Site Map - skillsoft.digitalbadges.skillsoft.com
- User Authentication
- Shekhar Balasaheb Kalokhe's Credentials
- Shekhar Balasaheb Kalokhe's Wallet
- Git & GitHub: Introduction
- Exploring Business Process Automation
- Using Robots and RPA in the Workplace
- Hybrid Environment Pipelines: Hybrid Cloud Transformation
- Code Quality, Testing, & Development
- Testing Methods
- Software Design and Development: Design Patterns & SOLID Principles
- CAPM®: Performance Measurement Metrics
- Validate and Control Scope (PMBOK® Guide Sixth Edition)
- Effective Team Communication
- Exploring Project Management, Then and Now (2021 Update)
- Embracing Agile at Scale
- Agile Project Planning
- Artificial Intelligence and Machine Learning
- Managing Project Work (PMBOK® Guide Sixth Edition)
- Becoming Your Own Best Coach
- Generative AI APIs for Practical Applications: An Introduction
- API Security
- Agile & TDD Best Practices for APIs: Test-driven Development Strategy
- Transition to Scrum: Agile Foundation to Scrum
- Release & Sprint Planning
- Using Kanban in IT & Software Development
- Software Data Analysis: Project Management Metrics
- SOLID & GRASP
- Jenkins for DevOps: Jenkins Configuration for DevOps
- Using Docker for DevOps: Introduction to Docker
- Software Testing for DevOps: DevOps Test Tools
- The Language of DevOps: DevOps Tools & Processes
- Need for Design Patterns & the Principles Guiding Design Patterns
- Automated Software Testing
- Cloud Computing Fundamentals: Introduction
- Agile Best Practices for Tech Leaders: Scrum Artifacts
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Secure Software Testing
- Pen Testing: End-user Behavior
- Defensive Programming Methods
- Defensive Coding for C/C++
- Defensive Coding Fundamentals for C/C++
- Secure Requirements
- Supply Chain & Software Acquisition
- Defining Cryptography
- Software Acceptance, Deployment, Operations, & Maintenance
- iOS Architecture & Data Protection
- Thinking Defensively about Functions & Methods
- Managing Network Interaction
- Data Security and Access Control
- Defensive Java Fundamentals
- Errors & Exceptions
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Threat Modeling
- Defensive Coding for JavaScript and HTML5
- Defensive Coding Fundamentals for JavaScript and HTML5
- Cloud Security Fundamentals: Architectural & Design Concepts
- CCSP 2019: Application Development & Security
- Cloud Security Fundamentals: Cloud Data Security
- Cloud Security Fundamentals: Cloud Application Security
- Cloud Security Fundamentals: Legal & Compliance
- Cloud Security Fundamentals: Cloud Infrastructure Security
- CISSP: Risk Management
- ASP.NET MVC Web Applications: Implementing ASP.NET Authentication
- Data Handling and Concurrency
- Securing .NET Programming
- Defensive Coding Fundamentals for C#
- Defensive Coding for C#
- Tips & Tricks for Developing Secure Mobile Apps
- Java Defensive Techniques
- Security Vulnerabilities & Enterprise Considerations
- Protecting Data in iOS Apps
- Defensive Programming Standards
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Secure Coding Practices
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Core Concepts
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Secure Design Principles
- Top 10 List Items
- OWASP Overview
- A7 and A6: Leaky and Unprepared Applications
- A8 and A3: Cross-Site Attacks
- A4 and A2: Broken Applications
- A5 and A1: Security and Injection
- Shekhar Balasaheb Kalokhe's Transcript
- Shekhar Balasaheb Kalokhe's Wallet
- About Accredible