Site Map - skillsoft.digitalbadges.skillsoft.com
- User Authentication
- Malarvizhi Shenbagaraj's Credentials
- Malarvizhi Shenbagaraj's Wallet
- CompTIA PenTest+: Governance, Risk, & Compliance
- CEH v12: Cloud Computing, Containers, Hacking, and Security Controls
- CEH v12: PKI, Cryptanalysis, and Attack Countermeasures
- CEH v12: Cryptography, Algorithms, Implementations, and Tools
- CEH v12: Operational Technology Concepts, Attack Tools, and Countermeasures
- CEH v12: IoT Threats, Vulnerabilities, Attack Tools, and Countermeasures
- CEH v12: SQL Injection and SQLMap
- CEH v12: Wireless Hacking and Countermeasures
- CEH v12: Mobile Hacking, OS Security, and Device Management
- CEH v12: Wireless Concepts, Threats, and Hacking Tools
- CEH v12: IDOR Attacks, File Inclusion Attacks, Web APIs, and Webhooks
- CEH v12: SQL Injection Concepts and Attacks
- CEH v12: Intrusion Detection and Prevention, Firewalls, and Honeypots
- CEH v12: Web Server Hacking, Attacks, and Attack Methodologies
- CEH v12: Web App Hacking Methodology, CSRF Attacks, and Input Filter Evasion
- CEH v12: Web Application Attacks and Vulnerabilities
- CEH v12: Hijacking Concepts and Countermeasures
- CEH v12: App Layer Attacks, Botnets, and DoS Countermeasures
- CEH v12: Social Engineering, Insider Threats, and Identity Theft
- CEH v12: DoS, DDoS, Volumetric, and Protocol Attacks
- CEH v12: Sniffing and Poisoning
- CEH v12: Fileless Malware, Malware Analysis, and Countermeasures
- CEH v12: Malware, Threats, Trojans, and Viruses
- CEH v12: AD Enumeration, Mimikatz, and Pivoting Techniques
- CEH v12: Steganography and Avoiding Detection
- CEH v12: Buffer Overflows, Privilege Escalation, and System Access
- CEH v12: Passwords Attacks, Extraction, and Cracking
- CEH v12: Vulnerability Assessment, Management, and Classification
- CEH v12: Vulnerability Assessment Types, Models, Tools, and Reports
- CEH v12: Windows Authentication
- CEH v12: NTP, NFS, SMTP, and FTP Enumeration
- CEH v12: NetBIOS, SMB, SNMP, and LDAP Enumeration
- CEH v12: Scan Optimization, OS Identification, and IDS/Firewall Evasion
- CEH v12: Nmap IDLE IPID, UDP, and SCTP Scans
- CEH v12: Nmap TCP Scans
- CEH v12: Network Scanning, TCP, Host Discovery, and Port/Service Scanning
- CEH v12: Footprinting and Social Engineering Recon and Countermeasures
- CEH v12: Recon Tools and Tactics
- CEH v12: Footprinting, Google Dorks, Search Engines, and Subdomains
- CEH v12: Hacking Methodology, MITRE ATT&CK Framework, and Diamond Model
- CEH v12: Incident Management, ML, AI, and Regulations
- Web App Vulnerability Analyst - 2022 Update
- Track 1: OWASP Top 10 Mitigations
- Final Exam: OWASP Top 10 Mitigations - 2021
- OWASP Top 10: A10:2021-Server-Side Request Forgery (SSRF)
- OWASP Top 10: A09:2021-Security Logging & Monitoring Failures
- OWASP Top 10: A08:2021-Software & Data Integrity Failures
- OWASP Top 10: A07:2021-Identification & Authentication Failures
- OWASP Top 10: A06:2021-Vulnerable & Outdated Components
- OWASP Top 10: A05:2021-Security Misconfiguration
- OWASP Top 10: A04:2021-Insecure Design
- OWASP Top 10: A03:2021-Injection
- OWASP Top 10: A02:2021-Cryptographic Failures
- OWASP Top 10: Securing Web Applications
- Configuring a Messaging Platform: Mobile Devices
- Creating, Joining & Managing Meetings in Zoom Desktop
- Using calendar tools & tasks in Outlook Microsoft 365
- Using contact tools in Outlook Microsoft 365
- CompTIA Security+: Monitoring, Visibility, & Reporting
- CompTIA Security+: Risk Management, Privacy, & Sensitive Data Security
- CompTIA Security+: Organizational Security Assessment Tools & Mitigation Controls
- CompTIA Security+: Implementing Secure Network Designs
- CompTIA Security+: Security Assessment & Penetration Testing Techniques
- CompTIA Security+: Controls & Application Development, Deployment, & Automation
- CompTIA A+ Core 2: Mobile OS Application & Application Security Issues
- Configuring a Messaging Platform: Connectors
- CompTIA A+ Core 1: Wireless Networking & Services
- CompTIA A+ Core 2: Best Practice Procedures for Malware Removal
- CompTIA Network+: Cables & Connectors
- CompTIA Security+: Security Concepts in an Enterprise Environment
- CompTIA Security+: Incident Response, Digital Forensics, & Supporting Investigations
- Office 365<br /> Fall 2020 Update
- Outlook Client & E-mail Management
- Formatting Email Text in Outlook 2019 for Windows
- Organizing Email in OWA iPad
- Illustrating your emails in Outlook Microsoft 365
- Managing the calendar in Outlook 365
- Formatting messages in Teams 2022
- Managing Microsoft Teams: Managing Phone Systems
- Managing Microsoft Teams: Managing Team Membership & App Policies
- Managing Microsoft Teams: Upgrading to Teams
- Managing Microsoft Teams: Endpoints
- Organizing & searching for files in Windows 11
- Managing Programs & File Types in Windows 11
- Configuring System Properties in Windows 11
- Customizing the System Appearance in Windows 11
- Using the Universal Apps in Windows 11
- Protecting & Backing up Data in Windows 11
- Exploring the Accessibility Tools in Windows 11
- Windows 11 Desktop Troubleshooting
- Windows 11 Installation Options
- Windows 11 2024 Winter Update
- Windows 11</br>Winter 2023 Update
- Scrum Artifacts and Investment Guidelines
- Scrum Product: Defining the Why & How of the Product
- Scrum: Creating Effective Product Backlogs
- Applying Scrum Development Practices
- Scrum: Product Backlog
- Scrum Concepts & the Product Owner
- Product Development Practices
- Scrum: Product Development Framework
- Lean in Scrum: Lean Development Practices
- Scrum Master: Scrum for the Team
- Scrum Team Velocity: Exploring Team Velocity
- Transition to Scrum: Agile Foundation to Scrum
- Transitioning to Scrum
- Agile & TDD Best Practices for APIs: Test-driven Development Strategy
- Testing Approaches
- Secure Agile Programming: Testing
- Techniques & Tools
- CompTIA Security+: Practical Cryptography
- Skills for Project Analysts: Negotiation Skills
- Managing and Engaging Stakeholders
- Business Analysis for Project Management: Practices for Later Project Stages
- Agile Foundations: Fundamentals
- Agile Foundations: Scrum Methodology
- Risk Management: Project Risk Assessment
- Project Evaluation: Defining Success Metrics
- Project Management Needs vs. Expectations
- Stakeholder Communication: Software Projects & Stakeholder Communication
- Decision Making for Software Project Managers
- CompTIA Security+: Fundamental Security Concepts
- CompTIA Security+: Security Goals & Controls
- CEH v12: Risk Management, Cyber Threat Intelligence, and Threat Modeling
- CEH v12: Cyber Kill Chain, TTPs, Behaviors, and Threat Hunting
- CEH v12: Cybersecurity Concepts, Attacks, and Information Warfare
- Key Concepts and the Four Dimensions of Service Management
- The Guiding Principles of the Service Value System and Continual Improvement Model
- The Service Value Chain and General Management Practices
- Event, Incident, and Problem Management
- Service Desk, IT Asset, Service Configuration, and Change Control Management
- Release, Service Level, and Availability Management
- ITIL® 4 Foundation: Key Concepts of Service Management
- ITIL® 4 Foundation: Introduction
- OWASP Top 10: A01:2021-Broken Access Control
- Your Role in Workplace Diversity
- Communicating Effectively with Customers
- Interacting with Customers
- How Culture Impacts Communication
- Using Communication Strategies to Bridge Cultural Divides
- Conquering the Challenges of Public Speaking
- Expert Insights on Diversity & Inclusion
- Bridging the Diversity Gap
- Building Shared Understanding across Cultural Divides
- Bridging Differences in Cross-cultural Communication
- CCNA 2020: Configuring & Verifying NAT
- SCOR: DHCP Snooping, DAI, IP Source Guard, Private VLANs, & Storm Control
- SCOR: Configuring and Verifying VPN & IPsec
- CCNA 2020: AAA Security & VPN Types
- SCOR: Security Basics & Common Threats
- CCNA 2020: SNMP, Syslog, & PHB for QoS
- SCOR: Network Access & Secure Network Management
- SCOR: Security Vulnerabilities, Attack Mitigations, & Cryptographic Solutions
- CCNA 2020: IT Security Concepts
- Cloud Computing Fundamentals: Risk Management
- Cloud Computing Fundamentals: Security
- Cloud Computing Fundamentals: Presence & Privacy
- Cloud Computing Fundamentals: Cloud Access Control
- Cloud Computing Fundamentals: Migrating to the Cloud
- Cloud Computing Fundamentals: Cloud Virtualization & Data Centers
- Cloud Computing Fundamentals: Storing & Managing Cloud Data
- Cloud Computing Fundamentals: Considerations
- Cloud Computing Fundamentals: Introduction
- Cloud Service Models & Benefits and Issues
- Moving to the Cloud
- Business Strategy: Managing Organizational Value
- Advanced Scrum for Project Management
- Agile Hybrid Approaches
- Value-driven Delivery: Delivering Value in Agile Projects
- Business Orientation: Strategic Organizational Goals
- Agile Software Development: Agile Project Management Techniques
- Project Management: Scrum Framework for Software Development
- Introduction to the Agile Principles and Mindset Bootcamp: Session 1 Replay
- Agile Project Scheduling and Monitoring
- Agile for Software Development: Lean, Agile, & Scrum Methodologies
- Agile Software Development: Agile Development Life Cycle
- Agile Project Planning
- Agile Principles and Methodologies
- Agile Stakeholder Engagement and Team Development
- Introduction to Networking
- Session & Risk Management
- Agile Methodologies
- Effective Stakeholder Communications for Technology Professionals
- Proven Techniques for Technical Communication
- Making an Impact with Non-verbal Communication
- Expert Insights on Communication Essentials
- Trust Building through Effective Communication
- Organizing Your E-mail
- Writing Effective E-mails and Instant Messages
- Using the Parts of Speech
- Using Punctuation Marks
- Troublesome Words and Phrases: Usage Mistakes in Writing
- Getting Email Right Series
- Expert Insights on Email Productivity
- Communicating with Confidence
- Getting the Details Right: Spelling Basics
- Clarity and Conciseness in Business Writing
- Improving Your Technical Writing Skills
- Creating Well-constructed Sentences
- Abbreviating, Capitalizing, and Using Numbers
- Expert Insights on Listening
- Become a Great Listener
- Listening Even When It's Difficult to Listen
- Sending E-mails to the Right People
- Malarvizhi Shenbagaraj's Transcript
- Malarvizhi Shenbagaraj's Wallet
- About Accredible