Site Map - skillsoft.digitalbadges-eu.skillsoft.com
- User Authentication
- Ahmed Ali's Credentials
- Ahmed Ali's Wallet
- Harnessing the Power of DevOps
- Innovating with Lean Product Management
- The Essential Role of the Agile Product Owner
- Developing and Supporting an Agile Mindset
- Building Agile Capabilities in Your Organization
- Agile Principles and Methodologies
- Maximizing Value with A/B Testing
- Agile Project Planning
- Agile Stakeholder Engagement and Team Development
- Agile Project Scheduling and Monitoring
- Learning from Failure
- Agile Key Exam Concepts
- Cultivating Enterprise Agile
- Learning from Failure and Success
- Exploring SecOps Tools: Network Packet Manipulation Using Wireshark
- Exploring SecOps Tools: Web Application Hardening via Burp Suite
- SecOps Tools and 2021 Security Incidents: Facebook Data Breach
- SQL Injection Testing Using sqlmap
- SecOps Tools: The Role of AI in SecOps
- Exploring SecOps Tools: Port Scanning with Netcat
- Exploring SecOps Tools: Network Scanning Using Nmap
- Exploring SecOps Tools: Using the Aircrack-ng Suite of Tools
- Exploring SecOps Tools: Using the Social-Engineer Toolkit
- SecOps Tools and 2021 Security Incidents: Microsoft Exchange Server Data Breach
- Exploring SecOps Tools: Penetration Testing Using Metasploit Framework
- Final Exam: SecOps Tools Proficiency
- SecOps Tools and 2021 Security Incidents: Colonial Pipeline
- SecOps Tools and 2021 Security Incidents: Log4Shell Exploit
- SecOps Tools and 2021 Security Incidents: JBS Ransomware Attack
- SecOps Tools and 2021 Security Incidents: Kaseya Ransomware Attack
- Exploring SecOps Tools: Securing Passwords with hashcat
- Exploring SecOps Tools: Digital Forensic Collection with Autopsy
- OWASP Top 10: A08:2021-Software & Data Integrity Failures
- OWASP Top 10: A09:2021-Security Logging & Monitoring Failures
- OWASP Top 10: A10:2021-Server-Side Request Forgery (SSRF)
- OWASP Top 10: A07:2021-Identification & Authentication Failures
- OWASP Top 10: A06:2021-Vulnerable & Outdated Components
- SecOps Tool Landscape: Intro to Security Tools (SecTools)
- SecOps Tool Landscape: The Kali Linux Security Platform
- OWASP Top 10: Securing Web Applications
- OWASP Top 10: A02:2021-Cryptographic Failures
- OWASP Top 10: A05:2021-Security Misconfiguration
- OWASP Top 10: A04:2021-Insecure Design
- OWASP Top 10: A03:2021-Injection
- OWASP Top 10: A01:2021-Broken Access Control
- Sharing Space: Living, Learning, and Working at Home
- Managing Pressure and Stress to Optimize Your Performance
- Taking the Lead with Workplace Motivation and Engagement
- Take a Deep Breath and Manage Your Stress
- Pen Testing Awareness: Results Management
- Pen Testing: End-user Behavior
- Leading in a Hybrid Workplace
- Building Customer Relationships in a Virtual Environment
- Presenting Virtually
- Optimizing Your Workplace Well-being
- Managing and Supporting Employee Wellness
- Thriving with High-pressure Work
- Managing a Hybrid Team Successfully
- Penetration Testing Fundamentals
- SSCP 2021: Security & Vulnerability Assessment
- SSCP 2021: Business Continuity Planning
- SSCP 2021: Malware & Countermeasures
- SSCP 2021: Incident Response & Forensics
- SSCP 2021: Fundamental Networking Concepts
- SSCP 2021: Secure Virtual & Cloud Environments
- SSCP 2021: Endpoint Protection & Mobile Device Management
- SSCP 2021: \nNetwork Attacks & Countermeasures
- SSCP 2021: Secure \nWireless Communication
- SSCP 2021: Asset & Change Management Lifecycles
- SSCP 2021: Basic Security Concepts
- SSCP 2021: Physical Security Operations
- SSCP 2021: Secure Protocols & Public Key Infrastructure (PKI)
- SSCP 2021: Understanding & Applying Cryptography
- SSCP 2021: Security Controls
- SSCP 2021: Authentication & Trust Architectures
- SSCP 2021: Identity Management & Access Control Models
- SSCP 2021: Risk Management
- Track 1: AI in Ethical Hacking
- Prompt Engineering for Ethical Hacking
- CompTIA PenTest+: Analyzing Tool & Script Output
- CompTIA PenTest+: Communication & Post-Report Activities
- CompTIA PenTest+: Penetration Testing Tools
- Prompt Engineering: Generative AI for Reconnaissance
- Prompt Engineering: Generative AI for Scanning & Enumeration
- Prompt Engineering: Generative AI for Malware & Social Engineering
- Prompt Engineering: Web Application & Database Hacking in the Age of GenAI
- Prompt Engineering: GenAI’s Impact on Network & Perimeter Ethical Hacking
- Prompt Engineering: Generative AI for System Hacking
- Prompt Engineering: Covering Tracks with GenAI
- Prompt Engineering: Mobile Platform Security in the GenAI Era
- Prompt Engineering: Cloud Computing & IoT Hacking in the Era of GenAI
- CompTIA PenTest+: Post-Exploitation Techniques
- CompTIA PenTest+: Written Reports
- Prompt Engineering: Ethical Hacking & Generative AI Fusion
- Configuration, Advanced Help, & Queries
- Introduction to PowerShell 5.0
- CompTIA PenTest+: Social Engineering Attacks
- Output Formatting, Modules, & Customization
- Cmdlet Structure & Help
- Syntax, Help, & Conditionals
- Aliases, Providers, & Objects
- Desired State Configuration (DSC)
- Remote Management
- DSC & Azure
- Local Configuration Manager (LCM)
- DSC Resources
- DSC, Configurations, & Repositories
- Resource Creation & Configuration
- DSC with Linux & JEA
- CompTIA PenTest+: Network Attacks & Exploits
- CompTIA PenTest+: Wireless Attacks
- CompTIA PenTest+: Application-based Attacks
- CompTIA PenTest+: Attacks on Cloud Technologies
- CompTIA PenTest+: Attacks on Specialized Systems
- CompTIA PenTest+: Vulnerability Scanning
- CompTIA PenTest+: Passive Reconnaissance
- CompTIA PenTest+: Active Reconnaissance
- CISSP 2021: Software Development Lifecycles & Ecosystems
- CISSP 2021: Software Development Security
- CompTIA PenTest+: Scoping & Engagement
- CompTIA PenTest+: Professionalism & Integrity
- CISSP 2021: Architecture, Design, & Solutions Vulnerabilities
- CISSP 2021: Site & Facility Security
- CISSP 2021: Communication & Network Security
- CISSP 2021: Security Operations
- CISSP 2021: Business Continuity Planning
- CISSP 2021: Security Assessment & Testing
- CISSP 2021: Identity and Access Management Principles
- CISSP 2021: Deploying Identity & Access Management (IAM)
- CEH v11: Wireless Concepts, Threats & Hacking Tools
- CISSP 2021: Asset Classification & Lifecycle
- CISSP 2021: Practical Cryptography
- CISSP 2021: Risk Management
- CISSP 2021: Security Policy
- CISSP 2021: Security Governance Principles
- CISSP 2021: Secure Design Principles
- CISSP 2021: (ISC)2 & the CISSP Exam
- CISSP 2021: Fundamental Concepts & Principles
- Certified in Cybersecurity (CC): Data Security & System Hardening
- Certified in Cybersecurity (CC): Security Best Practices & Security Awareness
- Certified in Cybersecurity (CC): Networking & Security Infrastructure
- Certified in Cybersecurity (CC): Present Threats & Network Security Controls
- Certified in Cybersecurity (CC): Core Security Principles & Risk Management
- Certified in Cybersecurity (CC): Security Governance, Policies, & Controls
- Certified in Cybersecurity (CC): Incident Response
- Certified in Cybersecurity (CC): Business Continuity Planning
- Certified in Cybersecurity (CC): Logical Access Controls
- Certified in Cybersecurity (CC): Physical Access Controls
- Ethical Hacker: Risk Assessment
- Ethical Hacker: Incident Response
- Ethical Hacker: Security Standards
- Ethical Hacker: Secure Technology & Applications
- Ethical Hacker: Account Creation
- Ethical Hacker: Cryptography Attacks
- Ethical Hacker: Cryptography Concepts Part 2
- Ethical Hacker: Cryptography Concepts
- Ethical Hacker: Cryptography Concepts Part 3
- Ethical Hacker: Cloud Computing Concepts
- Ethical Hacker: IoT Attacks
- Ethical Hacker: IoT Concepts
- Ethical Hacker: IoT Hacking & Countermeasures
- Ethical Hacker: Cloud Computer Attacks
- Ethical Hacker: Wireless Hacking Tools
- Ethical Hacker: Cracking & Mobile Hacking
- Ethical Hacker: Wireless Hacking Common Threats
- Ethical Hacker: SQL Injection
- Ethical Hacker: Wireless Hacking Concepts
- Ethical Hacker: Common Web App Threats
- Ethical Hacker: SQL Injection Types & Tools
- Ethical Hacker: Common Web App Threats Part 2
- Ethical Hacker: Practical Web App Hacking
- Ethical Hacker: Hacking Web Servers
- Ethical Hacker: Denial of Service
- Ethical Hacker: Session Hijacking
- Ethical Hacker: Evading IDS, Firewall, & Honeypots
- Ethical Hacker: Evading IDS, Firewall, & Honeypots Part 2
- Ethical Hacker: Evading IDS, Firewall, & Honeypots Part 3
- Ethical Hacker: Network Sniffing
- Ethical Hacker: Social Engineering
- Ethical Hacker: ProxyChains & Enumeration
- Ethical Hacker: Host Discovery & Scanning with Nmap
- Ethical Hacker: Malware Threats
- Ethical Hacker: Pentesting, Laws, & Standards
- Ethical Hacker: Hidden Files & Covering Tracks
- Ethical Hacker: Vulnerability Analysis Concepts & Tools
- Ethical Hacker: Footprinting
- Ethical Hacker: Malware Distribution
- Ethical Hacker: Privilege Escalation
- Ethical Hacker: Password Attacks
- Ethical Hacker: Covert Data Gathering
- Ethical Hacker: Password Attacks Part 2
- Ethical Hacker: Security Controls Part 2
- Ethical Hacker: Hacking Concepts
- Ethical Hacker: Security Controls
- Ethical Hacker: Overview & Threats
- Ahmed Ali's Transcript
- Ahmed Ali's Wallet
- About Accredible