Site Map - skillsoft.digitalbadges.skillsoft.com
- User Authentication
- Vikas Gupta's Credentials
- Vikas Gupta's Wallet
- Comparing Manual & Automated Testing
- Exploring CI: Continuous Integration & CI Tools
- Test Automation: Automated Software Testing
- Software Quality Assurance
- Working with DO Loops & Proc SQL
- Creating & Reading Data Sets
- Introduction to Data Sets
- Creating Summary Reports & Charts
- The SAS Environment
- Working with Arrays & Restructuring and Merging Data Sets
- Data Manipulation & Debugging
- Inputs & Outputs
- Creating Reports
- Data Errors & Validation
- Data Manipulation
- Correlation & Regression
- Data Collection & Exploration
- Data Considerations in Analytics
- Process & Applications
- Key Statistical Concepts
- Getting Started with Neural Networks: Perceptrons & Neural Network Algorithms
- Getting Started with Neural Networks: Biological & Artificial Neural Networks
- Machine & Deep Learning Algorithms: Imbalanced Datasets Using Pandas ML
- Building ML Training Sets: Introduction
- Building ML Training Sets: Preprocessing Datasets for Classification
- Building ML Training Sets: Preprocessing Datasets for Linear Regression
- Machine & Deep Learning Algorithms: Data Preparation in Pandas ML
- Bayesian Methods: Advanced Bayesian Computation Model
- Bayesian Methods: Bayesian Concepts & Core Components
- Implementing Bayesian Model and Computation with PyMC
- CompTIA PenTest+: Analyzing Tool & Script Output
- Ethical Hacker: Security Controls
- Event, Incident, and Problem Management
- Service Desk, IT Asset, Service Configuration, and Change Control Management
- Release, Service Level, and Availability Management
- Python Design Patterns: Working with Behavioral Design Patterns
- Key Concepts and the Four Dimensions of Service Management
- The Guiding Principles of the Service Value System and Continual Improvement Model
- The Service Value Chain and General Management Practices
- Python Design Patterns: Working with Creational Design Patterns
- Python Design Patterns: Principles of Good Design
- Python Design Patterns: Working with Structural Design Patterns
- Python Unit Testing: Testing Python Code Using doctest
- Python Unit Testing: Advanced Python Testing Using the unittest Framework
- Socket Programming in Python: Advanced Topics
- Python Unit Testing: An Introduction to Python's unittest Framework
- Python Unit Testing: Testing Python Code Using pytest
- Socket Programming in Python: Introduction
- Excel with Python: Constructing Data Visualizations
- Excel with Python: Working with Excel Spreadsheets from Python
- Python - Introduction to Pandas and DataFrames
- Python - Manipulating & Analyzing Data in Pandas DataFrames
- Excel with Python: Performing Advanced Operations
- Python - Introduction to NumPy for Multi-dimensional Data
- Python - Advanced Operations with NumPy Arrays
- Building Web Apps Using Django: Generic Views
- Building Web Apps Using Django: Models & User Registration
- Building Web Apps Using Django: Building a Basic Website
- Building Web Apps Using Django: Implementing Login & Logout
- Building Web Apps Using Django: Templates & User Administration
- Python Requests: HTTP Requests with Python
- Data Structures & Algorithms in Python: Implementing Trees & Graphs
- Data Structures & Algorithms in Python: Trees & Graphs
- Building Web Apps Using Django: Introduction to Web Frameworks & Django
- Data Structures & Algorithms in Python: Implementing Sorting Algorithms
- Data Structures & Algorithms in Python: Implementing Data Structures
- Data Structures & Algorithms in Python: Fundamental Data Structures
- Data Structures & Algorithms in Python: Sorting Algorithms
- Python Classes & Inheritance: Advanced Functionality Using Python Classes
- Advanced Python Topics: Migrating from Python 2 to Python 3
- Python Classes & Inheritance: Introduction
- Python Classes & Inheritance: Getting Started with Classes in Python
- Python Classes & Inheritance: Working with Inheritance in Python
- Advanced Python Topics: Modules & Virtual Environments
- Advanced Python Topics: Exceptions & Command Line Arguments
- Functions in Python: Gaining a Deeper Understanding of Python Functions
- Advanced Python Topics: File Operations in Python
- Functions in Python: Working with Advanced Features of Python Functions
- Functions in Python: Introduction
- Conditional Statements & Loops: While Loops in Python
- Conditional Statements & Loops: Advanced Operations Using for Loops in Python
- Conditional Statements & Loops: The Basics of for Loops in Python
- Conditional Statements & Loops: If-else Control Structures in Python
- Complex Data Types in Python: Working with Dictionaries & Sets in Python
- Complex Data Types in Python: Shallow & Deep Copies in Python
- Ethical Hacker: Hacking Concepts
- Complex Data Types in Python: Working with Lists & Tuples in Python
- Getting Started with Python: Introduction
- Keeping Your Project on Budget (PMBOK® Guide Sixth Edition)
- Wearable Technology & UI/UX
- Designing with Flexibility & Efficiency in Mind
- Introduction To UI/UX
- Exploring Chatbots
- Voice User Interfaces
- UI/UX for Chatbot & Voice Interface AIs
- Internet of Things & UI/UX
- Develop the Project Schedule (PMBOK® Guide Sixth Edition)
- Define and Sequence Activities (PMBOK® Guide Sixth Edition)
- Managing Project Work (PMBOK® Guide Sixth Edition)
- Ethics and Project Management
- Control the Project Schedule (PMBOK® Guide Sixth Edition)
- The Process Groups (PMBOK® Guide Sixth Edition)
- Validate and Control Scope (PMBOK® Guide Sixth Edition)
- Ethical Standards and PMI® Core Values
- Project Fundamentals (PMBOK® Guide Sixth Edition)
- Strategically Focused Project Management
- Plan and Define Project Scope (PMBOK® Guide Sixth Edition)
- Project Changes and Closing (PMBOK® Guide Sixth Edition)
- Capturing, Analyzing, and Using Project Lessons Learned
- Creating a Project Budget (PMBOK® Guide Sixth Edition)
- Project Initiation and Planning (PMBOK® Guide Sixth Edition)
- Project Management Introduction (PMBOK® Guide Sixth Edition)
- Managing Stakeholder Engagement (PMBOK® Guide Sixth Edition)
- Planning Stakeholder Engagement (PMBOK® Guide Sixth Edition)
- Responding to Risk (PMBOK® Guide Sixth Edition)
- Planning Risk Management (PMBOK® Guide Sixth Edition)
- Procurement Management (PMBOK® Guide Sixth Edition)
- Analyzing Risk (PMBOK® Guide Sixth Edition)
- Procurement Planning (PMBOK® Guide Sixth Edition)
- Identifying Risk (PMBOK® Guide Sixth Edition)
- Planning Quality Management (PMBOK® Guide Sixth Edition)
- Monitor Project Communications (PMBOK® Guide Sixth Edition)
- Plan and Acquire Resources (PMBOK® Guide Sixth Edition)
- Develop and Manage Resources (PMBOK® Guide Sixth Edition)
- Plan and Manage Communications (PMBOK® Guide Sixth Edition)
- Create Work Breakdown Structure (PMBOK® Guide Sixth Edition)
- Manage and Control Quality (PMBOK® Guide Sixth Edition)
- Quality Methodologies and Standards for Project Management
- Architecture Capability Basics
- Content Framework
- Overview
- Security Architecture
- Math & Optimizations: Introducing Sets & Set Operations
- CCNA 2020: Networking Components
- Wi-Fi Penetration Testing
- Pen Testing: End-user Behavior
- PenTesting for Physical Security
- ITIL® 4 Foundation: Service Management Practices (Part 2)
- Pen Testing Awareness: Results Management
- Advanced Pen Testing Techniques
- CompTIA PenTest+: Reporting & Communication
- CompTIA PenTest+: Analyzing Tool & Script Output
- ITIL® 4 Foundation: The Service Value Chain
- ITIL® 4 Foundation: Service Management Practices (Part 1)
- ITIL® 4 Foundation: The Guiding Principles
- ITIL® 4 Foundation: General Management Practices
- CompTIA PenTest+: Application-Based Vulnerabilities
- CompTIA PenTest+: Local Host Vulnerabilities
- CompTIA PenTest+: Post-Exploitation & Facilities Attacks
- ITIL® 4 Foundation: Key Concepts of Service Management
- ITIL® 4 Foundation: The Service Value System
- ITIL® 4 Foundation: Key Concepts
- ITIL® 4 Foundation: Introduction
- CompTIA PenTest+: Network-Based Exploits
- ITIL® Service Operation Concepts
- ITIL® Service Operation Processes
- ITIL® Continual Service Improvement
- CompTIA PenTest+: Information Gathering
- CompTIA PenTest+: Vulnerability Identification
- CompTIA PenTest+: Social Engineering & Specialized System Attacks
- ITIL® Service Transition Concepts and Processes
- ITIL® Service<br/>Design Concepts
- ITIL® Service Strategy Processes
- ITIL® Service Design Processes
- CompTIA PenTest+: Planning for an Engagement
- CompTIA PenTest+: Penetration Testing Tools
- CompTIA PenTest+: Scoping an Engagement
- Penetration Testing Fundamentals
- Pen Testing for Software Development: The Penetration Testing Process
- Designing a Logical Architecture
- ITIL® Service Strategy Concepts
- Overview of the ITIL® Service Lifecycle
- Planning Installation
- Agile Stakeholder Engagement and Team Development
- Agile Key Exam Concepts
- Information Security Program Development Part I
- Agile Project Scheduling and Monitoring
- Information Risk Management Part II
- Information Security Program Development Part II
- Information Security Incident Management Part I
- Information Security Incident Management Part II
- Machine & Deep Learning Algorithms: Introduction
- Linear Algebra & Probability: Advanced Linear Algebra
- Artificial Intelligence: Types of Artificial Intelligence
- Information Security Governance Part I
- Information Security Governance Part II
- Information Risk Management Part I
- Enterprise Architecture Planning & Implementation
- Introduction to Artificial Intelligence
- Enterprise Architecture Basics
- Ethical Hacker: Social Engineering
- Linear Algebra and Probability: Fundamentals of Linear Algebra
- Agile Principles and Methodologies
- Agile Project Planning
- Ethical Hacker: Overview & Threats
- COVID-19: A Novel Coronavirus
- Vikas Gupta's Transcript
- Vikas Gupta's Wallet
- About Accredible