Site Map - skillsoft.digitalbadges.skillsoft.com
- User Authentication
- Tatjana Gricenko's Credentials
- Tatjana Gricenko's Wallet
- Blockchain Architectural Components & Platforms
- Generative AI Models: Getting Started with Autoencoders
- Generative AI Models: Generating Data Using Variational Autoencoders
- Generative AI Models: Generating Data Using Generative Adversarial Networks
- Modern Data Management: Data Governance
- Data Architecture Getting Started
- Cloud Computing Fundamentals: Introduction
- An Executive's Guide to Security: Understanding Security Threats
- Information Security: Subnetting & DNS for Security Architects
- Information Security: NACs & Gateways
- Information Security: Security Governance
- Session & Risk Management
- An Executive's Guide to Security: Protecting Your Information
- Fundamentals of AI & ML: Advanced Data Science Methods
- Getting Started with Large Language Models (LLMs)
- Using Generative AI Tools to Learn Python
- Prompt Engineering for Ethical Hacking
- Track 1: AI in Ethical Hacking
- Deep Learning and Neural Networks
- Generative AI on GCP: An Introduction
- Generative AI on GCP: Empowering Machine Language Workflows with Vertex AI
- Azure AI Fundamentals: Artificial Intelligence & Machine Learning
- Auditing & Incident Response
- Microsoft Security: Compliance Concepts & Methodologies
- Microsoft Security: Basic Azure AD Identity Services & Types
- Microsoft Security: Azure AD Authentication, Access, & Identity
- Microsoft Security: Azure Security Capabilities & Management
- Microsoft Security: Microsoft 365 Security & Security Management
- Microsoft Security: Microsoft 365 Insider Risk, eDiscovery, & Auditing
- Microsoft Security: Compliance, Information Protection, & Governance
- Certified in Cybersecurity (CC): Security Governance, Policies, & Controls
- Certified in Cybersecurity (CC): Core Security Principles & Risk Management
- Certified in Cybersecurity (CC): Incident Response
- Certified in Cybersecurity (CC): Business Continuity Planning
- Certified in Cybersecurity (CC): Logical Access Controls
- Certified in Cybersecurity (CC): Physical Access Controls
- Certified in Cybersecurity (CC): Networking & Security Infrastructure
- Certified in Cybersecurity (CC): Present Threats & Network Security Controls
- Certified in Cybersecurity (CC): Data Security & System Hardening
- Certified in Cybersecurity (CC): Security Best Practices & Security Awareness
- Text, Image, & Audio Generation with OpenAI
- Introduction to the OpenAI API
- Code, Relatedness, & Fine-tuning with OpenAI
- Google Generative AI APIs: Advanced Features of Bard & PaLM
- Google Generative AI APIs: Introduction to Google Bard
- Getting Started with Prompt Engineering
- Exploring Prompt Engineering Techniques
- Introduction to Generative AI on Azure
- Generative Modeling Foundations
- Generative AI with Azure OpenAI
- Google Generative AI APIs: Bard Fundamentals
- Google Generative AI APIs: Bard & the PaLM API Fundamentals
- Track 1: Fundamentals of Generative AI APIs for Practical Applications
- Track 3: Exploring the Capabilities of Google Generative AI APIs
- Leveraging Generative AI APIs
- Track 2: Harnessing OpenAI APIs for Powerful Application Solutions
- Leadercamp on-demand: Exploring Generative AI and ChatGPT
- Prompt Engineering: Ethical Hacking & Generative AI Fusion
- Prompt Engineering: Generative AI for Reconnaissance
- Prompt Engineering: Generative AI for Scanning & Enumeration
- Prompt Engineering: Generative AI for System Hacking
- Case Studies in Prompt Engineering
- Exploring the Depths of Large Language Models in Generative AI
- Prompt Engineering: Web Application & Database Hacking in the Age of GenAI
- Prompt Engineering: GenAI’s Impact on Network & Perimeter Ethical Hacking
- Prompt Engineering: Cloud Computing & IoT Hacking in the Era of GenAI
- Prompt Engineering: Mobile Platform Security in the GenAI Era
- Prompt Engineering: Covering Tracks with GenAI
- Leading Security Teams for GenAI Solutions: Enhancing Security Posture
- Leading Security Teams for GenAI Solutions: Use of Generative AI
- Generative AI and Its Impact to Everyday Business
- Harnessing the Disruption of Generative AI
- Recognizing Hallucinations, Inaccuracies, and Bias in AI
- Navigating AI Ethical Challenges and Risks
- Establishing AI Guardrails and Governance
- Reimagining the Customer Experience with Generative AI
- Reimagining the Sales Process with Generative AI
- Unlocking Business Solutions with AI-Powered Analytics
- Using AI to Improve the Employee Experience
- Encouraging Innovation and Experimentation with AI
- Leading through the AI Disruption with Empathy
- Leveraging AI as a Team Member
- Fostering a Growth Mindset in the Age of AI
- Leveraging Analytical and Critical Thinking to Implement AI
- Embracing Risk and Learning from Setbacks with AI Projects
- Reimagining Work with Generative AI
- Responsible Application and Guardrails for Generative AI
- Foundations of Generative AI
- Leading an AI Transformation
- Human Skills to Sustain an AI Transformation
- Generative AI Business Transformation
- Leading Security Teams for GenAI Solutions: Protecting Intellectual Property
- Developing an AI/ML Data Strategy: Building an AI-powered Workforce
- Leading in the Age of Generative AI
- Leadercamp on-demand: Leading with Generative AI
- Prompt Engineering: Generative AI for Malware & Social Engineering
- Leveraging Generative AI for Business
- Enterprise Security: Artificial Intelligence, Generative AI, & Cybersecurity
- Enterprise Security: Leveraging Generative AI with Common Security Tools
- Enterprise Security: Leveraging AI in Identity Security
- ChatGPT Prompt Engineering Examples & Use Cases
- ChatGPT & Its Practical Use Cases
- Finetuning Your ChatGPT Prompts
- ChatGPT's Impact on Various Industries
- Ethical, Privacy, & Intellectual Property Considerations for ChatGPT
- ChatGPT Journey
- The Role of ChatGPT in Shaping Our Future
- Generative AI APIs for Practical Applications: An Introduction
- An Introduction to Generative AI Concepts
- Leadercamp on-demand: Tips and Tools for Generative AI Success
- Security Incident Triage
- Cloud Services: Cloud Computing Concepts
- Cloud Security Administration: Cloud Data & Application Security
- Cloud Security Administration: Introduction
- Cloud Security Administration: Continuous Operational Improvement
- Cloud Security Administration: Regulatory Conformance
- Cloud Computing Fundamentals: Security
- Cloud Security Administration: Infrastructure Planning
- Cloud Security Administration: Hardened Cloud Security
- Cloud Computing Fundamentals: Presence & Privacy
- Cloud Security Fundamentals: Cloud Application Security
- Cloud Security Fundamentals: Legal & Compliance
- Cloud Security Management: Operations Security
- Cloud Security Fundamentals: Architectural & Design Concepts
- Cloud Security Fundamentals: Cloud Data Security
- Cloud Security Fundamentals: Cloud Infrastructure Security
- Cloud Security Fundamentals: Basics of Cloud Operations
- Security Configurations & Compliance Controls
- Cloud Computing Fundamentals: Risk Management
- Storytelling with Data: Introduction
- Transforming Your Business
- Northwestern University 101: Leading with Analytics
- Tatjana Gricenko's Transcript
- Tatjana Gricenko's Wallet
- About Accredible