Site Map - skillsoft.digitalbadges.skillsoft.com
- User Authentication
- Sarah Trejo's Credentials
- Sarah Trejo's Wallet
- Joins, Aggregations, Calculated Fields, and Incremental Refresh in Tableau Prep
- Tableau Prep Builder
- Track 1: Tableau Prep Builder
- The Tableau Ecosystem and Tableau Prep Builder
- Simple Flows in Tableau Prep Builder
- Tableau Prep with PostgreSQL, Google Drive and BigQuery, and Amazon S3
- Data Roles, New Rows, and the Clean Step in Tableau Prep Builder
- The Pivot Step, Parameters in Flows, and Publishing to Tableau Cloud
- Tester Foundation Level 4.0: Software Testing Basics
- Tester Foundation Level 4.0: Software Testing Processes
- Tester Foundation Level 4.0: Software Development Testing Life Cycle
- Tester Foundation Level 4.0: Software Test Types & Maintenance Testing
- CompTIA Cybersecurity Analyst+: Encryption & Hashing
- Scrum Foundation: Scrum Basics
- CompTIA Cybersecurity Analyst+: IT Security Risk Mitigation
- CompTIA A+ Core 2: Desktop, Server, & Mobile Operating Systems
- CompTIA A+ Core 2: Linux, macOS, & Windows File Systems
- CompTIA A+ Core 2: Operating System & Network Management
- CompTIA A+ Core 2: Wireless Security Protocols & Authentication Methods
- CompTIA A+ Core 2: Physical Security Measures
- CompTIA A+ Core 2: Mobile & Embedded Device Security
- CompTIA A+ Core 2: Securing SOHO Networks & Browser Security
- CompTIA A+ Core 2: Operating System Security Best Practices
- CompTIA A+ Core 2: Malware Detection, Removal, & Prevention
- CompTIA A+ Core 2: Social Engineering Attacks
- CompTIA A+ Core 2: Best Practice Procedures for Malware Removal
- CompTIA A+ Core 2: Windows OS Problems & Personal Computer Security
- CompTIA A+ Core 2: Mobile OS Application & Application Security Issues
- CompTIA A+ Core 2: Backup & Recovery Methods
- CompTIA A+ Core 2: Information Management & Change Management Processes
- CompTIA A+ Core 2: Safety Procedures & Environmental Impacts
- CompTIA A+ Core 2: Communication Techniques, Licensing, & Policy Concepts
- CompTIA A+ Core 2: Scripting & Remote Technologies
- Managing Snowflake: Administering a Snowflake Account
- Scrum Toolbox: Selecting Scrum Tools
- Ethical Hacker: Denial of Service
- Ethical Hacker: Risk Assessment
- Ethical Hacker: ProxyChains & Enumeration
- CEH v12: Social Engineering, Insider Threats, and Identity Theft
- Ethical Hacker: Footprinting
- Ethical Hacker: IoT Hacking & Countermeasures
- Ethical Hacker: Password Attacks
- Ethical Hacker: Covert Data Gathering
- Ethical Hacker: Cloud Computer Attacks
- Ethical Hacker: Cryptography Attacks
- Ethical Hacker: Practical Web App Hacking
- CEH v11: Cybersecurity Basics, Attacks & Information Warfare
- Ethical Hacker: Vulnerability Analysis Concepts & Tools
- Ethical Hacker: Security Controls Part 2
- Ethical Hacker: Pentesting, Laws, & Standards
- Windows Client: Windows Security Management
- Business Analysis Activities and Tools
- Facing Confrontation in Customer Service
- Providing Telephone Customer Service
- Providing Effective Internal Customer Service
- Rapport Building in Customer Service
- Sarah Trejo's Transcript
- Sarah Trejo's Wallet
- About Accredible