Site Map - skillsoft.digitalbadges.skillsoft.com
- User Authentication
- Fadoua EL GHAMMOURI's Credentials
- Fadoua EL GHAMMOURI's Wallet
- Track 1: Unit Testing
- Javanista to Java Master
- Track 1: Java Novice
- Unit Testing with Mocks: Creating Mocks & Verifying Behavior
- Unit Testing with Mocks: Mocking Exceptions & Using Spies
- Final Exam: Unit Testing
- Unit Testing: Parameterized JUnit Tests
- Unit Testing: Executing JUnit Tests
- Unit Testing with Mocks: Getting Started with Mockito
- Unit Testing: Assertions & Assumptions in JUnit
- Unit Testing: Advanced Annotations in JUnit
- Unit Testing: An Introduction to the JUnit Framework
- Encapsulating Business Logic with Jakarta: An Overview of Enterprise Beans
- Building User Interfaces with JSF: Integrating a Database with a JSF App
- Encapsulating Business Logic with Jakarta: Advanced Topics in Enterprise Beans
- Track 2: Java EE
- Track 3: Spring Basics
- Track 4: Spring Data
- Final Exam: Java EE
- Building User Interfaces with JSF: Building User Interactions with JSF
- Building User Interfaces with JSF: Getting Started with Jakarta Server Faces
- Final Exam: Spring Data
- Working with Spring Data JPA: Derived Query Methods
- Working with Spring Data JPA: Custom Queries
- Processing Batch Data: The Fundamentals of Spring Batch
- Processing Batch Data: Spring Batch Configurations and Transformations
- Working with Spring Data JPA: The Fundamentals of Spring Data JPA
- Working with Spring Data JDBC: An Introduction to JDBC & Spring
- Working with Spring Data JDBC: Spring Data JDBC & the CrudRepository
- Working with Spring Data JDBC: Configuring Derived Query Methods
- Final Exam: Spring Basics
- Spring Framework: The Fundamentals of Dependency Injection
- Spring Framework: Configuring Beans with Autowiring
- Spring: Extending Applications with Aspect-oriented Programming
- Spring: Exploring Advices in Aspect-oriented Programming
- Database Integration: Modeling Data Using JPA & Hibernate
- Database Integration: Overview of Using JPA & Hibernate
- Spring: An Overview of the Spring Framework
- Track 3: Javanista
- Final Exam: Javanista
- Serialization in Java: Getting Started with Object Serialization
- Serialization in Java: Using JSON Simple for Serialization & Parsing
- Serialization in Java: Using JSON in Java for Serialization & Parsing
- HTTP Requests in Java: Sending Simple HTTP Requests
- Java Database Connectivity (JDBC): Joining & Filtering Data with RowSets
- Java Database Connectivity (JDBC): An Introduction to JDBC
- HTTP Requests in Java: HTTP Requests with Java's HttpClient
- Java Database Connectivity (JDBC): Batch Executions & Transactions with JDBC
- Java Database Connectivity (JDBC): Interacting with Databases using RowSets
- Java: Working with Annotations, Generics, & Arrays Using Reflection
- Java: Leveraging Reflection to Build Dynamic Proxies & Unit Tests
- Building Web Applications with JSP: Integrating a JSP App with a Database
- Java Web Services: Getting Started with SOAP-based Web Services
- Java Archive (JAR): Building Java Archives
- Java Archive (JAR): Packaging Java Apps Using Maven
- Java Web Services: Building REST APIs
- Java Web Services: Enabling CRUD Operations with REST APIs
- Java Web Services: Integrating Web Services with a Database
- Building Web Applications with JSP: Customizing Responses with Servlets
- Building Web Applications with JSP: An Introduction to JSP
- Building Web Applications with JSP: Handling Errors
- Generics in Java: Creating Classes and Methods Using Generics
- Collections in Java: Lists & List Operations
- Classes in Java: Creating & Using Anonymous Classes
- Classes in Java: Working with Static Nested, Inner, & Local Classes
- Classes in Java: Implementing Functional Interfaces Using Lambdas
- Collections in Java: Arrays & Non-parameterized ArrayLists
- Generics in Java: Bounded Type Parameters & Wildcards
- Java: Getting Started with Reflection
- Handling Errors: Handling Exceptions in Java
- Handling Errors: Advanced Topics in Exceptions
- Java: Accessing Constructors, Methods, & Fields Using Reflection
- Collections in Java: Sets & Maps
- Final Exam: Java Apprentice
- Final Exam: Java Novice
- Handling Errors: An Introduction to Exceptions
- Mapping Relationships in Java: Working with Interfaces & Class Loaders
- Interactive Java & JShell: Writing Java Programs with the Interactive JShell
- Mapping Relationships in Java: Modeling Is-a Relationships Using Inheritance
- Mapping Relationships in Java: Constructors & Polymorphism
- Mapping Relationships in Java: Overriding Methods and Using Access Modifiers
- Modeling Entities in Java: Static Members, Arguments, & Method Overriding
- Modeling Entities in Java: Methods, Method Overloading, & Constructors
- Modeling Entities in Java: Defining Custom Classes & Objects
- Modeling Entities in Java: Getting Started with Classes & Objects
- Control Structures in Java: Implementing Java Control Structures
- Getting Started with Java: Writing & Running Java Programs
- Getting Started with Java: Variables & Primitive Types
- Getting Started with Java: Operators
- Getting Started with Java: The Fundamentals of Java Programming
- Track 1: Building Web Applications with Angular 11
- Enriched Web Development with Angular 11
- Final Exam: Building Web Applications with Angular 11
- Angular 11: Navigation & Routing in Angular
- Angular 11: Services & Dependency Injection
- Angular 11: Security & Deployment in Angular
- Angular 11: New Features of Angular 11 & Angular 12
- Angular 11: Working With Forms
- Angular 11: Reactive Programming With RxJS & Observables
- Angular 11: Directives & Pipes
- Angular 11: Working With Nested Components
- Angular 11: Getting Started with Angular
- Angular 11: Working With Angular Modules
- Angular 11: Introduction to Components
- Scrum Master: Scrum Master & Facilitation
- Scrum Master: Role of the Scrum Master
- Mobile Device Security & Handling
- Infrastructure Security
- Mobile Security Threats
- Mobile Security Threat Mitigation
- Mobile Security Technologies
- Configuring Enterprise-level Security
- Final Exam: Secure Programmer
- Secure Programmer: Resiliency Coding
- Containers & Wrappers
- Secure Programmer: Security Concepts
- Secure Programmer: Vulnerabilities
- Secure Programmer: Encryption
- Secure Programmer: Attacks
- OWASP: Top 10 Item A10
- OWASP: Top 10 Items A6, A5, & A4
- OWASP: Top 10 Items A9, A8, & A7
- OWASP: Top 10 Items A3, A2, & A1
- Introduction to Secure Programming
- Fadoua EL GHAMMOURI's Transcript
- Fadoua EL GHAMMOURI's Wallet
- About Accredible