Site Map - skillsoft.digitalbadges.skillsoft.com
- User Authentication
- Jazmin Martinez Vazquez's Credentials
- Jazmin Martinez Vazquez's Wallet
- The SAS Environment
- Inputs & Outputs
- CompTIA Server+: Servers & Cloud Computing
- CompTIA Server+: Configuring Server Components
- CompTIA Server+: Deploying Cloud PaaS & SaaS
- CompTIA Server+: Network Directory Services
- CompTIA Server+: Network Communications
- CompTIA Server+: Working with TCP/IP
- CompTIA Server+: Authentication & Authorization
- CompTIA A+ Core 1: Motherboards, CPUs, & Add-on Cards
- CompTIA A+ Core 1: Best Practices for Resolving Problems
- CompTIA A+ Core 1: Troubleshooting & Resolving Printer Issues
- DCCOR: Data Center Equipment Programmability
- CompTIA Network+: OSI Model Layers & Data Encapsulation
- CompTIA Network+: Network Types
- CLCOR: Class of Service & Toll Fraud Prevention
- CLCOR: Cisco Collaboration Applications
- CCNA 2020: NTP, DNS, & DHCP
- CCNA 2020: Networking Components
- CCNA 2020: Configuring & Verifying ACLs
- CCNA 2020: Configuring Port Security, DHCP Snooping, & DAI
- CCNA 2020: Layer 1 Interfaces & Cabling
- CCNA 2020: Network Topology Architectures - WAN, Cloud, & SOHO
- CCNA 2020: IPv6 Addressing & Configuration
- CCNA 2020: SNMP, Syslog, & PHB for QoS
- SCOR: PKI & IKE
- ENCOR: QoS & Cisco Express Forwarding
- CCNA 2020: Dynamic Routing
- CCNA 2020: APIs & Cisco DNA Center
- ENCOR: RSTP, MST, & Routing Concepts
- ENCOR: Overview, Enterprise Network Design, & High Availability
- ENCOR: Access Control & REST API Security
- SCOR: Port Security, VLAN Hopping, Network Hardening, & Access Control
- ENCOR: SPAN, IP SLA, SDN, & Remote Device Configuration
- CompTIA Server+: Deploying Cloud IaaS
- CompTIA Server+: Role-specific Server Deployment
- CompTIA Server+: Server Roles
- CompTIA A+ Core 1: RAM & Storage Solutions
- CompTIA IT Fundamentals: Internet, Storage, & Computer Systems
- CompTIA IT Fundamentals: Software Concepts
- CompTIA IT Fundamentals: Software Development Concepts
- CompTIA IT Fundamentals: CIA Triad
- CompTIA IT Fundamentals: Privacy & Encryption
- Creating & Reading Data Sets
- DEVASC: Configuring Devices with Bash, Python, & Ansible
- DEVASC: Software Development Methodologies
- DEVASC: Working with Data Formats
- DEVASC: HTTP, APIs, & Webhooks
- DEVASC: Application Infrastructure, Deployment, Security, & CI/CD
- DEVASC: DevOps, Docker, Bash, & Unit Testing Basics
- DEVASC: Coding, Testing, & Managing Cisco Devices
- DEVASC: Network, Collaboration, Security, & Compute Capabilities
- DEVASC: Working with Git
- DEVASC: Code Organization, Design Patterns, & Version Control
- DEVASC: Network Components, Connectivity, & Troubleshooting
- CompTIA Server+: Network Security Protocols
- CBROPS: The CIA Triad & Security Approaches
- CBROPS: Security Events, Firewall Operations, & Traffic Analysis
- CBROPS: File Extraction, Event Artifacts, & Regular Expressions
- CBROPS: Protected Data, Profiling, Forensics, & IRP
- CBROPS: Data & Attack Types
- CompTIA IT Fundamentals: Authentication & Disaster Recovery
- CompTIA Network+: Network Services & Data Center Architectures
- CompTIA Security+: Basic Cryptography & Public Key Infrastructure
- CompTIA Network+: Network Implementations
- CompTIA CASP+: Assessing & Managing Risk
- CompTIA Network+: Troubleshooting Network Issues
- CompTIA CASP+: Storage & Network Security
- CompTIA CASP+: Secure Cloud Computing
- CompTIA CASP+: Virtualization Security
- CompTIA Network+: Physical Security & Network Hardening
- CompTIA Network+: Cloud Concepts
- CompTIA Network+: Security Concepts & Threats
- CompTIA Network+: Network Operations
- CompTIA Network+: Ethernet Switching & Wireless Standards
- CompTIA Network+: Network Troubleshooting Methodologies & Tools
- CompTIA A+ Core 1: Mobile Device Accessories & Network Connectivity
- CompTIA Linux+: Daemons & Processes
- CompTIA Linux+: Network Services
- CompTIA CASP+: IT Governance & Security Compliance
- CompTIA CASP+: Monitoring & Incident Response
- CompTIA PenTest+: Professionalism & Integrity
- CompTIA Cybersecurity Analyst+: OS Process Management
- CompTIA CASP+: Vulnerabilities & Hardening
- CompTIA PenTest+: Active Reconnaissance
- CompTIA PenTest+: Wireless Attacks
- CompTIA PenTest+: Application-based Attacks
- CompTIA PenTest+: Attacks on Cloud Technologies
- CompTIA PenTest+: Social Engineering Attacks
- CompTIA PenTest+: Attacks on Specialized Systems
- CompTIA PenTest+: Post-Exploitation Techniques
- CompTIA PenTest+: Written Reports
- CompTIA PenTest+: Analyzing Tool & Script Output
- CompTIA PenTest+: Penetration Testing Tools
- CompTIA Data+: Database Concepts
- CompTIA Data+: Data Manipulation Techniques
- CompTIA Data+: Understanding Data
- CompTIA Data+: Data Analytics Tools
- CompTIA Data+: Query Optimization
- CompTIA Data+: Inferential Statistical Methods
- CompTIA Data+: Descriptive Statistical Methods
- CompTIA Data+: Creating Charts & Graphs
- CompTIA Data+: Data Visualization Dashboards
- CCNA 2020: Cisco Wireless Architecture & WLAN Components
- SCOR: Cisco Umbrella & Endpoint Security
- CompTIA Server+: Server Components
- SNCF: Cisco Firewall, IPS Systems, & the FMCv in AWS
- CompTIA Data+: Data Analysis Types & Techniques
- CompTIA Data+: Data Quality & Master Data Management
- CompTIA Server+: File System Security
- CompTIA Server+: Network Firewalls
- CompTIA Server+: Public Key Infrastructure (PKI)
- CompTIA Server+: Planning For The Worst
- CompTIA Server+: Server Troubleshooting
- CompTIA Linux+: Network Connectivity
- CompTIA Linux+: Security Threats & Cryptography
- CompTIA Linux+: Authentication & Authorization
- CompTIA Linux+: Shell Scripting with Bash
- CompTIA Linux+: Firewalls & Monitoring
- CompTIA Linux+: Securing Linux
- CompTIA Linux+: Application Containers
- CompTIA Linux+: Infrastructure as Code and Git
- CompTIA Cloud+: Cloud Security Controls
- CompTIA Cloud+: Data Security & Compliance Controls
- CompTIA Cloud+: Cloud Architecture & Models
- CompTIA Cloud+: Cloud Network Security
- CompTIA Cloud+: Cloud Identity & Access Management
- CompTIA Cloud+: Cloud Capacity Planning
- CompTIA Cloud+ : Cloud High Availability & Scaling
- CompTIA Cloud+: Cloud Solution Design
- CompTIA Linux+: Solving CPU, Memory, Boot, & Performance Issues
- CompTIA Linux+: Permissions Issues & Restoring the Linux OS
- CompTIA Security+: Social Engineering Techniques & Other Attack Types
- CompTIA Cloud+: Provisioning Cloud Storage
- CompTIA Cloud+: Cloud Migrations
- CompTIA Cloud+: Cloud Logging, Monitoring, Alerting & Optimization
- CompTIA Cloud+: Cloud Operations Management
- CompTIA Cloud+: Cloud Automation & Orchestration
- CompTIA Cloud+: Cloud Disaster Recovery
- CompTIA Cloud+: Cloud Component Integration
- CompTIA Cloud+: Troubleshooting Cloud Deployments
- CompTIA Cloud+: Cloud Troubleshooting Methodologies
- CompTIA Cloud+: Troubleshooting Cloud Security Issues
- CompTIA Cloud+: Troubleshooting Automation and Orchestration Issues
- Scrum Foundation: Scrum Certification & the Scrum Guide
- CompTIA IT Fundamentals: Networking & Wireless Technologies
- CompTIA PenTest+: Scoping & Engagement
- CompTIA Server+: Server Storage
- CompTIA A+ Core 1: Networking Concepts & Configurations
- CompTIA A+ Core 1: Cable Types & Connectors
- CompTIA A+ Core 1: Cloud Computing Concepts
- CompTIA A+ Core 1: Troubleshooting Wired & Wireless Networks
- CompTIA Data+: Data Governance
- CompTIA Linux+: Storage & File systems
- CompTIA Cybersecurity Analyst+: Vulnerability & Penetration Testing
- CompTIA Cybersecurity Analyst+: Malicious Techniques & Procedures
- CompTIA Cybersecurity Analyst+: Security & Network Monitoring
- CompTIA Cloud+: Cloud Network Deployments
- CompTIA CASP+: Authentication & Authorization
- CompTIA CASP+: Cryptography & PKI
- CompTIA Server+: Data Privacy & Protection
- CompTIA A+ Core 2: Operating System & Network Management
- CompTIA A+ Core 1: Multifunction Devices & Printer Consumables
- CompTIA IT Fundamentals: Basic IT Concepts
- CompTIA IT Fundamentals: Data, CPUs, & Troubleshooting
- CompTIA Linux+: Installation & File System Navigation
- CompTIA IT Fundamentals: Operating Systems
- CompTIA PenTest+: Passive Reconnaissance
- CompTIA PenTest+: Vulnerability Scanning
- CompTIA Network+: IP Addressing Schemes and Subnetting
- CompTIA A+ Core 1: Wireless Networking & Services
- CompTIA Data+: Understanding Databases
- CompTIA IT Fundamentals: Computer Devices & Components
- CompTIA IT Fundamentals: Database Concepts
- CompTIA Cybersecurity Analyst+: Authentication
- CompTIA Cybersecurity Analyst+: Malware
- CompTIA A+ Core 2: Securing SOHO Networks & Browser Security
- CompTIA A+ Core 2: Malware Detection, Removal, & Prevention
- CompTIA Data+: Data Acquisition & Cleansing
- Certified in Cybersecurity (CC): Data Security & System Hardening
- CompTIA Cybersecurity Analyst+: Network Security Concepts
- CompTIA Cybersecurity Analyst+: Cloud Computing & Cybersecurity
- CompTIA Cybersecurity Analyst+: Data Security Standards
- CompTIA Cybersecurity Analyst+: Managing Risk
- CompTIA Cybersecurity Analyst+: Threat Intelligence Information
- CompTIA Cybersecurity Analyst+: Cryptography
- CompTIA Cybersecurity Analyst+: Business Continuity Planning
- CompTIA PenTest+: Network Attacks & Exploits
- DCCOR: Cisco Application Centric Infrastructure
- CompTIA Network+: Well-known Ports & Protocols
- Windows Server 2016 - Install, Store, & Compute: Image Deployment Management
- CompTIA A+ Core 2: Desktop, Server, & Mobile Operating Systems
- CompTIA A+ Core 1: Installing Hardware & Display Components
- CompTIA A+ Core 1: Networking Fundamentals
- CBROPS: Firewall, Filtering, Visibility, & Control Data
- CBROPS: Threat Actors, Security, & Risk Management
- CompTIA Data+: Data Visualization Reports
- DCCOR: NX-OS, OSPFv2, & OSPFv3
- CLCOR: Configuring Cisco IOS Gateway
- CLCOR: CM Disaster Recovery & IP Protocols
- ENCOR: WLAN Deployment, SD-WAN, & SD-Access
- Malware Analysis
- Zero trust Networking Replay
- CBROPS: Host-based Analysis & the Role of Attribution
- CBROPS: CVSS, Deployments, Access Control, & Data Visibility
- DCCOR: MP-BGP, PIM, FHRPs, & RSTP+
- DCCOR: Streaming Telemetry & Cisco UCS
- Software Engineering, Security and Vulnerabilities
- SCOR: Security Vulnerabilities, Attack Mitigations, & Cryptographic Solutions
- SCOR: VPNs, Security Intelligence, & Social Engineering Attacks
- ENCOR: eBGP & BGP
- ENCOR: OSPF LSAs, Features, & Troubleshooting
- SCOR: Configuring and Verifying VPN & IPsec
- ENCOR: Network Programmability, EEM, & Orchestration Tools
- SCOR: Cloud Deployment, Service Models, Responsibilities, & Security
- Fundamentals of Malware Analysis and Remediation
- SCOR: Security Basics & Common Threats
- SCOR: Security Models & Frameworks
- Vulnerabilities, Systems Scanning and Exploitation
- SCOR: DHCP Snooping, DAI, IP Source Guard, Private VLANs, & Storm Control
- SCOR: Cisco Firepower, Traffic Management, Identity, & Authentication
- SCOR: Working with ESA, CES, & WSA
- SCOR: MDM, MFA, & Endpoint Solutions
- Identity Management, Directory Services, and Federation
- Cybersecurity Awareness and Threat Vectors
- Systems Hardening
- Network Discovery Tools and Techniques
- CyberOps Windows Hardening: Windows Server Hardening Best Practices
- CyberOps Windows Hardening: Windows Workstation Hardening Best Practices
- Cryptography: Introduction to PKI
- Modes of Operation & Algorithms
- Social Engineering Threats and Prevention
- Incident Response, Backup and Recovery Strategies, and Documentation
- Environment Monitoring, Retention, and Data Logging
- Legal Considerations and Cybercrime Investigations
- Cybersecurity Awareness: Getting Started with Security Foundations
- Cybersecurity Awareness: Information Security Fundamentals
- Cybersecurity Awareness: Key Security Terms & Concepts
- Cybersecurity Awareness: Exposure to Security Risks
- Remote Management
- Security Architecture
- Securing Information using Cryptography
- Network Hardening, Network Segmentation, and Secure Connections
- Public Key Infrastructure and Certificate Distribution
- Governance, Risk Management, and Compliance
- Monitoring in DevOps: IT Resources
- Monitoring in DevOps: Cloud Services
- Google Cloud Architect: Network Components
- Maven Repositories & Dependency Management
- Running Tests, Generating Reports, & Specifying Resources
- Plugins, Deployment, Troubleshooting, & Integration
- Software Testing Foundation 2018: Black-box & White-box Testing Techniques
- Google Cloud Architect: Data Storage
- Business Analysis Activities and Tools
- The BA Planning and Monitoring Knowledge Area
- Configuration, Advanced Help, & Queries
- JIRA Administration: Leveraging the Platform for Development Projects
- Lifecycle Phases, Plugins, Archetypes, & Build Profiles
- DevOps with Docker: Container Management
- DevOps with Docker: Management in the Cloud
- Using Docker for DevOps: Introduction to Docker
- Chef: Getting Started
- Test Driven Cookbooks
- Server Basics
- Community Cookbooks & Server Patterns
- JIRA Administration: Platform Fundamentals
- DevOps with Docker: Implementing DevOps Using Docker
- Software Testing Foundation 2018: Test Management
- Software Testing Foundation 2018: Static Testing
- Software Testing Foundation 2018: Test Tool Support
- Perspectives for Effective Business Analysis
- The BA Elicitation and Collaboration Knowledge Area
- Techniques & Tools
- Business Analysis Analytical Techniques
- Google Associate Cloud Engineer: Google Cloud Resource Manager
- Google Associate Cloud Engineer: Google Cloud Load Balancing
- Google Associate Cloud Engineer: Implementing Google Kubernetes Engine
- Google Associate Cloud Engineer: Implementing Google Compute Engine
- CompTIA Cloud Essentials+: Cloud Governance & Securing Data
- Google Associate Cloud Engineer: Managing Google Compute Engine
- Google Associate Cloud Engineer: Managing Google Kubernetes Engine
- CompTIA Cloud Essentials+: Cloud Licensing Models & Risk Mitigation
- Google Associate Cloud Engineer: Implementing Google App Engine
- Google Associate Cloud Engineer: Managing Google App Engine
- Google Associate Cloud Engineer: Implementing Google Cloud Storage
- Google Associate Cloud Engineer: Managing Google Cloud Storage
- Google Associate Cloud Engineer: Google Virtual Private Cloud
- Google Associate Cloud Engineer: Google Identity & Access Management (IAM)
- Google Associate Cloud Engineer: Google Cloud Operations Suite
- CompTIA Cloud Essentials+: Cloud Migration Strategies
- CompTIA Cloud Essentials+: Cloud Adoption to Enhance Business Value
- CompTIA Cloud Essentials+: Security Considerations
- CompTIA Cloud Essentials+: Cloud Native Apps & Cloud Data Analytics
- CompTIA Cloud Essentials+: Utilizing Cloud Services
- CompTIA Cloud Essentials+: Operations within Cloud
- CompTIA Cloud Essentials+: DevOps in the Cloud
- CompTIA Cloud Essentials+: Cloud Design Considerations
- CompTIA Cloud Essentials+: Gap Analysis & Cloud Assessment
- CompTIA Cloud Essentials+: Contracting with Cloud Service Providers
- CAPM®: Project Functions
- CAPM®: Project Performance Domains
- CompTIA Cloud Essentials+: Cloud Storage Technologies
- CompTIA Cloud Essentials+: Essential Cloud Principles
- CompTIA Cloud Essentials+: Essential Cloud Networking
- CompTIA Cloud Essentials+: Cloud Connectivity & Load Balancing
- RSTECH: Networking Hardware, Models, & Technologies
- CCNA 2020: Network Access, VLAN Configuration, & Interswitch Connectivity
- CCNA 2020: IPv4 Subnetting
- CCNA 2020: IP Addressing Basics & Configuration
- CCNA 2020: L2 Discovery Protocols & L2 and L3 EtherChannel Configuration
- CCNA 2020: Spanning Tree Protocol
- CCNA 2020: Static Routing
- CAPM®: Team Performance Domain
- CAPM®: Development Approach & Life Cycle Domain
- CAPM®: Planning Performance Domain
- Web Design Enhancements
- RSTECH: Network Responsibilities, Addressing, & Utilities
- RSTECH: Troubleshooting, Upgrading, Recovering, & Resetting
- RSTECH: Cisco Equipment, Components, & Port Characteristics
- RSTECH: Cisco Memory Functions & Removing Cisco Devices
- RSTECH: OS Types, IOS Access, & Terminal Emulation
- RSTECH: IOS Commands, Startup-Config, & IOX-XE Modes
- Web Design Basics
- Databases, Bootstrap, & jQuery in Web Design
- AWS Associate Solutions Architect 2020: AWS Review Course 2
- Discovering the Application in Excel for the Web
- Project Management Tools: Understanding PM Tools
- AWS Solutions Architect Professional 2022: Networking & Security
- Designing & Building a Basic Web Page
- Getting to Know Subversion
- CompTIA Security+: Analyzing Application & Network Attacks
- CompTIA Security+: Threat Actors, Intelligence Sources, & Vulnerabilities
- Jazmin Martinez Vazquez's Transcript
- Jazmin Martinez Vazquez's Wallet
- About Accredible