Site Map - skillsoft.digitalbadges.skillsoft.com
- User Authentication
- Aastha Gupta's Credentials
- Aastha Gupta's Wallet
- CompTIA PenTest+: Social Engineering Attacks
- Data Access & Governance Policies: Data Classification, Encryption, & Monitoring
- CCSP 2019: Identity & Access Management
- Systems Hardening
- CCSP 2022: Cloud Security Concepts & Design Principles
- Leading Security Teams for GenAI Solutions: Use of Generative AI
- Responsible Use of AI
- Git & GitHub: Introduction
- Exploring Business Process Automation
- Hybrid Environment Pipelines: Hybrid Cloud Transformation
- Using Robots and RPA in the Workplace
- Code Quality, Testing, & Development
- Testing Methods
- Software Design and Development: Design Patterns & SOLID Principles
- CAPM®: Performance Measurement Metrics
- Embracing Agile at Scale
- Agile Project Planning
- Validate and Control Scope (PMBOK® Guide Sixth Edition)
- Effective Stakeholder Communications for Technology Professionals
- Facing Virtual Team Challenges
- Managing and Engaging Stakeholders
- Forging Relationships with External Stakeholders
- Contributing as a Virtual Team Member
- Organizing Your E-mail
- Effective Team Communication
- Sending E-mails to the Right People
- Optimizing Virtual Collaboration
- Developing Personal Accountability
- Building a Win-win Relationship with Your Manager
- Building Rapport through Strong Collaboration
- Enhancing Communication through Listening
- Becoming a Successful Collaborator
- Strategies for Building a Cohesive Team
- Encouraging Team Communication and Collaboration
- Earning and Offering Trust at Work
- Working Well with Others
- Understanding Agile Fundamentals (2021 Update)
- Agile Foundations: Fundamentals
- Agile Principles and Methodologies
- Ethics and Project Management
- Defining and Identifying Project Risk (2021 Update)
- Creating a Project Schedule and Budget
- Defining a Project Scope and Team
- Navigating through Changes and Conflicts in Projects
- Risk Assessment and Management
- Exploring Project Management, Then and Now (2021 Update)
- Expert Insights on Mentoring
- Test Automation: Automated Software Testing
- Building and Leading Successful Teams
- Expanding Your Communication Skill Set
- Implementing Unit Testing Best Practices
- Software Testing Foundation 2018: Fundamentals
- Managing Project Work (PMBOK® Guide Sixth Edition)
- Clean Coding Techniques: Introduction
- Cybersecurity and Networking Fundamentals
- Stakeholder Communication: Software Projects & Stakeholder Communication
- Taking Responsibility for Your Accountability
- Expert Insights on Working Effectively on a Team
- Be Liked and Respected in the Workplace
- Writing Effective E-mails and Instant Messages
- Becoming Your Own Best Coach
- Artificial Intelligence and Machine Learning
- Finetuning Your ChatGPT Prompts
- ChatGPT Prompt Engineering Examples & Use Cases
- Generative AI APIs for Practical Applications: An Introduction
- Packaging in DevOps: Application Packaging Mechanism
- Adopting IT Automation
- Introduction to Bash Scripting
- Being an Effective Team Member
- Introduction to PowerShell 5.0
- Business Analysis Activities and Tools
- Business Analysis Overview
- Software Design and Development: Methodologies
- CompTIA A+ Core 2: Information Management & Change Management Processes
- Software Design and Development: Software Engineering & SDLC Phases
- OWASP Top 10: A8 - Insecure Deserialization
- OWASP Top 10: A9 - Using Components with Known Vulnerabilities
- OWASP Top 10: A10 - Insufficient Logging & Monitoring
- OWASP Top 10: Discovering & Exploiting Web App Vulnerabilities
- OWASP Top 10: A1 - Injection
- OWASP Top 10: A2 - Broken Authentication
- OWASP Top 10: A4 - XML External Entities
- OWASP Top 10: Web Application Security
- OWASP Top 10: A3 - Sensitive Data Exposure
- OWASP Top 10: A5 - Broken Access Control
- OWASP Top 10: A6 - Security Misconfiguration
- OWASP Top 10: A7 - Cross-site Scripting
- OWASP Top 10: Securing Web Applications
- OWASP Top 10: A01:2021-Broken Access Control
- OWASP Top 10: A02:2021-Cryptographic Failures
- OWASP Top 10: A03:2021-Injection
- OWASP Top 10: A04:2021-Insecure Design
- OWASP Top 10: A05:2021-Security Misconfiguration
- OWASP Top 10: A06:2021-Vulnerable & Outdated Components
- OWASP Top 10: A07:2021-Identification & Authentication Failures
- OWASP Top 10: A09:2021-Security Logging & Monitoring Failures
- OWASP Top 10: A08:2021-Software & Data Integrity Failures
- OWASP Top 10: A10:2021-Server-Side Request Forgery (SSRF)
- Entry Certificate in Business Analysis™
- Cloud Security Fundamentals: Cloud Application Security
- Top 10 List Items
- SOLID & GRASP
- Need for Design Patterns & the Principles Guiding Design Patterns
- Automated Software Testing
- Jenkins for DevOps: Jenkins Configuration for DevOps
- Using Docker for DevOps: Introduction to Docker
- Software Testing for DevOps: DevOps Test Tools
- The Language of DevOps: DevOps Tools & Processes
- Agile Test-Driven Development
- Cloud Computing Fundamentals: Introduction
- Using Kanban in IT & Software Development
- Software Data Analysis: Project Management Metrics
- Developing the Product & Sprint Backlogs
- Agile Software Development - Scrum
- Release & Sprint Planning
- IIBA® Member
- Aastha Gupta's Transcript
- Aastha Gupta's Wallet
- About Accredible