Site Map - skillsoft.digitalbadges.skillsoft.com
- User Authentication
- Jelda Aldava's Credentials
- Jelda Aldava's Wallet
- CCSP 2022: Cloud Security Concepts & Design Principles
- Data Access & Governance Policies: Data Classification, Encryption, & Monitoring
- CCSP 2019: Identity & Access Management
- Leading Security Teams for GenAI Solutions: Use of Generative AI
- Responsible Use of AI
- Git & GitHub: Introduction
- DevOps for Engineering Leaders: Introduction to DevOps
- Exploring Business Process Automation
- Automation Design & Robotics
- CompTIA Cloud Essentials+: Essential Cloud Principles
- Testing Methods
- Effective Team Communication
- Code Quality, Testing, & Development
- Software Design and Development: Design Patterns & SOLID Principles
- Identifying Risk (PMBOK® Guide Sixth Edition)
- PRINCE2® Project Management Overview (2017 Update)
- Being an Effective Team Member
- Artificial Intelligence and Machine Learning
- ChatGPT Prompt Engineering Examples & Use Cases
- Generative AI APIs for Practical Applications: An Introduction
- Microsoft Azure Fundamentals: App Services
- Microsoft Azure Fundamentals: Software Development Services
- Microsoft Azure Fundamentals: Managing Azure Authentication
- Microsoft Azure Fundamentals: Service Resilience
- Microsoft Azure Fundamentals: Monitoring Azure Services
- Microsoft Azure Fundamentals: Network Security
- Microsoft Azure Fundamentals: Migrating to Azure
- Microsoft Azure Fundamentals: Container Solutions
- Microsoft Azure Fundamentals: Virtual Machines
- Microsoft Azure Fundamentals: Azure RBAC & Azure Policy
- Microsoft Azure Fundamentals: Managing Azure Costs
- Microsoft Azure Fundamentals: Managing Azure AD
- Microsoft Azure Fundamentals: VNet Peering & VPNs
- Microsoft Azure Fundamentals: Network Infrastructure
- Microsoft Azure Fundamentals: Azure Files
- Microsoft Azure Fundamentals: Managing the Hierarchy
- Microsoft Azure Fundamentals: Managing Storage
- Microsoft Azure Fundamentals: Azure Cloud Computing
- Microsoft Azure Fundamentals: Management Tools
- CompTIA Security+: Monitoring, Visibility, & Reporting
- CompTIA Security+: Wireless, Mobile, & Embedded Device Security
- CompTIA Security+: Risk Management, Privacy, & Sensitive Data Security
- CompTIA Security+: Basic Cryptography & Public Key Infrastructure
- CompTIA Security+: Authentication & Authorization Design Concepts
- CompTIA Security+: Implementing Identity and Account Management & AAA Solutions
- CompTIA Security+: Organizational Security Assessment Tools & Mitigation Controls
- CompTIA Security+: Physical Security Controls
- CompTIA Security+: Incident Response, Digital Forensics, & Supporting Investigations
- CompTIA Security+: Security Policies, Regulations, Standards, & Frameworks
- CompTIA Security+: Implementing Secure Protocols & Application Security Solutions
- CompTIA Security+: Security Concepts in an Enterprise Environment
- CompTIA Security+: Implementing Cybersecurity Resilience
- CompTIA Security+: Virtualization, Cloud Computing, & Cloud Cybersecurity Solutions
- CompTIA Security+: Implementing Secure Network Designs
- CompTIA Security+: Controls & Application Development, Deployment, & Automation
- CompTIA Security+: Analyzing Application & Network Attacks
- CompTIA Security+: Social Engineering Techniques & Other Attack Types
- CompTIA Security+: Threat Actors, Intelligence Sources, & Vulnerabilities
- CompTIA Security+: Security Assessment & Penetration Testing Techniques
- Jelda Aldava's Transcript
- Jelda Aldava's Wallet
- About Accredible