Site Map - skillsoft.digitalbadges.skillsoft.com
- User Authentication
- Milankumar PATEL's Credentials
- Milankumar PATEL's Wallet
- CEH v12: Vulnerability Assessment, Management, and Classification
- CEH v12: Vulnerability Assessment Types, Models, Tools, and Reports
- CEH v12: Buffer Overflows, Privilege Escalation, and System Access
- CEH v12: Passwords Attacks, Extraction, and Cracking
- CEH v12: Windows Authentication
- Using Performance Appraisals to Advance Your Career
- Developing a Plan to Further Your Career
- Getting Your Career on the Right Track
- Building a Circle of Connections for Networking Success
- Becoming Your Own Best Coach
- Fostering a Growth Mindset in the Age of AI
- Module 4
- Module 4 - Launching your IT career opportunities
- New Project Manager Essentials
- Defining a Project Scope and Team
- Getting Started with Machine Learning
- Agile Principles and Methodologies
- Cybersecurity Awareness and Threat Vectors
- Generative AI and Its Impact to Everyday Business
- CEH v12: Footprinting and Social Engineering Recon and Countermeasures
- CEH v12: Network Scanning, TCP, Host Discovery, and Port/Service Scanning
- CEH v12: Nmap IDLE IPID, UDP, and SCTP Scans
- CEH v12: Nmap TCP Scans
- CEH v12: NTP, NFS, SMTP, and FTP Enumeration
- CEH v12: Scan Optimization, OS Identification, and IDS/Firewall Evasion
- CEH v12: NetBIOS, SMB, SNMP, and LDAP Enumeration
- Module 3
- Module 3 - Emerging Technologies and IT Career Pathways
- CEH v12: Incident Management, ML, AI, and Regulations
- CEH v12: Hacking Methodology, MITRE ATT&CK Framework, and Diamond Model
- CEH v12: Footprinting, Google Dorks, Search Engines, and Subdomains
- CEH v12: Recon Tools and Tactics
- Ethics and Project Management
- Enabling Strategic Collaboration with Business-IT Alignment
- Navigating AI Ethical Challenges and Risks
- Module 2
- Module 2 - Navigating IT Careers and Professional Environments
- Being a Responsible Corporate Digital Citizen
- Earning and Offering Trust at Work
- Building Trust with Business Ethics
- Becoming a Continuous Learner
- CEH v12: Cyber Kill Chain, TTPs, Behaviors, and Threat Hunting
- CEH v12: Cybersecurity Concepts, Attacks, and Information Warfare
- CEH v12: Risk Management, Cyber Threat Intelligence, and Threat Modeling
- Module 1
- Module 1 - Setting up your Individual & Team Learnings
- Learning from Failure and Success
- Building Success through Self-improvement
- Facing Virtual Team Challenges
- Being an Effective Team Member
- Effective Team Communication
- Milankumar PATEL's Transcript
- Milankumar PATEL's Wallet
- About Accredible