Site Map - skillsoft.digitalbadges.skillsoft.com
- User Authentication
- Yalaga Ravikiran's Credentials
- Yalaga Ravikiran's Wallet
- Leading across Cultures
- Bridging Differences in Cross-cultural Communication
- Harnessing the Power of Positive Conflict
- Enterprise Security: Leveraging Generative AI with Common Security Tools
- Leading Your Team through Change
- Effective Stakeholder Communications for Technology Professionals
- Sharpening Your Focus to Stay on Track
- Influencing through Positive Leadership
- Proven Techniques for Technical Communication
- Design Thinking for Innovation: Stakeholder Engagement
- Problem Solving: Defining and Stating the Problem
- Problem Solving: Generating Solutions
- Problem Solving: Choosing and Implementing the Right Solution
- Google Associate Cloud Engineer: Managing Identity and Access Management (IAM)
- Applying Scrum Development Practices
- Scrum: Creating Effective Product Backlogs
- Scrum: Product Backlog
- Scrum Concepts & the Product Owner
- Scrum: Product Development Framework
- Scrum Product: Defining the Why & How of the Product
- Transition to Scrum: Agile Foundation to Scrum
- Lean in Scrum: Lean Development Practices
- Scrum Artifacts and Investment Guidelines
- Scrum Master: Scrum for the Team
- Transitioning to Scrum
- Product Development Practices
- Scrum Team Velocity: Exploring Team Velocity
- Agile & TDD Best Practices for APIs: Test-driven Development Strategy
- Risk Management: Project Risk Assessment
- Testing Approaches
- Secure Agile Programming: Testing
- Techniques & Tools
- Agile Methodologies
- Project Evaluation: Defining Success Metrics
- Project Management Needs vs. Expectations
- Stakeholder Communication: Software Projects & Stakeholder Communication
- Managing and Engaging Stakeholders
- Business Analysis for Project Management: Practices for Later Project Stages
- Skills for Project Analysts: Negotiation Skills
- Decision Making for Software Project Managers
- Power BI Bootcamp: Session 4 Replay (January 2024)
- CompTIA Security+: Monitoring, Visibility, & Reporting
- CompTIA Security+: Wireless, Mobile, & Embedded Device Security
- CompTIA Security+: Risk Management, Privacy, & Sensitive Data Security
- CompTIA Security+: Basic Cryptography & Public Key Infrastructure
- CompTIA Security+: Organizational Security Assessment Tools & Mitigation Controls
- CompTIA Security+: Incident Response, Digital Forensics, & Supporting Investigations
- CompTIA Security+: Implementing Secure Network Designs
- CompTIA Security+: Security Policies, Regulations, Standards, & Frameworks
- CompTIA Security+: Implementing Secure Protocols & Application Security Solutions
- CompTIA Security+: Controls & Application Development, Deployment, & Automation
- Power BI Bootcamp: Session 3 Replay (January 2024)
- CompTIA Security+: Analyzing Application & Network Attacks
- CompTIA Security+: Security Concepts in an Enterprise Environment
- CompTIA Security+: Authentication & Authorization Design Concepts
- CompTIA Security+: Social Engineering Techniques & Other Attack Types
- CompTIA Security+: Implementing Identity and Account Management & AAA Solutions
- CompTIA Security+: Physical Security Controls
- CompTIA Security+: Threat Actors, Intelligence Sources, & Vulnerabilities
- CompTIA Security+: Implementing Cybersecurity Resilience
- CompTIA Security+: Virtualization, Cloud Computing, & Cloud Cybersecurity Solutions
- CompTIA Security+: Security Assessment & Penetration Testing Techniques
- SENSS 1.0: IOS Security Configuration
- SENSS 1.0: High Availability & Private VLANs
- SENSS 1.0: Twice NAT & Network Object NAT
- SENSS 1.0: Zone-Based Firewalls
- SENSS 1.0: ASA Firewall Access Control
- SENSS 1.0: Centralized Logging & Device Management
- SENSS 1.0: Role-Based Access Control
- SENSS 1.0: ASA Firewall Configuration & Access Control
- SENSS 1.0: Traffic & Device Monitoring
- SENSS 1.0: Transparent Firewalls & Security Contexts
- SENSS 1.0: Cisco Port-Based Traffic Control
- SENSS 1.0: DHCP Snooping & IP Source Guard
- SENSS 1.0: IPv6 Support & Traffic Inspection
- Power BI Bootcamp: Session 1 Replay (January 2024)
- Power BI Bootcamp: Session 2 Replay (January 2024)
- Cybersecurity Awareness: Getting Started with Security Foundations
- Cybersecurity Awareness: Information Security Fundamentals
- Cybersecurity Awareness: Key Security Terms & Concepts
- Agile Foundations: Scrum Methodology
- The Guiding Principles of the Service Value System and Continual Improvement Model
- The Service Value Chain and General Management Practices
- Event, Incident, and Problem Management
- Service Desk, IT Asset, Service Configuration, and Change Control Management
- Release, Service Level, and Availability Management
- Key Concepts and the Four Dimensions of Service Management
- ITIL® 4 Foundation: Key Concepts of Service Management
- ITIL® 4 Foundation: Introduction
- Business Reporting: Getting Started with Power BI Desktop for Data Analysis
- Business Reporting: Leveraging Treemaps, Matrices, & Slicers in Power BI
- Business Reporting: Creating & Formatting Matrix Visualizations in Power BI
- Business Reporting: Visualizing & Merging Data in Power BI
- Agile Foundations: Fundamentals
- Comparing Manual & Automated Testing
- CCNA 2020: NTP, DNS, & DHCP
- CCNA 2020: Configuring & Verifying ACLs
- CCNA 2020: Configuring Port Security, DHCP Snooping, & DAI
- RSTECH: Troubleshooting, Upgrading, Recovering, & Resetting
- RSTECH: Cisco Equipment, Components, & Port Characteristics
- CCNA 2020: Network Access, VLAN Configuration, & Interswitch Connectivity
- CCNA 2020: IPv6 Addressing & Configuration
- CCNA 2020: L2 Discovery Protocols & L2 and L3 EtherChannel Configuration
- CCNA 2020: Configuring & Verifying NAT
- CCNA 2020: Static Routing
- CCNA 2020: Networking Components
- CCNA 2020: Network Topology Architectures
- RSTECH: Networking Hardware, Models, & Technologies
- CCNA 2020: Layer 1 Interfaces & Cabling
- CCNA 2020: IPv4 Subnetting
- CCNA 2020: IP Addressing Basics & Configuration
- Microsoft 365 Fundamentals: Understanding Cloud Concepts
- Microsoft 365 Fundamentals: Cloud Benefits & Considerations
- Microsoft 365 Fundamentals: Protecting Your Information
- Microsoft 365 Fundamentals: Windows 10 Enterprise
- Microsoft 365 Fundamentals: Windows 10 & Admin Center
- Microsoft 365 Fundamentals: Azure AD & Access Management
- Microsoft 365 Fundamentals: Deployment Planning, Azure, & Updates
- Microsoft 365 Fundamentals: Microsoft 365 Purchasing & Support
- Microsoft 365 Fundamentals: Mobile Management & Security and Compliance
- Microsoft 365 Fundamentals: Cloud Services & Principles
- Microsoft 365 Fundamentals: Microsoft 365 Pricing and Support
- Deploying Microsoft 365 Teamwork: Site Collections & Hub Sites
- MS-300 - Deploying Microsoft 365 Teamwork: Manage and Monitor SharePoint Online
- Deploying Microsoft 365 Teamwork: Guest Access
- MS-300 - Deploying Microsoft 365 Teamwork: OneDrive for Business
- MS-300 - Deploying Microsoft 365 Teamwork: Microsoft 365 and External Data & Systems
- Deploying Microsoft 365 Teamwork: OneDrive Users & Groups
- MS-300 - Deploying Microsoft 365 Teamwork: Yammer
- Deploying Microsoft 365 Teamwork: Customizations, Apps, & Metadata
- Deploying Microsoft 365 Teamwork: Sharing & Security
- Deploying Microsoft 365 Teamwork: Monitoring OneDrive
- MS-300 - Deploying Microsoft 365 Teamwork: Managing & Monitoring the Teams Environment & Service
- MS-300 - Deploying Microsoft 365 Teamwork: Integrate Microsoft 365 Workloads
- MS-300 - Deploying Microsoft 365 Teamwork: Teams Settings
- MS-300 - Deploying Microsoft 365 Teamwork: Identity and Authentication for Teams
- MS-300 - Deploying Microsoft 365 Teamwork: Stream Capabilities
- Windows 10 Bootcamp: Session 2 Replay
- Administering Microsoft Teams Bootcamp: Session 1 Replay
- Administering Microsoft Teams Bootcamp: Session 2 Replay
- Administering Microsoft Teams Bootcamp: Session 3 Replay
- Microsoft 365 Fundamentals: Microsoft 365, Exchange, & SharePoint
- Microsoft 365 Fundamentals: Skype for Business, Teams, & Collaboration
- Microsoft 365 Identity and Services: Planning a Microsoft Implementation
- Microsoft 365 Fundamentals: Windows 10, Autopilot, & Azure
- Client Access Services
- Securing Remote Access
- Planning, Configuration, & Collaboration
- Designing Remote Access & Multiple Namespaces
- Recovery Strategies
- Planning Security Strategies
- Configuring Security
- Mail Flow Architecture, Redundancy, & Resilience
- Mail Flow Rules & Auditing
- Migration & Federation
- Message Records Planning & Configuration
- Message Records Policies, Archiving, & Journaling
- Migration & Sharing
- Planning for Mailbox Servers
- Deploying Mailbox Servers
- Permissions, Configuration, & Collaboration
- CCENT: NTP Configuration
- CCENT: IPv4 Configuration
- CCENT: IPv6 Addressing
- CCENT: NAT Configuration
- CCENT: Network Components, Topologies, & Architecture
- CCENT: IPv4 Addressing Part 2
- CCENT: Network Cabling
- CCENT: Initial Device Configuration
- CCENT: IPv6 Configuration
- CCENT: Interswitch Connectivity
- CCENT: InterVLAN Routing
- CCENT: IPv4 Addressing Part 1
- CCENT: Functions of Routing
- SQL Security Architecture
- SQL & Concurrency Concepts
- SQL Concepts & Queries
- CompTIA A+ 220-1001: Storage Solutions
- Microsoft 365 Fundamentals: Office 365 & Collaboration
- The Present Threat Landscape
- Windows Server 2016 Identity: Active Directory Service Accounts & Policies
- Windows Server 2016 Identity: Active Directory Maintenance & Recovery
- Storage
- SQL Tables
- SQL Transaction Locks
- Advanced GNU & Unix Commands
- CCENT: DHCP Configuration
- CCENT: Discovering Ethernet
- CCENT: Discovery Protocols
- CCENT: DNS Configuration
- CCENT: Access Control Lists Part 2
- CCENT: Device Hardening
- CCENT: Access Control Lists Part 1
- CCENT: Device Management
- CompTIA A+ 220-1001: Troubleshooting Printers
- CompTIA A+ 220-1001: Working with Peripheral Devices
- CompTIA A+ 220-1001: Working with Motherboards, CPUs, & Add-On Cards
- CompTIA A+ 220-1001: Virtualization
- CompTIA A+ 220-1001: Wireless Networking Protocols
- Social Engineering & Related Attacks
- Windows Server 2016 Identity: Active Directory Trusts & Sites
- CompTIA A+ 220-1001: Network Types
- CompTIA A+ 220-1001: SOHO Devices
- CompTIA A+ 220-1001: Troubleshooting
- CompTIA A+ 220-1001: Resolving Problems
- CompTIA A+ 220-1001: TCP & UDP ports
- CompTIA A+ 220-1001: Mobile Device Network Connectivity & Application Support
- CompTIA A+ 220-1001: Installing Hardware & Display Components
- CompTIA A+ 220-1001: Laptops Features & Mobile Device Types
- CompTIA A+ 220-1001: Networking
- CompTIA A+ 220-1001: Network Hosts
- Advanced SQL Queries
- CompTIA A+ 220-1001: Power Supplies
- CompTIA A+ 220-1001: Networking Tools
- CompTIA A+ 220-1001: Random Access Memory
- CompTIA A+ 220-1001: Printers
- SQL Selecting, Ordering, & Filtering
- Essential System Services
- CompTIA A+ 220-1001: Implementing Network Concepts
- Windows Server 2016 Identity: Active Directory Rights Management Services
- CompTIA A+ 220-1001: Connectors
- CompTIA A+ 220-1001: Custom PC configuration
- CompTIA A+ 220-1001: Common Devices
- CompTIA A+ 220-1001: Configuring a Wired/Wireless Network
- Windows Server 2016 Identity: Active Directory Groups & Organizational Units
- Windows Server 2016 Identity: Active Directory Group Policy Settings
- Windows Server 2016 Identity: Active Directory Group Policy Processing
- Linux Installation
- CompTIA A+ 220-1001: Cloud Computing
- CompTIA A+ 220-1001: Basic Cable Types
- CompTIA A+ 220-1001: Accessories & Mobile Device Synchronization
- Introduction to System Architecture
- GUIs & Configuration
- GNU & Unix Commands
- File Permissions & Links
- Introduction to Devices & File Systems
- System Booting & Shutdown
- Networking Devices
- Policies and Best Practices
- Ports, Protocols, & the OSI Model
- Network Topologies & Technologies
- Windows Server 2016 Identity: Active Directory Certificate Services
- Network Storage, Virtualization, & WAN Technologies
- Security Devices, Wireless Security, & Access Control
- Windows Server 2016 Identity: AD FS & Web Application Proxy
- Troubleshooting Connectivity & Performance Issues
- Network Monitoring & Remote Access Methods
- Network Device Hardening
- Network Services Management
- Users, Groups, & Environment Variables
- Scripting & Administrative Tasks
- Package Management
- Unix Input, Output, & Piping
- Networking Fundamentals
- Troubleshooting Common Network Service Issues
- Windows Server 2016 Identity: Active Directory Group Policy Objects
- Windows Server 2016 Identity: Active Directory Accounts & Permissions
- Windows Server 2016 Identity: Active Directory Domain Controllers
- Troubleshooting Methodology & Tools
- Windows Server 2016 Identity: Active Directory Group Policy Preferences
- Cloud Computing Fundamentals: Security
- Cloud Computing Fundamentals: Presence & Privacy
- Hybrid Cloud Architecture & Deployment: Adopting Migration Strategies
- Cloud Computing Fundamentals: Cloud Access Control
- Cloud Computing Fundamentals: Cloud Protocols & Standards
- Cloud Computing Fundamentals: Storing & Managing Cloud Data
- Cloud Computing Fundamentals: Migrating to the Cloud
- Cloud Computing Fundamentals: Risk Management
- Introduction to the Agile Principles and Mindset Bootcamp: Session 1 Replay
- Getting Your Pitch Heard
- Getting the Details Right: Spelling Basics
- Audience and Purpose in Business Writing
- Planning an Effective Presentation
- Clarity and Conciseness in Business Writing
- Using the Parts of Speech
- Building Your Presentation
- Using Punctuation Marks
- Ensuring Successful Presentation Delivery
- Troublesome Words and Phrases: Usage Mistakes in Writing
- Creating Well-constructed Sentences
- Abbreviating, Capitalizing, and Using Numbers
- Presentation Mastery Series
- Polishing Your Skills for Excellent Customer Service
- Maximize Your Productivity by Managing Time and Tasks
- Expert Insights on Work/Life Balance
- Agile Software Development: Agile Project Management Techniques
- Expert Insights on Essential Customer Service Skills
- Navigating Your Own Emotions
- Navigating Other People's Emotions
- Navigating the Workplace with Emotional Intelligence
- Taking Effective and Professional Notes
- How to Manage Difficult Conversations
- Controlling Conflict, Stress, and Time in Customer Service
- Communicating Effectively with Customers
- Interacting with Customers
- Listening Even When It's Difficult to Listen
- Using Active Listening in Workplace Situations
- The Art of Staying Focused
- Facing Confrontation in Customer Service
- How Culture Impacts Communication
- Organizing Your E-mail
- Providing Telephone Customer Service
- Writing Effective E-mails and Instant Messages
- Rapport Building in Customer Service
- The Building Blocks of Building Trust
- Dealing with Customer Service Incidents and Complaints
- Using Communication Strategies to Bridge Cultural Divides
- Keeping Business Calls Professional
- Editing and Proofreading Business Documents
- Sending E-mails to the Right People
- Staying Balanced in a Shifting World
- Getting Email Right Series
- Expert Insights on Ethics
- Achieve Productivity in Your Personal Life
- Communicating with Confidence
- Choosing the Right Interpersonal Communication Method to Make Your Point
- Capturing the Attention of Senior Executives
- Trust Building through Effective Communication
- Making an Impact with Non-verbal Communication
- Do We Have A Failure to Communicate?
- Conquering the Challenges of Public Speaking
- Business Strategy: Managing Organizational Value
- Agile Project Planning
- Agile Project Scheduling and Monitoring
- Business Orientation: Strategic Organizational Goals
- Project Management: Scrum Framework for Software Development
- Agile for Software Development: Lean, Agile, & Scrum Methodologies
- Advanced Scrum for Project Management
- Agile Hybrid Approaches
- Agile Software Development: Agile Development Life Cycle
- Value-driven Delivery: Delivering Value in Agile Projects
- Agile Principles and Methodologies
- Agile Stakeholder Engagement and Team Development
- Cloud Computing Fundamentals: Considerations
- Cloud Service Models & Benefits and Issues
- Cloud Computing Fundamentals: Introduction
- Cloud Computing Fundamentals: Cloud Virtualization & Data Centers
- Moving to the Cloud
- Yalaga Ravikiran's Transcript
- Yalaga Ravikiran's Wallet
- About Accredible