Site Map - skillsoft.digitalbadges.skillsoft.com
- User Authentication
- Simona Barbagallo's Credentials
- Simona Barbagallo's Wallet
- Track 6: Introduction to Ethical Hacking
- Track 5: Risk Management
- Introduction to Cybersecurity
- Track 3: Cyber Attacks and Threat Actors
- Track 4: Personal Digital Security
- Track 1: Cybersecurity Standards, Regulations, and Frameworks
- Track 2: Cybersecurity Prerequisites
- Track 1: Applying AI to Threat Intelligence
- Track 2: Applying AI to Reconnaissance
- Track 3: Applying AI to Scanning & Enumeration
- Track 4: Applying AI to Generate Reports
- Track 5: Applying AI to Phishing Email
- Track 6: Applying AI to Network Discovery
- Track 7: Applying AI to SQL Injections
- Applying AI to Ethical Hacking
- Track 8: Applying AI to IoT
- Prompt Engineering: Cloud Computing & IoT Hacking in the Era of GenAI
- Prompt Engineering: Generative AI for Malware & Social Engineering
- Prompt Engineering: Web Application & Database Hacking in the Age of GenAI
- Prompt Engineering: GenAI’s Impact on Network & Perimeter Ethical Hacking
- Prompt Engineering: Mobile Platform Security in the GenAI Era
- Prompt Engineering: Generative AI for System Hacking
- Prompt Engineering: Covering Tracks with GenAI
- Prompt Engineering: Ethical Hacking & Generative AI Fusion
- Prompt Engineering: Generative AI for Reconnaissance
- Prompt Engineering: Generative AI for Scanning & Enumeration
- INE Certified Cloud Associate
- Cloud Platform Security: Incident Response & Remediation
- Cloud Platform Security: Platform & Infrastructure Security
- Cloud Platform Security: System Monitoring & Protection
- Cloud Platform Security: Infrastructure Protection
- Cloud Platform Security: Designing Secure Access
- Pen Testing for Software Development: The Penetration Testing Process
- Junior Penetration Tester
- Securing AWS: Infrastructure Security
- Securing AWS: Data Protection
- Generative AI APIs for Practical Applications: An Introduction
- Artificial Intelligence and Machine Learning
- Securing AWS: Identity & Access Management
- Cloud Security Management: Legal & Compliance
- Cloud Security Management: Platform & Infrastructure Security
- Cloud Security Management: Risk Management
- Securing AWS: Fundamentals
- Network Security Specialist
- Cloud Security Management: Data Security
- Cloud Security Management: Operations Security
- Final Exam: Network Security Specialist
- Cloud Security Administration: Cloud Data & Application Security
- Cloud Security Administration: Introduction
- Cloud Security Administration: Continuous Operational Improvement
- Cloud Security Administration: Regulatory Conformance
- Cloud Security Administration: Infrastructure Planning
- Cloud Security Administration: Hardened Cloud Security
- Business Continuity: Secure Cloud Computing
- Cloud Security Management: Architecture Security
- Cloud Management
- CompTIA PenTest+: Information Gathering
- CompTIA PenTest+: Planning for an Engagement
- CompTIA PenTest+: Scoping an Engagement
- Business Continuity: Cloud Integration
- Important DevSecOps Tools
- Cloud Security Fundamentals: Architectural & Design Concepts
- Cloud Security Fundamentals: Cloud Data Security
- Cloud Security Fundamentals: Cloud Application Security
- Cloud Services: Cloud Computing Concepts
- Cloud Security Fundamentals: Legal & Compliance
- Cloud Security Fundamentals: Cloud Infrastructure Security
- Cloud Security Fundamentals: Basics of Cloud Operations
- Security Analyst to Security Architect
- Security Architect
- Final Exam: Security Architect
- Mitigating Security Risks: Managing Network & Infrastructure Security Risks
- Vulnerability Analyst
- Security Incident Triage
- Security Program Regulatory Integration
- Data Security Breach Notification Process
- Unified Security: Playbook Approach to Security
- Final Exam: Vulnerability Analyst
- Intelligent Orchestration: Automating Security Incident Processing
- Authentication & Encryption: Best Practices
- Incident Tracking & Response
- Security Architect: Ethical Hacking Best Practices
- Security Rules: Rules of Engagement
- Security Architect: Secure Coding Concepts
- Defensible Security
- Security Topologies: Developing Secure Networks
- Forensics Analyst
- Final Exam: Forensics Analyst
- Intrusion Detection: Best Practices
- Intrusion Prevention: Best Practices
- Cryptography: Introduction to Cryptography Services
- Security Vulnerabilities: Managing Threats & Vulnerabilities
- Cryptography: Introduction to PKI
- Cyber Security Audits
- Security Analyst
- Security Software Assessments
- Digital Forensic Techniques & Investigative Approaches
- End-User Security: Securing End Users against Attackers
- Risk Analysis: Security Risk Management
- End-User Security: The Security Administrator Perspective
- Anomaly Detection: Aspects of Anomaly Detection
- Anomaly Detection: Network Anomaly Detection
- Ethics & Privacy: Digital Forensics
- End-User Security: The End-User Perspective
- Final Exam: Security Analyst
- Information Security: Honeypots
- Information Security: Continual Infrastructure Testing
- Information Security: Securing Networking Protocols
- Information Security: Security Governance
- Information Security: Hardened Security Topologies
- An Executive's Guide to Security: Understanding Security Threats
- Information Security: APT Defenses
- Information Security: Subnetting & DNS for Security Architects
- Information Security: NACs & Gateways
- Information Security: Pen Testing
- An Executive's Guide to Security: Protecting Your Information
- Auditing & Incident Response
- Session & Risk Management
- Cryptographic Methods
- Data Access & Governance Policies: Data Classification, Encryption, & Monitoring
- Cybersecurity and Networking Fundamentals
- CompTIA Server+: Data Privacy & Protection
- Simona Barbagallo's Transcript
- Simona Barbagallo's Wallet
- About Accredible