Site Map - skillsoft.digitalbadges.skillsoft.com
- User Authentication
- Jay Davis's Credentials
- Jay Davis's Wallet
- PRINCE2® Project Management Overview (2017 Update)
- Track 2: Big Data Infrastructures
- Techniques for Big Data Analytics
- Spark for High-speed Big Data Analytics
- Penetration Tester
- Non-relational Data: Non-relational Databases
- Design Patterns in JavaScript: Constructor, Factory, & Abstract Factory Creational Patterns
- Leading in the Age of Generative AI
- Final Exam: Data Primer
- Big Data Concepts: Big Data Essentials
- Big Data Concepts: Getting to Know Big Data
- Final Exam: Big Data Infrastructures
- Generative AI and Its Impact to Everyday Business
- Navigating AI Ethical Challenges and Risks
- Data Nuts & Bolts: Fundamentals of Data
- Traditional Data Architectures: Relational Databases
- New Age Data Infrastructures: Factors Driving Data Infrastructures
- Traditional Data Architectures: Data Warehousing and ETL Systems
- Track 1: Data Primer
- Certified in Cybersecurity (CC): Core Security Principles & Risk Management
- Influencing without Authority
- The First Steps in Negotiating
- The Value Proposition: Getting Your Pitch Right
- Building Personal Power through Influence
- Influencing through Positive Leadership
- Negotiating Well and Going for the Close
- Turning Objection into Opportunity during a Sales Call
- Training and Development Director Journey
- Influence & Buy-in
- Negotiating the Best Solution
- Becoming an Effective Cross-functional Team Member
- Presenting Virtually
- Teamwork & Collaboration
- Building and Delivering a Great Virtual Presentation
- Establishing Team Goals and Responsibilities, and Using Feedback Effectively
- Effective Team Communication
- Leading in a Hybrid Workplace
- Leading Meetings & Presentation Skills
- Becoming a Successful Collaborator
- Preparing a Great Virtual Presentation
- Being an Effective Team Member
- Strategies for Building a Cohesive Team
- Getting Your Pitch Heard
- Planning an Effective Presentation
- Planning Meetings Fit for Purpose
- Running Meetings in Better Directions
- Ensuring Onboarding Success
- Talent Management & Onboarding
- Professional in Human Resources: Talent Planning
- Professional in Human Resources: Talent Sourcing
- Cultivating a Passion for Learning in Yourself and Others
- Training and Development
- Managing Your Company's Talent
- Managing Employee Development
- Positive Atmosphere: How Organizational Learning Drives Positive Change
- Building Career Development Programs and Succession Planning
- Final Exam: Software Product Management Proficiency
- Software Product Management Proficiency
- Software Product Management: Agile Fundamentals
- Software Product Management: Software Process Model Options
- Software Product Management: Building Support for Agile
- Software Product Management: Documenting Requirements
- Software Product Management: Gathering Requirements
- Software Product Management: Reflection & Improvement
- Software Product Management: Mapping & Planning
- Software Product Management: Estimating Techniques & Best Practices
- Software Product Management: Measuring Progress & Productivity
- Software Product Management: The Software Product Manager Role
- Software Product Management: The Product Management Team
- Software Product Management: Software Product Management Stages
- Software Product Management: Foundational Concepts
- Problem Solving: Generating Solutions
- Be Productive by Working Efficiently
- Final Exam: Penetration Tester
- Wi-Fi Penetration Testing
- Advanced Pen Testing Techniques
- Penetration Testing Fundamentals
- Pen Testing: End-user Behavior
- Security Measures: Implementing Security Controls
- Pen Testing Awareness: Results Management
- PenTesting for Physical Security
- Final Exam: Security Analyst
- Information Security: Subnetting & DNS for Security Architects
- Information Security: Continual Infrastructure Testing
- Information Security: Pen Testing
- Information Security: Honeypots
- Information Security: Securing Networking Protocols
- Information Security: Hardened Security Topologies
- Information Security: Security Governance
- Security Analyst
- Certified in Cybersecurity (CC): Data Security & System Hardening
- An Executive's Guide to Security: Understanding Security Threats
- Auditing & Incident Response
- Session & Risk Management
- Information Security: APT Defenses
- An Executive's Guide to Security: Protecting Your Information
- Information Security: NACs & Gateways
- Final Exam: Python Apprentice
- Final Exam: Python Novice
- Final Exam: Java Apprentice
- Final Exam: Java Novice
- Track 1: Java Novice
- Mapping Relationships in Java: Modeling Is-a Relationships Using Inheritance
- Mapping Relationships in Java: Overriding Methods and Using Access Modifiers
- Modeling Entities in Java: Methods, Method Overloading, & Constructors
- Mapping Relationships in Java: Constructors & Polymorphism
- Modeling Entities in Java: Static Members, Arguments, & Method Overriding
- Mapping Relationships in Java: Working with Interfaces & Class Loaders
- Interactive Java & JShell: Writing Java Programs with the Interactive JShell
- Getting Started with Java: Operators
- Modeling Entities in Java: Getting Started with Classes & Objects
- Getting Started with Java: Variables & Primitive Types
- Control Structures in Java: Implementing Java Control Structures
- Modeling Entities in Java: Defining Custom Classes & Objects
- Getting Started with Java: The Fundamentals of Java Programming
- Getting Started with Java: Writing & Running Java Programs
- Defensive Programmer: Cryptography
- Jay Davis's Transcript
- Jay Davis's Wallet
- About Accredible