Site Map - skillsoft.digitalbadges.skillsoft.com
- User Authentication
- Ramesh Shirwal's Credentials
- Ramesh Shirwal's Wallet
- Systems Hardening
- Data Access & Governance Policies: Data Classification, Encryption, & Monitoring
- CCSP 2019: Identity & Access Management
- CCSP 2022: Cloud Security Concepts & Design Principles
- Leading Security Teams for GenAI Solutions: Use of Generative AI
- Responsible Use of AI
- Git & GitHub: Introduction
- Exploring Business Process Automation
- Hybrid Environment Pipelines: Hybrid Cloud Transformation
- Using Robots and RPA in the Workplace
- Testing Methods
- Code Quality, Testing, & Development
- Software Design and Development: Design Patterns & SOLID Principles
- Embracing Agile at Scale
- Exploring Project Management, Then and Now (2021 Update)
- Agile Project Planning
- Validate and Control Scope (PMBOK® Guide Sixth Edition)
- Effective Team Communication
- CAPM®: Performance Measurement Metrics
- Kubernetes Administrator: Kubernetes Fundamentals for Administrators
- Kubernetes Administrator: Monitoring Kubernetes Metrics
- Kubernetes Administrator: Managing Highly-available Clusters
- Recognizing Hallucinations, Inaccuracies, and Bias in AI
- Navigating AI Ethical Challenges and Risks
- Establishing AI Guardrails and Governance
- OWASP Top 10: Securing Web Applications
- Artificial Intelligence and Machine Learning
- Generative AI APIs for Practical Applications: An Introduction
- Agile & TDD Best Practices for APIs: Test-driven Development Strategy
- OWASP Top 10: A1 - Injection
- OWASP Top 10: A2 - Broken Authentication
- OWASP Top 10: A4 - XML External Entities
- OWASP Top 10: Web Application Security
- OWASP Top 10: A3 - Sensitive Data Exposure
- OWASP Top 10: A5 - Broken Access Control
- OWASP Top 10: A8 - Insecure Deserialization
- OWASP Top 10: A6 - Security Misconfiguration
- OWASP Top 10: A7 - Cross-site Scripting
- OWASP Top 10: A9 - Using Components with Known Vulnerabilities
- OWASP Top 10: A10 - Insufficient Logging & Monitoring
- OWASP Top 10: Discovering & Exploiting Web App Vulnerabilities
- CISSP: Software Development Security
- Cloud Computing Fundamentals: Introduction
- Software Testing for DevOps: DevOps Test Tools
- Jenkins for DevOps: Jenkins Configuration for DevOps
- The Language of DevOps: DevOps Tools & Processes
- Agile Software Development - Scrum
- Software Data Analysis: Project Management Metrics
- Cloud Security Fundamentals: Cloud Application Security
- Using Docker for DevOps: Introduction to Docker
- Using Kanban in IT & Software Development
- Need for Design Patterns & the Principles Guiding Design Patterns
- SOLID & GRASP
- Developing the Product & Sprint Backlogs
- Agile Test-Driven Development
- Release & Sprint Planning
- Automated Software Testing
- Application Security Awareness & Validation
- API Security
- Secure Application Architecture & IAM
- Top 10 List Items
- Ramesh Shirwal's Transcript
- Ramesh Shirwal's Wallet
- About Accredible