Site Map - skillsoft.digitalbadges.skillsoft.com
- User Authentication
- Manmeet Singh Kochhar's Credentials
- Manmeet Singh Kochhar's Wallet
- Exploring Project Management, Then and Now (2021 Update)
- Azure AI Fundamentals: Introduction to Azure Machine Learning Studio
- ChatGPT Prompt Engineering Examples & Use Cases
- Azure AI Fundamentals: Introduction to Azure AI Vision
- Azure AI Fundamentals: Getting Started with Azure AI Vision
- Azure AI Fundamentals: Working with AI Vision
- Azure AI Fundamentals: Azure Document & Optical Character Recognition
- Azure AI Fundamentals: Creating a Conversational AI Bot
- Azure AI Fundamentals: Evaluating Models in Azure AI
- Azure AI Fundamentals: Working with Azure Machine Learning Studio
- Azure AI Fundamentals: Using Azure Machine Learning Designer
- Azure AI Fundamentals: Azure Natural Language Processing
- Azure AI Fundamentals: Azure Data Explorer
- Embracing Agile at Scale
- PRINCE2® Project Management Overview (2017 Update)
- Agile Project Planning
- Effective Team Communication
- Identifying Risk (PMBOK® Guide Sixth Edition)
- Azure AI Fundamentals: Machine Learning with Azure AI
- Azure AI Fundamentals: Artificial Intelligence Principles
- Azure AI Fundamentals: Artificial Intelligence Concepts
- Azure AI Fundamentals: Azure Machine Learning Fundamentals
- Being an Effective Team Member
- CompTIA A+ Core 2: Information Management & Change Management Processes
- Business Analysis Activities and Tools
- Business Analysis Overview
- Software Design and Development: Methodologies
- MS Azure DevOps Solutions: Manage Code Quality & Security Policies
- Testing Methods
- Navigating Software Testing Tools: Types of Software Testing Tools
- MS Azure DevOps Solutions: Design a Quality Strategy & Secure Development Process
- Secure Programmer: Software Testing
- Selenium Deep Dive: Setting Up Selenium for Automated Testing
- Managing a Project to Minimize Risk and Maximize Quality
- Software Quality Assurance
- Testing AngularJS
- Business Analysis for Project Management: Practices for Later Project Stages
- Software Development Concepts: Software Development Glossary
- CompTIA Data+: Data Quality & Master Data Management
- CISA 2022: Auditing, Data Analysis, & Controls
- CISA 2022: IT Resources & Monitoring
- Track 1: Cybersecurity Standards, Regulations, and Frameworks
- Identity Management, Directory Services, and Federation
- Security Architecture
- Securing Information using Cryptography
- Network Hardening, Network Segmentation, and Secure Connections
- Cybersecurity Awareness and Threat Vectors
- Systems Hardening
- Network Discovery Tools and Techniques
- Public Key Infrastructure and Certificate Distribution
- Vulnerabilities, Systems Scanning and Exploitation
- Malware Analysis
- Partner Product Certification
- Software Design and Development: Software Engineering & SDLC Phases
- Cybersecurity and Networking Fundamentals
- Discovery and Attack Vectors
- Certified in Cybersecurity (CC): Incident Response
- Certified in Cybersecurity (CC): Business Continuity Planning
- Certified in Cybersecurity (CC): Logical Access Controls
- Certified in Cybersecurity (CC): Security Governance, Policies, & Controls
- Certified in Cybersecurity (CC): Core Security Principles & Risk Management
- Certified in Cybersecurity (CC): Physical Access Controls
- Certified in Cybersecurity (CC): Networking & Security Infrastructure
- Certified in Cybersecurity (CC): Present Threats & Network Security Controls
- Certified in Cybersecurity (CC): Data Security & System Hardening
- Certified in Cybersecurity (CC): Security Best Practices & Security Awareness
- Introduction to AI-powered Image Generation
- Generative AI for Product Managers
- Generative AI Foundations: Ethical & Responsible Use of AI in IT
- AI in IT Automation: Integrating AI Automation in IT Operations
- Image Generation Frameworks
- AI in IT Automation: Developing AI-powered IT Solutions
- Mathematical Foundations of Image Generation
- Generative AI Models: Generating Data Using Variational Autoencoders
- Generative AI Models: Generating Data Using Generative Adversarial Networks
- Generative AI Models: Getting Started with Autoencoders
- Using OpenAI APIs: Using Image & Audio APIs
- Using OpenAI APIs: Fine-tuning Models, the Assistants API, & Embeddings
- Generative AI on AWS: Building GenAI Models with Amazon SageMaker
- Generative AI on AWS: Building GenAI Models with Amazon Bedrock
- Generative AI on AWS: Generating Code with Amazon CodeWhisperer
- Generative AI on AWS: Generating Speech with Amazon Polly
- Generative AI for Project Managers
- Generative AI on AWS: Creating Intelligent Chatbots
- Generative AI on AWS: Deploying & Managing GenAI Services on AWS
- Generative AI Foundations: IT Integration with Generative AI
- Generative AI Foundations: Advanced Generative AI Techniques for IT
- Leveraging Prompts for Python Classes, Scripts, & Data Analysis
- Prompt Engineering to Learn Python Loops & Functions
- Using Generative AI Tools to Learn Python
- Enterprise Security: Artificial Intelligence, Generative AI, & Cybersecurity
- Prompt Engineering for Data: Combining & Visualizing Data Using Generative AI
- Prompt Engineering for Data: Leveraging Prompts for Filtering & Grouping Data
- Enterprise Security: Leveraging Generative AI with Common Security Tools
- Querying SQL Databases: Using Generative AI Tools to Filter & Group Data
- Querying SQL Databases: Prompt Engineering to Work with Advanced SQL Operations
- Querying SQL Databases: Learning SQL Using Prompt Engineering
- Enterprise Security: Leveraging AI in Identity Security
- Prompt Engineering to Build a Django App
- Creating Django Views & Models
- Generative AI on GCP: Empowering Machine Language Workflows with Vertex AI
- Enterprise Security: Leveraging AI to Enhance Email Security
- Generative AI on AWS: Getting Started
- Generative AI on GCP: Harnessing Generative AI with Vertex AI
- Enterprise Security: AI in Authentication & Detection of Security Threats
- Generative AI on GCP: Deep Dive Into Generative AI Studio
- Enterprise Security: Using AI for Intrusion Detection & Prevention
- Enterprise Security: Leveraging AI to Protect & Validate User Data
- Generative AI on GCP: Building Generative AI-powered Apps in GCP
- Prompt Engineering: Generative AI for Scanning & Enumeration
- Prompt Engineering: Generative AI for System Hacking
- Prompt Engineering: Generative AI for Malware & Social Engineering
- An Introduction to Generative AI Concepts
- Exploring Prompt Engineering Techniques
- Case Studies in Prompt Engineering
- Getting Started with Large Language Models (LLMs)
- Generative Modeling Foundations
- Exploring the Depths of Large Language Models in Generative AI
- Leveraging Generative AI for Business
- Prompt Engineering: Web Application & Database Hacking in the Age of GenAI
- Prompt Engineering: GenAI’s Impact on Network & Perimeter Ethical Hacking
- Prompt Engineering: Cloud Computing & IoT Hacking in the Era of GenAI
- Prompt Engineering: Mobile Platform Security in the GenAI Era
- Prompt Engineering: Covering Tracks with GenAI
- Deep Dive Into Generative AI with Azure OpenAI
- Generative AI & the Azure Bot AI Service
- Prompt Engineering: Ethical Hacking & Generative AI Fusion
- Prompt Engineering: Generative AI for Reconnaissance
- Google Generative AI APIs: Advanced Features of Bard & PaLM
- Getting Started with Prompt Engineering
- Exploring the OpenAI Playground
- Introduction to Generative AI on Azure
- Prompt Engineering for Git: Leveraging Prompt Engineering to Learn Git
- Prompt Engineering for Git: Using Prompt Engineering to Work with Git Branches
- Generative AI with Azure OpenAI
- Prompt Engineering for Git: Working with Remote Repositories & Generative AI
- Prompt Engineering for Data: Leveraging Prompts When Working with Data
- Prompt Engineering for Data: Basic Data Manipulation Using Generative AI
- Google Generative AI APIs: Bard & the PaLM API Fundamentals
- Leading Security Teams for GenAI Solutions: Enhancing Security Posture
- Learning Django Using Generative AI Help
- Generative AI on GCP: An Introduction
- Leading Security Teams for GenAI Solutions: Protecting Intellectual Property
- Leading Security Teams for GenAI Solutions: Use of Generative AI
- Using OpenAI APIs: Exploring APIs with the OpenAI Playground
- Using OpenAI APIs: Accessing OpenAI APIs from Python
- Leading Security Teams for GenAI Solutions: Security Implications
- Running Statistical Tests Using Generative AI Tools
- Computing Descriptive Statistics Using Prompt Engineering
- Leading Security Teams for GenAI Solutions: Generative AI Governance
- Prompt Engineering for Machine Learning
- Prompt Engineering for Hypothesis Testing
- Generative AI APIs for Practical Applications: An Introduction
- Google Generative AI APIs: Introduction to Google Bard
- Google Generative AI APIs: Bard Fundamentals
- An Introduction to Generative AI
- Backup & Recovery: Enterprise Backup Strategies
- CompTIA Network+: Network Types
- CompTIA Cloud+: Cloud Architecture & Models
- Python Development: Getting Started with Programming in Python
- Infrastructure Security
- An Executive's Guide to Security: Understanding Security Threats
- CompTIA A+ 220-1001: Storage Solutions
- Cloud Security Fundamentals: Cloud Application Security
- The Language of DevOps: DevOps Principles & Practices
- Top 10 List Items
- Software-Defined Networking Fundamentals
- Data Center Design
- Virtualization Benefits & Components
- Git & GitHub: Introduction
- Adopting the DevOps Mindset
- CloudOps: Infrastructure as Code
- Site Reliability: Engineering
- DevOps Practices for the Enterprise
- DevOps with Ansible: Overview
- Docker Containers, Images, & Swarms
- Introduction to Automation
- Splunk: Getting Started
- Kubernetes Administrator: Kubernetes Fundamentals for Administrators
- Getting Started with Python: Introduction
- Jenkins: Introduction
- Manmeet Singh Kochhar's Transcript
- Manmeet Singh Kochhar's Wallet
- About Accredible