Site Map - skillsoft.digitalbadges.skillsoft.com
- User Authentication
- Kartik Sharma's Credentials
- Kartik Sharma's Wallet
- Incident Response, Backup and Recovery Strategies, and Documentation
- Trends in Cybersecurity
- Physical Security, Safety Procedures, and Access Control
- Legal Considerations and Cybercrime Investigations
- Identity Management, Directory Services, and Federation
- Security Architecture
- Securing Information using Cryptography
- Social Engineering Threats and Prevention
- Network Hardening, Network Segmentation, and Secure Connections
- Software Engineering, Security and Vulnerabilities
- Fundamentals of Malware Analysis and Remediation
- Environment Monitoring, Retention, and Data Logging
- Public Key Infrastructure and Certificate Distribution
- Cybersecurity Awareness and Threat Vectors
- Systems Hardening
- Network Discovery Tools and Techniques
- Malware Analysis
- Cybersecurity and Networking Fundamentals
- Discovery and Attack Vectors
- OWASP Top 10: A10 - Insufficient Logging & Monitoring
- OWASP Top 10: Discovering & Exploiting Web App Vulnerabilities
- OWASP Top 10: A5 - Broken Access Control
- OWASP Top 10: A8 - Insecure Deserialization
- OWASP Top 10: A6 - Security Misconfiguration
- OWASP Top 10: A7 - Cross-site Scripting
- OWASP Top 10: A9 - Using Components with Known Vulnerabilities
- OWASP Top 10: A4 - XML External Entities
- OWASP Top 10: A3 - Sensitive Data Exposure
- OWASP Top 10: A1 - Injection
- OWASP Top 10: A2 - Broken Authentication
- OWASP Top 10: Web Application Security
- The Unix Command Line & GUI
- Windows Server 2016 Identity: Active Directory Group Policy Objects
- Windows Server 2016 Identity: Active Directory Group Policy Preferences
- Incident Response, Forensics, Recovery, & Security Controls
- Secure System, Application Design, & Deployment
- Business Impact Analysis & Risk Management
- Cloud Computing, Virtualization, & Resiliency
- Frameworks, Guidelines, & Physical Security
- Implementing a Secure Network Architecture
- Policies, Plans, & Procedures
- Identity & Access Services
- Deploying Mobile Devices Securely
- Identity & Access Management Controls
- Common Account Management Practices
- Troubleshooting Common Security Issues
- Public Key Infrastructure
- Wireless Security Settings
- Analyzing Output from Security Technologies
- CompTIA Security+: Cryptography
- Penetration Testing & Vulnerability Scanning
- Security Assessment Using Software Tools
- Cryptographic & Wireless Attacks
- Impacts from Vulnerability Types
- Social Engineering & Related Attacks
- The Present Threat Landscape
- Types of Malware
- Application & Service Attacks
- Agile Hybrid Approaches
- Business Strategy: Managing Organizational Value
- Value-driven Delivery: Delivering Value in Agile Projects
- Advanced Scrum for Project Management
- Business Orientation: Strategic Organizational Goals
- Agile Software Development: Agile Development Life Cycle
- Project Management: Scrum Framework for Software Development
- Agile Software Development: Agile Project Management Techniques
- Introduction to the Agile Principles and Mindset Bootcamp: Session 1 Replay
- Agile Stakeholder Engagement and Team Development
- Agile Project Planning
- Agile Project Scheduling and Monitoring
- Agile for Software Development: Lean, Agile, & Scrum Methodologies
- Agile Principles and Methodologies
- CompTIA Cybersecurity Analyst+: Cloud Computing
- CompTIA Cybersecurity Analyst+: Malware Threats
- CompTIA Cybersecurity Analyst+: Attack Types
- CompTIA Cybersecurity Analyst+: Cloud Computing
- CompTIA Cybersecurity Analyst+: Encryption & Hashing
- CompTIA Cybersecurity Analyst+: Malware & Digital Forensics
- CompTIA Cybersecurity Analyst+: Exploits & Security Practices
- CompTIA Cybersecurity Analyst+: Monitoring Tools & Analytics
- CompTIA Cybersecurity Analyst+: Threat Intelligence
- CompTIA Cybersecurity Analyst+: Business Continuity
- CompTIA Cybersecurity Analyst+: Security Frameworks & Security Controls
- CompTIA Cybersecurity Analyst+: Protecting Network Resources
- CompTIA Cybersecurity Analyst+: Identifying & Reducing Vulnerabilities
- CompTIA Cybersecurity Analyst+: Firewalls, IDS, & IPS
- CompTIA Cybersecurity Analyst+: Threat Mitigation
- CompTIA Cybersecurity Analyst+: Network Concepts
- CompTIA Cybersecurity Analyst+: Network Reconnaissance & Security Policies
- CompTIA Cybersecurity Analyst+: Threat Management Incident Planning & Response
- CompTIA Cybersecurity Analyst+: Threat Management Documentation
- Sending E-mails to the Right People
- Creating<br/>Well-constructed Sentences
- Writing Effective<br>E-mails and Instant Messages
- Using<br/>Punctuation Marks
- Getting the Details Right: Spelling Basics
- Using the Parts of Speech
- Controlling Conflict, Stress, and Time in Customer Service
- Navigating Your Own Emotions
- Navigating Other People's Emotions
- Dealing with Customer Service Incidents and Complaints
- Communicating Effectively with Customers
- Expert Insights on Customer Relationships
- The Building Blocks of Building Trust
- Interacting with Customers
- Expert Insights on Essential Customer Service Skills
- Polishing Your Skills for Excellent Customer Service
- Expert Insights on Ethics
- Expert Insights on Trust
- Listening Even When it's Difficult to Listen
- Taking Effective and Professional Notes
- Become a Great Listener
- Conquering the Challenges of Public Speaking
- Making an Impact with Non-verbal Communication
- Capturing the Attention of Senior Executives
- Choosing the Right Interpersonal Communication Method to Make Your Point
- Using Active Listening in Workplace Situations
- Communicating with Confidence
- Do We Have A Failure to Communicate?
- Trust Building through Effective Communication
- Expert Insights on Communication Essentials
- Expert Insights on Difficult Conversations
- How to Manage Difficult Conversations
- Using Communication Strategies to Bridge Cultural Divides
- Expert Insights on Diversity & Inclusion
- How Culture Impacts Communication
- ITIL® 4 Foundation: Service Management Practices (Part 2)
- ITIL® 4 Foundation: General Management Practices
- ITIL® 4 Foundation: Service Management Practices (Part 1)
- ITIL® 4 Foundation: The Service Value Chain
- ITIL® 4 Foundation: The Service Value System
- ITIL® 4 Foundation: The Guiding Principles
- ITIL® 4 Foundation: Introduction
- ITIL® 4 Foundation: Key Concepts of Service Management
- ITIL® 4 Foundation: Key Concepts
- Business Strategy for the Post-pandemic Economy
- Kartik Sharma's Transcript
- Kartik Sharma's Wallet
- About Accredible