Site Map - skillsoft.digitalbadges.skillsoft.com
- User Authentication
- Jeremy Lamb's Credentials
- Jeremy Lamb's Wallet
- Zscaler Academy Registration
- Get registered for the Zscaler Academy here!
- CompTIA PenTest+: Scoping & Engagement
- Artificial Intelligence: Human-computer Interaction Overview
- Artificial Intelligence: Types of Artificial Intelligence
- Artificial Intelligence: Basic AI Theory
- Generative AI and Its Impact to Everyday Business
- Harnessing the Disruption of Generative AI
- Leading in the Age of Generative AI
- Encouraging Innovation and Experimentation with AI
- Leading through the AI Disruption with Empathy
- Leveraging AI as a Team Member
- Fostering a Growth Mindset in the Age of AI
- Leveraging Analytical and Critical Thinking to Implement AI
- Embracing Risk and Learning from Setbacks with AI Projects
- (EN-US) 2024 Customer-Facing AI Messaging for Sales, Professional Services and Operations
- Lexmark AI Foundations
- Patterns in Programming: API Design Patterns
- SST 9/8 Series A3 (2024)
- CompTIA Security+: Monitoring, Visibility, & Reporting
- CompTIA Security+: Risk Management, Privacy, & Sensitive Data Security
- CompTIA IT Fundamentals: Basic IT Concepts
- CompTIA IT Fundamentals: Data, CPUs, & Troubleshooting
- CompTIA IT Fundamentals: Internet, Storage, & Computer Systems
- CompTIA IT Fundamentals: Computer Devices & Components
- CompTIA IT Fundamentals: Operating Systems
- CompTIA IT Fundamentals: Networking & Wireless Technologies
- CompTIA IT Fundamentals: Software Concepts
- CompTIA IT Fundamentals: Software Development Concepts
- CompTIA IT Fundamentals: Database Concepts
- CompTIA IT Fundamentals: CIA Triad
- CompTIA IT Fundamentals: Authentication & Disaster Recovery
- CompTIA IT Fundamentals: Privacy & Encryption
- CompTIA Security+: Threat Actors & Vectors
- CompTIA Security+: Wireless, Mobile, & Embedded Device Security
- CompTIA Security+: Organizational Security Assessment Tools & Mitigation Controls
- CompTIA Security+: Incident Response, Digital Forensics, & Supporting Investigations
- CompTIA Security+: Implementing Secure Network Designs
- CompTIA Security+: Security Policies, Regulations, Standards, & Frameworks
- CompTIA Security+: Implementing Secure Protocols & Application Security Solutions
- CompTIA Security+: Security Goals & Controls
- CompTIA Security+: Fundamental Security Concepts
- CompTIA Security+: Practical Cryptography
- CompTIA Security+: Basic Cryptography & Public Key Infrastructure
- CompTIA Security+: Physical Security Controls
- CompTIA Security+: Authentication & Authorization Design Concepts
- CompTIA Security+: Implementing Identity and Account Management & AAA Solutions
- CompTIA Security+: Virtualization, Cloud Computing, & Cloud Cybersecurity Solutions
- CompTIA Security+: Controls & Application Development, Deployment, & Automation
- CompTIA Security+: Security Concepts in an Enterprise Environment
- CompTIA Security+: Implementing Cybersecurity Resilience
- CompTIA Security+: Security Assessment & Penetration Testing Techniques
- CompTIA Security+: Threat Actors, Intelligence Sources, & Vulnerabilities
- Track 1: Building Web Applications with Angular 11
- Enriched Web Development with Angular 11
- CompTIA Security+: Analyzing Application & Network Attacks
- CompTIA Security+: Social Engineering Techniques & Other Attack Types
- Final Exam: Building Web Applications with Angular 11
- Angular 11: Working With Forms
- Angular 11: Navigation & Routing in Angular
- Angular 11: Services & Dependency Injection
- Angular 11: Security & Deployment in Angular
- Angular 11: New Features of Angular 11 & Angular 12
- Angular 11: Directives & Pipes
- Angular 11: Reactive Programming With RxJS & Observables
- Angular 11: Working With Nested Components
- Angular 11: Getting Started with Angular
- Angular 11: Working With Angular Modules
- Angular 11: Introduction to Components
- Fundamentals of C++: Getting Started
- Functions in Python: Introduction
- Conditional Statements & Loops: While Loops in Python
- Conditional Statements & Loops: Advanced Operations Using for Loops in Python
- Conditional Statements & Loops: If-else Control Structures in Python
- Conditional Statements & Loops: The Basics of for Loops in Python
- Complex Data Types in Python: Working with Dictionaries & Sets in Python
- Complex Data Types in Python: Working with Lists & Tuples in Python
- Complex Data Types in Python: Shallow & Deep Copies in Python
- Getting Started with Python: Introduction
- Track 1: Unit Testing
- Final Exam: Unit Testing
- Unit Testing: Parameterized JUnit Tests
- Unit Testing: Executing JUnit Tests
- Unit Testing with Mocks: Creating Mocks & Verifying Behavior
- Unit Testing with Mocks: Getting Started with Mockito
- Unit Testing with Mocks: Mocking Exceptions & Using Spies
- Unit Testing: An Introduction to the JUnit Framework
- Unit Testing: Assertions & Assumptions in JUnit
- Unit Testing: Advanced Annotations in JUnit
- Java Novice to Javanista
- Track 3: Javanista
- Java Web Services: Building REST APIs
- Java Web Services: Enabling CRUD Operations with REST APIs
- Java Web Services: Integrating Web Services with a Database
- Final Exam: Javanista
- Serialization in Java: Getting Started with Object Serialization
- Serialization in Java: Using JSON Simple for Serialization & Parsing
- Serialization in Java: Using JSON in Java for Serialization & Parsing
- HTTP Requests in Java: Sending Simple HTTP Requests
- Java Database Connectivity (JDBC): Joining & Filtering Data with RowSets
- Java Database Connectivity (JDBC): An Introduction to JDBC
- HTTP Requests in Java: HTTP Requests with Java's HttpClient
- Java Database Connectivity (JDBC): Batch Executions & Transactions with JDBC
- Java Database Connectivity (JDBC): Interacting with Databases using RowSets
- Building Web Applications with JSP: Integrating a JSP App with a Database
- Java Web Services: Getting Started with SOAP-based Web Services
- Building Web Applications with JSP: Customizing Responses with Servlets
- Building Web Applications with JSP: An Introduction to JSP
- Building Web Applications with JSP: Handling Errors
- Classes in Java: Implementing Functional Interfaces Using Lambdas
- Track 2: Java Apprentice
- Java: Getting Started with Reflection
- Java: Accessing Constructors, Methods, & Fields Using Reflection
- Java: Working with Annotations, Generics, & Arrays Using Reflection
- Java: Leveraging Reflection to Build Dynamic Proxies & Unit Tests
- Java Archive (JAR): Building Java Archives
- Java Archive (JAR): Packaging Java Apps Using Maven
- Final Exam: Java Apprentice
- Classes in Java: Creating & Using Anonymous Classes
- Generics in Java: Creating Classes and Methods Using Generics
- Collections in Java: Lists & List Operations
- Collections in Java: Sets & Maps
- Classes in Java: Working with Static Nested, Inner, & Local Classes
- Collections in Java: Arrays & Non-parameterized ArrayLists
- Track 1: Java Novice
- Generics in Java: Bounded Type Parameters & Wildcards
- Modeling Entities in Java: Static Members, Arguments, & Method Overriding
- Mapping Relationships in Java: Modeling Is-a Relationships Using Inheritance
- Mapping Relationships in Java: Constructors & Polymorphism
- Mapping Relationships in Java: Working with Interfaces & Class Loaders
- Handling Errors: An Introduction to Exceptions
- Handling Errors: Handling Exceptions in Java
- Handling Errors: Advanced Topics in Exceptions
- Interactive Java & JShell: Writing Java Programs with the Interactive JShell
- Mapping Relationships in Java: Overriding Methods and Using Access Modifiers
- Final Exam: Java Novice
- Modeling Entities in Java: Getting Started with Classes & Objects
- Control Structures in Java: Implementing Java Control Structures
- Modeling Entities in Java: Defining Custom Classes & Objects
- Getting Started with Java: Writing & Running Java Programs
- Getting Started with Java: Variables & Primitive Types
- Getting Started with Java: Operators
- Information Security: APT Defenses
- Information Security: Subnetting & DNS for Security Architects
- Information Security: NACs & Gateways
- Information Security: Continual Infrastructure Testing
- Information Security: Securing Networking Protocols
- Information Security: Hardened Security Topologies
- Modeling Entities in Java: Methods, Method Overloading, & Constructors
- Getting Started with Java: The Fundamentals of Java Programming
- Track 1: Python for Developers
- Final Exam: Python for Developers
- An Executive's Guide to Security: Understanding Security Threats
- Auditing & Incident Response
- Session & Risk Management
- An Executive's Guide to Security: Protecting Your Information
- Python Development: Creating Classes, Handling Errors, & Importing Modules
- Python Development: Leveraging Functions with Lambdas, Generators, Closures, & Decorators
- Python Development: Working with If Statements, Loops, & Comprehensions
- Python Development: Performing Operations with Complex Data Types
- Python Development: Defining, Configuring, & Invoking Functions
- Python Development: Getting Started with Programming in Python
- Exploring CI: Continuous Integration & CI Tools
- Working with Git
- Testing Methods
- Defensive Programmer: Defensive Concepts
- CEH v11: Vulnerability Assessment, Management & Classification
- Source Coding Best Practices
- Agile Fundamentals: User Stories and the Iteration and Release Plan
- Agile Fundamentals: Stakeholders, Success Criteria, Users, and the Agile Team
- Building a Performance Engineering Culture: \nExploring Performance Engineering
- Restricting Output
- Working with Substitution
- SELECT Statement, Expressions, & Operators
- SQL*Plus Commands
- SQL Developer
- Relational Database Concepts
- Introduction to Networking
- Networking Standards and Connections
- Grit
- Building Customer Relationships in a Virtual Environment
- Windows Server 2022: Active Directory Basics
- Aliases, Providers, & Objects
- Syntax, Help, & Conditionals
- Java Certified Foundations Associate: Math & Random Classes
- Java Certified Foundations Associate: Classes & Constructors
- Java Certified Foundations Associate: Data Types
- Java Certified Foundations Associate: Decision Statements
- Java Certified Foundations Associate: Java Arrays & ArrayLists
- Java Certified Foundations Associate: Looping Statements
- Java Certified Foundations Associate: Java Debugging & Exceptions
- Java Certified Foundations Associate: Java Methods
- Java Certified Foundations Associate: Design Patterns
- Java Certified Foundations Associate: Development Basics
- Java Certified Foundations Associate: Java Operators
- Java Certified Foundations Associate: Java Strings
- Java Certified Foundations Associate: Object-oriented Programming
- Java Certified Foundations Associate: Coding Best Practices
- Java Certified Foundations Associate: Basic Elements
- Java Certified Foundations Associate: Development Environment
- Java Certified Foundations Associate: Java Concepts & Features
- Introduction to PowerShell 5.0
- Cmdlet Structure & Help
- Software Design and Development: Software Engineering & SDLC Phases
- Lexmark Workplace Culture & Community
- Workplace Diversity, Equity, and Inclusion in Action
- Using Docker for DevOps: Introduction to Docker
- Communication and Web Protocols
- CompTIA A+ 220-1002: MS Operating System Administrative Tools
- Emotionally Intelligent Leadership
- Leadership Insights on Emotional Intelligence
- Becoming an Emotionally Intelligent Leader
- Business Reporting: Getting Started with Power BI Desktop for Data Analysis
- Jeremy Lamb's Transcript
- Jeremy Lamb's Wallet
- About Accredible