Site Map - skillsoft.digitalbadges.skillsoft.com
- User Authentication
- Saravanan Dhandapani's Credentials
- Saravanan Dhandapani's Wallet
- Project Management Needs vs. Expectations
- Stakeholder Communication: Software Projects & Stakeholder Communication
- Project Evaluation: Defining Success Metrics
- Decision Making for Software Project Managers
- Windows Server 2016 Networking: Network Policy Server
- CompTIA Cybersecurity Analyst+: Monitoring Tools & Analytics
- Microsoft Azure Fundamentals: Management Tools
- Microsoft Azure Fundamentals: Managing Azure Costs
- Developing Solutions for Microsoft Azure: App Service
- Windows Server 2022: Active Directory Basics
- Windows Server 2022: Advanced Active Directory
- Windows Server 2022: Installation & Configuration
- Microsoft Azure Fundamentals: Azure Management Tools
- CompTIA Cybersecurity Analyst+: Threat Management Incident Planning & Response
- CompTIA Cybersecurity Analyst+: Network Concepts
- Installation, Configuration, & Management
- Keeping Business Calls Professional
- Writing Effective E-mails and Instant Messages
- Agile Foundations: Scrum Methodology
- Agile Methodologies
- Agile Foundations: Fundamentals
- Database Restoration
- File & Piecemeal Restores
- Monitoring Database Activity
- Policy-based Management & Performance Monitoring
- Subqueries & the EXISTS Predicate
- Database Programmability Objects & Non-relational Data
- Monitoring Queries
- Google Cloud Architect: Network Components
- Google Cloud Architect: Data Storage
- Backup Management
- Google Cloud Architect: Web Applications & Name Resolution
- Database Mail & Alerts
- Google Cloud Architect: Cloud Design
- Google Cloud Architect: Cloud Basics
- Release, Service Level, and Availability Management
- The Service Value Chain and General Management Practices
- Event, Incident, and Problem Management
- Service Desk, IT Asset, Service Configuration, and Change Control Management
- The Guiding Principles of the Service Value System and Continual Improvement Model
- Key Concepts and the Four Dimensions of Service Management
- Applying Scrum Development Practices
- Scrum Practices: Managing the Scrum Project
- Transition to Scrum: Agile Foundation to Scrum
- Transitioning to Scrum
- Security Analyst to Security Architect
- Security Architect
- Vulnerability Analyst
- Forensics Analyst
- Final Exam: Security Architect
- Security Incident Triage
- Unified Security: Playbook Approach to Security
- Final Exam: Forensics Analyst
- Final Exam: Vulnerability Analyst
- Data Security Breach Notification Process
- Security Program Regulatory Integration
- Security Architect: Ethical Hacking Best Practices
- Intelligent Orchestration: Automating Security Incident Processing
- Security Rules: Rules of Engagement
- Security Architect: Secure Coding Concepts
- Defensible Security
- Security Topologies: Developing Secure Networks
- Authentication & Encryption: Best Practices
- Intrusion Prevention: Best Practices
- Intrusion Detection: Best Practices
- Security Vulnerabilities: Managing Threats & Vulnerabilities
- Cryptography: Introduction to PKI
- Cryptography: Introduction to Cryptography Services
- Cyber Security Audits
- Security Software Assessments
- Risk Analysis: Security Risk Management
- Ethics & Privacy: Digital Forensics
- Digital Forensic Techniques & Investigative Approaches
- End-User Security: Securing End Users against Attackers
- End-User Security: The Security Administrator Perspective
- Anomaly Detection: Aspects of Anomaly Detection
- Anomaly Detection: Network Anomaly Detection
- End-User Security: The End-User Perspective
- Security Analyst
- Final Exam: Security Analyst
- Information Security: Honeypots
- Information Security: Pen Testing
- Information Security: APT Defenses
- Information Security: Subnetting & DNS for Security Architects
- Information Security: NACs & Gateways
- Information Security: Continual Infrastructure Testing
- Information Security: Securing Networking Protocols
- Information Security: Security Governance
- Information Security: Hardened Security Topologies
- An Executive's Guide to Security: Protecting Your Information
- An Executive's Guide to Security: Understanding Security Threats
- Auditing & Incident Response
- Session & Risk Management
- Value-driven Delivery: Delivering Value in Agile Projects
- Agile Hybrid Approaches
- Business Strategy: Managing Organizational Value
- Advanced Scrum for Project Management
- Business Orientation: Strategic Organizational Goals
- Project Management: Scrum Framework for Software Development
- Agile Project Planning
- Agile Project Scheduling and Monitoring
- Agile Software Development: Agile Development Life Cycle
- Agile for Software Development: Lean, Agile, & Scrum Methodologies
- Getting Started with Google Sheets
- Getting Started with Google Slides
- Introduction to the Agile Principles and Mindset Bootcamp: Session 1 Replay
- Agile Stakeholder Engagement and Team Development
- Agile Principles and Methodologies
- IT Security Fundamentals
- CompTIA A+ 220-1001: Laptops Features & Mobile Device Types
- CompTIA A+ 220-1002: Software Troubleshooting
- CompTIA A+ 220-1001: Troubleshooting
- Organizing Documents
- Working More Efficiently
- Getting Started with Google Docs
- Getting Started with Google Drive
- ITIL® Service Strategy Concepts
- CCENT: Overview of Networking
- ITIL® Service Transition Concepts and Processes
- Networking Fundamentals
- ITIL® Service Strategy Processes
- Exploring the May 2019 Update
- Exploring the November 2019 Update
- ITIL® Service Operation Concepts
- ITIL® Service Operation Processes
- ITIL® Service Design Processes
- Accessing & Managing Files
- Overview of the ITIL® Service Lifecycle
- ITIL® Continual Service Improvement
- ITIL® Service<br/>Design Concepts
- Agile Software Development: Agile Project Management Techniques
- Microsoft 365 Fundamentals: Azure AD & Access Management
- Internet of Things Applications
- Internet of Things Overview
- Internet of Things Hardware
- Internet of Things Hardware Overview
- Policies and Best Practices
- Common Account Management Practices
- Cloud Identity Management
- Cloud Computing Fundamentals: Storing & Managing Cloud Data
- Techniques and Tools
- Secure Cloud Computing & Trusted Cloud Services
- Service Oriented Architecture (SOA) Governance
- Security Architecture
- Security Controls & Business Continuity
- Operations Management
- Risk Management & Outsourcing Design
- Prototyping Design Thinking
- Moving to the Cloud
- Need for Design Patterns & the Principles Guiding Design Patterns
- Navigation and Layout
- Cloud Computing Fundamentals: Migrating to the Cloud
- Legal Requirements & Compliance
- Enterprise Architecture Planning & Implementation
- Design Principles
- Designing with Flexibility & Efficiency in Mind
- Design Thinking for Microservices
- Design Guidelines and Patterns
- Data Rights Management, Policies, & Event Tracing
- Data Center Design
- Current & Future Trends
- Content Framework
- Enterprise Architecture Basics
- Content Design
- Cloud Computing Fundamentals: Cloud Virtualization & Data Centers
- Cloud Service Models & Benefits and Issues
- Cloud Security
- Cloud Risk Management
- Cloud Computing Fundamentals: Cloud Protocols & Standards
- Cloud Presence & Privacy
- ITIL® 4 Foundation: Service Management Practices (Part 2)
- ITIL® 4 Foundation: General Management Practices
- ITIL® 4 Foundation: Service Management Practices (Part 1)
- Cloud Infrastructure & Risk Analysis
- Cloud Infrastructure Management
- ITIL® 4 Foundation: The Guiding Principles
- ITIL® 4 Foundation: The Service Value Chain
- ITIL® 4 Foundation: The Service Value System
- Cloud Computing Fundamentals: Considerations
- ITIL® 4 Foundation: Introduction
- ITIL® 4 Foundation: Key Concepts of Service Management
- ITIL® 4 Foundation: Key Concepts
- Cloud Access Control
- Cloud Computing Fundamentals: Introduction
- Basic Concepts of a Microservices Architecture
- Architecture Capability Basics
- Architectural Artifacts & the Enterprise Continuum
- Incident Tracking & Response
- Application Security Awareness & Validation
- Identity & Access Management Controls
- Identity and Access Management (IAM)
- Software Development Security & Life Cycle
- Secure Application Architecture & IAM
- Saravanan Dhandapani's Transcript
- Saravanan Dhandapani's Wallet
- About Accredible