Site Map - skillsoft.digitalbadges.skillsoft.com
- User Authentication
- Shri Gaurav Sachan's Credentials
- Shri Gaurav Sachan's Wallet
- Developing an AI/ML Data Strategy: Data Management & Governance in AI
- Generative AI Foundations: Advanced Generative AI Techniques for IT
- Prompt Engineering for Data: Combining & Visualizing Data Using Generative AI
- Generative AI Foundations: Ethical & Responsible Use of AI in IT
- AI in IT Automation: Developing AI-powered IT Solutions
- AI Tools for DevOps CI/CD Pipelines
- Future of AI in DevOps
- AI Release Management for DevOps
- Fundamentals of AI & ML: Advanced Data Science Methods
- An Introduction to Generative AI Concepts
- Getting Started with Large Language Models (LLMs)
- Generative AI Models: Generating Data Using Generative Adversarial Networks
- NLP with LLMs: Working with Tokenizers in Hugging Face
- AI Monitoring & Observability for DevOps
- An Executive's Guide to Security: Protecting Your Information
- Developing an AI/ML Data Strategy: Building an AI-powered Workforce
- Fundamentals of AI & ML: Foundational Data Science Methods
- Deep Learning and Neural Networks
- AI in the Workplace
- AI-enhanced Sales Strategies
- Secure Programmer: Intro to Programming Standards
- CompTIA A+ Core 2: Physical Security Measures
- CompTIA A+ Core 2: Operating System Security Best Practices
- CompTIA A+ Core 2: Social Engineering Attacks
- CompTIA Security+: Security Monitoring & Alerting
- CompTIA Security+: Effective Security Governance
- CompTIA Security+: Risk Management
- Understanding End-User Security
- Security Principles for DevSecOps
- Leveraging AI in Human Resources
- CCNA 2024: Network Topologies and Media
- CCNA 2024: TCP/IP Protocols and IPv4 Addressing
- A7 and A6: Leaky and Unprepared Applications
- A8 and A3: Cross-Site Attacks
- A4 and A2: Broken Applications
- A10 and A9: API and Component Attacks
- A5 and A1: Security and Injection
- CCNA 2020: IPv4 Subnetting
- Functions & Classes
- Getting Started & Manipulating Elements
- Advanced Features of JavaScript, CSS3, & HTML5
- Application Development with Node.js: Language Fundamentals
- Bootstrap Environment, Requirements, & Setup
- Bootstrap Forms & Layout
- Application Development with Node.js: Working with Features
- Application Development with Node.js: Managing Advanced Application Elements
- Android App Structure & Formatting
- Web Design Basics
- Tips & Tricks for Developing Secure Mobile Apps
- Introduction to Xamarin For .NET
- Configuration
- CCNA 2024: Wireless Principles and Securing Wireless Networks
- CompTIA A+ Core 1: Networking Concepts & Configurations
- CompTIA A+ Core 1: Networking Fundamentals
- Getting Started with Prompt Engineering
- Artificial Intelligence and Machine Learning
- An Introduction to Generative AI
- Responsible Use of AI
- SQL & Concurrency Concepts
- Concepts & Conceptual Design
- Logical & Physical Design
- Normalization Concepts & Forms
- Database Fundamentals: Working with SQL Commands
- CompTIA A+ Core 1: Cloud Computing Concepts
- Leveraging AI Insights & Text Analytics in Power BI
- Adopting the DevOps Mindset
- Analyzing, Querying, & Extracting Big Data
- Design Principles
- Requirements Engineering: An Introduction
- Fundamentals of Data Analytics
- Be Liked and Respected in the Workplace
- Polishing Your Feedback Skills
- Developing Personal Accountability
- Delivering Feedback That Encourages Growth
- Receiving Feedback with an Open Mind
- Conquering the Challenges of Public Speaking
- Building a Win-win Relationship with Your Manager
- New Project Manager Essentials
- Creating a Project Schedule and Budget
- Defining a Project Scope and Team
- Documents & Terminology
- Planning Documents
- Building Personal Power through Influence
- Taking Final Steps to Bring a Project to its Close
- Navigating through Changes and Conflicts in Projects
- Managing a Project to Minimize Risk and Maximize Quality
- Planning & Controlling the Project Schedule
- Project Management Practical Exercises
- Project Selection & Initiation
- Scope, Schedule, & Cost Planning
- Communication, Changes & Documentation
- Resource & Risk Planning
- Controlling Project Work & Closing
- Telling a Business Story
- Ensuring Successful Presentation Delivery
- Earning and Offering Trust at Work
- Leadercamp on-demand: Setting Professional Boundaries
- Leadercamp on-demand: Brand You, Brand Us
- Network Function Virtualization Fundamentals
- CompTIA A+ 220-1001: Implementing Network Concepts
- CompTIA A+ 220-1001: Network Types
- CompTIA A+ 220-1001: Networking Tools
- CompTIA A+ 220-1001: Configuring a Wired/Wireless Network
- CompTIA A+ 220-1001: Network Hosts
- Software-Defined Networking Fundamentals
- CompTIA A+ 220-1001: Networking
- CompTIA A+ 220-1001: Wireless Networking Protocols
- Network Security and Emerging Technologies
- Routing and Wide Area Networks
- Communication and Web Protocols
- TCP, UDP, Support and Management Protocols
- IP Addressing and IPv4 Subnetting
- Wireless LANs
- Ethernet LANs and Switching
- Networking Standards and Connections
- SCOR: Device Compliance, Exfiltration, Telemetry, & Security Products
- SCOR: Working with ESA, CES, & WSA
- SCOR: Cisco Umbrella & Endpoint Security
- SCOR: MDM, MFA, & Endpoint Solutions
- SCOR: Guest Services, BYOD, 802.1X, & CoA
- SCOR: SDN APIs & Security Appliance API Calls
- SCOR: Security Models & Frameworks
- SCOR: DHCP Snooping, DAI, IP Source Guard, Private VLANs, & Storm Control
- SCOR: Cisco Firepower, Traffic Management, Identity, & Authentication
- SCOR: Network Access & Secure Network Management
- SCOR: Configuring and Verifying VPN & IPsec
- SCOR: Port Security, VLAN Hopping, Network Hardening, & Access Control
- SCOR: Cloud Deployment, Service Models, Responsibilities, & Security
- SCOR: Security Vulnerabilities, Attack Mitigations, & Cryptographic Solutions
- SCOR: VPNs, Security Intelligence, & Social Engineering Attacks
- SCOR: PKI & IKE
- SCOR: Security Basics & Common Threats
- OWASP Top 10: A09:2021-Security Logging & Monitoring Failures
- OWASP Top 10: A08:2021-Software & Data Integrity Failures
- OWASP Top 10: A10:2021-Server-Side Request Forgery (SSRF)
- OWASP Top 10: A02:2021-Cryptographic Failures
- OWASP Top 10: A03:2021-Injection
- OWASP Top 10: A04:2021-Insecure Design
- OWASP Top 10: A05:2021-Security Misconfiguration
- OWASP Top 10: A06:2021-Vulnerable & Outdated Components
- OWASP Top 10: A07:2021-Identification & Authentication Failures
- OWASP Top 10: Securing Web Applications
- OWASP Top 10: A01:2021-Broken Access Control
- Mobile Device Security & Handling
- Configuring Enterprise-level Security
- Mobile Security Threats
- Mobile Security Threat Mitigation
- Containers & Wrappers
- Mobile Security Technologies
- Understanding Mobile Devices, Information Security, and Social Trend
- CCNA 2020: Static Routing
- Decoding the Packet Header & Discovering ICMPv6
- Exploring Addresses
- Benefits & Allocating Addresses
- ENARSI: IPv6 First Hop Security and AAA, ACL, uRPF, & CoPP Troubleshooting
- CCNA 2020: IPv6 Addressing & Configuration
- Cryptography: Introduction to PKI
- Cryptography: Introduction to Cryptography Services
- Securing Information using Cryptography
- CompTIA Linux+: Security Threats & Cryptography
- SQL Security Architecture
- Python Development: Getting Started with Programming in Python
- CompTIA Network+: OSI Model Layers & Data Encapsulation
- Wearable Technology & UI/UX
- Designing with Flexibility & Efficiency in Mind
- Introduction To UI/UX
- Exploring Chatbots
- Voice User Interfaces
- UI/UX for Chatbot & Voice Interface AIs
- Internet of Things & UI/UX
- Ethical Hacker: Overview & Threats
- CISSP 2021: Risk Management
- Systems Hardening
- CompTIA Network+: Network Operations
- CCSP 2022: Manage Security Operations
- CISM 2022: Social Engineering & Malware
- Certified in Cybersecurity (CC): Present Threats & Network Security Controls
- Effective Stakeholder Communications for Technology Professionals
- Proven Techniques for Technical Communication
- Choosing the Right Interpersonal Communication Method to Make Your Point
- Capturing the Attention of Senior Executives
- Trust Building through Effective Communication
- The Art and Science of Communication
- Enhancing Communication through Listening
- Harnessing the Power of the Written Word
- Conveying Your Message without Words
- Expanding Your Communication Skill Set
- Saving Time by Setting Goals
- Sharpening Your Focus to Stay on Track
- Managing Your Time So It Doesn’t Manage You
- Maximize Your Productivity by Managing Time and Tasks
- The Art of Staying Focused
- Make The Time You Need: Get Organized
- Aligning Goals and Priorities To Manage Time
- Be Productive by Working Efficiently
- Gauging Your Leadership Performance
- Leading through Inspiration
- Leading in the Age of Generative AI
- Encouraging Innovation and Experimentation with AI
- Leading through the AI Disruption with Empathy
- Self-improvement for Lifelong Success
- Problem Solving: Generating Solutions
- Building Success through Self-improvement
- Shri Gaurav Sachan's Transcript
- Shri Gaurav Sachan's Wallet
- About Accredible