: Network Observations
- Malware Removal: Identifying Malware Types & Classification Approaches
- CyberOps Windows Hardening: Windows Server Hardening Best Practices
- Security Programming: Scripting Essentials
- Security Programming: Code Identification
- Security Programming: System Essentials
- Introduction to Cyber Operations
- Security Programming: Command Line Essentials
- Prompt Engineering: Ethical Hacking & Generative AI Fusion
- Prompt Engineering: Generative AI for Reconnaissance
- Prompt Engineering: Generative AI for Scanning & Enumeration
- Prompt Engineering: Generative AI for System Hacking
- Prompt Engineering: Generative AI for Malware & Social Engineering
- Prompt Engineering: Web Application & Database Hacking in the Age of GenAI
- Prompt Engineering: GenAI’s Impact on Network & Perimeter Ethical Hacking
- Prompt Engineering: Cloud Computing & IoT Hacking in the Era of GenAI
- Prompt Engineering for Ethical Hacking
- Track 1: AI in Ethical Hacking
- CGI Annual Tour F2024: Northwest and Central-East Europe
- Developing a Growth Mindset
- CEH v11: Recon Tools & Tactics
- CEH v11: Nmap TCP Scans
- CEH v11: Scan Optimization, OS Identification & IDS/Firewall Evasion
- CEH v11: Footprinting and Social Engineering Recon & Countermeasures
- CEH v11: Nmap IP Scans
- CEH v11: Network Scanning, TCP, Host Discovery & Port/Service Scanning
- CEH v11: Vulnerability Assessment, Management & Classification
- CEH v11: \nPasswords Attacks, Extraction & Cracking
- CEH v11: \nVulnerability Assessment Types, Models, Tools & Reports
- CEH v11: \nCEH Hacking Methodology & Windows Authentication
- CEH v11: \nFileless Malware, Malware Analysis & Countermeasures
- CEH v11: \nSocial Engineering, Insider Threats & Identity Theft
- CEH v11: \nBuffer Overflows, Privilege Escalation & System Access
- CEH v11: Sniffing & Poisoning
- CEH v11: \nMalware, Threats, Trojans & Viruses
- CEH v11: \nDoS, DDoS, Volumetric & Protocol Attacks
- CEH v11: \nApp Layer Attacks, Botnets & DoS Countermeasures
- CEH v11: Intrusion Prevention and Detection, Firewalls & Honeypots
- CEH v11: Web Server Hacking, Attacks & Attack Methodologies
- CEH v11: CSRF, IDOR, LFI & RFI Attacks
- CEH v11: Wireless Hacking & Countermeasures
- CEH v11: Cryptography, Algorithms Implementations & Tools
- CEH v11: Cloud Computing, Containers, Hacking & Security Controls
- CEH v11: Cybersecurity Basics, Attacks & Information Warfare
- CEH v11: Cyber Kill Chain, TTPs, Behaviors & Threat Hunting
- CEH v11: Footprinting, Google Dorks, Search Engines & Sub-domains
- CEH v11: Hacking Phases & Concepts
- CEH v11: Incident Management, ML, AI & Regulations
- CEH v11: \nNetBIOS, SMB, SNMP & LDAP Enumeration
- CEH v11: \nNTP, NFS, SMTP & FTP Enumeration
- CEH v11: PKI, Cryptanalysis & Attack Countermeasures
- CEH v11: Operational Technology Concepts, Attack Tools & Countermeasures
- CEH v11: IoT Threats, Vulnerabilities, Attack Tools & Countermeasures
- Ethical Hacker: Pentesting, Laws, & Standards
- Ethical Hacker: Cryptography Attacks
- Ethical Hacker: IoT Attacks
- Ethical Hacker: SQL Injection
- Ethical Hacker: Hacking Concepts
- Ethical Hacker: Overview & Threats
- Jordy Kalle's Transcript
- Jordy Kalle's Wallet
- About Accredible