Site Map - skillsoft.digitalbadges.skillsoft.com
- User Authentication
- Tejasvini Bhikundi's Credentials
- Tejasvini Bhikundi's Wallet
- Getting Started with Python: Introduction
- CCSP 2022: Cloud Security Concepts & Design Principles
- CCSP 2019: Identity & Access Management
- Leading Security Teams for GenAI Solutions: Use of Generative AI
- Responsible Use of AI
- Git & GitHub: Introduction
- Exploring Business Process Automation
- Automation Design & Robotics
- Automation
- Testing Methods
- Hybrid Environment Pipelines: Hybrid Cloud Transformation
- Being an Effective Team Member
- Effective Team Communication
- Identifying Risk (PMBOK® Guide Sixth Edition)
- Code Quality, Testing, & Development
- Software Design and Development: Design Patterns & SOLID Principles
- PRINCE2® Project Management Overview (2017 Update)
- Embracing Agile at Scale
- Agile Project Planning
- Generative AI APIs for Practical Applications: An Introduction
- Artificial Intelligence and Machine Learning
- Need for Design Patterns & the Principles Guiding Design Patterns
- Associate Cloud Engineer
- CompTIA Network+: Cloud Concepts
- CompTIA Network+: Network Services & Data Center Architectures
- CompTIA Network+: OSI Model Layers & Data Encapsulation
- CompTIA Network+: IP Addressing Schemes and Subnetting
- CompTIA Network+: Cables & Connectors
- CompTIA Network+: Well-known Ports & Protocols
- CompTIA Network+: Network Types
- CompTIA Network+: Registered Ports
- Ethical Hacker: Security Standards
- Ethical Hacker: Risk Assessment
- Ethical Hacker: Incident Response
- Ethical Hacker: Secure Technology & Applications
- Ethical Hacker: IoT Attacks
- Ethical Hacker: Cryptography Concepts
- Ethical Hacker: Cryptography Concepts Part 3
- Ethical Hacker: Password Attacks Part 2
- Ethical Hacker: Evading IDS, Firewall, & Honeypots Part 2
- Ethical Hacker: Evading IDS, Firewall, & Honeypots Part 3
- Ethical Hacker: Vulnerability Analysis Concepts & Tools
- Ethical Hacker: Social Engineering
- Ethical Hacker: Common Web App Threats Part 2
- Ethical Hacker: Denial of Service
- Ethical Hacker: Evading IDS, Firewall, & Honeypots
- Ethical Hacker: Wireless Hacking Common Threats
- Ethical Hacker: Wireless Hacking Concepts
- Ethical Hacker: Wireless Hacking Tools
- Ethical Hacker: Cracking & Mobile Hacking
- Ethical Hacker: IoT Concepts
- Ethical Hacker: Session Hijacking
- Ethical Hacker: Privilege Escalation
- Ethical Hacker: SQL Injection
- Ethical Hacker: IoT Hacking & Countermeasures
- Ethical Hacker: Cloud Computing Concepts
- Ethical Hacker: Common Web App Threats
- Ethical Hacker: Hacking Web Servers
- Ethical Hacker: SQL Injection Types & Tools
- Ethical Hacker: Cloud Computer Attacks
- Ethical Hacker: Cryptography Concepts Part 2
- Ethical Hacker: Cryptography Attacks
- Ethical Hacker: Practical Web App Hacking
- Ethical Hacker: Malware Threats
- Ethical Hacker: Account Creation
- Ethical Hacker: Footprinting
- Ethical Hacker: Host Discovery & Scanning with Nmap
- Ethical Hacker: Network Sniffing
- Ethical Hacker: ProxyChains & Enumeration
- Ethical Hacker: Security Controls Part 2
- Ethical Hacker: Pentesting, Laws, & Standards
- Ethical Hacker: Security Controls
- Ethical Hacker: Password Attacks
- Ethical Hacker: Malware Distribution
- Ethical Hacker: Covert Data Gathering
- Ethical Hacker: Hidden Files & Covering Tracks
- Ethical Hacker: Overview & Threats
- Ethical Hacker: Hacking Concepts
- Pen Testing: End-user Behavior
- Backup & Recovery: Business Continuity & Disaster Recovery
- Threat Intelligence & Attribution Best Practices: Threat Intelligence Concepts
- Cyber Security Audits
- Information Security Incident Management Part II
- Intelligent Orchestration: Automating Security Incident Processing
- Policy & Governance: Incident Response
- Security Incident Triage
- Information Security Incident Management Part I
- CompTIA Cybersecurity Analyst+: Threat Monitoring
- Data Access & Governance Policies: Data Classification, Encryption, & Monitoring
- Implementing Governance Strategies
- Data Compliance Issues & Strategies
- IINS 3.0: SIEM Technology & Security Terminology
- OWASP Top 10: A5 - Broken Access Control
- OWASP Top 10: A8 - Insecure Deserialization
- OWASP Top 10: A6 - Security Misconfiguration
- OWASP Top 10: A7 - Cross-site Scripting
- OWASP Top 10: A9 - Using Components with Known Vulnerabilities
- OWASP Top 10: A10 - Insufficient Logging & Monitoring
- OWASP Top 10: Discovering & Exploiting Web App Vulnerabilities
- OWASP Top 10: A1 - Injection
- OWASP Top 10: A2 - Broken Authentication
- OWASP Top 10: A4 - XML External Entities
- OWASP Top 10: Web Application Security
- OWASP Top 10: A3 - Sensitive Data Exposure
- Secure Corporate Communications & Networking
- Client & Email Security
- Using Corporate Devices Securely
- Networking Devices
- IT Security Fundamentals
- Integrating Security Controls for Host Devices
- Network Discovery Tools and Techniques
- SECFND: Endpoint Security
- Ports, Protocols, & the OSI Model
- Communication and Web Protocols
- Security Programming: System Essentials
- Writing Effective E-mails and Instant Messages
- CompTIA Security+: Virtualization, Cloud Computing, & Cloud Cybersecurity Solutions
- CompTIA Security+: Implementing Cybersecurity Resilience
- Disaster Recovery Planning & Backups
- Troubleshooting Security & Network Problems
- Troubleshooting Methodology
- Troubleshooting Storage, Software, & Networks
- CompTIA Security+: Security Concepts in an Enterprise Environment
- Ports, Protocols, & Cable Management
- CompTIA Security+: Analyzing Application & Network Attacks
- CompTIA Security+: Threat Actors, Intelligence Sources, & Vulnerabilities
- CompTIA Security+: Security Assessment & Penetration Testing Techniques
- CompTIA Security+: Social Engineering Techniques & Other Attack Types
- Server Policy, Planning, & Safety
- Introduction to Server RAID
- Networking & Disaster Recovery
- Server Maintenance, Protection, & VMs
- Server Management & Maintenance
- Introduction to Server Storage
- Introduction to Server Architecture
- Introduction to Server Administration
- Introduction to Server Security
- ITIL® 4 Foundation: Service Management Practices (Part 2)
- ITIL® 4 Foundation: Service Management Practices (Part 1)
- Application Security Awareness & Validation
- Secure Application Architecture & IAM
- API Security
- Cloud Computing Fundamentals: Introduction
- Using Kanban in IT & Software Development
- Jenkins for DevOps: Jenkins Configuration for DevOps
- Using Docker for DevOps: Introduction to Docker
- Software Testing for DevOps: DevOps Test Tools
- The Language of DevOps: DevOps Tools & Processes
- Top 10 List Items
- Agile Software Development - Scrum
- Agile Test-Driven Development
- Software Data Analysis: Project Management Metrics
- Release & Sprint Planning
- Developing the Product & Sprint Backlogs
- SOLID & GRASP
- Cloud Security Fundamentals: Cloud Application Security
- Automated Software Testing
- Tejasvini Bhikundi's Transcript
- Tejasvini Bhikundi's Wallet
- About Accredible