Site Map - skillsoft.digitalbadges.skillsoft.com
- User Authentication
- Rana Shan AFZAL's Credentials
- Rana Shan AFZAL's Wallet
- Power Up: Turning on Your Self-starter Potential
- How Blockchain Technology is Transforming Businesses
- Gaining Insight through Organizational Awareness
- Using Performance Appraisals to Advance Your Career
- Connecting with the Internet of Things
- Getting Your Career on the Right Track
- Module 3
- Module 3 - Emerging Technologies and IT Career Pathways
- Module 4
- Module 4 - Launching your IT career opportunities
- Delivering Feedback That Encourages Growth
- DEVASC: Network & Network Communication Basics
- DEVASC: Configuring Devices with Bash, Python, & Ansible
- DEVASC: Software Development Methodologies
- DEVASC: Working with Data Formats
- DEVASC: HTTP, APIs, & Webhooks
- DEVASC: Application Infrastructure, Deployment, Security, & CI/CD
- DEVASC: DevOps, Docker, Bash, & Unit Testing Basics
- DEVASC: Coding, Testing, & Managing Cisco Devices
- DEVASC: Network, Collaboration, Security, & Compute Capabilities
- DEVASC: Working with Git
- DEVASC: DevNet Overview & Setting up Tools in Linux
- DEVASC: Setting up Development & Virtualization Tools in Windows
- DEVASC: IP Services & Operational Planes
- DEVASC: IPv4 Addressing, Binary Conversion, & Subnetting
- DEVASC: API Usage & Authentication
- DEVASC: Python Scripting & Managing WebEx Resources
- DEVASC: Development Methodologies & Software Quality
- DEVASC: Code Organization, Design Patterns, & Version Control
- DEVASC: Network Components, Connectivity, & Troubleshooting
- DCCOR: Cisco Application Centric Infrastructure
- Developing Diplomacy and Tact
- Building and Training the Project Team (2021 Update)
- Network & Host Analysis: Network Operations
- Network & Host Analysis: Network Analysis Formats
- Cloud Security Management: Data Security
- Cloud Security Management: Operations Security
- Cloud Security Management: Legal & Compliance
- CLCOR: Cisco Collaboration Core Technologies
- Cultivating Cross-functional Team Collaboration
- Cloud Security Management: Platform & Infrastructure Security
- New Project Manager Essentials
- Securing AWS: Infrastructure Security
- Cloud Security Management: Architecture Security
- Network & Host Analysis: Network Observations
- Cloud Security Management: Risk Management
- Developing Your Business Acumen
- Getting Started with Machine Learning
- Enabling Business-IT Collaboration and Strategic Alignment
- Strategies for Managing Technical Teams
- Securing AWS: Identity & Access Management
- Google Cloud Architect: Security
- Securing AWS: Fundamentals
- Agile Principles and Methodologies
- Securing AWS: Data Protection
- RSTECH: Networking Hardware, Models, & Technologies
- RSTECH: Network Responsibilities, Addressing, & Utilities
- RSTECH: Troubleshooting, Upgrading, Recovering, & Resetting
- RSTECH: Cisco Equipment, Components, & Port Characteristics
- RSTECH: Cisco Memory Functions & Removing Cisco Devices
- RSTECH: OS Types, IOS Access, & Terminal Emulation
- RSTECH: IOS Commands, Startup-Config, & IOX-XE Modes
- Building Digital Dexterity in Organizations
- Track 2: Network & Host Analysis
- ACS WIL - Network Designer
- Network & Host Analysis: Network Protocols
- Track 1: Network Survey & Extraction
- Network & Host Analysis: Protocol Analysis
- Network Survey & Extraction: Network Analysis
- Network Survey & Extraction: Network Monitoring
- Architecting Balance: Hybrid Cloud Implementation with AWS & Azure
- Certified in Cybersecurity (CC): Networking & Security Infrastructure
- Developing a Plan to Further Your Career
- ENCOR: LISP & VXLAN
- Generative AI and Its Impact to Everyday Business
- Leading through the AI Disruption with Empathy
- CCSP 2019: Data Center Security
- Becoming a Continuous Learner
- Contributing as a Virtual Team Member
- Facing Virtual Team Challenges
- Synchronize Goals to Optimize Your Team
- Building Customer Relationships in a Virtual Environment
- Learning from Failure and Success
- Module 1 - Setting up your Individual & Team Learnings
- Module 1
- Final Exam: Security Analyst
- An Executive's Guide to Security: Understanding Security Threats
- Auditing & Incident Response
- Information Security: APT Defenses
- Information Security: Subnetting & DNS for Security Architects
- Information Security: NACs & Gateways
- Information Security: Honeypots
- Information Security: Pen Testing
- Information Security: Continual Infrastructure Testing
- Information Security: Securing Networking Protocols
- Information Security: Security Governance
- Session & Risk Management
- An Executive's Guide to Security: Protecting Your Information
- Information Security: Hardened Security Topologies
- Developing Emotional Intelligence
- Being a Responsible Corporate Digital Citizen
- Ethical Standards and PMI® Core Values
- Ethics and Project Management
- Building Trust: Ethics and the Marketing Mix
- Earning and Offering Trust at Work
- Building Trust with Business Ethics
- Developing an AI/ML Data Strategy: Data Analytics & Data Ethics
- Navigating AI Ethical Challenges and Risks
- Leading in the Age of Generative AI
- Developing an AI/ML Data Strategy: Aspects of a Robust AI Strategy
- Build Ethical Competencies and Confidence
- Navigate Ethical Challenges in Emerging Technology
- Foster Ethical Behaviour
- Ethics Education Program
- Rana Shan AFZAL's Transcript
- Rana Shan AFZAL's Wallet
- About Accredible