Site Map - skillsoft.digitalbadges.skillsoft.com
- User Authentication
- Shashank Jha's Credentials
- Shashank Jha's Wallet
- Pen Testing: End-user Behavior
- CEH v12: Cyber Kill Chain, TTPs, Behaviors, and Threat Hunting
- Data Access & Governance Policies: Data Classification, Encryption, & Monitoring
- OWASP: Web Application Security
- CISM 2022: Incident Response
- CRISC 2023: SIEM & SOAR
- CEH v12: Malware, Threats, Trojans, and Viruses
- Generative AI APIs for Practical Applications: An Introduction
- Artificial Intelligence and Machine Learning
- OWASP Top 10: A03:2021-Injection
- CRISC 2023: Attack Mitigations
- CEH v11: Cybersecurity Basics, Attacks & Information Warfare
- Security Programming: System Essentials
- Ports, Protocols, & the OSI Model
- Communication and Web Protocols
- CompTIA Server+: Server Components
- MD-102: Implementing Endpoint Security Baselines & Policies
- MD-102: Protecting Devices with Microsoft Defender for Endpoint
- Data Models & Pivot Reports
- Searching for Data & Saving Reports
- CISM 2020: IT Security Policies
- Cybersecurity Awareness: Information Security Fundamentals
- Splunk: Getting Started
- ITIL® 4 Foundation: Key Concepts of Service Management
- ITIL® 4 Foundation: Introduction
- Shashank Jha's Transcript
- Shashank Jha's Wallet
- About Accredible