Site Map - skillsoft.digitalbadges.skillsoft.com
- User Authentication
- Baskar S's Credentials
- Baskar S's Wallet
- Driving Excellence: Industry X.0 Case Studies
- Driving Excellence: Industry X.0 Case Studies
- Industry X.0: Summary & Key Takeaways
- Industry X.0
- Industry X.0: Summary & Key Takeaways
- Industry X.0: Continuous Transformation
- Industry 4.0: Digital Revolution
- Introduction to Industry X.0 & Decoding Industry 4.0
- Industry 5.0: Shaping the Future
- Industry 5.0: Shaping the Future
- Digital Project Management
- Digital Project Management: Summary & Key Takeaways
- Digital Project Management: Summary & Key Takeaways
- Digital Project Management (DPM): Characteristics, Roles, Challenges and Risks
- Digital Project Management: Characteristics, Roles, Challenges and Risks
- DPM Methodologies and Importance of Agile
- Agile Digital Project Management Methodology
- Agile Methodologies: Principles, Frameworks and Case Studies
- Importance of Hybrid Methodology in Digital Project Management
- Waterfall Methodology: Principles, Benefits and Case Studies
- Adani Case Studies: Stage Gated Agile Process Framework
- Introduction to Digital Project Management (DPM)
- Waterfall Digital Project Management Methodology
- Hybrid Digital Project Management Methodology
- DEI and Human Rights
- Introduction to Business Model Innovation
- Introduction to Business Model Innovation
- Understanding the Digital Business Models: Characteristics and Types
- Understanding the Digital Business Models: Characteristics and Types
- Case Study 01: Brahmaand AI
- Implementing Business Model Innovation
- Implementing Business Model Innovation
- Case Study 02: Adani IRM
- Case Study 03: SOUL Proposition
- Business Model Innovation in Adani: Case Studies
- The Business Model Canvas
- The Business Model Canvas
- BMI - Summary and Key Takeaways
- Business Model Innovation - Summary and Key Takeaways
- Assessing Business Model Viability
- Assessing Business Model Viability
- Business Model Innovation
- Design Thinking: Summary and Key Takeaways
- Design Thinking
- Design Thinking: Summary & Key Takeaways
- Empathy & Ecosystem Mapping: Pavement Design Use Case
- Stanford Design Thinking Model: Empathy tools, User Persona & Maps
- Stanford Design Thinking Model: Point of View & HMW Questions
- Stanford Design Thinking Model: Understand Consumer Needs & Identify the Problem
- Stanford Design Thinking Model: Analogical Thinking & Challenging Assumptions
- Stanford Design Thinking Model: Prototyping & Testing
- Stanford Design Thinking Model: Ideate the Solution, Prototype & Test
- Design thinking in Action
- Design thinking in Action
- Introduction to Design Thinking
- Introduction to Design Thinking
- Popular Design Thinking Models - UPI Story
- The Design Thinking Methodology
- Analytics & AI Essentials: Conclusion and Summary
- AI Journey: Progression and Potential Challenges
- AI Ethics & Biases
- AI Tools, Applications and Challenges
- AI : Ethics & Biases
- Analytics and AI Essentials - Part 02
- Analytics & AI Essentials: Conclusion and Summary
- Disciplines of AI
- AI Lifecycle Management
- Types of Machine Learning
- Demystifying Key Terminologies of AI
- AI Tools and Industrial Applications
- Disciplines of AI & Types of Machine Learning
- Demystifying Key Terminologies of AI
- AI Lifecycle Management
- Introduction to AI: Historical Perspective and Contributions
- Introduction to AI: Historical Perspective and Contributions
- Summary and Key Takeaways
- Analytics and AI Essentials - Part 01
- Data Visualization and Storytelling
- Data Story, Visualization and Guidelines
- Data Visualization & Storytelling: Examples
- Summary and Key Takeaways
- Exploratory Data Analysis (EDA) and Purposeful EDA
- Introduction to Analytics
- Types of Analytics
- Analytics in Business: Cases and Examples
- Introduction to Analytics
- Analytics in Business: Cases and Examples
- Types of Analytics
- Exploratory Data Analysis (EDA)
- Purposeful EDA - Patterns & Tools
- Future of Data & Key Takeaways
- Data Management
- Future of Data, Case Study and Key Takeaways
- Data Quality : Challenges and Effectives Approaches
- Data Quality and Lifecycle Management
- Data as the New Currency
- Data: Dimensions, Democratization, Types & Examples
- Data Dimensions & Data Democratization
- Data Modelling and Trends in Data Management
- Data Modelling and Trends in Data Management
- Data Lifecycle Management
- Introduction to Data Management
- Introduction to Data Management
- Data: Types & Examples
- Certified in Cybersecurity (CC): Business Continuity Planning
- Cloud Computing : Key Takeaways & Future
- Cloud Computing: Deployment, Service Models and Key Takeaways
- Computing Paradigms : Introduction & Role of Edge Computing
- Architecture : Edge Computing & Platforms
- Edge Computing : Applications, Case Studies & Limitations
- Edge Computing: Architecture, Platforms and Case Studies
- Computing Paradigms : Summary & Key Takeaways
- Computing Paradigms: Summary & Key Takeaways
- Computing Paradigms : Cloud and Edge Computing
- Cloud Service Models
- Cloud Computing Fundamentals
- Introduction & Cloud Computing Fundamentals
- Cloud Deployment Models
- Digital Platforms and Lifecycle Management
- DPLM: Key Takeaways and Future Trends
- DPLM: Key Takeaway and Future Trends
- DPLM Case Studies: Data Protection, Digital Payments, and Content Streaming
- DPLM Case Studies: Plant, Engineering, Energy, Management and Automation Solutions
- Case Studies: Digital Platforms & Lifecycle Management
- Digital Platform Management: Challenges and Opportunities
- Digital Platform Management: Challenges and Opportunities
- Phases of Digital Platform Lifecycle Management (DPLM)
- Phases of Digital Platform Lifecycle Management
- Introduction to Digital Platforms and Lifecycle Management
- Digital Platforms: Characteristics, Types and Benefits
- Digital Platforms: Characteristics, Types and Benefits
- Introduction to Digital Platforms and Lifecycle Management
- Certified in Cybersecurity (CC): Logical Access Controls
- Certified in Cybersecurity (CC): Physical Access Controls
- Certified in Cybersecurity (CC): Networking & Security Infrastructure
- Certified in Cybersecurity (CC): Data Security & System Hardening
- 3D Printing: Applications in the Real World
- 3D Printing: Fundamentals, Types and Challenges
- Emerging Technologies: Future Trends and Advancements
- Digital Technologies: Future Trends and Key Takeaways
- 3D Printing Technology
- Digital Technologies-Part 2: AR, VR, Blockchain and 3D Printing
- Blockchain Technology: Application and Challenges
- Blockchain Technology
- Blockchain Technology : Fundamentals, Types and Cryptocurrency
- Virtual Reality: Types, Applications & Challenges
- Augmented Reality (AR) and Virtual Reality (VR)
- AR and VR Technologies : Principles, Components and Platforms
- Augmented Reality: Application & Challenges
- Introduction: AR, VR, Blockchain and 3D Printing
- Digital Technologies: Key Takeaways and Conclusion
- Introduction: AR, VR, Blockchain and 3D Printing
- Certified in Cybersecurity (CC): Present Threats & Network Security Controls
- Certified in Cybersecurity (CC): Security Best Practices & Security Awareness
- Certified in Cybersecurity (CC): Security Governance, Policies, & Controls
- Certified in Cybersecurity (CC): Core Security Principles & Risk Management
- Certified in Cybersecurity (CC): Incident Response
- Digital Twin: CASE STUDIES
- DIGITAL TWIN
- Digital Technologies: IoT, IIoT, Robotics and Digital Twin
- DIGITAL TWIN: Applications, Ecosystem, Advantages and Challenges
- Introduction to IoT, IIoT, Robotics and Digital Twins
- IoT & Industrial IoT : Application, Architecture, Platforms and Challenges
- IoT & Industrial IoT: CASE STUDIES
- ROBOTICS: Components, Programming and Applications
- DRONES: Applications, Benefits and Challenges
- ROBOTICS & DRONES
- Introduction to IoT, IIoT, Robotics & Digital Twin
- IoT and Industrial IoT
- Robotics: CASE STUDIES
- DIGITAL TECHNOLOGIES: Future Trends and Key Takeaways
- DIGITAL TECHNOLOGIES : Future Trends and Key Takeaways
- Analyzing your data in Visio Professional 2019
- Module 01 - Summary and Conclusions
- Module 01 - Summary and Conclusion
- Digital Transformation: Embracing the Future
- Implementing Digital Transformation
- Challenges in Implementing Digital Transformation
- Strategy for Implementing Digital Transformation
- Successful Digital Transformation Case Study - MAERSK
- Successful Digital Transformation Case Study - Enel
- Successful Digital Transformation Case Study - E.On
- Digital Transformation : Examples and Case Studies
- Digital Technologies for Transformation
- Digital Technologies for Transformation: IoT, Augmented Reality & Virtual Reality
- Introduction to Digital Transformation & Key Drivers
- Introduction to Digital Transformation and Key Drivers
- Digital Technologies for Transformation: Cloud Computing & Big Data & Analytics
- Navigating AI Ethical Challenges and Risks
- Expert Insights on Problem Solving
- Cloud Security Management: Operations Security
- CCSP 2022: Cloud Computing Concepts & Reference Architectures
- CCSP 2022: Software Assurance & Validation
- CCSP 2022: Operate & Maintain Physical & Logical Cloud Infrastructure
- CCSP 2022: Data Center Design & Risk Analysis
- CCSP 2022: Application Security Awareness & Life Cycles
- CCSP 2022: Build & Implement a Physical & Logical Cloud Infrastructure
- Senior Professional in Human Resources: Organizational Development
- CCSP 2022: Cloud Infrastructure & Platform Components
- CCSP 2022: Cloud Audits, Methodologies, & Contracts
- CCSP 2022: Operational Controls & Standards
- CCSP 2022: Cloud Security Concepts & Design Principles
- CCSP 2022: Planning & Implementing Security Controls
- CCSP 2022: Manage Security Operations
- Developing Personal Accountability
- Software Project Management Communication Skills
- Leadercamp on-demand: How to Improve Productivity at Work
- Scrum Foundation: Scrum Team & Collaboration
- Handling Team Conflict
- Problem Solving: Generating Solutions
- CISSP 2021: Deploying Identity & Access Management (IAM)
- CISSP 2021: Fundamental Concepts & Principles
- SSCP 2021: Identity Management & Access Control Models
- Microsoft 365 Mobility & Security: Auditing
- CompTIA A+ Core 1: Cloud Computing Concepts
- CompTIA IT Fundamentals: Software Concepts
- CompTIA IT Fundamentals: Data, CPUs, & Troubleshooting
- CompTIA IT Fundamentals: Basic IT Concepts
- CompTIA A+ Core 1: RAM & Storage Solutions
- CompTIA A+ Core 2: Desktop, Server, & Mobile Operating Systems
- CompTIA A+ Core 1: Installing Hardware & Display Components
- CompTIA A+ Core 1: Troubleshooting Wired & Wireless Networks
- CompTIA A+ Core 1: Cable Types & Connectors
- CompTIA A+ Core 1: Networking Fundamentals
- CompTIA A+ Core 1: Networking Concepts & Configurations
- SSCP 2021: Risk Management
- SSCP 2021: Malware & Countermeasures
- SSCP 2021: Business Continuity Planning
- SSCP 2021: Fundamental Networking Concepts
- SSCP 2021: \nNetwork Attacks & Countermeasures
- SSCP 2021: Security & Vulnerability Assessment
- ChatGPT Prompt Engineering Examples & Use Cases
- Finetuning Your ChatGPT Prompts
- ChatGPT's Impact on Various Industries
- ChatGPT & Its Practical Use Cases
- SSCP 2021: Basic Security Concepts
- SSCP 2021: Security Controls
- Exploring the interface in Visio Professional 2019
- Pandemic Preparedness and Management
- Expert Insights on Managing a Crisis
- Managing in a Crisis
- Expert Insights on Managing Fear
- Leading in the Post-pandemic Workplace
- Leading Teams and Engagement
- Taking the Lead with Workplace Motivation and Engagement
- Developing a Successful Team
- Building the Foundation for an Effective Team
- Establishing Effective Virtual Teams
- Facing Virtual Team Challenges
- CompTIA Security+: Controls & Application Development, Deployment, & Automation
- CompTIA Security+: Physical Security Controls
- CompTIA Security+: Risk Management, Privacy, & Sensitive Data Security
- CompTIA Security+: Implementing Secure Network Designs
- CompTIA Security+: Wireless, Mobile, & Embedded Device Security
- CompTIA Security+: Organizational Security Assessment Tools & Mitigation Controls
- CompTIA Security+: Monitoring, Visibility, & Reporting
- Six Sigma Process and Performance Capability Measurement
- CISSP 2021: Software Development Lifecycles & Ecosystems
- CISSP 2021: Asset Classification & Lifecycle
- CISSP 2021: Architecture, Design, & Solutions Vulnerabilities
- Six Sigma: Quality Tools
- Six Sigma and Lean: Foundations and Principles
- CISSP 2021: Software Development Security
- CBROPS: Data Loss, Host Isolation, & Detection Methods
- CISSP 2021: Identity and Access Management Principles
- Using charts in PowerPoint 365
- Getting started with charts in Excel 365
- Creating PivotTables and PivotCharts in Excel 365
- CISSP: Security
- PL-300: Sharing Power BI Reports & Workspaces
- PL-300: Analysis & Sharing Features in Power BI
- PL-300: Applying Power BI's Advanced Analysis Features
- PL-300: Power BI for Data Analysis
- PL-300: Extracting Insights from Data Using Power BI
- CISSP 2021: Practical Cryptography
- SSCP 2021: Understanding & Applying Cryptography
- Database Security
- CISSP 2021: Business Continuity Planning
- System Security Certified Practitioner (SSCP 2018): Security Controls
- CISSP 2021: Communication & Network Security
- CISSP 2021: Security Assessment & Testing
- CISSP 2021: Security Governance Principles
- Creating and editing macros in Excel 365
- CISSP: Risk Management
- CISSP 2021: Risk Management
- Using Basic Formulas in Excel 2019 for Windows
- CISSP: Security Operations
- CISSP: Security Assessment & Testing
- CISSP 2021: Secure Design Principles
- Site & Facility Security Controls
- CISSP 2021: Security Operations
- CISSP 2021: Security Policy
- CISSP 2021: Site & Facility Security
- (ISC)² & Security Fundamentals
- Exploring Project Management, Then and Now (2021 Update)
- SSCP 2021: Physical Security Operations
- CompTIA A+ Core 2: Physical Security Measures
- System Security Certified Practitioner (SSCP 2018): Identity Management
- Baskar S's Transcript
- Baskar S's Wallet
- About Accredible