Site Map - skillsoft.digitalbadges.skillsoft.com
- User Authentication
- sambasivam.venkateswaran@sifycorp.com's Credentials
- sambasivam.venkateswaran@sifycorp.com's Wallet
- Advanced and Interactive Visualization Bootcamp: Session 2 Replay
- Advanced and Interactive Visualization Bootcamp: Session 1 Replay
- Advanced and Interactive Visualization Bootcamp: Session 3 Replay
- Advanced and Interactive Visualization Bootcamp: Session 4 Replay
- AWS Practitioner Bootcamp October 2024: Session 1 Replay
- AWS Practitioner Bootcamp October 2024: Session 2 Replay
- AWS Cloud Practitioner Bootcamp August 2024: Session 1 Replay
- AWS Certified SysOps Administrator Associate Bootcamp: Session 4 Replay
- AWS Certified SysOps Administrator Associate Bootcamp: Session 1 Replay
- AWS Certified SysOps Administrator Associate Bootcamp: Session 2 Replay
- AWS Certified SysOps Administrator Associate Bootcamp: Session 3 Replay
- AWS Certified Solutions Architect Associate Bootcamp: Session 4 Replay
- AWS Certified Solutions Architect Associate Bootcamp: Session 2 Replay
- AWS Certified Solutions Architect Associate Bootcamp: Session 3 Replay
- AWS Certified Developer Bootcamp: Session 4 Replay
- AWS Certified Developer Bootcamp: Session 5 Replay
- AWS Certified Solutions Architect Associate Bootcamp: Session 1 Replay
- AWS Certified Developer Bootcamp: Session 1 Replay
- AWS Certified Developer Bootcamp: Session 3 Replay
- AWS Certified Developer Bootcamp: Session 2 Replay
- Administering Microsoft Teams Bootcamp: Session 2 Replay
- Administering Microsoft Teams Bootcamp: Session 3 Replay
- Administering Microsoft Teams Bootcamp: Session 1 Replay
- Release, Service Level, and Availability Management
- Customer Service: Fostering a Service Mindset
- Developing and Supporting an Agile Mindset
- Reimagining the Customer Experience with Generative AI
- Reimagining the Sales Process with Generative AI
- Fostering a Growth Mindset in the Age of AI
- Leveraging Analytical and Critical Thinking to Implement AI
- Embracing Risk and Learning from Setbacks with AI Projects
- Reimagining Marketing with Generative AI
- Generative AI and Its Impact to Everyday Business
- Harnessing the Disruption of Generative AI
- Establishing AI Guardrails and Governance
- Encouraging Innovation and Experimentation with AI
- Leading through the AI Disruption with Empathy
- Leveraging AI as a Team Member
- Recognizing Hallucinations, Inaccuracies, and Bias in AI
- Navigating AI Ethical Challenges and Risks
- Leading in the Age of Generative AI
- Security Incident Triage
- Security Program Regulatory Integration
- Data Security Breach Notification Process
- Intelligent Orchestration: Automating Security Incident Processing
- Security Architect: Ethical Hacking Best Practices
- Security Rules: Rules of Engagement
- Incident Tracking & Response
- Defensible Security
- Authentication & Encryption: Best Practices
- Security Architect: Secure Coding Concepts
- Intrusion Prevention: Best Practices
- Security Topologies: Developing Secure Networks
- Security Vulnerabilities: Managing Threats & Vulnerabilities
- Intrusion Detection: Best Practices
- Cryptography: Introduction to PKI
- Cryptography: Introduction to Cryptography Services
- Cyber Security Audits
- Security Software Assessments
- Digital Forensic Techniques & Investigative Approaches
- Risk Analysis: Security Risk Management
- Ethics & Privacy: Digital Forensics
- End-User Security: The End-User Perspective
- End-User Security: Securing End Users against Attackers
- End-User Security: The Security Administrator Perspective
- Anomaly Detection: Aspects of Anomaly Detection
- Anomaly Detection: Network Anomaly Detection
- Security Analyst
- Final Exam: Security Analyst
- Mitigating Security Risks: Managing Information, Cloud, & Data Security Risks
- Information Security: Pen Testing
- Information Security: Security Governance
- Mitigating Security Risks: Cyber Security Risks
- Mitigating Security Risks: Information, Cloud, & Data Security Risk Considerations
- Mitigating Security Risks: Managing Social Engineering Risks
- Track 2: Evaluating and Planning for Security Risks
- Security Risks: Performing Security Risk Assessments
- Mitigating Security Risks: Managing Network & Infrastructure Security Risks
- Security Risks: Performing Security Risk Identification
- Mitigating Security Risks: Managing Physical Security Risks
- Security Risks: Planning for Security Risk Management
- Final Exam: Evaluating and Planning for Security Risks
- Track 1: Becoming Security Aware
- Cybersecurity Awareness: Exposure to Security Risks
- Cybersecurity Awareness: Key Security Terms & Concepts
- Security Risks: Key Risk Terms & Concepts
- Final Exam: Becoming Security Aware
- Information Security: Subnetting & DNS for Security Architects
- Information Security: Honeypots
- Information Security: Continual Infrastructure Testing
- Information Security: Securing Networking Protocols
- Information Security: Hardened Security Topologies
- CISM 2022: Security Standards
- An Executive's Guide to Security: Understanding Security Threats
- Auditing & Incident Response
- Information Security: APT Defenses
- Information Security: NACs & Gateways
- An Executive's Guide to Security: Protecting Your Information
- SNCF: Cisco Firewall, IPS Systems, & the FMCv in AWS
- CISM 2022: Information Security Governance
- CISM 2022: Business Continuity & Security
- CISM 2022: Incident Response
- Business Continuity Planning Bootcamp: Session 2 Replay
- Business Continuity Planning Bootcamp: Session 1 Replay
- Certified in Cybersecurity (CC): Security Governance, Policies, & Controls
- Certified in Cybersecurity (CC): Core Security Principles & Risk Management
- Session & Risk Management
- Cybersecurity Awareness: Getting Started with Security Foundations
- Cybersecurity Awareness: Information Security Fundamentals
- iOS 12 Development: Getting Started with Xcode & iOS
- Managing apps & files in iOS 16
- Full Stack Development with the MEAN Stack Bootcamp: Session 1 Replay
- Oracle Database 12c R2 SQL: Using Structured Query Language (SQL)
- Embracing a Customer-obsessed Mentality
- PL-300: Creating & Formatting Charts In Power BI
- Facing Challenges as a First-time Manager
- Getting Started with Python: Introduction
- Web Fundamentals: Web Development with HTML
- Mobile Device Security & Handling
- Business Analysis Analytical Techniques
- Google Professional Cloud Developer: Deploying Google Applications to GKE
- Skills for Project Analysts: Negotiation Skills
- PL-300: Using Time Intelligence in Power BI
- Testing Approaches
- Embedding Inclusion into Everyday Experiences
- CLDFND: IaaS, PaaS, & SaaS
- CLDFND: Cloud Service Models
- CLDFND: Cloud Characteristics
- CompTIA Cloud+: Cloud Capacity Planning
- Azure Fundamentals Bootcamp: Session 1 Replay
- Exploring Blockchain
- Success Factors for Peak Performance
- Exploring Chatbots
- Securing AWS: Fundamentals
- Interacting with Customers
- Workplace Diversity, Equity, and Inclusion in Action
- Developing a Mindset of Growth and Learning
- Administration Tasks: Adopting the Right Standards for IT Automation
- SMA Installation & Deployment
- Expert Insights on Leading Teams
- Building a Strategic Commitment to Sustainability
- CompTIA Cloud+: Cloud Architecture & Models
- Certified Information Systems Auditor (CISA) 2019: Information System Auditing
- Business Reporting: Visualizing & Merging Data in Power BI
- Expert Insights on Email Productivity
- Expert Insights on Listening
- Choosing the Right Interpersonal Communication Method to Make Your Point
- Trust Building through Effective Communication
- The Art and Science of Communication
- sambasivam.venkateswaran@sifycorp.com's Transcript
- sambasivam.venkateswaran@sifycorp.com's Wallet
- About Accredible