Site Map - skillsoft.digitalbadges.skillsoft.com
- User Authentication
- Roy Serrano's Credentials
- Roy Serrano's Wallet
- MS-102: Implementing a Microsoft 365 Tenant
- CISM 2022: Social Engineering & Malware
- Generative AI APIs for Practical Applications: An Introduction
- Data Access & Governance Policies: Data Classification, Encryption, & Monitoring
- CCSP 2019: Identity & Access Management
- CCSP 2022: Cloud Security Concepts & Design Principles
- Responsible Use of AI
- Git & GitHub: Introduction
- Exploring Business Process Automation
- Testing Methods
- Hybrid Environment Pipelines: Hybrid Cloud Transformation
- Using Robots and RPA in the Workplace
- Code Quality, Testing, & Development
- Software Design and Development: Design Patterns & SOLID Principles
- Leading Security Teams for GenAI Solutions: Use of Generative AI
- Validate and Control Scope (PMBOK® Guide Sixth Edition)
- Effective Team Communication
- CAPM®: Performance Measurement Metrics
- Exploring Project Management, Then and Now (2021 Update)
- Development & Testing with Agile: Project Management
- CAPM®: Agile Adaptive Project Management
- Embracing Agile at Scale
- Agile Organizations: Building an Agile Culture
- Technical Product Management: Requirements Gathering & Documentation
- Agile Project Planning
- CompTIA Cybersecurity Analyst+: Network Security Concepts
- Identity and Access Management (IAM)
- ITIL® 4 Foundation: Introduction
- MS-102: Managing Users & Groups
- CompTIA Security+: Audits, Assessments, & Awareness
- CompTIA Security+: Enterprise Security Capabilities
- CompTIA Security+: Security Monitoring & Alerting
- CompTIA Security+: Identity and Access Management
- CompTIA Security+: Automation, Orchestration, & Incident Response
- CompTIA Security+: Effective Security Governance
- CompTIA Security+: Risk Management
- CompTIA Security+: Security Compliance & Third-Party Risk
- CompTIA Security+: Security Goals & Controls
- CompTIA Security+: Threat Actors & Vectors
- CompTIA Security+: Practical Cryptography
- CompTIA Security+: Mitigation Techniques
- CompTIA Security+: Survey of Malicious Activities
- CompTIA Security+: Enterprise Infrastructure Security Principles
- CompTIA Security+: Architecture & Infrastructure Concepts
- CompTIA Security+: Data Protection Concepts & Strategies
- CompTIA Security+: Resilience & Recovery
- CompTIA Security+: Computing Resources Security Techniques
- CompTIA Security+: Vulnerability Management
- CompTIA Security+: Fundamental Security Concepts
- Cryptocurrency & Cryptography
- Roy Serrano's Transcript
- Roy Serrano's Wallet
- About Accredible