Site Map - skillsoft.digitalbadges.skillsoft.com
- User Authentication
- Lalithambigai Jawahar's Credentials
- Lalithambigai Jawahar's Wallet
- Artificial Intelligence and Machine Learning
- Data Access & Governance Policies: Data Classification, Encryption, & Monitoring
- AWS Solutions Architect Associate 2022: Directory Services Authentication
- CCSP 2022: Cloud Security Concepts & Design Principles
- AWS Developer Associate 2022: Storage Services
- Responsible Use of AI
- Leading Security Teams for GenAI Solutions: Use of Generative AI
- Exploring Business Process Automation
- Hybrid Environment Pipelines: Hybrid Cloud Transformation
- Using Robots and RPA in the Workplace
- Software Design and Development: Design Patterns & SOLID Principles
- CAPM®: Performance Measurement Metrics
- Exploring Project Management, Then and Now (2021 Update)
- Validate and Control Scope (PMBOK® Guide Sixth Edition)
- Effective Team Communication
- CompTIA Security+: Security Concepts in an Enterprise Environment
- Advanced Agile: Leadership Techniques
- Ruby Full Stack Development: Threads & Security
- Application Development with Node.js: Microservices Frameworks, & Utilities
- Microsoft Security: Compliance, Information Protection, & Governance
- CCSP 2022: Planning & Implementing Security Controls
- CompTIA Security+: Enterprise Infrastructure Security Principles
- CompTIA Security+: Enterprise Security Capabilities
- CSSLP 2024: Security in Memory Management, the Build Process, and APIs
- CISSP 2021: Identity and Access Management Principles
- Microsoft Azure Security Technologies: Review Course 2
- Microsoft Azure Security Technologies: Working with Azure Applications
- CompTIA Security+: Identity and Access Management
- AWS Associate Solutions Architect 2020: Network Security & Name Resolution
- Advanced Database Security Development
- CISM 2020: Network Infrastructure Security
- AWS Associate Solutions Architect 2020: Network Options
- AWS Cloud Practitioner 2019: Security Support Resources
- End-User Security: The Security Administrator Perspective
- Information Security: Securing Networking Protocols
- OWASP: Top 10 & Web Applications
- Security Measures: Implementing Security Controls
- Cryptographic Client-based Systems
- Defensible Security
- Application Security in .NET
- Systems & Application Security
- OWASP Top 10: Securing Web Applications
- AWS Solutions Architect Associate 2022: Network Security Services
- AWS Developer Associate 2022: Network Security
- CISM 2022: Network Security
- CISM 2022: Common Network Security Attacks
- CRISC 2023: Network Security
- CompTIA Security+: Computing Resources Security Techniques
- Understanding End-User Security
- API Development: Web API Technologies
- API Design: API Development
- API Development: Cloud API Management
- OWASP: Web Application Security
- Microsoft Azure Security Technologies: Review Course 1
- Application Development with Node.js: Real-time Applications
- SSCP 2021: Identity Management & Access Control Models
- CCSP 2022: Identity & Access Management Solutions
- CISM 2020: Identity & Access Management
- Application Development with Node.js: Security & Middleware Implementation
- AWS Cloud Practitioner 2020: Security Support Resources
- Leadercamp on-demand: Leading with Generative AI
- CCSP 2019: Application Development & Security
- CCSP 2019: Identity & Access Management
- API Security
- Jenkins for DevOps: Jenkins Configuration for DevOps
- Software Testing for DevOps: DevOps Test Tools
- Cloud Security Fundamentals: Cloud Application Security
- Top 10 List Items
- Cloud Computing Fundamentals: Introduction
- Agile & TDD Best Practices for APIs: Test-driven Development Strategy
- SOLID & GRASP
- Transition to Scrum: Agile Foundation to Scrum
- The Language of DevOps: DevOps Tools & Processes
- Release & Sprint Planning
- Software Data Analysis: Project Management Metrics
- Using Kanban in IT & Software Development
- Agile Best Practices for Tech Leaders: Scrum Artifacts
- Lalithambigai Jawahar's Transcript
- Lalithambigai Jawahar's Wallet
- About Accredible