Site Map - skillsoft.digitalbadges.skillsoft.com
- User Authentication
- Hans Hope's Credentials
- Hans Hope's Wallet
- Managing Snowflake: Administering a Snowflake Account
- Developing Solutions for Microsoft Azure: Container Instances
- Developing Solutions for Microsoft Azure: Azure Container Registry
- Developing Solutions for Microsoft Azure: Resource Manager Templates
- Information Security for Leaders: An Introduction to InfoSec
- Managing Enterprise InfoSec Risks & Risk Tolerance
- InfoSec Crisis Management & Incident Response
- Information Security Practices: Budgeting & Forecasting for InfoSec
- Information Security Practices: Multi-year InfoSec Planning
- Information Security for Leaders: Elements of an InfoSec Team
- Microsoft Azure Fundamentals: Cloud Computing
- Microsoft Azure Fundamentals: Azure Network Infrastructure
- Microsoft Azure Administrator: Azure Network Infrastructure
- Information Security for Leaders: Elements of InfoSec
- CompTIA Cybersecurity Analyst+: Network Security Concepts
- CISSP 2021: Risk Management
- Security Risks: Planning for Security Risk Management
- SSCP 2021: \nNetwork Attacks & Countermeasures
- CISSP 2024: Risk Management Concepts
- Leveraging Generative AI for Business
- Generative AI on GCP: Empowering Machine Language Workflows with Vertex AI
- Generative AI on GCP: Harnessing Generative AI with Vertex AI
- Generative AI Foundations: Ethical & Responsible Use of AI in IT
- Azure AI Fundamentals: Azure Machine Learning Fundamentals
- CISSP 2024: Professional Ethics & Security Concepts
- CISSP 2024: Security Governance & Compliance Issues
- Azure AI Fundamentals: Machine Learning with Azure AI
- CISSP 2024: Asset Classification, Handling, & Provisioning
- Generative AI & the Azure Bot AI Service
- Azure AI Fundamentals: Introduction to Azure AI Vision
- Azure AI Fundamentals: Working with AI Vision
- VMware VCP-DCV vSphere 7: Managing & Deploying VMs
- VMware VCP-DCV vSphere 7: Multipathing & vSAN Solutions
- Product Owner: Product Backlog Management - Defining Product Value
- Developing Solutions for Microsoft Azure: Virtual Machines
- Leadercamp on-demand: Leading with Generative AI
- An Introduction to Generative AI
- Reimagining Marketing with Generative AI
- Reimagining Product Management with Generative AI
- VMware VCP-DCV vSphere 7: DRS Clusters & High Availability
- VMware VCP-DCV vSphere 7: Switch Security, Traffic Shaping, Load Balancing, & Creation
- VMware VCP-DCV vSphere 7: Resource Management & Alarms
- VMware VCP-DCV vSphere 7: VM Customization, Management, & Snapshots
- VMware VCP-DCV vSphere 7: vCenter Monitoring, Protection, Migration, & Upgrading
- VMware VCP-DCV vSphere 7: Baselines, Cluster Image Validation, & VM Upgrades
- VMware VCP-DCV vSphere 7: vSphere HA Clusters & Fault Tolerance
- VMware VCP-DCV vSphere 7: vSphere Storage & Datastores
- VMware VCP-DCV vSphere 7: vCenter Server Architecture, Appliance, & Inventory
- VMware VCP-DCV vSphere 7: Virtualization, SDDC, & ESXi Hosts
- VMware VCP-DCV vSphere 7: ESXi Host Configuration
- VMware VCP-DCV vSphere 7: vCenter Domains, Identity Sources, Access, & Backup
- VMware VCP-DCV vSphere 7: VM Provisioning, Tools, Files, & Containers
- VMware VCP-DCV vSphere 7: vSphere Terminology & Standard Switches
- DSC with Linux & JEA
- CISM 2022: Applied Cryptography
- Resource Creation & Configuration
- DSC Resources
- DSC, Configurations, & Repositories
- DSC & Azure
- Desired State Configuration (DSC)
- Local Configuration Manager (LCM)
- Configuration, Advanced Help, & Queries
- Output Formatting, Modules, & Customization
- Aliases, Providers, & Objects
- Cmdlet Structure & Help
- Remote Management
- Syntax, Help, & Conditionals
- Introduction to PowerShell 5.0
- CISM 2022: Incident Response
- CISM 2022: Assessing Risk
- CISM 2022: Data Protection with Cryptography
- Certified in Cybersecurity (CC): Networking & Security Infrastructure
- CISM 2022: Business Continuity & Security
- CISM 2022: Secure Device & OS Management
- CISM 2022: Network Attack Mitigation
- CISM 2022: Common Network Security Threats
- CISM 2022: Security Standards
- CISM 2022: Information Security Governance
- CISM 2022: Data Privacy
- CISM 2022: Common Network Security Attacks
- CISM 2022: Social Engineering & Malware
- Microsoft Security: Compliance Concepts & Methodologies
- Cloud Security Administration: Cloud Data & Application Security
- AWS Cloud Practitioner 2023: Overview of Cloud Security
- Security Configurations & Compliance Controls
- Microsoft Security: Microsoft 365 Security & Security Management
- CCSP 2022: Software Assurance & Validation
- CISM 2022: Network Security
- CCSP 2022: Cloud Security Concepts & Design Principles
- CCSP 2022: Planning & Implementing Security Controls
- CCSP 2022: Application Security Awareness & Life Cycles
- CCSP 2022: Build & Implement a Physical & Logical Cloud Infrastructure
- CCSP 2022: Operate & Maintain Physical & Logical Cloud Infrastructure
- CCSP 2022: Manage Security Operations
- CCSP 2022: Cloud Infrastructure & Platform Components
- CCSP 2022: Data Center Design & Risk Analysis
- Gradients & Bitmap Images in Adobe Illustrator CC 2015
- Working with Amazon DynamoDB: Advanced Operations in DynamoDB
- Configuring Azure VM Networking
- Microsoft Azure Fundamentals: Network Infrastructure
- Using Docker for DevOps: Configuring Docker for Continuous Delivery
- Stakeholder Communication: Software Projects & Stakeholder Communication
- Applying Scrum Development Practices
- Service Desk, IT Asset, Service Configuration, and Change Control Management
- Event, Incident, and Problem Management
- Release, Service Level, and Availability Management
- ITIL® 4 Foundation: Key Concepts of Service Management
- Key Concepts and the Four Dimensions of Service Management
- The Guiding Principles of the Service Value System and Continual Improvement Model
- The Service Value Chain and General Management Practices
- ITIL® 4 Foundation: Introduction
- Google Associate Cloud Engineer: Configuring Google Cloud
- AWS Developer Associate 2022: Cloud Services
- Generative AI APIs for Practical Applications: An Introduction
- Ethical, Privacy, & Intellectual Property Considerations for ChatGPT
- Building Success through Self-improvement
- Hybrid Cloud Architecture & Deployment: Adopting Migration Strategies
- Azure IoT Hub
- Developing a Mindset of Growth and Learning
- Establishing AI Guardrails and Governance
- Using AI to Improve the Employee Experience
- Leveraging AI as a Team Member
- Fostering a Growth Mindset in the Age of AI
- Leveraging Analytical and Critical Thinking to Implement AI
- Programming Fundamentals: Introduction to Programming
- Navigating AI Ethical Challenges and Risks
- Reimagining the Customer Experience with Generative AI
- Leading through the AI Disruption with Empathy
- Embracing Risk and Learning from Setbacks with AI Projects
- AWS SysOps Associate 2022: Storage & Data Classification
- AWS SysOps Associate 2022: Managing EC2 Instances
- AWS SysOps Associate 2022: Identity and Access Management
- AWS SysOps Associate 2022: Managing Application Workloads
- Generative AI and Its Impact to Everyday Business
- Harnessing the Disruption of Generative AI
- Recognizing Hallucinations, Inaccuracies, and Bias in AI
- Reimagining the Sales Process with Generative AI
- Unlocking Business Solutions with AI-Powered Analytics
- Leading in the Age of Generative AI
- Encouraging Innovation and Experimentation with AI
- DevOps with Docker: Container Management
- Microsoft Azure Administrator: Azure Virtual Machine Templates
- Using Docker for DevOps: Introduction to Docker
- Working with Containers: Introduction to Docker
- AWS SysOps Associate 2022: Firewall Solutions
- AWS SysOps Associate 2022: Network Settings
- AWS SysOps Associate 2022: Automation
- AWS SysOps Associate 2022: Managing AWS Accounts
- Microsoft Azure Administrator: ARM Templates
- Microsoft Azure Administrator: App Services
- Microsoft Azure Administrator: Subscriptions
- Microsoft Azure Administrator: Authentication & Authorization
- Microsoft Azure Administrator: Azure Files Shared Folders
- Microsoft Azure Administrator: Network Connectivity
- Microsoft Azure Administrator: Firewall Solutions
- Microsoft Azure Administrator: Azure Policies
- Microsoft Azure Administrator: Subscriptions & AD Tenants
- Microsoft Azure Fundamentals: Virtual Machines
- Windows Client: Windows Hyper-V
- Microsoft Azure Administrator: Virtual Machines
- Microsoft Azure Administrator: Role-based Access Control
- Microsoft Azure Administrator: Cost Management
- Microsoft Azure Administrator: Manage Azure AD Users
- Microsoft Azure Administrator: Managing Azure Roles & Tags
- Microsoft Azure Administrator: Management Groups & Resource Groups
- Microsoft Azure Administrator: Storage Account Access
- Microsoft Azure Administrator: Storage Account Blob Management
- Microsoft Azure Administrator: Policy & Resource Locking
- Microsoft Azure Administrator: Managing Azure Storage Accounts
- Microsoft Azure Administrator: Managing Azure Virtual Machines
- Microsoft Azure Administrator: Managing Azure Network Solutions
- Microsoft Azure Administrator: Azure AD User & Group Management
- Google Associate Cloud Engineer: Managing Google Compute Engine
- Google Associate Cloud Engineer: Implementing Google Cloud Storage
- Google Associate Cloud Engineer: Google Virtual Private Cloud
- Microsoft Azure Administrator: Network Infrastructure Services
- Google Associate Cloud Engineer: Google Cloud Platform Ecosystem
- Google Associate Cloud Engineer: Google Cloud Resource Manager
- Google Associate Cloud Engineer: Implementing Google Compute Engine
- Google Associate Cloud Engineer: Google Identity & Access Management (IAM)
- Data Center Virtualization: vSphere & ESXi
- Networking
- Storage
- Virtual Machine Management
- Introduction to Programming Languages
- Hans Hope's Transcript
- Hans Hope's Wallet
- About Accredible