Site Map - skillsoft.digitalbadges.skillsoft.com
- User Authentication
- Md Aamir Hassan's Credentials
- Md Aamir Hassan's Wallet
- Data Access & Governance Policies: Data Classification, Encryption, & Monitoring
- CCSP 2019: Identity & Access Management
- CCSP 2022: Cloud Security Concepts & Design Principles
- Leading Security Teams for GenAI Solutions: Use of Generative AI
- Responsible Use of AI
- Agile Organizations: Building an Agile Culture
- Automation Design & Robotics
- Business Analysis Overview
- Exploring Business Process Automation
- Hybrid Environment Pipelines: Hybrid Cloud Transformation
- Using Robots and RPA in the Workplace
- Software Design and Development: Design Patterns & SOLID Principles
- Exploring Project Management, Then and Now (2021 Update)
- Advanced Agile: Leadership Techniques
- Validate and Control Scope (PMBOK® Guide Sixth Edition)
- Effective Team Communication
- CAPM®: Performance Measurement Metrics
- Generative AI APIs for Practical Applications: An Introduction
- Artificial Intelligence and Machine Learning
- SOLID & GRASP
- Jenkins for DevOps: Jenkins Configuration for DevOps
- Using Docker for DevOps: Introduction to Docker
- Software Testing for DevOps: DevOps Test Tools
- Cloud Computing Fundamentals: Introduction
- Agile & TDD Best Practices for APIs: Test-driven Development Strategy
- Transition to Scrum: Agile Foundation to Scrum
- The Language of DevOps: DevOps Tools & Processes
- Release & Sprint Planning
- Using Kanban in IT & Software Development
- Software Data Analysis: Project Management Metrics
- Agile Best Practices for Tech Leaders: Scrum Artifacts
- CompTIA Security+: Analyzing Application & Network Attacks
- API Development: Framework Security
- CISSP 2021: Secure Design Principles
- Defensive Coding Fundamentals for JavaScript and HTML5
- Defensive Programmer: Defensive Techniques
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Secure Design Principles
- Defensive Coding, APIs, and Security
- Defensive Programmer: Defensive Concepts
- OWASP: Top 10 & Web Applications
- Secure Programmer: Coding Practices
- Secure Programmer: Software Design Techniques
- OWASP Overview
- Software Development Security & Life Cycle
- Securing .NET Programming
- Secure Application and Data Architecture Design
- CompTIA PenTest+: Application-based Attacks
- Threat Intelligence & Attribution Best Practices: Threat Intelligence Concepts
- Cloud Security Fundamentals: Cloud Application Security
- Defining a Project Scope and Team
- Taking Final Steps to Bring a Project to its Close
- Leading through Inspiration
- Application Security Awareness & Validation
- API Security
- Secure Application Architecture & IAM
- Top 10 List Items
- Md Aamir Hassan's Transcript
- Md Aamir Hassan's Wallet
- About Accredible