Site Map - skillsoft.digitalbadges.skillsoft.com
- User Authentication
- Shubham Ravindra Patil's Credentials
- Shubham Ravindra Patil's Wallet
- Fostering a Growth Mindset in the Age of AI
- Git & GitHub: Introduction
- Exploring Business Process Automation
- Data Access & Governance Policies: Data Classification, Encryption, & Monitoring
- CCSP 2019: Identity & Access Management
- CCSP 2022: Cloud Security Concepts & Design Principles
- Leading Security Teams for GenAI Solutions: Use of Generative AI
- Responsible Use of AI
- PRINCE2® Project Management Overview (2017 Update)
- Testing Methods
- Hybrid Environment Pipelines: Hybrid Cloud Transformation
- Automation Design & Robotics
- Effective Team Communication
- Identifying Risk (PMBOK® Guide Sixth Edition)
- Code Quality, Testing, & Development
- Software Design and Development: Design Patterns & SOLID Principles
- Embracing Agile at Scale
- Agile Project Planning
- Business Analysis Overview
- Generative AI APIs for Practical Applications: An Introduction
- The Role of ChatGPT in Shaping Our Future
- Generative AI and Its Impact to Everyday Business
- Harnessing the Disruption of Generative AI
- Reimagining the Customer Experience with Generative AI
- OWASP Top 10: Securing Web Applications
- Packaging in DevOps: Application Packaging Mechanism
- CISSP: Software Development Security
- Being an Effective Team Member
- Software Design and Development: Methodologies
- Software Design and Development: Software Engineering & SDLC Phases
- CompTIA A+ Core 2: Information Management & Change Management Processes
- Need for Design Patterns & the Principles Guiding Design Patterns
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Secure Coding Practices
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Threat Modeling
- CCSP 2019: Application Development & Security
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Core Concepts
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Secure Design Principles
- CISSP: Risk Management
- OWASP Overview
- A7 and A6: Leaky and Unprepared Applications
- A8 and A3: Cross-Site Attacks
- A4 and A2: Broken Applications
- A10 and A9: API and Component Attacks
- A5 and A1: Security and Injection
- Secure Design
- Data Security and Access Control
- Data Handling and Concurrency
- Software Testing for DevOps: DevOps Test Tools
- Jenkins for DevOps: Jenkins Configuration for DevOps
- Using Docker for DevOps: Introduction to Docker
- The Language of DevOps: DevOps Tools & Processes
- Fundamentals
- Cloud Security Fundamentals: Cloud Application Security
- SOLID & GRASP
- Automated Software Testing
- Agile Test-Driven Development
- Agile Software Development - Scrum
- Software Data Analysis: Project Management Metrics
- Using Kanban in IT & Software Development
- Developing the Product & Sprint Backlogs
- Release & Sprint Planning
- Application Security Awareness & Validation
- API Security
- Text Mining & Social Network Analysis
- Secure Application Architecture & IAM
- Top 10 List Items
- Shubham Ravindra Patil's Transcript
- Shubham Ravindra Patil's Wallet
- About Accredible