Site Map - skillsoft.digitalbadges.skillsoft.com
- User Authentication
- Sandeep Sandwal's Credentials
- Sandeep Sandwal's Wallet
- CompTIA Security+: Identity and Access Management
- CompTIA Security+: Enterprise Security Capabilities
- CompTIA Security+: Security Monitoring & Alerting
- CompTIA Security+: Vulnerability Management
- CompTIA Security+: Computing Resources Security Techniques
- CompTIA Security+: Resilience & Recovery
- CompTIA Security+: Data Protection Concepts & Strategies
- CompTIA Security+: Enterprise Infrastructure Security Principles
- CompTIA Security+: Architecture & Infrastructure Concepts
- CompTIA Security+: Mitigation Techniques
- CompTIA Security+: Survey of Malicious Activities
- CompTIA Security+: Threat Actors & Vectors
- CompTIA Security+: Practical Cryptography
- CompTIA Security+: Fundamental Security Concepts
- CompTIA Security+: Security Goals & Controls
- Clarity and Conciseness in Business Writing
- Using the Parts of Speech
- Using Punctuation Marks
- Sending E-mails to the Right People
- Abbreviating, Capitalizing, and Using Numbers
- Organizing Your E-mail
- Audience and Purpose in Business Writing
- Writing Effective E-mails and Instant Messages
- Improving Your Technical Writing Skills
- Expert Insights on Email Productivity
- Getting Email Right Series
- Do We Have A Failure to Communicate?
- Opening & Setting Up in Word 2019 for Windows
- Release, Service Level, and Availability Management
- Service Desk, IT Asset, Service Configuration, and Change Control Management
- Event, Incident, and Problem Management
- The Service Value Chain and General Management Practices
- ITIL® Continual Service Improvement
- The Guiding Principles of the Service Value System and Continual Improvement Model
- ITIL® Service Operation Concepts
- ITIL® Service Operation Processes
- ITIL® Service Transition Concepts and Processes
- Key Concepts and the Four Dimensions of Service Management
- ITIL® Service Design Processes
- ITIL® Service Strategy Processes
- ITIL® Service Design Concepts
- ITIL® Service Strategy Concepts
- Overview of the ITIL® Service Lifecycle
- Account Changes & Attack Mitigation
- Logon, Logoff & Password Policies
- Understanding Attacks & Prevention Practices
- Authorization & Registration
- Secure Corporate Communications & Networking
- Using Corporate Devices Securely
- An Executive's Guide to Security: Protecting Your Information
- IT Security Fundamentals
- Defining Cryptography
- GCP Engineering & Streaming Architecture
- ITIL® 4 Foundation: The Service Value Chain
- Agile Hybrid Approaches
- Value-driven Delivery: Delivering Value in Agile Projects
- Business Orientation: Strategic Organizational Goals
- Business Strategy: Managing Organizational Value
- Advanced Scrum for Project Management
- Project Management: Scrum Framework for Software Development
- Introduction to the Agile Principles and Mindset Bootcamp: Session 1 Replay
- Agile Software Development: Agile Project Management Techniques
- Agile Software Development: Agile Development Life Cycle
- Agile Project Scheduling and Monitoring
- Agile for Software Development: Lean, Agile, & Scrum Methodologies
- Agile Stakeholder Engagement and Team Development
- Agile Project Planning
- Agile Principles and Methodologies
- ITIL® 4 Foundation: Service Management Practices (Part 2)
- ITIL® 4 Foundation: The Service Value Chain
- ITIL® 4 Foundation: General Management Practices
- ITIL® 4 Foundation: The Service Value System
- ITIL® 4 Foundation: Service Management Practices (Part 1)
- ITIL® 4 Foundation: The Guiding Principles
- ITIL® 4 Foundation: Introduction
- ITIL® 4 Foundation: Key Concepts of Service Management
- ITIL® 4 Foundation: Key Concepts
- Operations Management
- Need for Design Patterns & the Principles Guiding Design Patterns
- Navigation and Layout
- Risk Management & Outsourcing Design
- Prototyping Design Thinking
- Secure Cloud Computing & Trusted Cloud Services
- Secure Application Architecture & IAM
- Security Architecture
- Enterprise Architecture Basics
- Enterprise Architecture Planning & Implementation
- Legal Requirements & Compliance
- Design Principles
- Designing with Flexibility & Efficiency in Mind
- Design Guidelines and Patterns
- Design Thinking for Microservices
- Data Rights Management, Policies, & Event Tracing
- Data Center Design
- Service Oriented Architecture (SOA) Governance
- Current & Future Trends
- Content Framework
- Content Design
- Cloud Infrastructure & Risk Analysis
- Cloud Infrastructure Management
- Architectural Artifacts & the Enterprise Continuum
- Architecture Capability Basics
- Basic Concepts of a Microservices Architecture
- Techniques and Tools
- Microsoft Azure Administrator: Manage Azure AD Users
- Microsoft Azure Administrator: Monitoring Azure Resources
- Microsoft Azure Administrator: Managing Azure Storage Accounts
- Microsoft Azure Administrator: Managing Azure Files
- Microsoft Azure Administrator: Managing Azure Virtual Machines
- Microsoft Azure Administrator: Managing Azure Network Solutions
- Microsoft Azure Administrator: Azure Policies
- Microsoft Azure Administrator: Managing Azure Roles & Tags
- Microsoft Azure Administrator: Manage Azure AD Subscriptions and Costs
- Microsoft Azure Administrator: Azure App Service & Batch Jobs
- Microsoft Azure Administrator: Manage Azure AD Groups & Devices
- Microsoft Azure Administrator: Managing Azure DNS & Network Security
- Machine Learning with TensorFlow & Cloud ML
- Streaming Pipelines & Analytics
- GCP Big Data & Security
- Fundamentals of Big Query
- APIs & Machine Learning
- Microsoft Azure Administrator: Availability Solutions
- Storage & Analytics
- Dataproc Architecture
- GCP Network Data Processing Models
- Deeper through GCP Analytics & Scaling
- Dataproc
- Dataproc Operations
- Implementations with BigQuery for Big Data
- Platform Fundamentals
- Cryptography: Introduction to PKI
- Cryptography: Introduction to Cryptography Services
- Application Security Awareness & Validation
- An Executive's Guide to Security: Understanding Security Threats
- Session & Risk Management
- Auditing & Incident Response
- CompTIA Cybersecurity Analyst+: Threat Mitigation
- CompTIA Cybersecurity Analyst+: Threat Management Documentation
- CompTIA Cybersecurity Analyst+: Threat Management Incident Planning & Response
- CompTIA Cybersecurity Analyst+: Network Reconnaissance & Security Policies
- CompTIA Cybersecurity Analyst+: Protecting Network Resources
- CompTIA Cybersecurity Analyst+: Malware & Digital Forensics
- CompTIA Cybersecurity Analyst+: Identifying & Reducing Vulnerabilities
- CompTIA Cybersecurity Analyst+: Exploits & Security Practices
- CompTIA Cybersecurity Analyst+: Firewalls, IDS, & IPS
- AWS Associate Solution Architect: Building & Managing AWS Solutions
- AWS Associate Solution Architect: Optimizing Compute Resources
- AWS Associate Solution Architect: Managing AWS
- AWS Associate Solution Architect: Auto Scaling
- AWS Associate Solution Architect: Amazon Machine Images
- AWS Associate Solution Architect: Amazon CloudFront & Route 53
- AWS Associate Solution Architect: Optimizing Storage
- AWS Associate Solution Architect: Architecture Security
- AWS Associate Solution Architect: Virtual Private Cloud
- AWS Associate Solution Architect: Database Managed Services
- AWS Associate Solution Architect: Caching
- AWS Associate Solution Architect: Scalability & Elasticity
- AWS Associate Solution Architect: High Availability
- AWS Associate Solution Architect: Architecting for the Cloud
- AWS Associate Solution Architect: Storage Solutions
- AWS Associate Solution Architect: Loose Coupling
- AWS Associate Solution Architect: AWS Primer
- CompTIA Cybersecurity Analyst+: Cloud Computing
- CompTIA Cybersecurity Analyst+: Network Concepts
- IINS 3.0: IPsec & VPN
- Security Devices, Wireless Security, & Access Control
- Troubleshooting Common Network Service Issues
- Configuring Wired & Wireless Networks
- CompTIA Cybersecurity Analyst+: Monitoring Tools & Analytics
- Configuring Firewalls
- Cloud Data Security
- Creating & Configuring Network Shares
- CompTIA Cybersecurity Analyst+: Security Frameworks & Security Controls
- Security Controls & Business Continuity
- Fundamental Security Concepts
- Password Security Requirements
- Software Development Security & Life Cycle
- Business Impact Analysis & Risk Management
- Implementing a Secure Network Architecture
- Secure System, Application Design, & Deployment
- Incident Response, Forensics, Recovery, & Security Controls
- Policies, Plans, & Procedures
- Cloud Computing, Virtualization, & Resiliency
- Troubleshooting Common Security Issues
- Implementing Secure Protocols
- Identity & Access Management Controls
- Frameworks, Guidelines, & Physical Security
- Deploying Mobile Devices Securely
- Common Account Management Practices
- Identity & Access Services
- Wireless Security Settings
- Analyzing Output from Security Technologies
- CompTIA Security+: Cryptography
- Public Key Infrastructure
- Components Supporting Organizational Security
- Security Assessment Using Software Tools
- Impacts from Vulnerability Types
- Cryptographic & Wireless Attacks
- Penetration Testing & Vulnerability Scanning
- Application & Service Attacks
- The Present Threat Landscape
- Types of Malware
- Social Engineering & Related Attacks
- Sandeep Sandwal's Transcript
- Sandeep Sandwal's Wallet
- About Accredible