Site Map - skillsoft.digitalbadges.skillsoft.com
- User Authentication
- Neeraj Soni's Credentials
- Neeraj Soni's Wallet
- MySQL Database Development: Manipulating Data
- MySQL Database Development: SELECT Statement & Operators
- MySQL Database Development: Working with Functions
- MySQL Database Development: Query & Performance Optimization
- MySQL Database Development: Database Design Fundamentals
- MySQL Database Development: DDL Statements
- MySQL: Transactions, Savepoints, & Locks
- MySQL Database Development: Introduction
- MySQL: Views, Indices, & Normal Forms
- MySQL: Understanding & Implementing Joins
- MySQL: Grouping & Aggregation Operations
- MySQL: Querying Data
- MySQL: Getting Started
- MySQL: Creating & Updating Tables
- Influencing through Positive Leadership
- Managing and Engaging Stakeholders
- Developing Emotional Intelligence
- Understanding Unconscious Bias
- Developing a Successful Team
- Defining a Project Scope and Team
- The Art and Science of Communication
- Taking Final Steps to Bring a Project to its Close
- Managing Project Risks (2021 Update)
- Tracking Projects in Smartsheet
- Generative AI APIs for Practical Applications: An Introduction
- AWS Associate Solutions Architect 2020: AWS Cost Management
- AWS Developer Associate 2022: CloudFormation
- AWS Developer Associate 2022: Encryption & Security
- AWS Developer Associate 2022: AWS Optimization
- AWS Developer Associate 2022: Identity & Access Management
- AWS Developer Associate 2022: Monitoring Services
- AWS Developer Associate: Application Integration & Microservices
- AWS Associate Solutions Architect 2020: Network Options
- AWS Developer Associate 2022: Storage Services
- AWS Developer Associate 2022: CI/CD Services
- AWS Developer Associate 2022: Integration Services
- AWS Developer Associate 2022: Analytics Services
- AWS Developer Associate: DynamoDB NoSQL Database
- AWS Developer Associate 2022: Serverless Compute Services
- AWS Developer Associate 2022: Database Services
- AWS Developer Associate 2022: AWS Elastic Beanstalk (EB)
- AWS Developer Associate 2022: Stateless Applications
- AWS Associate Solutions Architect 2020: Application Scalability
- Introduction to AWS Services
- AWS DevOps Engineer Professional 2021: Container Services
- AWS Cloud Practitioner 2022: Core AWS Services
- AWS Developer Associate 2022: Configuration as Code
- AWS Developer Associate 2022: Cloud Services
- AWS Developer Associate 2022: Amazon Elastic Compute Cloud (EC2)
- Cloud Security Fundamentals: Cloud Application Security
- Need for Design Patterns & the Principles Guiding Design Patterns
- Automated Software Testing
- Application Security Awareness & Validation
- API Security
- Secure Application Architecture & IAM
- Secure Corporate Communications & Networking
- Secure Design
- IT Security Fundamentals
- CISSP: Risk Management
- Using Corporate Devices Securely
- Software Acceptance, Deployment, Operations, & Maintenance
- Supply Chain & Software Acquisition
- Secure Requirements
- Data Security and Access Control
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Secure Software Testing
- CCSP 2019: Application Development & Security
- Defining Cryptography
- Thinking Defensively about Functions & Methods
- Managing Network Interaction
- Pen Testing: End-user Behavior
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Secure Design Principles
- Fundamentals
- Data Handling and Concurrency
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Threat Modeling
- Using Docker for DevOps: Introduction to Docker
- SOLID & GRASP
- Jenkins for DevOps: Jenkins Configuration for DevOps
- Software Testing for DevOps: DevOps Test Tools
- Cloud Computing Fundamentals: Introduction
- The Language of DevOps: DevOps Tools & Processes
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Core Concepts
- A10 and A9: API and Component Attacks
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Secure Coding Practices
- A7 and A6: Leaky and Unprepared Applications
- A4 and A2: Broken Applications
- A5 and A1: Security and Injection
- A8 and A3: Cross-Site Attacks
- Top 10 List Items
- OWASP Overview
- Release & Sprint Planning
- Developing the Product & Sprint Backlogs
- Using Kanban in IT & Software Development
- Agile Test-Driven Development
- Software Data Analysis: Project Management Metrics
- Agile Software Development - Scrum
- Neeraj Soni's Transcript
- Neeraj Soni's Wallet
- About Accredible