Site Map - skillsoft.digitalbadges-eu.skillsoft.com
- User Authentication
- KENNEDY ODHIAMBO's Credentials
- KENNEDY ODHIAMBO's Wallet
- CISM 2022: Information Security Governance
- CompTIA Network+: OSI Model Layers & Data Encapsulation
- Security Analyst to Security Architect
- Security Incident Triage
- Security Rules: Rules of Engagement
- Intelligent Orchestration: Automating Security Incident Processing
- Final Exam: Security Architect
- Security Architect: Ethical Hacking Best Practices
- Security Program Regulatory Integration
- Data Security Breach Notification Process
- Unified Security: Playbook Approach to Security
- Security Architect
- NCBA Anti Money Laundering and Combating Terrorism Financing Training
- Authentication & Encryption: Best Practices
- Final Exam: Vulnerability Analyst
- Defensible Security
- Vulnerability Analyst
- Final Exam: Security Analyst
- Final Exam: Forensics Analyst
- Security Analyst
- Forensics Analyst
- Incident Tracking & Response
- Intrusion Detection: Best Practices
- Intrusion Prevention: Best Practices
- Security Topologies: Developing Secure Networks
- Security Architect: Secure Coding Concepts
- Cyber Security Audits
- Ethics & Privacy: Digital Forensics
- Security Vulnerabilities: Managing Threats & Vulnerabilities
- Anomaly Detection: Aspects of Anomaly Detection
- Digital Forensic Techniques & Investigative Approaches
- Risk Analysis: Security Risk Management
- Anomaly Detection: Network Anomaly Detection
- Security Software Assessments
- End-User Security: The End-User Perspective
- End-User Security: The Security Administrator Perspective
- End-User Security: Securing End Users against Attackers
- Cryptography: Introduction to Cryptography Services
- Cryptography: Introduction to PKI
- NCBA Cyber Security Exam 2024
- NCBA Cyber Security Awareness 2024
- Information Security: Security Governance
- Information Security: Honeypots
- Information Security: Pen Testing
- Information Security: Subnetting & DNS for Security Architects
- Information Security: Securing Networking Protocols
- Information Security: Hardened Security Topologies
- Information Security: Continual Infrastructure Testing
- Information Security: APT Defenses
- Information Security: NACs & Gateways
- An Executive's Guide to Security: Understanding Security Threats
- An Executive's Guide to Security: Protecting Your Information
- Auditing & Incident Response
- Session & Risk Management
- CLCOR: Cisco Collaboration Core Technologies
- CCNA 2020: Networking Components
- CCSP 2022: Cloud Computing Concepts & Reference Architectures
- CCSP 2022: Cloud Infrastructure & Platform Components
- CCSP 2022: Cloud Audits, Methodologies, & Contracts
- CCSP 2022: Cloud Data Security
- CCSP 2022: Manage Security Operations
- Cloud Security Administration: Continuous Operational Improvement
- AWS Cloud Practitioner 2023: Benefits & Design Principles of the AWS Cloud
- Windows Client: Windows Security Management
- Windows Client: Remote Management & Monitoring
- Windows Client: Working with Group Policy
- Managing Modern Desktops: Endpoint Analytics
- Managing Modern Desktops: Azure Active Directory
- Managing Modern Desktops: Endpoint Protection
- Windows Client: Working with User Accounts
- Windows Client: Windows 10 Update Management
- Managing Modern Desktops: Windows Client Provisioning with Autopilot
- Managing Modern Desktops: Compliance Policies & Configuration Profiles
- Managing Modern Desktops: Conditional Access
- Managing Modern Desktops: Device Lifecycle Management
- Managing Modern Desktops: Managing & Monitoring Devices
- Managing Modern Desktops: The Microsoft Deployment Toolkit (MDT)
- Managing Modern Desktops: Managing Device Updates
- Managing Modern Desktops: Application Deployment
- Managing Modern Desktops: App Protection & Configuration
- Windows Client: Configuring Windows 10
- Windows Client: Deploying Windows 10
- Windows Client: Advanced Windows 10 Settings
- Windows Client: Working with Devices in Windows 10
- Managing Modern Desktops: Deployment Tools, Migration, & Activation
- Preparing to Install Windows 10
- CompTIA A+ Core 2: Scripting & Remote Technologies
- CompTIA A+ Core 2: Safety Procedures & Environmental Impacts
- CompTIA A+ Core 2: Communication Techniques, Licensing, & Policy Concepts
- Weighing Risks and Opportunities of Implementing Sustainability Initiatives
- A Sustainable Future Starts By Doing Good Today
- NCBA Sustainability - Change the Story
- Building a Strategic Commitment to Sustainability
- CompTIA A+ Core 2: Information Management & Change Management Processes
- CompTIA A+ Core 2: Backup & Recovery Methods
- CompTIA A+ Core 2: Securing SOHO Networks & Browser Security
- CompTIA A+ Core 2: Windows OS Problems & Personal Computer Security
- CompTIA A+ Core 2: Best Practice Procedures for Malware Removal
- CompTIA A+ Core 2: Mobile OS Application & Application Security Issues
- CompTIA A+ Core 2: Mobile & Embedded Device Security
- CompTIA A+ Core 2: Operating System Security Best Practices
- CompTIA A+ Core 2: Malware Detection, Removal, & Prevention
- CompTIA A+ Core 2: Social Engineering Attacks
- CompTIA A+ Core 2: Desktop, Server, & Mobile Operating Systems
- CompTIA A+ Core 2: Operating System & Network Management
- CompTIA A+ Core 2: Linux, macOS, & Windows File Systems
- CompTIA A+ Core 2: Wireless Security Protocols & Authentication Methods
- CompTIA A+ Core 1: Power Supplies
- CompTIA A+ Core 1: Multifunction Devices & Printer Consumables
- CompTIA A+ Core 1: Cloud Computing Concepts
- CompTIA A+ Core 1: Best Practices for Resolving Problems
- CompTIA A+ Core 1: Troubleshooting & Resolving Printer Issues
- CompTIA A+ Core 1: RAM & Storage Solutions
- CompTIA A+ Core 1: Motherboards, CPUs, & Add-on Cards
- CompTIA A+ Core 1: Networking Concepts & Configurations
- CompTIA A+ Core 1: Cable Types & Connectors
- CompTIA A+ Core 1: Wireless Networking & Services
- CompTIA A+ Core 1: Networking Fundamentals
- CompTIA A+ Core 1: Installing Hardware & Display Components
- CompTIA A+ Core 1: Mobile Device Accessories & Network Connectivity
- CompTIA A+ Core 1: Troubleshooting Wired & Wireless Networks
- CompTIA Linux+: Troubleshooting with systemd
- Being a Fair and Caring Manager
- Leadership Transitions: Moving into Senior Leadership
- Leading through Inspiration
- Great Leaders Must Be Inclusive featuring Special Olympics
- Leadercamp on-demand: Inclusive Leadership
- The Grit Factor: Courage, Resilience, and Leadership
- Planning an Effective Performance Appraisal
- Measuring Outcomes and Using KPIs
- Aligning Unit Goals and Imperatives
- CompTIA Cybersecurity Analyst+: Malware Threats
- CompTIA Server+: Server Components
- CBROPS: Threat Actors, Security, & Risk Management
- CompTIA Cybersecurity Analyst+: Cloud Computing
- CompTIA Server+: Configuring Server Components
- Google Professional Cloud Architect: Becoming a Google Cloud Architect
- Managing Your Time So It Doesn’t Manage You
- RSTECH: OS Types, IOS Access, & Terminal Emulation
- Saving Time by Setting Goals
- Taking Responsibility for Your Accountability
- Advanced and Interactive Visualization in R Bootcamp: Session 1 Replay
- Ajax Data Requests & Responses
- Gauging Your Leadership Performance
- Communicating with Confidence
- CompTIA Security+: Security Concepts in an Enterprise Environment
- CEH v11: Wireless Concepts, Threats & Hacking Tools
- CEH v11: IoT Threats, Vulnerabilities, Attack Tools & Countermeasures
- RSTECH: Cisco Equipment, Components, & Port Characteristics
- RSTECH: Cisco Memory Functions & Removing Cisco Devices
- CEH v11: Recon Tools & Tactics
- CEH v11: Metadata, Wordlists, Email, WHOIS & DNS Recon
- CEH v11: Incident Management, ML, AI & Regulations
- CEH v11: Footprinting, Google Dorks, Search Engines & Sub-domains
- Expert Insights on Personal Productivity
- Forming New Habits
- Maximize Your Productivity by Managing Time and Tasks
- Achieve Productivity in Your Personal Life
- Procrastination: Admitting it is the First Step
- Beat Procrastination by Boosting Your Creativity and Drive
- Avoid Procrastination by Getting Organized Instead
- Organize Your Physical and Digital Workspace
- How to Get Out of Your Own Way and Achieve Success
- CEH v11: Operational Technology Concepts, Attack Tools & Countermeasures
- Embracing a Customer-obsessed Mentality
- Providing Effective Internal Customer Service
- Service Desk, IT Asset, Service Configuration, and Change Control Management
- Release, Service Level, and Availability Management
- Event, Incident, and Problem Management
- The Guiding Principles of the Service Value System and Continual Improvement Model
- The Service Value Chain and General Management Practices
- Key Concepts and the Four Dimensions of Service Management
- CEH v11: Risk Management, Cyber Threat Intelligence & Threat Modeling
- CEH v11: Hacking Phases & Concepts
- CEH v11: Web Application Hacking & Login Attacks
- Gaining a Positive Perspective on Feedback
- RSTECH: Network Responsibilities, Addressing, & Utilities
- RSTECH: Networking Hardware, Models, & Technologies
- CEH v11: Cyber Kill Chain, TTPs, Behaviors & Threat Hunting
- CEH v11: Cybersecurity Basics, Attacks & Information Warfare
- CompTIA A+ Core 1: Client-side Virtualization
- CCNA 2020: Network Topology Architectures
- CompTIA A+ Core 2: Physical Security Measures
- CompTIA A+ 220-1002: Comparing Common Operating Systems
- CompTIA A+ 220-1002: Software Troubleshooting
- CISSP 2021: (ISC)2 & the CISSP Exam
- Expert Insights on Call Center Operations Management
- CompTIA Network+: Network Operations
- Network Topologies & Technologies
- Additional Network Services.
- CompTIA Security+: Social Engineering Techniques & Other Attack Types
- ITIL® Service Operation Concepts
- ITIL® 4 Foundation: Key Concepts of Service Management
- ITIL® 4 Foundation: Introduction
- KENNEDY ODHIAMBO's Transcript
- KENNEDY ODHIAMBO's Wallet
- About Accredible