Site Map - skillsoft.digitalbadges.skillsoft.com
- User Authentication
- Riya Anjankumar Bakuli's Credentials
- Riya Anjankumar Bakuli's Wallet
- Fostering a Growth Mindset in the Age of AI
- Git & GitHub: Introduction
- Exploring Business Process Automation
- Data Access & Governance Policies: Data Classification, Encryption, & Monitoring
- Automation Design & Robotics
- CCSP 2019: Identity & Access Management
- CCSP 2022: Cloud Security Concepts & Design Principles
- Leading Security Teams for GenAI Solutions: Use of Generative AI
- Responsible Use of AI
- Hybrid Environment Pipelines: Hybrid Cloud Transformation
- Code Quality, Testing, & Development
- Testing Methods
- Software Design and Development: Design Patterns & SOLID Principles
- Embracing Agile at Scale
- PRINCE2® Project Management Overview (2017 Update)
- Being an Effective Team Member
- Effective Team Communication
- Identifying Risk (PMBOK® Guide Sixth Edition)
- Agile Project Planning
- Generative AI APIs for Practical Applications: An Introduction
- Artificial Intelligence and Machine Learning
- Security Analyst to Security Architect
- Security Architect
- Final Exam: Security Architect
- Security Incident Triage
- Data Security Breach Notification Process
- Unified Security: Playbook Approach to Security
- Security Program Regulatory Integration
- Security Architect: Ethical Hacking Best Practices
- Security Rules: Rules of Engagement
- Intelligent Orchestration: Automating Security Incident Processing
- Vulnerability Analyst
- Security Analyst
- Forensics Analyst
- Incident Tracking & Response
- Security Architect: Secure Coding Concepts
- Defensible Security
- Final Exam: Vulnerability Analyst
- Authentication & Encryption: Best Practices
- Security Vulnerabilities: Managing Threats & Vulnerabilities
- Intrusion Detection: Best Practices
- Intrusion Prevention: Best Practices
- Security Topologies: Developing Secure Networks
- Cryptography: Introduction to PKI
- Cryptography: Introduction to Cryptography Services
- Cyber Security Audits
- Final Exam: Forensics Analyst
- Security Software Assessments
- Digital Forensic Techniques & Investigative Approaches
- Risk Analysis: Security Risk Management
- Ethics & Privacy: Digital Forensics
- End-User Security: The End-User Perspective
- End-User Security: Securing End Users against Attackers
- End-User Security: The Security Administrator Perspective
- Anomaly Detection: Aspects of Anomaly Detection
- Anomaly Detection: Network Anomaly Detection
- Final Exam: Security Analyst
- Information Security: Pen Testing
- Information Security: Security Governance
- Information Security: Honeypots
- Information Security: Continual Infrastructure Testing
- Information Security: Subnetting & DNS for Security Architects
- Information Security: Securing Networking Protocols
- Information Security: Hardened Security Topologies
- An Executive's Guide to Security: Understanding Security Threats
- Information Security: APT Defenses
- Information Security: NACs & Gateways
- An Executive's Guide to Security: Protecting Your Information
- Auditing & Incident Response
- Session & Risk Management
- Agile & TDD Best Practices for APIs: Test-driven Development Strategy
- Entry Certificate in Business Analysis™
- Top 10 List Items
- SOLID & GRASP
- Need for Design Patterns & the Principles Guiding Design Patterns
- Agile Test-Driven Development
- Automated Software Testing
- Cloud Security Fundamentals: Cloud Application Security
- IIBA® Member
- Riya Anjankumar Bakuli's Transcript
- Riya Anjankumar Bakuli's Wallet
- About Accredible