Site Map - skillsoft.digitalbadges.skillsoft.com
- User Authentication
- Christopher Lopez's Credentials
- Christopher Lopez's Wallet
- Track 1: SQL Basics
- ChatGPT Prompt Engineering Examples & Use Cases
- Artificial Intelligence and Machine Learning
- Graph Modeling on Apache Spark: Working with Apache Spark GraphFrames
- Processing Data: Getting Started with Apache Kafka
- Data Analysis using Spark SQL
- Track 1: Introduction to Big Data with PySpark
- Introduction to Big Data with PySpark
- Apache Spark Getting Started
- Data Analysis Using the Spark DataFrame API
- CompTIA Security+: Risk Management
- CompTIA Security+: Audits, Assessments, & Awareness
- CompTIA Security+: Security Compliance & Third-Party Risk
- CompTIA Security+: Enterprise Security Capabilities
- CompTIA Security+: Identity and Access Management
- CompTIA Security+: Automation, Orchestration, & Incident Response
- CompTIA Security+: Effective Security Governance
- CompTIA Security+: Vulnerability Management
- CompTIA Security+: Security Monitoring & Alerting
- Recognizing Hallucinations, Inaccuracies, and Bias in AI
- CompTIA Security+: Computing Resources Security Techniques
- CompTIA Security+: Resilience & Recovery
- CompTIA Security+: Data Protection Concepts & Strategies
- TCP, UDP, Support and Management Protocols
- IP Addressing and IPv4 Subnetting
- CompTIA Security+: Enterprise Infrastructure Security Principles
- CompTIA Security+: Architecture & Infrastructure Concepts
- Ethical Hacker: Footprinting
- Ethical Hacker: Overview & Threats
- Ethical Hacker: Hacking Concepts
- Ethical Hacker: Security Controls
- CompTIA Security+: Mitigation Techniques
- CompTIA Security+: Survey of Malicious Activities
- Generative AI APIs for Practical Applications: An Introduction
- Data Loading & Visualization in Power BI: Getting Started
- Introduction to SQL Bootcamp: Session 1 Replay
- OWASP Top 10: A1 - Injection
- OWASP Top 10: Web Application Security
- CompTIA Security+: Threat Actors & Vectors
- Track 1: Learn Java
- CompTIA Security+: Fundamental Security Concepts
- CompTIA Security+: Practical Cryptography
- Introducing APIs and API Security
- DEVASC: HTTP, APIs, & Webhooks
- API Design: API Development
- Secure Programmer: Vulnerabilities
- Security Programming: Code Identification
- Internet of Things Overview
- Cloud Security Fundamentals: Cloud Application Security
- Security Programming: System Essentials
- CompTIA Security+: Controls & Application Development, Deployment, & Automation
- Information Security: Continual Infrastructure Testing
- CISSP 2021: Software Development Lifecycles & Ecosystems
- Static, Dynamic, Black-box, & White-box Testing
- OWASP: Web Application Security
- Secure Programmer: Security Concepts
- Introduction to Secure Programming
- Defensive Programmer: Secure Testing
- Effective Stakeholder Communications for Technology Professionals
- Influencing through Positive Leadership
- Leadership Insights on Problem Solving & Decision Making
- Trust Building through Effective Communication
- The Art and Science of Communication
- June: Stakeholder Management
- July: Effective Verbal Communication
- August: Problem Solving
- Conveying Your Message without Words
- Business Execution: How Things Get Done
- Managing Pressure and Stress to Optimize Your Performance
- Contributing as a Virtual Team Member
- Facing Virtual Team Challenges
- Exploring Virtual Collaboration
- Sending E-mails to the Right People
- Synchronize Goals to Optimize Your Team
- May: Operational Excellence
- March: Personal Branding
- April: Effective Written Communication
- February: Collaboration Pt. 2
- Harnessing the Power of the Written Word
- Leadercamp on-demand: Brand You, Brand Us
- Listening to Engage, Empower, and Influence
- CompTIA Security+: Security Goals & Controls
- Writing Effective E-mails and Instant Messages
- End-User Security: Securing End Users against Attackers
- CCSP 2019: Application Development & Security
- CCSP 2019: Identity & Access Management
- AWS DevOps Engineer Professional 2021: Serverless Architecture
- OWASP Top 10: Securing Web Applications
- An Executive's Guide to Security: Understanding Security Threats
- Fundamental Security Concepts
- Becoming a Successful Collaborator
- January: Collaboration
- Encouraging Team Communication and Collaboration
- Conditional Statements & Loops: While Loops in Python
- Conditional Statements & Loops: Advanced Operations Using for Loops in Python
- Conditional Statements & Loops: The Basics of for Loops in Python
- Complex Data Types in Python: Shallow & Deep Copies in Python
- Conditional Statements & Loops: If-else Control Structures in Python
- Complex Data Types in Python: Working with Dictionaries & Sets in Python
- Complex Data Types in Python: Working with Lists & Tuples in Python
- Getting Started with Python: Introduction
- Christopher Lopez's Transcript
- Christopher Lopez's Wallet
- About Accredible