Site Map - skillsoft.digitalbadges.skillsoft.com
- User Authentication
- Arundhati Kar's Credentials
- Arundhati Kar's Wallet
- Git & GitHub: Introduction
- CompTIA Cloud Essentials+: Essential Cloud Principles
- Exploring Business Process Automation
- Data Access & Governance Policies: Data Classification, Encryption, & Monitoring
- Testing Methods
- Automation Design & Robotics
- Effective Team Communication
- Identifying Risk (PMBOK® Guide Sixth Edition)
- Code Quality, Testing, & Development
- Software Design and Development: Design Patterns & SOLID Principles
- CCSP 2022: Cloud Security Concepts & Design Principles
- Leading Security Teams for GenAI Solutions: Use of Generative AI
- Responsible Use of AI
- PRINCE2® Project Management Overview (2017 Update)
- Being an Effective Team Member
- Sharing & Collaborating on an App in Microsoft PowerApps
- Getting to Know the Platform in Microsoft PowerApps
- Creating & Saving Apps in Microsoft PowerApps
- Inserting Elements in an App in Microsoft PowerApps
- Effective Stakeholder Communications for Technology Professionals
- Leveraging the Power of Analogical Thinking
- Proven Techniques for Technical Communication
- Taking the Lead with Workplace Motivation and Engagement
- Outwitting Your Cognitive Bias
- Communicating with Confidence
- Choosing the Right Interpersonal Communication Method to Make Your Point
- Capturing the Attention of Senior Executives
- Trust Building through Effective Communication
- Investigating Arguments
- The Art and Science of Communication
- Making an Impact with Non-verbal Communication
- Confronting Your Assumptions
- Do We Have A Failure to Communicate?
- Reaching Sound Conclusions
- Critical Thinking: Challenging Assumptions
- Communication with Client / Client Centricity
- Etiquette & Conduct while working from Home
- Critical Thinking
- Year 1 Phase 4: 10 to 12 Months
- Leveraging Analytical and Critical Thinking to Implement AI
- Leading with Executive Presence
- How Culture Impacts Communication
- Clarity and Conciseness in Business Writing
- Using Communication Strategies to Bridge Cultural Divides
- Editing and Proofreading Business Documents
- Improving Your Technical Writing Skills
- Strength under Pressure: Building Perseverance and Resilience
- How to Get Out of Your Own Way and Achieve Success
- Maintaining Balance in Life
- Year 1 Phase 3: 7 to 9 Months
- Executive Presence
- Basic ST & Personal (Identity) story
- Organizing your Digital Workspace
- Written Business Communication
- Cross Cultural Communication
- Building Your Resilience
- Audience and Purpose in Business Writing
- Keeping Business Calls Professional
- Writing and Preparing an Effective Speech
- Conquering the Challenges of Public Speaking
- Embracing Happiness
- Accessibility
- 360 Value Meter
- Design Thinking
- Sustainability
- Oral Communication
- Year 1 Phase 2: 4 to 6 Months
- Saving Time by Setting Goals
- Sharpening Your Focus to Stay on Track
- Managing Your Time So It Doesn’t Manage You
- Maximize Your Productivity by Managing Time and Tasks
- Taking Effective and Professional Notes
- Using Active Listening in Workplace Situations
- The Art of Staying Focused
- Make The Time You Need: Get Organized
- Aligning Goals and Priorities To Manage Time
- Listening
- Time Management
- Year 1 Phase 1: 0 to 3 months
- Become a Great Listener
- Listening Even When It's Difficult to Listen
- Getting the Details Right: Spelling Basics
- Using the Parts of Speech
- Using Punctuation Marks
- Troublesome Words and Phrases: Usage Mistakes in Writing
- Creating Well-constructed Sentences
- Abbreviating, Capitalizing, and Using Numbers
- Business Grammar
- Mindful at Work
- Shared Language
- Remote Ways of Working (OmniConnect)
- Data Security and Access Control
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Secure Coding Practices
- Defensive Java Fundamentals
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Threat Modeling
- Defensive Coding Fundamentals for JavaScript and HTML5
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Core Concepts
- CISSP: Risk Management
- OWASP Overview
- A7 and A6: Leaky and Unprepared Applications
- A8 and A3: Cross-Site Attacks
- A4 and A2: Broken Applications
- A10 and A9: API and Component Attacks
- A5 and A1: Security and Injection
- Data Handling and Concurrency
- Securing .NET Programming
- Defensive Coding Fundamentals for C#
- Defensive Coding for C#
- Artificial Intelligence and Machine Learning
- Packaging in DevOps: Application Packaging Mechanism
- Software Design and Development: Methodologies
- CCSP 2019: Application Development & Security
- CCSP 2019: Identity & Access Management
- OWASP Top 10: Securing Web Applications
- API Security
- Cloud Security Fundamentals: Cloud Application Security
- Top 10 List Items
- Agile & TDD Best Practices for APIs: Test-driven Development Strategy
- SOLID & GRASP
- Automated Software Testing
- Release & Sprint Planning
- Using Kanban in IT & Software Development
- Software Data Analysis: Project Management Metrics
- Transition to Scrum: Agile Foundation to Scrum
- Software Design and Development: Software Engineering & SDLC Phases
- Agile Best Practices for Tech Leaders: Scrum Artifacts
- Arundhati Kar's Transcript
- Arundhati Kar's Wallet
- About Accredible