Site Map - skillsoft.digitalbadges.skillsoft.com
- User Authentication
- Prosenjit Sarkar's Credentials
- Prosenjit Sarkar's Wallet
- Ethical Hacker: Security Controls
- Scaling an Organization's Scrum Process
- Scaling Agile in Your Organization Bootcamp: Session 1 Replay
- Scaling Agile in Your Organization Bootcamp: Session 2 Replay
- Scaling Agile in Your Organization Bootcamp: Session 3 Replay
- Agile Stakeholder Engagement and Team Development
- Scrum Concepts & the Product Owner
- Lean in Scrum: Lean Development Practices
- Scrum: Product Development Framework
- Agile Project Planning
- Scrum Sprint: Retrospective
- Ethical Hacker: Hacking Concepts
- Agile Hybrid Approaches
- Transitioning to Scrum
- Scrum Master: Sprint Goals & Planning
- Agile Project Scheduling and Monitoring
- SCRUM Meetings: On-target Daily Meetings
- Agile Software Development: Agile Development Life Cycle
- Agile for Software Development: Lean, Agile, & Scrum Methodologies
- Scrum Practices: Managing the Scrum Project
- Advanced Scrum Metrics
- Applying Scrum Development Practices
- Business Strategy: Managing Organizational Value
- Scaling Scrum: Choosing Scaled Agile Frameworks
- Value-driven Delivery: Delivering Value in Agile Projects
- Advanced Lean, Agile, & Scrum Concepts
- Product Development Practices
- Advanced Scrum for Project Management
- Project Management: Scrum Framework for Software Development
- Scaling Scrum: Challenges
- Scrum Master: Scrum for the Team
- SCRUM Quality, Planning, and Completion: The Definition of Done
- Scrum: Product Backlog
- SCRUM Quality, Planning, and Completion: Quality & Productivity
- Agile Software Development: Agile Project Management Techniques
- Transition to Scrum: Agile Foundation to Scrum
- SCRUM Quality, Planning, and Completion: Effective User Stories
- Business Orientation: Strategic Organizational Goals
- Introduction to the Agile Principles and Mindset Bootcamp: Session 1 Replay
- Introduction to Scrum for the Team Bootcamp: Session 1 Replay
- Scrum Sprint: Review
- Scrum Team Velocity: Exploring Team Velocity
- Scrum Product: Defining the Why & How of the Product
- Accessing the Business Value of Scrum
- Agile Principles and Methodologies
- Facing Challenges as a First-time Manager
- Adopting PRINCE2® for your Project Environment (2017 Update)
- Expert Insights on Presentation Skills
- Building Your Presentation
- Getting Your Pitch Heard
- Presentation Mastery Series
- Planning an Effective Presentation
- Ensuring Successful Presentation Delivery
- Reference Models
- Choosing and Preparing Your Delegate
- ADM Guidelines & Techniques
- Architecture Capability Framework
- ADM Application & Architecture Content Framework
- Architecture Development Method (ADM) Cycle
- Enterprise Continuum
- Ethical Hacker: Overview & Threats
- PRINCE2® Start, Direct, and Initiate Projects (2017 Update)
- PRINCE2® Control, Manage, and Close Projects (2017 Update)
- ITIL® 4 Foundation: The Service Value Chain
- ITIL® 4 Foundation: General Management Practices
- ITIL® 4 Foundation: The Service Value System
- ITIL® 4 Foundation: Key Concepts
- ITIL® 4 Foundation: The Guiding Principles
- PRINCE2® Project Management Overview (2017 Update)
- PRINCE2® Project Planning and Risk Management (2017 Update)
- PRINCE2® Project Quality and Control (2017 Update)
- ITIL® 4 Foundation: Introduction
- ITIL® 4 Foundation: Key Concepts of Service Management
- Secure Cloud Computing & Trusted Cloud Services
- Security Controls & Business Continuity
- Data Rights Management, Policies, & Event Tracing
- Software Development Security & Life Cycle
- Operations Management
- Data Center Design
- Secure Application Architecture & IAM
- Cloud Infrastructure Management
- Legal Requirements & Compliance
- Risk Management & Outsourcing Design
- Application Security Awareness & Validation
- CCSP 2019: Cloud System Architecture Design
- Cloud Data Security
- Cloud Computing & Reference Architecture
- Cloud Infrastructure & Risk Analysis
- ITIL® 4 Foundation: Service Management Practices (Part 2)
- ITIL® 4 Foundation: Service Management Practices (Part 1)
- CompTIA Cybersecurity Analyst+: Malware & Digital Forensics
- Cryptographic Methods
- CompTIA Cybersecurity Analyst+: Firewalls, IDS, & IPS
- CompTIA Cybersecurity Analyst+: Network Concepts
- CompTIA Cybersecurity Analyst+: Monitoring Tools & Analytics
- CompTIA Cybersecurity Analyst+: Security Frameworks & Security Controls
- CompTIA Cybersecurity Analyst+: Threat Management Incident Planning & Response
- CompTIA Cybersecurity Analyst+: Threat Mitigation
- Prosenjit Sarkar's Transcript
- Prosenjit Sarkar's Wallet
- About Accredible