Site Map - skillsoft.digitalbadges-eu.skillsoft.com
- User Authentication
- Kim Yong Teo's Credentials
- Kim Yong Teo's Wallet
- Chef for DevOps: Automate Infrastructure Using Chef Tools & Templates
- Chef for DevOps: Managing Infrastructure Using Chef
- Test Driven Cookbooks
- Community Cookbooks & Server Patterns
- Server Basics
- Variables
- Chef: Getting Started
- Configurations
- Provisioning and Modules
- Infrastructure
- Introduction to Automation
- IT Infrastructure Automation: Automation & Scalability
- IT Infrastructure Automation: Automated Monitoring
- IT Infrastructure Automation: Version Control & GIT
- IT Infrastructure Automation: Text File Processing & RegEx
- IT Infrastructure Automation: Getting Started
- Azure Fundamentals: Database Solutions
- Ubuntu: Getting Started
- Tools & File Sharing
- Business Continuity: Secure Cloud Computing
- Web Administration Tools
- Users & Permissions
- Command Line Utilities
- Architecting Balance: Hybrid Cloud Implementation with AWS & Azure
- Architecting Balance: Designing Hybrid Cloud Solutions
- DevOps to CloudOps for Multi-cloud
- Troubleshooting Deployments
- Security Configurations & Compliance Controls
- Security Technologies & Automation Techniques
- CloudOps: Implementing SD-WAN to Optimize Environments
- Cloud System Patching & Maintenance
- Disaster Recovery
- Performance Management
- Azure Fundamentals: IoT & AI
- Planning Cloud Compute Resources
- Planning Cloud Storage Resources
- Planning Cloud Migrations & Extensions
- Azure Fundamentals: Azure Security Services
- Azure Fundamentals: Big Data Analytics
- Azure Fundamentals: Monitoring the Azure Environment
- Planning Cloud Networking
- Planning Cloud Deployments
- Azure Fundamentals: Azure Data Privacy
- Security, Service, & Mobile Device Management
- Google Cloud: Getting Started
- Email & Calendar Management
- Group & OU Management
- Instance Creation
- Instance Management
- Service Configuration & Management
- Azure Fundamentals: Network Components
- Azure Fundamentals: Azure Network Security
- Azure Fundamentals: Virtual Machines
- Azure Fundamentals: Storage Components
- Microsoft Azure Fundamentals: Cloud Computing
- Azure Fundamentals: The Ecosystem
- CCNA 2020: IPv6 Addressing & Configuration
- Auditing, Logging, & Troubleshooting
- Physical Infrastructure Requirements
- Virtual Machine Creation
- Configuring User Roles & Monitoring VMware NSX
- Upgrading & Transport Zone
- NSX Network Security
- Network & Security
- Load Balancing & VPNs
- NSX Integration
- Configuring Logical Switches, VXLAN, & Layer 2 Bridging
- Network Services & NSX Edge HA
- Configuring Logical Routers
- Configuration & Deployment
- vSS & vDS Policies
- vSphere Switches
- NSX Benefits & Architecture
- Network Devices
- Scripting Automation: Major Automation Technologies for Support Engineers
- Scripting Automation: Scripting for Support Engineers
- Scripting Automation: Adopting an Automation Mindset
- IT Infrastructure Automation: Python Automation Programming
- Python: Getting Started
- Data & Sequence Types
- Collections, Mapping, & Looping
- SecOps Engineer: Threat Mitigation
- SecOps Engineer: Cloud & IoT security
- Troubleshooting Storage, Software, & Networks
- SecOps Engineer: Secure Coding
- SecOps Engineer: Security Engineering
- SecOps Engineer: System Infrastructure Security
- Ports, Protocols, & Cable Management
- Troubleshooting Methodology
- Server Policy, Planning, & Safety
- Server Management & Maintenance
- Server Maintenance, Protection, & VMs
- Troubleshooting Security & Network Problems
- Networking & Disaster Recovery
- Introduction to Server Administration
- Introduction to Server RAID
- Introduction to Server Security
- Introduction to Server Architecture
- Introduction to Server Storage
- Disaster Recovery Planning & Backups
- Troubleshooting Methodology & Tools
- Troubleshooting Connectivity & Performance Issues
- Troubleshooting Common Network Service Issues
- Incident Tracking & Response
- Digital Forensic Techniques & Investigative Approaches
- Security Rules: Rules of Engagement
- Authentication & Encryption: Best Practices
- Windows Exploits and Forensics: Legacy Systems & Third Party Applications
- Windows Exploits and Forensics: FTP, RDP, & Other Services
- Windows Exploits and Forensics: SMB & PsExec
- Network Topologies & Technologies
- IP Addressing
- Cloud Concepts & Network Services
- Network Storage, Virtualization, & WAN Technologies
- Cabling Solutions
- Network Monitoring & Remote Access Methods
- Advanced Networking Devices
- Policies and Best Practices
- Documentation and Diagrams & Business Continuity
- Ports, Protocols, & the OSI Model
- Concepts & Characteristics of Networking
- Nano Server First Look
- Windows Environments
- Malware Removal: Reporting Findings & Preventing Future Infections
- Windows Exploits and Forensics: Intelligence Gathering
- Information Security: Pen Testing
- Malware Removal: Identifying Malware Types and Classification Approaches
- Malware Removal: Remediating an Infected System
- Malware Removal: Analyzing an Infected System
- Information Security: Security Governance
- Information Security: Continual Infrastructure Testing
- Information Security: Honeypots
- Intrusion Detection Best Practices
- Information Security: APT Defenses
- Information Security: Hardened Security Topologies
- Information Security: Securing Networking Protocols
- Intrusion Prevention: Best Practices
- Information Security: NACs & Gateways
- Information Security: Subnetting & DNS for Security Architects
- An Executive's Guide to Security: Protecting Your Information
- Remote Connections & Mac OS X Networking
- Software-Defined Networking Fundamentals
- Network Function Virtualization Fundamentals
- Security Vulnerabilities: Managing Threats & Vulnerabilities
- Benefits & Allocating Addresses
- Exploring Addresses
- Decoding the Packet Header & Discovering ICMPv6
- CompTIA A+ 220-1001: Configuring a Wired/Wireless Network
- CompTIA A+ 220-1001: Network Hosts
- Configuring Firewalls
- Creating & Configuring Network Shares
- Configuring Wired & Wireless Networks
- CompTIA A+ 220-1001: Wireless Networking Protocols
- CompTIA A+ 220-1001: Implementing Network Concepts
- An Executive's Guide to Security: Understanding Security Threats
- CompTIA A+ 220-1001: Networking
- CompTIA A+ 220-1001: Network Types
- CompTIA A+ 220-1001: Networking Tools
- CyberOps Windows Hardening: Windows Server Hardening Best Practices
- Business Continuity Planning Bootcamp: Session 2 Replay
- Business Continuity Planning Bootcamp: Session 1 Replay
- Windows Server 2016 Networking: DNS Zones & Records
- Windows Server 2016 Identity: Active Directory Maintenance & Recovery
- Windows Server 2016 Identity: Active Directory Groups & Organizational Units
- Windows Server 2016 Identity: Active Directory Accounts & Permissions
- Windows Server 2016 Networking: Network Connectivity & Remote Access
- Windows Server 2016 Identity: Active Directory Domain Controllers
- Windows Server 2016 Identity: Active Directory Service Accounts & Policies
- Windows Server 2016 Identity: Active Directory Trusts & Sites
- Windows Server 2016 Identity: Active Directory Certificate Services
- Windows Server 2016 Networking: Network Policy Server
- Windows Server 2016 Networking: Distributed File System & Branch Office Solutions
- Windows Server 2016 Networking: Advanced Network Infrastructures
- Windows Server 2016 Identity: AD FS & Web Application Proxy
- Windows Server 2016 Identity: Active Directory Rights Management Services
- Windows Server 2016 Networking: IPv4 & IPv6 Address Management
- Windows Server 2016 Networking: DHCP Configuration
- Windows Server 2016 Identity: Active Directory Group Policy Objects
- Windows Server 2016 Identity: Active Directory Group Policy Processing
- Windows Server 2016 Identity: Active Directory Group Policy Settings
- Windows Server 2016 Identity: Active Directory Group Policy Preferences
- Windows Server 2016 Networking: DHCP Management
- Windows Server 2016 Networking: DNS Configuration
- Windows Server 2016 Networking: IP Address Management Configuration
- Windows Server 2016 Networking: DNS & DHCP Management Using IPAM
- Cloud Computing Fundamentals: Migrating to the Cloud
- Cloud Computing Fundamentals: Storing & Managing Cloud Data
- Cloud Computing Fundamentals: Cloud Virtualization & Data Centers
- Cloud Service Models & Benefits and Issues
- Cloud Computing Fundamentals: Security
- Cloud Computing Fundamentals: Cloud Protocols & Standards
- Cloud Computing Fundamentals: Risk Management
- Cloud Presence & Privacy
- Cloud Computing Fundamentals: Considerations
- Cloud Access Control
- Agile Software Development - Scrum
- Choosing the Right Interpersonal Communication Method to Make Your Point
- Introduction to Agile Software Development
- JavaScript: Types, Operators, & Control Structures in JavaScript
- Communicating with Confidence
- vSphere Products & Business Challenges
- vCloud Connector & vCenter Site Recovery Manager
- vRealize Operations Manager
- vRealize Automation
- Cloud Overview
- Cloud Services Solutions: vCloud Air
- JavaScript: Getting Started with JavaScript Programming
- Cloud Services Solutions: Benefits & Features
- Adopting IT Automation
- Selenium Deep Dive: Setting Up Selenium for Automated Testing
- Business Mobility Solutions
- CCNA 2020: Networking Components
- CCNA 2020: Networking Components - NGFW, NGIPS, & Cisco DNA Center
- Data Center Virtualization: vCenter Server
- Data Center Virtualization: vSphere & ESXi
- Desktop Virtualization Planning with VMware
- VMware Desktop Virtualization Management
- DevOps with Ansible: Introduction to Playbooks & Testing
- DevOps with Ansible: Working with Ansible Features
- DevOps with Ansible: Overview
- Containers & Configuration
- Docker Configuration & Management
- Ansible: Ansible for DevOps Provisioning
- Ansible: Continuous Delivery and Monitoring Using Ansible Playbook and Tower
- Bash Scripting Flow Control & Data Types
- Bash Advanced Scripting & File I/O
- Automation Using Bash & Expect
- SQL Developer
- Introduction to Bash Scripting
- Socket Programming in Python: Advanced Topics
- Security Programming: Python Scripting Essentials
- Socket Programming in Python: Introduction
- Python Requests: HTTP Requests with Python
- Data Structures & Algorithms in Python: Implementing Trees & Graphs
- Data Structures & Algorithms in Python: Trees & Graphs
- Data Structures & Algorithms in Python: Sorting Algorithms
- Data Structures & Algorithms in Python: Implementing Sorting Algorithms
- Relational Database Concepts
- Data Structures & Algorithms in Python: Implementing Data Structures
- Functions in Python: Working with Advanced Features of Python Functions
- Data Structures & Algorithms in Python: Fundamental Data Structures
- Functions in Python: Introduction
- Functions in Python: Gaining a Deeper Understanding of Python Functions
- Conditional Statements & Loops: The Basics of for Loops in Python
- Conditional Statements & Loops: Advanced Operations Using for Loops in Python
- Conditional Statements & Loops: While Loops in Python
- User Management
- Conditional Statements & Loops: If-else Control Structures in Python
- Complex Data Types in Python: Shallow & Deep Copies in Python
- Complex Data Types in Python: Working with Dictionaries & Sets in Python
- Complex Data Types in Python: Working with Lists & Tuples in Python
- Getting Started with Python: Introduction
- DSC, Configurations, & Repositories
- Resource Creation & Configuration
- DSC & Azure
- DSC with Linux & JEA
- Desired State Configuration (DSC)
- Local Configuration Manager (LCM)
- DSC Resources
- Configuration, Advanced Help, & Queries
- Output Formatting, Modules, & Customization
- Remote Management
- Aliases, Providers, & Objects
- Syntax, Help, & Conditionals
- Cmdlet Structure & Help
- Introduction
- CompTIA Linux+: Installing Ubuntu
- CompTIA Linux+: Installing CentOS
- CompTIA Linux+: Git Version Control
- CompTIA Linux+: Network Firewall & Traffic Filtering
- CompTIA Linux+: Backup & Restore
- CompTIA Linux+: Bourne-again Shell & Scripting
- CompTIA Linux+: Scheduling Tasks
- CompTIA Linux+: SELinux & AppArmor
- CompTIA Linux+: Installing Software from Source Code
- CompTIA Linux+: Installing & Managing Software
- CompTIA Linux+: Security Best Practices
- Encapsulation & Overloaded Constructors
- Operators & Conditionals
- Methods & Conditionals
- Classes, Data Types & Regular Expressions
- Data Manipulation
- CompTIA Linux+: TCP/IP & Networking
- CompTIA Linux+: Troubleshooting Network Connections
- CompTIA Linux+: Managing & Configuring Hardware
- Introduction to Java
- Conditions & Arrays
- Working with Variables
- Classes & Objects
- CompTIA Linux+: Managing Services
- CompTIA Linux+: Troubleshooting Services
- CompTIA Linux+: Locating & Manipulating Files
- CompTIA Linux+: Boot Process & Kernel
- CompTIA Linux+: Graphical User Interfaces
- CompTIA Linux+: Searching& Manipulating File Contents
- CompTIA Linux+: Logical Volumes & Filesystem Hierarchy
- CompTIA Linux+: Disk Partitions & File Systems
- CompTIA Linux+: File Access & Permissions
- CompTIA Linux+: Using vi/vim to Edit Files
- CompTIA Linux+: Introduction to Linux & the Command Line
- CompTIA Linux+: Managing Users & Groups
- Java Multi-Tenant Cloud Application Programming
- Unix Software Management
- Shell Scripting
- Securing Unix Systems
- Configuring Network Services
- Unix Hardening & Maintenance
- Installing Unix
- The Unix Command Line & GUI
- Creating and Managing Unix File Systems
- Users, Groups, and Authentication
- Windows Server 2016 - Install, Store, & Compute: Failover Clustering Strategies
- Windows Server 2016 - Install, Store, & Compute: Storage Space Direct & Failover
- Windows Server 2016 - Install, Store, & Compute: VM Motion & Network Load Balancing
- AWS Cloud Practitioner 2019: AWS Access Management
- Windows Server 2016 - Install, Store, & Compute: Hyper-V Networking Configuration
- Windows Server 2016 - Install, Store, & Compute: Windows Containers Deployment
- Windows Server 2016 - Install, Store, & Compute: Container Management & Migration
- AWS Cloud Practitioner 2019: Security Support Resources
- Windows Server 2016 - Install, Store, & Compute: Hyper-V Storage Configuration
- AWS Cloud Practitioner 2019: Core AWS Services
- AWS Cloud Practitioner 2019: Cloud Security & Compliance
- AWS Cloud Practitioner 2019: AWS Cloud Deployment and Operation
- AWS Cloud Practitioner 2019: Technology Support Resources
- Windows Server 2016 - Install, Store, & Compute: Disk & Volume Configuration
- Windows Server 2016 - Install, Store, & Compute: Server Storage Solutions
- Windows Server 2016 - Install, Store, & Compute: Data Deduplication & Hyper-V Setup
- Windows Server 2016 - Install, Store, & Compute: Virtual Machine (VM) Settings
- Windows Server 2016 - Install, Store, & Compute: Upgrades & Migrations
- Windows Server 2016 - Install, Store, & Compute: Backups, Hyper-V, AD, & Monitoring
- Windows Server 2016 - Install, Store, & Compute: Image Deployment Management
- AWS Cloud Practitioner 2019: Architecture Design Principles
- AWS Cloud Practitioner 2019: Shared Responsibility
- Windows Server 2016 - Install, Store, & Compute: Installation Options
- Updating to Server 2019: Server Configuration
- Updating to Server 2019: Server Roles
- Updating to Server 2019: PowerShell for Windows Server
- Managing for Operational Excellence
- Updating to Server 2019 : Windows Server 2019 Features
- Updating to Server 2019: Windows Server Installations
- Updating to Server 2019: Storage, Failover Clustering, & Application Platform
- ITIL® 4 Foundation: The Guiding Principles
- ITIL® 4 Foundation: The Service Value Chain
- ITIL® 4 Foundation: General Management Practices
- ITIL® 4 Foundation: Service Management Practices (Part 1)
- ITIL® 4 Foundation: Service Management Practices (Part 2)
- Azure Fundamentals: Cloud Computing
- ITIL® 4 Foundation: Introduction
- Big Data Fundamentals
- Big Data Interpretation
- ITIL® 4 Foundation: Key Concepts of Service Management
- ITIL® 4 Foundation: Key Concepts
- ITIL® 4 Foundation: The Service Value System
- Exploring Business Process Automation
- AWS Cloud Practitioner 2019: Cloud Economics
- Rapport Building in Customer Service
- Learning from Failure
- AWS Cloud Practitioner 2019: AWS Cloud & the Value Proposition
- Providing Effective Internal Customer Service
- Services, Configuration, & Middleware
- Developing and Supporting an Agile Mind-set
- Embracing an Agile Culture for Business Growth
- Moving to the Cloud
- Developing a Growth Mind-set
- Understanding Bots: Chatbot Architecture
- Kim Yong Teo's Transcript
- Kim Yong Teo's Wallet
- About Accredible