Site Map - skillsoft.digitalbadges.skillsoft.com
- User Authentication
- Nagesh Shenoy's Credentials
- Nagesh Shenoy's Wallet
- Vulnerability Analyst
- Security Analyst
- Forensics Analyst
- Generative AI and Its Impact to Everyday Business
- Harnessing the Disruption of Generative AI
- Cybersecurity Awareness: Key Security Terms & Concepts
- Cybersecurity Awareness: Information Security Fundamentals
- Cybersecurity Awareness: Getting Started with Security Foundations
- Managing tasks in Microsoft Planner 2020
- CEH v11: Risk Management, Cyber Threat Intelligence & Threat Modeling
- CEH v11: Cyber Kill Chain, TTPs, Behaviors & Threat Hunting
- CEH v11: Hacking Phases & Concepts
- CEH v11: Cybersecurity Basics, Attacks & Information Warfare
- Security Incident Triage
- Unified Security: Playbook Approach to Security
- Data Security Breach Notification Process
- Security Program Regulatory Integration
- Security Architect: Ethical Hacking Best Practices
- Security Rules: Rules of Engagement
- Intelligent Orchestration: Automating Security Incident Processing
- Incident Tracking & Response
- Defensible Security
- Final Exam: Vulnerability Analyst
- Security Architect: Secure Coding Concepts
- Security Topologies: Developing Secure Networks
- Authentication & Encryption: Best Practices
- Intrusion Prevention: Best Practices
- Intrusion Detection: Best Practices
- Security Vulnerabilities: Managing Threats & Vulnerabilities
- Cryptography: Introduction to PKI
- Final Exam: Forensics Analyst
- Cryptography: Introduction to Cryptography Services
- Polishing Your Feedback Skills
- Cyber Security Audits
- Security Software Assessments
- Risk Analysis: Security Risk Management
- Ethics & Privacy: Digital Forensics
- Digital Forensic Techniques & Investigative Approaches
- Anomaly Detection: Network Anomaly Detection
- End-User Security: Securing End Users against Attackers
- End-User Security: The Security Administrator Perspective
- Anomaly Detection: Aspects of Anomaly Detection
- End-User Security: The End-User Perspective
- Information Security: Pen Testing
- Information Security: Honeypots
- Information Security: Security Governance
- Information Security: Continual Infrastructure Testing
- Information Security: Securing Networking Protocols
- Information Security: Hardened Security Topologies
- Information Security: Subnetting & DNS for Security Architects
- Information Security: APT Defenses
- Information Security: NACs & Gateways
- Final Exam: Security Analyst
- An Executive's Guide to Security: Understanding Security Threats
- An Executive's Guide to Security: Protecting Your Information
- Auditing & Incident Response
- Session & Risk Management
- ITIL® 4 Foundation: Service Management Practices (Part 2)
- ITIL® 4 Foundation: General Management Practices
- ITIL® 4 Foundation: Service Management Practices (Part 1)
- ITIL® 4 Foundation: Introduction
- ITIL® 4 Foundation: The Service Value Chain
- Software Development Security & Life Cycle
- ITIL® 4 Foundation: The Service Value System
- Techniques and Tools
- ITIL® 4 Foundation: Key Concepts of Service Management
- ITIL® 4 Foundation: Key Concepts
- ITIL® 4 Foundation: The Guiding Principles
- Service Oriented Architecture (SOA) Governance
- Security Controls & Business Continuity
- Operations Management
- Legal Requirements & Compliance
- Risk Management & Outsourcing Design
- Prototyping Design Thinking
- Secure Cloud Computing & Trusted Cloud Services
- Secure Application Architecture & IAM
- Security Architecture
- Design Principles
- Enterprise Architecture Basics
- Designing with Flexibility & Efficiency in Mind
- Need for Design Patterns & the Principles Guiding Design Patterns
- Enterprise Architecture Planning & Implementation
- Design Thinking for Microservices
- Design Guidelines and Patterns
- Navigation and Layout
- Data Rights Management, Policies, & Event Tracing
- Data Center Design
- Current & Future Trends
- Architectural Artifacts & the Enterprise Continuum
- Architecture Capability Basics
- Basic Concepts of a Microservices Architecture
- Content Design
- Cloud Infrastructure & Risk Analysis
- Cloud Infrastructure Management
- Content Framework
- Agile Stakeholder Engagement and Team Development
- Application Security Awareness & Validation
- Agile Principles and Methodologies
- Agile for Software Development: Lean, Agile, & Scrum Methodologies
- Advanced Scrum Metrics
- Scaling Scrum: Choosing Scaled Agile Frameworks
- Scaling Scrum: Challenges
- Accessing the Business Value of Scrum
- Scaling Agile in Your Organization Bootcamp: Session 1 Replay
- Scaling Agile in Your Organization Bootcamp: Session 2 Replay
- Scaling Agile in Your Organization Bootcamp: Session 3 Replay
- Scrum Sprint: Retrospective
- Scrum Master: Sprint Goals & Planning
- SCRUM Meetings: On-target Daily Meetings
- Advanced Lean, Agile, & Scrum Concepts
- Scaling an Organization's Scrum Process
- SCRUM Quality, Planning, and Completion: The Definition of Done
- SCRUM Quality, Planning, and Completion: Quality & Productivity
- SCRUM Quality, Planning, and Completion: Effective User Stories
- Scrum Sprint: Review
- Scrum Team Velocity: Exploring Team Velocity
- Product Development Practices
- Scrum Master: Scrum for the Team
- Scrum: Product Backlog
- Scrum Concepts & the Product Owner
- Lean in Scrum: Lean Development Practices
- Scrum: Product Development Framework
- Transitioning to Scrum
- Scrum Practices: Managing the Scrum Project
- Applying Scrum Development Practices
- Transition to Scrum: Agile Foundation to Scrum
- Scrum Product: Defining the Why & How of the Product
- Agile Hybrid Approaches
- Business Strategy: Managing Organizational Value
- Value-driven Delivery: Delivering Value in Agile Projects
- Business Orientation: Strategic Organizational Goals
- Introduction to Scrum for the Team Bootcamp: Session 1 Replay
- Agile Software Development: Agile Development Life Cycle
- Advanced Scrum for Project Management
- Project Management: Scrum Framework for Software Development
- Agile Software Development: Agile Project Management Techniques
- Introduction to the Agile Principles and Mindset Bootcamp: Session 1 Replay
- Agile Project Scheduling and Monitoring
- Agile Project Planning
- Microsoft Azure Security Technologies: VPNs
- Microsoft Azure Security Technologies: Network Security
- Microsoft Azure Security Technologies: Azure AD Group Management
- Microsoft Azure Security Technologies: Azure AD Connect
- Microsoft Azure Security Technologies: Identity & Access Management
- Microsoft Azure Security Technologies: Azure AD User Management
- Microsoft Azure Security Technologies: Database User Access
- Telling a Business Story
- The First Steps in Negotiating
- Negotiating the Best Solution
- Microsoft Azure Security Technologies: Azure Database Security
- Microsoft Azure Security Technologies: Data Classification
- Microsoft Azure Security Technologies: Azure Storage Account Security
- IT Infrastructure Automation: Text File Processing & RegEx
- IT Infrastructure Automation: Automation & Scalability
- IT Infrastructure Automation: Automated Monitoring
- Nagesh Shenoy's Transcript
- Nagesh Shenoy's Wallet
- About Accredible