Site Map - skillsoft.digitalbadges.skillsoft.com
- User Authentication
- Han Gong's Credentials
- Han Gong's Wallet
- Software Testing for DevOps: Testing & DevOps Overview
- Microservices Deep Dive
- Working Well with Others
- CGI Annual Tour F2025
- Aligning Goals and Priorities To Manage Time
- Workplace Diversity, Equity, and Inclusion in Action
- The Art of Staying Focused
- Generative AI and Its Impact to Everyday Business
- Establishing AI Guardrails and Governance
- API Error Handling: Best Practices
- Jenkins for DevOps: Jenkins Configuration for DevOps
- Lifecycle Phases, Plugins, Archetypes, & Build Profiles
- Running Tests, Generating Reports, & Specifying Resources
- Plugins, Deployment, Troubleshooting, & Integration
- CGI Annual Tour F2024: U.S. Commercial and State Government
- Java Certified Foundations Associate: Java Debugging & Exceptions
- Jenkins for DevOps: Practical Uses of Jenkins
- Jenkins for DevOps: The Basics of Jenkins
- Using Git for DevOps: Using Git Effectively
- Git & GitHub: Introduction
- Git & GitHub: Working with Git Repositories
- Embracing Change at Work
- API Management: Elasticsearch API Analytics
- ELK Operations on the Cloud
- Processing Data: Getting Started with Apache Kafka
- Spring Boot Microservices: Getting Started
- Scrum Foundation: Scrum Basics
- Maven Repositories & Dependency Management
- Spring: An Overview of the Spring Framework
- Reactive Programming Methods
- Introduction to Reactive Programming
- DEVASC: Working with Data Formats
- Thriving in Anxious Times: Manage your Anxiety and Learn to Love Your Work Again: Session Replay
- Mobile Device Security & Handling
- Configuring Enterprise-level Security
- Final Exam: Secure Programmer
- Infrastructure Security
- Secure Programmer: Resiliency Coding
- Mobile Security Threats
- Mobile Security Threat Mitigation
- Containers & Wrappers
- Secure Programmer: Security Concepts
- Secure Programmer: Vulnerabilities
- Secure Programmer: Encryption
- Secure Programmer: Attacks
- OWASP: Top 10 Item A10
- OWASP: Top 10 Items A6, A5, & A4
- OWASP: Top 10 Items A9, A8, & A7
- OWASP: Top 10 Items A3, A2, & A1
- Mobile Security Technologies
- Introduction to Secure Programming
- Moving from Bias to Inclusion in a DEI Journey
- Han Gong's Transcript
- Han Gong's Wallet
- About Accredible