Site Map - skillsoft.digitalbadges.skillsoft.com
- User Authentication
- Pavitar Singh Rana's Credentials
- Pavitar Singh Rana's Wallet
- Cloud Implementation Using Azure IoT
- Using Raspberry Pi & OpenCV
- Arduino Language
- MicroPython & Security
- Raspi-config & GPIO
- Azure IoT Hub
- Principles of IoT & Python Basics
- MicroPython Board
- Internet of Things Hardware
- Internet of Things Hardware Overview
- Internet of Things Overview
- The Unix Command Line & GUI
- Shell Scripting
- Creating and Managing Unix File Systems
- Users, Groups, and Authentication
- Securing Unix Systems
- Unix Software Management
- Configuring Network Services
- Unix Hardening & Maintenance
- Installing Unix
- Graph Modeling on Apache Spark: Working with Apache Spark GraphFrames
- Processing Data: Using Kafka with Cassandra & Confluent
- Processing Data: Introducing Apache Spark
- Processing Data: Integrating Kafka with Apache Spark
- Working with Apache Cassandra: Using Collection & User-defined Fields
- Working with Apache Cassandra: Getting Started
- Working with Apache Cassandra: Using Replication, Consistency, & CQL
- Working with Apache Cassandra: Partitioning & Clustering Keys
- Working with Apache Cassandra: Indexes, Aggregations, & Programmatic Access
- Network & Host Analysis: Network Analysis Formats
- Security Programming: Command Line Essentials
- Security Programming: Scripting Essentials
- Security Programming: Code Identification
- Secure Programmer: Resiliency Coding
- Secure Programmer: Security Concepts
- Secure Programmer: Vulnerabilities
- Secure Programmer: Encryption
- Secure Programmer: Attacks
- Secure Programmer: Software Testing
- Secure Programmer: Coding Practices
- Secure Programmer: Software Modeling Techniques
- Defensive Programmer: Defensive Techniques
- Defensive Programmer: Defensive Concepts
- Defensive Programmer: Cryptography
- Defensive Programmer: Advanced Concepts
- Secure Programmer: Software Design Techniques
- Secure Programming for C#
- Securing C# Applications
- Creating Secure C# Code
- Code Access Security & Cryptography in .NET
- Application Security in .NET
- Introduction to Secure Programming
- Secure Programmer: Intro to Programming Standards
- Defensive Programmer: Code Samples
- Defensive Programmer: Secure Testing
- Security Programming: System Essentials
- Security Architect: Secure Coding Concepts
- Internet of Things & UI/UX
- Wearable Technology & UI/UX
- Exploring Chatbots
- Voice User Interfaces
- UI/UX for Chatbot & Voice Interface AIs
- Designing with Flexibility & Efficiency in Mind
- Introduction To UI/UX
- Comparing Manual & Automated Testing
- Exploring CI: Continuous Integration & CI Tools
- Test Automation: Automated Software Testing
- Encryption
- Automated Software Testing
- Software Quality Assurance
- Relational Database Concepts
- Objects & Retrieving Data
- Data Retrieval
- DDL, DML, & Constraints
- Security & Administration
- Agile Stakeholder Engagement and Team Development
- Agile Key Exam Concepts
- Agile Project Scheduling and Monitoring
- CCNA 2020: Layer 1 Interfaces & Cabling
- Creating & Reading Data Sets
- Data Manipulation & Debugging
- Working with DO Loops & Proc SQL
- The SAS Environment
- Data Errors & Validation
- Introduction to Data Sets
- Data Manipulation
- Creating Reports
- Creating Summary Reports & Charts
- Inputs & Outputs
- Working with Arrays & Restructuring and Merging Data Sets
- Agile Project Planning
- Agile Principles and Methodologies
- Windows Server 2016 - Install, Store, & Compute: Installation Options
- Windows Server 2016 - Install, Store, & Compute: Upgrades & Migrations
- Pavitar Singh Rana's Transcript
- Pavitar Singh Rana's Wallet
- About Accredible