Site Map - skillsoft.digitalbadges.skillsoft.com
- User Authentication
- Sara Alkatheeri's Credentials
- Sara Alkatheeri's Wallet
- CompTIA Linux+: Shells, Variables, & Configuration Files
- The Requirements Life Cycle Management Knowledge Area
- Business Analysis Overview
- CAPM®: Business Analysis Framework
- Final Exam: Business Analyst
- Using the Bash Shell
- PL-300: Maps, Waterfall Charts, & Scatter Plots in Power BI
- PL-300: Creating & Formatting Charts In Power BI
- PL-300: Leveraging Power BI with Ribbon, Line, Column, & Pie Charts
- PL-300: Working with Filters in Power BI
- PL-300: Applying the DAX Formula Language in Power BI
- PL-300: Using Time Intelligence in Power BI
- PL-300: Advanced Modeling Technique in Power BI
- PL-300: An Overview of Data Modeling in Power BI
- PL-300: Understanding Data Visualization
- PL-300: Loading & Transforming Data in Power BI
- PL-300: Power BI for Data Analysis
- PL-300: Preparing Data for Visualizations in Power BI
- Splunk: Getting Started
- Ethical Hacker: Security Controls Part 2
- Ethical Hacker: Pentesting, Laws, & Standards
- Ethical Hacker: Security Controls
- Information Security for Leaders: An Introduction to InfoSec
- Organizing Emails in Gmail 2021
- Configuring Gnome
- CAPM®: Project Management Key Concepts
- Taking Responsibility for Your Accountability
- VMware VCP-DCV vSphere 7: Virtualization, SDDC, & ESXi Hosts
- Exploring the Productivity tools in Windows 11
- Formatting & proofreading email text in Outlook 365
- Enhancing Hiring Decisions with Effective Applicant Screening
- AWS Professional Solutions Architect 2020: VPC Connectivity
- AWS Professional Solutions Architect 2020: Developer Managed Services
- AWS Professional Solutions Architect 2020: Desktop & Cost Management
- SQL Security Architecture
- Analytics Literacy for Business Professionals
- Reimagining the Sales Process with Generative AI
- Leveraging AI as a Team Member
- AWS Cloud Practitioner 2020: Cloud Architecture Design Principles
- AWS Cloud Practitioner 2020: Cloud Deployment & Operation
- AWS Cloud Practitioner 2020: Core Services
- AWS Cloud Practitioner 2020: Cloud Security & Compliance
- AWS Professional Solutions Architect 2020: S3 Management
- AWS Cloud Practitioner 2020: Technology Support Resources
- AWS Cloud Practitioner 2020: Access Management
- AWS Cloud Practitioner 2020: Security Support Resources
- AWS Professional Solutions Architect 2020: S3 Security
- AWS Professional Solutions Architect 2020: AWS Management
- AWS Professional Solutions Architect 2020: VPC Management & Peering
- AWS Cloud Practitioner 2020: Cloud Economics
- AWS Cloud Practitioner 2020: Cloud & the Value Proposition
- CBROPS: Firewall, Filtering, Visibility, & Control Data
- CBROPS: The CIA Triad & Security Approaches
- The Transformation Myth: Leading Your Organization into an Uncertain Future
- Security Risks: Performing Security Risk Assessments
- Risk Assessment and Management
- Apache Cordova: Getting Started
- Scalable Data Architectures: Getting Started
- Building Customer Relationships in a Virtual Environment
- Certified Information Systems Auditor (CISA) 2019: PKI & Data Protection
- Certified Information Systems Auditor (CISA) 2019: Virtualization & Cloud
- iOS Projects in Visual Studio
- Leading Inclusively Leadercamp: Session Replay
- Attack Vectors & Mitigations
- CompTIA IT Fundamentals: Data, CPUs, & Troubleshooting
- Cloud Security Fundamentals: Architectural & Design Concepts
- Cloud Security Fundamentals: Cloud Infrastructure Security
- Cloud Security Fundamentals: Basics of Cloud Operations
- SQL 2016 Tables
- Data Types & Normalization
- Commerce Basics
- Windows 10: Configure Networking
- Ethical Hacker: Footprinting
- Ethical Hacker: Password Attacks
- CEH v11: Cyber Kill Chain, TTPs, Behaviors & Threat Hunting
- OWASP Top 10: Securing Web Applications
- Certified in Cybersecurity (CC): Core Security Principles & Risk Management
- CEH v11: Operational Technology Concepts, Attack Tools & Countermeasures
- VMware VCP-DCV vSphere 7: Baselines, Cluster Image Validation, & VM Upgrades
- Cloud Service Models & Benefits and Issues
- SCOR: Cisco Firepower, Traffic Management, Identity, & Authentication
- Certified Information Systems Auditor (CISA) 2019: Digital Asset Protection
- Six Sigma and Lean: Foundations and Principles
- Certified Information Systems Auditor (CISA) 2019: Data Storage & Malware
- Sara Alkatheeri's Transcript
- Sara Alkatheeri's Wallet
- About Accredible