Site Map - skillsoft.digitalbadges.skillsoft.com
- User Authentication
- Tejashwini Gopalakrishna's Credentials
- Tejashwini Gopalakrishna's Wallet
- Becoming Your Own Best Coach
- Data Access & Governance Policies: Data Access Governance & IAM
- Test Automation: Automated Software Testing
- Generative AI APIs for Practical Applications: An Introduction
- Artificial Intelligence and Machine Learning
- Getting Started with PowerShell
- Cloud Computing Fundamentals: Security
- Google Cloud Architect: Security
- CCSP 2022: Data Center Design & Risk Analysis
- Securing AWS: Infrastructure Security
- Securing the Azure Environment
- Backup & Recovery: Enterprise Backup Strategies
- CompTIA Cloud+: Cloud Architecture & Models
- Python Development: Getting Started with Programming in Python
- Infrastructure Security
- An Executive's Guide to Security: Understanding Security Threats
- CompTIA A+ 220-1001: Storage Solutions
- Certified Information Systems Auditor (CISA) 2019: Performance & Management
- Software-Defined Networking Fundamentals
- Data Center Design
- Virtualization Benefits & Components
- The Language of DevOps: DevOps Principles & Practices
- Git & GitHub: Introduction
- Adopting the DevOps Mindset
- CloudOps: Infrastructure as Code
- Kubernetes Administrator: Kubernetes Fundamentals for Administrators
- Site Reliability: Engineering
- DevOps Practices for the Enterprise
- Getting Started with Python: Introduction
- DevOps with Ansible: Overview
- Jenkins: Introduction
- Docker Containers, Images, & Swarms
- Introduction to Automation
- Splunk: Getting Started
- Application Security Awareness & Validation
- Cloud Security Fundamentals: Cloud Application Security
- API Security
- Need for Design Patterns & the Principles Guiding Design Patterns
- Agile Test-Driven Development
- Automated Software Testing
- Secure Application Architecture & IAM
- Top 10 List Items
- Certified Information Systems Auditor (CISA) 2019: Data Privacy & Risk
- A8 and A3: Cross-Site Attacks
- OWASP: Top 10 Items A3, A2, & A1
- A7 and A6: Leaky and Unprepared Applications
- Functions, Access Control, & Frameworks
- Defending Attacks
- Secure Implementation & Coding
- Secure Programmer: Attacks
- SOLID & GRASP
- Tejashwini Gopalakrishna's Transcript
- Tejashwini Gopalakrishna's Wallet
- About Accredible