Site Map - skillsoft.digitalbadges.skillsoft.com
- User Authentication
- Neha Singh's Credentials
- Neha Singh's Wallet
- Data Access & Governance Policies: Data Classification, Encryption, & Monitoring
- CCSP 2019: Identity & Access Management
- CCSP 2022: Cloud Security Concepts & Design Principles
- Leading Security Teams for GenAI Solutions: Use of Generative AI
- Responsible Use of AI
- The BA Planning and Monitoring Knowledge Area
- Business Analysis Overview
- The BA Elicitation and Collaboration Knowledge Area
- The Requirements Life Cycle Management Knowledge Area
- AWS Practitioner Bootcamp January 2025: Session 1 Replay
- Google Associate Cloud Engineer: Google Cloud Overview
- Hybrid Environment Pipelines: Hybrid Cloud Transformation
- Software Design and Development: Design Patterns & SOLID Principles
- Managing a Project to Minimize Risk and Maximize Quality
- Communicating and Engaging Teams and Stakeholders (2021 Update)
- Advanced Agile: Leadership Techniques
- Agile Principles and Methodologies
- Creating a Project Budget (PMBOK® Guide Sixth Edition)
- Software Design and Development: Software Engineering & SDLC Phases
- Managing the Project Resources (2021 Update)
- Encouraging Team Communication and Collaboration
- Leading an Innovation Culture to Future-proof Your Organization
- Using Business Etiquette to Increase Your Professionalism
- Managing and Engaging Stakeholders
- Skills for Project Analysts: Negotiation Skills
- The Effects of Environmental Change on Business
- Software Testing Cycle: Agile Testing
- Generative AI APIs for Practical Applications: An Introduction
- Artificial Intelligence and Machine Learning
- Application Security Awareness & Validation
- API Security
- Secure Application Architecture & IAM
- ASP.NET MVC Web Applications: Implementing ASP.NET Authentication
- Cloud Security Fundamentals: Cloud Application Security
- Tips & Tricks for Developing Secure Mobile Apps
- Cloud Security Fundamentals: Architectural & Design Concepts
- Cloud Security Fundamentals: Legal & Compliance
- Securing .NET Programming
- Cloud Security Fundamentals: Cloud Infrastructure Security
- Errors & Exceptions
- Cloud Security Fundamentals: Cloud Data Security
- Security Vulnerabilities & Enterprise Considerations
- Defensive Programming Standards
- Defensive Programming Methods
- Java Defensive Techniques
- Secure Corporate Communications & Networking
- Fundamentals
- IT Security Fundamentals
- iOS Architecture & Data Protection
- Using Corporate Devices Securely
- Software Acceptance, Deployment, Operations, & Maintenance
- Supply Chain & Software Acquisition
- Data Security and Access Control
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Secure Software Testing
- Data Handling and Concurrency
- CCSP 2019: Application Development & Security
- Defining Cryptography
- Defensive Coding Fundamentals for C/C++
- Defensive Coding for C/C++
- Thinking Defensively about Functions & Methods
- Managing Network Interaction
- Pen Testing: End-user Behavior
- Protecting Data in iOS Apps
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Core Concepts
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Secure Coding Practices
- A5 and A1: Security and Injection
- Secure Requirements
- A10 and A9: API and Component Attacks
- A4 and A2: Broken Applications
- A8 and A3: Cross-Site Attacks
- A7 and A6: Leaky and Unprepared Applications
- Secure Design
- OWASP Overview
- CISSP: Risk Management
- Top 10 List Items
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Threat Modeling
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Secure Design Principles
- SOLID & GRASP
- Neha Singh's Transcript
- Neha Singh's Wallet
- About Accredible