Site Map - skillsoft.digitalbadges.skillsoft.com
- User Authentication
- Ankit Pareek's Credentials
- Ankit Pareek's Wallet
- Vulnerability Analyst
- Security Architect
- Security Analyst to Security Architect
- Accessing the Business Value of Scrum
- Final Exam: Advanced Scrum Master
- Forensics Analyst
- Security Analyst
- Advanced Scrum Master
- Software Project Lead to Advanced Scrum Master
- Advanced Scrum Metrics
- Scaling Scrum: Choosing Scaled Agile Frameworks
- Scaling Scrum: Challenges
- Software Product Owner
- Scrum Master
- Software Project Lead
- Security Incident Triage
- Final Exam: Security Architect
- Unified Security: Playbook Approach to Security
- Design Thinking for Innovation: Stakeholder Engagement
- Design Thinking for Innovation: Defining Opportunities
- Design Thinking for Innovation: Brainstorming and Ideation
- Data Security Breach Notification Process
- Security Program Regulatory Integration
- Security Architect: Ethical Hacking Best Practices
- Security Architect: Secure Coding Concepts
- Security Topologies: Developing Secure Networks
- Intelligent Orchestration: Automating Security Incident Processing
- Incident Tracking & Response
- Security Rules: Rules of Engagement
- Defensible Security
- Final Exam: Vulnerability Analyst
- Cryptography: Introduction to PKI
- Cryptography: Introduction to Cryptography Services
- Security Vulnerabilities: Managing Threats & Vulnerabilities
- Intrusion Detection Best Practices
- Intrusion Prevention: Best Practices
- Authentication & Encryption: Best Practices
- Final Exam: Forensics Analyst
- Cyber Security Audits
- Security Software Assessments
- Effective Edge Computing
- Scaling an Organization's Scrum Process
- Ethics & Privacy: Digital Forensics
- Risk Analysis: Security Risk Management
- Using Augmented Reality for Organizational Gains
- Digital Forensic Techniques & Investigative Approaches
- End-User Security: The Security Administrator Perspective
- Creating Engagement with Virtual Reality
- End-User Security: Securing End Users against Attackers
- Anomaly Detection: Network Anomaly Detection
- Anomaly Detection: Aspects of Anomaly Detection
- Listening Even When it's Difficult to Listen
- Advanced Lean, Agile, & Scrum Concepts
- Information Security: Security Governance
- Final Exam: Security Analyst
- End-User Security: The End-User Perspective
- Information Security: Pen Testing
- Information Security: Continual Infrastructure Testing
- Information Security: Honeypots
- Information Security: Securing Networking Protocols
- Information Security: Subnetting & DNS for Security Architects
- Information Security: Hardened Security Topologies
- An Executive's Guide to Security: Understanding Security Threats
- An Executive's Guide to Security: Protecting Your Information
- Auditing & Incident Response
- Session & Risk Management
- Information Security: APT Defenses
- Information Security: NACs & Gateways
- SCRUM Quality, Planning, and Completion: The Definition of Done
- Final Exam: Scrum Master
- SCRUM Quality, Planning, and Completion: Effective User Stories
- Scrum Team Velocity: Exploring Team Velocity
- Scrum Sprint: Retrospective
- Final Exam: Software Product Owner
- Scrum Master: Sprint Goals & Planning
- SCRUM Meetings: On-target Daily Meetings
- Product Development Practices
- Scrum Master: Scrum for the Team
- SCRUM Quality, Planning, and Completion: Quality & Productivity
- Scrum Sprint: Review
- Scrum: Product Development Framework
- Scrum: Product Backlog
- Scrum Product: Defining the Why & How of the Product
- Scrum Concepts & the Product Owner
- Lean in Scrum: Lean Development Practices
- Influencing and Persuading Others
- Scrum Practices: Managing the Scrum Project
- Applying Scrum Development Practices
- Final Exam: Software Project Lead
- Working with Google BERT: Elements of BERT
- Take a Deep Breath and Manage Your Stress
- Transitioning to Scrum
- Strategies for Managing Technical Teams
- Computer Vision: Introduction
- Computer Vision: AI & Computer Vision
- Transition to Scrum: Agile Foundation to Scrum
- Business Reporting: Visualizing & Merging Data in Power BI
- Achieving Customer-centric Design with User Personas
- How Blockchain Technology is Transforming Businesses
- Data Insights, Anomalies, & Verification: Machine Learning & Visualization Tools
- AWS Professional Solutions Architect 2020: Desktop & Cost Management
- AWS Professional Solutions Architect 2020: Database Solutions
- AWS Professional Solutions Architect 2020: Data Processing & Analysis
- AWS Professional Solutions Architect 2020: S3 Security
- AWS Professional Solutions Architect 2020: AWS Management
- Data Science Tools
- Using Apache Spark for AI Development
- Hadoop Ranger
- Innovating with Lean Product Management
- Best Practices for Digital Transformation
- Ankit Pareek's Transcript
- Ankit Pareek's Wallet
- About Accredible