Site Map - skillsoft.digitalbadges.skillsoft.com
- User Authentication
- Vatsal Dhoundiyal's Credentials
- Vatsal Dhoundiyal's Wallet
- CompTIA Security+: Monitoring, Visibility, & Reporting
- CompTIA Security+: Incident Response, Digital Forensics, & Supporting Investigations
- CompTIA Security+: Wireless, Mobile, & Embedded Device Security
- CompTIA Security+: Risk Management, Privacy, & Sensitive Data Security
- CompTIA Security+: Organizational Security Assessment Tools & Mitigation Controls
- CompTIA Security+: Security Policies, Regulations, Standards, & Frameworks
- CompTIA Security+: Basic Cryptography & Public Key Infrastructure
- CompTIA Security+: Authentication & Authorization Design Concepts
- CompTIA Security+: Implementing Identity and Account Management & AAA Solutions
- CompTIA Security+: Physical Security Controls
- CompTIA Security+: Implementing Secure Network Designs
- CompTIA Security+: Implementing Cybersecurity Resilience
- CompTIA Security+: Virtualization, Cloud Computing, & Cloud Cybersecurity Solutions
- CompTIA Security+: Security Concepts in an Enterprise Environment
- CompTIA Security+: Social Engineering Techniques & Other Attack Types
- CompTIA Security+: Threat Actors, Intelligence Sources, & Vulnerabilities
- Git & GitHub: Introduction
- Exploring Business Process Automation
- Data Access & Governance Policies: Data Classification, Encryption, & Monitoring
- Automation Design & Robotics
- Leading Security Teams for GenAI Solutions: Use of Generative AI
- Responsible Use of AI
- Testing Methods
- Effective Team Communication
- Code Quality, Testing, & Development
- Software Design and Development: Design Patterns & SOLID Principles
- PRINCE2® Project Management Overview (2017 Update)
- Being an Effective Team Member
- Identifying Risk (PMBOK® Guide Sixth Edition)
- Software Design and Development: Methodologies
- Software Design and Development: Software Engineering & SDLC Phases
- Enterprise Security: Leveraging AI in Identity Security
- Enterprise Security: Leveraging AI to Enhance Email Security
- Enterprise Security: AI in Authentication & Detection of Security Threats
- Enterprise Security: Using AI for Intrusion Detection & Prevention
- Enterprise Security: Leveraging AI to Protect & Validate User Data
- Enterprise Security: Artificial Intelligence, Generative AI, & Cybersecurity
- Enterprise Security: Leveraging Generative AI with Common Security Tools
- Microsoft Azure Security Technologies: Ensuring Business Continuity
- Microsoft Azure Security Technologies: Managing Azure Policies
- Microsoft Azure Security Technologies: Enabling Resource Locking
- Microsoft Azure Security Technologies: Securing Azure with Defender & Sentinel
- Microsoft Azure Security Technologies: Monitoring Azure Services
- Microsoft Azure Security Technologies: Managing Key Vault Secrets
- Microsoft Azure Security Technologies: Working with Azure Applications
- Microsoft Azure Security Technologies: Implementing Data Security
- Microsoft Azure Security Technologies: Managing Azure Files Shares
- Microsoft Azure Security Technologies: Securing Azure Databases
- Microsoft Azure Security Technologies: Implementing Data Security
- Microsoft Azure Security Technologies: Managing Azure Storage
- Microsoft Azure Security Technologies: Managing Azure Virtual Machines
- Microsoft Azure Security Technologies: Securing Network Access with VPNs
- Microsoft Azure Security Technologies: Implementing Azure Network Security
- Microsoft Azure Security Technologies: Configuring Azure Networking
- Microsoft Azure Security Technologies: Managing Azure AD
- Microsoft Azure Security Technologies: Restricting Resource Access with Roles
- Microsoft Azure Security Technologies: Working with Azure AD Features
- Microsoft Azure Security Technologies: Managing Azure AD Groups
- Microsoft Azure Security Technologies: Securing Azure AD Users
- Microsoft Azure Security Technologies: Managing Azure AD Users
- Microsoft Azure Security Technologies: Exercising Governance Principles
- CompTIA Cloud Essentials+: Cloud Storage Technologies
- CompTIA Cloud Essentials+: Cloud Migration Strategies
- CompTIA Cloud Essentials+: Cloud Connectivity & Load Balancing
- CompTIA Cloud Essentials+: Cloud Design Considerations
- CompTIA Cloud Essentials+: Cloud Adoption to Enhance Business Value
- CompTIA Cloud Essentials+: Cloud Licensing Models & Risk Mitigation
- CompTIA Cloud Essentials+: Security Considerations
- CompTIA Cloud Essentials+: Cloud Native Apps & Cloud Data Analytics
- CompTIA Cloud Essentials+: Utilizing Cloud Services
- CompTIA Cloud Essentials+: Gap Analysis & Cloud Assessment
- CompTIA Cloud Essentials+: Contracting with Cloud Service Providers
- CompTIA Cloud Essentials+: Cloud Governance & Securing Data
- CompTIA Cloud Essentials+: Operations within Cloud
- CompTIA Cloud Essentials+: DevOps in the Cloud
- IASS
- TechLeap - IASS - Security Architecture & Cloud Native Application Security School
- CompTIA Cloud Essentials+: Essential Cloud Principles
- CompTIA Cloud Essentials+: Essential Cloud Networking
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Security Architecture
- Security Architect: Secure Coding Concepts
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Security Requirements
- CompTIA Cybersecurity Analyst+: Security Frameworks & Security Controls
- SSCP 2021: Risk Management
- Generative AI APIs for Practical Applications: An Introduction
- Artificial Intelligence and Machine Learning
- DevOps Security Considerations: DevSecOps Principles
- Backup & Recovery: Business Continuity & Disaster Recovery
- Threat Intelligence & Attribution Best Practices: Threat Intelligence Concepts
- Security Program Regulatory Integration
- Cyber Security Audits
- Planning Security Strategies
- Cultivating Enterprise Agile
- Recognizing Hallucinations, Inaccuracies, and Bias in AI
- Navigating AI Ethical Challenges and Risks
- Establishing AI Guardrails and Governance
- Incident Tracking & Response
- Security Software Assessments
- Cloud Computing Fundamentals: Security
- Risk Analysis: Security Risk Management
- Encryption & Malware
- Information Security Incident Management Part I
- Establishing Self-confidence for Life
- Agile Principles and Methodologies
- Ensuring Successful Presentation Delivery
- CCSP 2019: Identity & Access Management
- CompTIA Cybersecurity Analyst+: Monitoring Tools & Analytics
- Leadercamp on-demand: Exploring Generative AI and ChatGPT
- Generative AI and Its Impact to Everyday Business
- Harnessing the Disruption of Generative AI
- Cloud Security Management: Risk Management
- Information Security Program Development Part I
- Security Best Practices: Network Appliance Security
- Security Measures: Implementing Security Controls
- ADM Guidelines & Techniques
- Security Architecture Documentation and Alternative Architectures
- CISSP 2021: Architecture, Design, & Solutions Vulnerabilities
- Security Topologies: Developing Secure Networks
- Enterprise Architecture Basics
- Security Architecture
- AWS Cloud Practitioner 2022: Cloud Architecture Design Principles
- AWS Cloud Practitioner 2022: Access Management
- AWS Cloud Practitioner 2022: Technical Essentials Part 2
- AWS Cloud Practitioner 2022: Cloud & the Value Proposition
- AWS Cloud Practitioner 2022: Cloud Economics
- AWS Cloud Practitioner 2022: Technical Essentials Part 1
- Cloud Data Security
- CompTIA CASP+: Business Continuity
- Certified Information Systems Auditor (CISA) 2019: Data Privacy & Risk
- Implementing Incident Response & Recovery
- CompTIA Security+: Security Assessment & Penetration Testing Techniques
- Information Security: Security Governance
- Certified in Cybersecurity (CC): Security Governance, Policies, & Controls
- CompTIA Cloud+: Data Security & Compliance Controls
- Patch Management Strategies
- CompTIA Cybersecurity Analyst+: Digital Forensics
- API Design: API Development
- CISM 2020: IT Security Policies
- Microsoft 365 Mobility & Security: Data Loss Prevention
- End-User Security: The Security Administrator Perspective
- API Security
- SSCP 2021: Incident Response & Forensics
- CISSP 2021: Software Development Security
- CompTIA Security+: Analyzing Application & Network Attacks
- CompTIA Security+: Implementing Secure Protocols & Application Security Solutions
- CISSP: Software Development Security
- CompTIA Security+: Controls & Application Development, Deployment, & Automation
- Implementing Security Activities across the Technology Life Cycle
- OWASP Top 10: Securing Web Applications
- OWASP Top 10: A09:2021-Security Logging & Monitoring Failures
- Security Fundamentals: Firewalls
- Information Security: Securing Networking Protocols
- Network Attacks
- Integrating Network and Security Components, Concepts, and Architectures
- Network & Communications Security
- Protocol Security
- Network Isolation
- Microsoft Azure Security Technologies: Identity & Access Management
- Microsoft Azure Administrator: Azure Multi-Factor Authentication
- Microsoft Security: Basic Azure AD Identity Services & Types
- AWS Solutions Architect Associate 2022: Identity & Access Management
- Security & IAM Services
- Identity Management, Directory Services, and Federation
- Audience and Purpose in Business Writing
- Keeping Business Calls Professional
- Writing and Preparing an Effective Speech
- Conquering the Challenges of Public Speaking
- Michelle Boockoff-Bajdek on Public Speaking From A to D (Analog to Digital)
- Mindful at Work
- Shared Language
- Remote Ways of Working (OmniConnect)
- Embracing Happiness
- Accessibility
- 360 Value Meter
- Design Thinking
- Sustainability
- Oral Communication
- Year 1 Phase 1: 0 to 3 months
- Year 1 Phase 2: 4 to 6 Months
- Saving Time by Setting Goals
- Sharpening Your Focus to Stay on Track
- Managing Your Time So It Doesn’t Manage You
- Expert Insights on Time Management
- Expert Insights on Listening
- Maximize Your Productivity by Managing Time and Tasks
- Taking Effective and Professional Notes
- Become a Great Listener
- Listening Even When It's Difficult to Listen
- Using Active Listening in Workplace Situations
- The Art of Staying Focused
- Make The Time You Need: Get Organized
- Aligning Goals and Priorities To Manage Time
- Using Punctuation Marks
- Troublesome Words and Phrases: Usage Mistakes in Writing
- Creating Well-constructed Sentences
- Business Grammar
- Listening
- Time Management
- OWASP Top 10: Web Application Security
- Cybersecurity Awareness: Exposure to Security Risks
- Social Engineering Threats and Prevention
- CompTIA Cloud+: Cloud Security Controls
- Getting the Details Right: Spelling Basics
- Using the Parts of Speech
- Abbreviating, Capitalizing, and Using Numbers
- AWS Associate Solutions Architect 2020: AWS Review Course 1
- AWS Associate Solutions Architect 2020: AWS Review Course 2
- CCSP 2022: Cloud Security Concepts & Design Principles
- AWS Solutions Architect Professional 2022: General Architecture
- API Development: Framework Security
- CCSP 2019: Application Development & Security
- SSCP 2021: Security Controls
- Cybersecurity Awareness: Information Security Fundamentals
- Software Development Concepts: Software Development Glossary
- Access Control and Security Architecture Design
- Cloud Security Fundamentals: Cloud Application Security
- Top 10 List Items
- Jenkins for DevOps: Jenkins Configuration for DevOps
- Using Docker for DevOps: Introduction to Docker
- Software Testing for DevOps: DevOps Test Tools
- The Language of DevOps: DevOps Tools & Processes
- Cloud Computing Fundamentals: Introduction
- Agile & TDD Best Practices for APIs: Test-driven Development Strategy
- Transition to Scrum: Agile Foundation to Scrum
- Automated Software Testing
- Release & Sprint Planning
- Using Kanban in IT & Software Development
- Software Data Analysis: Project Management Metrics
- Agile Best Practices for Tech Leaders: Scrum Artifacts
- Microsoft Azure Fundamentals: Network Security
- Microsoft Azure Fundamentals: Migrating to Azure
- Microsoft Azure Fundamentals: Monitoring Azure Services
- Microsoft Azure Fundamentals: Software Development Services
- SOLID & GRASP
- Microsoft Azure Fundamentals: Service Resilience
- Microsoft Azure Fundamentals: Managing Azure Authentication
- Microsoft Azure Fundamentals: Managing Azure AD
- Microsoft Azure Fundamentals: Azure RBAC & Azure Policy
- Microsoft Azure Fundamentals: Managing Azure Costs
- Software Design and Development: Version Control System
- CompTIA Cloud+: Cloud Architecture & Models
- Microsoft Azure Fundamentals: Container Solutions
- Microsoft Azure Fundamentals: App Services
- Defensible Security
- Communication & Network Security
- Microsoft Azure Fundamentals: Virtual Machines
- Information Security for Leaders: Elements of InfoSec
- Microsoft Azure Fundamentals: VNet Peering & VPNs
- Microsoft Azure Fundamentals: Network Infrastructure
- Security Vulnerabilities: Managing Threats & Vulnerabilities
- Malware Analysis
- CEH v11: \nFileless Malware, Malware Analysis & Countermeasures
- CEH v11: \nSocial Engineering, Insider Threats & Identity Theft
- Microsoft Azure Fundamentals: Azure Files
- Attack Vectors & Mitigations
- CompTIA Server+: Network Firewalls
- Microsoft Azure Fundamentals: Managing Storage
- Advanced Networking Devices
- CISSP 2021: Secure Design Principles
- CISSP: Risk Management
- Microsoft Azure Fundamentals: Azure Cloud Computing
- Microsoft Azure Fundamentals: Management Tools
- Microsoft Azure Fundamentals: Managing the Hierarchy
- Concepts & Characteristics of Networking
- Fundamental Security Concepts
- Vatsal Dhoundiyal's Transcript
- Vatsal Dhoundiyal's Wallet
- About Accredible