Site Map - skillsoft.digitalbadges.skillsoft.com
- User Authentication
- Shaurya Srivastava's Credentials
- Shaurya Srivastava's Wallet
- CompTIA Security+: Audits, Assessments, & Awareness
- Ethical Hacker: Overview & Threats
- PenTesting for Physical Security
- Wi-Fi Penetration Testing
- CompTIA PenTest+: Reporting & Communication
- Ethical Hacker: Security Controls Part 2
- CompTIA PenTest+: Analyzing Tool & Output
- Pen Testing for Software Development: The Penetration Testing Process
- Pen Testing for Software Development: Penetration Testing SDLC, Team Structure, & Web Services
- CompTIA PenTest+: Post-Exploitation & Facilities Attacks
- CompTIA PenTest+: Penetration Testing Tools
- Customer Service: Interpreting Customers’ Service Priorities
- CompTIA PenTest+: Network-Based Exploits
- CompTIA PenTest+: Application-Based Vulnerabilities
- CompTIA PenTest+: Information Gathering
- CompTIA PenTest+: Vulnerability Identification
- CompTIA PenTest+: Local Host Vulnerabilities
- CompTIA PenTest+: Social Engineering & Specialized System Attacks
- CompTIA PenTest+: Scoping an Engagement
- Final Exam: Cloud Computing for Decision-makers
- Track 1: Cloud Computing for Decision-makers
- Cloud Computing for Decision-makers and Leaders
- CompTIA PenTest+: Planning for an Engagement
- Cloud Security Administration: Cloud Data & Application Security
- Cloud Security Administration: Introduction
- Cloud Security Administration: Continuous Operational Improvement
- Cloud Security Administration: Infrastructure Planning
- Cloud Security Administration: Hardened Cloud Security
- Cloud Computing Fundamentals: Risk Management
- Cloud Security Administration: Regulatory Conformance
- CompTIA Cybersecurity Analyst+: Digital Forensics
- Pen Testing: End-user Behavior
- Security Incident Triage
- Pen Testing Awareness: Results Management
- Microsoft 365 Mobility & Security: Auditing
- Microsoft 365 Mobility & Security: Windows Defender Threat Protection
- Certified Information Systems Auditor (CISA) 2019: Continuous Monitoring
- CompTIA Cybersecurity Analyst+: Malware & Digital Forensics
- Penetration Testing Fundamentals
- Governance, Risk Management, and Compliance
- DevOps- More Than Just Dev & Ops
- Cloud Computing Fundamentals: Presence & Privacy
- Cloud Security Fundamentals: Legal & Compliance
- Access Control and Security Architecture Design
- Cloud Computing for Decision-makers: Cloud Adoption
- Security Risks: Performing Security Risk Assessments
- Software Engineering, Security and Vulnerabilities
- Cloud Value Proposition: Amazon Web Services for Decision Makers
- Cloud Value Proposition: Google Cloud Platform for Decision Makers
- Cloud Value Proposition: Microsoft Azure for Decision Makers
- Cloud Security, Risk, and Compliance: Managing Security in the Cloud Era
- Cloud Security, Risk, and Compliance: Risk & Compliance in the Cloud Era
- Social Engineering Threats and Prevention
- Business Transformation Through IT: Cloud Computing for Decision Makers
- Defining Cloud Computing for Decision-makers: Cloud Computing Principles
- Defining Cloud Computing for Decision-makers: Cloud Business Model
- Business Value of the Cloud: The Cloud Computing Value Proposition
- Business Value of the Cloud: Cloud Computing Case Studies
- Business Value of the Cloud: How the Cloud Impacts our Work
- Cloud Value Proposition: Major Cloud Players
- CompTIA Security+: Basic Cryptography & Public Key Infrastructure
- CompTIA Security+: Incident Response, Digital Forensics, & Supporting Investigations
- CompTIA Security+: Security Policies, Regulations, Standards, & Frameworks
- Leveraging the Power of Analogical Thinking
- CompTIA Security+: Monitoring, Visibility, & Reporting
- CompTIA Security+: Wireless, Mobile, & Embedded Device Security
- CompTIA Security+: Risk Management, Privacy, & Sensitive Data Security
- CompTIA Security+: Authentication & Authorization Design Concepts
- CompTIA Security+: Implementing Identity and Account Management & AAA Solutions
- CompTIA Security+: Organizational Security Assessment Tools & Mitigation Controls
- CompTIA Security+: Physical Security Controls
- CompTIA Security+: Implementing Secure Network Designs
- CompTIA Security+: Implementing Secure Protocols & Application Security Solutions
- CompTIA Security+: Controls & Application Development, Deployment, & Automation
- Outwitting Your Cognitive Bias
- Investigating Arguments
- Confronting Your Assumptions
- Reaching Sound Conclusions
- Critical Thinking: Challenging Assumptions
- Critical Thinking: Drawing Sound Conclusions
- Critical Thinking: Investigating Arguments
- Certified in Cybersecurity (CC): Security Governance, Policies, & Controls
- Certified in Cybersecurity (CC): Core Security Principles & Risk Management
- Certified in Cybersecurity (CC): Incident Response
- Certified in Cybersecurity (CC): Business Continuity Planning
- Certified in Cybersecurity (CC): Logical Access Controls
- Certified in Cybersecurity (CC): Physical Access Controls
- Certified in Cybersecurity (CC): Networking & Security Infrastructure
- Certified in Cybersecurity (CC): Present Threats & Network Security Controls
- Certified in Cybersecurity (CC): Data Security & System Hardening
- Certified in Cybersecurity (CC): Security Best Practices & Security Awareness
- Telling a Business Story
- CompTIA Security+: Analyzing Application & Network Attacks
- CompTIA Security+: Security Concepts in an Enterprise Environment
- CompTIA Security+: Threat Actors, Intelligence Sources, & Vulnerabilities
- CompTIA Security+: Implementing Cybersecurity Resilience
- CompTIA Security+: Virtualization, Cloud Computing, & Cloud Cybersecurity Solutions
- CompTIA Security+: Security Assessment & Penetration Testing Techniques
- Design Thinking for Innovation: Brainstorming and Ideation
- Design Thinking for Innovation: Defining Opportunities
- Design Thinking for Innovation: Prototyping and Testing
- Design Thinking for Microservices
- Prototyping Design Thinking
- Getting Started with Design Thinking
- CompTIA Security+: Social Engineering Techniques & Other Attack Types
- Design Thinking for Innovation: Stakeholder Engagement
- Maximize Your Productivity by Managing Time and Tasks
- Secure Programmer: Software Testing
- Make The Time You Need: Get Organized
- Aligning Goals and Priorities To Manage Time
- Cloud Security Fundamentals: Architectural & Design Concepts
- Cloud Security Fundamentals: Cloud Infrastructure Security
- Cloud Security Fundamentals: Basics of Cloud Operations
- Contributing as a Virtual Team Member
- Audience and Purpose in Business Writing
- Cloud Security Fundamentals: Cloud Data Security
- Cloud Security Fundamentals: Cloud Application Security
- Classifying and Collecting Data
- Editing and Proofreading Business Documents
- Improving Your Technical Writing Skills
- Vendor Management for Technology Professionals
- Network Security Threats and Their Impact
- Data Literacy for Business Professionals
- Achieving Digital Dexterity
- Being a Responsible Corporate Digital Citizen
- Embedding Data-driven Decisions into Organizational Culture
- Connecting with the Internet of Things
- Managing a Project to Minimize Risk and Maximize Quality
- Shaurya Srivastava's Transcript
- Shaurya Srivastava's Wallet
- About Accredible