Site Map - skillsoft.digitalbadges.skillsoft.com
- User Authentication
- Maheswaran Krishnasamy's Credentials
- Maheswaran Krishnasamy's Wallet
- Deep Learning for NLP: Transfer Learning
- Predictive Analytics: Identifying Network Attacks
- Machine Learning with BigQuery ML: Building Regression Models
- An Introduction to Generative AI Concepts
- Six Sigma Black Belt: Voice of the Customer (VOC)
- Six Sigma Black Belt: Ensuring Accuracy with Measurement and Metrology
- Six Sigma Black Belt: Assessing and Modeling Variable Interactions
- Six Sigma Black Belt: Risk Analysis and Management
- Six Sigma Black Belt: Hypothesis Testing
- Six Sigma Black Belt: Understanding Design of Experiments (DOE)
- Deep Learning for NLP: Neural Network Architectures
- Text Mining and Analytics: Machine Learning for Natural Language Processing
- MLOps with Data Version Control: Working with Pipelines & DVCLive
- CompTIA Data+: Data Acquisition & Cleansing
- CompTIA Data+: Data Analytics Tools
- CompTIA Data+: Data Visualization Reports
- CompTIA IT Fundamentals: Operating Systems
- Embracing Agile at Scale
- CGI Annual Tour F2025
- Pen Testing for Software Development: The Penetration Testing Process
- The Service Value Chain and General Management Practices
- Ethical Hacker: Password Attacks Part 2
- Ethical Hacker: Footprinting
- Ethical Hacker: Host Discovery & Scanning with Nmap
- Ethical Hacker: Evading IDS, Firewall, & Honeypots Part 2
- Ethical Hacker: Social Engineering
- Ethical Hacker: Denial of Service
- Ethical Hacker: Evading IDS, Firewall, & Honeypots
- Ethical Hacker: IoT Attacks
- Ethical Hacker: Privilege Escalation
- Ethical Hacker: Security Controls
- Ethical Hacker: Cryptography Concepts
- Ethical Hacker: Cryptography Concepts Part 2
- Ethical Hacker: Cryptography Concepts Part 3
- Ethical Hacker: Practical Web App Hacking
- CISM 2022: Information Security Governance
- CISM 2022: Secure Device & OS Management
- Viewing & printing worksheets in Excel 365 (2023)
- Working with text in Word 365 (2024)
- DCCOR: MP-BGP, PIM, FHRPs, & RSTP+
- Design Thinking for Innovation: Stakeholder Engagement
- Perspectives for Effective Business Analysis
- TSHOOT 2.0: Troubleshooting & Manipulating Output
- Database Instance Performance
- Implementing BI Infrastructure
- Designing BI Infrastructure
- Extract, Transform, & Load
- BI Reporting Strategies
- Introduction to Automation
- Generative AI and Its Impact to Everyday Business
- Establishing AI Guardrails and Governance
- CGI Annual Tour F2024: Asia Pacific Global Delivery Centers of Excellence (retired October 2023)
- Maheswaran Krishnasamy's Transcript
- Maheswaran Krishnasamy's Wallet
- About Accredible