Site Map - skillsoft.digitalbadges.skillsoft.com
- User Authentication
- DASIA TOOMBS's Credentials
- DASIA TOOMBS's Wallet
- Windows Server 2016 Networking: DHCP Configuration
- Backup & Recovery: Enterprise Backup Strategies
- CompTIA Network+: Network Types
- Malware Removal: Remediating an Infected System
- CompTIA A+ 220-1002: Comparing Common Operating Systems
- CompTIA A+ 220-1001: Installing Hardware & Display Components
- ENCOR: WLAN Layer 1 & Access Point Concepts
- Defining Cloud Computing for Decision-makers: Cloud Computing Principles
- 12. Services and Processes
- 13. Client Systems
- 15. Expeditionary Communications
- 9. Network Fundamentals
- 10. Switching and Routing
- 11. Appliances (Servers)
- 1D7XX - CYBER DEFENSE OPERATIONS
- CompTIA Network+: OSI Model Layers & Data Encapsulation
- 6. Enterprise Systems/Programs
- 23. Human Performance
- 1. Cyber Defense Operations
- 2. Publications and Directives
- 4. Cyber Authority and User Responsibilities
- 5. Cyber Enclave
- 7. Safety/Risk Management (RM)
- 8. Cyber Security
- 24. Secondary Training Documents
- 22. DODD 8140 Support
- 20. Manpower and Organization
- 19. Resource Management
- 18. Functional Management
- 16. Work Center Management
- 17. Unit Level Management
- 14. Data Analyst Core Competencies
- 32. CONFINED SPACES BASICS
- 1D7X1Q - ENTERPRISE OPERATIONS
- Certified in Cybersecurity (CC): Core Security Principles & Risk Management
- 21. Projects and Requirements Function
- 31. ANTENNA SYSTEMS
- 30. NETWORK DISTRIBUTION SYSTEMS
- 29. FIBER OPTICS
- 28. CABLE SPLICING
- 27. SATELLITE COMMUNICATIONS (SATCOM)
- 26. INSTALLATION NOTIFICATION AND WARNING SYSTEMS (GIANT VOICE) (OPTIONAL)
- 25. LAND MOBILE RADIO (LMR) TRANSMISSION SYSTEMS
- 24. STANDARD PRACTICES
- 23. LOCAL & NETWORKED SOLUTIONS
- 22. SOFTWARE
- 21. OPERATIONAL PROCEDURES
- 17. COMPUTER SECURITY (COMPUSEC)
- 19. TEMPEST PROGRAM MANAGEMENT
- 20. COMMUNICATIONS SECURITY (COMSEC) MANAGEMENT
- 13. VULNERABILITY MANAGEMENT
- 14. INTRUSION CONTROLS
- 15. CYBER COLLABORATION, PUBLICATIONS, DIRECTIVES
- 16. IDENTITY CREDENTIALING & ACCESS MANAGEMENT (ICAM)
- 18. RISK MANAGEMENT FRAMEWORK (RMF)
- 11. NETWORKED SYSTEMS
- 12. ENTERPRISE BOUNDARY CONCEPTS
- 10. SERVERS
- CLDFND: Server & Infrastructure Virtualization
- 9. INFORMATION TECHNOLOGY SYSTEMS FUNDAMENTALS
- 3. IP NETWORKING
- 4. VOICE COMMUNICATIONS
- 6. ENCRYPTION/DECRYPTION
- 7. CRITICAL COMMUNICATIONS FACILITIES POWER SYSTEMS
- 5. ENTERPRISE ADMINSTRATIVE FUNCTIONS
- 8. INFORMATION PROTECTION OPERATIONS
- 2. MAINTENANCE PRACTICES
- CompTIA A+ 220-1001: Networking Tools
- 1. ENTERPRISE OPERATIONS CAREER FIELD
- CompTIA Security+: Risk Management, Privacy, & Sensitive Data Security
- Domain 5.0 Governance, Risk, and Compliance (14%)
- CompTIA Security+: Implementing Secure Network Designs
- CompTIA Security+: Physical Security Controls
- CompTIA Security+: Basic Cryptography & Public Key Infrastructure
- CompTIA Security+: Implementing Cybersecurity Resilience
- CompTIA Security+: Security Assessment & Penetration Testing Techniques
- CompTIA Security+: Monitoring, Visibility, & Reporting
- CompTIA Security+: Vulnerability Management
- CompTIA Security+: Practical Cryptography
- CompTIA Security+: Security Goals & Controls
- CompTIA Security+: Threat Actors & Vectors
- CompTIA Security+: Mitigation Techniques
- CompTIA Security+: Analyzing Application & Network Attacks
- CompTIA A+ 220-1001: Wireless Networking Protocols
- CompTIA Security+: Social Engineering Techniques & Other Attack Types
- Microsoft Security: Microsoft 365 Security & Security Management
- CompTIA A+ Core 2: Backup & Recovery Methods
- CompTIA A+ 220-1002: Software Troubleshooting
- CompTIA A+ 220-1001: Working with Peripheral Devices
- CompTIA A+ 220-1001: Basic Cable Types
- DASIA TOOMBS's Transcript
- DASIA TOOMBS's Wallet
- About Accredible