Site Map - skillsoft.digitalbadges-eu.skillsoft.com
- User Authentication
- Luigi Savino's Credentials
- Luigi Savino's Wallet
- Expert Insights on Negotiation
- Interacting with Customers
- Communicating Effectively with Customers
- Negotiating Well and Going for the Close
- Personal Power and Credibility
- The First Steps in Negotiating
- Negotiating the Best Solution
- Building Personal Power through Influence
- Getting Your Pitch Heard
- Expert Insights on Presentation Skills
- Audience and Purpose in Business Writing
- Presentation Mastery Series
- Planning an Effective Presentation
- Building Your Presentation
- Ensuring Successful Presentation Delivery
- SELinux
- Virtualization
- Developing Emotional Intelligence
- Boot Process
- Expert Insights on Emotional Intelligence
- Navigating Other People's Emotions
- Navigating the Workplace with Emotional Intelligence
- Navigating Your Own Emotions
- The Essentials for Anger Management
- File Systems & Partitions
- Becoming a Successful Collaborator
- Expert Insights on Accountability
- Expert Insights on Collaboration
- Expert Insights on Agility and Collaboration
- Becoming an Accountable Professional
- Developing a Personal Accountability Framework
- Developing Personal Accountability
- Taking Responsibility for Your Accountability
- Psychological Safety: Building a Culture of Inclusion and Innovation
- Effective Stakeholder Communications for Technology Professionals
- Proven Techniques for Technical Communication
- Capturing the Attention of Senior Executives
- Encouraging Team Communication and Collaboration
- Do We Have A Failure to Communicate?
- Choosing the Right Interpersonal Communication Method to Make Your Point
- The Power of Communication
- Communicating with Confidence
- Trust Building through Effective Communication
- The Art and Science of Communication
- Network Services
- Remote Access
- Processes, Services, & Daemons
- Applying Machine Learning
- Introduction to Machine Learning & Supervised Learning
- Unsupervised Learning
- Neural Networks
- Building ML Training Sets: Introduction
- Building ML Training Sets: Preprocessing Datasets for Classification
- Building ML Training Sets: Preprocessing Datasets for Linear Regression
- Convolutional and Recurrent Neural Networks
- Supervised Learning Models
- Key Concepts and the Four Dimensions of Service Management
- Service Desk, IT Asset, Service Configuration, and Change Control Management
- Release, Service Level, and Availability Management
- Event, Incident, and Problem Management
- The Guiding Principles of the Service Value System and Continual Improvement Model
- The Service Value Chain and General Management Practices
- ITIL® 4 Foundation: Introduction
- ITIL® 4 Foundation: Key Concepts of Service Management
- Bash Script Programming
- Applying Virtual Assistant Technology
- How Blockchain Technology is Transforming Businesses
- Creating Engagement with Virtual Reality
- Understanding Augmented Reality in Business
- Effective Edge Computing
- Expert Insights on 3D Printing
- Getting Started with Machine Learning
- Transforming the Workplace Using Artificial Intelligence
- Connecting with the Internet of Things
- Preparing for the Additive Manufacturing Revolution
- Using Robots and RPA in the Workplace
- Data Science Tools
- The Four Vs of Data
- Raw Data to Insights: Data Management & Decision Making
- Streaming Data Architectures: An Introduction to Streaming Data in Spark
- Data Analysis Concepts
- Data Exploration
- Data Integration
- Estimates & Measures
- Clustering, Errors, & Validation
- Streaming Data Architectures: Processing Streaming Data with Spark
- Data Communication & Visualization
- Cybersecurity Awareness: Exposure to Security Risks
- Data Science Overview
- Data Transformation
- Data Gathering
- Data Filtering
- Cybersecurity Awareness: Information Security Fundamentals
- Cybersecurity Awareness: Getting Started with Security Foundations
- Cybersecurity Awareness: Key Security Terms & Concepts
- Trends in Cybersecurity
- Network Hardening, Network Segmentation, and Secure Connections
- Legal Considerations and Cybercrime Investigations
- Securing Information using Cryptography
- Public Key Infrastructure and Certificate Distribution
- Vulnerabilities, Systems Scanning and Exploitation
- Malware Analysis
- Network Discovery Tools and Techniques
- Discovery and Attack Vectors
- Finding the Quality in Your Data
- Being a Responsible Corporate Digital Citizen
- Improving Marketing with Big Data
- Harnessing the Power of Data Science for Business Growth
- Embedding Data-driven Decisions into Organizational Culture
- Big Data Fundamentals
- Big Data Interpretation
- Organizing Business Data with Data Modeling
- Turning Social Intelligence into Actionable Insight
- Evaluating Systems with Data Modeling
- Agile Stakeholder Engagement and Team Development
- Agile Key Exam Concepts
- Embracing Agile at Scale
- Agile Principles and Methodologies
- Agile Project Scheduling and Monitoring
- Agile Fundamentals: Stakeholders, Success Criteria, Users, and the Agile Team
- Cultivating Enterprise Agile
- The Essential Role of the Agile Product Owner
- Developing and Supporting an Agile Mindset
- Building Agile Capabilities in Your Organization
- Learning from Failure
- Package Management
- Configuring Gnome
- File Management
- Telling a Business Story
- DevOps Security Considerations: DevSecOps Principles
- Making an Impact with Non-verbal Communication
- Become a Great Listener
- Building Personal Power through Influence
- Become a Great Listener
- Trust Building through Effective Communication
- Personal Power and Credibility
- Cybersecurity and Networking Fundamentals
- Agile Project Planning
- Agile Software Development: Agile Development Life Cycle
- Agile Methodologies
- Luigi Savino's Transcript
- Luigi Savino's Wallet
- About Accredible