Site Map - skillsoft.digitalbadges.skillsoft.com
- User Authentication
- Sindhu Bangalore Channabasavadevaru's Credentials
- Sindhu Bangalore Channabasavadevaru's Wallet
- JavaScript: Closures & Prototypes
- FSD Front-end Development: Advanced CSS Browser Features
- Collections in Java: Lists & List Operations
- Collections in Java: Sets & Maps
- Collections in Java: Arrays & Non-parameterized ArrayLists
- Java Programming: Working with Strings & Wrapper Objects
- Mapping Relationships in Java: Modeling Is-a Relationships Using Inheritance
- Mapping Relationships in Java: Constructors & Polymorphism
- Mapping Relationships in Java: Working with Interfaces & Class Loaders
- Handling Errors: An Introduction to Exceptions
- Mapping Relationships in Java: Overriding Methods and Using Access Modifiers
- Data Access & Governance Policies: Data Classification, Encryption, & Monitoring
- CCSP 2019: Identity & Access Management
- CCSP 2022: Cloud Security Concepts & Design Principles
- Exploring Project Management, Then and Now (2021 Update)
- Modeling Entities in Java: Getting Started with Classes & Objects
- Control Structures in Java: Implementing Java Control Structures
- Modeling Entities in Java: Defining Custom Classes & Objects
- Getting Started with Java: Writing & Running Java Programs
- Getting Started with Java: Variables & Primitive Types
- Getting Started with Java: Operators
- Exploring Business Process Automation
- Hybrid Environment Pipelines: Hybrid Cloud Transformation
- Using Robots and RPA in the Workplace
- Validate and Control Scope (PMBOK® Guide Sixth Edition)
- Effective Team Communication
- Modeling Entities in Java: Methods, Method Overloading, & Constructors
- Getting Started with Java: The Fundamentals of Java Programming
- Software Design and Development: Design Patterns & SOLID Principles
- CAPM®: Performance Measurement Metrics
- Leading Security Teams for GenAI Solutions: Use of Generative AI
- Responsible Use of AI
- Advanced Agile: Leadership Techniques
- A7 and A6: Leaky and Unprepared Applications
- A4 and A2: Broken Applications
- A5 and A1: Security and Injection
- Software Quality Assurance
- A10 and A9: API and Component Attacks
- OWASP Top 10: Securing Web Applications
- A8 and A3: Cross-Site Attacks
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Secure Coding Practices
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Core Concepts
- OWASP Overview
- Generative AI APIs for Practical Applications: An Introduction
- Artificial Intelligence and Machine Learning
- Secure Application Architecture & IAM
- Application Security Awareness & Validation
- API Security
- SOLID & GRASP
- Top 10 List Items
- Cloud Security Fundamentals: Cloud Application Security
- Sindhu Bangalore Channabasavadevaru's Transcript
- Sindhu Bangalore Channabasavadevaru's Wallet
- About Accredible