Site Map - skillsoft.digitalbadges.skillsoft.com
- User Authentication
- Ankur Mahajan's Credentials
- Ankur Mahajan's Wallet
- Communicating and Engaging Teams and Stakeholders (2021 Update)
- Advanced Agile: Leadership Techniques
- Managing a Project to Minimize Risk and Maximize Quality
- Creating a Project Budget (PMBOK® Guide Sixth Edition)
- Customer Service: Discovering Customer Needs
- Turning Objection into Opportunity during a Sales Call
- The Value Proposition: Getting Your Pitch Right
- Negotiating Well and Going for the Close
- Telling a Business Story
- Managing with a Cost-control Mindset
- Measuring Outcomes and Using KPIs
- Building the Foundation for an Effective Team
- Building Innovation Cultures and Leaders
- Planning Your Growth as a Leader
- Leading in a Hybrid Workplace
- Optimizing Your Workplace Well-being
- Conveying Your Message without Words
- Recognizing Organizational Risks
- Making Difficult Conversations Meaningful
- Six Sigma Correlation, Regression, and Hypothesis Testing
- Six Sigma Techniques for Improvement
- Lean Tools and FMEA
- Six Sigma Control Tools and Documentation
- Six Sigma Measurement System Analysis
- Data Analysis and Root Cause Analysis in Six Sigma
- Classifying and Collecting Data
- Six Sigma: Project Management Basics
- Six Sigma: Quality Tools
- Six Sigma: Team Basics, Roles, and Responsibilities
- Six Sigma: Metrics
- Six Sigma: Identifying Projects
- Basic Six Sigma Statistics
- Google Associate Cloud Engineer: Google Cloud Overview
- Google Cloud Digital Leader: Compute on the Google Cloud
- Google Associate Cloud Engineer: Google Cloud Management
- Google Cloud Digital Leader: Storage Options for Unstructured Data
- Google Cloud Digital Leader: Working with Data
- Google Cloud Digital Leader: Enterprise Data Warehouses
- Google Cloud Digital Leader: Storage Options for Structured Data
- Google Cloud Digital Leader: Data Processing Pipelines
- Google Cloud Digital Leader: AI & ML on Google Cloud
- Google Cloud Digital Leader: Managing Infrastructure on Google Cloud
- Google Cloud Digital Leader: Networks on Google Cloud
- Google Associate Cloud Engineer: Managing Google Cloud Projects
- Google Cloud Digital Leader: Modern Applications on Google Cloud
- Google Cloud Digital Leader: Trust & Security on Google Cloud
- Google Cloud Digital Leader: Compliance & Operations on Google Cloud
- Six Sigma and Lean: Foundations and Principles
- CBROPS: Log Evidence, Disk Images, & Malware Analysis Output
- CBROPS: Incident Response, Security Management, & Analysis
- CBROPS: The CIA Triad & Security Approaches
- CBROPS: Host-based Analysis & the Role of Attribution
- CBROPS: Security Events, Firewall Operations, & Traffic Analysis
- CBROPS: CVSS, Deployments, Access Control, & Data Visibility
- CBROPS: Firewall, Filtering, Visibility, & Control Data
- CBROPS: File Extraction, Event Artifacts, & Regular Expressions
- CBROPS: Protected Data, Profiling, Forensics, & IRP
- CBROPS: Social Engineering, Evasion, Obfuscation, & Certificates
- CBROPS: Attack Surfaces, Vulnerability, & Analysis Tools
- CBROPS: Threat Actors, Security, & Risk Management
- CBROPS: Data Loss, Host Isolation, & Detection Methods
- CBROPS: Data & Attack Types
- Google Cloud Digital Leader: Introducing Google Cloud Concepts
- Google Cloud Digital Leader: Digital Transformation with the Cloud
- RSTECH: Networking Hardware, Models, & Technologies
- RSTECH: Network Responsibilities, Addressing, & Utilities
- RSTECH: Troubleshooting, Upgrading, Recovering, & Resetting
- RSTECH: Cisco Equipment, Components, & Port Characteristics
- RSTECH: Cisco Memory Functions & Removing Cisco Devices
- RSTECH: OS Types, IOS Access, & Terminal Emulation
- RSTECH: IOS Commands, Startup-Config, & IOX-XE Modes
- CompTIA Security+: Security Goals & Controls
- CompTIA Security+: Fundamental Security Concepts
- CompTIA Security+: Threat Actors & Vectors
- CompTIA Security+: Practical Cryptography
- CompTIA Security+: Mitigation Techniques
- CompTIA Security+: Survey of Malicious Activities
- CompTIA Security+: Enterprise Infrastructure Security Principles
- CompTIA Security+: Architecture & Infrastructure Concepts
- CompTIA Security+: Data Protection Concepts & Strategies
- CompTIA Security+: Resilience & Recovery
- CompTIA Security+: Computing Resources Security Techniques
- CompTIA Security+: Vulnerability Management
- CompTIA Security+: Enterprise Security Capabilities
- CompTIA Security+: Security Monitoring & Alerting
- CompTIA Security+: Identity and Access Management
- CompTIA Security+: Automation, Orchestration, & Incident Response
- CompTIA Security+: Effective Security Governance
- CompTIA Security+: Risk Management
- CompTIA Security+: Audits, Assessments, & Awareness
- CompTIA Security+: Security Compliance & Third-Party Risk
- CCSP 2022: Cloud Computing Concepts & Reference Architectures
- CCSP 2022: Cloud Security Concepts & Design Principles
- CCSP 2022: Cloud Data Security
- CCSP 2022: Cloud Infrastructure & Platform Components
- CCSP 2022: Data Center Design & Risk Analysis
- CCSP 2022: Planning & Implementing Security Controls
- CCSP 2022: Cloud Business Continuity Planning
- CCSP 2022: Software Assurance & Validation
- CCSP 2022: Identity & Access Management Solutions
- CCSP 2022: Application Security Awareness & Life Cycles
- CCSP 2022: Build & Implement a Physical & Logical Cloud Infrastructure
- CCSP 2022: Operate & Maintain Physical & Logical Cloud Infrastructure
- CCSP 2022: Operational Controls & Standards
- CCSP 2022: Manage Security Operations
- CCSP 2022: Legal Requirements, Privacy Issues, & Risk Management in the Cloud
- CCSP 2022: Cloud Audits, Methodologies, & Contracts
- Generative AI APIs for Practical Applications: An Introduction
- SecOps Engineer: System Infrastructure Security
- The Language of DevOps: DevOps Principles & Practices
- Developing and Supporting an Agile Mindset
- Agile Principles and Methodologies
- Agile Stakeholder Engagement and Team Development
- Microsoft 365 Fundamentals: Understanding Cloud Concepts
- Microsoft 365 Fundamentals: Cloud Benefits & Considerations
- Microsoft 365 Fundamentals: Protecting Your Information
- Microsoft 365 Fundamentals: Microsoft 365, Exchange, & SharePoint
- Microsoft 365 Fundamentals: Windows 10 Enterprise
- Microsoft 365 Fundamentals: Skype for Business, Teams, & Collaboration
- Microsoft 365 Fundamentals: Windows 10 & Admin Center
- Microsoft 365 Fundamentals: Azure AD & Access Management
- Microsoft 365 Fundamentals: Windows 10, Autopilot, & Azure
- Microsoft 365 Fundamentals: Deployment Planning, Azure, & Updates
- Microsoft 365 Fundamentals: Microsoft 365 Purchasing & Support
- Microsoft 365 Fundamentals: Mobile Management & Security and Compliance
- Microsoft 365 Fundamentals: Cloud Services & Principles
- Microsoft 365 Fundamentals: Microsoft 365 Pricing and Support
- Microsoft 365 Fundamentals: Office 365 & Collaboration
- Microsoft Security: Compliance Concepts & Methodologies
- Microsoft Security: Basic Azure AD Identity Services & Types
- Microsoft Security: Azure AD Authentication, Access, & Identity
- Microsoft Security: Azure Security Capabilities & Management
- Microsoft Security: Microsoft 365 Security & Security Management
- Microsoft Security: Microsoft 365 Insider Risk, eDiscovery, & Auditing
- Microsoft Security: Compliance, Information Protection, & Governance
- ITIL® 4 Foundation: Service Management Practices (Part 2)
- ITIL® 4 Foundation: The Service Value Chain
- ITIL® 4 Foundation: Service Management Practices (Part 1)
- ITIL® 4 Foundation: The Guiding Principles
- ITIL® 4 Foundation: General Management Practices
- ITIL® 4 Foundation: The Service Value System
- SSCP 2021: Basic Security Concepts
- SSCP 2021: Asset & Change Management Lifecycles
- SSCP 2021: Security Controls
- SSCP 2021: Physical Security Operations
- SSCP 2021: Understanding & Applying Cryptography
- SSCP 2021: Secure Protocols & Public Key Infrastructure (PKI)
- SSCP 2021: Authentication & Trust Architectures
- SSCP 2021: Identity Management & Access Control Models
- SSCP 2021: Risk Management
- SSCP 2021: Security & Vulnerability Assessment
- SSCP 2021: Incident Response & Forensics
- SSCP 2021: Business Continuity Planning
- SSCP 2021: Fundamental Networking Concepts
- SSCP 2021: \nNetwork Attacks & Countermeasures
- SSCP 2021: Secure \nWireless Communication
- SSCP 2021: Malware & Countermeasures
- SSCP 2021: Endpoint Protection & Mobile Device Management
- SSCP 2021: Secure Virtual & Cloud Environments
- CompTIA IT Fundamentals: Basic IT Concepts
- CompTIA IT Fundamentals: Data, CPUs, & Troubleshooting
- CompTIA IT Fundamentals: Internet, Storage, & Computer Systems
- CompTIA IT Fundamentals: Computer Devices & Components
- CompTIA IT Fundamentals: Operating Systems
- CompTIA IT Fundamentals: Networking & Wireless Technologies
- CompTIA IT Fundamentals: Software Concepts
- CompTIA IT Fundamentals: Software Development Concepts
- CompTIA IT Fundamentals: Database Concepts
- CompTIA IT Fundamentals: CIA Triad
- CompTIA IT Fundamentals: Authentication & Disaster Recovery
- CompTIA IT Fundamentals: Privacy & Encryption
- ITIL® 4 Foundation: Key Concepts of Service Management
- ITIL® 4 Foundation: Key Concepts
- OWASP Top 10: Securing Web Applications
- Certified in Cybersecurity (CC): Security Governance, Policies, & Controls
- Certified in Cybersecurity (CC): Core Security Principles & Risk Management
- Certified in Cybersecurity (CC): Incident Response
- Certified in Cybersecurity (CC): Business Continuity Planning
- Certified in Cybersecurity (CC): Logical Access Controls
- Certified in Cybersecurity (CC): Physical Access Controls
- Certified in Cybersecurity (CC): Networking & Security Infrastructure
- Certified in Cybersecurity (CC): Present Threats & Network Security Controls
- Certified in Cybersecurity (CC): Data Security & System Hardening
- Certified in Cybersecurity (CC): Security Best Practices & Security Awareness
- CISSP 2024: Professional Ethics & Security Concepts
- CISSP 2024: Security Governance & Compliance Issues
- ITIL® 4 Foundation: Introduction
- Agile & TDD Best Practices for APIs: Test-driven Development Strategy
- Transition to Scrum: Agile Foundation to Scrum
- Agile Project Planning
- Using Kanban in IT & Software Development
- Software Data Analysis: Project Management Metrics
- Agile Best Practices for Tech Leaders: Scrum Artifacts
- Getting Started with Design Thinking
- Cloud Security Fundamentals: Cloud Application Security
- Ankur Mahajan's Transcript
- Ankur Mahajan's Wallet
- About Accredible