Site Map - skillsoft.digitalbadges.skillsoft.com
- User Authentication
- Siddhartha LAMICHHANE's Credentials
- Siddhartha LAMICHHANE's Wallet
- Gaining Insight through Organizational Awareness
- Using Performance Appraisals to Advance Your Career
- Getting Your Career on the Right Track
- Module 4
- Module 4 - Launching your IT career opportunities
- Power Up: Turning on Your Self-starter Potential
- Complete Guide to Excel 365: Using Formatting, Styles, & Themes
- Complete Guide to Excel 365: Working With Charts & Sparklines
- Developing Your Business Acumen
- How Blockchain Technology is Transforming Businesses
- Developing a Plan to Further Your Career
- Connecting with the Internet of Things
- Module 3
- Module 3 - Emerging Technologies and IT Career Pathways
- Building and Training the Project Team (2021 Update)
- New Project Manager Essentials
- Getting Started with Machine Learning
- Agile Principles and Methodologies
- Complete Guide to Excel 365: Getting Started
- Developing Diplomacy and Tact
- Cultivating Cross-functional Team Collaboration
- Enabling Business-IT Collaboration and Strategic Alignment
- Strategies for Managing Technical Teams
- Building Digital Dexterity in Organizations
- Building Trust with Business Ethics
- Module 2
- Module 2 - Navigating IT Careers and Professional Environments
- Security Analyst to Security Architect
- Security Architect
- Final Exam: Security Architect
- Vulnerability Analyst
- Security Incident Triage
- Security Program Regulatory Integration
- Security Architect: Ethical Hacking Best Practices
- Data Security Breach Notification Process
- Unified Security: Playbook Approach to Security
- Security Rules: Rules of Engagement
- Final Exam: Vulnerability Analyst
- Intelligent Orchestration: Automating Security Incident Processing
- Authentication & Encryption: Best Practices
- Incident Tracking & Response
- Security Vulnerabilities: Managing Threats & Vulnerabilities
- Security Architect: Secure Coding Concepts
- Defensible Security
- Intrusion Detection: Best Practices
- Intrusion Prevention: Best Practices
- Security Topologies: Developing Secure Networks
- Forensics Analyst
- Cryptography: Introduction to PKI
- Cryptography: Introduction to Cryptography Services
- Cyber Security Audits
- Final Exam: Forensics Analyst
- Security Software Assessments
- Security Analyst
- Final Exam: Security Analyst
- End-User Security: The End-User Perspective
- Digital Forensic Techniques & Investigative Approaches
- End-User Security: Securing End Users against Attackers
- Risk Analysis: Security Risk Management
- End-User Security: The Security Administrator Perspective
- Anomaly Detection: Aspects of Anomaly Detection
- Anomaly Detection: Network Anomaly Detection
- Ethics & Privacy: Digital Forensics
- An Executive's Guide to Security: Understanding Security Threats
- Auditing & Incident Response
- Information Security: APT Defenses
- Information Security: Subnetting & DNS for Security Architects
- Information Security: NACs & Gateways
- Information Security: Honeypots
- Information Security: Pen Testing
- Information Security: Continual Infrastructure Testing
- Information Security: Securing Networking Protocols
- Information Security: Security Governance
- Session & Risk Management
- An Executive's Guide to Security: Protecting Your Information
- Information Security: Hardened Security Topologies
- Synchronize Goals to Optimize Your Team
- Module 1
- Module 1 - Setting up your Individual & Team Learnings
- Becoming a Continuous Learner
- Contributing as a Virtual Team Member
- Building Customer Relationships in a Virtual Environment
- Learning from Failure and Success
- Facing Virtual Team Challenges
- RSTECH: Networking Hardware, Models, & Technologies
- RSTECH: Network Responsibilities, Addressing, & Utilities
- RSTECH: Troubleshooting, Upgrading, Recovering, & Resetting
- RSTECH: Cisco Equipment, Components, & Port Characteristics
- RSTECH: Cisco Memory Functions & Removing Cisco Devices
- RSTECH: OS Types, IOS Access, & Terminal Emulation
- RSTECH: IOS Commands, Startup-Config, & IOX-XE Modes
- AWS Cloud Practitioner 2023: Migration to the AWS Cloud & Cloud Economics
- AWS Cloud Practitioner 2023: Automation & Managed Services
- AWS Cloud Practitioner 2023: Shared Responsibility & Compliance
- AWS Cloud Practitioner 2023: Overview of Cloud Security
- AWS Cloud Practitioner 2023: Access Management
- AWS Cloud Practitioner 2023: Components & Resources for Security
- AWS Cloud Practitioner 2023: Deploying & Operating in the AWS Cloud
- AWS Cloud Practitioner 2023: AWS Compute Services
- AWS Cloud Practitioner 2023: AWS Storage Services
- AWS Cloud Practitioner 2023: AWS Database Services
- AWS Cloud Practitioner 2023: AWS Network Services
- AWS Cloud Practitioner 2023: ML, AI, & Data Analytics
- AWS Cloud Practitioner 2023: AWS Developer Services & Tools
- AWS Cloud Practitioner 2023: Pricing, Billing, Budgeting, & Cost Management
- AWS Cloud Practitioner 2023: Technical & Support Resources at AWS
- Site Reliability: Engineering
- Getting Started in Excel 2016 for Windows
- CompTIA A+ Core 1: Installing Hardware & Display Components
- Microsoft Azure Administrator: Manage Azure AD Users
- Windows 11 Desktop Troubleshooting
- CCNA 2020: Networking Components - NGFW, NGIPS, & Cisco DNA Center
- Certified in Cybersecurity (CC): Networking & Security Infrastructure
- AWS Cloud Practitioner 2023: Benefits & Design Principles of the AWS Cloud
- Systems Engineering for Complex Systems
- Siddhartha LAMICHHANE's Transcript
- Siddhartha LAMICHHANE's Wallet
- About Accredible