Site Map - skillsoft.digitalbadges.skillsoft.com
- User Authentication
- Soumyaranjan Das's Credentials
- Soumyaranjan Das's Wallet
- Git & GitHub: Introduction
- Exploring Business Process Automation
- Data Access & Governance Policies: Data Classification, Encryption, & Monitoring
- Automation Design & Robotics
- CCSP 2022: Cloud Security Concepts & Design Principles
- Leading Security Teams for GenAI Solutions: Use of Generative AI
- Responsible Use of AI
- Embracing Agile at Scale
- PRINCE2® Project Management Overview (2017 Update)
- Testing Methods
- Hybrid Environment Pipelines: Hybrid Cloud Transformation
- Being an Effective Team Member
- Agile Project Planning
- Effective Team Communication
- Identifying Risk (PMBOK® Guide Sixth Edition)
- Code Quality, Testing, & Development
- Software Design and Development: Design Patterns & SOLID Principles
- ChatGPT Prompt Engineering Examples & Use Cases
- Generative AI APIs for Practical Applications: An Introduction
- Artificial Intelligence and Machine Learning
- Test Automation: Automated Software Testing
- Need for Design Patterns & the Principles Guiding Design Patterns
- Enterprise Security: Artificial Intelligence, Generative AI, & Cybersecurity
- Introduction to Generative AI on Azure
- Leadercamp on-demand: Exploring Generative AI and ChatGPT
- Generative AI and Its Impact to Everyday Business
- Harnessing the Disruption of Generative AI
- Recognizing Hallucinations, Inaccuracies, and Bias in AI
- Navigating AI Ethical Challenges and Risks
- Establishing AI Guardrails and Governance
- CompTIA Security+: Risk Management, Privacy, & Sensitive Data Security
- CompTIA Security+: Organizational Security Assessment Tools & Mitigation Controls
- CompTIA Security+: Incident Response, Digital Forensics, & Supporting Investigations
- CompTIA Security+: Implementing Secure Network Designs
- CompTIA Security+: Security Policies, Regulations, Standards, & Frameworks
- CompTIA Security+
- TechLeap - CompTIA Security+ School
- CompTIA Security+: Wireless, Mobile, & Embedded Device Security
- CompTIA Security+: Basic Cryptography & Public Key Infrastructure
- CompTIA Security+: Authentication & Authorization Design Concepts
- CompTIA Security+: Implementing Identity and Account Management & AAA Solutions
- CompTIA Security+: Physical Security Controls
- CompTIA Security+: Implementing Secure Protocols & Application Security Solutions
- CompTIA Security+: Monitoring, Visibility, & Reporting
- CompTIA Security+: Analyzing Application & Network Attacks
- CompTIA Security+: Security Concepts in an Enterprise Environment
- CompTIA Security+: Threat Actors, Intelligence Sources, & Vulnerabilities
- CompTIA Security+: Implementing Cybersecurity Resilience
- CompTIA Security+: Virtualization, Cloud Computing, & Cloud Cybersecurity Solutions
- CompTIA Security+: Controls & Application Development, Deployment, & Automation
- CompTIA Security+: Social Engineering Techniques & Other Attack Types
- Telling a Business Story
- A Difficult Boss Doesn't Have to Be a Difficult Problem
- Expert Insights on Creative Thinking & Brainstorming
- Resolving Workplace Conflict
- Difficult People: Can't Change Them, so Change Yourself
- Getting Your Pitch Heard
- Expert Insights on Dealing with Conflict
- Confronting Workplace Conflict
- Difficult People: Strategies to Keep Everyone Working Together
- Planning an Effective Presentation
- Building Your Presentation
- Difficult People: Why They Act That Way and How to Deal with Them
- Brainstorming Series
- Steps to Creativity Series
- Lateral Thinking for Innovative Mindset
- Year 2 Phase 1: 0 to 3 Months
- How to Beat Fatigue and Sleep Better
- Eating Healthy for Less
- Presentation Skills
- Year 2 Phase 4: 10 to 12 Months
- Dealing with Conflict
- Year 2 Phase 3: 7 to 9 Months
- Threat detection with Azure Sentinel analytics
- Threat response with Azure Sentinel playbooks
- Microsoft Azure Infrastructure Solutions: Policy & Monitoring
- Unleashing Personal and Team Creativity
- Expert Insights on Trust
- Remaining Tactful and Diplomatic under Pressure
- Expert Insights on Managing Yourself
- Expert Insights on Difficult Conversations
- Expert Insights on Managing Stress
- Navigating Challenging Situations with Diplomacy and Tact
- Expert Insights on Presentation Skills
- Expert Insights on Mindsets
- Being a Responsible Corporate Digital Citizen
- Developing a Growth Mindset
- How to Manage Difficult Conversations
- Developing Your Business Ethics
- Becoming More Professional through Business Etiquette
- Becoming an Accountable Professional
- The Building Blocks of Building Trust
- Verifying and Building on Creative Ideas
- Becoming Your Own Best Boss
- Expert Insights on Ethics
- Expert Insights on Managing Fear
- Presentation Mastery Series
- Developing Personal Accountability
- Becoming Your Own Best Coach
- Using Business Etiquette to Increase Your Professionalism
- Earning and Offering Trust at Work
- Making Time for Fitness
- Ethics, Integrity, & Trust
- Managing Yourself
- Difficult Conversation
- Get the Best of Stress
- Year 2 Phase 2: 4 to 6 Months
- Microsoft Azure Infrastructure Solutions: Policy & Monitoring
- Developing Diplomacy and Tact
- Incident Tracking & Response
- CISSP: Software Development Security
- CompTIA Cybersecurity Analyst+: Monitoring Tools & Analytics
- Information Security Incident Management Part I
- CompTIA Security+: Security Assessment & Penetration Testing Techniques
- DevOps Security Considerations: DevSecOps Principles
- Encryption & Malware
- CCSP 2019: Identity & Access Management
- Social Engineering Threats and Prevention
- Threat Intelligence & Attribution Best Practices: Threat Intelligence Concepts
- Cloud Computing Fundamentals: Security
- Fundamental Security Concepts
- Becoming a Successful Collaborator
- Establishing Self-confidence for Life
- Ensuring Successful Presentation Delivery
- Agile Principles and Methodologies
- Cultivating Enterprise Agile
- CompTIA A+ 220-1002: Critical Security Concepts
- Authentication
- Permissions
- Defining Cryptography
- Access Control and Security Architecture Design
- Cloud Security Fundamentals: Cloud Application Security
- Agile & TDD Best Practices for APIs: Test-driven Development Strategy
- Developing the Product & Sprint Backlogs
- Transition to Scrum: Agile Foundation to Scrum
- Using Docker for DevOps: Introduction to Docker
- Software Testing for DevOps: DevOps Test Tools
- The Language of DevOps: DevOps Tools & Processes
- Cloud Computing Fundamentals: Introduction
- Release & Sprint Planning
- Using Kanban in IT & Software Development
- Software Data Analysis: Project Management Metrics
- Leveraging the Power of Analogical Thinking
- Taking the Lead with Workplace Motivation and Engagement
- Outwitting Your Cognitive Bias
- Investigating Arguments
- Confronting Your Assumptions
- Reaching Sound Conclusions
- Expert Insights on Critical Thinking
- Etiquette & Conduct while working from Home
- Critical Thinking
- Year 1 Phase 4: 10 to 12 Months
- SOLID & GRASP
- Automated Software Testing
- Accessibility
- Year 1 Phase 2: 4 to 6 Months
- Proven Techniques for Technical Communication
- Choosing the Right Interpersonal Communication Method to Make Your Point
- Capturing the Attention of Senior Executives
- Trust Building through Effective Communication
- Do We Have A Failure to Communicate?
- Communication with Client / Client Centricity
- AWS CI/CD School
- TechLeap - AWS CI/CD School
- Effective Stakeholder Communications for Technology Professionals
- Communicating with Confidence
- The Art and Science of Communication
- Making an Impact with Non-verbal Communication
- How Culture Impacts Communication
- Using Communication Strategies to Bridge Cultural Divides
- Strength under Pressure: Building Perseverance and Resilience
- How to Get Out of Your Own Way and Achieve Success
- Year 1 Phase 3: 7 to 9 Months
- Organizing your Digital Workspace
- Cross Cultural Communication
- Building Your Resilience
- Leading with Executive Presence
- Audience and Purpose in Business Writing
- Clarity and Conciseness in Business Writing
- Editing and Proofreading Business Documents
- Improving Your Technical Writing Skills
- Executive Presence
- Written Business Communication
- Maintaining Balance in Life
- Design Thinking
- Basic ST & Personal (Identity) story
- Keeping Business Calls Professional
- Writing and Preparing an Effective Speech
- Conquering the Challenges of Public Speaking
- Michelle Boockoff-Bajdek on Public Speaking From A to D (Analog to Digital)
- Mindful at Work
- Embracing Happiness
- 360 Value Meter
- Sustainability
- Oral Communication
- Year 1 Phase 1: 0 to 3 months
- Business Grammar
- Shared Language
- Listening
- Remote Ways of Working (OmniConnect)
- Time Management
- Maximize Your Productivity by Managing Time and Tasks
- The Art of Staying Focused
- Expert Insights on Time Management
- Make The Time You Need: Get Organized
- Aligning Goals and Priorities To Manage Time
- Saving Time by Setting Goals
- Sharpening Your Focus to Stay on Track
- Managing Your Time So It Doesn’t Manage You
- Expert Insights on Listening
- Taking Effective and Professional Notes
- Using Active Listening in Workplace Situations
- Become a Great Listener
- Listening Even When It's Difficult to Listen
- Using Punctuation Marks
- Troublesome Words and Phrases: Usage Mistakes in Writing
- Creating Well-constructed Sentences
- Getting the Details Right: Spelling Basics
- Abbreviating, Capitalizing, and Using Numbers
- Java SE 11: Exception Handling
- Java SE 11: Strings & Primitive Data Types
- Java SE 11: Inheritance, Polymorphism, & Abstraction
- Java SE 11: Encapsulation
- Java SE 11: Objects & Classes
- Java SE 11: Expressions, Arrays, & Loops
- Java SE 11: Introduction to Java SE & the NetBeans IDE
- Java SE 11: Variables & Operators
- Using the Parts of Speech
- API Security
- Top 10 List Items
- Application Security Awareness & Validation
- Secure Application Architecture & IAM
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Secure Coding Practices
- CompTIA Cloud Essentials+: Security Considerations
- CompTIA Cloud+: Cloud Identity & Access Management
- AWS Professional Solutions Architect 2020: IAM Configurations
- Google Associate Cloud Engineer: Google Identity & Access Management (IAM)
- CompTIA Linux+: Introduction to Linux & the Command Line
- CompTIA Linux+: Using vi/vim to Edit Files
- CompTIA Linux+: File Access & Permissions
- CompTIA Linux+: Scheduling Tasks
- CompTIA Linux+: Locating & Manipulating Files
- CompTIA Linux+: Managing Services
- Microsoft Azure Security Technologies: Identity & Access Management
- Azure Active Directory & Collaboration
- RESTful Services for FSD: Building & Testing RESTful Services
- Identity & Access Services
- CompTIA CASP+: Authentication & Authorization
- Identity Management, Directory Services, and Federation
- CISSP 2021: Identity and Access Management Principles
- CISM 2020: Identity & Access Management
- Jenkins for DevOps: Jenkins Configuration for DevOps
- Identity and Access Management (IAM)
- Soumyaranjan Das's Transcript
- Soumyaranjan Das's Wallet
- About Accredible