Site Map - skillsoft.digitalbadges.skillsoft.com
- User Authentication
- Pallavee Maurya's Credentials
- Pallavee Maurya's Wallet
- Leading across Cultures
- Bridging the Diversity Gap
- Workplace Diversity, Equity, and Inclusion in Action
- Moving from Bias to Inclusion in a DEI Journey
- Building Shared Understanding across Cultural Divides
- Promoting a Positive Work Environment
- Bridging Differences in Cross-cultural Communication
- Using Business Etiquette to Increase Your Professionalism
- Receiving Feedback with an Open Mind
- Conveying Your Message without Words
- Expanding Your Communication Skill Set
- Making Difficult Conversations Meaningful
- Overcoming Barriers to Effective Listening
- Unlocking the Power of Upward Delegation
- Apache Kafka: Concepts & Components
- Network Security and Emerging Technologies
- Communication and Web Protocols
- Network Function Virtualization Fundamentals
- Exploring Addresses
- Routing and Wide Area Networks
- TCP, UDP, Support and Management Protocols
- IP Addressing and IPv4 Subnetting
- Wireless LANs
- DESGN 3.0: OSPF & BGP Expansion
- CompTIA Network+: IP Addressing Schemes and Subnetting
- Decoding the Packet Header & Discovering ICMPv6
- CCNA 2020: Network Access, VLAN Configuration, & Interswitch Connectivity
- Ethernet LANs and Switching
- Networking Standards and Connections
- CompTIA A+ 220-1002: Application Installation, Networking, & Tools
- Benefits & Allocating Addresses
- Software-Defined Networking Fundamentals
- Indexes & Query Optimization
- Map Reduce, Atomic Counters, & Binary Data
- Cloud & Hadoop Deployments
- Backups, Monitoring, & Stats
- Introduction to Networking
- Agile Foundations: Fundamentals
- Basic Concepts of a Microservices Architecture
- Java Certified Foundations Associate: Java Concepts & Features
- MySQL: Creating & Updating Tables
- MySQL Database Development: Database Design Fundamentals
- MySQL Database Development: DDL Statements
- Java EE 7: Getting Started
- SSCP 2021: Asset & Change Management Lifecycles
- Business Transformation Through IT: Cloud Computing for Decision Makers
- Defining Cloud Computing for Decision-makers: Cloud Computing Principles
- Database Integration: Modeling Data Using JPA & Hibernate
- Introduction to Java
- Spring Application Basics
- The JDBC API & Localization
- Power BI Bootcamp: Session 1 Replay
- Power BI Bootcamp: Session 2 Replay
- Power BI Bootcamp: Session 3 Replay
- Power BI Bootcamp: Session 4 Replay
- Business Reporting: Getting Started with Power BI Desktop for Data Analysis
- Business Reporting: Leveraging Treemaps, Matrices, & Slicers in Power BI
- Business Reporting: Creating & Formatting Matrix Visualizations in Power BI
- Business Reporting: Visualizing & Merging Data in Power BI
- CompTIA Security+: Monitoring, Visibility, & Reporting
- CompTIA Security+: Wireless, Mobile, & Embedded Device Security
- CompTIA Security+: Risk Management, Privacy, & Sensitive Data Security
- CompTIA Security+: Basic Cryptography & Public Key Infrastructure
- CompTIA Security+: Organizational Security Assessment Tools & Mitigation Controls
- CompTIA Security+: Physical Security Controls
- CompTIA Security+: Incident Response, Digital Forensics, & Supporting Investigations
- CompTIA Security+: Implementing Secure Network Designs
- CompTIA Security+: Security Policies, Regulations, Standards, & Frameworks
- CompTIA Security+: Implementing Secure Protocols & Application Security Solutions
- CompTIA Security+: Authentication & Authorization Design Concepts
- CompTIA Security+: Implementing Identity and Account Management & AAA Solutions
- CompTIA Security+: Controls & Application Development, Deployment, & Automation
- CompTIA Security+: Analyzing Application & Network Attacks
- CompTIA Security+: Security Concepts in an Enterprise Environment
- CompTIA Security+: Social Engineering Techniques & Other Attack Types
- CompTIA Security+: Threat Actors, Intelligence Sources, & Vulnerabilities
- CompTIA Security+: Implementing Cybersecurity Resilience
- CompTIA Security+: Security Assessment & Penetration Testing Techniques
- Debugging in Windows 8
- Software Debugging in Windows
- Testing throughout the Software Life Cycle
- Testing Methods
- Automated Software Testing
- Software Quality Assurance
- Working with SET Operators
- Working with Subqueries
- Working with DDL
- Database Transactions
- Data Manipulation Language
- SQL*Plus Commands
- Visual Studio Online & Debugging Tips
- Debugging Tools & Best Practices
- Data Conversion
- Aggregating Data
- SELECT Statement, Expressions, & Operators
- Working with Joins
- Restricting Output
- Customizing Output
- SQL Developer
- Debugging Tools
- Introduction to Debugging
- Debugging Environments & Dumps
- Unit Testing: An Introduction to the JUnit Framework
- Unit Testing: Assertions & Assumptions in JUnit
- Unit Testing with Mocks: Getting Started with Mockito
- Debugging Concepts
- Working with Substitution
- Relational Database Concepts
- AWS SysOps Associate 2021: Application Containers
- AWS SysOps Associate 2021: Directory Services
- AWS SysOps Associate 2021: Cryptography
- AWS SysOps Associate 2021: Identity & Access Management
- AWS SysOps Associate 2021: EC2 Instance Management
- AWS SysOps Associate 2021: Database & EBS Volume Management
- AWS SysOps Associate 2021: Management Tools
- AWS SysOps Associate 2021: Storage Management
- AWS SysOps Associate 2021: Network Configuration
- Fault Tolerance & HA
- Host Profiles
- AWS SysOps Associate 2021: VPNs & Data Privacy
- AWS SysOps Associate 2021: EC2 Instance Deployment & Sizing
- AWS SysOps Associate 2021: Network Security
- Virtual Machines
- ESXi Features
- vCenter
- Clustering with VMWare 6.5
- Clustering
- DRS & Cluster Resource Management
- Monitoring & Alarm Configuration
- Virtual Machine Management
- vCenter Server Installation
- ESXi Server Installation
- Virtual Networks
- Virtual Switch Configuration
- Storage Considerations
- Virtualization Benefits & Components
- VMware Licensing Options
- SENSS 1.0: High Availability & Private VLANs
- SENSS 1.0: Centralized Logging & Device Management
- SENSS 1.0: Traffic & Device Monitoring
- SENSS 1.0: Cisco Port-Based Traffic Control
- SENSS 1.0: DHCP Snooping & IP Source Guard
- SENSS 1.0: Twice NAT & Network Object NAT
- SENSS 1.0: ASA Firewall Access Control
- SENSS 1.0: Transparent Firewalls & Security Contexts
- SENSS 1.0: IPv6 Support & Traffic Inspection
- SENSS 1.0: Zone-Based Firewalls
- SENSS 1.0: ASA Firewall Configuration & Access Control
- SENSS 1.0: Role-Based Access Control
- SENSS 1.0: IOS Security Configuration
- Boot Process
- Remote Access
- Network Services
- Installation
- Network File Systems
- Firewalls
- File Systems & Partitions
- Kickstart & First-run Issues
- Logical Volume Management
- Troubleshooting
- SELinux
- Directory Services
- Networking
- Logging
- Processes, Services, & Daemons
- Job Scheduling
- Using grep
- Bash Script Programming
- Using the Bash Shell
- Configuring Gnome
- File Permissions
- Using Linux Shells
- Bash Scripting
- Package Management
- User & Group Management
- Archiving
- File Management
- The Service Value Chain and General Management Practices
- Event, Incident, and Problem Management
- Service Desk, IT Asset, Service Configuration, and Change Control Management
- Release, Service Level, and Availability Management
- ITIL® 4 Foundation: Key Concepts of Service Management
- ITIL® 4 Foundation: Introduction
- Key Concepts and the Four Dimensions of Service Management
- The Guiding Principles of the Service Value System and Continual Improvement Model
- Windows Server 2016 Identity: Active Directory Group Policy Settings
- Windows Server 2016 Identity: Active Directory Maintenance & Recovery
- Windows Server 2016 Identity: Active Directory Groups & Organizational Units
- Windows Server 2016 Identity: Active Directory Group Policy Processing
- Windows Server 2016 Identity: Active Directory Service Accounts & Policies
- Windows Server 2016 Identity: Active Directory Trusts & Sites
- Windows Server 2016 Identity: Active Directory Rights Management Services
- SQL Security Architecture
- SQL & Concurrency Concepts
- SQL Concepts & Queries
- Microsoft 365 Fundamentals: Office 365 & Collaboration
- The Present Threat Landscape
- Social Engineering & Related Attacks
- SQL Selecting, Ordering, & Filtering
- SQL Tables
- Essential System Services
- Advanced GNU & Unix Commands
- SQL Transaction Locks
- Advanced SQL Queries
- CompTIA A+ 220-1001: Troubleshooting Printers
- CompTIA A+ 220-1001: Storage Solutions
- Storage
- CompTIA A+ 220-1001: Working with Peripheral Devices
- CompTIA A+ 220-1001: Power Supplies
- CompTIA A+ 220-1001: Network Types
- CompTIA A+ 220-1001: Networking Tools
- CompTIA A+ 220-1001: SOHO Devices
- CompTIA A+ 220-1001: Working with Motherboards, CPUs, & Add-On Cards
- CompTIA A+ 220-1001: Troubleshooting
- CompTIA A+ 220-1001: Random Access Memory
- CompTIA A+ 220-1001: Virtualization
- CompTIA A+ 220-1001: Printers
- CompTIA A+ 220-1001: Resolving Problems
- CompTIA A+ 220-1001: TCP & UDP ports
- CompTIA A+ 220-1001: Networking
- CompTIA A+ 220-1001: Wireless Networking Protocols
- CompTIA A+ 220-1001: Network Hosts
- CompTIA A+ 220-1001: Implementing Network Concepts
- CompTIA A+ 220-1001: Connectors
- CompTIA A+ 220-1001: Custom PC configuration
- CompTIA A+ 220-1001: Mobile Device Network Connectivity & Application Support
- CompTIA A+ 220-1001: Installing Hardware & Display Components
- CompTIA A+ 220-1001: Laptops Features & Mobile Device Types
- CompTIA A+ 220-1001: Configuring a Wired/Wireless Network
- CompTIA A+ 220-1001: Cloud Computing
- CompTIA A+ 220-1001: Common Devices
- CompTIA A+ 220-1001: Basic Cable Types
- CompTIA A+ 220-1001: Accessories & Mobile Device Synchronization
- GUIs & Configuration
- GNU & Unix Commands
- File Permissions & Links
- Linux Installation
- System Booting & Shutdown
- Network Device Hardening
- Introduction to System Architecture
- Network Services Management
- Scripting & Administrative Tasks
- Package Management
- Networking Fundamentals
- Introduction to Devices & File Systems
- Networking Devices
- Troubleshooting Common Network Service Issues
- Policies and Best Practices
- Ports, Protocols, & the OSI Model
- Network Topologies & Technologies
- Network Storage, Virtualization, & WAN Technologies
- Security Devices, Wireless Security, & Access Control
- Network Monitoring & Remote Access Methods
- Users, Groups, & Environment Variables
- Unix Input, Output, & Piping
- Getting Your Pitch Heard
- Getting the Details Right: Spelling Basics
- Organizing Your E-mail
- Audience and Purpose in Business Writing
- Planning an Effective Presentation
- Clarity and Conciseness in Business Writing
- Using the Parts of Speech
- Building Your Presentation
- Using Punctuation Marks
- Ensuring Successful Presentation Delivery
- Troublesome Words and Phrases: Usage Mistakes in Writing
- Editing and Proofreading Business Documents
- Creating Well-constructed Sentences
- Abbreviating, Capitalizing, and Using Numbers
- Windows Server 2016 Identity: Active Directory Accounts & Permissions
- Troubleshooting Methodology & Tools
- Troubleshooting Connectivity & Performance Issues
- Getting Email Right Series
- Presentation Mastery Series
- Facing Confrontation in Customer Service
- Providing Telephone Customer Service
- Writing Effective E-mails and Instant Messages
- Keeping Business Calls Professional
- Sending E-mails to the Right People
- Polishing Your Skills for Excellent Customer Service
- Maximize Your Productivity by Managing Time and Tasks
- Expert Insights on Work/Life Balance
- Expert Insights on Essential Customer Service Skills
- Navigating Your Own Emotions
- Navigating Other People's Emotions
- Navigating the Workplace with Emotional Intelligence
- Taking Effective and Professional Notes
- How to Manage Difficult Conversations
- Controlling Conflict, Stress, and Time in Customer Service
- Communicating Effectively with Customers
- Interacting with Customers
- Listening Even When It's Difficult to Listen
- Using Active Listening in Workplace Situations
- The Art of Staying Focused
- How Culture Impacts Communication
- Rapport Building in Customer Service
- The Building Blocks of Building Trust
- Dealing with Customer Service Incidents and Complaints
- Using Communication Strategies to Bridge Cultural Divides
- Expert Insights on Ethics
- Achieve Productivity in Your Personal Life
- Communicating with Confidence
- Choosing the Right Interpersonal Communication Method to Make Your Point
- Capturing the Attention of Senior Executives
- Trust Building through Effective Communication
- Making an Impact with Non-verbal Communication
- Do We Have A Failure to Communicate?
- Staying Balanced in a Shifting World
- Conquering the Challenges of Public Speaking
- Windows Server 2016 Identity: Active Directory Group Policy Objects
- Windows Server 2016 Identity: Active Directory Domain Controllers
- Windows Server 2016 Identity: Active Directory Certificate Services
- Windows Server 2016 Identity: AD FS & Web Application Proxy
- Windows Server 2016 Identity: Active Directory Group Policy Preferences
- Cloud Computing Fundamentals: Security
- Cloud Computing Fundamentals: Presence & Privacy
- Hybrid Cloud Architecture & Deployment: Adopting Migration Strategies
- Cloud Computing Fundamentals: Cloud Access Control
- Cloud Computing Fundamentals: Cloud Protocols & Standards
- Cloud Computing Fundamentals: Migrating to the Cloud
- Cloud Computing Fundamentals: Risk Management
- Cloud Computing Fundamentals: Cloud Virtualization & Data Centers
- Cloud Computing Fundamentals: Storing & Managing Cloud Data
- Cloud Computing Fundamentals: Considerations
- Cloud Service Models & Benefits and Issues
- Cloud Computing Fundamentals: Introduction
- Moving to the Cloud
- Business Strategy: Managing Organizational Value
- Business Orientation: Strategic Organizational Goals
- Project Management: Scrum Framework for Software Development
- Advanced Scrum for Project Management
- Agile Hybrid Approaches
- Value-driven Delivery: Delivering Value in Agile Projects
- Agile Software Development: Agile Project Management Techniques
- Agile Software Development: Agile Development Life Cycle
- Agile for Software Development: Lean, Agile, & Scrum Methodologies
- Agile Project Planning
- Agile Stakeholder Engagement and Team Development
- Agile Project Scheduling and Monitoring
- Introduction to the Agile Principles and Mindset Bootcamp: Session 1 Replay
- Agile Principles and Methodologies
- Pallavee Maurya's Transcript
- Pallavee Maurya's Wallet
- About Accredible