Site Map - skillsoft.digitalbadges.skillsoft.com
- User Authentication
- Sekhar Pisini's Credentials
- Sekhar Pisini's Wallet
- Git & GitHub: Introduction
- Data Access & Governance Policies: Data Classification, Encryption, & Monitoring
- CCSP 2022: Cloud Security Concepts & Design Principles
- Leading Security Teams for GenAI Solutions: Use of Generative AI
- Responsible Use of AI
- Embracing Agile at Scale
- Exploring Business Process Automation
- PRINCE2® Project Management Overview (2017 Update)
- Testing Methods
- Hybrid Environment Pipelines: Hybrid Cloud Transformation
- Automation Design & Robotics
- Agile Project Planning
- Effective Team Communication
- Identifying Risk (PMBOK® Guide Sixth Edition)
- Code Quality, Testing, & Development
- Software Design and Development: Design Patterns & SOLID Principles
- Generative AI APIs for Practical Applications: An Introduction
- Artificial Intelligence and Machine Learning
- Being an Effective Team Member
- Need for Design Patterns & the Principles Guiding Design Patterns
- Security Incident Triage
- Ethical Hacker: Incident Response
- Business Analysis Overview
- Software Design and Development: Methodologies
- Agile & TDD Best Practices for APIs: Test-driven Development Strategy
- Transition to Scrum: Agile Foundation to Scrum
- Cloud Security Fundamentals: Cloud Application Security
- Automated Software Testing
- Top 10 List Items
- CompTIA Cybersecurity Analyst+: Malware Threats
- CompTIA Cybersecurity Analyst+: Cloud Computing
- CompTIA Cybersecurity Analyst+: Data Privacy
- CompTIA Cybersecurity Analyst+: Threat Monitoring
- CompTIA Cybersecurity Analyst+: User Account Security
- CompTIA Cybersecurity Analyst+: Intrusion Detection & Traffic Analysis
- CompTIA Cybersecurity Analyst+: IT Security Risk Mitigation
- CompTIA Cybersecurity Analyst+: Encryption & Hashing
- CompTIA Cybersecurity Analyst+: Software Development Security
- CompTIA Cybersecurity Analyst+: Digital Forensics
- CompTIA Cybersecurity Analyst+: Hardware & Security
- CompTIA Cybersecurity Analyst+: Network Infrastructure Security
- CompTIA Cybersecurity Analyst+: Network Scanning & Traffic Analysis
- CompTIA CySA+
- CompTIA Cybersecurity Analyst+: Threat Intelligence
- CompTIA Cybersecurity Analyst+: Attack Types
- CompTIA Cybersecurity Analyst+: Business Continuity
- Threat Intelligence & Attribution Best Practices: Threat Intelligence Concepts
- Threat Intelligence & Attribution Best Practices: Attribution Analysis
- Final Exam: Security Threat Intelligence
- Forensic Analysis: Cybercrime Investigations
- CyberOps Windows Hardening: Windows Server Hardening Best Practices
- CyberOps Windows Hardening: Windows Workstation Hardening Best Practices
- Network & Host Analysis: Network Operations
- Network & Host Analysis: Network Analysis Formats
- Network & Host Analysis: Network Protocols
- Network & Host Analysis: Protocol Analysis
- Network & Host Analysis: Network Observations
- Malware Removal: Reporting Findings & Preventing Future Infections
- Malware Removal: Remediating an Infected System
- Malware Removal: Analyzing an Infected System
- Network Survey & Extraction: Network Analysis
- Network Survey & Extraction: Network Monitoring
- Malware Removal: Identifying Malware Types & Classification Approaches
- Security Programming: Scripting Essentials
- Security Programming: System Essentials
- Security Programming: Code Identification
- Security Programming: Command Line Essentials
- Effective Stakeholder Communications for Technology Professionals
- Leveraging the Power of Analogical Thinking
- Introduction to Cyber Operations
- Proven Techniques for Technical Communication
- Taking the Lead with Workplace Motivation and Engagement
- Outwitting Your Cognitive Bias
- Communicating with Confidence
- Choosing the Right Interpersonal Communication Method to Make Your Point
- Capturing the Attention of Senior Executives
- Trust Building through Effective Communication
- Investigating Arguments
- The Art and Science of Communication
- Making an Impact with Non-verbal Communication
- Confronting Your Assumptions
- Do We Have A Failure to Communicate?
- Reaching Sound Conclusions
- Expert Insights on Critical Thinking
- SOLID & GRASP
- Leading with Executive Presence
- How Culture Impacts Communication
- Audience and Purpose in Business Writing
- Clarity and Conciseness in Business Writing
- Using Communication Strategies to Bridge Cultural Divides
- Editing and Proofreading Business Documents
- Improving Your Technical Writing Skills
- Strength under Pressure: Building Perseverance and Resilience
- How to Get Out of Your Own Way and Achieve Success
- Keeping Business Calls Professional
- Writing and Preparing an Effective Speech
- Conquering the Challenges of Public Speaking
- Michelle Boockoff-Bajdek on Public Speaking From A to D (Analog to Digital)
- Saving Time by Setting Goals
- Sharpening Your Focus to Stay on Track
- Managing Your Time So It Doesn’t Manage You
- Expert Insights on Time Management
- Expert Insights on Listening
- Maximize Your Productivity by Managing Time and Tasks
- Taking Effective and Professional Notes
- Become a Great Listener
- Listening Even When It's Difficult to Listen
- Using Active Listening in Workplace Situations
- The Art of Staying Focused
- Make The Time You Need: Get Organized
- Aligning Goals and Priorities To Manage Time
- Using Punctuation Marks
- Troublesome Words and Phrases: Usage Mistakes in Writing
- Creating Well-constructed Sentences
- CCSP 2019: Identity & Access Management
- Sending E-mails to the Right People
- Getting the Details Right: Spelling Basics
- Using the Parts of Speech
- Abbreviating, Capitalizing, and Using Numbers
- Java SE 11: Exception Handling
- Java SE 11: Objects & Classes
- Java SE 11: Encapsulation
- Java SE 11: Strings & Primitive Data Types
- Java SE 11: Inheritance, Polymorphism, & Abstraction
- Java SE 11: Introduction to Java SE & the NetBeans IDE
- Java SE 11: Variables & Operators
- Java SE 11: Expressions, Arrays, & Loops
- AWS Professional Solutions Architect 2020: IAM Configurations
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Secure Coding Practices
- CompTIA Cloud Essentials+: Security Considerations
- Google Associate Cloud Engineer: Google Identity & Access Management (IAM)
- CompTIA Linux+: Using vi/vim to Edit Files
- CompTIA Linux+: Scheduling Tasks
- CompTIA Linux+: Locating & Manipulating Files
- CompTIA Linux+: Managing Services
- CompTIA Linux+: Introduction to Linux & the Command Line
- CompTIA Linux+: File Access & Permissions
- CompTIA Cloud+: Cloud Identity & Access Management
- Microsoft Azure Security Technologies: Identity & Access Management
- Azure Active Directory & Collaboration
- RESTful Services for FSD: Building & Testing RESTful Services
- Identity & Access Services
- CompTIA CASP+: Authentication & Authorization
- Identity Management, Directory Services, and Federation
- CISSP 2021: Identity and Access Management Principles
- CISM 2020: Identity & Access Management
- Jenkins for DevOps: Jenkins Configuration for DevOps
- Identity and Access Management (IAM)
- Sekhar Pisini's Transcript
- Sekhar Pisini's Wallet
- About Accredible