Site Map - skillsoft.digitalbadges.skillsoft.com
- User Authentication
- Ajay pratap Singh's Credentials
- Ajay pratap Singh's Wallet
- Data Loading & Visualization in Power BI: Data Modeling
- Data Loading & Visualization in Power BI: Getting Started
- Data Loading & Visualization in Power BI: Loading Data from Cloud Storage
- Data Loading & Visualization in Power BI: Loading Data from Databases
- Automation Design & Robotics
- Using Robots and RPA in the Workplace
- Track 2: 5G Practices
- 5G Security & Privacy Practices
- 5G Technologies and Practices
- 5G Practices: Working with Governments & Regulations
- 5G Mobile Network Providers: Diving Deeper into 5G's Layered Design
- Final Exam: 5G Practices
- 5G Mobile Network Providers: 5G Mobile Networks & Providers
- 5G Principles & Practices: Small Cell Networking
- 5G Mobile Network Providers: The 5G Protocol Stacks
- 5G Mobile Network Providers: 5G Core Infrastructure
- Track 1: 5G Principles
- Final Exam: 5G Principles
- 5G Principles: Assessing & Navigating 5G Issues
- 5G Machine-type Communication: Applications of Machine-to-machine Communication
- Anatomization of 5G Communications: Players & Enablers
- Anatomization of 5G Communications: Network Architecture & Topology
- 5G Machine-type Communication: Defining Machine-type 5G
- 5G Principles: The Promise of the 5G Revolution
- 5G Principles: Comparing 5G to 4G
- 5th Generation Mobile Networks: 5G Principles, Facts & Fiction
- 5th Generation Mobile Networks: The 5G Revolution
- Encouraging Innovation and Experimentation with AI
- Leveraging AI as a Team Member
- Fostering a Growth Mindset in the Age of AI
- Leveraging Analytical and Critical Thinking to Implement AI
- Embracing Risk and Learning from Setbacks with AI Projects
- Leading an AI Transformation
- Human Skills to Sustain an AI Transformation
- Generative AI Business Transformation
- Leading through the AI Disruption with Empathy
- Unlocking Business Solutions with AI-Powered Analytics
- Using AI to Improve the Employee Experience
- Leading in the Age of Generative AI
- Reimagining Work with Generative AI
- Reimagining the Sales Process with Generative AI
- Recognizing Hallucinations, Inaccuracies, and Bias in AI
- Establishing AI Guardrails and Governance
- Reimagining the Customer Experience with Generative AI
- Responsible Application and Guardrails for Generative AI
- Navigating AI Ethical Challenges and Risks
- ChatGPT & Its Practical Use Cases
- Cloud Computing and MLOps: ML Pipelines
- Track 4: Cloud Computing and MLOps in AI/ML
- AI and ML for Decision-makers
- Final Exam: AI and ML for Decision-makers
- Developing an AI/ML Data Strategy: Data Analytics & Data Ethics
- Visualizing Data for Impact: Visual Design Theory
- Visualizing Data for Impact: Introduction to Data Visualization
- Visualizing Data for Impact: Data Storytelling
- Cloud Computing and MLOps: Cloud and AI
- Cloud Computing and MLOps: Introduction to MLOps
- Visualizing Data for Impact: Analyzing Misleading Visualizations
- Track 3: Visualizing Data for Impact
- Track 2: Developing an AI/ML Data Strategy
- Developing an AI/ML Data Strategy: Aspects of a Robust AI Strategy
- Developing an AI/ML Data Strategy: Data Bias & Ethical Considerations in AI
- Developing an AI/ML Data Strategy: The Data Analytics Maturity Model
- Developing an AI/ML Data Strategy: Building an AI-powered Workforce
- Developing an AI/ML Data Strategy: Data Management & Governance in AI
- Fundamentals of AI & ML: Foundational Data Science Methods
- Track 1: Fundamentals of AI and ML
- Fundamentals of AI & ML: Introduction to Artificial Intelligence
- Big Data Concepts: Getting to Know Big Data
- Cloud Value Proposition: Major Cloud Players
- Cloud Security, Risk, and Compliance: Risk & Compliance in the Cloud Era
- Cloud Computing for Decision-makers: Cloud Adoption
- Final Exam: Cloud Computing for Decision-makers
- Track 1: Cloud Computing for Decision-makers
- Cloud Computing for Decision-makers and Leaders
- Business Value of the Cloud: The Cloud Computing Value Proposition
- Business Value of the Cloud: Cloud Computing Case Studies
- Business Value of the Cloud: How the Cloud Impacts our Work
- Cloud Value Proposition: Amazon Web Services for Decision Makers
- Cloud Value Proposition: Google Cloud Platform for Decision Makers
- Cloud Value Proposition: Microsoft Azure for Decision Makers
- Cloud Security, Risk, and Compliance: Managing Security in the Cloud Era
- Defining Cloud Computing for Decision-makers: Cloud Computing Principles
- Defining Cloud Computing for Decision-makers: Cloud Business Model
- Business Transformation Through IT: Cloud Computing for Decision Makers
- Enterprise Continuum
- Reference Models
- Architecture Capability Framework
- Architecture Development Method (ADM) Cycle
- ADM Guidelines & Techniques
- Getting Your Pitch Heard
- Expert Insights on Presentation Skills
- Choosing and Preparing Your Delegate
- Facing Challenges as a First-time Manager
- Ensuring Successful Presentation Delivery
- ADM Application & Architecture Content Framework
- Presentation Mastery Series
- Scaling an Organization's Scrum Process
- Scaling Scrum: Challenges
- Integrating & Customizing Scrum
- Scaling Scrum: Choosing Scaled Agile Frameworks
- Advanced Scrum Metrics
- Secure Agile Programming: Agile Concepts
- Agile and DevOps: Adopting Agile Methodology
- Distributed Scrum & Done Challenges
- Advanced Scrum for Project Management
- Agile Hybrid Approaches
- Advanced Agile: Tools & Techniques
- Value-driven Delivery: Delivering Value in Agile Projects
- Project Management: Scrum Framework for Software Development
- Software Testing Cycle: Agile Testing
- Advanced Agile: Leadership Techniques
- Project Meetings: Agile Project Meetings
- Product Development Practices
- Applying Scrum Development Practices
- Scrum: Creating Effective Product Backlogs
- Scrum: Product Backlog
- Scrum Concepts & the Product Owner
- Scrum: Product Development Framework
- Scrum Product: Defining the Why & How of the Product
- Scrum Artifacts and Investment Guidelines
- Scrum Master: Scrum for the Team
- Agile & TDD Best Practices for APIs: Test-driven Development Strategy
- Transition to Scrum: Agile Foundation to Scrum
- Lean in Scrum: Lean Development Practices
- Secure Agile Programming: Testing
- Techniques & Tools
- Transitioning to Scrum
- Scrum Team Velocity: Exploring Team Velocity
- Testing Approaches
- Managing and Engaging Stakeholders
- Business Analysis for Project Management: Practices for Later Project Stages
- Skills for Project Analysts: Negotiation Skills
- Risk Management: Project Risk Assessment
- Project Management Needs vs. Expectations
- Stakeholder Communication: Software Projects & Stakeholder Communication
- Decision Making for Software Project Managers
- Agile Software Development: Agile Project Management Techniques
- Agile Methodologies
- Agile for Software Development: Lean, Agile, & Scrum Methodologies
- Project Evaluation: Defining Success Metrics
- Agile Foundations: Fundamentals
- Agile Foundations: Scrum Methodology
- Agile Software Development: Agile Development Life Cycle
- PRINCE2® Project Management Overview (2017 Update)
- Planning an Effective Presentation
- Building Your Presentation
- Scaled Agile Leader: Scaling Scrum Frameworks
- Scaled Agile Leader: Scrum Scaling Challenges
- Scaled Agile Leader: Scaling Scrum Customization
- Track 2: Scaled Agile Leader
- Scrum Team Member to Scaled Agile Leader (2022 Update)
- Final Exam: Scaled Agile Leader
- Fundamentals of AI & ML: Advanced Data Science Methods
- Scrum Foundation: Scrum Development Concepts
- Scaled Agile Leader: Scaling Scrum
- Scrum Foundation: Best Practices
- Track 1:Scrum Team Member
- Final Exam: Scrum Team Member
- Scrum Foundation: Scrum Basics
- Scrum Foundation: Scrum Certification & the Scrum Guide
- Scrum Foundation: Scrum in Action
- Scrum Foundation: Scrum Team & Collaboration
- Track 3: Mitigating Security Risks
- Security Essentials for Decision-makers and Leaders
- Mitigating Security Risks: Maintaining a Secure Workplace
- Mitigating Security Risks: Managing the Incidents
- Mitigating Security Risks: Maintaining Business Continuity
- Final Exam: Mitigating Security Risks
- Generative AI and Its Impact to Everyday Business
- Harnessing the Disruption of Generative AI
- Foundations of Generative AI
- Mitigating Security Risks: Managing Security in a Hybrid Workplace
- Mitigating Security Risks: Managing Information, Cloud, & Data Security Risks
- Mitigating Security Risks: Information Security Governance
- Mitigating Security Risks: Managing Risks from Internal Stakeholders
- Mitigating Security Risks: Information, Cloud, & Data Security Risk Considerations
- Mitigating Security Risks: Handling Natural Threats
- Mitigating Security Risks: Managing Social Engineering Risks
- Track 2: Evaluating and Planning for Security Risks
- Mitigating Security Risks: Managing Network & Infrastructure Security Risks
- Mitigating Security Risks: Cyber Security Risks
- Mitigating Security Risks: Managing Physical Security Risks
- Final Exam: Evaluating and Planning for Security Risks
- Security Risks: Key Risk Terms & Concepts
- Security Risks: Performing Security Risk Assessments
- Security Risks: Performing Security Risk Identification
- Security Risks: Planning for Security Risk Management
- Track 1: Becoming Security Aware
- Cybersecurity Awareness: Getting Started with Security Foundations
- Cybersecurity Awareness: Information Security Fundamentals
- Cybersecurity Awareness: Exposure to Security Risks
- Cybersecurity Awareness: Key Security Terms & Concepts
- Final Exam: Becoming Security Aware
- InfoSec Crisis Management & Incident Response
- Information Security Practices: InfoSec Vendor Management
- Information Security Practices: Budgeting & Forecasting for InfoSec
- Information Security Practices: Multi-year InfoSec Planning
- Final Exam: InfoSec Leadership
- Track 2: InfoSec Leadership
- Information Security for Decision-Makers and Leaders
- Managing Enterprise InfoSec Risks & Risk Tolerance
- Information Security for Leaders: Elements of InfoSec
- Information Security for Leaders: Elements of an InfoSec Team
- Final Exam: Elements of InfoSec
- Track 1: Elements of InfoSec
- Proactive InfoSec Leadership
- Information Security for Leaders: An Introduction to InfoSec
- Ajay pratap Singh's Transcript
- Ajay pratap Singh's Wallet
- About Accredible