Site Map - skillsoft.digitalbadges.skillsoft.com
- User Authentication
- Madhushri Balekoppa Ramesh's Credentials
- Madhushri Balekoppa Ramesh's Wallet
- Git & GitHub: Introduction
- Exploring Business Process Automation
- Data Access & Governance Policies: Data Classification, Encryption, & Monitoring
- CCSP 2019: Identity & Access Management
- CCSP 2022: Cloud Security Concepts & Design Principles
- Leading Security Teams for GenAI Solutions: Use of Generative AI
- Responsible Use of AI
- Using Robots and RPA in the Workplace
- Software Design and Development: Design Patterns & SOLID Principles
- Testing Methods
- Hybrid Environment Pipelines: Hybrid Cloud Transformation
- Code Quality, Testing, & Development
- Exploring Project Management, Then and Now (2021 Update)
- Validate and Control Scope (PMBOK® Guide Sixth Edition)
- Effective Team Communication
- CAPM®: Performance Measurement Metrics
- Embracing Agile at Scale
- Agile Project Planning
- Microsoft Azure Fundamentals: Networking
- Microsoft Azure Fundamentals: Subscriptions & ARM Templates
- Microsoft Azure Fundamentals: Managing Azure Services
- Microsoft Azure Fundamentals: Cloud Computing
- Need for Design Patterns & the Principles Guiding Design Patterns
- Application Security Awareness & Validation
- API Security
- Secure Application Architecture & IAM
- SOLID & GRASP
- Agile Test-Driven Development
- Automated Software Testing
- Cloud Security Fundamentals: Cloud Application Security
- Back-end Apps: : Java Persistence
- JDBC: An Introduction to Java Database Connectivity
- Java SE 11 Programmer II: Generics & Collections in Java
- Java Building Blocks
- Working with Inheritance
- Java SE11 Programmer II: Arrays & Program Flow Control
- Java Programming: Working with Strings & Wrapper Objects
- OWASP: Web Application Security
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Core Concepts
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Secure Coding Practices
- A5 and A1: Security and Injection
- A10 and A9: API and Component Attacks
- A7 and A6: Leaky and Unprepared Applications
- A4 and A2: Broken Applications
- Version & Source Control: Working With Source Control Tools
- Introduction to Git
- A8 and A3: Cross-Site Attacks
- Secure Design
- CISSP: Risk Management
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Threat Modeling
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Secure Design Principles
- Top 10 List Items
- OWASP Overview
- Agile and DevOps: Adopting Agile Methodology
- Madhushri Balekoppa Ramesh's Transcript
- Madhushri Balekoppa Ramesh's Wallet
- About Accredible