Site Map - skillsoft.digitalbadges.skillsoft.com
- User Authentication
- Anirudh Goel's Credentials
- Anirudh Goel's Wallet
- Data Models & Pivot Reports
- Splunk Administration
- Searching for Data & Saving Reports
- Microsoft Azure Fundamentals: Azure Software Development Services
- Microsoft Azure Fundamentals: Monitoring Azure Services
- Microsoft Azure Fundamentals: Migrating to Microsoft Azure
- Microsoft Azure Fundamentals: Azure Network Security
- Microsoft Azure Fundamentals: Azure VNet Peering & VPNs
- Microsoft Azure Fundamentals: Azure Container Solutions
- Microsoft Azure Fundamentals: Azure RBAC & Azure Policy
- Microsoft Azure Fundamentals: Managing Azure Costs
- Microsoft Azure Fundamentals: Azure Virtual Machines
- Microsoft Azure Fundamentals: Azure App Service
- Microsoft Azure Fundamentals: Managing Azure AD
- Microsoft Azure Fundamentals: Azure Service Resilience
- Microsoft Azure Fundamentals: Managing Azure Authentication
- Microsoft Azure Fundamentals: AZ-900 Exam Preparation
- Microsoft Azure Fundamentals: Cloud Computing
- Microsoft Azure Fundamentals: Azure Management Tools
- Microsoft Azure Fundamentals: Managing the Microsoft Azure Hierarchy
- Microsoft Azure Fundamentals: Managing Azure Storage
- Microsoft Azure Fundamentals: Azure Files
- Microsoft Azure Fundamentals: Azure Network Infrastructure
- CCSP 2019: Identity & Access Management
- CCSP 2022: Cloud Security Concepts & Design Principles
- Leading Security Teams for GenAI Solutions: Use of Generative AI
- Responsible Use of AI
- Git & GitHub: Introduction
- Exploring Business Process Automation
- Testing Methods
- Hybrid Environment Pipelines: Hybrid Cloud Transformation
- Automation Design & Robotics
- Code Quality, Testing, & Development
- Software Design and Development: Design Patterns & SOLID Principles
- Embracing Agile at Scale
- PRINCE2® Project Management Overview (2017 Update)
- Being an Effective Team Member
- Agile Project Planning
- Effective Team Communication
- Identifying Risk (PMBOK® Guide Sixth Edition)
- Telling a Business Story
- A Difficult Boss Doesn't Have to Be a Difficult Problem
- Getting Your Pitch Heard
- Difficult People: Strategies to Keep Everyone Working Together
- Planning an Effective Presentation
- Building Your Presentation
- Ensuring Successful Presentation Delivery
- Presenting Virtually
- Working Well with Others
- How to Beat Fatigue and Sleep Better
- Eating Healthy for Less
- Presentation Skills
- Year 2 Phase 4: 10 to 12 Months
- Dealing with Conflict
- Year 2 Phase 3: 7 to 9 Months
- Building and Delivering a Great Virtual Presentation
- Unleashing Personal and Team Creativity
- Resolving Workplace Conflict
- Difficult People: Can't Change Them, so Change Yourself
- Design Thinking for Innovation: Brainstorming and Ideation
- Confronting Workplace Conflict
- How to Manage Difficult Conversations
- Verifying and Building on Creative Ideas
- Difficult People: Why They Act That Way and How to Deal with Them
- Take a Deep Breath and Manage Your Stress
- Optimizing Your Workplace Well-being
- Thriving with High-pressure Work
- Problem Solving: Generating Solutions
- Lateral Thinking for Innovative Mindset
- Year 2 Phase 1: 0 to 3 Months
- Difficult Conversation
- Get the Best of Stress
- Year 2 Phase 2: 4 to 6 Months
- Making Difficult Conversations Meaningful
- Unlocking Your Own Creative Genius
- Mindfulness as a Path to Wellness
- Thriving in Anxious Times: Manage your Anxiety and Learn to Love Your Work Again: Session Replay
- The Long Game: \nHow to Be a Long-Term Thinker in a Short-Term World
- Developing Personal Accountability
- Becoming Your Own Best Coach
- Taking Responsibility for Your Accountability
- Making Time for Fitness
- Managing Yourself
- Leadercamp on-demand: Mindfulness & Mindset
- Leadercamp on-demand: Brand You, Brand Us
- Fostering a Growth Mindset in the Age of AI
- Building Success through Self-improvement
- Artificial Intelligence and Machine Learning
- Developing Diplomacy and Tact
- Remaining Tactful and Diplomatic under Pressure
- Navigating Challenging Situations with Diplomacy and Tact
- Being a Responsible Corporate Digital Citizen
- Earning and Offering Trust at Work
- Ethics, Integrity, & Trust
- Leading with Executive Presence
- Effective Stakeholder Communications for Technology Professionals
- Leveraging the Power of Analogical Thinking
- Proven Techniques for Technical Communication
- Taking the Lead with Workplace Motivation and Engagement
- Outwitting Your Cognitive Bias
- Communicating with Confidence
- Choosing the Right Interpersonal Communication Method to Make Your Point
- Capturing the Attention of Senior Executives
- Trust Building through Effective Communication
- Investigating Arguments
- The Art and Science of Communication
- How Culture Impacts Communication
- Audience and Purpose in Business Writing
- Making an Impact with Non-verbal Communication
- Clarity and Conciseness in Business Writing
- Confronting Your Assumptions
- Do We Have A Failure to Communicate?
- Using Communication Strategies to Bridge Cultural Divides
- Reaching Sound Conclusions
- Editing and Proofreading Business Documents
- Improving Your Technical Writing Skills
- Strength under Pressure: Building Perseverance and Resilience
- How to Get Out of Your Own Way and Achieve Success
- Maintaining Balance in Life
- Embracing Happiness
- Accessibility
- Design Thinking
- Sustainability
- Communication with Client / Client Centricity
- Etiquette & Conduct while working from Home
- Year 1 Phase 3: 7 to 9 Months
- Executive Presence
- Basic ST & Personal (Identity) story
- Organizing your Digital Workspace
- Written Business Communication
- Cross Cultural Communication
- Building Your Resilience
- Year 1 Phase 2: 4 to 6 Months
- Critical Thinking
- Year 1 Phase 4: 10 to 12 Months
- Keeping Business Calls Professional
- 360 Value Meter
- Oral Communication
- Maximize Your Productivity by Managing Time and Tasks
- The Art of Staying Focused
- Make The Time You Need: Get Organized
- Writing and Preparing an Effective Speech
- Conquering the Challenges of Public Speaking
- Mindful at Work
- Shared Language
- Remote Ways of Working (OmniConnect)
- Time Management
- Year 1 Phase 1: 0 to 3 months
- Saving Time by Setting Goals
- Sharpening Your Focus to Stay on Track
- Managing Your Time So It Doesn’t Manage You
- Taking Effective and Professional Notes
- Become a Great Listener
- Listening Even When It's Difficult to Listen
- Using Active Listening in Workplace Situations
- Aligning Goals and Priorities To Manage Time
- Troublesome Words and Phrases: Usage Mistakes in Writing
- Business Grammar
- Listening
- Getting the Details Right: Spelling Basics
- Using the Parts of Speech
- Using Punctuation Marks
- Creating Well-constructed Sentences
- Abbreviating, Capitalizing, and Using Numbers
- Cloud Security Fundamentals: Cloud Application Security
- ChatGPT Prompt Engineering Examples & Use Cases
- Generative AI APIs for Practical Applications: An Introduction
- Microsoft Azure Infrastructure Solutions: Policy & Monitoring
- Using Docker for DevOps: Introduction to Docker
- Agile & TDD Best Practices for APIs: Test-driven Development Strategy
- SOLID & GRASP
- Jenkins for DevOps: Jenkins Configuration for DevOps
- Software Testing for DevOps: DevOps Test Tools
- Cloud Computing Fundamentals: Introduction
- Fundamental Concepts
- Splunk: Getting Started
- The Language of DevOps: DevOps Tools & Processes
- Automated Software Testing
- Agile Best Practices for Tech Leaders: Scrum Artifacts
- Developing the Product & Sprint Backlogs
- Release & Sprint Planning
- Using Kanban in IT & Software Development
- Software Data Analysis: Project Management Metrics
- Information Security Incident Management Part II
- Policy & Governance: Incident Response
- Security Incident Triage
- CompTIA Security+: Analyzing Application & Network Attacks
- CompTIA Security+: Security Concepts in an Enterprise Environment
- CompTIA Cybersecurity Analyst+: Threat Monitoring
- CompTIA Security+: Threat Actors, Intelligence Sources, & Vulnerabilities
- CompTIA Security+: Implementing Cybersecurity Resilience
- CompTIA Security+: Virtualization, Cloud Computing, & Cloud Cybersecurity Solutions
- CompTIA Security+: Security Assessment & Penetration Testing Techniques
- CompTIA Security+: Social Engineering Techniques & Other Attack Types
- Data Access & Governance Policies: Data Classification, Encryption, & Monitoring
- Implementing Governance Strategies
- Data Compliance Issues & Strategies
- Governance and Policy
- Secure Application and Data Architecture Design
- Risk Assessment and Management
- Security Architecture Documentation and Alternative Architectures
- Governance and Corportate Culture
- Frameworks, Life Cycles, and Architecture
- Access Control and Security Architecture Design
- CyberOps Windows Hardening: Windows Server Hardening Best Practices
- Cybersecurity Awareness: Getting Started with Security Foundations
- Cybersecurity Awareness: Information Security Fundamentals
- Cybersecurity Awareness: Exposure to Security Risks
- Cybersecurity Awareness: Key Security Terms & Concepts
- CyberOps Windows Hardening: Windows Workstation Hardening Best Practices
- Cryptography: Introduction to PKI
- Cryptography: Introduction to Cryptography Services
- Encryption Use & Analysis
- Modes of Operation & Algorithms
- Governance, Risk Management, and Compliance
- Introduction to Cyber Operations
- An Executive's Guide to Security: Understanding Security Threats
- Cryptographic Methods
- Defining Cryptography
- Social Engineering Threats and Prevention
- Incident Response, Backup and Recovery Strategies, and Documentation
- Trends in Cybersecurity
- Network Hardening, Network Segmentation, and Secure Connections
- Software Engineering, Security and Vulnerabilities
- Physical Security, Safety Procedures, and Access Control
- Fundamentals of Malware Analysis and Remediation
- Environment Monitoring, Retention, and Data Logging
- Legal Considerations and Cybercrime Investigations
- OWASP Top 10: A01:2021-Broken Access Control
- OWASP Top 10: A02:2021-Cryptographic Failures
- OWASP Top 10: A03:2021-Injection
- OWASP Top 10: A04:2021-Insecure Design
- OWASP Top 10: A05:2021-Security Misconfiguration
- OWASP Top 10: A06:2021-Vulnerable & Outdated Components
- OWASP Top 10: A07:2021-Identification & Authentication Failures
- OWASP Top 10: A09:2021-Security Logging & Monitoring Failures
- OWASP Top 10: A08:2021-Software & Data Integrity Failures
- OWASP Top 10: A10:2021-Server-Side Request Forgery (SSRF)
- Client & Email Security
- Identity Management, Directory Services, and Federation
- Security Architecture
- Securing Information using Cryptography
- Public Key Infrastructure and Certificate Distribution
- OWASP Top 10: Securing Web Applications
- Integrating Security Controls for Host Devices
- Systems Hardening
- SECFND: Endpoint Security
- Networking Devices
- Communication and Web Protocols
- Ports, Protocols, & the OSI Model
- Security Programming: System Essentials
- CompTIA Server+: Server Components
- CompTIA Server+: Servers & Cloud Computing
- CompTIA Server+: Server Storage
- CompTIA Server+: Deploying Cloud IaaS
- CompTIA Server+: File System Security
- CompTIA Server+: Role-specific Server Deployment
- CompTIA Server+: Configuring Server Components
- CompTIA Server+: Deploying Cloud PaaS & SaaS
- CompTIA Server+: Server Roles
- CompTIA Server+: Network Directory Services
- CompTIA Server+: Network Communications
- CompTIA Server+: Working with TCP/IP
- Cybersecurity Awareness and Threat Vectors
- Network Discovery Tools and Techniques
- Vulnerabilities, Systems Scanning and Exploitation
- Malware Analysis
- Release, Service Level, and Availability Management
- Cybersecurity and Networking Fundamentals
- Discovery and Attack Vectors
- Key Concepts and the Four Dimensions of Service Management
- The Guiding Principles of the Service Value System and Continual Improvement Model
- The Service Value Chain and General Management Practices
- Event, Incident, and Problem Management
- Service Desk, IT Asset, Service Configuration, and Change Control Management
- ITIL® 4 Foundation: Key Concepts of Service Management
- ITIL® 4 Foundation: Introduction
- Anirudh Goel's Transcript
- Anirudh Goel's Wallet
- About Accredible