Site Map - skillsoft.digitalbadges.skillsoft.com
- User Authentication
- Afreen Singh's Credentials
- Afreen Singh's Wallet
- PL-300: Applying Power BI's Advanced Analysis Features
- PL-300: Using the Power BI Service
- PL-300: Analysis & Sharing Features in Power BI
- PL-300: Power BI for Data Analysis
- CompTIA Network+: IP Addressing Schemes and Subnetting
- CCNA 2020: Network Access, VLAN Configuration, & Interswitch Connectivity
- DESGN 3.0: OSPF & BGP Expansion
- CompTIA A+ 220-1002: Application Installation, Networking, & Tools
- Decoding the Packet Header & Discovering ICMPv6
- Networking Standards and Connections
- CompTIA A+ 220-1001: Network Types
- CompTIA A+ 220-1001: Networking Tools
- Benefits & Allocating Addresses
- Software-Defined Networking Fundamentals
- Network Function Virtualization Fundamentals
- Exploring Addresses
- CompTIA A+ 220-1001: Implementing Network Concepts
- CompTIA A+ 220-1001: Configuring a Wired/Wireless Network
- CompTIA A+ 220-1001: Wireless Networking Protocols
- CompTIA A+ 220-1001: Network Hosts
- CompTIA A+ 220-1001: Networking
- Network Security and Emerging Technologies
- Routing and Wide Area Networks
- Communication and Web Protocols
- TCP, UDP, Support and Management Protocols
- IP Addressing and IPv4 Subnetting
- Wireless LANs
- Ethernet LANs and Switching
- Introduction to Networking
- Certified in Cybersecurity (CC): Incident Response
- Certified in Cybersecurity (CC): Physical Access Controls
- CompTIA Cybersecurity Analyst+: Malicious Techniques & Procedures
- Network Discovery Tools and Techniques
- Certified in Cybersecurity (CC): Networking & Security Infrastructure
- Introduction to Cyber Operations
- Firewalls
- SSCP 2021: Basic Security Concepts
- Network Devices
- Networking
- CCNA 2020: NTP, DNS, & DHCP
- SENSS 1.0: IPv6 Support & Traffic Inspection
- Risk & IT Management
- CompTIA Cybersecurity Analyst+: Threat Intelligence Information
- CompTIA Security+: Survey of Malicious Activities
- CompTIA Cybersecurity Analyst+: Malware
- CompTIA Security+: Computing Resources Security Techniques
- Applying Scrum Development Practices
- Scrum: Creating Effective Product Backlogs
- Scrum: Product Backlog
- Scrum Concepts & the Product Owner
- Scrum: Product Development Framework
- Scrum Product: Defining the Why & How of the Product
- Transition to Scrum: Agile Foundation to Scrum
- Lean in Scrum: Lean Development Practices
- Scrum Artifacts and Investment Guidelines
- Scrum Master: Scrum for the Team
- Transitioning to Scrum
- Product Development Practices
- Scrum Team Velocity: Exploring Team Velocity
- Agile & TDD Best Practices for APIs: Test-driven Development Strategy
- Agile Foundations: Fundamentals
- Agile Foundations: Scrum Methodology
- Risk Management: Project Risk Assessment
- Testing Approaches
- Secure Agile Programming: Testing
- Techniques & Tools
- Agile Methodologies
- Project Evaluation: Defining Success Metrics
- Project Management Needs vs. Expectations
- Stakeholder Communication: Software Projects & Stakeholder Communication
- Managing and Engaging Stakeholders
- Business Analysis for Project Management: Practices for Later Project Stages
- Skills for Project Analysts: Negotiation Skills
- Decision Making for Software Project Managers
- GCP Engineering & Streaming Architecture
- Streaming Pipelines & Analytics
- GCP Big Data & Security
- Container, Compute, & App Engine
- Dataflow Autoscaling Pipelines
- Machine Learning with TensorFlow & Cloud ML
- GCP Network Data Processing Models
- Dataproc
- Dataproc Architecture
- Dataproc Operations
- Deeper through GCP Analytics & Scaling
- Storage & Analytics
- APIs & Machine Learning
- Implementations with BigQuery for Big Data
- Fundamentals of BigQuery
- Google Cloud Architect: CLI Cloud Resource Management
- Platform Fundamentals
- Google Cloud Architect: Virtual Machine Configuration
- Google Cloud Architect: Security
- Google Cloud Architect: Identity Management
- Google Cloud Architect: Troubleshooting
- Google Cloud Architect: Virtual Machine Deployment
- Google Cloud Architect: Programmatic Access
- Google Cloud Architect: Monitoring & Logging
- Google Cloud Architect: Solution Management & Testing
- Google Associate Cloud Engineer: Google Cloud Load Balancing
- Google Associate Cloud Engineer: Implementing Google Compute Engine
- Google Associate Cloud Engineer: Managing Google Compute Engine
- Google Cloud Architect: Cloud Basics
- Google Cloud Architect: Network Components
- Google Cloud Architect: Data Storage
- Google Cloud Architect: Cloud Design
- Google Associate Cloud Engineer: Google Cloud Platform Ecosystem
- Google Associate Cloud Engineer: Configuring Google Cloud
- Google Associate Cloud Engineer: Google Cloud Resource Manager
- Google Cloud Architect: Web Applications & Name Resolution
- Service Configuration & Management
- Security, Service, & Mobile Device Management
- Instance Creation
- Instance Management
- Google Cloud: Getting Started
- Email & Calendar Management
- Group & OU Management
- User Management
- Microsoft Azure Security Technologies: Azure Security Center
- Microsoft Azure Security Technologies: VPNs
- Microsoft Azure Security Technologies: Review Course 2
- Microsoft Azure Security Technologies: Application Containers
- Microsoft Azure Security Technologies: Azure AD User Management
- Microsoft Azure Security Technologies: Monitoring, Logging, & Alerts
- Microsoft Azure Security Technologies: Azure AD Connect
- Microsoft Azure Security Technologies: Review Course 1
- Microsoft Azure Security Technologies: Network Security
- Microsoft Azure Security Technologies: Azure AD Group Management
- Microsoft Azure Security Technologies: Azure Key Vault
- Microsoft Azure Security Technologies: Azure RBAC & Policies
- Microsoft Azure Security Technologies: VM Security
- Microsoft Azure Security Technologies: Web Application Security
- Microsoft Azure Security Technologies: Identity & Access Management
- Microsoft Azure Security Technologies: Database User Access
- Microsoft Azure Fundamentals: Software Development
- Microsoft Azure Fundamentals: App Services
- Microsoft Azure Fundamentals: Resource Governance
- Microsoft Azure Fundamentals: Monitoring & Cost Management
- Microsoft Azure Fundamentals: Security & Compliance
- Microsoft Azure Security Technologies: Azure Storage Account Security
- Microsoft Azure Security Technologies: Azure Database Security
- Microsoft Azure Security Technologies: Data Classification
- Microsoft Azure Fundamentals: Azure AD & Windows Virtual Desktop
- Microsoft Azure Fundamentals: Virtual Machines & Security Groups
- Microsoft Azure Fundamentals: Databases & Data Analytics
- Microsoft Azure Fundamentals: Azure Storage
- Microsoft Azure Fundamentals: Networking
- Microsoft Azure Fundamentals: Subscriptions & ARM Templates
- Microsoft Azure Fundamentals: Managing Azure Services
- Microsoft Azure Fundamentals: Cloud Computing
- Azure Fundamentals: Monitoring the Azure Environment
- Azure Fundamentals: Azure Security Services
- Azure Fundamentals: Azure Network Security
- Azure Fundamentals: Azure Data Privacy
- Azure Fundamentals: IoT & AI
- Azure Fundamentals: Big Data Analytics
- Azure Fundamentals: Virtual Machines
- Azure Fundamentals: Database Solutions
- Azure Fundamentals: Network Components
- Azure Fundamentals: Storage Components
- Azure Fundamentals: Cloud Computing
- Azure Fundamentals: The Ecosystem
- Introduction to the Agile Principles and Mindset Bootcamp: Session 1 Replay
- Business Orientation: Strategic Organizational Goals
- Agile Hybrid Approaches
- Value-driven Delivery: Delivering Value in Agile Projects
- Business Strategy: Managing Organizational Value
- Advanced Scrum for Project Management
- Project Management: Scrum Framework for Software Development
- Agile Software Development: Agile Project Management Techniques
- Agile Software Development: Agile Development Life Cycle
- Agile for Software Development: Lean, Agile, & Scrum Methodologies
- Agile Project Scheduling and Monitoring
- Agile Project Planning
- Agile Stakeholder Engagement and Team Development
- Agile Principles and Methodologies
- Afreen Singh's Transcript
- Afreen Singh's Wallet
- About Accredible