Site Map - skillsoft.digitalbadges.skillsoft.com
- User Authentication
- Amit Kumar's Credentials
- Amit Kumar's Wallet
- VMware VCP-DCV vSphere 7: Managing & Deploying VMs
- VMware VCP-DCV vSphere 7: vCenter Domains, Identity Sources, Access, & Backup
- VMware VCP-DCV vSphere 7: ESXi Host Configuration
- VMware VCP-DCV vSphere 7: vCenter Monitoring, Protection, Migration, & Upgrading
- VMware VCP-DCV vSphere 7: Virtualization, SDDC, & ESXi Hosts
- Microsoft Azure Administrator: AZ-104 Question Scenarios
- Microsoft Azure Administrator: Managing Storage Accounts & Blobs
- Microsoft Azure Administrator: Storage Account Security
- Microsoft Azure Administrator: Azure Files
- Microsoft Azure Administrator: Azure Virtual Machine Management
- Microsoft Azure Administrator: Azure Application Containers
- Microsoft Azure Administrator: Azure Template Deployments
- Microsoft Azure Administrator: Azure App Service
- Microsoft Azure Administrator: Azure Policy & Compliance
- Microsoft Azure Administrator: Azure Resource Locking
- Microsoft Azure Administrator: Role-based Access Control
- Microsoft Azure Administrator: Business Continuity in the Azure Cloud
- Microsoft Azure Administrator: Azure Cost Management
- Microsoft Azure Administrator: Azure Monitoring
- Microsoft Azure Administrator: Azure Network Security
- Microsoft Azure Administrator: Azure Network Infrastructure
- Microsoft Azure Administrator: Azure Network Connectivity
- Agile and DevOps: Adopting Agile Methodology
- Scrum Product: Defining the Why & How of the Product
- Scrum Artifacts and Investment Guidelines
- Scrum: Creating Effective Product Backlogs
- Scrum: Product Backlog
- Product Development Practices
- Applying Scrum Development Practices
- Scrum Concepts & the Product Owner
- Scrum: Product Development Framework
- Scrum Master: Scrum for the Team
- Lean in Scrum: Lean Development Practices
- Scrum Team Velocity: Exploring Team Velocity
- Transition to Scrum: Agile Foundation to Scrum
- Transitioning to Scrum
- Agile & TDD Best Practices for APIs: Test-driven Development Strategy
- Testing Approaches
- Secure Agile Programming: Testing
- Techniques & Tools
- Skills for Project Analysts: Negotiation Skills
- Business Analysis for Project Management: Practices for Later Project Stages
- Managing and Engaging Stakeholders
- Risk Management: Project Risk Assessment
- Project Management Needs vs. Expectations
- Stakeholder Communication: Software Projects & Stakeholder Communication
- Decision Making for Software Project Managers
- Agile Software Development: Agile Project Management Techniques
- Project Evaluation: Defining Success Metrics
- Agile Best Practices for Tech Leaders: Organization Fundamentals
- Agile Foundations: Scrum Methodology
- Agile Methodologies
- Agile for Software Development: Lean, Agile, & Scrum Methodologies
- Agile Software Development: Agile Development Life Cycle
- Agile Foundations: Fundamentals
- DevOps with Ansible: Overview
- Jenkins: Testing & Continuous Integration
- Jenkins: Introduction
- Jenkins: Creating Application Builds
- DevOps with Ansible: Introduction to Playbooks & Testing
- Building the Puppet Environment
- Jobs, Security, & Run Options
- Configuring Puppet Environments & Managing Files
- Managing Stacks & Application Deployment
- Configuring the Puppet Master & Puppet Agent
- Puppet Refactoring Patterns
- Linux Exploits & Mitigation: Penetration Tools
- Linux Exploits & Mitigation: Memory and Pointer Vulnerabilities
- Jenkins: Administration
- Docker Containers, Images, & Swarms
- Jenkins: Getting Started
- Linux Exploits & Mitigation: Linux Exploit Architecture
- Remote Access
- Network Services
- Using the Bash Shell
- Network File Systems
- Using grep
- Logical Volume Management
- Virtualization
- Configuring Gnome
- Using Linux Shells
- Troubleshooting
- Package Management
- Networking
- User & Group Management
- Logging
- SELinux
- Network Services Management
- Users, Groups, & Environment Variables
- Scripting & Administrative Tasks
- Package Management
- Unix Input, Output, & Piping
- Networking Fundamentals
- Processes, Services, & Daemons
- Directory Services
- System Booting & Shutdown
- Linux Installation
- Linux Exploits & Mitigation: Program Essentials
- Linux Exploits & Mitigation: Staging for Exploit Analysis
- Linux Exploits & Mitigation: String Vulnerability Analysis
- Kickstart & First-run Issues
- Job Scheduling
- Introduction to System Architecture
- Introduction to Devices & File Systems
- Installation
- GUIs & Configuration
- GNU & Unix Commands
- Firewalls
- File Systems & Partitions
- File Permissions & Links
- File Permissions
- File Management
- Essential System Services
- CompTIA Linux+: Using vi/vim to Edit Files
- CompTIA Linux+: Troubleshooting Services
- CompTIA Linux+: TCP/IP & Networking
- CompTIA Linux+: Troubleshooting Network Connections
- CompTIA Linux+: Security Best Practices
- CompTIA Linux+: SELinux & AppArmor
- CompTIA Linux+: Searching& Manipulating File Contents
- CompTIA Linux+: Scheduling Tasks
- CompTIA Linux+: Network Firewall & Traffic Filtering
- CompTIA Linux+: Managing Users & Groups
- CompTIA Linux+: Managing Services
- CompTIA Linux+: Logical Volumes & Filesystem Hierarchy
- CompTIA Linux+: Locating & Manipulating Files
- CompTIA Linux+: Managing & Configuring Hardware
- CompTIA Linux+: Introduction to Linux & the Command Line
- CompTIA Linux+: Installing Ubuntu
- CompTIA Linux+: Installing & Managing Software
- CompTIA Linux+: Installing Software from Source Code
- CompTIA Linux+: File Access & Permissions
- CompTIA Linux+: Git Version Control
- CompTIA Linux+: Installing CentOS
- CompTIA Linux+: Graphical User Interfaces
- CompTIA Linux+: Disk Partitions & File Systems
- CompTIA Linux+: Bourne-again Shell & Scripting
- CompTIA Linux+: Boot Process & Kernel
- CompTIA Linux+: Backup & Restore
- Boot Process
- Bash Script Programming
- Bash Scripting
- Advanced GNU & Unix Commands
- Archiving
- Release, Service Level, and Availability Management
- Service Desk, IT Asset, Service Configuration, and Change Control Management
- The Service Value Chain and General Management Practices
- Event, Incident, and Problem Management
- The Guiding Principles of the Service Value System and Continual Improvement Model
- Key Concepts and the Four Dimensions of Service Management
- ITIL® 4 Foundation: Key Concepts of Service Management
- ITIL® 4 Foundation: Introduction
- Amit Kumar's Transcript
- Amit Kumar's Wallet
- About Accredible