Site Map - skillsoft.digitalbadges.skillsoft.com
- User Authentication
- Samuel Chen's Credentials
- Samuel Chen's Wallet
- CEH v12: Malware, Threats, Trojans, and Viruses
- AI in IT Automation: Integrating AI Automation in IT Operations
- CEH v12: AD Enumeration, Mimikatz, and Pivoting Techniques
- CEH v12: Steganography and Avoiding Detection
- CEH v12: Buffer Overflows, Privilege Escalation, and System Access
- CEH v12: Passwords Attacks, Extraction, and Cracking
- CEH v12: Windows Authentication
- CEH v12: Vulnerability Assessment Types, Models, Tools, and Reports
- CEH v12: Vulnerability Assessment, Management, and Classification
- CEH v12: NTP, NFS, SMTP, and FTP Enumeration
- CEH v12: NetBIOS, SMB, SNMP, and LDAP Enumeration
- CEH v12: Scan Optimization, OS Identification, and IDS/Firewall Evasion
- CEH v12: Nmap IDLE IPID, UDP, and SCTP Scans
- CEH v12: Network Scanning, TCP, Host Discovery, and Port/Service Scanning
- CEH v12: Nmap TCP Scans
- CEH v12: Footprinting and Social Engineering Recon and Countermeasures
- CEH v12: Recon Tools and Tactics
- CEH v12: Footprinting, Google Dorks, Search Engines, and Subdomains
- CEH v12: Hacking Methodology, MITRE ATT&CK Framework, and Diamond Model
- CEH v12: Incident Management, ML, AI, and Regulations
- CEH v12: Risk Management, Cyber Threat Intelligence, and Threat Modeling
- CEH v12: Cyber Kill Chain, TTPs, Behaviors, and Threat Hunting
- CEH v12: Cybersecurity Concepts, Attacks, and Information Warfare
- Generative AI Foundations: Ethical & Responsible Use of AI in IT
- CompTIA Security+ Crash Course Bootcamp (April/May2024): Session 1 Replay
- Generative AI Foundations: Advanced Generative AI Techniques for IT
- Generative AI Foundations: IT Integration with Generative AI
- Developing an AI/ML Data Strategy: The Data Analytics Maturity Model
- Track 1: Fundamentals of AI and ML
- Fundamentals of AI & ML: Metrics & Evaluation
- Fundamentals of AI & ML: Introduction to Artificial Intelligence
- Fundamentals of AI & ML: Foundational Data Science Methods
- Fundamentals of AI & ML: Advanced Data Science Methods
- Track 2: Mastering Power BI Service and Power Query
- Final Exam: Mastering Power BI Service and Power Query
- Using the Power BI Mobile App
- Working with Scorecards, Dashboards, & Paginated Reports in Power BI
- Getting Started with the Power BI Service
- CompTIA Security+: Fundamental Security Concepts
- Leading through Change
- Generative AI and Its Impact to Everyday Business
- Lean Tools and FMEA
- Becoming Authentic, Accountable, and Trustworthy
- Performing Joins Using Merge Queries in Power BI
- Why Innovation Depends on Intellectual Honesty, powered by MIT SMR
- How Temporary Assignments Boost Innovation, powered by MIT SMR
- Getting Started with Power Query in Power BI
- Leadership Insights on Leading Innovation
- Leading Innovation
- Innovating with the Customer in Mind
- Welcome to the Skillsoft Leadership Development Program
- Data Loading & Visualization in Power BI: Advanced Visualizations
- Track 1: From Data Loading to Stunning Visualizations
- Final Exam: From Data Loading to Stunning Visualization
- Data Loading & Visualization in Power BI: Data Modeling
- Data Loading & Visualization in Power BI: Loading Data from Cloud Storage
- Data Loading & Visualization in Power BI: Loading Data from Databases
- Data Loading & Visualization in Power BI: Getting Started
- Leadercamp on-demand: Intentional Work
- Comparing Manual & Automated Testing
- Selenium Deep Dive: Security Test Automation
- Leadercamp on-demand: Mastering the Art of Effective Communications
- Six Sigma: Quality Tools
- Software Testing Foundation 2018: Fundamentals
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Testing for Security & Quality Assurance
- Samuel Chen's Transcript
- Samuel Chen's Wallet
- About Accredible