Site Map - skillsoft.digitalbadges.skillsoft.com
- User Authentication
- Loubna ELMTOUNI's Credentials
- Loubna ELMTOUNI's Wallet
- CompTIA Security+: Monitoring, Visibility, & Reporting
- CompTIA Security+: Wireless, Mobile, & Embedded Device Security
- CompTIA Security+: Risk Management, Privacy, & Sensitive Data Security
- CompTIA Security+: Basic Cryptography & Public Key Infrastructure
- CompTIA Security+: Authentication & Authorization Design Concepts
- CompTIA Security+: Implementing Identity and Account Management & AAA Solutions
- CompTIA Security+: Organizational Security Assessment Tools & Mitigation Controls
- CompTIA Security+: Physical Security Controls
- CompTIA Security+: Incident Response, Digital Forensics, & Supporting Investigations
- CompTIA Security+: Virtualization, Cloud Computing, & Cloud Cybersecurity Solutions
- CompTIA Security+: Implementing Secure Network Designs
- CompTIA Security+: Security Policies, Regulations, Standards, & Frameworks
- CompTIA Security+: Implementing Secure Protocols & Application Security Solutions
- CGI: CompTIA certification
- Google Cloud Digital Leader: Compute on the Google Cloud
- Google Cloud Digital Leader: Introducing Google Cloud Concepts
- Google Cloud Digital Leader: Digital Transformation with the Cloud
- CompTIA Security+: Analyzing Application & Network Attacks
- CompTIA Security+: Security Concepts in an Enterprise Environment
- CompTIA Security+: Social Engineering Techniques & Other Attack Types
- CompTIA Security+: Threat Actors, Intelligence Sources, & Vulnerabilities
- CompTIA Security+: Implementing Cybersecurity Resilience
- CompTIA Security+: Security Assessment & Penetration Testing Techniques
- CompTIA Security+: Controls & Application Development, Deployment, & Automation
- Certified in Cybersecurity (CC): Security Governance, Policies, & Controls
- Certified in Cybersecurity (CC): Core Security Principles & Risk Management
- Certified in Cybersecurity (CC): Incident Response
- Certified in Cybersecurity (CC): Business Continuity Planning
- Certified in Cybersecurity (CC): Logical Access Controls
- Certified in Cybersecurity (CC): Physical Access Controls
- Certified in Cybersecurity (CC): Networking & Security Infrastructure
- Certified in Cybersecurity (CC): Present Threats & Network Security Controls
- Certified in Cybersecurity (CC): Data Security & System Hardening
- Certified in Cybersecurity (CC): Security Best Practices & Security Awareness
- CGI Annual Tour F2025
- Working with Containers: Introduction to Kubernetes
- Final Exam: Core DevOps Skills
- Track 1: Core DevOps Skills
- CompTIA Security+: Security Goals & Controls
- CAPM®: Project Functions
- CAPM®: Project Performance Domains
- CAPM®: Stakeholder Performance Domain
- CAPM®: Project Principles
- CAPM®: Team Performance Domain
- CAPM®: Development Approach & Life Cycle Domain
- CAPM®: Planning Performance Domain
- CAPM®: Work Performance Domain
- CAPM®: Measurement Performance Domain
- CAPM®: Uncertainty Performance Domain
- CAPM®: Performance Measurement Metrics
- CAPM®: Project Tailoring
- CAPM®: Delivery Performance Domain
- CAPM®: Common Project Management Methods
- CAPM®: Project Planning Artifacts - Part 1
- CAPM®: Common Project Management Models
- CAPM®: Project Planning Artifacts - Part 2
- CAPM®: Common Project Management Artifacts
- CAPM®: Other Adaptive Methodologies
- CAPM®: Key Project Management Calculations
- CAPM®: Business Analysis Framework
- CAPM®: Project Management Key Concepts
- CAPM®: Agile Adaptive Project Management
- CAPM®: Project Roles & Responsibilities
- CAPM®: Project Lifecycles
- CAPM®: Applying Essential Formulas
- Core DevOps Skills: Moving toward DevOps
- Core DevOps Skills: DevOps Principles & Practices
- Core DevOps Skills: Agile & DevOps
- Core DevOps Skills: Continuous Principles
- Core DevOps Skills: Case Studies in DevOps
- Working with Containers: Container Theory & Operational Models
- Working with Containers: Introduction to Docker
- Microsoft Azure Security Technologies: Managing Key Vault Secrets
- Microsoft Azure Security Technologies: Managing Azure Policies
- Microsoft Azure Security Technologies: Enabling Resource Locking
- Microsoft Azure Security Technologies: Securing Azure with Defender & Sentinel
- Microsoft Azure Security Technologies: Ensuring Business Continuity
- Microsoft Azure Security Technologies: Monitoring Azure Services
- Microsoft Azure Security Technologies: Lab Scenario Review
- Microsoft Azure Security Technologies: Managing Azure AD
- Microsoft Azure Security Technologies: Managing Azure AD Groups
- Microsoft Azure Security Technologies: Restricting Resource Access with Roles
- Microsoft Azure Security Technologies: Working with Azure AD Features
- Microsoft Azure Security Technologies: Implementing Azure Network Security
- Microsoft Azure Security Technologies: Configuring Azure Networking
- Microsoft Azure Security Technologies: Managing Azure Storage
- Microsoft Azure Security Technologies: Managing Azure Virtual Machines
- Microsoft Azure Security Technologies: Securing Network Access with VPNs
- Microsoft Azure Security Technologies: Managing Azure Files Shares
- Microsoft Azure Security Technologies: Securing Azure Databases
- Microsoft Azure Security Technologies: Implementing Data Security
- Microsoft Azure Security Technologies: Working with Azure Applications
- Microsoft Azure Security Technologies: Implementing Data Security
- Microsoft Azure Security Technologies: Exercising Governance Principles
- Microsoft Azure Security Technologies: Managing Azure AD Users
- Microsoft Azure Security Technologies: Securing Azure AD Users
- AWS Cloud Practitioner
- AWS Cloud Practitioner
- AWS Cloud Practitioner 2023: Benefits & Design Principles of the AWS Cloud
- AWS Cloud Practitioner 2023: Migration to the AWS Cloud & Cloud Economics
- AWS Cloud Practitioner 2023: Automation & Managed Services
- AWS Cloud Practitioner 2023: Shared Responsibility & Compliance
- AWS Cloud Practitioner 2023: Overview of Cloud Security
- AWS Cloud Practitioner 2023: Access Management
- AWS Cloud Practitioner 2023: Components & Resources for Security
- AWS Cloud Practitioner 2023: Deploying & Operating in the AWS Cloud
- AWS Cloud Practitioner 2023: AWS Compute Services
- AWS Cloud Practitioner 2023: AWS Storage Services
- AWS Cloud Practitioner 2023: AWS Database Services
- AWS Cloud Practitioner 2023: AWS Network Services
- AWS Cloud Practitioner 2023: ML, AI, & Data Analytics
- AWS Cloud Practitioner 2023: AWS Developer Services & Tools
- AWS Cloud Practitioner 2023: Pricing, Billing, Budgeting, & Cost Management
- AWS Cloud Practitioner 2023: Technical & Support Resources at AWS
- ITIL® 4 Foundation: Key Concepts of Service Management
- CCSP 2022 : Solutions de gestion des accès et des identités
- CCSP 2022 : Infrastructure Cloud et composants de plateforme
- CCSP 2022 : Conception de centre de données et analyse des risques
- CCSP 2022 : Concepts et principes de conception de la sécurité Cloud
- CCSP 2022 : Audits, méthodologies et contrats Cloud
- CCSP 2022 : Planification de la continuité des activités Cloud
- CCSP 2022 : Assurance logicielle et validation
- CCSP 2022 : Sensibilisation à la sécurité des applications et cycles de vie
- CCSP 2022 : Planification et mise en œuvre des contrôles de sécurité
- L’IA générative et son impact sur le quotidien des entreprises
- Établir des garde-fous et une gouvernance pour l’IA
- CGI : Fondements de l'IA générative
- Changements apportés à un projet et clôture (Guide PMBOK® Sixième édition)
- Gestion du travail du projet (Guide PMBOK® Sixième édition)
- CBROPS: Attack Surfaces, Vulnerability, & Analysis Tools
- CCSP 2022 : Concepts de l'informatique Cloud et architectures de référence
- CBROPS: Incident Response, Security Management, & Analysis
- CBROPS: The CIA Triad & Security Approaches
- CBROPS: Security Events, Firewall Operations, & Traffic Analysis
- CBROPS: CVSS, Deployments, Access Control, & Data Visibility
- CBROPS: File Extraction, Event Artifacts, & Regular Expressions
- CBROPS: Protected Data, Profiling, Forensics, & IRP
- CBROPS: Threat Actors, Security, & Risk Management
- CBROPS: Data Loss, Host Isolation, & Detection Methods
- RSTECH: Networking Hardware, Models, & Technologies
- RSTECH: Network Responsibilities, Addressing, & Utilities
- RSTECH: Troubleshooting, Upgrading, Recovering, & Resetting
- RSTECH: Cisco Equipment, Components, & Port Characteristics
- RSTECH: Cisco Memory Functions & Removing Cisco Devices
- RSTECH: OS Types, IOS Access, & Terminal Emulation
- RSTECH: IOS Commands, Startup-Config, & IOX-XE Modes
- CCNA 2020: Networking Components - NGFW, NGIPS, & Cisco DNA Center
- CCNA 2020: Networking Components
- Initialisation et planification du projet (Guide PMBOK® Sixième édition)
- Groupes de processus (Guide PMBOK® Sixième édition)
- Principes de base d'un projet (Guide PMBOK® Sixième édition)
- Introduction au management de projet (Guide PMBOK® Sixième édition)
- CGI tournée annuelle E2024: Services Corporatifs
- Loubna ELMTOUNI's Transcript
- Loubna ELMTOUNI's Wallet
- About Accredible