Site Map - skillsoft.digitalbadges.skillsoft.com
- User Authentication
- Venkatakrishna Babu's Credentials
- Venkatakrishna Babu's Wallet
- The Guiding Principles of the Service Value System and Continual Improvement Model
- The Service Value Chain and General Management Practices
- Event, Incident, and Problem Management
- Service Desk, IT Asset, Service Configuration, and Change Control Management
- Release, Service Level, and Availability Management
- ITIL® 4 Foundation: Key Concepts of Service Management
- ITIL® 4 Foundation: Introduction
- Key Concepts and the Four Dimensions of Service Management
- GenAI Academy: Yellow Belt Level 1
- AI in the Workplace
- GenAI Academy: White Belt
- Customer Service: Discovering Customer Needs
- Optimizing Your Workplace Well-being
- Recognizing Hallucinations, Inaccuracies, and Bias in AI
- Reimagining the Customer Experience with Generative AI
- Generative AI APIs for Practical Applications: An Introduction
- Planning and Managing the Project Budget (2021 Update)
- Generative AI and Its Impact to Everyday Business
- Prompt Engineering: Ethical Hacking & Generative AI Fusion
- Become a Great Listener
- Controlling Conflict, Stress, and Time in Customer Service
- Building Innovation Cultures and Leaders
- Leading an Innovation Culture to Future-proof Your Organization
- Taking Responsibility for Your Accountability
- Becoming an Effective Cross-functional Team Member
- Choosing the Right Interpersonal Communication Method to Make Your Point
- Capturing the Attention of Senior Executives
- Making an Impact with Non-verbal Communication
- Do We Have A Failure to Communicate?
- Proven Techniques for Technical Communication
- Communicating with Confidence
- Trust Building through Effective Communication
- The Art and Science of Communication
- Enhancing Communication through Listening
- Harnessing the Power of the Written Word
- Leading through Problem Solving and Decision Making
- Effective Stakeholder Communications for Technology Professionals
- Advancing Meaningful Diversity In The Workplace: Session Replay
- Resolving Workplace Conflict
- Confronting Workplace Conflict
- The Art of Staying Focused
- Conveying Your Message without Words
- Expanding Your Communication Skill Set
- Understanding Bias in Data Bootcamp: Session 1 Replay
- Expert Insights on Customer Relationships
- Facilitating Sustainable Change
- Making Change Stick
- Moving Forward with Change Planning
- Leading Your Team through Change
- Managing Motivation during Organizational Change
- Navigating Your Team through Strategic Change
- Removing Systemic Bias from Organizational Culture: Session Replay
- Becoming a DEI Ally and Agent for Change
- Building and Leading Successful Teams
- Leading the Team (2021 Update)
- Defining a Project Scope and Team
- Project Management Introduction (PMBOK® Guide Sixth Edition)
- Managing a Project to Minimize Risk and Maximize Quality
- Developing a Mindset of Growth and Learning
- Preparing Impactful Presentations that Drive Decision Makers to Action
- Strategies for Managing Technical Teams
- Make The Time You Need: Get Organized
- Handling Team Conflict
- Developing Emotional Intelligence
- PRINCE2® Project Management Overview (2017 Update)
- Risk Management: Project Risk Assessment
- Ethics and Project Management
- Workplace Diversity, Equity, and Inclusion in Action
- Outwitting Your Cognitive Bias
- Leading Diversity
- Leadership Insights on Leading Diversity
- Navigating Your Own Emotions
- Staying Balanced in a Shifting World
- Expert Insights on Working Effectively on a Team
- Bridging the Diversity Gap
- Ethical Hacker: Wireless Hacking Concepts
- Ethical Hacker: Wireless Hacking Tools
- Ethical Hacker: SQL Injection Types & Tools
- Ethical Hacker: Password Attacks Part 2
- Ethical Hacker: SQL Injection
- Ethical Hacker: Password Attacks
- Ethical Hacker: Vulnerability Analysis Concepts & Tools
- Ethical Hacker: ProxyChains & Enumeration
- Ethical Hacker: Host Discovery & Scanning with Nmap
- Ethical Hacker: Pentesting, Laws, & Standards
- Defining Cryptography
- Ethical Hacker: Footprinting
- Ethical Hacker: Security Controls Part 2
- Ethical Hacker: Overview & Threats
- Ethical Hacker: Hacking Concepts
- Ethical Hacker: Security Controls
- Agile Project Planning
- An Executive's Guide to Security: Understanding Security Threats
- Creating a Project Schedule and Budget
- Agile Principles and Methodologies
- Windows Server 2016 - Install, Store, & Compute: VM Motion & Network Load Balancing
- Data Center Virtualization: vSphere & ESXi
- Data Center Virtualization: vCenter Server
- Virtual Machine Management
- Storage Considerations
- Venkatakrishna Babu's Transcript
- Venkatakrishna Babu's Wallet
- About Accredible