Site Map - skillsoft.digitalbadges.skillsoft.com
- User Authentication
- Kelly Chan's Credentials
- Kelly Chan's Wallet
- DevSecOps Methodologies
- CISA 2022: Auditing Scenarios
- CISA 2022: System Development & Vulnerability Testing
- CISA 2022: Digital Evidence Gathering
- CISA 2022: Continuous Monitoring
- CISA 2022: Data Storage & Malware
- CISA 2022: Business Continuity
- CISA 2022: Virtualization & Cloud Computing
- CISA 2022: Protecting Digital Assets
- CISA 2022: Protecting Information Assets
- CISA 2022: Securing Networks & IT Assets
- CISA 2022: IAM & Data Classification
- CISA 2022: Information Systems Development & Implementation
- CISA 2022: Data Privacy
- CISA 2022: Projects, Development, & Testing
- CISA 2022: Information Systems Management
- CISA 2022: IT Management Frameworks, Regulations, & Standards
- CISA 2022: IT Resources & Monitoring
- CISA 2022: Auditing, Data Analysis, & Controls
- CISA 2022: Information Systems Auditing
- Introduction to AWS Services
- Network Access
- ChatGPT Prompt Engineering Examples & Use Cases
- Generative AI APIs for Practical Applications: An Introduction
- Generative AI and Its Impact to Everyday Business
- Harnessing the Disruption of Generative AI
- Penetration Testing Fundamentals
- OWASP Top 10: Securing Web Applications
- Azure AI Fundamentals: Artificial Intelligence & Machine Learning
- CISSP 2021: Security Governance Principles
- Identifying Risks in Your Organization
- CISSP 2021: Secure Design Principles
- PenTesting for Physical Security
- SQL Security Architecture
- Risk Analysis: Security Risk Management
- AWS DevOps Engineer Professional 2021: CloudFormation
- CEH v11: Risk Management, Cyber Threat Intelligence & Threat Modeling
- Kelly Chan's Transcript
- Kelly Chan's Wallet
- About Accredible