Site Map - skillsoft.digitalbadges.skillsoft.com
- User Authentication
- Usha Nagarkoti's Credentials
- Usha Nagarkoti's Wallet
- ChatGPT Prompt Engineering Examples & Use Cases
- Systems Hardening
- Data Access & Governance Policies: Data Classification, Encryption, & Monitoring
- CCSP 2019: Identity & Access Management
- CCSP 2022: Cloud Security Concepts & Design Principles
- Leading Security Teams for GenAI Solutions: Use of Generative AI
- Responsible Use of AI
- Exploring Business Process Automation
- Using Robots and RPA in the Workplace
- Agile Best Practices for Tech Leaders: Scrum Artifacts
- Exploring Project Management, Then and Now (2021 Update)
- Agile Organizations: Building an Agile Culture
- Advanced Agile: Leadership Techniques
- Hybrid Environment Pipelines: Hybrid Cloud Transformation
- Validate and Control Scope (PMBOK® Guide Sixth Edition)
- Effective Team Communication
- Software Design and Development: Design Patterns & SOLID Principles
- CAPM®: Performance Measurement Metrics
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Security Design Principles
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Security Requirements
- Managing the Project Resources (2021 Update)
- Artificial Intelligence and Machine Learning
- Generative AI APIs for Practical Applications: An Introduction
- Establishing Effective Virtual Teams
- Governance, Risk Management, and Compliance
- Defining a Project Scope and Team
- DEVASC: Network & Network Communication Basics
- Cloud Security Fundamentals: Cloud Application Security
- Automated Software Testing
- Need for Design Patterns & the Principles Guiding Design Patterns
- Application Security Awareness & Validation
- API Security
- Secure Application Architecture & IAM
- Defensive Coding Fundamentals for C#
- Defensive Coding for C#
- Defensive Coding Fundamentals for JavaScript and HTML5
- Defensive Coding for JavaScript and HTML5
- ASP.NET MVC Web Applications: Implementing ASP.NET Authentication
- Securing .NET Programming
- OWASP Overview
- A8 and A3: Cross-Site Attacks
- CCSP 2019: Application Development & Security
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Core Concepts
- Top 10 List Items
- Secure Design
- CISSP: Risk Management
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Secure Design Principles
- A7 and A6: Leaky and Unprepared Applications
- A4 and A2: Broken Applications
- A10 and A9: API and Component Attacks
- A5 and A1: Security and Injection
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Threat Modeling
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Secure Coding Practices
- SOLID & GRASP
- Replication & Security
- Introduction
- Libraries
- Reactive Programming
- Material & Elements
- Testing & TDD
- Usha Nagarkoti's Transcript
- Usha Nagarkoti's Wallet
- About Accredible