Site Map - skillsoft.digitalbadges-eu.skillsoft.com
- User Authentication
- Levente Pataki's Credentials
- Levente Pataki's Wallet
- Navigating Other People's Emotions
- Leadercamp on-demand: Mindfulness & Mindset
- Overcoming Burnout in the (Nearly) Post-Pandemic Workplace: Session Replay
- Leadercamp on-demand: Developing Resilience and Well-being Habits
- Leadercamp on-demand: Positive Intelligence
- Leadercamp on-demand: Ramp Up Your Resilience
- Leadercamp on-demand: The Life Wheel for Resilience and Well-Being
- Leadercamp on-demand: Increase Your Happiness and Resilience
- Thriving in Anxious Times: Manage your Anxiety and Learn to Love Your Work Again: Session Replay
- Leadercamp on-demand: Meditation as a Path to Well-being
- Leadercamp on-demand: Resilience as a Superpower
- Leadercamp on-demand: Positive Psychology at Work
- Leadercamp on-demand: Midweek Meditation Moments-Breathwork Meditation
- Leadercamp on-demand: Midweek Meditation Moments—Body Scan
- Leadercamp on-demand: Midweek Meditation Moments—Mantra
- Making the Most of an Organizational Change
- Leadercamp on-demand: Energy Management
- Leadercamp on-demand: Midweek Meditation Moments-Present Moment Awareness
- Leadercamp on-demand: Midweek Meditation Moments—Visualization
- Leadercamp on-demand: Burnout to Balance
- Optimizing Your Workplace Well-being
- Forging Relationships with External Stakeholders
- Data Engineering Getting Started
- Data Architecture Getting Started
- Working Well with Others
- Cloud and Containers for the SRE: Containers
- Cloud and Containers for the SRE: Implementing Container Solutions
- Cloud and Containers for the SRE: Cloud Architectures & Solutions
- SRE Postmortums: Blameless Postmortem Culture Creation
- SRE Simplicity: Simple Software Systems
- Final Exam: SRE DevOps Engineer
- Best Practices for the SRE: Use Cases for Automation
- Best Practices for the SRE: Automation
- SRE Simplicity: Software System Complexity
- Backup & Recovery: Business Continuity & Disaster Recovery
- Monitoring Distributed Systems
- Backup & Recovery: Enterprise Backup Strategies
- Site Reliability Engineering: Scenario Planning
- Build & Release Engineering Best Practices: Release Management
- Backup & Recovery: Windows Client Backup and Recovery Tools
- Describing Distributed Systems
- Final Exam: Network Admin
- Build & Release Engineering Best Practices: Release Engineering
- OS Deployment Strategies: Upgrading & Maintaining Systems
- OS Deployment Strategies: Deploying Modern Systems
- OS Deployment Strategies: Maintaining & Managing Modern Systems
- Site Reliability: Engineering
- Site Reliability: Tools & Automation
- Agile Organizations: Building an Agile Culture
- Agile Organizations: DevOps & Agile
- Agile Organizations: Cloud for Agile Software Development
- Agile Organizations: Agile Models & Scaling Agile
- Agile for Software Development
- Final Exam: Agile Organization
- Final Exam: Software Development and Testing with Agile
- Track 3: Software Development & Testing with Agile
- Track 4: Agile Organization
- Development & Testing with Agile: Agile Self-organizing Teams
- Development & Testing with Agile: Team Meetings
- Development & Testing with Agile: Project Management
- Development & Testing with Agile: Extreme Programming
- Development & Testing with Agile: Agile Methodologies in Software Development
- Agile Software Projects: Software Design
- Agile Software Projects: Estimation Methods
- Final Exam: Software Project Requirements & Design with Agile
- Track 2: Software Requirements & Design with Agile
- Agile Software Projects: Software Requirements
- Agile Foundations: Scrum Methodology
- Final Exam: Agile Foundations
- Track 1: Agile Foundations
- Agile Foundations: Fundamentals
- Ethical Hacker: Cryptography Concepts Part 2
- Ethical Hacker: Wireless Hacking Tools
- Ethical Hacker: Cryptography Concepts Part 3
- Ethical Hacker: Cryptography Attacks
- Ethical Hacker: Cloud Computing Concepts
- Ethical Hacker: IoT Attacks
- Ethical Hacker: Cracking & Mobile Hacking
- Ethical Hacker: IoT Concepts
- Ethical Hacker: IoT Hacking & Countermeasures
- Ethical Hacker: Cloud Computer Attacks
- Ethical Hacker: Wireless Hacking Common Threats
- Ethical Hacker: SQL Injection
- Ethical Hacker: Wireless Hacking Concepts
- Ethical Hacker: Hacking Web Servers
- Ethical Hacker: Evading IDS, Firewall, & Honeypots
- Ethical Hacker: Evading IDS, Firewall, & Honeypots Part 2
- Ethical Hacker: Evading IDS, Firewall, & Honeypots Part 3
- Ethical Hacker: Common Web App Threats
- Ethical Hacker: SQL Injection Types & Tools
- Ethical Hacker: Common Web App Threats Part 2
- Ethical Hacker: Practical Web App Hacking
- Ethical Hacker: Denial of Service
- Ethical Hacker: Session Hijacking
- Docker Skills: Advanced Docker Orchestration
- Docker Skills: Advanced Docker Security
- Final Exam: Advanced Docker Practices
- Building Advanced Docker Skills
- Track 2: Advanced Docker Skills
- Advanced Docker Skills: Performance Troubleshooting
- Advanced Docker Skills: Docker Performance Optimization
- Advanced Docker Skills: Advanced Docker Administration
- Advanced Docker Skills: Debugging Docker Solutions
- Final Exam: Advanced Docker Principles
- Track 1: Advanced Docker Principles
- Advanced Docker Principles: Multiple Docker Containers
- Advanced Docker Principles: Docker for Microservices Strategies
- Docker Compose: Using Docker Compose
- Docker Compose: Terminology & Installation
- Advanced Docker: Working with Services & Applications on Multiple Containers
- Advanced Docker: Exploring Advanced Docker Principles & Practices
- Ethical Hacker: Network Sniffing
- Ethical Hacker: Social Engineering
- Ethical Hacker: Malware Distribution
- Ethical Hacker: Malware Threats
- Ethical Hacker: Hidden Files & Covering Tracks
- Ethical Hacker: Privilege Escalation
- Ethical Hacker: Password Attacks Part 2
- Ethical Hacker: Password Attacks
- Ethical Hacker: Vulnerability Analysis Concepts & Tools
- Ethical Hacker: ProxyChains & Enumeration
- Prospecting: Panning for Sales Gold
- Ethical Hacker: Host Discovery & Scanning with Nmap
- Ethical Hacker: Footprinting
- Ethical Hacker: Pentesting, Laws, & Standards
- Ethical Hacker: Security Controls Part 2
- Ethical Hacker: Security Controls
- Ethical Hacker: Hacking Concepts
- Ethical Hacker: Cryptography Concepts
- Ethical Hacker: Overview & Threats
- Ethical Hacker: Covert Data Gathering
- CompTIA Cybersecurity Analyst+: Malware Threats
- Levente Pataki's Transcript
- Levente Pataki's Wallet
- About Accredible