Site Map - skillsoft.digitalbadges-eu.skillsoft.com
- User Authentication
- AHMED AWAD ALKHADER OSMAN's Credentials
- AHMED AWAD ALKHADER OSMAN's Wallet
- Leadership Insights on Problem Solving & Decision Making
- Problem Solving: Defining and Stating the Problem
- Problem Solving: Generating Solutions
- Problem Solving: Choosing and Implementing the Right Solution
- Problem Solving & Decision Making
- Sudani Managers Learning Path
- Leading through Problem Solving and Decision Making
- Leading through Motivation
- Leadership Insights on Leading through Motivation
- Leading with Values and Ethics
- Leadership Insights on Leading with Values & Ethics
- Become a Better Problem Solver by Telling Better Stories, powered by MIT SMR
- Modeling Ethical Leadership
- The Ethical Leader
- Leader As motivator
- Leadership Insights on Setting and Managing Priorities
- Leading through Setting and Managing Priorities
- Moving from Me to We with Delegation
- When Doing Less Adds Up to More, powered by MIT SMR
- Setting and Implementing Effective Business Goals
- Managing Priorities
- The Mindful Leader
- Leadership Insights on Mindfulness
- Leadership Insights on Leading a Learning Culture
- Leading a Learning Culture
- Data-driven Leadership
- Nurturing Your Own Wellbeing as a Leader
- Wellbeing Intelligence: A Skill Set for New World of Work, powered by MIT SMR
- Helping Others at Work Without Burning Out, powered by MIT SMR
- Managing Your Time by Prioritizing and Setting Goals
- The Data-Driven Leader
- The Mindful Leader
- Learning Culture
- Leadership Insights on Developing People
- Detecting and Dealing with Performance Problems
- Effectively Directing and Delegating as a Manager
- Delivering Feedback That Encourages Growth
- Engaging and Challenging Your Top Performers
- Providing Feedback to Support Neurodiverse Employees, powered by MIT SMR
- Job, Career, or Purpose?, powered by MIT SMR
- Take a Skills-Based Approach to Culture Change, powered by MIT SMR
- Empower Your Team, Empower Yourself, powered by MIT SMR
- Developing People
- Leading by Developing People
- Developing Future-Ready Skills With Peer Coaching, powered by MIT SMR
- Why Companies Should Help Employees Chart a Career Path, powered by MIT SMR
- Unleashing Potential through People Development
- Managing Your Team after a Failure
- Facilitating Career Conversations
- Talent Management: Developing Employees
- Leadership Transitions: Becoming a Frontline Manager
- Leadership Transitions: Moving into Senior Leadership
- Leadership Transitions: Moving into Middle Management
- Leadership Insights on Leader Transitions
- Leadership Insights on Transitioning from Frontline Manager to Mid-Level Manager
- Leadership Insights on Transitioning to Senior Leadership
- Leader Transition
- New Leadership Transitions
- New Leader Transitions, powered by MIT SMR
- Creating a Personal Leadership Development Plan
- Navigating New Manager Challenges
- Finding Your Leadership Style
- One-on-One Employee Performance Meeting
- Machine & Deep Learning Algorithms: Introduction
- Generative AI and Its Impact to Everyday Business
- ITIL® 4 Foundation: Introduction
- Expert Insights on Managing a Crisis
- SecOps Tools and 2021 Security Incidents: Log4Shell Exploit
- Exploring SecOps Tools: Securing Passwords with hashcat
- Exploring SecOps Tools: Digital Forensic Collection with Autopsy
- Building a SecOps Toolbox
- SecOps Tools and 2021 Security Incidents: Kaseya Ransomware Attack
- SecOps Tools and 2021 Security Incidents: JBS Ransomware Attack
- Final Exam: SecOps Tools Proficiency
- SecOps Tools and 2021 Security Incidents: Colonial Pipeline
- SecOps Tools and 2021 Security Incidents: Microsoft Exchange Server Data Breach
- Exploring SecOps Tools: Penetration Testing Using Metasploit Framework
- Exploring SecOps Tools: Network Packet Manipulation Using Wireshark
- SecOps Tool Landscape: Intro to Security Tools (SecTools)
- Exploring SecOps Tools: Web Application Hardening via Burp Suite
- SecOps Tool Landscape: The Kali Linux Security Platform
- SecOps Tools and 2021 Security Incidents: Facebook Data Breach
- SQL Injection Testing Using sqlmap
- SecOps Tools: The Role of AI in SecOps
- Exploring SecOps Tools: Port Scanning with Netcat
- Exploring SecOps Tools: Network Scanning Using Nmap
- Exploring SecOps Tools: Using the Aircrack-ng Suite of Tools
- Exploring SecOps Tools: Using the Social-Engineer Toolkit
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Secure Coding Practices
- OWASP Top 10: A05:2021-Security Misconfiguration
- OWASP Top 10: A04:2021-Insecure Design
- OWASP Top 10: A03:2021-Injection
- OWASP Top 10: A08:2021-Software & Data Integrity Failures
- OWASP Top 10: A09:2021-Security Logging & Monitoring Failures
- OWASP Top 10: A10:2021-Server-Side Request Forgery (SSRF)
- OWASP Top 10: A07:2021-Identification & Authentication Failures
- OWASP Top 10: A06:2021-Vulnerable & Outdated Components
- Final Exam: OWASP Top 10 Mitigations - 2021
- OWASP Top 10: Securing Web Applications
- OWASP Top 10: A02:2021-Cryptographic Failures
- OWASP Top 10: A01:2021-Broken Access Control
- CompTIA Security+: Threat Actors, Intelligence Sources, & Vulnerabilities
- CompTIA Security+: Security Assessment & Penetration Testing Techniques
- CompTIA Security+: Social Engineering Techniques & Other Attack Types
- Mobile Security Threats
- CEH v11: Network Scanning, TCP, Host Discovery & Port/Service Scanning
- CEH v11: Recon Tools & Tactics
- CEH v11: Metadata, Wordlists, Email, WHOIS & DNS Recon
- CEH v11: Footprinting and Social Engineering Recon & Countermeasures
- CEH v11: Scan Optimization, OS Identification & IDS/Firewall Evasion
- CEH v11: \nVulnerability Assessment Types, Models, Tools & Reports
- CEH v11: Risk Management, Cyber Threat Intelligence & Threat Modeling
- CEH v11: Footprinting, Google Dorks, Search Engines & Sub-domains
- CEH v11: \nCEH Hacking Methodology & Windows Authentication
- CEH v11: Cybersecurity Basics, Attacks & Information Warfare
- AHMED AWAD ALKHADER OSMAN's Transcript
- AHMED AWAD ALKHADER OSMAN's Wallet
- About Accredible