Site Map - skillsoft.digitalbadges.skillsoft.com
- User Authentication
- Jyoti Sahu's Credentials
- Jyoti Sahu's Wallet
- Artificial Intelligence and Machine Learning
- Generative AI APIs for Practical Applications: An Introduction
- Leadercamp on-demand: Exploring Generative AI and ChatGPT
- Generative AI and Its Impact to Everyday Business
- Harnessing the Disruption of Generative AI
- OWASP Top 10: Securing Web Applications
- AWS Cloud Practitioner 2022: Technical Essentials Part 1
- AWS Cloud Practitioner 2022: Technical Essentials Part 2
- AWS Cloud Practitioner 2022: Cloud & the Value Proposition
- AWS Cloud Practitioner 2022: Cloud Economics
- AWS Cloud Practitioner 2022: Cloud Architecture Design Principles
- AWS Cloud Practitioner 2022: Cloud Security & Compliance
- AWS Cloud Practitioner 2022: Cloud Deployment & Operation
- AWS Cloud Practitioner 2022: Access Management
- AWS Cloud Practitioner 2022: Core AWS Services
- AWS Cloud Practitioner 2022: Technology Support Resources
- AWS Associate Solutions Architect 2020: AWS Developer Options
- AWS Associate Solutions Architect 2020: Monitoring
- AWS Associate Solutions Architect 2020: Management & Migration
- AWS Associate Solutions Architect 2020: Storage Solutions
- AWS Cloud Practitioner 2019: AWS Cloud & the Value Proposition
- AWS SysOps Associate 2021: Storage Management
- AWS Solutions Architect Associate 2022: Architecture & Tools
- AWS Solutions Architect Associate 2022: Data Storage Services
- AWS Solutions Architect Associate 2022: Managing S3 Buckets
- AWS Solutions Architect Associate 2022: Identity & Access Management
- Software Design and Development: Methodologies
- Software Design and Development: Software Engineering & SDLC Phases
- Automated Software Testing
- CompTIA Cloud+: Cloud Security Controls
- SOLID & GRASP
- Need for Design Patterns & the Principles Guiding Design Patterns
- OWASP Top 10: A1 - Injection
- OWASP Top 10: A6 - Security Misconfiguration
- OWASP Top 10: A9 - Using Components with Known Vulnerabilities
- Agile & TDD Best Practices for APIs: Test-driven Development Strategy
- Cloud Security Fundamentals: Cloud Application Security
- Agile Test-Driven Development
- A8 and A3: Cross-Site Attacks
- A5 and A1: Security and Injection
- OWASP: Top 10 Items A3, A2, & A1
- OWASP: Top 10 Item A10
- OWASP: Top 10 Items A6, A5, & A4
- Top 10 List Items
- Jyoti Sahu's Transcript
- Jyoti Sahu's Wallet
- About Accredible