Site Map - skillsoft.digitalbadges.skillsoft.com
- User Authentication
- Yashas Ahirwar's Credentials
- Yashas Ahirwar's Wallet
- Data Access & Governance Policies: Data Classification, Encryption, & Monitoring
- CCSP 2019: Identity & Access Management
- Leading Security Teams for GenAI Solutions: Use of Generative AI
- Responsible Use of AI
- Git & GitHub: Introduction
- CompTIA Cloud Essentials+: Essential Cloud Principles
- Exploring Business Process Automation
- Automation Design & Robotics
- Code Quality, Testing, & Development
- Testing Methods
- Software Design and Development: Design Patterns & SOLID Principles
- Being an Effective Team Member
- Effective Team Communication
- Identifying Risk (PMBOK® Guide Sixth Edition)
- Google Associate Cloud Engineer: Managing Google Cloud Projects
- PRINCE2® Project Management Overview (2017 Update)
- Google Associate Cloud Engineer: Google Cloud Management
- Google Associate Cloud Engineer: Google Cloud Overview
- Communicating with Confidence
- Making an Impact with Non-verbal Communication
- Do We Have A Failure to Communicate?
- Design Thinking
- Year 1 Phase 2: 4 to 6 Months
- Artificial Intelligence and Machine Learning
- ChatGPT Prompt Engineering Examples & Use Cases
- Generative AI APIs for Practical Applications: An Introduction
- Recognizing Hallucinations, Inaccuracies, and Bias in AI
- Navigating AI Ethical Challenges and Risks
- Establishing AI Guardrails and Governance
- Introduction to Generative AI on Azure
- Enterprise Security: Artificial Intelligence, Generative AI, & Cybersecurity
- Leadercamp on-demand: Exploring Generative AI and ChatGPT
- Generative AI and Its Impact to Everyday Business
- Harnessing the Disruption of Generative AI
- Security Software Assessments
- Information Security Program Development Part I
- Leading with Executive Presence
- How Culture Impacts Communication
- Clarity and Conciseness in Business Writing
- Strength under Pressure: Building Perseverance and Resilience
- How to Get Out of Your Own Way and Achieve Success
- Executive Presence
- Organizing your Digital Workspace
- Building Your Resilience
- Audience and Purpose in Business Writing
- Embracing Happiness
- Keeping Business Calls Professional
- Writing and Preparing an Effective Speech
- Conquering the Challenges of Public Speaking
- Accessibility
- 360 Value Meter
- Sustainability
- Oral Communication
- Cloud Platform Security: Designing Secure Access
- Secure Cloud Computing & Trusted Cloud Services
- AWS Serverless Monitoring & Security
- Secure Application and Data Architecture Design
- Security Architecture and Engineering
- Security Best Practices: Network Appliance Security
- Security Measures: Implementing Security Controls
- Security Architecture Documentation and Alternative Architectures
- CISSP 2021: Architecture, Design, & Solutions Vulnerabilities
- Security Topologies: Developing Secure Networks
- Enterprise Architecture Basics
- Security Architecture
- Information Security: Securing Networking Protocols
- Security Fundamentals: Firewalls
- Network Attacks
- Integrating Network and Security Components, Concepts, and Architectures
- Network & Communications Security
- Protocol Security
- Network Isolation
- CompTIA CASP+: Business Continuity
- Implementing Incident Response & Recovery
- Certified Information Systems Auditor (CISA) 2019: Data Privacy & Risk
- Information Security: Security Governance
- Certified in Cybersecurity (CC): Security Governance, Policies, & Controls
- CompTIA Cybersecurity Analyst+: Digital Forensics
- CompTIA Security+: Security Assessment & Penetration Testing Techniques
- CompTIA Cloud+: Data Security & Compliance Controls
- Cloud Data Security
- SSCP 2021: Incident Response & Forensics
- CISM 2020: IT Security Policies
- Patch Management Strategies
- End-User Security: The Security Administrator Perspective
- API Design: API Development
- Microsoft 365 Mobility & Security: Data Loss Prevention
- API Security
- CompTIA Security+: Implementing Secure Protocols & Application Security Solutions
- CompTIA Security+: Analyzing Application & Network Attacks
- CISSP 2021: Software Development Security
- CISSP: Software Development Security
- Implementing Security Activities across the Technology Life Cycle
- OWASP Top 10: A09:2021-Security Logging & Monitoring Failures
- OWASP Top 10: Securing Web Applications
- CompTIA Security+: Controls & Application Development, Deployment, & Automation
- AWS Solutions Architect Associate 2022: Identity & Access Management
- Michelle Boockoff-Bajdek on Public Speaking From A to D (Analog to Digital)
- Microsoft Security: Basic Azure AD Identity Services & Types
- Mindful at Work
- Remote Ways of Working (OmniConnect)
- Year 1 Phase 1: 0 to 3 months
- Microsoft Azure Security Technologies: Identity & Access Management
- Microsoft Azure Administrator: Azure Multi-Factor Authentication
- Security & IAM Services
- Shared Language
- Saving Time by Setting Goals
- Sharpening Your Focus to Stay on Track
- Managing Your Time So It Doesn’t Manage You
- Expert Insights on Time Management
- Expert Insights on Listening
- Maximize Your Productivity by Managing Time and Tasks
- Taking Effective and Professional Notes
- Become a Great Listener
- Listening Even When It's Difficult to Listen
- Using Active Listening in Workplace Situations
- The Art of Staying Focused
- Make The Time You Need: Get Organized
- Aligning Goals and Priorities To Manage Time
- Troublesome Words and Phrases: Usage Mistakes in Writing
- Creating Well-constructed Sentences
- Business Grammar
- Listening
- Time Management
- OWASP Top 10: Web Application Security
- Identity Management, Directory Services, and Federation
- Social Engineering Threats and Prevention
- CompTIA Cloud+: Cloud Security Controls
- Cybersecurity Awareness: Exposure to Security Risks
- AWS Associate Solutions Architect 2020: AWS Review Course 1
- AWS Associate Solutions Architect 2020: AWS Review Course 2
- AWS Solutions Architect Professional 2022: General Architecture
- CCSP 2022: Cloud Security Concepts & Design Principles
- API Development: Framework Security
- SSCP 2021: Security Controls
- CCSP 2019: Application Development & Security
- Cybersecurity Awareness: Information Security Fundamentals
- Getting the Details Right: Spelling Basics
- Using the Parts of Speech
- Using Punctuation Marks
- Abbreviating, Capitalizing, and Using Numbers
- Software Development Concepts: Software Development Glossary
- Jenkins for DevOps: Jenkins Configuration for DevOps
- Using Docker for DevOps: Introduction to Docker
- Software Testing for DevOps: DevOps Test Tools
- The Language of DevOps: DevOps Tools & Processes
- Top 10 List Items
- Cloud Computing Fundamentals: Introduction
- Access Control and Security Architecture Design
- Cloud Security Fundamentals: Cloud Application Security
- Agile & TDD Best Practices for APIs: Test-driven Development Strategy
- Transition to Scrum: Agile Foundation to Scrum
- Release & Sprint Planning
- Using Kanban in IT & Software Development
- Software Data Analysis: Project Management Metrics
- Agile Best Practices for Tech Leaders: Scrum Artifacts
- Automated Software Testing
- SOLID & GRASP
- Software Design and Development: Version Control System
- CompTIA Cloud+: Cloud Architecture & Models
- Information Security for Leaders: Elements of InfoSec
- Defensible Security
- CEH v11: \nFileless Malware, Malware Analysis & Countermeasures
- CEH v11: \nSocial Engineering, Insider Threats & Identity Theft
- Security Vulnerabilities: Managing Threats & Vulnerabilities
- Malware Analysis
- Attack Vectors & Mitigations
- CompTIA Server+: Network Firewalls
- Advanced Networking Devices
- CISSP 2021: Secure Design Principles
- CISSP: Risk Management
- Concepts & Characteristics of Networking
- Fundamental Security Concepts
- Yashas Ahirwar's Transcript
- Yashas Ahirwar's Wallet
- About Accredible