Site Map - skillsoft.digitalbadges.skillsoft.com
- User Authentication
- Souvik Mondal's Credentials
- Souvik Mondal's Wallet
- AWS Cloud Practitioner Bootcamp: Session 1 Replay
- Pen Testing for Software Development: Penetration Testing SDLC, Team Structure, & Web Services
- Pen Testing for Software Development: The Penetration Testing Process
- CompTIA PenTest+: Penetration Testing Tools
- CEH v11: Risk Management, Cyber Threat Intelligence & Threat Modeling
- The Art of Staying Focused
- OWASP Top 10: A3 - Sensitive Data Exposure
- OWASP Top 10: A5 - Broken Access Control
- OWASP Top 10: A10 - Insufficient Logging & Monitoring
- OWASP Top 10: Discovering & Exploiting Web App Vulnerabilities
- OWASP Top 10: A2 - Broken Authentication
- OWASP Top 10: A4 - XML External Entities
- OWASP Top 10: A6 - Security Misconfiguration
- OWASP Top 10: A9 - Using Components with Known Vulnerabilities
- OWASP Top 10: A1 - Injection
- OWASP Top 10: Web Application Security
- OWASP Top 10: A8 - Insecure Deserialization
- OWASP Top 10: A7 - Cross-site Scripting
- Programming in C#: Debugging & Security Implementation
- Programming in C#: Manipulating & Retrieving Data
- Programming in C#: Managing Multithreading
- Programming in C#: Memory Management & String Operations
- Programming in C#: Implementing Data Access
- Programming in C#: Creating Types
- Programming in C#: Using Types
- Programming in C#: IO Operations
- Programming in C#: Managing Program Flow
- Expert Insights on Email Productivity
- Organizing Your E-mail
- Sending E-mails to the Right People
- Getting Email Right Series
- Writing Effective E-mails and Instant Messages
- Souvik Mondal's Transcript
- Souvik Mondal's Wallet
- About Accredible