Site Map - skillsoft.digitalbadges-eu.skillsoft.com
- User Authentication
- Ahmed Okasha's Credentials
- Ahmed Okasha's Wallet
- CEH v12: Network Scanning, TCP, Host Discovery, and Port/Service Scanning
- CEH v12: Nmap TCP Scans
- CEH v12: NetBIOS, SMB, SNMP, and LDAP Enumeration
- CEH v12: NTP, NFS, SMTP, and FTP Enumeration
- CEH v12: Vulnerability Assessment, Management, and Classification
- CEH v12: Vulnerability Assessment Types, Models, Tools, and Reports
- CEH v12: Scan Optimization, OS Identification, and IDS/Firewall Evasion
- CEH v12: Windows Authentication
- CEH v12: Passwords Attacks, Extraction, and Cracking
- CEH v12: Footprinting and Social Engineering Recon and Countermeasures
- CEH v12: Incident Management, ML, AI, and Regulations
- CEH v12: Cyber Kill Chain, TTPs, Behaviors, and Threat Hunting
- CEH v12: Risk Management, Cyber Threat Intelligence, and Threat Modeling
- CEH v12: Cybersecurity Concepts, Attacks, and Information Warfare
- CEH v12: Footprinting, Google Dorks, Search Engines, and Subdomains
- CEH v12: Hacking Methodology, MITRE ATT&CK Framework, and Diamond Model
- CEH v12: Recon Tools and Tactics
- Leading in the Age of Generative AI
- Reimagining the Sales Process with Generative AI
- Encouraging Innovation and Experimentation with AI
- Leveraging Generative AI for Business
- Generative AI and Its Impact to Everyday Business
- Final Exam: Generative AI Foundations
- Ahmed Okasha's Transcript
- Ahmed Okasha's Wallet
- About Accredible