Site Map - skillsoft.digitalbadges.skillsoft.com
- User Authentication
- Andreia Mascarenhas's Credentials
- Andreia Mascarenhas's Wallet
- Track 4: Cloud Computing and MLOps in AI/ML
- AI and ML for Decision-makers
- Final Exam: AI and ML for Decision-makers
- Cloud Computing and MLOps: Introduction to MLOps
- Cloud Computing and MLOps: ML Pipelines
- Cloud Data Architecture: Cloud Architecture & Containerization
- Visualizing Data for Impact: Data Storytelling
- Cloud Computing and MLOps: Cloud and AI
- Track 3: Visualizing Data for Impact
- Generative AI Foundations: IT Integration with Generative AI
- Developing an AI/ML Data Strategy: Data Analytics & Data Ethics
- Visualizing Data for Impact: Visual Design Theory
- Visualizing Data for Impact: Introduction to Data Visualization
- Visualizing Data for Impact: Analyzing Misleading Visualizations
- Track 2: Developing an AI/ML Data Strategy
- Developing an AI/ML Data Strategy: Aspects of a Robust AI Strategy
- Developing an AI/ML Data Strategy: Data Bias & Ethical Considerations in AI
- Developing an AI/ML Data Strategy: Data Management & Governance in AI
- Fundamentals of AI & ML: Introduction to Artificial Intelligence
- Developing an AI/ML Data Strategy: The Data Analytics Maturity Model
- Developing an AI/ML Data Strategy: Building an AI-powered Workforce
- Fundamentals of AI & ML: Foundational Data Science Methods
- Fundamentals of AI & ML: Advanced Data Science Methods
- Track 1: Fundamentals of AI and ML
- Fundamentals of AI & ML: Metrics & Evaluation
- Information Security: NACs & Gateways
- Information Security: Pen Testing
- Information Security: Honeypots
- Information Security: Continual Infrastructure Testing
- Information Security: Security Governance
- An Executive's Guide to Security: Understanding Security Threats
- Auditing & Incident Response
- Information Security: APT Defenses
- Information Security: Subnetting & DNS for Security Architects
- Information Security: Securing Networking Protocols
- Session & Risk Management
- An Executive's Guide to Security: Protecting Your Information
- Information Security: Hardened Security Topologies
- Secure Application and Data Architecture Design
- Security Architecture Documentation and Alternative Architectures
- Andreia Mascarenhas's Transcript
- Andreia Mascarenhas's Wallet
- About Accredible