Site Map - skillsoft.digitalbadges.skillsoft.com
- User Authentication
- Kapil Nema's Credentials
- Kapil Nema's Wallet
- Data Handling and Concurrency
- Cloud Security Fundamentals: Cloud Application Security
- Tips & Tricks for Developing Secure Mobile Apps
- Microsoft Azure Administrator: Azure App Service & Batch Jobs
- Adopting IT Automation
- Adopting DevOps: Principles & Practices
- The Language of DevOps: DevOps Principles & Practices
- Agile Organizations: Building an Agile Culture
- CAPM®: Agile Adaptive Project Management
- Defensive Java Fundamentals
- Development & Testing with Agile: Project Management
- Technical Product Management: Requirements Gathering & Documentation
- Kubernetes Manifests, Declaratives, & Imperatives
- Automation Design & Robotics
- Being an Effective Team Member
- Core DevOps Skills: Continuous Principles
- Agile Best Practices for Tech Leaders: Scrum Artifacts
- Best Practices for DevOps Implementation
- Systems Hardening
- DevOps for Engineering Leaders: Introduction to DevOps
- CISM 2022: Social Engineering & Malware
- Git & GitHub: Introduction
- Data Access & Governance Policies: Data Classification, Encryption, & Monitoring
- CCSP 2019: Identity & Access Management
- CCSP 2022: Cloud Security Concepts & Design Principles
- Leading Security Teams for GenAI Solutions: Use of Generative AI
- Responsible Use of AI
- Exploring Business Process Automation
- Hybrid Environment Pipelines: Hybrid Cloud Transformation
- Using Robots and RPA in the Workplace
- Code Quality, Testing, & Development
- Testing Methods
- Validate and Control Scope (PMBOK® Guide Sixth Edition)
- Effective Team Communication
- Software Design and Development: Design Patterns & SOLID Principles
- ChatGPT Prompt Engineering Examples & Use Cases
- Agile Project Planning
- Embracing Agile at Scale
- Exploring Project Management, Then and Now (2021 Update)
- CAPM®: Performance Measurement Metrics
- Information Security for Leaders: An Introduction to InfoSec
- Certified in Cybersecurity (CC): Security Governance, Policies, & Controls
- Certified in Cybersecurity (CC): Data Security & System Hardening
- Certified in Cybersecurity (CC): Security Best Practices & Security Awareness
- Software Design and Development: Methodologies
- Software Design and Development: Software Engineering & SDLC Phases
- Generative AI APIs for Practical Applications: An Introduction
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Secure Software Testing
- Pen Testing: End-user Behavior
- Defensive Coding for C/C++
- Defensive Coding Fundamentals for C/C++
- Secure Requirements
- Supply Chain & Software Acquisition
- Java Defensive Techniques
- Security Vulnerabilities & Enterprise Considerations
- Defining Cryptography
- Software Acceptance, Deployment, Operations, & Maintenance
- Thinking Defensively about Functions & Methods
- Managing Network Interaction
- Errors & Exceptions
- Defensive Programming Methods
- Defensive Programming Standards
- Cloud Security Fundamentals: Legal & Compliance
- Protecting Data in iOS Apps
- iOS Architecture & Data Protection
- Defensive Coding for JavaScript and HTML5
- Defensive Coding Fundamentals for JavaScript and HTML5
- Cloud Security Fundamentals: Architectural & Design Concepts
- Cloud Security Fundamentals: Cloud Data Security
- Cloud Security Fundamentals: Cloud Infrastructure Security
- ASP.NET MVC Web Applications: Implementing ASP.NET Authentication
- Securing .NET Programming
- Defensive Coding Fundamentals for C#
- Defensive Coding for C#
- Data Security and Access Control
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Secure Coding Practices
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Threat Modeling
- CCSP 2019: Application Development & Security
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Core Concepts
- CISSP: Risk Management
- A4 and A2: Broken Applications
- A10 and A9: API and Component Attacks
- A5 and A1: Security and Injection
- OWASP Overview
- A7 and A6: Leaky and Unprepared Applications
- A8 and A3: Cross-Site Attacks
- Artificial Intelligence and Machine Learning
- Kapil Nema's Transcript
- Kapil Nema's Wallet
- About Accredible