Site Map - skillsoft.digitalbadges.skillsoft.com
- User Authentication
- Lucky Hamor's Credentials
- Lucky Hamor's Wallet
- ChatGPT Prompt Engineering Examples & Use Cases
- Generative AI APIs for Practical Applications: An Introduction
- Artificial Intelligence and Machine Learning
- Design Patterns in JavaScript: Mediator, State, & Command Behavioral Patterns
- Design Patterns in JavaScript: Observer & Iterator Behavioral Patterns
- Design Patterns in JavaScript: Module, Revealing Module, Façade, Decorator, & Mixin Structural Patterns
- Agile & TDD Best Practices for APIs: Test-driven Development Strategy
- Developing the Product & Sprint Backlogs
- Design Patterns in JavaScript: Flyweight, Adapter, Composite, & Proxy Structural Patterns
- Transition to Scrum: Agile Foundation to Scrum
- Jenkins for DevOps: Jenkins Configuration for DevOps
- Using Docker for DevOps: Introduction to Docker
- Software Testing for DevOps: DevOps Test Tools
- The Language of DevOps: DevOps Tools & Processes
- Cloud Computing Fundamentals: Introduction
- Release & Sprint Planning
- Using Kanban in IT & Software Development
- Software Data Analysis: Project Management Metrics
- Design Patterns in JavaScript: Getting Started
- Design Patterns in JavaScript: Singleton, Prototype, & Builder Creational Patterns
- JavaScript: Form Validation & Async Programming
- Design Patterns in JavaScript: Constructor, Factory, & Abstract Factory Creational Patterns
- JavaScript: Working with the DOM & Events
- JavaScript: Closures & Prototypes
- JavaScript: Advanced Function Operations
- Web Fundamentals: Dynamic Web Pages with JavaScript
- JavaScript: Objects
- JavaScript: Functions & Arrays in JavaScript
- JavaScript: Types, Operators, & Control Structures in JavaScript
- JavaScript: Introduction
- JavaScript: Getting Started with JavaScript Programming
- Static, Dynamic, Black-box, & White-box Testing
- CCSP 2019: Application Development & Security
- CISSP: Risk Management
- OWASP Top 10: Securing Web Applications
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Secure Software Testing
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Secure Coding Practices
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Threat Modeling
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Secure Design Principles
- Application Security Awareness & Validation
- OWASP Top 10: A09:2021-Security Logging & Monitoring Failures
- OWASP Top 10: A08:2021-Software & Data Integrity Failures
- OWASP Top 10: A10:2021-Server-Side Request Forgery (SSRF)
- OWASP Top 10: A02:2021-Cryptographic Failures
- OWASP Top 10: A03:2021-Injection
- OWASP Top 10: A04:2021-Insecure Design
- OWASP Top 10: A05:2021-Security Misconfiguration
- OWASP Top 10: A06:2021-Vulnerable & Outdated Components
- OWASP Top 10: A07:2021-Identification & Authentication Failures
- OWASP Overview
- OWASP Top 10: A01:2021-Broken Access Control
- Components Supporting Organizational Security
- Security Assessment Using Software Tools
- Impacts from Vulnerability Types
- Cryptographic & Wireless Attacks
- Types of Malware
- The Present Threat Landscape
- Application & Service Attacks
- Social Engineering & Related Attacks
- Penetration Testing & Vulnerability Scanning
- Lucky Hamor's Transcript
- Lucky Hamor's Wallet
- About Accredible