Site Map - skillsoft.digitalbadges.skillsoft.com
- User Authentication
- Srinivasa Pakala's Credentials
- Srinivasa Pakala's Wallet
- CGI Annual Tour F2025
- Artificial Intelligence: Business Strategies and Applications
- Emerging Data Trends: Navigating the Latest Trends in Data for Leaders
- Becoming a DEI Ally and Agent for Change
- Workplace Diversity, Equity, and Inclusion in Action
- Moving from Bias to Inclusion in a DEI Journey
- Recognizing and Addressing Micro-behaviors in the Workplace
- Measuring Outcomes and Using KPIs
- Detecting and Dealing with Performance Problems
- Planning an Effective Performance Appraisal
- Engaging and Challenging Your Top Performers
- Boosting Performance with the Employee Appraisal Process
- CGI APAC: Diversity, Equity, and Inclusion
- Generative AI and Its Impact to Everyday Business
- Establishing AI Guardrails and Governance
- CGI: Generative AI Foundations
- CGI Annual Tour F2024: Asia Pacific Global Delivery Centers of Excellence (retired October 2023)
- Adopting an Inclusion Mindset at Work
- Overcoming Your Own Unconscious Biases
- Understanding Unconscious Bias
- Overcoming Unconscious Bias in the Workplace
- Microservices Architecture
- Exploring Business Process Automation
- Preparing for the Additive Manufacturing Revolution
- IT Infrastructure Automation: Text File Processing & RegEx
- Current & Future Trends
- Automation Design & Robotics
- How Blockchain Technology is Transforming Businesses
- IT Infrastructure Automation: Automation & Scalability
- IT Infrastructure Automation: Python Automation Programming
- Neural Networks
- Applying Machine Learning
- IT Infrastructure Automation: Getting Started
- Exploring Blockchain
- Java Spring Cloud: Introduction to Microservices
- Developing with Blockchain
- IT Infrastructure Automation: Version Control & GIT
- Connecting with the Internet of Things
- Basic Concepts of a Microservices Architecture
- Introduction to Digital Currency
- IT Infrastructure Automation: Automated Monitoring
- Supervised Learning Models
- Uncertainty
- Unsupervised Learning
- Introduction to Artificial Intelligence
- Blockchain in Action & IoT
- Bitcoin Basics
- Bitcoin Technology Fundamentals
- Introduction to Machine Learning & Supervised Learning
- Convolutional and Recurrent Neural Networks
- Adversarial Problems
- Introducing Natural Language Processing
- Reinforcement Learning
- Constraint Satisfaction Problems
- Search Problems
- Correlation & Regression
- Cloud Computing Fundamentals: Security
- An Executive's Guide to Security: Understanding Security Threats
- Cloud Computing Fundamentals: Presence & Privacy
- An Executive's Guide to Security: Protecting Your Information
- The Language of DevOps: DevOps Principles & Practices
- Data Center Virtualization: vSphere & ESXi
- Data Collection & Exploration
- Process & Applications
- Key Statistical Concepts
- Data Mining, Data Distributions, & Hypothesis Testing
- Data Considerations in Analytics
- Cloud Computing Fundamentals: Cloud Virtualization & Data Centers
- Cloud Computing Fundamentals: Storing & Managing Cloud Data
- Cloud Computing Fundamentals: Migrating to the Cloud
- Internet of Things Applications
- Internet of Things Hardware
- Defensive Programmer: Defensive Techniques
- Software Testing Foundation 2018: Fundamentals
- T-SQL Queries
- Automated Software Testing
- Release & Sprint Planning
- Programming Strings & Data Structures
- Developing the Product & Sprint Backlogs
- Security Architect: Secure Coding Concepts
- Secure Programming for C#
- Software Data Analysis: Project Management Metrics
- Secure Programmer: Resiliency Coding
- Cloud Security Fundamentals: Cloud Application Security
- Jenkins for DevOps: Jenkins Configuration for DevOps
- Software Testing for DevOps: DevOps Test Tools
- Securing C# Applications
- Creating Secure C# Code
- Application Security in .NET
- Mobile Security Threats
- Source Coding Best Practices
- Secure Programmer: Encryption
- API Security
- CISSP: Software Development Security
- Code Access Security & Cryptography in .NET
- Agile Software Development - Scrum
- Agile Test-Driven Development
- Using Kanban in IT & Software Development
- Secure Design
- Security Threat Intelligence
- Security Threat Intelligence
- Forensic Analysis: Cybercrime Investigations
- Network & Host Analysis: Network Operations
- Malware Removal: Identifying Malware Types & Classification Approaches
- Network & Host Analysis: Network Analysis Formats
- CyberOps Windows Hardening: Windows Server Hardening Best Practices
- Malware Removal: Reporting Findings & Preventing Future Infections
- Security Programming: Scripting Essentials
- Threat Intelligence & Attribution Best Practices: Threat Intelligence Concepts
- Security Programming: Code Identification
- Security Programming: System Essentials
- Malware Removal: Remediating an Infected System
- Malware Removal: Analyzing an Infected System
- Network & Host Analysis: Network Protocols
- Threat Intelligence & Attribution Best Practices: Attribution Analysis
- CyberOps Windows Hardening: Windows Workstation Hardening Best Practices
- Network & Host Analysis: Protocol Analysis
- Final Exam: Security Threat Intelligence
- Network Survey & Extraction: Network Analysis
- Network Survey & Extraction: Network Monitoring
- Network & Host Analysis: Network Observations
- Securing .NET Programming
- Using Docker for DevOps: Introduction to Docker
- Secure Application Architecture & IAM
- Security Programming: Command Line Essentials
- DevOps Security Considerations: DevSecOps Principles
- Secure Programmer: Security Concepts
- Secure Programmer: Vulnerabilities
- Secure Programmer: Attacks
- Defensive Programmer: Defensive Concepts
- The Language of DevOps: DevOps Tools & Processes
- OWASP: Top 10 Items A9, A8, & A7
- Secure Programmer: Coding Practices
- Secure System, Application Design, & Deployment
- Top 10 List Items
- OWASP Overview
- Application Security Awareness & Validation
- Cloud Computing Fundamentals: Introduction
- Software Development Security & Life Cycle
- Software Security Best Practices
- CompTIA Cybersecurity Analyst+: Data Privacy
- CompTIA Cybersecurity Analyst+: Encryption & Hashing
- CompTIA Cybersecurity Analyst+: Software Development Security
- SecOps Engineer: Secure Coding
- SecOps Engineer: System Infrastructure Security
- SecOps Engineer: Security Engineering
- Certified Information Systems Auditor (CISA) 2019: Data Privacy & Risk
- Security Architecture and Engineering
- Defensible Security
- CompTIA CASP+: Cryptography & PKI
- CEH v11: Web Server Hacking, Attacks & Attack Methodologies
- OWASP Top 10: A1 - Injection
- OWASP Top 10: A2 - Broken Authentication
- OWASP Top 10: A4 - XML External Entities
- OWASP Top 10: A3 - Sensitive Data Exposure
- OWASP Top 10: A5 - Broken Access Control
- OWASP Top 10: A6 - Security Misconfiguration
- OWASP Top 10: A7 - Cross-site Scripting
- OWASP Top 10: A9 - Using Components with Known Vulnerabilities
- OWASP Top 10: A10 - Insufficient Logging & Monitoring
- OWASP Top 10: Discovering & Exploiting Web App Vulnerabilities
- Introduction to Cyber Operations
- OWASP: Web Application Security
- OWASP: Top 10 & Web Applications
- CompTIA CASP+: Authentication & Authorization
- CEH v11: Web Application Hacking & Login Attacks
- CEH v11: XSS, Web Shells, APIs & Webhooks
- OWASP Top 10: A01:2021-Broken Access Control
- OWASP Top 10: A02:2021-Cryptographic Failures
- OWASP Top 10: A03:2021-Injection
- OWASP Top 10: A04:2021-Insecure Design
- OWASP Top 10: A05:2021-Security Misconfiguration
- OWASP Top 10: A06:2021-Vulnerable & Outdated Components
- OWASP Top 10: A07:2021-Identification & Authentication Failures
- OWASP Top 10: A09:2021-Security Logging & Monitoring Failures
- OWASP Top 10: A08:2021-Software & Data Integrity Failures
- OWASP Top 10: A10:2021-Server-Side Request Forgery (SSRF)
- OWASP Top 10: Web Application Security
- Data Lakes
- Modern Data Management: Data Management Systems
- Modern Data Warehouses
- Enterprise Architecture Basics
- Welcome to the Leadership Development Program
- Architecture Capability Basics
- Content Framework
- Enterprise Architecture Planning & Implementation
- Enterprise Architecture: Architectural Principles & Patterns
- Cloud Data Architecture: Data Management & Adoption Frameworks
- Scalable Data Architectures: Using Amazon Redshift & QuickSight
- Service Oriented Architecture (SOA) Governance
- Architectural Artifacts & the Enterprise Continuum
- Transforming Data
- Data Warehouse Essential: Architecture Frameworks & Implementation
- Reference Models
- Architecture Capability Framework
- Data Architecture Getting Started
- Security Architecture
- Architecture Development Method (ADM) Cycle
- Concepts & Conceptual Design
- Big Data Solutions, Architecture, CQL, & DDL
- Relational Database & Data Warehouse Basics
- OWASP Top 10: Securing Web Applications
- Streaming Data Architectures: An Introduction to Streaming Data in Spark
- Artificial Intelligence: Basic AI Theory
- Digital Transformation Insights: Finance, Accounting & IT Functions
- Microsoft Azure Fundamentals: Software Development
- CompTIA Cloud Essentials+: Cloud Native Apps & Cloud Data Analytics
- Data Science Tools
- The Four Vs of Data
- Data Exploration
- Mitigating Security Risks: Information, Cloud, & Data Security Risk Considerations
- Data Science Overview
- Data Filtering
- Data Analysis Concepts
- Data Gathering
- Azure Developer: Azure Cloud Technology Solutions
- Streaming Data Architectures: Processing Streaming Data with Spark
- Data Integration
- Data Transformation
- Clustering, Errors, & Validation
- Machine Learning Introduction
- Estimates & Measures
- Data Communication & Visualization
- Srinivasa Pakala's Transcript
- Srinivasa Pakala's Wallet
- About Accredible