Site Map - skillsoft.digitalbadges.skillsoft.com
- User Authentication
- Maryam.Alharbi's Credentials
- Maryam.Alharbi's Wallet
- Certified Incident Responder
- OffSec Defense Analyst (OSDA)
- Security Operations Essentials
- Understanding Bots: Building Bots with Dialogflow
- Policies and Best Practices
- CompTIA Cybersecurity Analyst+: Digital Forensics
- Backup & Recovery: Business Continuity & Disaster Recovery
- System Security Certified Practitioner (SSCP 2018): Digital Forensics
- Ethics & Privacy: Digital Forensics
- Governance, Strategy, Value, & Policies
- Stabilizing Clusters
- ITIL® 4 Foundation: Service Management Practices (Part 1)
- Risk Management: Project Risk Assessment
- Business Impact Analysis & Risk Management
- Information Security Incident Management Part I
- Information Security Incident Management Part II
- Conducting Incident Management
- Implementing Incident Response & Recovery
- CompTIA Cybersecurity Analyst+: Threat Management Incident Planning & Response
- Incident Response & Recovery
- Risk Management & Outsourcing Design
- Session & Risk Management
- System Security Certified Practitioner (SSCP 2018): Risk Management
- SSCP: Risk Management
- Business Continuity Planning Bootcamp: Session 1 Replay
- Business Continuity Planning Bootcamp: Session 2 Replay
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Security Architecture
- SECOPS: Analyzing Threat Mitigation Reports
- Security Architect: Secure Coding Concepts
- Security Architecture
- Secure Application Architecture & IAM
- Enterprise Architecture Basics
- Enterprise Architecture: Architectural Principles & Patterns
- CompTIA PenTest+: Penetration Testing Tools
- Penetration Testing Fundamentals
- Pen Testing for Software Development: The Penetration Testing Process
- Wi-Fi Penetration Testing
- IINS 3.0: Threat Mitigation for Email, Web, & Endpoints
- CompTIA Cybersecurity Analyst+: IT Security Risk Mitigation
- PenTesting for Physical Security
- Policies, Plans, & Procedures
- Cloud Security Administration: Regulatory Conformance
- Information Security: Securing Networking Protocols
- Security Architecture and Engineering
- ICND2 3.0: Switch Aggregation & Threat Mitigation
- Mobile Security Threat Mitigation
- CompTIA Cybersecurity Analyst+: Threat Mitigation
- CompTIA Security+: Threat Actors, Intelligence Sources, & Vulnerabilities
- Vulnerability Assessment & Mitigation
- Mitigation Techniques
- SecOps Engineer: Threat Mitigation
- Account Changes & Attack Mitigation
- IINS 3.0: Attack Mitigation
- Introduction to Cyber Operations
- Defensive CyberOps: Defensive Cyberspace Operations
- Windows 10: Deployment
- Cyber Security Audits
- Windows 10: Prepare for Deployment
- Windows Server 2016 - Install, Store, & Compute: Installation Options
- Windows Server 2016 Networking: DNS Configuration
- CompTIA Linux+: Disk Partitions & File Systems
- CompTIA Linux+: Security Best Practices
- CompTIA Linux+: Managing Services
- SQL Platform & Installation Best Practices
- Data Access & Permissions
- Backup Management
- Upgrading to SQL Server 2016
- Database Instance Performance
- CompTIA Linux+: Introduction to Linux & the Command Line
- CompTIA Linux+: Boot Process & Kernel
- Linux Installation
- Instances & Storage Considerations
- Wireless Security Settings
- Network Device Hardening
- Database Performance Settings
- Database Mail & Alerts
- Networking Devices
- Concepts & Characteristics of Networking
- Configuring Wired & Wireless Networks
- Network Topologies & Technologies
- IT Security Fundamentals
- Networking Fundamentals
- Maryam.Alharbi's Transcript
- Maryam.Alharbi's Wallet
- About Accredible