Site Map - skillsoft.digitalbadges.skillsoft.com
- User Authentication
- Najib Boubker's Credentials
- Najib Boubker's Wallet
- CCNA 2020: Virtualization Concepts
- CCNA 2020: IPv6 Addressing & Configuration
- CCNA 2020: IPv4 Subnetting
- CCNA 2020: Networking Components
- CCNA 2020: IP Addressing Basics & Configuration
- CCNA 2020: Networking Protocols
- CCNA 2020: Layer 1 Physical & Configuration Issues
- CCNA 2020: Layer 1 Interfaces & Cabling
- CCNA 2020: Network Topology Architectures - WAN, Cloud, & SOHO
- CCNA 2020: Network Topology Architectures
- CCNA 2020: WLCs, Access Points, Servers, & Endpoints
- Certified Information Systems Auditor (CISA) 2019: Testing & Vulnerability
- Certified Information Systems Auditor (CISA) 2019: Virtualization & Cloud
- Certified Information Systems Auditor (CISA) 2019: Scenario-Based Practice
- Certified Information Systems Auditor (CISA) 2019: Digital Asset Protection
- Certified Information Systems Auditor (CISA) 2019: Digital Evidence Gathering
- CCNA 2020: Networking Components - NGFW, NGIPS, & Cisco DNA Center
- Understanding Bots: Chatbot Architecture
- Certified Information Systems Auditor (CISA) 2019: Data Storage & Malware
- Certified Information Systems Auditor (CISA) 2019: BCP & Network Security
- Certified Information Systems Auditor (CISA) 2019: Continuous Monitoring
- RSTECH: Networking Hardware, Models, & Technologies
- Understanding Bots: Building Bots with Dialogflow
- Understanding Bots: Chatbot Advanced Concepts and Features
- Advanced Lean, Agile, & Scrum Concepts
- Understanding Bots: Amazon Alexa Skills Development
- Using Multimedia in Presentations
- Preparing & Delivering Slideshows
- Saving Presentations
- Organizing Presentation Assets
- Blockchain in Action & IoT
- Enhancing Presentation Designs
- Adding Animations
- Inserting & Manipulating Text
- Formatting Presentations
- Adding Data to Presentations
- Creating Graphics & Diagrams
- Bitcoin Basics
- Bitcoin Technology Fundamentals
- Exploring Blockchain
- Machine Learning
- Introduction to Artificial Intelligence
- Business Reporting: Getting Started with Power BI Desktop for Data Analysis
- Creating Presentations in PowerPoint 2019<br> for Windows
- Transforming Your Business
- ITIL® 4 Foundation: Service Management Practices (Part 2)
- ITIL® 4 Foundation: Service Management Practices (Part 1)
- ITIL® 4 Foundation: General Management Practices
- ITIL® 4 Foundation: The Guiding Principles
- ITIL® 4 Foundation: The Service Value Chain
- ITIL® 4 Foundation: The Service Value System
- ITIL® 4 Foundation: Key Concepts
- ITIL® 4 Foundation: Key Concepts of Service Management
- Getting Started with PowerPoint
- Sharing & Collaborating on a Presentation
- Navigating Challenging Situations with Diplomacy and Tact
- Exploring Virtual Collaboration
- Introduction to Bitcoin
- Facing Virtual Team Challenges
- Organizations Change So Get Ready
- Organize Your Physical and Digital Workspace
- COVID-19: A Novel Coronavirus
- Expert Insights on Managing a Crisis
- ITIL® 4 Foundation: Introduction
- Business Strategy for the Post-pandemic Economy
- Sharing Space: Living, Learning, and Working at Home
- Building the Foundation for an Effective Team
- Resuming Retail or Restaurant Operations Post-pandemic
- Introduction to Digital Currency
- COMPLIANCE IMPACT: Using the Internet – Beware the Share
- Configuring PowerPoint
- COMPLIANCE SHORT: Ergonomics for Safety
- COMPLIANCE SHORT: Back Safety and Injury Prevention
- Unified Security: Playbook Approach to Security
- Final Exam: Security Architect
- Security Analyst to Security Architect
- Security Architect
- Security Incident Triage
- Data Security Breach Notification Process
- Vulnerability Analyst
- Security Program Regulatory Integration
- Intelligent Orchestration: Automating Security Incident Processing
- Final Exam: Vulnerability Analyst
- Security Architect: Ethical Hacking Best Practices
- Security Rules: Rules of Engagement
- Incident Tracking & Response
- Defensible Security
- Security Architect: Secure Coding Concepts
- Security Topologies: Developing Secure Networks
- Authentication & Encryption: Best Practices
- Intrusion Prevention: Best Practices
- Intrusion Detection Best Practices
- Security Vulnerabilities: Managing Threats & Vulnerabilities
- Final Exam: Forensics Analyst
- Forensics Analyst
- Resource Management
- Cryptography: Introduction to PKI
- Cryptography: Introduction to Cryptography Services
- Cyber Security Audits
- Risk Analysis: Security Risk Management
- Security Software Assessments
- Ethics & Privacy: Digital Forensics
- Digital Forensic Techniques & Investigative Approaches
- Anomaly Detection: Network Anomaly Detection
- Anomaly Detection: Aspects of Anomaly Detection
- Security Analyst
- End-User Security: Securing End Users against Attackers
- End-User Security: The Security Administrator Perspective
- End-User Security: The End-User Perspective
- Information Security: Pen Testing
- Final Exam: Security Analyst
- Information Security: Security Governance
- Information Security: Honeypots
- Information Security: Continual Infrastructure Testing
- Information Security: Hardened Security Topologies
- Information Security: Securing Networking Protocols
- Information Security: Subnetting & DNS for Security Architects
- Information Security: NACs & Gateways
- Information Security: APT Defenses
- An Executive's Guide to Security: Protecting Your Information
- An Executive's Guide to Security: Understanding Security Threats
- Auditing & Incident Response
- Session & Risk Management
- Building Personal Power through Influence
- Concepts & Characteristics of Networking
- Ports, Protocols, & the OSI Model
- vCenter
- High Availability Clusters
- Virtual Machines
- Installation
- Forging Ahead with Perseverance and Resilience
- Distributed Resource Scheduler (DRS)
- ESXi Features
- Overview
- Update Manager
- CompTIA Cybersecurity Analyst+: Threat Mitigation
- Creating & Managing Projects
- vCenter Server Installation
- Personal Skills for Effective Business Analysis
- The Art of Staying Focused
- Running Reports & Configuring Projects
- Confronting Your Assumptions
- Business Continuity Programs
- Contributing as a Virtual Team Member
- Take a Deep Breath and Manage Your Stress
- SecOps Engineer: System Infrastructure Security
- ICND2 3.0: QoS Overview
- Najib Boubker's Transcript
- Najib Boubker's Wallet
- About Accredible