• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

2979 Analyst courses

🔥 Limited Time Offer 🔥

Get a 10% discount on your first order when you use this promo code at checkout: MAY24BAN3X

PL-300T00 Microsoft Power BI Data Analyst

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for The audience for this course are data professionals and business intelligence professionals who want to learn how to accurately perform data analysis using Power BI. This course is also targeted toward those individuals who develop reports that visualize data from the data platform technologies that exist on both in the cloud and on-premises. This course covers the various methods and best practices that are in line with business and technical requirements for modeling, visualizing, and analyzing data with Power BI. The course will show how to access and process data from a range of data sources including both relational and non-relational sources. Finally, this course will also discuss how to manage and deploy reports and dashboards for sharing and content distribution. Prerequisites Understanding core data concepts. Knowledge of working with relational data in the cloud. Knowledge of working with non-relational data in the cloud. Knowledge of data analysis and visualization concepts. DP-900T00 Microsoft Azure Data Fundamentals is recommended 1 - DISCOVER DATA ANALYSIS * Overview of data analysis * Roles in data * Tasks of a data analyst 2 - GET STARTED BUILDING WITH POWER BI * Use Power BI * Building blocks of Power BI * Tour and use the Power BI service 3 - GET DATA IN POWER BI * Get data from files * Get data from relational data sources * Create dynamic reports with parameters * Get data from a NoSQL database * Get data from online services * Select a storage mode * Get data from Azure Analysis Services * Fix performance issues * Resolve data import errors 4 - CLEAN, TRANSFORM, AND LOAD DATA IN POWER BI * Shape the initial data * Simplify the data structure * Evaluate and change column data types * Combine multiple tables into a single table * Profile data in Power BI * Use Advanced Editor to modify M code 5 - DESIGN A SEMANTIC MODEL IN POWER BI * Work with tables * Create a date table * Work with dimensions * Define data granularity * Work with relationships and cardinality * Resolve modeling challenges 6 - ADD MEASURES TO POWER BI DESKTOP MODELS * Create simple measures * Create compound measures * Create quick measures * Compare calculated columns with measures 7 - ADD CALCULATED TABLES AND COLUMNS TO POWER BI DESKTOP MODELS * Create calculated columns * Learn about row context * Choose a technique to add a column 8 - USE DAX TIME INTELLIGENCE FUNCTIONS IN POWER BI DESKTOP MODELS * Use DAX time intelligence functions * Additional time intelligence calculations 9 - OPTIMIZE A MODEL FOR PERFORMANCE IN POWER BI * Review performance of measures, relationships, and visuals * Use variables to improve performance and troubleshooting * Reduce cardinality * Optimize DirectQuery models with table level storage * Create and manage aggregations 10 - DESIGN POWER BI REPORTS * Design the analytical report layout * Design visually appealing reports * Report objects * Select report visuals * Select report visuals to suit the report layout * Format and configure visualizations * Work with key performance indicators 11 - CONFIGURE POWER BI REPORT FILTERS * Apply filters to the report structure * Apply filters with slicers * Design reports with advanced filtering techniques * Consumption-time filtering * Select report filter techniques * Case study - Configure report filters based on feedback 12 - ENHANCE POWER BI REPORT DESIGNS FOR THE USER EXPERIENCE * Design reports to show details * Design reports to highlight values * Design reports that behave like apps * Work with bookmarks * Design reports for navigation * Work with visual headers * Design reports with built-in assistance * Tune report performance * Optimize reports for mobile use 13 - PERFORM ANALYTICS IN POWER BI * Explore statistical summary * Identify outliers with Power BI visuals * Group and bin data for analysis * Apply clustering techniques * Conduct time series analysis * Use the Analyze feature * Create what-if parameters * Use specialized visuals 14 - CREATE AND MANAGE WORKSPACES IN POWER BI * Distribute a report or dashboard * Monitor usage and performance * Recommend a development life cycle strategy * Troubleshoot data by viewing its lineage * Configure data protection 15 - MANAGE SEMANTIC MODELS IN POWER BI * Use a Power BI gateway to connect to on-premises data sources * Configure a semantic model scheduled refresh * Configure incremental refresh settings * Manage and promote semantic models * Troubleshoot service connectivity * Boost performance with query caching (Premium) 16 - CREATE DASHBOARDS IN POWER BI * Configure data alerts * Explore data by asking questions * Review Quick insights * Add a dashboard theme * Pin a live report page to a dashboard * Configure a real-time dashboard * Set mobile view 17 - IMPLEMENT ROW-LEVEL SECURITY * Configure row-level security with the static method * Configure row-level security with the dynamic method ADDITIONAL COURSE DETAILS: Nexus Humans PL-300T00: Microsoft Power BI Data Analyst training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the PL-300T00: Microsoft Power BI Data Analyst course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

PL-300T00 Microsoft Power BI Data Analyst
Delivered Online4 days, May 21st, 13:00 + 18 more
£1785

DP-080T00 Querying Data with Microsoft Transact-SQL

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This course can be valuable for anyone who needs to write basic SQL or Transact-SQL queries. This includes anyone working with data as a data analyst, a data engineer, a data scientist, a database administrator or a database developer. It can also be useful for others peripherally involved with data, or wanting to learn more about working with data such as solution architects, students and technology managers. This course will teach the basics of Microsoft's dialect of the standard SQL language: Transact-SQL. Topics include both querying and modifying data in relational databases that are hosted in Microsoft SQL Server-based database systems, including: Microsoft SQL Server, Azure SQL Database and, Azure Synapse Analytics. 1 - INTRODUCTION TO TRANSACT-SQL * Work with schemas * Explore the structure of SQL statements * Examine the SELECT statement * Work with data types * Handle NULLs 2 - SORT AND FILTER RESULTS IN T-SQL * Sort your results * Limit the sorted results * Page results * Remove duplicates * Filter data with predicates 3 - COMBINE MULTIPLE TABLES WITH JOINS IN T-SQL * Understand joins concepts and syntax * Use inner joins * Use outer joins * Use cross joins * Use self joins 4 - WRITE SUBQUERIES IN T-SQL * Understand subqueries * Use scalar or multi-valued subqueries * Use self-contained or correlated subqueries 5 - USE BUILT-IN FUNCTIONS AND GROUP BY IN TRANSACT-SQL * Categorize built-in functions * Use scalar functions * Use ranking and rowset functions * Use aggregate functions * Summarize data with GROUP BY * Filter groups with HAVING 6 - MODIFY DATA WITH T-SQL * Insert data * Generate automatic values * Update data * Delete data * Merge data based on multiple tables ADDITIONAL COURSE DETAILS: Nexus Humans DP-080T00 Querying Data with Microsoft Transact-SQL training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the DP-080T00 Querying Data with Microsoft Transact-SQL course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

DP-080T00 Querying Data with Microsoft Transact-SQL
Delivered Online3 days, May 23rd, 08:30 + 7 more
£1190

AWS Cloud Practitioner Essentials

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for Sales Legal Marketing Business analysts Project managers AWS Academy students Other IT-related professionals Overview Summarize the working definition of AWS Differentiate between on-premises, hybrid-cloud, and all-in cloud Describe the basic global infrastructure of the AWS Cloud Explain the six benefits of the AWS Cloud Describe and provide an example of the core AWS services, including compute, network, databases, and storage Identify an appropriate solution using AWS Cloud services with various use cases Describe the AWS Well-Architected Framework Explain the shared responsibility model Describe the core security services within the AWS Cloud Describe the basics of AWS Cloud migration Articulate the financial benefits of the AWS Cloud for an organization?s cost management Define the core billing, account management, and pricing models Explain how to use pricing tools to make cost-effective choices for AWS services This course is for individuals who seek an overall understanding of the Amazon Web Services (AWS) Cloud, independent of specific technical roles. You will learn about AWS Cloud concepts, AWS services, security, architecture, pricing, and support to build your AWS Cloud knowledge. This course also helps you prepare for the AWS Certified Cloud Practitioner exam. Prerequisites General IT technical knowledge, General IT business knowledge 1 - INTRODUCTION TO AMAZON WEB SERVICES * Summarize the benefits of AWS * Describe differences between on-demand delivery and cloud deployments * Summarize the pay-as-you-go pricing model 2 - COMPUTE IN THE CLOUD * Describe the benefits of Amazon Elastic Compute Cloud (Amazon EC2) at a basic level * Identify the different Amazon EC2 instance types * Differentiate between the various billing options for Amazon EC2 * Describe the benefits of Amazon EC2 Auto Scaling * Summarize the benefits of Elastic Load Balancing * Give an example of the uses for Elastic Load Balancing * Summarize the differences between Amazon Simple Notification Service (Amazon SNS) and Amazon Simple Queue Services (Amazon SQS) * Summarize additional AWS compute options 3 - GLOBAL INFRASTRUCTURE AND RELIABILITY * Summarize the benefits of the AWS Global Infrastructure * Describe the basic concept of Availability Zones * Describe the benefits of Amazon CloudFront and Edge locations * Compare different methods for provisioning AWS services 4 - NETWORKING * Describe the basic concepts of networking * Describe the difference between public and private networking resources * Explain a virtual private gateway using a real life scenario * Explain a virtual private network (VPN) using a real life scenario * Describe the benefit of AWS Direct Connect * Describe the benefit of hybrid deployments * Describe the layers of security used in an IT strategy * Describe which services are used to interact with the AWS global network 5 - STORAGE AND DATABASES * Summarize the basic concept of storage and databases * Describe benefits of Amazon Elastic Block Store (Amazon EBS) * Describe benefits of Amazon Simple Storage Service (Amazon S3) * Describe the benefits of Amazon Elastic File System (Amazon EFS) * Summarize various storage solutions * Describe the benefits of Amazon Relational Database Service (Amazon RDS) * Describe the benefits of Amazon DynamoDB * Summarize various database services 6 - SECURITY * Explain the benefits of the shared responsibility model * Describe multi-factor authentication (MFA) * Differentiate between the AWS Identity and Access Management (IAM) security levels * Describe security policies at a basic level * Explain the benefits of AWS Organizations * Summarize the benefits of compliance with AWS * Explain primary AWS security services at a basic level 7 - MONITORING AND ANALYTICS * Summarize approaches to monitoring your AWS environment * Describe the benefits of Amazon CloudWatch * Describe the benefits of AWS CloudTrail * Describe the benefits of AWS Trusted Advisor 8 - PRICING AND SUPPORT * Understand AWS pricing and support models * Describe the AWS Free Tier * Describe key benefits of AWS Organizations and consolidated billing * Explain the benefits of AWS Budgets * Explain the benefits of AWS Cost Explorer * Explain the primary benefits of the AWS Pricing Calculator * Distinguish between the various AWS Support Plans * Describe the benefits of AWS Marketplace 9 - MIGRATION AND INNOVATION * Understand migration and innovation in the AWS Cloud * Summarize the AWS Cloud Adoption Framework (AWS CAF) * Summarize six key factors of a cloud migration strategy * Describe the benefits of various AWS data migration solutions, such as AWS Snowcone, AWS Snowball, and AWS Snowmobile * Summarize the broad scope of innovative solutions that AWS offers * Summarize the five pillars of the AWS Well-Architected Framewor 10 - AWS CERTIFIED CLOUD PRACTITIONER BASICS * Determine resources for preparing for the AWS Certified Cloud Practitioner examination * Describe benefits of becoming AWS Certified

AWS Cloud Practitioner Essentials
Delivered OnlineTwo days, May 23rd, 08:30 + 5 more
£675

55232 Writing Analytical Queries for Business Intelligence

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is intended for information workers and data science professionals who seek to use database reporting and analysis tools such as Microsoft SQL Server Reporting Services, Excel, Power BI, R, SAS and other business intelligence tools, and wish to use TSQL queries to efficiently retrieve data sets from Microsoft SQL Server relational databases for use with these tools. Overview After completing this course, students will be able to: - Identify independent and dependent variables and measurement levels in their own analytical work scenarios. - Identify variables of interest in relational database tables. - Choose a data aggregation level and data set design appropriate for the intended analysis and tool. - Use TSQL SELECT queries to produce ready-to-use data sets for analysis in tools such as PowerBI, SQL Server Reporting Services, Excel, R, SAS, SPSS, and others. - Create stored procedures, views, and functions to modularize data retrieval code. This course is about writing TSQL queries for the purpose of database reporting, analysis, and business intelligence. 1 - INTRODUCTION TO TSQL FOR BUSINESS INTELLIGENCE * Two Approaches to SQL Programming * TSQL Data Retrieval in an Analytics / Business Intelligence Environment * The Database Engine * SQL Server Management Studio and the CarDeal Sample Database * Identifying Variables in Tables * SQL is a Declarative Language * Introduction to the SELECT Query * Lab 1: Introduction to TSQL for Business Intelligence 2 - TURNING TABLE COLUMNS INTO VARIABLES FOR ANALYSIS: SELECT LIST EXPRESSIONS, WHERE, AND ORDER BY * Turning Columns into Variables for Analysis * Column Expressions, Data Types, and Built-in Functions * Column aliases * Data type conversions * Built-in Scalar Functions * Table Aliases * The WHERE clause * ORDER BY * Lab 1: Write queries 3 - COMBINING COLUMNS FROM MULTIPLE TABLES INTO A SINGLE DATASET: THE JOIN OPERATORS * Primary Keys, Foreign Keys, and Joins * Understanding Joins, Part 1: CROSS JOIN and the Full Cartesian Product * Understanding Joins, Part 2: The INNER JOIN * Understanding Joins, Part 3: The OUTER JOINS * Understanding Joins, Part 4: Joining more than two tables * Understanding Joins, Part 5: Combining INNER and OUTER JOINs * Combining JOIN Operations with WHERE and ORDER BY * Lab 1: Write SELECT queries 4 - CREATING AN APPROPRIATE AGGREGATION LEVEL USING GROUP BY * Identifying required aggregation level and granularity * Aggregate Functions * GROUP BY * HAVING * Order of operations in SELECT queries * Lab 1: Write queries 5 - SUBQUERIES, DERIVED TABLES AND COMMON TABLE EXPRESSIONS * Non-correlated and correlated subqueries * Derived tables * Common table expressions * Lab 1: Write queries 6 - ENCAPSULATING DATA RETRIEVAL LOGIC * Views * Table-valued functions * Stored procedures * Creating objects for read-access users * Creating database accounts for analytical client tools * Lab 1: Encapsulating Data Retrieval Logic 7 - GETTING YOUR DATASET TO THE CLIENT * Connecting to SQL Server and Submitting Queries from Client Tools * Connecting and running SELECT queries from: * Excel * PowerBI * RStudio * Exporting datasets to files using * Results pane from SSMS * The bcp utility * The Import/Export Wizard * Lab 1: Getting Your Dataset to the Client ADDITIONAL COURSE DETAILS: Nexus Humans 55232 Writing Analytical Queries for Business Intelligence training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the 55232 Writing Analytical Queries for Business Intelligence course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

55232 Writing Analytical Queries for Business Intelligence
Delivered Online4 days, May 29th, 13:00 + 2 more
£1785

Data Analysis and Visualization with Microsoft Excel

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This course is designed for students who already have foundational knowledge and skills in Excel and who wish to perform robust and advanced data and statistical analysis with Microsoft Excel using PivotTables, use tools such as Power Pivot and the Data Analysis ToolPak to analyze data, and visualize data and insights using advanced visualizations in charts and dashboards in Excel. To ensure success, you should have baseline skill using Microsoft Excel worksheets, particularly in creating workbooks with formulas and function Overview #NAME? Analyzing data to find issues, insights and opportunities, is now a critical part of many job roles. Beyond the analysis, data analysts in all job roles must be able to effectively present and communicate their findings in visually compelling ways. Microsoft© Excel© is designed for this purpose. Excel can connect to a wide range of data sources, perform robust data analysis and create diverse and robust data-backed visualizations to show insights, trends, and create reports. These capabilities enable people who use Excel for data analysis to turn data into thoughtful action. 1 - DATA ANALYSIS FUNDAMENTALS * Introduction to Data Science * Create and Modify Tables * Sort and Filter Data 2 - VISUALIZING DATA WITH EXCEL * Visualize Data with Charts * Modify and Format Charts * Apply Best Practices in Chart Design 3 - ANALYZING DATA WITH FORMULAS AND FUNCTIONS * Analyze Data with Formulas and Named Ranges * Analyze Data with Functions * Implement Data Validation, Forms, and Controls * Create Conditional Visualizations with Lookup Functions 4 - ANALYZING DATA WITH PIVOTTABLES * Create a PivotTable * Analyze PivotTable Data 5 - PRESENTING VISUAL INSIGHTS WITH DASHBOARDS IN EXCEL * Visualize Data with PivotCharts * Filter Data Using Slicers and Timelines * Create a Dashboard in Excel 6 - CREATING GEOSPATIAL VISUALIZATIONS WITH EXCEL * Create Map Charts in Excel * Customize Map Charts in Excel 7 - PERFORMING STATISTICAL ANALYSIS * Visualize Trendlines and Sparklines with Excel * Analyze Data with the Data Analysis ToolPa 8 - GETTING AND TRANSFORMING DATA * Connect to Data with Queries * Clean and Combine Data * Shape and Transform Data 9 - MODELING AND ANALYZING DATA WITH POWER PIVOT * Install Power Pivot in Excel * Create Data Models with Power Pivot * Create Power Pivots * Perform Advanced Data Analysis and Visualization 10 - PRESENTING INSIGHTS WITH REPORTS (OPTIONAL) * Plan a Report * Create a Report

Data Analysis and Visualization with Microsoft Excel
Delivered Online3 days, May 28th, 13:00 + 1 more
£590

SC-200T00 Microsoft Security Operations Analyst

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for The Microsoft Security Operations Analyst collaborates with organizational stakeholders to secure information technology systems for the organization. Their goal is to reduce organizational risk by rapidly remediating active attacks in the environment, advising on improvements to threat protection practices, and referring violations of organizational policies to appropriate stakeholders. Responsibilities include threat management, monitoring, and response by using a variety of security solutions across their environment. The role primarily investigates, responds to, and hunts for threats using Microsoft Sentinel, Microsoft Defender for Cloud, Microsoft 365 Defender, and third-party security products. Since the Security Operations Analyst consumes the operational output of these tools, they are also a critical stakeholder in the configuration and deployment of these technologies. Learn how to investigate, respond to, and hunt for threats using Microsoft Sentinel, Microsoft Defender for Cloud, and Microsoft 365 Defender. In this course you will learn how to mitigate cyberthreats using these technologies. Specifically, you will configure and use Microsoft Sentinel as well as utilize Kusto Query Language (KQL) to perform detection, analysis, and reporting. The course was designed for people who work in a Security Operations job role and helps learners prepare for the exam SC-200: Microsoft Security Operations Analyst. Prerequisites Basic understanding of Microsoft 365 Fundamental understanding of Microsoft security, compliance, and identity products Intermediate understanding of Windows 10 Familiarity with Azure services, specifically Azure SQL Database and Azure Storage Familiarity with Azure virtual machines and virtual networking Basic understanding of scripting concepts. 1 - INTRODUCTION TO MICROSOFT 365 THREAT PROTECTION * Explore Extended Detection & Response (XDR) response use cases * Understand Microsoft Defender XDR in a Security Operations Center (SOC) * Explore Microsoft Security Graph * Investigate security incidents in Microsoft Defender XDR 2 - MITIGATE INCIDENTS USING MICROSOFT 365 DEFENDER * Use the Microsoft Defender portal * Manage incidents * Investigate incidents * Manage and investigate alerts * Manage automated investigations * Use the action center * Explore advanced hunting * Investigate Microsoft Entra sign-in logs * Understand Microsoft Secure Score * Analyze threat analytics * Analyze reports * Configure the Microsoft Defender portal 3 - PROTECT YOUR IDENTITIES WITH MICROSOFT ENTRA ID PROTECTION * Microsoft Entra ID Protection overview * Detect risks with Microsoft Entra ID Protection policies * Investigate and remediate risks detected by Microsoft Entra ID Protection 4 - REMEDIATE RISKS WITH MICROSOFT DEFENDER FOR OFFICE 365 * Automate, investigate, and remediate * Configure, protect, and detect * Simulate attacks 5 - SAFEGUARD YOUR ENVIRONMENT WITH MICROSOFT DEFENDER FOR IDENTITY * Configure Microsoft Defender for Identity sensors * Review compromised accounts or data * Integrate with other Microsoft tools 6 - SECURE YOUR CLOUD APPS AND SERVICES WITH MICROSOFT DEFENDER FOR CLOUD APPS * Understand the Defender for Cloud Apps Framework * Explore your cloud apps with Cloud Discovery * Protect your data and apps with Conditional Access App Control * Walk through discovery and access control with Microsoft Defender for Cloud Apps * Classify and protect sensitive information * Detect Threats 7 - RESPOND TO DATA LOSS PREVENTION ALERTS USING MICROSOFT 365 * Describe data loss prevention alerts * Investigate data loss prevention alerts in Microsoft Purview * Investigate data loss prevention alerts in Microsoft Defender for Cloud Apps 8 - MANAGE INSIDER RISK IN MICROSOFT PURVIEW * Insider risk management overview * Create and manage insider risk policies * Investigate insider risk alerts * Take action on insider risk alerts through cases * Manage insider risk management forensic evidence * Create insider risk management notice templates 9 - INVESTIGATE THREATS BY USING AUDIT FEATURES IN MICROSOFT DEFENDER XDR AND MICROSOFT PURVIEW STANDARD * Explore Microsoft Purview Audit solutions * Implement Microsoft Purview Audit (Standard) * Start recording activity in the Unified Audit Log * Search the Unified Audit Log (UAL) * Export, configure, and view audit log records * Use audit log searching to investigate common support issues 10 - INVESTIGATE THREATS USING AUDIT IN MICROSOFT DEFENDER XDR AND MICROSOFT PURVIEW (PREMIUM) * Explore Microsoft Purview Audit (Premium) * Implement Microsoft Purview Audit (Premium) * Manage audit log retention policies * Investigate compromised email accounts using Purview Audit (Premium) 11 - INVESTIGATE THREATS WITH CONTENT SEARCH IN MICROSOFT PURVIEW * Explore Microsoft Purview eDiscovery solutions * Create a content search * View the search results and statistics * Export the search results and search report * Configure search permissions filtering * Search for and delete email messages 12 - PROTECT AGAINST THREATS WITH MICROSOFT DEFENDER FOR ENDPOINT * Practice security administration * Hunt threats within your network 13 - DEPLOY THE MICROSOFT DEFENDER FOR ENDPOINT ENVIRONMENT * Create your environment * Understand operating systems compatibility and features * Onboard devices * Manage access * Create and manage roles for role-based access control * Configure device groups * Configure environment advanced features 14 - IMPLEMENT WINDOWS SECURITY ENHANCEMENTS WITH MICROSOFT DEFENDER FOR ENDPOINT * Understand attack surface reduction * Enable attack surface reduction rules 15 - PERFORM DEVICE INVESTIGATIONS IN MICROSOFT DEFENDER FOR ENDPOINT * Use the device inventory list * Investigate the device * Use behavioral blocking * Detect devices with device discovery 16 - PERFORM ACTIONS ON A DEVICE USING MICROSOFT DEFENDER FOR ENDPOINT * Explain device actions * Run Microsoft Defender antivirus scan on devices * Collect investigation package from devices * Initiate live response session 17 - PERFORM EVIDENCE AND ENTITIES INVESTIGATIONS USING MICROSOFT DEFENDER FOR ENDPOINT * Investigate a file * Investigate a user account * Investigate an IP address * Investigate a domain 18 - CONFIGURE AND MANAGE AUTOMATION USING MICROSOFT DEFENDER FOR ENDPOINT * Configure advanced features * Manage automation upload and folder settings * Configure automated investigation and remediation capabilities * Block at risk devices 19 - CONFIGURE FOR ALERTS AND DETECTIONS IN MICROSOFT DEFENDER FOR ENDPOINT * Configure advanced features * Configure alert notifications * Manage alert suppression * Manage indicators 20 - UTILIZE VULNERABILITY MANAGEMENT IN MICROSOFT DEFENDER FOR ENDPOINT * Understand vulnerability management * Explore vulnerabilities on your devices * Manage remediation 21 - PLAN FOR CLOUD WORKLOAD PROTECTIONS USING MICROSOFT DEFENDER FOR CLOUD * Explain Microsoft Defender for Cloud * Describe Microsoft Defender for Cloud workload protections * Enable Microsoft Defender for Cloud 22 - CONNECT AZURE ASSETS TO MICROSOFT DEFENDER FOR CLOUD * Explore and manage your resources with asset inventory * Configure auto provisioning * Manual log analytics agent provisioning 23 - CONNECT NON-AZURE RESOURCES TO MICROSOFT DEFENDER FOR CLOUD * Protect non-Azure resources * Connect non-Azure machines * Connect your AWS accounts * Connect your GCP accounts 24 - MANAGE YOUR CLOUD SECURITY POSTURE MANAGEMENT? * Explore Secure Score * Explore Recommendations * Measure and enforce regulatory compliance * Understand Workbooks 25 - EXPLAIN CLOUD WORKLOAD PROTECTIONS IN MICROSOFT DEFENDER FOR CLOUD * Understand Microsoft Defender for servers * Understand Microsoft Defender for App Service * Understand Microsoft Defender for Storage * Understand Microsoft Defender for SQL * Understand Microsoft Defender for open-source databases * Understand Microsoft Defender for Key Vault * Understand Microsoft Defender for Resource Manager * Understand Microsoft Defender for DNS * Understand Microsoft Defender for Containers * Understand Microsoft Defender additional protections 26 - REMEDIATE SECURITY ALERTS USING MICROSOFT DEFENDER FOR CLOUD * Understand security alerts * Remediate alerts and automate responses * Suppress alerts from Defender for Cloud * Generate threat intelligence reports * Respond to alerts from Azure resources 27 - CONSTRUCT KQL STATEMENTS FOR MICROSOFT SENTINEL * Understand the Kusto Query Language statement structure * Use the search operator * Use the where operator * Use the let statement * Use the extend operator * Use the order by operator * Use the project operators 28 - ANALYZE QUERY RESULTS USING KQL * Use the summarize operator * Use the summarize operator to filter results * Use the summarize operator to prepare data * Use the render operator to create visualizations 29 - BUILD MULTI-TABLE STATEMENTS USING KQL * Use the union operator * Use the join operator 30 - WORK WITH DATA IN MICROSOFT SENTINEL USING KUSTO QUERY LANGUAGE * Extract data from unstructured string fields * Extract data from structured string data * Integrate external data * Create parsers with functions 31 - INTRODUCTION TO MICROSOFT SENTINEL * What is Microsoft Sentinel? * How Microsoft Sentinel works * When to use Microsoft Sentinel 32 - CREATE AND MANAGE MICROSOFT SENTINEL WORKSPACES * Plan for the Microsoft Sentinel workspace * Create a Microsoft Sentinel workspace * Manage workspaces across tenants using Azure Lighthouse * Understand Microsoft Sentinel permissions and roles * Manage Microsoft Sentinel settings * Configure logs 33 - QUERY LOGS IN MICROSOFT SENTINEL * Query logs in the logs page * Understand Microsoft Sentinel tables * Understand common tables * Understand Microsoft Defender XDR tables 34 - USE WATCHLISTS IN MICROSOFT SENTINEL * Plan for watchlists * Create a watchlist * Manage watchlists 35 - UTILIZE THREAT INTELLIGENCE IN MICROSOFT SENTINEL * Define threat intelligence * Manage your threat indicators * View your threat indicators with KQL 36 - CONNECT DATA TO MICROSOFT SENTINEL USING DATA CONNECTORS * Ingest log data with data connectors * Understand data connector providers * View connected hosts 37 - CONNECT MICROSOFT SERVICES TO MICROSOFT SENTINEL * Plan for Microsoft services connectors * Connect the Microsoft Office 365 connector * Connect the Microsoft Entra connector * Connect the Microsoft Entra ID Protection connector * Connect the Azure Activity connector 38 - CONNECT MICROSOFT DEFENDER XDR TO MICROSOFT SENTINEL * Plan for Microsoft Defender XDR connectors * Connect the Microsoft Defender XDR connector * Connect Microsoft Defender for Cloud connector * Connect Microsoft Defender for IoT * Connect Microsoft Defender legacy connectors 39 - CONNECT WINDOWS HOSTS TO MICROSOFT SENTINEL * Plan for Windows hosts security events connector * Connect using the Windows Security Events via AMA Connector * Connect using the Security Events via Legacy Agent Connector * Collect Sysmon event logs 40 - CONNECT COMMON EVENT FORMAT LOGS TO MICROSOFT SENTINEL * Plan for Common Event Format connector * Connect your external solution using the Common Event Format connector 41 - CONNECT SYSLOG DATA SOURCES TO MICROSOFT SENTINEL * Plan for syslog data collection * Collect data from Linux-based sources using syslog * Configure the Data Collection Rule for Syslog Data Sources * Parse syslog data with KQL 42 - CONNECT THREAT INDICATORS TO MICROSOFT SENTINEL * Plan for threat intelligence connectors * Connect the threat intelligence TAXII connector * Connect the threat intelligence platforms connector * View your threat indicators with KQL 43 - THREAT DETECTION WITH MICROSOFT SENTINEL ANALYTICS * What is Microsoft Sentinel Analytics? * Types of analytics rules * Create an analytics rule from templates * Create an analytics rule from wizard * Manage analytics rules 44 - AUTOMATION IN MICROSOFT SENTINEL * Understand automation options * Create automation rules 45 - THREAT RESPONSE WITH MICROSOFT SENTINEL PLAYBOOKS * What are Microsoft Sentinel playbooks? * Trigger a playbook in real-time * Run playbooks on demand 46 - SECURITY INCIDENT MANAGEMENT IN MICROSOFT SENTINEL * Understand incidents * Incident evidence and entities * Incident management 47 - IDENTIFY THREATS WITH BEHAVIORAL ANALYTICS * Understand behavioral analytics * Explore entities * Display entity behavior information * Use Anomaly detection analytical rule templates 48 - DATA NORMALIZATION IN MICROSOFT SENTINEL * Understand data normalization * Use ASIM Parsers * Understand parameterized KQL functions * Create an ASIM Parser * Configure Azure Monitor Data Collection Rules 49 - QUERY, VISUALIZE, AND MONITOR DATA IN MICROSOFT SENTINEL * Monitor and visualize data * Query data using Kusto Query Language * Use default Microsoft Sentinel Workbooks * Create a new Microsoft Sentinel Workbook 50 - MANAGE CONTENT IN MICROSOFT SENTINEL * Use solutions from the content hub * Use repositories for deployment 51 - EXPLAIN THREAT HUNTING CONCEPTS IN MICROSOFT SENTINEL * Understand cybersecurity threat hunts * Develop a hypothesis * Explore MITRE ATT&CK 52 - THREAT HUNTING WITH MICROSOFT SENTINEL * Explore creation and management of threat-hunting queries * Save key findings with bookmarks * Observe threats over time with livestream 53 - USE SEARCH JOBS IN MICROSOFT SENTINEL * Hunt with a Search Job * Restore historical data 54 - HUNT FOR THREATS USING NOTEBOOKS IN MICROSOFT SENTINEL * Access Azure Sentinel data with external tools * Hunt with notebooks * Create a notebook * Explore notebook code

SC-200T00 Microsoft Security Operations Analyst
Delivered Online5 days, Jun 4th, 13:00 + 3 more
£2380

Change Management Foundation

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for CxO?s IT Managers/ Directors Senior Project Officers Project & Program Coordinator/Managers Operations Managers Quality Managers Business Analysts Engineering Managers IT Infrastructure Managers Internal Consultants Professional Consultants Overview Change and the individual Change and the organization Communication and stakeholder engagement Change practice Dealing with change and more importantly, the impact of change is a high priority for all organisations. The Change Management Certification has been developed by APMG in partnership with the Change Management Institute (CMI), an independent, global professional association of change managers. Together they have developed a professional ?body of knowledge? for the discipline of change management. This body of knowledge now provides an independent benchmark for the professional knowledge expected of an effective change manager. APMG?s refreshed Change Management certification is fully aligned with the change management body of knowledge. Prerequisites There is no prerequisite to attending this foundation course, although it is recommended that candidates should have a good understanding of business practices. 1 - CHANGE AND THE ORGANIZATION * Drivers for change * Developing a vision * Culture and climate * Emergent change and lifecycle * Organizational metaphors * Models of change * Roles required for change 2 - STAKEHOLDERS * Principles * Identification * Analysis * Influencing and listening * Emotion and demonstration * Communications * Cognitive biases * Remaining people focused * Improving Communications * Communications channels * Collaboration * Communications Planning * Larger workshops 2 - CHANGE IMPACT * Assessing impact * McKinsey 7 S * Stakeholder impact assessment * Assessing change readiness * Large change ? how to staff * Building a change team * Preparing for resistance * Building team effectiveness 4 - INDIVIDUAL CHANGE * Learning theory * Motivation * Change Curve * Personality differences

Change Management Foundation
Delivered Online4 days, May 29th, 13:00 + 2 more
£2000

Real Estate Analyst (Investment Cash Flow Modelling in Excel)

4.3(5)

By Bayfield Training

The Real Estate Analyst course has been taught non-stop to global real estate firms over the last 25 years, and is without doubt the core financial modelling training in your career portfolio. Whether you have an upcoming financial modelling test for a new job or an APC exam, the Real Estate Analyst course is the choice for you.

Real Estate Analyst (Investment Cash Flow Modelling in Excel)
Delivered Online or in personTwo days, Jun 17th, 09:00 + 6 more
£1750

Financial Analyst Complete Bundle - QLS Endorsed

By Imperial Academy

10 QLS Endorsed Courses for Financial Analyst | 10 Endorsed Certificates Included | Life Time Access

Financial Analyst Complete Bundle - QLS Endorsed
Delivered Online On Demand
£599

CompTIA Cybersecurity Analyst (CySA+)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed primarily for cybersecurity practitioners who perform job functions related to protecting information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation. This course focuses on the knowledge, ability, and skills necessary to provide for the defense of those information systems in a cybersecurity context, including protection, detection, analysis, investigation, and response processes. In addition, the course ensures that all members of an IT team?everyone from help desk staff to the Chief Information Officer?understand their role in these security processes. Overview In this course, you will assess and respond to security threats and operate a systems and network security analysis platform. You will: - Assess information security risk in computing and network environments. - Analyze reconnaissance threats to computing and network environments. - Analyze attacks on computing and network environments. - Analyze post-attack techniques on computing and network environments. - Implement a vulnerability management program. - Collect cybersecurity intelligence. - Analyze data collected from security and event logs. - Perform active analysis on assets and networks. - Respond to cybersecurity incidents. - Investigate cybersecurity incidents. - Address security issues with the organization's technology architecture. The course introduces tools and tactics to manage cybersecurity risks, identify various types of common threats, evaluate the organization's security, collect and analyze cybersecurity intelligence, and handle incidents as they occur. 1 - ASSESSING INFORMATION SECURITY RISK * Identify the Importance of Risk Management * Assess Risk * Mitigate Risk * Integrate Documentation into Risk Management 2 - ANALYZING RECONNAISSANCE THREATS TO COMPUTING AND NETWORK ENVIRONMENTS * Assess the Impact of Reconnaissance Incidents * Assess the Impact of Social Engineering 3 - ANALYZING ATTACKS ON COMPUTING AND NETWORK ENVIRONMENTS * Assess the Impact of System Hacking Attacks * Assess the Impact of Web-Based Attacks * Assess the Impact of Malware * Assess the Impact of Hijacking and Impersonation Attacks * Assess the Impact of DoS Incidents * Assess the Impact of Threats to Mobile Security * Assess the Impact of Threats to Cloud Security 4 - ANALYZING POST-ATTACK TECHNIQUES * Assess Command and Control Techniques * Assess Persistence Techniques * Assess Lateral Movement and Pivoting Techniques * Assess Data Exfiltration Techniques * Assess Anti-Forensics Techniques 5 - MANAGING VULNERABILITIES IN THE ORGANIZATION * Implement a Vulnerability Management Plan * Assess Common Vulnerabilities * Conduct Vulnerability Scans * Conduct Penetration Tests on Network Assets 6 - COLLECTING CYBERSECURITY INTELLIGENCE * Deploy a Security Intelligence Collection and Analysis Platform * Collect Data from Network-Based Intelligence Sources * Collect Data from Host-Based Intelligence Sources 7 - ANALYZING LOG DATA * Use Common Tools to Analyze Logs * Use SIEM Tools for Analysis 8 - PERFORMING ACTIVE ASSET AND NETWORK ANALYSIS * Analyze Incidents with Windows-Based Tools * Analyze Incidents with Linux-Based Tools * Analyze Malware * Analyze Indicators of Compromise 9 - RESPONDING TO CYBERSECURITY INCIDENTS * Deploy an Incident Handling and Response Architecture * Mitigate Incidents * Prepare for Forensic Investigation as a CSIRT 10 - INVESTIGATING CYBERSECURITY INCIDENTS * Apply a Forensic Investigation Plan * Securely Collect and Analyze Electronic Evidence * Follow Up on the Results of an Investigation 11 - ADDRESSING SECURITY ARCHITECTURE ISSUES * Remediate Identity and Access Management Issues * Implement Security During the SDLC ADDITIONAL COURSE DETAILS: Nexus Humans CompTIA Cybersecurity Analyst Certification (CySA Plus) (Exam CS0-003) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CompTIA Cybersecurity Analyst Certification (CySA Plus) (Exam CS0-003) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CompTIA Cybersecurity Analyst (CySA+)
Delivered Online6 days, Jun 17th, 13:00 + 6 more
£2475

Educators matching "Analyst"

Show all 123
Business Analyst School

business analyst school

London

We offer a variety of courses and programs to help non-tech professionals get the right coaching, skills & certifications to grow their income to six figures using Agile Business Analysis skills. The Business Analysis School was founded by Eno Eka, an accountant who successfully transitioned into Business Analysis, grew her income to six figures and became a thought leader in the Business Analysis space helping over 7000 people through her training and coaching programs. Eno Eka is a business analyst and change manager based in Calgary, Alberta. She is an award-winning career coach and speaker who has been recognized for helping more than 7,000 professionals, especially immigrants kickstart their professional careers in Canada. She is a business analysis content developer and course instructor at the University of Manitoba.She is the CEO & Founder of Eny Consulting Inc, a boutique consulting firm in Canada. In about 3 years of arriving in Canada, Eno has touched the lives of thousands of immigrants to Canada. She has curated mentorship and coaching programs for immigrants to Canada which have sought her recognition & awards globally. Eno is an embodiment of service as she volunteers with several non- profit organizations to help immigrants to Canada integrate successfully and become gainfully employed. Eno volunteers as a mentor with Calgary Region Immigrant Employment Council (CRIEC) and sits on the Board of the IIBA Calgary Chapter as Director of Education.She also volunteers at the Calgary Drop-in Centre and Calgary Dream Centre. She is a Giving Back Sponsor for the Women in Need Society (WINS). She is the host of the Livestream Podcast, Fireside Chat With Eno where she shares valuable insights on job search tips and strategies for new immigrants. Her awards and achievements include: Forbes 30 under 30 nominee 2020, Education Category Alberta Top 30 under 30 recipient 2021 Calgary Top 40 under 40 nominee 2019 & 2020 Universal Women’s Network, Winner 2019 Award for Mentorship RBC Women of Influence 2020 Award Recipient Top 100 Black Women to Watch in Canada 2020 Award Recipient Canada’s Most Powerful Women: Top 100 award in the RBC Future Launch Future Leaders category nominee. RBC Top 25 Canadian Immigrant Awards Nominee 2020 2020 Tällberg/Eliasson Global Leadership Prize Nominee Top 8 Female Business Analysis Influencers To Watch in 2021-Globally Recognized & Featured by the IIBA Campaign Ambassador for the United Nations and the Office of the United Nations High Commissioner for Refugees Host of the Global Business Analyst Online Meetup IIBA Global Corporate Member IIBA Endorsed Education Provider for all IIBA certifications Authorized Training Partner for Agile & Scrum through ScrumStudy She has launched an online academy for Business Analysts where you can learn some of the most in demand skills globally.