Site Map - skillsoft.digitalbadges.skillsoft.com
- User Authentication
- Niranjan Singh's Credentials
- Niranjan Singh's Wallet
- Information Security for Leaders: Elements of InfoSec
- Information Security for Leaders: Elements of an InfoSec Team
- Final Exam: Elements of InfoSec
- Track 1: Elements of InfoSec
- Track 1: Introduction to DevSecOps
- Introduction to DevSecOps
- Final Exam: Introduction to DevSecOps
- DevSecOps and Containers
- Important DevSecOps Tools
- DevSecOps in GCP
- DevSecOps in Azure
- DevSecOps in AWS
- DevSecOps in Continuous Integration & Delivery (CI/CD)
- DevSecOps On-premises
- DevSecOps Methodologies
- Data Security Breach Notification Process
- Security Principles for DevSecOps
- DevSecOps Principles: From DevOps to DevSecOps
- The DevSecOps Life Cycle
- Security Architecture
- Security Program Regulatory Integration
- Intelligent Orchestration: Automating Security Incident Processing
- Security Architect: Ethical Hacking Best Practices
- Security Rules: Rules of Engagement
- Leadership Transitions: Becoming a Frontline Manager
- Trends in Cybersecurity
- Windows Exploits and Forensics: Intelligence Gathering
- Identifying Risks in Your Organization
- Information Security for Leaders: An Introduction to InfoSec
- Track 3: Mitigating Security Risks
- Security Essentials for Decision-makers and Leaders
- Mitigating Security Risks: Maintaining a Secure Workplace
- Final Exam: Mitigating Security Risks
- Mitigating Security Risks: Maintaining Business Continuity
- Mitigating Security Risks: Managing the Incidents
- Mitigating Security Risks: Information Security Governance
- Mitigating Security Risks: Managing Security in a Hybrid Workplace
- Mitigating Security Risks: Managing Risks from Internal Stakeholders
- Mitigating Security Risks: Handling Natural Threats
- Mitigating Security Risks: Managing Information, Cloud, & Data Security Risks
- Mitigating Security Risks: Information, Cloud, & Data Security Risk Considerations
- Mitigating Security Risks: Managing Social Engineering Risks
- Mitigating Security Risks: Cyber Security Risks
- Mitigating Security Risks: Managing Network & Infrastructure Security Risks
- Mitigating Security Risks: Managing Physical Security Risks
- Track 2: Evaluating and Planning for Security Risks
- Security Risks: Planning for Security Risk Management
- Final Exam: Evaluating and Planning for Security Risks
- Security Risks: Key Risk Terms & Concepts
- Security Risks: Performing Security Risk Assessments
- Security Risks: Performing Security Risk Identification
- Track 1: Becoming Security Aware
- Cybersecurity Awareness: Exposure to Security Risks
- Final Exam: Becoming Security Aware
- Cybersecurity Awareness: Key Security Terms & Concepts
- Cybersecurity Awareness: Information Security Fundamentals
- Cybersecurity Awareness: Getting Started with Security Foundations
- Developing and Supporting an Agile Mindset
- Agile Principles and Methodologies
- Setting Up A Profile in<br> LinkedIn Web
- Maximize Your Productivity by Managing Time and Tasks
- Achieve Productivity in Your Personal Life
- Managing Your Corporate Reputation Online
- Embracing the Digital Opportunity
- CompTIA Security+: Monitoring, Visibility, & Reporting
- How to be successful in your Digital Transformation: Practical Tips and Advice: Session Replay
- How to be successful in your Digital Transformation: Closing the Knowing-Doing Gap: Session Replay
- CISSP 2021: Security Governance Principles
- CISSP 2021: Fundamental Concepts & Principles
- CISSP 2021: Secure Design Principles
- CISSP 2021: (ISC)2 & the CISSP Exam
- VMware VCP-DCV vSphere 7: Multipathing & vSAN Solutions
- VMware VCP-DCV vSphere 7: vSphere HA Clusters & Fault Tolerance
- VMware VCP-DCV vSphere 7: Update Planner & Lifecycle Manager
- VMware VCP-DCV vSphere 7: Switch Security, Traffic Shaping, Load Balancing, & Creation
- VMware VCP-DCV vSphere 7: vSphere Terminology & Standard Switches
- VMware VCP-DCV vSphere 7: vCenter Domains, Identity Sources, Access, & Backup
- VMware VCP-DCV vSphere 7: vCenter Monitoring, Protection, Migration, & Upgrading
- VMware VCP-DCV vSphere 7: vCenter Server Architecture, Appliance, & Inventory
- VMware VCP-DCV vSphere 7: DRS Clusters & High Availability
- VMware VCP-DCV vSphere 7: VM Provisioning, Tools, Files, & Containers
- VMware VCP-DCV vSphere 7: ESXi Host Configuration
- VMware VCP-DCV vSphere 7: Virtualization, SDDC, & ESXi Hosts
- Cloud Security Administration: Regulatory Conformance
- Cloud Security Administration: Continuous Operational Improvement
- Cloud Security Administration: Hardened Cloud Security
- Cloud Security Administration: Cloud Data & Application Security
- Cloud Security Administration: Introduction
- Cloud Security Administration: Infrastructure Planning
- Cloud Security Fundamentals: Legal & Compliance
- Cloud Security Fundamentals: Cloud Data Security
- Cloud Security Fundamentals: Cloud Application Security
- Cloud Security Fundamentals: Cloud Infrastructure Security
- Cloud Security Fundamentals: Architectural & Design Concepts
- Cloud Security Fundamentals: Basics of Cloud Operations
- Quantum Pre Sales- Tech Specialist
- Infinity Pre Sales- Sales Specialist
- Harmony Pre Sales- Tech Specialist
- CloudGuard Pre Sales- Tech Specialist
- ADM Guidelines & Techniques
- Architecture Development Method (ADM) Cycle
- ADM Application & Architecture Content Framework
- Architecture Capability Framework
- Architectural Artifacts & the Enterprise Continuum
- Enterprise Continuum
- Reference Models
- Architecture Capability Basics
- Service Oriented Architecture (SOA) Governance
- Security Architecture
- Content Framework
- Enterprise Architecture Basics
- Enterprise Architecture Planning & Implementation
- Certified Information Systems Auditor (CISA) 2019: Scenario-Based Practice
- Certified Information Systems Auditor (CISA) 2019: Digital Evidence Gathering
- Certified Information Systems Auditor (CISA) 2019: Continuous Monitoring
- Certified Information Systems Auditor (CISA) 2019: Testing & Vulnerability
- Certified Information Systems Auditor (CISA) 2019: System Design & Analysis
- Certified Information Systems Auditor (CISA) 2019: Virtualization & Cloud
- Certified Information Systems Auditor (CISA) 2019: BCP & Network Security
- Certified Information Systems Auditor (CISA) 2019: Digital Asset Protection
- Certified Information Systems Auditor (CISA) 2019: Performance & Management
- Certified Information Systems Auditor (CISA) 2019: PKI & Data Protection
- Certified Information Systems Auditor (CISA) 2019: Data Privacy & Risk
- Certified Information Systems Auditor (CISA) 2019: IAM & Data Classification
- Certified Information Systems Auditor (CISA) 2019: Data Storage & Malware
- Certified Information Systems Auditor (CISA) 2019: IT Management Frameworks
- Certified Information Systems Auditor (CISA) 2019: Information System Auditing
- CISM 2020: Detecting Security Anomalies
- CISM 2020: IT Security Policies
- CISM 2020: Business Continuity
- CISM 2020: Digital Forensics
- CISM 2020: TCP/IP Configuration
- CISM 2020: Network Infrastructure Security
- CISM 2020: Identity & Access Management
- CISM 2020: Server Roles
- CISM 2020: Security Testing
- CCSP 2019: Managing & Securing Cloud Infrastructure
- CCSP 2019: Operational Controls & Standards
- CCSP 2019: Application Development & Security
- CCSP 2019: Implementing Data Discovery & Classification
- CCSP 2019: Data Retention & Events
- CCSP 2019: Cloud Infrastructure
- CCSP 2019: Data Center Security
- CCSP 2019: Data Security Technologies
- CCSP 2019: Identity & Access Management
- CCSP 2019: Secure Cloud Computing
- CCSP 2019: Cloud System Architecture Design
- SSCP 2021: \nNetwork Attacks & Countermeasures
- SSCP 2021: Secure \nWireless Communication
- SSCP 2021: Malware & Countermeasures
- SSCP 2021: Endpoint Protection & Mobile Device Management
- SSCP 2021: Secure Virtual & Cloud Environments
- SSCP 2021: Fundamental Networking Concepts
- CISM 2020: Managing IT Risk
- CISM 2020: Cryptography & PKI
- CISM 2020: Information Security & Business Process Alignment
- CCSP Bootcamp July/August 2021: Session 3 Replay
- CCSP Bootcamp July/August 2021: Session 1 Replay
- CCSP Bootcamp July/August 2021: Session 2 Replay
- SSCP 2021: Incident Response & Forensics
- SSCP 2021: Business Continuity Planning
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Secure Software Testing
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Testing Types
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Testing for Security & Quality Assurance
- SSCP 2021: Basic Security Concepts
- SSCP 2021: Asset & Change Management Lifecycles
- SSCP 2021: Security Controls
- SSCP 2021: Physical Security Operations
- SSCP 2021: Understanding & Applying Cryptography
- SSCP 2021: Secure Protocols & Public Key Infrastructure (PKI)
- SSCP 2021: Authentication & Trust Architectures
- SSCP 2021: Identity Management & Access Control Models
- SSCP 2021: Risk Management
- SSCP 2021: Security & Vulnerability Assessment
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Secure Lifecycle Management
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Software Deployment & Management
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Supply Chain & Software Acquisition
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Technologies
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Secure Coding Practices
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Security Vulnerabilities
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Governance, Risk, and Compliance
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Secure Design Principles
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Security Architecture
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Architectural Risk & Modeling
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Threat Modeling
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Core Concepts
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Data Classification
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Security Design Principles
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Security Requirements
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Privacy
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Abuse Cases & RTMs
- Skill Soft_01
- Skill Soft_02
- Skill Soft_03
- Cyber security for Safe, Reliable, Secure Industrial Control System (ICS) v6.4
- Skill Soft_04
- Skill Soft_05
- Skill Soft_07
- Skill Soft_06
- Skill Soft_07
- Skill Soft_08
- Skill Soft_09
- Skill Soft_10
- Black Belt Tech Academy Security
- Threat Hunting Workshop
- Microsoft Azure Fundamentals
- Skill Soft_11
- TOGAF® 9 Training (Combined Level 1 & 2)
- Certificate of Training- SABSA
- Cisco FTD Security & Mobility Pre-Sales Technical Training
- Niranjan Singh's Transcript
- Niranjan Singh's Wallet
- About Accredible