Site Map - skillsoft.digitalbadges.skillsoft.com
- User Authentication
- Prayag .'s Credentials
- Prayag .'s Wallet
- JIRA Administration: Leveraging the Platform for Development Projects
- JIRA Administration: Platform Fundamentals
- Reporting in Jira Software
- Google Cloud Architect: Cloud Design
- Planning & Working on a Software Project in Jira Cloud
- Creating & Setting Up Projects in Jira Cloud
- Configuring & Managing Boards in Jira Cloud
- Data Models & Pivot Reports
- Service Desk, IT Asset, Service Configuration, and Change Control Management
- Release, Service Level, and Availability Management
- Event, Incident, and Problem Management
- The Service Value Chain and General Management Practices
- Key Concepts and the Four Dimensions of Service Management
- The Guiding Principles of the Service Value System and Continual Improvement Model
- Introduction to the Agile Principles and Mindset Bootcamp: Session 1 Replay
- Project Management: Scrum Framework for Software Development
- Advanced Scrum for Project Management
- Business Strategy: Managing Organizational Value
- Business Orientation: Strategic Organizational Goals
- Agile Hybrid Approaches
- Value-driven Delivery: Delivering Value in Agile Projects
- Agile Project Planning
- Agile Principles and Methodologies
- Agile Stakeholder Engagement and Team Development
- Agile for Software Development: Lean, Agile, & Scrum Methodologies
- Agile Project Scheduling and Monitoring
- Agile Software Development: Agile Project Management Techniques
- Agile Software Development: Agile Development Life Cycle
- Communicating Effectively with Customers
- Communicating with Confidence
- Creating Well-constructed Sentences
- Interacting with Customers
- Clarity and Conciseness in Business Writing
- Writing Effective E-mails and Instant Messages
- Getting Email Right Series
- The Art and Science of Communication
- Making an Impact with Non-verbal Communication
- Do We Have A Failure to Communicate?
- Organizing Your E-mail
- Choosing the Right Interpersonal Communication Method to Make Your Point
- Keeping Business Calls Professional
- Troublesome Words and Phrases: Usage Mistakes in Writing
- Using the Parts of Speech
- Using Punctuation Marks
- Improving Your Technical Writing Skills
- Getting the Details Right: Spelling Basics
- Abbreviating, Capitalizing, and Using Numbers
- Trust Building through Effective Communication
- ITIL® 4 Foundation: Introduction
- ITIL® 4 Foundation: General Management Practices
- Secure Corporate Communications & Networking
- Identity & Access Services
- Impacts from Vulnerability Types
- ITIL® 4 Foundation: Service Management Practices (Part 1)
- Implementing a Secure Network Architecture
- ITIL® 4 Foundation: The Service Value Chain
- ITIL® 4 Foundation: Service Management Practices (Part 2)
- ITIL® 4 Foundation: The Guiding Principles
- Logon, Logoff & Password Policies
- Penetration Testing & Vulnerability Scanning
- ITIL® 4 Foundation: Key Concepts
- The Present Threat Landscape
- ITIL® 4 Foundation: The Service Value System
- ITIL® 4 Foundation: Key Concepts of Service Management
- CompTIA Security+: Cryptography
- Identity & Access Management Controls
- Public Key Infrastructure
- Social Engineering & Related Attacks
- Application & Service Attacks
- Cloud Computing, Virtualization, & Resiliency
- Common Account Management Practices
- Frameworks, Guidelines, & Physical Security
- An Executive's Guide to Security: Protecting Your Information
- Components Supporting Organizational Security
- Using Corporate Devices Securely
- Understanding Attacks & Prevention Practices
- Types of Malware
- Troubleshooting Common Security Issues
- IT Security Fundamentals
- Authorization & Registration
- An Executive's Guide to Security: Understanding Security Threats
- Analyzing Output from Security Technologies
- Secure System, Application Design, & Deployment
- Cryptographic & Wireless Attacks
- Fundamental Security Concepts
- Account Changes & Attack Mitigation
- Business Impact Analysis & Risk Management
- Implementing Secure Protocols
- Deploying Mobile Devices Securely
- Password Security Requirements
- Security Assessment Using Software Tools
- Wireless Security Settings
- Incident Response, Forensics, Recovery, & Security Controls
- Policies, Plans, & Procedures
- Prayag .'s Transcript
- Prayag .'s Wallet
- About Accredible