Site Map - skillsoft.digitalbadges.skillsoft.com
- User Authentication
- Varada Dave's Credentials
- Varada Dave's Wallet
- Fostering a Growth Mindset in the Age of AI
- Git & GitHub: Introduction
- Exploring Business Process Automation
- Data Access & Governance Policies: Data Classification, Encryption, & Monitoring
- Hybrid Environment Pipelines: Hybrid Cloud Transformation
- Automation Design & Robotics
- CCSP 2022: Cloud Security Concepts & Design Principles
- Leading Security Teams for GenAI Solutions: Use of Generative AI
- Responsible Use of AI
- Embracing Agile at Scale
- PRINCE2® Project Management Overview (2017 Update)
- Testing Methods
- Effective Team Communication
- Identifying Risk (PMBOK® Guide Sixth Edition)
- Code Quality, Testing, & Development
- Software Design and Development: Design Patterns & SOLID Principles
- Agile Project Planning
- Generative AI APIs for Practical Applications: An Introduction
- Artificial Intelligence and Machine Learning
- Recognizing Hallucinations, Inaccuracies, and Bias in AI
- CompTIA Security+: Monitoring, Visibility, & Reporting
- CompTIA Security+: Wireless, Mobile, & Embedded Device Security
- CompTIA Security+: Risk Management, Privacy, & Sensitive Data Security
- CompTIA Security+: Basic Cryptography & Public Key Infrastructure
- CompTIA Security+: Authentication & Authorization Design Concepts
- CompTIA Security+: Implementing Identity and Account Management & AAA Solutions
- CompTIA Security+: Organizational Security Assessment Tools & Mitigation Controls
- CompTIA Security+: Physical Security Controls
- CompTIA Security+: Incident Response, Digital Forensics, & Supporting Investigations
- CompTIA Security+: Implementing Secure Network Designs
- CompTIA Security+: Security Policies, Regulations, Standards, & Frameworks
- CompTIA Security+: Implementing Secure Protocols & Application Security Solutions
- CompTIA Security+: Controls & Application Development, Deployment, & Automation
- CompTIA Security+
- TechLeap - CompTIA Security+ School
- CompTIA Security+: Security Concepts in an Enterprise Environment
- CompTIA Security+: Implementing Cybersecurity Resilience
- CompTIA Security+: Virtualization, Cloud Computing, & Cloud Cybersecurity Solutions
- CompTIA Security+: Analyzing Application & Network Attacks
- CompTIA Security+: Social Engineering Techniques & Other Attack Types
- CompTIA Security+: Threat Actors, Intelligence Sources, & Vulnerabilities
- Telling a Business Story
- A Difficult Boss Doesn't Have to Be a Difficult Problem
- Expert Insights on Managing Yourself
- Resolving Workplace Conflict
- Difficult People: Can't Change Them, so Change Yourself
- Getting Your Pitch Heard
- Expert Insights on Difficult Conversations
- Expert Insights on Dealing with Conflict
- Confronting Workplace Conflict
- Expert Insights on Managing Stress
- Expert Insights on Presentation Skills
- Expert Insights on Mindsets
- How to Manage Difficult Conversations
- Difficult People: Strategies to Keep Everyone Working Together
- Planning an Effective Presentation
- Building Your Presentation
- Difficult People: Why They Act That Way and How to Deal with Them
- Presentation Mastery Series
- Managing Yourself
- Year 2 Phase 1: 0 to 3 Months
- How to Beat Fatigue and Sleep Better
- Eating Healthy for Less
- Difficult Conversation
- Get the Best of Stress
- Year 2 Phase 2: 4 to 6 Months
- Presentation Skills
- Year 2 Phase 4: 10 to 12 Months
- Dealing with Conflict
- Year 2 Phase 3: 7 to 9 Months
- Expert Insights on Creative Thinking & Brainstorming
- Developing a Growth Mindset
- Expert Insights on Managing Fear
- Developing Personal Accountability
- Becoming Your Own Best Coach
- Using Business Etiquette to Increase Your Professionalism
- Lateral Thinking for Innovative Mindset
- Unleashing Personal and Team Creativity
- Developing Diplomacy and Tact
- Expert Insights on Trust
- Remaining Tactful and Diplomatic under Pressure
- Navigating Challenging Situations with Diplomacy and Tact
- Being a Responsible Corporate Digital Citizen
- Developing Your Business Ethics
- The Building Blocks of Building Trust
- Verifying and Building on Creative Ideas
- Brainstorming Series
- Expert Insights on Ethics
- Steps to Creativity Series
- Earning and Offering Trust at Work
- Making Time for Fitness
- Ethics, Integrity, & Trust
- IVM - SOC Analyst
- TechLeap - IVM - School - ECSA
- Leading In The New Normal Leadercamp: Session 2 Replay
- Packaging in DevOps: Application Packaging Mechanism
- Being an Effective Team Member
- CompTIA A+ Core 2: Information Management & Change Management Processes
- Business Analysis Activities and Tools
- Business Analysis Overview
- Software Design and Development: Methodologies
- Software Design and Development: Software Engineering & SDLC Phases
- Effective Stakeholder Communications for Technology Professionals
- Leveraging the Power of Analogical Thinking
- Sharpening Your Focus to Stay on Track
- Leading with Executive Presence
- Proven Techniques for Technical Communication
- Taking the Lead with Workplace Motivation and Engagement
- Maximize Your Productivity by Managing Time and Tasks
- Outwitting Your Cognitive Bias
- Communicating with Confidence
- Choosing the Right Interpersonal Communication Method to Make Your Point
- Capturing the Attention of Senior Executives
- Trust Building through Effective Communication
- The Art of Staying Focused
- Investigating Arguments
- The Art and Science of Communication
- How Culture Impacts Communication
- Audience and Purpose in Business Writing
- Make The Time You Need: Get Organized
- Making an Impact with Non-verbal Communication
- Aligning Goals and Priorities To Manage Time
- Clarity and Conciseness in Business Writing
- Confronting Your Assumptions
- Do We Have A Failure to Communicate?
- Using Communication Strategies to Bridge Cultural Divides
- Keeping Business Calls Professional
- Reaching Sound Conclusions
- Expert Insights on Critical Thinking
- Editing and Proofreading Business Documents
- Writing and Preparing an Effective Speech
- Improving Your Technical Writing Skills
- Conquering the Challenges of Public Speaking
- Michelle Boockoff-Bajdek on Public Speaking From A to D (Analog to Digital)
- Strength under Pressure: Building Perseverance and Resilience
- How to Get Out of Your Own Way and Achieve Success
- Time Management
- Maintaining Balance in Life
- Embracing Happiness
- Accessibility
- 360 Value Meter
- Design Thinking
- Sustainability
- Communication with Client / Client Centricity
- Etiquette & Conduct while working from Home
- Year 1 Phase 3: 7 to 9 Months
- Executive Presence
- Basic ST & Personal (Identity) story
- Organizing your Digital Workspace
- Oral Communication
- Written Business Communication
- Cross Cultural Communication
- Year 1 Phase 1: 0 to 3 months
- Building Your Resilience
- Year 1 Phase 2: 4 to 6 Months
- Critical Thinking
- Year 1 Phase 4: 10 to 12 Months
- Expert Insights on Time Management
- Saving Time by Setting Goals
- Managing Your Time So It Doesn’t Manage You
- Expert Insights on Listening
- Taking Effective and Professional Notes
- Listening Even When It's Difficult to Listen
- Using Active Listening in Workplace Situations
- Mindful at Work
- Shared Language
- Listening
- Remote Ways of Working (OmniConnect)
- Become a Great Listener
- Troublesome Words and Phrases: Usage Mistakes in Writing
- Creating Well-constructed Sentences
- Abbreviating, Capitalizing, and Using Numbers
- Business Grammar
- Getting the Details Right: Spelling Basics
- Using the Parts of Speech
- Using Punctuation Marks
- Ethical Hacker: Risk Assessment
- Mitigating Security Risks: Maintaining a Secure Workplace
- Mitigating Security Risks: Managing Security in a Hybrid Workplace
- Mitigating Security Risks: Managing the Incidents
- Mitigating Security Risks: Cyber Security Risks
- Risk Management & Outsourcing Design
- Mitigating Security Risks: Managing Risks from Internal Stakeholders
- Session & Risk Management
- Mitigating Security Risks: Information, Cloud, & Data Security Risk Considerations
- Mitigating Security Risks: Managing Physical Security Risks
- Mitigating Security Risks: Managing Social Engineering Risks
- Information Security Management
- Risk Management
- TechLeap - Curriculum for Integrated Risk and Compliance Services (IRCS) FY22
- Security Risks: Performing Security Risk Identification
- Information Risk Management Part II
- CompTIA CASP+: Assessing & Managing Risk
- Security Risks: Planning for Security Risk Management
- Information Risk Management Part I
- Mitigating Security Risks: Managing Information, Cloud, & Data Security Risks
- Mitigating Security Risks: Managing Network & Infrastructure Security Risks
- CISSP 2021: Risk Management
- Security Risks: Key Risk Terms & Concepts
- CompTIA Security+: Security Assessment & Penetration Testing Techniques
- DevOps Security Considerations: DevSecOps Principles
- Incident Tracking & Response
- Security Software Assessments
- Threat Intelligence & Attribution Best Practices: Threat Intelligence Concepts
- Cloud Computing Fundamentals: Security
- Cloud Security Management: Risk Management
- CISSP: Software Development Security
- Encryption & Malware
- Information Security Incident Management Part I
- CCSP 2019: Identity & Access Management
- Information Security Program Development Part I
- CompTIA Cybersecurity Analyst+: Monitoring Tools & Analytics
- Fundamental Security Concepts
- Social Engineering Threats and Prevention
- Backup & Recovery: Business Continuity & Disaster Recovery
- Security Program Regulatory Integration
- Risk Analysis: Security Risk Management
- Planning Security Strategies
- Cyber Security Audits
- Establishing Self-confidence for Life
- Ensuring Successful Presentation Delivery
- Becoming a Successful Collaborator
- Agile Principles and Methodologies
- Cultivating Enterprise Agile
- Cloud Security Fundamentals: Cloud Application Security
- Top 10 List Items
- Automated Software Testing
- Agile & TDD Best Practices for APIs: Test-driven Development Strategy
- SOLID & GRASP
- Varada Dave's Transcript
- Varada Dave's Wallet
- About Accredible