Site Map - skillsoft.digitalbadges.skillsoft.com
- User Authentication
- Syed Salman Muslim NAQVI's Credentials
- Syed Salman Muslim NAQVI's Wallet
- Certified in Cybersecurity (CC): Security Governance, Policies, & Controls
- Certified in Cybersecurity (CC): Incident Response
- Certified in Cybersecurity (CC): Business Continuity Planning
- Certified in Cybersecurity (CC): Logical Access Controls
- Certified in Cybersecurity (CC): Physical Access Controls
- Certified in Cybersecurity (CC): Present Threats & Network Security Controls
- Certified in Cybersecurity (CC): Data Security & System Hardening
- Certified in Cybersecurity (CC): Security Best Practices & Security Awareness
- CompTIA PenTest+: Passive Reconnaissance
- CompTIA PenTest+: Scoping & Engagement
- CompTIA PenTest+: Professionalism & Integrity
- Gaining Insight through Organizational Awareness
- Using Performance Appraisals to Advance Your Career
- CCSP 2022: Cloud Computing Concepts & Reference Architectures
- Module 4
- Module 4 - Launching your IT career opportunities
- Power Up: Turning on Your Self-starter Potential
- Developing a Plan to Further Your Career
- Getting Your Career on the Right Track
- Developing Your Business Acumen
- SCOR: Security Vulnerabilities, Attack Mitigations, & Cryptographic Solutions
- SCOR: PKI & IKE
- Getting Started with Machine Learning
- How Blockchain Technology is Transforming Businesses
- Connecting with the Internet of Things
- SCOR: Security Basics & Common Threats
- Module 3
- Module 3 - Emerging Technologies and IT Career Pathways
- Agile Principles and Methodologies
- Building and Training the Project Team (2021 Update)
- New Project Manager Essentials
- Boot Process
- Installation
- File Systems & Partitions
- Kickstart & First-run Issues
- Logical Volume Management
- Virtualization
- Troubleshooting
- SELinux
- Remote Access
- Network Services
- Network File Systems
- Firewalls
- Directory Services
- Job Scheduling
- Networking
- Logging
- Processes, Services, & Daemons
- Bash Script Programming
- Using grep
- File Permissions
- Using Linux Shells
- Bash Scripting
- Package Management
- User & Group Management
- Archiving
- File Management
- Using the Bash Shell
- Cultivating Cross-functional Team Collaboration
- Enabling Business-IT Collaboration and Strategic Alignment
- Strategies for Managing Technical Teams
- Configuring Gnome
- Module 2
- Module 2 - Navigating IT Careers and Professional Environments
- CEH v12: Risk Management, Cyber Threat Intelligence, and Threat Modeling
- CEH v12: Hacking Methodology, MITRE ATT&CK Framework, and Diamond Model
- CEH v12: Network Scanning, TCP, Host Discovery, and Port/Service Scanning
- Building Digital Dexterity in Organizations
- Certified in Cybersecurity (CC): Core Security Principles & Risk Management
- Certified in Cybersecurity (CC): Networking & Security Infrastructure
- Developing Diplomacy and Tact
- Becoming a Continuous Learner
- Contributing as a Virtual Team Member
- Facing Virtual Team Challenges
- Synchronize Goals to Optimize Your Team
- Building Customer Relationships in a Virtual Environment
- Building Trust with Business Ethics
- Learning from Failure and Success
- Module 1 - Setting up your Individual & Team Learnings
- Module 1
- Syed Salman Muslim NAQVI's Transcript
- Syed Salman Muslim NAQVI's Wallet
- About Accredible