Site Map - skillsoft.digitalbadges.skillsoft.com
- User Authentication
- Douglas Bandeira's Credentials
- Douglas Bandeira's Wallet
- Working with Variables
- Conditions & Arrays
- Ethical, Privacy, & Intellectual Property Considerations for ChatGPT
- Generative AI and Its Impact to Everyday Business
- Recognizing Hallucinations, Inaccuracies, and Bias in AI
- Leading in the Age of Generative AI
- Encouraging Innovation and Experimentation with AI
- Embracing Risk and Learning from Setbacks with AI Projects
- Developing a Mindset of Growth and Learning
- CLCOR: Call Setup & Teardown Process
- CLCOR: Call Signaling & Call Setup Processes
- CLCOR: Cisco Collaboration Core Technologies
- CLCOR: CM Disaster Recovery & IP Protocols
- RSTECH: Networking Hardware, Models, & Technologies
- RSTECH: Troubleshooting, Upgrading, Recovering, & Resetting
- RSTECH: Cisco Equipment, Components, & Port Characteristics
- RSTECH: Cisco Memory Functions & Removing Cisco Devices
- RSTECH: OS Types, IOS Access, & Terminal Emulation
- RSTECH: IOS Commands, Startup-Config, & IOX-XE Modes
- Configuring the Outlook Client in Outlook 365
- Configuring & Optimizing a System in Windows 10
- Filtering and sorting data in Excel 365
- Oracle Database 12c R2 SQL: Using Basic SELECT statements
- Navigating in a Desktop Environment in Windows 10 (Fall Creators Update)
- CCNA 2020: NTP, DNS, & DHCP
- CCNA 2020: Configuring & Verifying ACLs
- CCNA 2020: Configuring Port Security, DHCP Snooping, & DAI
- RSTECH: Network Responsibilities, Addressing, & Utilities
- CCNA 2020: Automation, Network Programmability, & SDN Architectures
- CCNA 2020: Configuring SSH, FTP, & TFTP
- CCNA 2020: IT Security Concepts
- CCNA 2020: AAA Security & VPN Types
- CCNA 2020: Configuration Management & JSON Encoded Data
- CCNA 2020: Configuring & Verifying NAT
- CCNA 2020: SNMP, Syslog, & PHB for QoS
- CCNA 2020: Dynamic Routing
- CCNA 2020: Security Program &Password Policy Components
- CCNA 2020: APIs & Cisco DNA Center
- CCNA 2020: Cisco WLC Configuration & Wireless Management Access
- CCNA 2020: Cisco Wireless Architecture & WLAN Components
- CCNA 2020: L2 Discovery Protocols & L2 and L3 EtherChannel Configuration
- CCNA 2020: Spanning Tree Protocol
- CCNA 2020: Static Routing
- CompTIA A+ Core 1: Installing Hardware & Display Components
- Apache Kafka: Deployment & Operating Tasks
- Apache Kafka: Operations
- Apache Kafka: Concepts & Components
- Using Hive to Optimize Query Executions with Partitioning
- Data Analysis using Spark SQL
- Getting Started with Hive
- Loading & Querying Data with Hive
- Apache Spark SQL
- Bucketing & Window Functions with Hive
- Apache Kafka: Development
- Viewing & Querying Complex Data with Hive
- Solr Queries
- Spark Security
- Spark Monitoring & Tuning
- CompTIA Cloud+: Cloud Architecture & Models
- Azure Fundamentals: Azure Data Privacy
- Azure Fundamentals: IoT & AI
- Azure Fundamentals: Monitoring the Azure Environment
- Azure Fundamentals: Azure Security Services
- Azure Fundamentals: Big Data Analytics
- Azure Fundamentals: Azure Network Security
- Introduction to Apache Spark
- Constructors, Fields, Objects, & Inheritance
- Simple Build Tool (SBT) & Scala.js
- Developing Solutions for Microsoft Azure: Implementing API Management
- Developing Solutions for Microsoft Azure: Securing Azure Resources
- Developing Solutions for Microsoft Azure: Developing an App Service Logic App
- Developing Solutions for Microsoft Azure: Developing Event-driven Solutions
- Developing Solutions for Microsoft Azure: Implementing User Authentication & Authorization
- Developing Solutions for Microsoft Azure: Blob Storage
- Developing Solutions for Microsoft Azure: Secure Cloud Solutions
- Developing Solutions for Microsoft Azure: Integrating Caching & Content Delivery
- Developing Solutions for Microsoft Azure: Development with Cosmos DB
- Developing Solutions for Microsoft Azure: Instrumenting Monitoring & Logging Solutions
- CompTIA A+ 220-1001: Network Types
- Azure Fundamentals: Database Solutions
- CompTIA Cybersecurity Analyst+: Threat Mitigation
- CompTIA Cybersecurity Analyst+: Threat Management Incident Planning & Response
- CompTIA Cybersecurity Analyst+: Security Frameworks & Security Controls
- CompTIA Cybersecurity Analyst+: Threat Management Documentation
- CompTIA Cybersecurity Analyst+: Protecting Network Resources
- CompTIA Cybersecurity Analyst+: Monitoring Tools & Analytics
- CompTIA Cybersecurity Analyst+: Malware & Digital Forensics
- CompTIA Cybersecurity Analyst+: Identifying & Reducing Vulnerabilities
- CompTIA Cybersecurity Analyst+: Firewalls, IDS, & IPS
- Developing Solutions for Microsoft Azure: Managing IaaS
- Azure Fundamentals: Network Components
- Azure Fundamentals: Cloud Computing
- Azure Fundamentals: Storage Components
- Azure Fundamentals: Virtual Machines
- Azure Fundamentals: The Ecosystem
- CompTIA A+ 220-1001: Accessories & Mobile Device Synchronization
- Expert Insights on Managing Across Generations
- Maintaining a Cohesive Multigenerational Workforce
- WCAG 2.0 Accessibility Standards
- Introduction to Web Accessibility
- Accessibility & Design
- HTML5 & Accessibility
- Authoring Tool Accessibility Guidelines (ATAG)
- Women in Leadership: Moving Beyond Gender Roles as a Leader
- Leading across Cultures
- How Culture Impacts Communication
- Using Communication Strategies to Bridge Cultural Divides
- Becoming a DEI Ally and Agent for Change
- Outwitting Your Cognitive Bias
- Leading Diversity
- Expert Insights on Managing a Culturally Diverse Team
- Leadership Insights on Leading Diversity
- Overview & Syntax Basics
- Operations & Operators
- CCNA 2020: Network Access, VLAN Configuration, & Interswitch Connectivity
- CCNA 2020: Virtualization Concepts
- Google Associate Cloud Engineer: Google Cloud Platform Ecosystem
- Google Associate Cloud Engineer: Configuring Google Cloud
- Google Associate Cloud Engineer: Google Cloud Resource Manager
- AWS Professional Solutions Architect 2020: AWS Management
- CCSP Bootcamp July/August 2021: Session 3 Replay
- CCNA 2020: Layer 1 Interfaces & Cabling
- CCNA 2020: Layer 1 Physical & Configuration Issues
- CCNA 2020: Networking Protocols
- CCNA 2020: IPv4 Subnetting
- CCNA 2020: IPv6 Addressing & Configuration
- CCNA 2020: IP Addressing Basics & Configuration
- Business Continuity Planning Bootcamp: Session 1 Replay
- Access Data through the Java Client API
- Fundamentals & Installation
- Access Data through the Shell
- HBase Installation
- Apache HBase Fundamentals: Installation, Architecture, and Data Modeling
- IINS 3.0: Introduction to Cisco Security
- CCNA 2020: Networking Components
- CCNA 2020: Network Topology Architectures
- CCNA 2020: Network Topology Architectures - WAN, Cloud, & SOHO
- CCNA 2020: WLCs, Access Points, Servers, & Endpoints
- CCNA 2020: Networking Components - NGFW, NGIPS, & Cisco DNA Center
- IINS 3.0: SIEM Technology & Security Terminology
- DEVASC: Network & Network Communication Basics
- DEVASC: Configuring Devices with Bash, Python, & Ansible
- DEVASC: Coding, Testing, & Managing Cisco Devices
- DEVASC: Network, Collaboration, Security, & Compute Capabilities
- DEVASC: IP Services & Operational Planes
- DEVASC: IPv4 Addressing, Binary Conversion, & Subnetting
- DEVASC: Python Scripting & Managing WebEx Resources
- DEVASC: Network Components, Connectivity, & Troubleshooting
- DEVASC: Application Infrastructure, Deployment, Security, & CI/CD
- DEVASC: DevOps, Docker, Bash, & Unit Testing Basics
- DEVASC: Software Development Methodologies
- DEVASC: Working with Data Formats
- DEVASC: HTTP, APIs, & Webhooks
- DEVASC: Working with Git
- DEVASC: API Usage & Authentication
- DEVASC: Development Methodologies & Software Quality
- DEVASC: Code Organization, Design Patterns, & Version Control
- CBROPS: File Extraction, Event Artifacts, & Regular Expressions
- CBROPS: Security Events, Firewall Operations, & Traffic Analysis
- CBROPS: Social Engineering, Evasion, Obfuscation, & Certificates
- CBROPS: Host-based Analysis & the Role of Attribution
- CBROPS: Log Evidence, Disk Images, & Malware Analysis Output
- CBROPS: Protected Data, Profiling, Forensics, & IRP
- CBROPS: Incident Response, Security Management, & Analysis
- CBROPS: Attack Surfaces, Vulnerability, & Analysis Tools
- CBROPS: Data & Attack Types
- CBROPS: Data Loss, Host Isolation, & Detection Methods
- Six Sigma Black Belt: Fundamentals of Lean and Six Sigma and their Applications
- Cloud Computing, Virtualization, & Resiliency
- CCSP Bootcamp July/August 2021: Session 1 Replay
- CCSP Bootcamp July/August 2021: Session 2 Replay
- CBROPS: CVSS, Deployments, Access Control, & Data Visibility
- CBROPS: Firewall, Filtering, Visibility, & Control Data
- SECFND: Overview & Network Models
- CBROPS: Threat Actors, Security, & Risk Management
- DEVASC: DevNet Overview & Setting up Tools in Linux
- DEVASC: Setting up Development & Virtualization Tools in Windows
- CBROPS: The CIA Triad & Security Approaches
- ITIL® 4 Foundation: Service Management Practices (Part 2)
- ITIL® 4 Foundation: The Service Value Chain
- ITIL® 4 Foundation: Service Management Practices (Part 1)
- ITIL® 4 Foundation: General Management Practices
- ITIL® 4 Foundation: The Service Value System
- Developing Solutions for Microsoft Azure: Implementing IaaS Solutions
- Developing Solutions for Microsoft Azure: App Service Web Apps
- Developing Solutions for Microsoft Azure: Implementing Azure Functions
- Introduction to Java
- ITIL® 4 Foundation: Key Concepts of Service Management
- ITIL® 4 Foundation: The Guiding Principles
- ITIL® 4 Foundation: Key Concepts
- ITIL® 4 Foundation: Introduction
- Microsoft 365 Fundamentals: Understanding Cloud Concepts
- System Security Certified Practitioner (SSCP 2018): Network Fundamentals
- Douglas Bandeira's Transcript
- Douglas Bandeira's Wallet
- About Accredible