Site Map - skillsoft.digitalbadges.skillsoft.com
- User Authentication
- Francis John Cepe's Credentials
- Francis John Cepe's Wallet
- PRINCE2® Project Management Overview (2017 Update)
- Embracing Agile at Scale
- Exploring Project Management, Then and Now (2021 Update)
- Testing Methods
- Agile Project Planning
- Validate and Control Scope (PMBOK® Guide Sixth Edition)
- Effective Team Communication
- Software Design and Development: Design Patterns & SOLID Principles
- CAPM®: Performance Measurement Metrics
- Generative AI Foundations: Ethical & Responsible Use of AI in IT
- Generative AI APIs for Practical Applications: An Introduction
- Artificial Intelligence and Machine Learning
- Application Security Awareness & Validation
- Secure Application Architecture & IAM
- Top 10 List Items
- API Security
- ITIL® 4 Foundation: Introduction
- ITIL® 4 Foundation: Key Concepts
- Best Practices for the SRE: Automation
- Data Access & Governance Policies: Data Access Governance & IAM
- Build & Release Engineering Best Practices: Release Management
- Site Reliability Engineer: Managing Overloads
- Site Reliability Engineer: Managing Cascading Failures
- SRE Troubleshooting: Tools
- SRE Emergency & Incident Response: Responding to Emergencies
- SRE Emergency & Incident Response: Incident Response
- SRE Postmortums: Blameless Postmortem Culture Creation
- Backup & Recovery: Business Continuity & Disaster Recovery
- Backup & Recovery: Enterprise Backup Strategies
- Describing Distributed Systems
- SRE Troubleshooting Processes
- Monitoring Distributed Systems
- Professional Google Workspace Administrator
- Site Reliability: Engineering
- Site Reliability: Tools & Automation
- Internet of Things Overview
- CompTIA Cybersecurity Analyst+: Malware & Digital Forensics
- Business Impact Analysis & Risk Management
- Frameworks, Guidelines, & Physical Security
- Implementing a Secure Network Architecture
- Secure System, Application Design, & Deployment
- Incident Response, Forensics, Recovery, & Security Controls
- Policies, Plans, & Procedures
- Cloud Computing, Virtualization, & Resiliency
- Components Supporting Organizational Security
- Troubleshooting Common Security Issues
- Wireless Security Settings
- Analyzing Output from Security Technologies
- Implementing Secure Protocols
- CompTIA Security+: Cryptography
- Identity & Access Management Controls
- Security Assessment Using Software Tools
- Deploying Mobile Devices Securely
- Common Account Management Practices
- Public Key Infrastructure
- Identity & Access Services
- Cryptographic & Wireless Attacks
- Penetration Testing & Vulnerability Scanning
- Impacts from Vulnerability Types
- The Present Threat Landscape
- Types of Malware
- Social Engineering & Related Attacks
- Application & Service Attacks
- Francis John Cepe's Transcript
- Francis John Cepe's Wallet
- About Accredible