Site Map - skillsoft.digitalbadges.skillsoft.com
- User Authentication
- Anirban Gogoi's Credentials
- Anirban Gogoi's Wallet
- Business Analysis Activities and Tools
- CompTIA A+ Core 2: Information Management & Change Management Processes
- Software Design and Development: Methodologies
- Software Design and Development: Software Engineering & SDLC Phases
- Agile & TDD Best Practices for APIs: Test-driven Development Strategy
- Microsoft Azure Fundamentals: Azure Files
- Microsoft Azure Fundamentals: VNet Peering & VPNs
- Microsoft Azure Fundamentals: Network Infrastructure
- Microsoft Azure Fundamentals: Container Solutions
- Microsoft Azure Fundamentals: Virtual Machines
- Microsoft Azure Fundamentals: App Services
- Microsoft Azure Fundamentals: Azure RBAC & Azure Policy
- Microsoft Azure Fundamentals: Managing Azure Costs
- Microsoft Azure Fundamentals: Software Development Services
- Microsoft Azure Fundamentals: Managing Azure Authentication
- Microsoft Azure Fundamentals: Managing Azure AD
- Microsoft Azure Fundamentals: Service Resilience
- Microsoft Azure Fundamentals: Monitoring Azure Services
- Microsoft Azure Fundamentals: Network Security
- Microsoft Azure Fundamentals: Migrating to Azure
- Microsoft Azure Fundamentals: Azure Cloud Computing
- Microsoft Azure Fundamentals: Management Tools
- Microsoft Azure Fundamentals: Managing the Hierarchy
- Microsoft Azure Fundamentals: Managing Storage
- API Security
- Application Security Awareness & Validation
- Secure Application Architecture & IAM
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Threat Modeling
- CCSP 2019: Application Development & Security
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Secure Design Principles
- CISSP: Risk Management
- Secure Design
- Data Security and Access Control
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Secure Coding Practices
- Defensive Java Fundamentals
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Core Concepts
- OWASP Overview
- A7 and A6: Leaky and Unprepared Applications
- A8 and A3: Cross-Site Attacks
- A4 and A2: Broken Applications
- A10 and A9: API and Component Attacks
- A5 and A1: Security and Injection
- Data Handling and Concurrency
- Angular 11: Getting Started with Angular
- Automated Software Testing
- Top 10 List Items
- SOLID & GRASP
- Cloud Security Fundamentals: Cloud Application Security
- Need for Design Patterns & the Principles Guiding Design Patterns
- Agile Test-Driven Development
- Anirban Gogoi's Transcript
- Anirban Gogoi's Wallet
- About Accredible