Site Map - skillsoft.digitalbadges.skillsoft.com
- User Authentication
- Candace Batts's Credentials
- Candace Batts's Wallet
- Creating PivotTables and PivotCharts in Excel 365
- Certified in Cybersecurity (CC): Core Security Principles & Risk Management
- ITIL® 4 Foundation: Service Management Practices (Part 1)
- Service Desk, IT Asset, Service Configuration, and Change Control Management
- AWS Cloud Practitioner 2023: Benefits & Design Principles of the AWS Cloud
- AWS Lambdas in Python: Using AWS Lambda with Containers, SES, SNS, & DynamoDB
- CompTIA Data+: Database Concepts
- Analyzing Data in Excel Bootcamp December 2023: Session 4 Replay
- CRISC 2023: Risk Management
- Shaping the Customer Experience across Digital and Physical Channels
- SSCP 2021: Security Controls
- Fundamentals of C++: Using the auto Keyword, Enums, and I/O Streams
- Control Structures in C++: Using Conditional Control Structures
- Control Structures in C++: Range-based for Loops
- Pointers and References in C++: Allocating Memory with New & Delete Operators
- Pointers and References in C++: Getting Started with Pointers
- Fundamentals of C++: Getting Started
- Fundamentals of C++: Using Variables & Datatypes
- Legal Considerations and Cybercrime Investigations
- Core DevOps Skills: Moving toward DevOps
- CISA 2022: Auditing, Data Analysis, & Controls
- CISSP 2024: Investigations & Policies
- Secure Full Stack Developer Programming
- CompTIA A+ Core 1: Multifunction Devices & Printer Consumables
- Implementing Unit Testing Best Practices
- Identifying Risk (PMBOK® Guide Sixth Edition)
- Development & Testing with Agile: Extreme Programming
- Process Enhancements: System Life Cycle Process & Models Management
- Threat Intelligence & Attribution Best Practices: Attribution Analysis
- Writing with a Professional Mindset
- CompTIA CASP+: Vulnerabilities & Hardening
- CompTIA CASP+: Monitoring & Incident Response
- CEH v12: Malware, Threats, Trojans, and Viruses
- CompTIA Network+: Ethernet Switching & Wireless Standards
- Information Security for Leaders: An Introduction to InfoSec
- Information Security for Leaders: Elements of an InfoSec Team
- CISM 2022: Social Engineering & Malware
- Leading Security Teams for GenAI Solutions: Enhancing Security Posture
- Planning Risk Management (PMBOK® Guide Sixth Edition)
- SQL Programming with MariaDB: Using Joins, Triggers, & Stored Procedures
- An Executive's Guide to Security: Protecting Your Information
- Continuous Data: Automating Data Ingestion from Cloud Storage into Snowflake
- CompTIA Data+: Understanding Data Manipulation
- CompTIA Data+: Understanding Data
- Emerging Data Trends: Unveiling the Power of Practical Data Fabric
- Emerging Data Trends: Unlocking Data Observability
- Forensic Analysis: Cybercrime Investigations
- Advanced Agile: Leadership Techniques
- Certified Information Systems Auditor (CISA) 2019: Data Storage & Malware
- Agile Software Development: Agile Project Management Techniques
- Advanced Agile: Tools & Techniques
- Malware Removal: Reporting Findings & Preventing Future Infections
- Cybersecurity Awareness: Information Security Fundamentals
- Certified Information Systems Auditor (CISA) 2019: BCP & Network Security
- Security Programming: Scripting Essentials
- Security Programming: Code Identification
- CompTIA A+ 220-1002: Comparing Common Operating Systems
- CompTIA A+ 220-1002: Microsoft Operating System Installation & Upgrade
- Malware Removal: Remediating an Infected System
- Introduction to Cyber Operations
- Malware Removal: Analyzing an Infected System
- CyberOps Windows Hardening: Windows Workstation Hardening Best Practices
- CompTIA Cybersecurity Analyst+: Analyzing Malicious Activity
- Candace Batts's Transcript
- Candace Batts's Wallet
- About Accredible