Site Map - skillsoft.digitalbadges.skillsoft.com
- User Authentication
- Jose Marcelo Barretto's Credentials
- Jose Marcelo Barretto's Wallet
- CCSP 2019: Identity & Access Management
- CCSP 2022: Cloud Security Concepts & Design Principles
- Data Access & Governance Policies: Data Classification, Encryption, & Monitoring
- Leading Security Teams for GenAI Solutions: Use of Generative AI
- Responsible Use of AI
- Exploring Business Process Automation
- Using Robots and RPA in the Workplace
- Hybrid Environment Pipelines: Hybrid Cloud Transformation
- Software Design and Development: Design Patterns & SOLID Principles
- CAPM®: Performance Measurement Metrics
- Exploring Project Management, Then and Now (2021 Update)
- Advanced Agile: Leadership Techniques
- Validate and Control Scope (PMBOK® Guide Sixth Edition)
- Effective Team Communication
- Artificial Intelligence and Machine Learning
- ChatGPT Prompt Engineering Examples & Use Cases
- Generative AI APIs for Practical Applications: An Introduction
- CLCOR: Call Setup & Teardown Process
- CLCOR: Understanding Voice & Video Codecs
- CLCOR: Call Signaling & Call Setup Processes
- CLCOR: Endpoint Provisioning in Cisco Unified CM
- CLCOR: LDAP Sync & Authentication
- CLCOR: CM Disaster Recovery & IP Protocols
- CLCOR: Cisco Collaboration Core Technologies
- DCCOR: AAA, RBAC, First Hop Security, & CoPP
- DCCOR: UCS, SPAN, & Intersight
- DCCOR: Cisco Application Centric Infrastructure
- DCCOR: Data Center Traffic Flow & NX-OS Management
- DCCOR: Fibre Channel & Storage Networking
- DCCOR: Streaming Telemetry & Cisco UCS
- DCCOR: Data Center Equipment Programmability
- DCCOR: NX-OS, OSPFv2, & OSPFv3
- DCCOR: VACP and vPC
- DCCOR: MP-BGP, PIM, FHRPs, & RSTP+
- DCCOR: VXLAN, EVPN, & OTV
- DEVASC: DevNet Overview & Setting up Tools in Linux
- CBROPS: File Extraction, Event Artifacts, & Regular Expressions
- CBROPS: Protected Data, Profiling, Forensics, & IRP
- CBROPS: Incident Response, Security Management, & Analysis
- CBROPS: Log Evidence, Disk Images, & Malware Analysis Output
- CBROPS: Security Events, Firewall Operations, & Traffic Analysis
- CBROPS: Host-based Analysis & the Role of Attribution
- CBROPS: Firewall, Filtering, Visibility, & Control Data
- CBROPS: Social Engineering, Evasion, Obfuscation, & Certificates
- CBROPS: CVSS, Deployments, Access Control, & Data Visibility
- CBROPS: Attack Surfaces, Vulnerability, & Analysis Tools
- CBROPS: Data Loss, Host Isolation, & Detection Methods
- CBROPS: Data & Attack Types
- CBROPS: The CIA Triad & Security Approaches
- CBROPS: Threat Actors, Security, & Risk Management
- CCNA 2020: Configuring & Verifying ACLs
- CCNA 2020: Configuring Port Security, DHCP Snooping, & DAI
- CCNA 2020: Automation, Network Programmability, & SDN Architectures
- CCNA 2020: Configuration Management & JSON Encoded Data
- CCNA 2020: APIs & Cisco DNA Center
- CCNA 2020: Cisco WLC Configuration & Wireless Management Access
- CCNA 2020: Cisco Wireless Architecture & WLAN Components
- CCNA 2020: NTP, DNS, & DHCP
- CCNA 2020: Configuring SSH, FTP, & TFTP
- CCNA 2020: IT Security Concepts
- CCNA 2020: AAA Security & VPN Types
- CCNA 2020: Configuring & Verifying NAT
- CCNA 2020: SNMP, Syslog, & PHB for QoS
- CCNA 2020: Dynamic Routing
- CCNA 2020: Static Routing
- CCNA 2020: Security Program &Password Policy Components
- CCNA 2020: Network Access, VLAN Configuration, & Interswitch Connectivity
- CCNA 2020: Virtualization Concepts
- CCNA 2020: IPv6 Addressing & Configuration
- CCNA 2020: L2 Discovery Protocols & L2 and L3 EtherChannel Configuration
- CCNA 2020: Spanning Tree Protocol
- CCNA 2020: Layer 1 Physical & Configuration Issues
- CCNA 2020: Networking Protocols
- CCNA 2020: IPv4 Subnetting
- CCNA 2020: IP Addressing Basics & Configuration
- CCNA 2020: Network Topology Architectures
- CCNA 2020: Layer 1 Interfaces & Cabling
- CCNA 2020: Networking Components
- CCNA 2020: Network Topology Architectures - WAN, Cloud, & SOHO
- CCNA 2020: WLCs, Access Points, Servers, & Endpoints
- CCNA 2020: Networking Components - NGFW, NGIPS, & Cisco DNA Center
- SRE Load Balancing Techniques: Front-end Load Balancing
- Cloud and Containers for the SRE: Containers
- Cloud and Containers for the SRE: Implementing Container Solutions
- SRE Load Balancing Techniques: Data Center Load Balancing
- Distributed Reliability: SRE Critical State Management
- Distributed Reliability: SRE Distributed Periodic Scheduling
- SRE Simplicity: Simple Software Systems
- Backup & Recovery: Windows Client Backup and Recovery Tools
- Site Reliability Engineering: Scenario Planning
- Best Practices for the SRE: Use Cases for Automation
- Best Practices for the SRE: Automation
- Data Access & Governance Policies: Data Access Governance & IAM
- Top 10 List Items
- SRE Emergency & Incident Response: Responding to Emergencies
- Site Reliability Engineer: Managing Overloads
- SRE Emergency & Incident Response: Incident Response
- Site Reliability Engineer: Managing Cascading Failures
- Build & Release Engineering Best Practices: Release Management
- SRE Troubleshooting Processes
- SRE Troubleshooting: Tools
- SRE Postmortums: Blameless Postmortem Culture Creation
- Backup & Recovery: Enterprise Backup Strategies
- Backup & Recovery: Business Continuity & Disaster Recovery
- Site Reliability: Engineering
- Site Reliability: Tools & Automation
- Describing Distributed Systems
- Monitoring Distributed Systems
- Application Security Awareness & Validation
- Secure Application Architecture & IAM
- API Security
- Jose Marcelo Barretto's Transcript
- Jose Marcelo Barretto's Wallet
- About Accredible