Site Map - skillsoft.digitalbadges.skillsoft.com
- User Authentication
- Priyanka Chaudhary's Credentials
- Priyanka Chaudhary's Wallet
- Git & GitHub: Introduction
- Exploring Business Process Automation
- Data Access & Governance Policies: Data Classification, Encryption, & Monitoring
- Testing Methods
- Hybrid Environment Pipelines: Hybrid Cloud Transformation
- Using Robots and RPA in the Workplace
- Code Quality, Testing, & Development
- Software Design and Development: Design Patterns & SOLID Principles
- CCSP 2022: Cloud Security Concepts & Design Principles
- Leading Security Teams for GenAI Solutions: Use of Generative AI
- Responsible Use of AI
- Effective Team Communication
- CAPM®: Performance Measurement Metrics
- Embracing Agile at Scale
- Exploring Project Management, Then and Now (2021 Update)
- Agile Project Planning
- Validate and Control Scope (PMBOK® Guide Sixth Edition)
- ChatGPT Prompt Engineering Examples & Use Cases
- Generative AI APIs for Practical Applications: An Introduction
- Artificial Intelligence and Machine Learning
- Business Analysis Activities and Tools
- Business Analysis Overview
- Security Analyst to Security Architect
- Security Architect
- Vulnerability Analyst
- Security Analyst
- Test Automation: Automated Software Testing
- Taking Responsibility for Your Accountability
- Stakeholder Communication: Software Projects & Stakeholder Communication
- Forensics Analyst
- Final Exam: Forensics Analyst
- Cryptography: Introduction to Cryptography Services
- Cyber Security Audits
- Security Software Assessments
- Cryptography: Introduction to PKI
- Digital Forensic Techniques & Investigative Approaches
- Risk Analysis: Security Risk Management
- Anomaly Detection: Network Anomaly Detection
- End-User Security: The End-User Perspective
- End-User Security: Securing End Users against Attackers
- End-User Security: The Security Administrator Perspective
- Anomaly Detection: Aspects of Anomaly Detection
- Ethics & Privacy: Digital Forensics
- Final Exam: Security Architect
- Security Architect: Ethical Hacking Best Practices
- Data Security Breach Notification Process
- Unified Security: Playbook Approach to Security
- Intelligent Orchestration: Automating Security Incident Processing
- Security Incident Triage
- Security Program Regulatory Integration
- Security Rules: Rules of Engagement
- Security Architect: Secure Coding Concepts
- Defensible Security
- Final Exam: Vulnerability Analyst
- Authentication & Encryption: Best Practices
- Information Security: Honeypots
- Information Security: Continual Infrastructure Testing
- Security Vulnerabilities: Managing Threats & Vulnerabilities
- Information Security: Security Governance
- Information Security: Hardened Security Topologies
- Intrusion Detection: Best Practices
- Intrusion Prevention: Best Practices
- Security Topologies: Developing Secure Networks
- Information Security: Subnetting & DNS for Security Architects
- Information Security: NACs & Gateways
- Information Security: Pen Testing
- Information Security: Securing Networking Protocols
- Information Security: APT Defenses
- Final Exam: Security Analyst
- An Executive's Guide to Security: Understanding Security Threats
- An Executive's Guide to Security: Protecting Your Information
- Auditing & Incident Response
- Session & Risk Management
- Social Engineering Threats and Prevention
- CompTIA Security+: Security Assessment & Penetration Testing Techniques
- DevOps Security Considerations: DevSecOps Principles
- Incident Tracking & Response
- Cloud Computing Fundamentals: Security
- Cloud Computing Fundamentals: Cloud Access Control
- CompTIA Cloud Essentials+: Cloud Governance & Securing Data
- CCSP 2019: Identity & Access Management
- Cloud Computing Fundamentals: Risk Management
- CompTIA Cloud Essentials+: Cloud Native Apps & Cloud Data Analytics
- Cloud Security Fundamentals: Architectural & Design Concepts
- CISSP: Software Development Security
- Information Security Incident Management Part I
- Establishing Self-confidence for Life
- Ensuring Successful Presentation Delivery
- Security Configurations & Compliance Controls
- CompTIA Cybersecurity Analyst+: Monitoring Tools & Analytics
- Securing CloudOps Deployments: Implementing Multi-cloud Security
- Threat Intelligence & Attribution Best Practices: Threat Intelligence Concepts
- Encryption & Malware
- Fundamental Security Concepts
- Agile Principles and Methodologies
- Cultivating Enterprise Agile
- Becoming a Successful Collaborator
- ITIL® 4 Foundation: Key Concepts of Service Management
- ITIL® 4 Foundation: Introduction
- Mitigating Security Risks: Managing the Incidents
- Key Concepts and the Four Dimensions of Service Management
- Jenkins for DevOps: Jenkins Configuration for DevOps
- Using Docker for DevOps: Introduction to Docker
- Software Testing for DevOps: DevOps Test Tools
- The Language of DevOps: DevOps Tools & Processes
- Need for Design Patterns & the Principles Guiding Design Patterns
- Cloud Computing Fundamentals: Introduction
- SOLID & GRASP
- Cloud Security Fundamentals: Cloud Application Security
- Automated Software Testing
- Top 10 List Items
- Software Data Analysis: Project Management Metrics
- Developing the Product & Sprint Backlogs
- Agile Software Development - Scrum
- Agile Test-Driven Development
- Release & Sprint Planning
- Using Kanban in IT & Software Development
- Priyanka Chaudhary's Transcript
- Priyanka Chaudhary's Wallet
- About Accredible