Site Map - skillsoft.digitalbadges.skillsoft.com
- User Authentication
- Gurazala Ramya's Credentials
- Gurazala Ramya's Wallet
- Event, Incident, and Problem Management
- Service Desk, IT Asset, Service Configuration, and Change Control Management
- Release, Service Level, and Availability Management
- Applying Scrum Development Practices
- Scrum: Creating Effective Product Backlogs
- Scrum: Product Backlog
- Scrum Product: Defining the Why & How of the Product
- Scrum Artifacts and Investment Guidelines
- Product Development Practices
- Agile & TDD Best Practices for APIs: Test-driven Development Strategy
- Scrum Concepts & the Product Owner
- Scrum: Product Development Framework
- Agile Foundations: Fundamentals
- Agile Foundations: Scrum Methodology
- Risk Management: Project Risk Assessment
- Transition to Scrum: Agile Foundation to Scrum
- Testing Approaches
- Lean in Scrum: Lean Development Practices
- Agile Software Development: Agile Project Management Techniques
- Secure Agile Programming: Testing
- Techniques & Tools
- Agile Methodologies
- Agile for Software Development: Lean, Agile, & Scrum Methodologies
- Agile Software Development: Agile Development Life Cycle
- Project Evaluation: Defining Success Metrics
- Project Management Needs vs. Expectations
- Scrum Master: Scrum for the Team
- Stakeholder Communication: Software Projects & Stakeholder Communication
- Transitioning to Scrum
- Managing and Engaging Stakeholders
- Business Analysis for Project Management: Practices for Later Project Stages
- Scrum Team Velocity: Exploring Team Velocity
- Skills for Project Analysts: Negotiation Skills
- Decision Making for Software Project Managers
- CompTIA Security+: Monitoring, Visibility, & Reporting
- CompTIA Security+: Wireless, Mobile, & Embedded Device Security
- CompTIA Security+: Risk Management, Privacy, & Sensitive Data Security
- CompTIA Security+: Basic Cryptography & Public Key Infrastructure
- CompTIA Security+: Security Concepts in an Enterprise Environment
- CompTIA Security+: Authentication & Authorization Design Concepts
- CompTIA Security+: Implementing Identity and Account Management & AAA Solutions
- CompTIA Security+: Organizational Security Assessment Tools & Mitigation Controls
- CompTIA Security+: Physical Security Controls
- CompTIA Security+: Incident Response, Digital Forensics, & Supporting Investigations
- CompTIA Security+: Implementing Cybersecurity Resilience
- CompTIA Security+: Virtualization, Cloud Computing, & Cloud Cybersecurity Solutions
- CompTIA Security+: Implementing Secure Network Designs
- CompTIA Security+: Security Policies, Regulations, Standards, & Frameworks
- CompTIA Security+: Implementing Secure Protocols & Application Security Solutions
- CompTIA Security+: Controls & Application Development, Deployment, & Automation
- CompTIA Security+: Analyzing Application & Network Attacks
- CompTIA Security+: Social Engineering Techniques & Other Attack Types
- CompTIA Security+: Threat Actors, Intelligence Sources, & Vulnerabilities
- CompTIA Security+: Security Assessment & Penetration Testing Techniques
- Cybersecurity Awareness: Getting Started with Security Foundations
- Cybersecurity Awareness: Information Security Fundamentals
- Cybersecurity Awareness: Key Security Terms & Concepts
- CompTIA Security+: Architecture & Infrastructure Concepts
- CompTIA Security+: Threat Actors & Vectors
- CompTIA Security+: Survey of Malicious Activities
- ITIL® 4 Foundation: Introduction
- ITIL® 4 Foundation: Key Concepts of Service Management
- Agile Principles and Methodologies
- Secure Backup
- Backup & Recovery Options
- Oracle Database 12c R2 SQL: Restricting & Sorting Data
- RAC Administration Services & Multitenant Architecture
- Data Transportation
- RAC Backup & Recovery
- Automatic Workload Repository
- Auditing Features & Configuration
- ADDM & ASH
- Working with DDL
- Failure & Recovery Concepts
- Performing & Managing Backups
- Backup Strategies
- The Present Threat Landscape
- Building ML Training Sets: Introduction
- Building ML Training Sets: Preprocessing Datasets for Classification
- Building ML Training Sets: Preprocessing Datasets for Linear Regression
- Supervised Learning Models
- Introduction to Machine Learning & Supervised Learning
- Microsoft Azure: Getting Started
- The Azure Environment
- IT Infrastructure Automation: Version Control & GIT
- IT Infrastructure Automation: Text File Processing & RegEx
- IT Infrastructure Automation: Automation & Scalability
- IT Infrastructure Automation: Automated Monitoring
- Data Compliance Issues & Strategies
- Convolutional and Recurrent Neural Networks
- Applying Machine Learning
- Machine & Deep Learning Algorithms: Introduction
- Machine & Deep Learning Algorithms: Regression & Clustering
- Machine & Deep Learning Algorithms: Data Preperation in Pandas ML
- Unsupervised Learning
- Neural Networks
- Implementing Governance Strategies
- Introduction to Artificial Intelligence
- Search Problems
- Constraint Satisfaction Problems
- Cloud Computing Fundamentals: Cloud Virtualization & Data Centers
- Cloud Access Control
- Cloud Computing Fundamentals: Introduction
- Moving to the Cloud
- Machine Learning
- Cloud Service Models & Benefits and Issues
- Adversarial Problems
- Cloud Security
- Cloud Computing Fundamentals: Storing & Managing Cloud Data
- Cloud Computing Fundamentals: Considerations
- Uncertainty
- Cloud Computing Fundamentals: Cloud Protocols & Standards
- Cloud Presence & Privacy
- GCP Engineering & Streaming Architecture
- Cloud Risk Management
- Reinforcement Learning: Essentials
- Introducing Natural Language Processing
- Planning AI Implementation
- Cloud Computing Fundamentals: Migrating to the Cloud
- Using GoogleVR and Unreal
- Networking Fundamentals
- Ports, Protocols, & the OSI Model
- Network Topologies & Technologies
- Networking Devices
- Network Storage, Virtualization, & WAN Technologies
- Network Monitoring & Remote Access Methods
- Policies and Best Practices
- Security Devices, Wireless Security, & Access Control
- Network Device Hardening
- Troubleshooting Common Security Issues
- Wireless Security Settings
- Scripting & Administrative Tasks
- Unix Input, Output, & Piping
- Troubleshooting Methodology & Tools
- Troubleshooting Connectivity & Performance Issues
- Troubleshooting Common Network Service Issues
- Windows Server 2016 Identity: Active Directory Maintenance & Recovery
- Windows Server 2016 Identity: Active Directory Rights Management Services
- Windows Server 2016 Identity: Active Directory Groups & Organizational Units
- Windows Server 2016 Identity: Active Directory Group Policy Settings
- Windows Server 2016 Identity: Active Directory Group Policy Processing
- Windows Server 2016 Identity: Active Directory Group Policy Preferences
- Windows Server 2016 Identity: Active Directory Group Policy Objects
- Windows Server 2016 Identity: AD FS & Web Application Proxy
- Windows Server 2016 Identity: Active Directory Domain Controllers
- Windows Server 2016 Identity: Active Directory Certificate Services
- Windows Server 2016 Identity: Active Directory Accounts & Permissions
- Social Engineering & Related Attacks
- SQL & Concurrency Concepts
- SQL Concepts & Queries
- SQL Selecting, Ordering, & Filtering
- Storage
- SQL Transaction Locks
- SQL Tables
- Advanced GNU & Unix Commands
- Essential System Services
- SQL Security Architecture
- Getting to know the Office 365 web portal
- Linux Installation
- Windows Server 2016 Identity: Active Directory Trusts & Sites
- Group File Sharing
- Group Calendar Management
- Group Communication
- Windows Server 2016 Identity: Active Directory Service Accounts & Policies
- System Booting & Shutdown
- Package Management
- Users, Groups, & Environment Variables
- Network Services Management
- Introduction to System Architecture
- Introduction to Devices & File Systems
- GUIs & Configuration
- GNU & Unix Commands
- File Permissions & Links
- Advanced SQL Queries
- Creating, Joining, & Managing Groups
- Gurazala Ramya's Transcript
- Gurazala Ramya's Wallet
- About Accredible