Site Map - skillsoft.digitalbadges.skillsoft.com
- User Authentication
- Ashrita Shivakumar Vali's Credentials
- Ashrita Shivakumar Vali's Wallet
- Data Access & Governance Policies: Data Classification, Encryption, & Monitoring
- CCSP 2019: Identity & Access Management
- CCSP 2022: Cloud Security Concepts & Design Principles
- Exploring Business Process Automation
- Using Robots and RPA in the Workplace
- Leading Security Teams for GenAI Solutions: Use of Generative AI
- Responsible Use of AI
- Exploring Project Management, Then and Now (2021 Update)
- Hybrid Environment Pipelines: Hybrid Cloud Transformation
- Validate and Control Scope (PMBOK® Guide Sixth Edition)
- Effective Team Communication
- Software Design and Development: Design Patterns & SOLID Principles
- CAPM®: Performance Measurement Metrics
- Advanced Agile: Leadership Techniques
- Data Access & Governance Policies: Data Access Governance & IAM
- Artificial Intelligence and Machine Learning
- Generative AI APIs for Practical Applications: An Introduction
- Cloud Security Fundamentals: Cloud Application Security
- AWS Cloud Practitioner 2022: Cloud Architecture Design Principles
- AWS Cloud Practitioner 2022: Cloud Security & Compliance
- AWS Cloud Practitioner 2022: Access Management
- AWS Cloud Practitioner 2022: Technology Support Resources
- AWS Cloud Practitioner 2022: Cloud Deployment & Operation
- AWS Cloud Practitioner 2022: Core AWS Services
- AWS Cloud Practitioner 2022: Technical Essentials Part 1
- AWS Cloud Practitioner 2022: Technical Essentials Part 2
- AWS Cloud Practitioner 2022: Cloud & the Value Proposition
- AWS Cloud Practitioner 2022: Cloud Economics
- Influencing through Positive Leadership
- Understanding Unconscious Bias
- Managing and Engaging Stakeholders
- Developing Emotional Intelligence
- Defining a Project Scope and Team
- Developing a Successful Team
- Leading through Inspiration
- Backup & Recovery: Enterprise Backup Strategies
- CompTIA Cloud+: Cloud Architecture & Models
- An Executive's Guide to Security: Understanding Security Threats
- CompTIA A+ 220-1001: Storage Solutions
- Software-Defined Networking Fundamentals
- Virtualization Benefits & Components
- Python Development: Getting Started with Programming in Python
- Getting Started with PowerShell
- Agile Principles and Methodologies
- Infrastructure Security
- Certified Information Systems Auditor (CISA) 2019: Performance & Management
- The Language of DevOps: DevOps Principles & Practices
- Data Center Design
- Top 10 List Items
- Git & GitHub: Introduction
- Adopting the DevOps Mindset
- CloudOps: Infrastructure as Code
- Kubernetes Administrator: Kubernetes Fundamentals for Administrators
- Site Reliability: Engineering
- DevOps Practices for the Enterprise
- Getting Started with Python: Introduction
- DevOps with Ansible: Overview
- Jenkins: Introduction
- Docker Containers, Images, & Swarms
- Introduction to Automation
- Splunk: Getting Started
- Full Stack Observability Practitioner Exam
- SQL Concepts & Queries
- CompTIA Linux+: Introduction to Linux & the Command Line
- APIs
- Using Docker for DevOps: Introduction to Docker
- CompTIA A+ 220-1001: TCP & UDP ports
- DEVASC: Network & Network Communication Basics
- JSON Essentials
- Software Testing for DevOps: DevOps Test Tools
- Jenkins for DevOps: Jenkins Configuration for DevOps
- DevOps Continuous Feedback: Loop Tools
- Cloud Computing Fundamentals: Introduction
- The Language of DevOps: DevOps Tools & Processes
- Certified Information Systems Auditor (CISA) 2019: Data Privacy & Risk
- OWASP: Top 10 Items A3, A2, & A1
- Secure Programmer: Attacks
- A8 and A3: Cross-Site Attacks
- A7 and A6: Leaky and Unprepared Applications
- Defending Attacks
- Secure Implementation & Coding
- Functions, Access Control, & Frameworks
- Ashrita Shivakumar Vali's Transcript
- Ashrita Shivakumar Vali's Wallet
- About Accredible