Site Map - skillsoft.digitalbadges.skillsoft.com
- User Authentication
- Ruth Mbaika Mailu's Credentials
- Ruth Mbaika Mailu's Wallet
- Navigating AI Ethical Challenges and Risks
- CISSP 2021: Site & Facility Security
- CompTIA IT Fundamentals: CIA Triad
- Leading through the AI Disruption with Empathy
- Generative AI and Its Impact to Everyday Business
- Generative AI Capabilities and Potential Security Risks
- AI in the Workplace
- Using Explorations & Reports in Google Analytics
- Expert Insights on Strategic Planning & Execution
- Becoming Your Own Best Coach
- Developing a Mindset of Growth and Learning
- Building Up Your Emotional Intelligence
- CISM 2020: IT Security Policies
- CISSP 2021: Fundamental Concepts & Principles
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Data Classification
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Security Design Principles
- CCSP 2022: Cloud Computing Concepts & Reference Architectures
- Certified in Cybersecurity (CC): Core Security Principles & Risk Management
- CISM 2022: Business Continuity & Security
- CISSP 2021: (ISC)2 & the CISSP Exam
- CompTIA Cybersecurity Analyst+: Threat Intelligence
- Cybersecurity Awareness: Getting Started with Security Foundations
- Cybersecurity Awareness: Exposure to Security Risks
- The Discovery Meeting: Starting Off on the Right Foot
- Advanced Python Topics: Modules & Virtual Environments
- Data Analytics for Managers
- Using Dashboards & Reports in Google Analytics Web
- Customer Service: Discovering Customer Needs
- Introduction to Networking
- Basic Concepts of a Microservices Architecture
- ChatGPT & Its Practical Use Cases
- The Role of ChatGPT in Shaping Our Future
- Analytics Literacy for Business Professionals
- Risk Mitigation Strategies and Controls
- Organizational Security and Privacy Policies
- Threat Intelligence & Attribution Best Practices: Attribution Analysis
- CyberOps Windows Hardening: Windows Workstation Hardening Best Practices
- SecOps Engineer: Cloud & IoT security
- Security Best Practices: Network Appliance Security
- SecOps Engineer: Secure Coding
- Planning Measures: Incident Response Planning
- Wi-Fi Penetration Testing
- Ethical Hacker: Account Creation
- Ethical Hacker: Security Standards
- Ethical Hacker: Secure Technology & Applications
- Ethical Hacker: Incident Response
- Pen Testing: End-user Behavior
- PenTesting for Physical Security
- Pen Testing Awareness: Results Management
- Security Measures: Implementing Security Controls
- Ethical Hacker: Risk Assessment
- SecOps Engineer: System Infrastructure Security
- Network & Host Analysis: Network Operations
- Policy & Governance: Incident Response
- Threat Intelligence & Attribution Best Practices: Threat Intelligence Concepts
- Workplace Diversity, Equity, and Inclusion in Action
- Network & Host Analysis: Network Analysis Formats
- Network & Host Analysis: Network Observations
- Access Control and Security Architecture Design
- CyberOps Windows Hardening: Windows Server Hardening Best Practices
- Navigating the Workplace with Emotional Intelligence
- Forensic Analysis: Cybercrime Investigations
- CompTIA Security+: Implementing Secure Protocols & Application Security Solutions
- CompTIA Server+: Network Firewalls
- Network & Host Analysis: Network Protocols
- Network & Host Analysis: Protocol Analysis
- Getting to the Root of a Problem
- Rapport Building in Customer Service
- CEH v11: \nSocial Engineering, Insider Threats & Identity Theft
- Developing Personal Accountability
- Preparing Impactful Presentations that Drive Decision Makers to Action
- Take a Deep Breath and Manage Your Stress
- Expert Insights on Personal Productivity
- Conducting an Effective Hiring Interview
- Expert Insights on Talent Management
- Network Survey & Extraction: Network Monitoring
- Network Survey & Extraction: Network Analysis
- Working with Data for Effective Decision Making
- Malware Removal: Reporting Findings & Preventing Future Infections
- Malware Removal: Remediating an Infected System
- Security Programming: Python Scripting Essentials
- Malware Removal: Analyzing an Infected System
- Malware Removal: Identifying Malware Types & Classification Approaches
- Security Programming: System Essentials
- OWASP Top 10: A04:2021-Insecure Design
- OWASP Top 10: A10 - Insufficient Logging & Monitoring
- OWASP Top 10: Discovering & Exploiting Web App Vulnerabilities
- OWASP Top 10: A9 - Using Components with Known Vulnerabilities
- Security Programming: Scripting Essentials
- Business Strategy for the Post-pandemic Economy
- OWASP Top 10: A8 - Insecure Deserialization
- OWASP Top 10: A7 - Cross-site Scripting
- OWASP Top 10: A1 - Injection
- OWASP Top 10: A6 - Security Misconfiguration
- Decision Making for Software Project Managers
- OWASP Top 10: A5 - Broken Access Control
- OWASP Top 10: A4 - XML External Entities
- Security Rules: Rules of Engagement
- Security Vulnerabilities: Managing Threats & Vulnerabilities
- Information Security: NACs & Gateways
- Final Exam: Becoming Security Aware
- OWASP Top 10: A2 - Broken Authentication
- Information Security: APT Defenses
- Cybersecurity Awareness: Information Security Fundamentals
- Auditing & Incident Response
- An Executive's Guide to Security: Protecting Your Information
- End-User Security: The End-User Perspective
- Session & Risk Management
- The Art of Staying Focused
- Security Programming: Command Line Essentials
- Security Programming: Code Identification
- Secure Programmer: Intro to Programming Standards
- Penetration Testing Fundamentals
- OWASP Top 10: Web Application Security
- OWASP Top 10: A3 - Sensitive Data Exposure
- Introduction to Cyber Operations
- Expert Insights on Essential Customer Service Skills
- Building Rapport through Strong Collaboration
- Working Well with Others
- Cybersecurity and Networking Fundamentals
- Group Tools in Facebook iPad
- Smartcuts: Accelerating Innovation, Managing Change, & Thinking Differently
- Leadership Insights on Problem Solving & Decision Making
- Optimizing Your Workplace Well-being
- Thriving with High-pressure Work
- Making an Impact with Non-verbal Communication
- An Executive's Guide to Security: Understanding Security Threats
- Maximize Your Productivity by Managing Time and Tasks
- Aligning Goals and Priorities To Manage Time
- Controlling Conflict, Stress, and Time in Customer Service
- Investigating Arguments
- Dealing with Customer Service Incidents and Complaints
- The Four Tendencies: Understand Yourself For Improvement
- Expert Insights on Managing Fear
- Expert Insights on Work/Life Balance
- Expert Insights on Discovering Your Strengths
- Achieve Productivity in Your Personal Life
- Become a Great Listener
- Getting Your Pitch Heard
- Telling a Business Story
- Reaching Customers Digitally
- Expert Insights on Selling Essentials
- Expert Insights on Managing Yourself
- Psychological Safety: Building a Culture of Inclusion and Innovation
- The Basics of Marketing
- Expert Insights on Dealing with Conflict
- Confronting Your Assumptions
- Getting the Details Right: Spelling Basics
- The Essentials for Anger Management
- Machine & Deep Learning Algorithms: Introduction
- Trust Building through Effective Communication
- Guiding the Analysis for Effective Data-driven Decision Making
- Basic Analytical Methods
- Storytelling with Data: Introduction
- Framing Opportunities for Effective Data-driven Decision Making
- Identifying Risks in Your Organization
- Platform Fundamentals
- Expert Insights on Motivating People
- Big Data Interpretation
- Expert Insights on Time Management
- Managing Your Time So It Doesn’t Manage You
- Helping Customers Find You
- Expert Insights on Digital Marketing
- MongoDB Querying
- Planning Azure NoSQL Deployments
- Harnessing the Power of Data Science for Business Growth
- Big Data Fundamentals
- Finding the Quality in Your Data
- How to Manage Difficult Conversations
- Difficult People: Strategies to Keep Everyone Working Together
- Professional in Human Resources: Organizational Development
- Communicating Effectively with Customers
- Creating Sites
- Integrating & Embedding Web Content in Sites
- The Art and Science of Communication
- Data Literacy for Business Professionals
- Audience and Purpose in Business Writing
- Expert Insights on Critical Thinking
- Developing and Supporting an Agile Mind-set
- Ruby Full Stack Development: Introduction
- Java Programming: Introduction
- Expert Insights on Decision Making
- Software Security Best Practices
- Personal Power and Credibility
- Expert Insights on Networking & Building Relationships
- Developing Emotional Intelligence
- Expert Insights on Resilience & Perseverance
- Java OOP: Understanding Inheritance & Polymorphism in Java
- Getting Started with Python: Introduction
- Certified Information Systems Auditor (CISA) 2019: Information System Auditing
- Introduction to Java
- Expert Insights on Strategic Thinking
- Expert Insights on Negotiation
- Managing Pressure and Stress to Optimize Your Performance
- Using Basic Formulas
- Excel Office 365: Getting Started
- Make The Time You Need: Get Organized
- New Project Manager Essentials
- JIRA Cloud: Creating & Setting Up Projects
- Communicating with Confidence
- IINS 3.0: Malware and Data Loss
- Making Data-driven Decisions
- Using the Parts of Speech
- Interacting with Customers
- Strategies for the Modern Public Relations Professional
- Ruth Mbaika Mailu's Transcript
- Ruth Mbaika Mailu's Wallet
- About Accredible