Site Map - skillsoft.digitalbadges.skillsoft.com
- User Authentication
- Patrick Neil Alcantara's Credentials
- Patrick Neil Alcantara's Wallet
- Day 5
- IOC Tech Foundations
- Day 9
- OS Exploits
- Track 1: OS Exploits
- Security Analyst to Security Architect
- Security Architect
- Vulnerability Analyst
- Authentication & Encryption: Best Practices
- Final Exam: Security Architect
- Security Incident Triage
- Incident Tracking & Response
- Security Program Regulatory Integration
- Data Security Breach Notification Process
- Unified Security: Playbook Approach to Security
- Security Architect: Secure Coding Concepts
- Defensible Security
- Intrusion Detection: Best Practices
- Intrusion Prevention: Best Practices
- Security Topologies: Developing Secure Networks
- Final Exam: Vulnerability Analyst
- Intelligent Orchestration: Automating Security Incident Processing
- Forensics Analyst
- Final Exam: Forensics Analyst
- Security Analyst
- Security Software Assessments
- Security Architect: Ethical Hacking Best Practices
- Cryptography: Introduction to PKI
- Digital Forensic Techniques & Investigative Approaches
- Cryptography: Introduction to Cryptography Services
- Security Rules: Rules of Engagement
- Security Vulnerabilities: Managing Threats & Vulnerabilities
- Risk Analysis: Security Risk Management
- Cyber Security Audits
- Ethics & Privacy: Digital Forensics
- Final Exam: Security Analyst
- End-User Security: Securing End Users against Attackers
- End-User Security: The Security Administrator Perspective
- Anomaly Detection: Aspects of Anomaly Detection
- Anomaly Detection: Network Anomaly Detection
- CISSP 2021: Fundamental Concepts & Principles
- Introduction to Using PyCharm IDE
- Advanced Python Topics: Exceptions & Command Line Arguments
- Advanced Python Topics: File Operations in Python
- Functions in Python: Gaining a Deeper Understanding of Python Functions
- Python Unit Testing: An Introduction to Python's unittest Framework
- Functions in Python: Working with Advanced Features of Python Functions
- Information Security: Honeypots
- Information Security: Pen Testing
- Information Security: Continual Infrastructure Testing
- Information Security: Securing Networking Protocols
- Information Security: Security Governance
- Information Security: Hardened Security Topologies
- Incident Response Leader
- Ethical Hacker
- SecOps Engineer
- Penetration Tester to SecOps Engineer
- Penetration Tester
- SecOps Engineer: Secure Coding
- Final Exam: SecOps Engineer
- SecOps Engineer: Threat Mitigation
- SecOps Engineer: System Infrastructure Security
- SecOps Engineer: Security Engineering
- SecOps Engineer: Cloud & IoT security
- Getting Started with Python: Introduction
- An Executive's Guide to Security: Understanding Security Threats
- Complex Data Types in Python: Working with Dictionaries & Sets in Python
- Auditing & Incident Response
- Complex Data Types in Python: Working with Lists & Tuples in Python
- Information Security: APT Defenses
- Information Security: Subnetting & DNS for Security Architects
- Conditional Statements & Loops: Advanced Operations Using for Loops in Python
- Conditional Statements & Loops: While Loops in Python
- Information Security: NACs & Gateways
- Functions in Python: Introduction
- Complex Data Types in Python: Shallow & Deep Copies in Python
- Session & Risk Management
- Conditional Statements & Loops: If-else Control Structures in Python
- An Executive's Guide to Security: Protecting Your Information
- Conditional Statements & Loops: The Basics of for Loops in Python
- Ethical Hacker: Security Standards
- Ethical Hacker: Risk Assessment
- Policy & Governance: Incident Response
- Ethical Hacker: Incident Response
- Ethical Hacker: Account Creation
- Final Exam: Ethical Hacker
- Regulation Conformance for Incidence Response
- Patch Management Strategies
- Preemptive Troubleshooting: Concepts & Strategies
- Security Best Practices: Network Appliance Security
- Planning Measures: Incident Response Planning
- Ethical Hacker: Secure Technology & Applications
- Monitoring & Securing System Configuration
- Final Exam: Incident Response Leader
- CISSP 2021: Software Development Security
- Final Exam: Penetration Tester
- Session Management in Multi-cloud & Hybrid Cloud Environments
- Pen Testing: End-user Behavior
- Multi-cloud Load Balancing: Principles of Load Balancing
- PenTesting for Physical Security
- Wi-Fi Penetration Testing
- Pen Testing Awareness: Results Management
- Multi-cloud Load Balancing: Load Balancing Design Strategies
- Multi-cloud Load Balancing: Designing Multi & Hybrid Cloud Solutions
- Security Measures: Implementing Security Controls
- Considerations in Load Balancing: Multi-cloud Security Management
- Advanced Pen Testing Techniques
- Considerations in Load Balancing: Multi-cloud Data & Privacy Management
- Final Exam: Multi-Cloud Load Balancing Principles
- Track 1: Multi-cloud Load Balancing Principles
- Final Exam: OS Exploits
- Penetration Testing Fundamentals
- CISSP 2021: (ISC)2 & the CISSP Exam
- Linux Exploits & Mitigation: Linux Exploit Architecture
- Linux Exploits & Mitigation: Penetration Tools
- Linux Exploits & Mitigation: Program Essentials
- Linux Exploits & Mitigation: Memory and Pointer Vulnerabilities
- Windows Exploits and Forensics: Post Exploitation
- Linux Exploits & Mitigation: Staging for Exploit Analysis
- Linux Exploits & Mitigation: String Vulnerability Analysis
- Windows Exploits and Forensics: Legacy Systems & Third Party Applications
- Windows Exploits and Forensics: FTP, RDP, & Other Services
- Security Threat Intelligence
- Security Threat Intelligence
- Windows Environments
- Windows Exploits and Forensics: Intelligence Gathering
- Windows Exploits and Forensics: SMB & PsExec
- Network & Host Analysis: Network Operations
- Network & Host Analysis: Network Analysis Formats
- CyberOps Windows Hardening: Windows Server Hardening Best Practices
- Threat Intelligence & Attribution Best Practices: Threat Intelligence Concepts
- Malware Removal: Remediating an Infected System
- Malware Removal: Analyzing an Infected System
- Threat Intelligence & Attribution Best Practices: Attribution Analysis
- CyberOps Windows Hardening: Windows Workstation Hardening Best Practices
- Final Exam: Security Threat Intelligence
- Network Survey & Extraction: Network Analysis
- Network Survey & Extraction: Network Monitoring
- Network & Host Analysis: Network Observations
- Malware Removal: Identifying Malware Types & Classification Approaches
- Security Programming: Scripting Essentials
- Forensic Analysis: Cybercrime Investigations
- Malware Removal: Reporting Findings & Preventing Future Infections
- Security Programming: Code Identification
- Security Programming: System Essentials
- Network & Host Analysis: Network Protocols
- Day 10
- Day 8
- Introduction to Cyber Operations
- Security Programming: Command Line Essentials
- CompTIA Cloud Essentials+: Essential Cloud Networking
- Updating to Server 2019: Server Configuration
- End-User Security: The End-User Perspective
- CompTIA A+ 220-1001: Network Types
- CompTIA A+ 220-1001: Network Hosts
- CompTIA Network+: Registered Ports
- Troubleshooting
- HTTP Requests with HTTPX: Advanced Topics
- CompTIA Network+: Physical Security & Network Hardening
- Using Screenshot Tools in Windows 10
- CompTIA Network+: Network Operations
- CompTIA Network+: Disaster Recovery & High Availability Concepts
- CompTIA A+ Core 2: Desktop, Server, & Mobile Operating Systems
- CompTIA A+ Core 2: Operating System & Network Management
- Day 3
- Day 2
- Day 4
- Operating Systems
- Peripherals
- OS Navigation
- Microsoft Azure Fundamentals: Cloud Computing
- CompTIA Network+: Well-known Ports & Protocols
- AWS Solutions Architect Associate 2022: AWS Cryptography & PKI
- Day 1
- CompTIA Network+: OSI Model Layers & Data Encapsulation
- CompTIA Network+: IP Addressing Schemes and Subnetting
- Cloud Computing Fundamentals: Considerations
- Cloud Computing Fundamentals: Introduction
- Cloud Computing Fundamentals: Cloud Virtualization & Data Centers
- Computer Hardware
- Day 6
- Day 7
- CompTIA A+ 220-1001: Basic Cable Types
- Web App Vulnerability Analyst
- Day 5
- Tenable - Tech Foundations
- AWS Cloud Practitioner 2022: Cloud Deployment & Operation
- Day 4
- Day 3
- CompTIA A+ Core 2: Linux, macOS, & Windows File Systems
- Accessing and managing files in Windows 11
- Organizing & searching for files in Windows 11
- Day 1
- Day 2
- Patrick Neil Alcantara's Transcript
- Patrick Neil Alcantara's Wallet
- About Accredible