Site Map - skillsoft.digitalbadges.skillsoft.com
- User Authentication
- Guruprasad Reddy Lingala's Credentials
- Guruprasad Reddy Lingala's Wallet
- Embracing Agile at Scale
- Git & GitHub: Introduction
- Exploring Business Process Automation
- Data Access & Governance Policies: Data Classification, Encryption, & Monitoring
- PRINCE2® Project Management Overview (2017 Update)
- Testing Methods
- Hybrid Environment Pipelines: Hybrid Cloud Transformation
- Automation Design & Robotics
- Being an Effective Team Member
- Agile Project Planning
- Effective Team Communication
- CCSP 2019: Identity & Access Management
- Identifying Risk (PMBOK® Guide Sixth Edition)
- Code Quality, Testing, & Development
- Scrum Master: Scrum for the Team
- Software Design and Development: Design Patterns & SOLID Principles
- CCSP 2022: Cloud Security Concepts & Design Principles
- Leading Security Teams for GenAI Solutions: Use of Generative AI
- Responsible Use of AI
- CompTIA Linux+: Daemons & Processes
- CompTIA Linux+: Network Services
- CompTIA Linux+: File Systems & Permissions Management
- CompTIA Linux+: Network Connectivity
- CompTIA Linux+: Installation & File System Navigation
- CompTIA Linux+: Storage & File systems
- Expert Insights on Time Management
- Expert Insights on Listening
- Taking Effective and Professional Notes
- Become a Great Listener
- Listening Even When It's Difficult to Listen
- Using Active Listening in Workplace Situations
- Listening
- Using Punctuation Marks
- Troublesome Words and Phrases: Usage Mistakes in Writing
- Creating Well-constructed Sentences
- Business Grammar
- Getting the Details Right: Spelling Basics
- Using the Parts of Speech
- Abbreviating, Capitalizing, and Using Numbers
- OWASP Top 10: A01:2021-Broken Access Control
- OWASP Top 10: A02:2021-Cryptographic Failures
- OWASP Top 10: A03:2021-Injection
- OWASP Top 10: A04:2021-Insecure Design
- OWASP Top 10: A05:2021-Security Misconfiguration
- OWASP Top 10: A06:2021-Vulnerable & Outdated Components
- OWASP Top 10: A07:2021-Identification & Authentication Failures
- OWASP Top 10: A09:2021-Security Logging & Monitoring Failures
- OWASP Top 10: A08:2021-Software & Data Integrity Failures
- OWASP Top 10: A10:2021-Server-Side Request Forgery (SSRF)
- OWASP Top 10: Securing Web Applications
- OWASP Top 10: A10 - Insufficient Logging & Monitoring
- OWASP Top 10: Discovering & Exploiting Web App Vulnerabilities
- CISSP: Software Development Security
- OWASP Top 10: A1 - Injection
- OWASP Top 10: A2 - Broken Authentication
- OWASP Top 10: A4 - XML External Entities
- OWASP Top 10: Web Application Security
- OWASP Top 10: A3 - Sensitive Data Exposure
- OWASP Top 10: A5 - Broken Access Control
- OWASP Top 10: A8 - Insecure Deserialization
- OWASP Top 10: A6 - Security Misconfiguration
- OWASP Top 10: A7 - Cross-site Scripting
- OWASP Top 10: A9 - Using Components with Known Vulnerabilities
- API Security
- Application Security Awareness & Validation
- Secure Application Architecture & IAM
- Applying Scrum Development Practices
- Getting Started in PowerPoint Microsoft 365
- Machine Learning
- Getting started in Excel 365
- Adding & arranging data in Excel 365
- Working with tables in Excel 365
- Getting started with charts in Excel 365
- Formatting cells and ranges in Excel 365
- Printing spreadsheets in Excel 365
- Performing data calculations using formulas in Excel 365
- Setting your work preferences in Excel 365
- Ten common tools in Excel 365
- Taking the Lead with Workplace Motivation and Engagement
- Developing the Product & Sprint Backlogs
- Agile Software Development - Scrum
- Top 10 List Items
- Release & Sprint Planning
- Using Kanban in IT & Software Development
- Software Data Analysis: Project Management Metrics
- SOLID & GRASP
- Cloud Security Fundamentals: Cloud Application Security
- Agile Test-Driven Development
- Automated Software Testing
- Guruprasad Reddy Lingala's Transcript
- Guruprasad Reddy Lingala's Wallet
- About Accredible