Site Map - skillsoft.digitalbadges.skillsoft.com
- User Authentication
- Marjorie Sanchez's Credentials
- Marjorie Sanchez's Wallet
- CompTIA PenTest+: Attacks on Cloud Technologies
- CompTIA PenTest+: Social Engineering Attacks
- CompTIA PenTest+: Attacks on Specialized Systems
- CompTIA PenTest+: Penetration Testing Tools
- CompTIA CASP+: Assessing & Managing Risk
- CompTIA PenTest+: Application-Based Vulnerabilities
- CompTIA CASP+: Storage & Network Security
- CompTIA CASP+: Secure Cloud Computing
- CompTIA CASP+: Authentication & Authorization
- CompTIA CASP+: Cryptography & PKI
- CompTIA CASP+: Monitoring & Incident Response
- CompTIA PenTest+: Enumeration & Reconnaissance Tools
- CompTIA PenTest+: Prioritize & Prepare for Attacks
- CompTIA PenTest+: Passive Reconnaissance
- CompTIA PenTest+: Network Attacks & Exploits
- CompTIA PenTest+: Scoping & Engagement
- CompTIA PenTest+: Vulnerability Identification
- CompTIA PenTest+: Professionalism & Integrity
- SCOR: DHCP Snooping, DAI, IP Source Guard, Private VLANs, & Storm Control
- SCOR: Cisco Firepower, Traffic Management, Identity, & Authentication
- SCOR: Configuring and Verifying VPN & IPsec
- SCOR: Working with ESA, CES, & WSA
- SCOR: Cloud Deployment, Service Models, Responsibilities, & Security
- SCOR: MDM, MFA, & Endpoint Solutions
- SNCF: Cisco Firewall, IPS Systems, & the FMCv in AWS
- SNCF: Network Discovery, Identity and DNS Policies, & Correlation
- SNCF: Dashboards, Reporting, Troubleshooting, Packet Capture, & Cisco AMP
- SNCF: Security Intelligence & Policies
- SCOR: Security Vulnerabilities, Attack Mitigations, & Cryptographic Solutions
- SCOR: VPNs, Security Intelligence, & Social Engineering Attacks
- SCOR: Security Models & Frameworks
- CBROPS: Security Events, Firewall Operations, & Traffic Analysis
- CBROPS: File Extraction, Event Artifacts, & Regular Expressions
- CBROPS: Protected Data, Profiling, Forensics, & IRP
- CBROPS: The CIA Triad & Security Approaches
- CBROPS: Host-based Analysis & the Role of Attribution
- CBROPS: CVSS, Deployments, Access Control, & Data Visibility
- CBROPS: Firewall, Filtering, Visibility, & Control Data
- CompTIA Security+: Security Goals & Controls
- Bridging Differences in Cross-cultural Communication
- Adopting New Leadership Mindsets to Drive DEI
- Activating DEI Culture Shifts
- Advancing DEI with Agility
- Embedding Inclusion into Everyday Experiences
- Reimagining the Employee Experience: DEI from Hire to Retire
- Cloud Computing Fundamentals: Introduction
- Product Management: Designing and Running Experiments
- Product Management: Communication for Product Managers
- Product Management: Understanding and Developing Customers
- Product Management: Market Research Basics
- Strength under Pressure: Building Perseverance and Resilience
- Product Management: Create a Go-to-Market Plan
- Product Management: Metrics for Product Managers
- Product Management: Building a Product Strategy
- Product Management: An Overview
- Product Management: Building a Product Roadmap and Agile Product Management
- Product Management: Competitive and Market Analytics for Product Managers
- Big Data Fundamentals
- Effectively Directing and Delegating as a Manager
- Big Data Interpretation
- Developing an Effective Business Case
- Making the Case for Your Business Project
- Embracing Agile at Scale
- Vendor Management for Technology Professionals
- Using Lean to Perfect Organizational Processes
- Enabling Business Process Improvement
- Managing for Operational Excellence
- Supply Chain Management Basics: Cutting Costs and Optimizing Delivery
- Applying Value Stream Mapping in Lean Business
- Optimizing Operations Using Demand Forecasting and Capacity Management
- Operations Management Functions and Strategies
- Using Lean to Reduce Waste and Streamline Value Flow
- Using Lean to Improve Flow and Pull
- Business Analysis Overview
- Inventory Management: Aligning Inventory with Production and Demand
- Perspectives for Effective Business Analysis
- Strategic Product and Service Management
- Preparing and Implementing a Business Plan
- Recognizing Hallucinations, Inaccuracies, and Bias in AI
- Navigating AI Ethical Challenges and Risks
- Establishing AI Guardrails and Governance
- Reimagining the Customer Experience with Generative AI
- Reimagining the Sales Process with Generative AI
- Unlocking Business Solutions with AI-Powered Analytics
- Using AI to Improve the Employee Experience
- Encouraging Innovation and Experimentation with AI
- Leading through the AI Disruption with Empathy
- Generative AI and Its Impact to Everyday Business
- Harnessing the Disruption of Generative AI
- Leading in the Age of Generative AI
- Leveraging AI as a Team Member
- Fostering a Growth Mindset in the Age of AI
- Leveraging Analytical and Critical Thinking to Implement AI
- Embracing Risk and Learning from Setbacks with AI Projects
- ITIL® 4 Foundation: Introduction
- Customer Service: Engaging with Customers
- Polishing Your Skills for Excellent Customer Service
- Controlling Conflict, Stress, and Time in Customer Service
- Dealing with Customer Service Incidents and Complaints
- Designing a Customer Service Strategy
- Facing Confrontation in Customer Service
- Providing Telephone Customer Service
- Providing Effective Internal Customer Service
- Providing On-site Customer Service
- Rapport Building in Customer Service
- Customer Service: Generating Effective Solutions
- Customer Service: Strengthening Your Service Skills
- Customer Service: Becoming a Chat Agent Star
- Customer Service: Fostering a Service Mindset
- Customer Service: Discovering Customer Needs
- Customer Service: Interpreting Customers’ Service Priorities
- Customer Service: Adapting to Your Customers' Cues
- Communicating Effectively with Customers
- Interacting with Customers
- Cloud Service Models & Benefits and Issues
- Building Customer Relationships in a Virtual Environment
- Marjorie Sanchez's Transcript
- Marjorie Sanchez's Wallet
- About Accredible