Site Map - skillsoft.digitalbadges.skillsoft.com
- User Authentication
- Sanjaykumar Ghinaiya's Credentials
- Sanjaykumar Ghinaiya's Wallet
- Cryptographic & Wireless Attacks
- Types of Malware
- The Present Threat Landscape
- Application & Service Attacks
- Social Engineering & Related Attacks
- Penetration Testing & Vulnerability Scanning
- Pen Testing for Software Development: The Penetration Testing Process
- PenTesting for Physical Security
- Wi-Fi Penetration Testing
- Pen Testing for Software Development: Penetration Testing SDLC, Team Structure, & Web Services
- CompTIA PenTest+: Post-Exploitation & Facilities Attacks
- CompTIA PenTest+: Penetration Testing Tools
- CompTIA PenTest+: Reporting & Communication
- CompTIA PenTest+: Analyzing Tool & Script Output
- CompTIA PenTest+: Network-Based Exploits
- CompTIA PenTest+: Application-Based Vulnerabilities
- CompTIA PenTest+: Local Host Vulnerabilities
- CompTIA PenTest+: Social Engineering & Specialized System Attacks
- Certified Information Systems Auditor (CISA) 2019: Scenario-Based Practice
- CompTIA PenTest+: Information Gathering
- CompTIA PenTest+: Vulnerability Identification
- Certified Information Systems Auditor (CISA) 2019: Continuous Monitoring
- CompTIA PenTest+: Planning for an Engagement
- CompTIA PenTest+: Scoping an Engagement
- Certified Information Systems Auditor (CISA) 2019: Testing & Vulnerability
- Certified Information Systems Auditor (CISA) 2019: System Design & Analysis
- Certified Information Systems Auditor (CISA) 2019: BCP & Network Security
- Certified Information Systems Auditor (CISA) 2019: Digital Evidence Gathering
- Certified Information Systems Auditor (CISA) 2019: Data Storage & Malware
- Certified Information Systems Auditor (CISA) 2019: PKI & Data Protection
- Certified Information Systems Auditor (CISA) 2019: Virtualization & Cloud
- Certified Information Systems Auditor (CISA) 2019: Digital Asset Protection
- Certified Information Systems Auditor (CISA) 2019: Data Privacy & Risk
- Certified Information Systems Auditor (CISA) 2019: IT Management Frameworks
- Certified Information Systems Auditor (CISA) 2019: Performance & Management
- Certified Information Systems Auditor (CISA) 2019: IAM & Data Classification
- Configuring Enterprise-level Security
- Mobile Security Threat Mitigation
- Containers & Wrappers
- Certified Information Systems Auditor (CISA) 2019: Information System Auditing
- Mobile Device Security & Handling
- Infrastructure Security
- Mobile Security Threats
- Mobile Security Technologies
- Design Principles
- Designing with Flexibility & Efficiency in Mind
- Introduction To UI/UX
- How Blockchain Technology is Transforming Businesses
- Introduction to Digital Currency
- Bitcoin Technology Fundamentals
- Cloud Computing Fundamentals: Introduction
- Moving to the Cloud
- Embracing the Cloud for Business Efficiency
- Agile Programming & Testing
- Introduction to Agile Software Development
- Agile Software Development Methodologies
- Agile Software Development - Scrum
- Management
- DevOps Agile Development: DevOps Methodologies for Developers
- The Language of DevOps: DevOps Principles & Practices
- DevOps Mindset: DevOps Principles & Implementation Approach
- Effective Edge Computing
- An Executive's Guide to Security: Understanding Security Threats
- Implementing an Automation Software Strategy
- Exploring Business Process Automation
- IT Infrastructure Automation: Getting Started
- Using Robots and RPA in the Workplace
- Exploring Virtual Reality: Introduction
- An Executive's Guide to Security: Protecting Your Information
- Creating Engagement with Virtual Reality
- Automation Design & Robotics
- Using Augmented Reality for Organizational Gains
- Connecting with the Internet of Things
- Data Science Overview
- Exploring Data Visualization
- Big Data Interpretation
- Internet of Things Hardware
- Harnessing the Power of Data Science for Business Growth
- Applying Predictive Analytics
- Getting Started with Machine Learning
- Machine Learning
- Internet of Things Applications
- Introduction to Artificial Intelligence
- Transforming the Workplace Using Artificial Intelligence
- Artificial Intelligence: Basic AI Theory
- Planning an Effective Mobile App Strategy
- Tips & Tricks for Developing Secure Mobile Apps
- The Art of Staying Focused
- Defensive Coding Fundamentals for C#
- Sanjaykumar Ghinaiya's Transcript
- Sanjaykumar Ghinaiya's Wallet
- About Accredible