Site Map - skillsoft.digitalbadges.skillsoft.com
- User Authentication
- Valentin Guta's Credentials
- Valentin Guta's Wallet
- Microsoft Azure Security Technologies: Ensuring Business Continuity
- Microsoft Azure Security Technologies: Monitoring Azure Services
- Microsoft Azure Security Technologies: Managing Key Vault Secrets
- Microsoft Azure Security Technologies: Managing Azure Policies
- Microsoft Azure Security Technologies: Enabling Resource Locking
- Microsoft Azure Security Technologies: Securing Azure with Defender & Sentinel
- Microsoft Azure Security Technologies: Implementing Data Security
- Microsoft Azure Security Technologies: Working with Azure Applications
- Microsoft Azure Security Technologies: Implementing Data Security
- Microsoft Azure Security Technologies: Managing Azure Files Shares
- Microsoft Azure Security Technologies: Securing Azure Databases
- Microsoft Azure Security Technologies: Managing Azure Storage
- Microsoft Azure Security Technologies: Managing Azure Virtual Machines
- Microsoft Azure Security Technologies: Securing Network Access with VPNs
- Microsoft Azure Security Technologies: Restricting Resource Access with Roles
- Microsoft Azure Security Technologies: Implementing Azure Network Security
- Microsoft Azure Security Technologies: Configuring Azure Networking
- Microsoft Azure Security Technologies: Managing Azure AD
- Microsoft Azure Security Technologies: Working with Azure AD Features
- Microsoft Azure Security Technologies: Managing Azure AD Groups
- Microsoft Azure Security Technologies: Securing Azure AD Users
- Microsoft Azure Security Technologies: Exercising Governance Principles
- Microsoft Azure Security Technologies: Managing Azure AD Users
- Prompt Engineering: Mobile Platform Security in the GenAI Era
- Prompt Engineering: Covering Tracks with GenAI
- Final Exam: Prompt Engineering for Ethical Hacking
- Prompt Engineering: Cloud Computing & IoT Hacking in the Era of GenAI
- Prompt Engineering: Web Application & Database Hacking in the Age of GenAI
- Prompt Engineering: GenAI’s Impact on Network & Perimeter Ethical Hacking
- Prompt Engineering: Generative AI for System Hacking
- Prompt Engineering: Generative AI for Malware & Social Engineering
- Prompt Engineering: Ethical Hacking & Generative AI Fusion
- Prompt Engineering: Generative AI for Scanning & Enumeration
- OWASP Top 10: A9 - Using Components with Known Vulnerabilities
- OWASP Top 10: A10 - Insufficient Logging & Monitoring
- OWASP Top 10: Discovering & Exploiting Web App Vulnerabilities
- Final Exam: OWASP Top 10 Mitigations
- Track 1: OWASP Top 10 Mitigations
- Web App Vulnerability Analyst
- OWASP Top 10: A4 - XML External Entities
- OWASP Top 10: A5 - Broken Access Control
- OWASP Top 10: A8 - Insecure Deserialization
- OWASP Top 10: A6 - Security Misconfiguration
- OWASP Top 10: A7 - Cross-site Scripting
- OWASP Top 10: A3 - Sensitive Data Exposure
- OWASP Top 10: A1 - Injection
- OWASP Top 10: A2 - Broken Authentication
- OWASP Top 10: Web Application Security
- OWASP Top 10: A03:2021-Injection
- OWASP Top 10: A05:2021-Security Misconfiguration
- OWASP Top 10: Securing Web Applications
- OWASP Top 10: A07:2021-Identification & Authentication Failures
- OWASP Top 10: A04:2021-Insecure Design
- OWASP Top 10: A06:2021-Vulnerable & Outdated Components
- OWASP Top 10: A08:2021-Software & Data Integrity Failures
- Advanced NLP: Introduction to BERT
- Advanced NLP: Language Translation Using Transformer Model
- Exploring Prompt Engineering Techniques
- Case Studies in Prompt Engineering
- Getting Started with Prompt Engineering
- Exploring the OpenAI Playground
- Generative AI APIs for Practical Applications: An Introduction
- Valentin Guta's Transcript
- Valentin Guta's Wallet
- About Accredible