Site Map - skillsoft.digitalbadges.skillsoft.com
- User Authentication
- Shikha Shikha's Credentials
- Shikha Shikha's Wallet
- ITIL® 4 Foundation: Service Management Practices (Part 2)
- ITIL® 4 Foundation: Service Management Practices (Part 1)
- The Service Value Chain and General Management Practices
- ITIL® 4 Foundation: Key Concepts of Service Management
- The Guiding Principles of the Service Value System and Continual Improvement Model
- Event, Incident, and Problem Management
- Service Desk, IT Asset, Service Configuration, and Change Control Management
- Release, Service Level, and Availability Management
- CCSP 2022: Cloud Security Concepts & Design Principles
- CCSP 2019: Identity & Access Management
- Data Access & Governance Policies: Data Classification, Encryption, & Monitoring
- Leading Security Teams for GenAI Solutions: Use of Generative AI
- Responsible Use of AI
- Git & GitHub: Introduction
- Exploring Business Process Automation
- Hybrid Environment Pipelines: Hybrid Cloud Transformation
- Using Robots and RPA in the Workplace
- Testing Methods
- Code Quality, Testing, & Development
- Software Design and Development: Design Patterns & SOLID Principles
- CAPM®: Performance Measurement Metrics
- Validate and Control Scope (PMBOK® Guide Sixth Edition)
- Effective Team Communication
- Exploring Project Management, Then and Now (2021 Update)
- Embracing Agile at Scale
- Agile Project Planning
- ChatGPT Prompt Engineering Examples & Use Cases
- Generative AI APIs for Practical Applications: An Introduction
- Artificial Intelligence and Machine Learning
- Expert Insights on Mentoring
- Test Automation: Automated Software Testing
- Software Testing Foundation 2018: Fundamentals
- Building and Leading Successful Teams
- Fostering Mentoring Relationships
- Cybersecurity and Networking Fundamentals
- Expanding Your Communication Skill Set
- Managing Project Work (PMBOK® Guide Sixth Edition)
- Clean Coding Techniques: Introduction
- Managing and Engaging Stakeholders
- Be Liked and Respected in the Workplace
- Writing Effective E-mails and Instant Messages
- Becoming Your Own Best Coach
- Taking Responsibility for Your Accountability
- Stakeholder Communication: Software Projects & Stakeholder Communication
- Becoming an Effective Cross-functional Team Member
- Managing Snowflake: Administering a Snowflake Account
- Data Sharing in Snowflake: Implementing Secure Data Sharing
- Semi-structured Data: Loading and Querying JSON & XML Data in Snowflake
- Data Infrastructure with Snowflake
- Final Exam: The Snowflake Data Platform
- Track 3: Advanced Analytics with Snowflake
- Advanced Analytics: Performing Analytics Using Snowflake
- Queries in Snowflake: Search Optimization, External Table Partitions, & Views
- Continuous Data: Automating Data Ingestion from Cloud Storage into Snowflake
- Continuous Data: Ingesting Continuous Data in Snowflake
- Track 2: Working with the Snowflake Data Platform
- Data Loading in Snowflake: Unloading Data
- Data Loading in Snowflake: Fundamentals of Stages
- Queries in Snowflake: Getting Started with Performance Optimizations
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Secure Software Testing
- Pen Testing: End-user Behavior
- Defensive Coding for C/C++
- Defensive Coding Fundamentals for C/C++
- Supply Chain & Software Acquisition
- Defining Cryptography
- Software Acceptance, Deployment, Operations, & Maintenance
- Thinking Defensively about Functions & Methods
- Managing Network Interaction
- Errors & Exceptions
- Defensive Programming Methods
- Secure Requirements
- Tips & Tricks for Developing Secure Mobile Apps
- Java Defensive Techniques
- Security Vulnerabilities & Enterprise Considerations
- Defensive Programming Standards
- Defensive Coding for JavaScript and HTML5
- Defensive Coding Fundamentals for JavaScript and HTML5
- Cloud Security Fundamentals: Architectural & Design Concepts
- Cloud Security Fundamentals: Cloud Data Security
- Cloud Security Fundamentals: Legal & Compliance
- Cloud Security Fundamentals: Cloud Infrastructure Security
- ASP.NET MVC Web Applications: Implementing ASP.NET Authentication
- Defensive Coding for C#
- Protecting Data in iOS Apps
- iOS Architecture & Data Protection
- Data Security and Access Control
- Defensive Java Fundamentals
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Threat Modeling
- CCSP 2019: Application Development & Security
- CISSP: Risk Management
- Data Handling and Concurrency
- Securing .NET Programming
- Defensive Coding Fundamentals for C#
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Secure Coding Practices
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Core Concepts
- OWASP Overview
- A7 and A6: Leaky and Unprepared Applications
- A8 and A3: Cross-Site Attacks
- A4 and A2: Broken Applications
- A10 and A9: API and Component Attacks
- A5 and A1: Security and Injection
- Data Loading in Snowflake: Using External Stages
- Getting Started with Snowflake: Using Time Travel & the SnowSQL CLI
- Track 1: Getting Started with Snowflake
- Getting Started with Snowflake: Using the Snowflake Data Platform
- Getting Started with Snowflake: Queries, Dashboards, & Tables
- CISSP: Software Development Security
- Adopting IT Automation
- Packaging in DevOps: Application Packaging Mechanism
- API Security
- Introduction to Bash Scripting
- Being an Effective Team Member
- Introduction to PowerShell 5.0
- CompTIA A+ Core 2: Information Management & Change Management Processes
- Agile Best Practices for Tech Leaders: Scrum Artifacts
- Software Design and Development: Methodologies
- Software Design and Development: Software Engineering & SDLC Phases
- Automated Software Testing
- Need for Design Patterns & the Principles Guiding Design Patterns
- SOLID & GRASP
- Cloud Security Fundamentals: Cloud Application Security
- Top 10 List Items
- Agile & TDD Best Practices for APIs: Test-driven Development Strategy
- Transition to Scrum: Agile Foundation to Scrum
- Release & Sprint Planning
- Using Kanban in IT & Software Development
- Software Data Analysis: Project Management Metrics
- Using Docker for DevOps: Introduction to Docker
- Jenkins for DevOps: Jenkins Configuration for DevOps
- Software Testing for DevOps: DevOps Test Tools
- Cloud Computing Fundamentals: Introduction
- The Language of DevOps: DevOps Tools & Processes
- Shikha Shikha's Transcript
- Shikha Shikha's Wallet
- About Accredible