Site Map - skillsoft.digitalbadges.skillsoft.com
- User Authentication
- Sameer Nasafi's Credentials
- Sameer Nasafi's Wallet
- Windows Client: Windows Security Management
- CompTIA A+ Core 1: Wireless Networking & Services
- CompTIA A+ Core 1: Networking Fundamentals
- CompTIA A+ Core 1: Installing Hardware & Display Components
- CompTIA A+ Core 1: Mobile Device Accessories & Network Connectivity
- Authentication & Security
- CompTIA Project+: Time Management for Efficient Project Scheduling
- Hadoop on Amazon EMR
- Generative AI and Its Impact to Everyday Business
- Discovering Copilot for Windows 11
- System Center Configuration Manager Introduction & Planning
- Installing System Center Configuration
- DPM Introduction
- Mobile Security Threats
- Splunk: Getting Started
- Leveraging AI as a Team Member
- Technical Program Management: An Introduction
- CCNA 2024: Network Management - Automation, Controller-Based Networking, and AI
- CCNA 2024: Network Programmability - REST APIs, Ansible, Terraform, and JSON
- CCNA 2024: Network Security - Access Control Lists (ACLs)
- CCNA 2024: Network Security - Layer 2 and Wireless LAN Mechanisms
- CCNA 2024: Discovery, Aggregation, and Trunking Protocols
- CCNA 2024: Network Management Connections
- CCNA 2024: Wireless Network Architectures and Configurations
- CCNA 2024: Routing Table Components and Forwarding Decisions
- CCNA 2024: Static Routing Configuration
- CCNA 2024: OSPF and First Hop Redundancy Protocols
- CCNA 2024: Spanning Tree Protocol (STP)
- CCNA 2024: Introducing DHCP and DNS
- CCNA 2024: Network Address Translation (NAT)
- CCNA 2024: Enterprise Security Fundamentals
- CCNA 2024: IP Services - SSH, FTP, & TFTP
- CCNA 2024: IP Services - QoS, NTP, SNMP, Syslog
- CCNA 2024: Network Security - VPNs, AAA, and Password Protection
- Release, Service Level, and Availability Management
- CCNA 2024: Network Topologies and Media
- CCNA 2024: Overview of Networking Components
- CCNA 2024: TCP/IP Protocols and IPv4 Addressing
- CCNA 2024: Devices Management Using Cisco IOS
- CCNA 2024: IP Subnetting and Addressing Techniques
- CCNA 2024: Wireless Principles and Securing Wireless Networks
- CCNA 2024: Basic Switching Concepts and Introducing VLANs
- CCNA 2024: Configuring Access and Trunk Ports
- CCNA 2024: IPv6 Addressing and Verifying IP Parameters
- CCNA 2024: Server Virtualization, Containers, and VRFs
- Service Manager
- Customer Service: Engaging with Customers
- Customer Service: Generating Effective Solutions
- Customer Service: Strengthening Your Service Skills
- Event, Incident, and Problem Management
- Service Desk, IT Asset, Service Configuration, and Change Control Management
- Providing a Great Customer Experience
- Key Concepts and the Four Dimensions of Service Management
- The Guiding Principles of the Service Value System and Continual Improvement Model
- ITIL® 4 Foundation: Service Management Practices (Part 2)
- ITIL® 4 Foundation: Key Concepts of Service Management
- ITIL® 4 Foundation: Service Management Practices (Part 1)
- ITIL® 4 Foundation: Key Concepts
- ITIL® 4 Foundation: Introduction
- CompTIA Cybersecurity Analyst+: Threat Intelligence Information
- CompTIA Cloud Essentials+: Essential Cloud Principles
- Certified in Cybersecurity (CC): Networking & Security Infrastructure
- Certified in Cybersecurity (CC): Present Threats & Network Security Controls
- Certified in Cybersecurity (CC): Data Security & System Hardening
- Certified in Cybersecurity (CC): Security Best Practices & Security Awareness
- Certified in Cybersecurity (CC): Security Governance, Policies, & Controls
- Certified in Cybersecurity (CC): Core Security Principles & Risk Management
- Certified in Cybersecurity (CC): Business Continuity Planning
- Certified in Cybersecurity (CC): Logical Access Controls
- Certified in Cybersecurity (CC): Physical Access Controls
- Introduction to Microsoft 365 and Cloud Concepts
- CompTIA Cloud+: Cloud Security Best Practices
- CEH v12: IoT Threats, Vulnerabilities, Attack Tools, and Countermeasures
- CEH v12: Cloud Computing, Containers, Hacking, and Security Controls
- CEH v12: PKI, Cryptanalysis, and Attack Countermeasures
- CEH v12: Cryptography, Algorithms, Implementations, and Tools
- CEH v12: Operational Technology Concepts, Attack Tools, and Countermeasures
- CEH v12: IDOR Attacks, File Inclusion Attacks, Web APIs, and Webhooks
- CEH v12: Web App Hacking Methodology, CSRF Attacks, and Input Filter Evasion
- CEH v12: SQL Injection Concepts and Attacks
- CEH v12: SQL Injection and SQLMap
- CEH v12: Wireless Hacking and Countermeasures
- CEH v12: Mobile Hacking, OS Security, and Device Management
- CEH v12: Wireless Concepts, Threats, and Hacking Tools
- CEH v12: Hijacking Concepts and Countermeasures
- CEH v12: App Layer Attacks, Botnets, and DoS Countermeasures
- CEH v12: Intrusion Detection and Prevention, Firewalls, and Honeypots
- CEH v12: DoS, DDoS, Volumetric, and Protocol Attacks
- CEH v12: Web Server Hacking, Attacks, and Attack Methodologies
- CEH v12: Web Application Attacks and Vulnerabilities
- CEH v12: Steganography and Avoiding Detection
- CEH v12: AD Enumeration, Mimikatz, and Pivoting Techniques
- CEH v12: Malware, Threats, Trojans, and Viruses
- CEH v12: Sniffing and Poisoning
- CEH v12: Social Engineering, Insider Threats, and Identity Theft
- CEH v12: Fileless Malware, Malware Analysis, and Countermeasures
- CEH v12: Vulnerability Assessment Types, Models, Tools, and Reports
- CEH v12: Buffer Overflows, Privilege Escalation, and System Access
- CEH v12: Passwords Attacks, Extraction, and Cracking
- CEH v12: Windows Authentication
- CEH v12: Vulnerability Assessment, Management, and Classification
- CEH v12: NTP, NFS, SMTP, and FTP Enumeration
- CEH v12: NetBIOS, SMB, SNMP, and LDAP Enumeration
- CEH v12: Footprinting and Social Engineering Recon and Countermeasures
- CEH v12: Network Scanning, TCP, Host Discovery, and Port/Service Scanning
- CEH v12: Nmap IDLE IPID, UDP, and SCTP Scans
- CEH v12: Nmap TCP Scans
- CEH v12: Scan Optimization, OS Identification, and IDS/Firewall Evasion
- Certified in Cybersecurity (CC): Incident Response
- CEH v12: Cyber Kill Chain, TTPs, Behaviors, and Threat Hunting
- CEH v12: Incident Management, ML, AI, and Regulations
- CEH v12: Risk Management, Cyber Threat Intelligence, and Threat Modeling
- CEH v12: Hacking Methodology, MITRE ATT&CK Framework, and Diamond Model
- CEH v12: Footprinting, Google Dorks, Search Engines, and Subdomains
- CEH v12: Recon Tools and Tactics
- CBROPS: Incident Response, Security Management, & Analysis
- CBROPS: Security Events, Firewall Operations, & Traffic Analysis
- CBROPS: File Extraction, Event Artifacts, & Regular Expressions
- CBROPS: Protected Data, Profiling, Forensics, & IRP
- CEH v12: Cybersecurity Concepts, Attacks, and Information Warfare
- CBROPS: Log Evidence, Disk Images, & Malware Analysis Output
- CBROPS: Host-based Analysis & the Role of Attribution
- CBROPS: CVSS, Deployments, Access Control, & Data Visibility
- CBROPS: Firewall, Filtering, Visibility, & Control Data
- CBROPS: Social Engineering, Evasion, Obfuscation, & Certificates
- CBROPS: Attack Surfaces, Vulnerability, & Analysis Tools
- CBROPS: Data Loss, Host Isolation, & Detection Methods
- CBROPS: Data & Attack Types
- CBROPS: The CIA Triad & Security Approaches
- CBROPS: Threat Actors, Security, & Risk Management
- Sameer Nasafi's Transcript
- Sameer Nasafi's Wallet
- About Accredible