Site Map - skillsoft.digitalbadges.skillsoft.com
- User Authentication
- Michael Assefa's Credentials
- Michael Assefa's Wallet
- Writing Effective E-mails and Instant Messages
- CompTIA Security+: Implementing Identity and Account Management & AAA Solutions
- Security Technologies & Automation Techniques
- CompTIA CASP+: Authentication & Authorization
- Developing Solutions for Microsoft Azure: Implementing User Authentication & Authorization
- Microsoft 365 Identity and Services: Multi-Factor Authentication (MFA)
- Microsoft 365 Identity and Services: Authentication
- CompTIA A+ Core 2: Wireless Security Protocols & Authentication Methods
- Microsoft Azure Infrastructure Solutions: Authentication
- Microsoft Azure Administrator: Authentication & Authorization
- CCSP 2022: Planning & Implementing Security Controls
- CCSP 2022: Identity & Access Management Solutions
- AWS Developer Associate: Identity & Access Management
- AWS Professional Solutions Architect 2020: IAM Configurations
- SCOR: Cisco Firepower, Traffic Management, Identity, & Authentication
- AWS Solutions Architect Associate 2022: Directory Services Authentication
- CompTIA Security+: Implementing Secure Protocols & Application Security Solutions
- CLCOR: LDAP Sync & Authentication
- Ethical Hacker: Evading IDS, Firewall, & Honeypots
- DEVASC: API Usage & Authentication
- CompTIA Server+: Network Firewalls
- ARCYBER - Cyber Threat Intelligence Analyst - Firewalls
- CompTIA Security+: Organizational Security Assessment Tools & Mitigation Controls
- CompTIA Security+: Implementing Secure Network Designs
- CompTIA Cybersecurity Analyst+: Firewalls, IDS, & IPS
- CompTIA Network+: Physical Security & Network Hardening
- Ethical Hacker: Evading IDS, Firewall, & Honeypots Part 2
- Ethical Hacker: Evading IDS, Firewall, & Honeypots Part 3
- CEH v11: Scan Optimization, OS Identification & IDS/Firewall Evasion
- CEH v11: Intrusion Prevention and Detection, Firewalls & Honeypots
- SENSS 1.0: ASA Firewall Access Control
- SNCF: Deploying NGFWv & Adding It to the FMCv
- SCOR: Security Models & Frameworks
- ENCOR: Wireless & Network Security
- SNCF: NGFW Modes, Interface Types, & Link Redundancy
- SNCF: Cisco Firewall, IPS Systems, & the FMCv in AWS
- SENSS 1.0: Transparent Firewalls & Security Contexts
- SENSS 1.0: ASA Firewall Configuration & Access Control
- SENSS 1.0: Zone-Based Firewalls
- CLDFND: Virtual Networking Services
- SENSS 1.0: Role-Based Access Control
- DEVASC: Application Infrastructure, Deployment, Security, & CI/CD
- CBROPS: Security Events, Firewall Operations, & Traffic Analysis
- Authentication & Encryption: Best Practices
- SecOps Engineer: System Infrastructure Security
- Cloud Security Fundamentals: Cloud Infrastructure Security
- Ethical Hacker: Secure Technology & Applications
- CBROPS: Firewall, Filtering, Visibility, & Control Data
- ARCYBER - Cyber Threat Intelligence Analyst - Encryption
- Cryptography: Introduction to PKI
- Cryptography: Introduction to Cryptography Services
- Encryption Use & Analysis
- Modes of Operation & Algorithms
- CompTIA Cloud+: Cloud Security Controls
- CompTIA Cloud+: Data Security & Compliance Controls
- CompTIA Cloud+: Provisioning Cloud Storage
- CompTIA Cloud+: Cloud Network Deployments
- CompTIA Cloud+: Cloud Migrations
- CompTIA Cloud+: Cloud Logging, Monitoring, Alerting & Optimization
- CompTIA Cloud+: Cloud Operations Management
- CompTIA Cloud+: Cloud Automation & Orchestration
- CompTIA Cloud+: Cloud Disaster Recovery
- CompTIA Cloud+: Cloud Component Integration
- CompTIA Cloud+: Troubleshooting Cloud Deployments
- CompTIA Cloud+: Cloud Troubleshooting Methodologies
- CompTIA Cloud+: Troubleshooting Cloud Security Issues
- CompTIA Cloud+: Troubleshooting Automation and Orchestration Issues
- HQDA DCS, G-6 - CompTIA Cloud+ (CV0-003)
- CompTIA Cloud+: Cloud Network Security
- CompTIA Cloud+: Cloud Identity & Access Management
- CompTIA Cloud+: Cloud Solution Design
- CompTIA Cloud+: Cloud Architecture & Models
- CompTIA Cloud+: Cloud Capacity Planning
- CompTIA Cloud+ : Cloud High Availability & Scaling
- Cryptographic Methods
- Defining Cryptography
- Ethical Hacker: Overview & Threats
- Certified in Cybersecurity (CC): Security Governance, Policies, & Controls
- Certified in Cybersecurity (CC): Networking & Security Infrastructure
- New Project Manager Essentials
- Defining a Project Scope and Team
- Managing with a Cost-control Mindset
- Taking Final Steps to Bring a Project to its Close
- Navigating through Changes and Conflicts in Projects
- Managing a Project to Minimize Risk and Maximize Quality
- Enterprise, Civilian Talent Acquisition Programs (ECTAP), Army Fellows Program
- Creating a Project Schedule and Budget
- Big Data Fundamentals
- Big Data Interpretation
- Michael Assefa's Transcript
- Michael Assefa's Wallet
- About Accredible