Duration 4 Days 24 CPD hours This course is intended for This course is for Azure Security Engineers who are planning to take the associated certification exam, or who are performing security tasks in their day-to-day job. This course would also be helpful to an engineer that wants to specialize in providing security for Azure-based digital platforms and play an integral role in protecting an organization's data. This course provides IT Security Professionals with the knowledge and skills needed to implement security controls, maintain an organization?s security posture, and identify and remediate security vulnerabilities. This course includes security for identity and access, platform protection, data and applications, and security operations. Prerequisites AZ-104T00 - Microsoft Azure Administrator Security best practices and industry security requirements such as defense in depth, least privileged access, role-based access control, multi-factor authentication, shared responsibility, and zero trust model. Be familiar with security protocols such as Virtual Private Networks (VPN), Internet Security Protocol (IPSec), Secure Socket Layer (SSL), disk and data encryption methods. Have some experience deploying Azure workloads. This course does not cover the basics of Azure administration, instead the course content builds on that knowledge by adding security specific information. Have experience with Windows and Linux operating systems and scripting languages. Course labs may use PowerShell and the CLI. 1 - Manage identities in Microsoft Entra ID Secure users in Microsoft Entra ID Secure groups in Microsoft Entra ID Recommend when to use external identities Secure external identities Implement Microsoft Entra Identity protection 2 - Manage authentication by using Microsoft Entra ID Configure Microsoft Entra Verified ID Implement multifactor authentication (MFA) Implement passwordless authentication Implement password protection Implement single sign-on (SSO) Integrate single sign-on (SSO) and identity providers Recommend and enforce modern authentication protocols 3 - Manage authorization by using Microsoft Entra ID Configure Azure role permissions for management groups, subscriptions, resource groups, and resources Assign built-in roles in Microsoft Entra ID Assign built-in roles in Azure Create and assign a custom role in Microsoft Entra ID Implement and manage Microsoft Entra Permissions Management Configure Microsoft Entra Privileged Identity Management Configure role management and access reviews by using Microsoft Entra Identity Governance Implement Conditional Access policies 4 - Manage application access in Microsoft Entra ID Manage access to enterprise applications in Microsoft Entra ID, including OAuth permission grants Manage app registrations in Microsoft Entra ID Configure app registration permission scopes Manage app registration permission consent Manage and use service principals Manage managed identities for Azure resources Recommend when to use and configure a Microsoft Entra Application Proxy, including authentication 5 - Plan and implement security for virtual networks Plan and implement Network Security Groups (NSGs) and Application Security Groups (ASGs) Plan and implement User-Defined Routes (UDRs) Plan and implement Virtual Network peering or gateway Plan and implement Virtual Wide Area Network, including secured virtual hub Secure VPN connectivity, including point-to-site and site-to-site Implement encryption over ExpressRoute Configure firewall settings on PaaS resources Monitor network security by using Network Watcher, including NSG flow logging 6 - Plan and implement security for private access to Azure resources Plan and implement virtual network Service Endpoints Plan and implement Private Endpoints Plan and implement Private Link services Plan and implement network integration for Azure App Service and Azure Functions Plan and implement network security configurations for an App Service Environment (ASE) Plan and implement network security configurations for an Azure SQL Managed Instance 7 - Plan and implement security for public access to Azure resources Plan and implement Transport Layer Security (TLS) to applications, including Azure App Service and API Management Plan, implement, and manage an Azure Firewall, Azure Firewall Manager and firewall policies Plan and implement an Azure Application Gateway Plan and implement an Azure Front Door, including Content Delivery Network (CDN) Plan and implement a Web Application Firewall (WAF) Recommend when to use Azure DDoS Protection Standard 8 - Plan and implement advanced security for compute Plan and implement remote access to public endpoints, Azure Bastion and just-in-time (JIT) virtual machine (VM) access Configure network isolation for Azure Kubernetes Service (AKS) Secure and monitor AKS Configure authentication for AKS Configure security for Azure Container Instances (ACIs) Configure security for Azure Container Apps (ACAs) Manage access to Azure Container Registry (ACR) Configure disk encryption, Azure Disk Encryption (ADE), encryption as host, and confidential disk encryption Recommend security configurations for Azure API Management 9 - Plan and implement security for storage Configure access control for storage accounts Manage life cycle for storage account access keys Select and configure an appropriate method for access to Azure Files Select and configure an appropriate method for access to Azure Blob Storage Select and configure an appropriate method for access to Azure Tables Select and configure an appropriate method for access to Azure Queues Select and configure appropriate methods for protecting against data security threats, including soft delete, backups, versioning, and immutable storage Configure Bring your own key (BYOK) Enable double encryption at the Azure Storage infrastructure level 10 - Plan and implement security for Azure SQL Database and Azure SQL Managed Instance Enable database authentication by using Microsoft Entra ID Enable and monitor database audit Identify use cases for the Microsoft Purview governance portal Implement data classification of sensitive information by using the Microsoft Purview governance portal Plan and implement dynamic mask Implement transparent data encryption? Recommend when to use Azure SQL Database Always Encrypted 11 - Plan, implement, and manage governance for security Create, assign, and interpret security policies and initiatives in Azure Policy Configure security settings by using Azure Blueprint Deploy secure infrastructures by using a landing zone Create and configure an Azure Key Vault Recommend when to use a dedicated Hardware Security Module (HSM) Configure access to Key Vault, including vault access policies and Azure Role Based Access Control Manage certificates, secrets, and keys Configure key rotation Configure backup and recovery of certificates, secrets, and keys 12 - Manage security posture by using Microsoft Defender for Cloud Implement Microsoft Defender for Cloud Identify and remediate security risks by using the Microsoft Defender for Cloud Secure Score and Inventory Assess compliance against security frameworks and Microsoft Defender for Cloud Add industry and regulatory standards to Microsoft Defender for Cloud Add custom initiatives to Microsoft Defender for Cloud Connect hybrid cloud and multicloud environments to Microsoft Defender for Cloud Identify and monitor external assets by using Microsoft Defender External Attack Surface Management 13 - Configure and manage threat protection by using Microsoft Defender for Cloud Enable workload protection services in Microsoft Defender for Cloud, including Microsoft Defender for Storage, Databases, Containers, App Service, Key Vault, Resource Manager, and DNS Configure Microsoft Defender for Servers Configure Microsoft Defender for Azure SQL Database Manage and respond to security alerts in Microsoft Defender for Cloud Configure workflow automation by using Microsoft Defender for Cloud Evaluate vulnerability scans from Microsoft Defender for Server 14 - Configure and manage security monitoring and automation solutions Monitor security events by using Azure Monitor Configure data connectors in Microsoft Sentinel Create and customize analytics rules in Microsoft Sentinel Configure automation in Microsoft Sentinel Additional course details: Nexus Humans AZ-500T00 Microsoft Azure Security Technologies training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AZ-500T00 Microsoft Azure Security Technologies course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for The primary audience for this course is any IT, facilities or data centre professional who works in and around the data centre and who has the responsibility to achieve and improve the availability and manageability of the data centre. Overview After completion of the course the participant will be able to:? Choose an optimum site for mission-critical data centre based on current and future needs? Describe all components that are important for high availability in a data centre and how to effectively setup the data centre? Name and apply the various industry standards? Describe the various technologies for UPS, fire suppression, cooling, monitoring systems, cabling standards, etc, and to select and apply them effectively to cost-efficiently enhance the high-availability of the data centre.? Review the electrical distribution system to avoid costly downtime? Enhance cooling capabilities and efficiency in the data centre by using existing and new techniques and technologies for the increased cooling requirements of the future? Design a highly reliable and scalable network architecture and learn how to ensure installers apply proper testing techniques? Create effective maintenance contracts with equipment suppliers ensuring the best return on investment? Setup effective data centre monitoring ensuring the right people get the right message? Ensure proper security measures, both procedural and technical, are established to safeguard your company's valuable information in the data centre The course will address how to setup and improve key aspects such as power, cooling, security, cabling, safety, etc., to ensure a high available data centre. It will also address key operations and maintenance aspects. The Data Centre, it?s Importance and Causes for DowntimeData Centre Standards and Best PracticesData Centre Location, Building and Construction Selecting appropriate sites and buildings and how to avoid pitfalls Various components of an effective data centre and supporting facilities setup Raised Floor/Suspended Ceiling Uniform, concentrated and rolling load definitions Applicable standards Raised Floor guidelines Signal Reference Grid, grounding of racks Disability act and regulations Suspended ceiling usage and requirements Light Standards Light fixture types and placement Emergency lighting, Emergency Power Supply (EPS) Power Infrastructure Power infrastructure layout from generation to rack level ATS and STS systems Redundancy levels and techniques Three-phase and single-phase usage Power distribution options within the computer room Power cabling versus bus bar trunking Bonding versus grounding Common Mode Noise and isolation transformers Distribution boards, form factors and IP-protection grades Power quality guidelines Real power versus apparent power How to size and calculate load in the data centre Generators Static and dynamic UPS systems, selection criteria, how they operate and energy efficiency option Battery types, correct selection and testing Thermo-graphics Electro Magnetic Fields Electrical fields and magnetic fields definitions and units of measurements Sources of EMF Effects of EMF on human health and equipment (H)EMP Standards EMF shielding solutions Equipment Racks Rack standards, properties and selection criteria Security considerations Power rail/strip options Cooling Infrastructure Temperature and humidity recommendations Cooling measurement units and conversion rates Sensible and latent heat definitions Differences between comfort and precision cooling Overview of different air conditioner technologies Raised floor versus non-raised floor cooling Placement of air conditioner units and limitations to be observed Supplemental cooling options Cold aisle/hot aisle containment Water Supply Importance of water supply and application areas Backup water supply techniques Designing a Scalable Network Infrastructure The importance of a Structured Cabling System Planning considerations Copper and Fiber cable technology and standards ANSI/TIA-942 Cabling hierarchy and recommendations Testing and verification SAN storage cabling Network redundancy Building-to-building connectivity Network monitoring system requirements Fire Suppression Standards for fire suppression Detection systems Various total flooding fire suppression techniques and systems, their benefits and disadvantages Handheld extinguishers Signage and safety Regulatory requirements and best practices Data Centre Monitoring Data centre monitoring requirements EMS versus BMS Water leak detection systems Notification options and considerations Operational Security and Safety Practices Data centre security layers Physical, infrastructure and organisational security Safety measures and essential signage Labelling Choosing a labelling scheme Recommended labelling practices Network labelling Documentation How to setup proper documentation Document management policies and procedures Cleaning Cleaning practices for the data centre MTBF/MTTR Standards and definitions Calculation models The ?real? value Maintenance Contracts/SLA/OLAEXAM: Certified Data Centre Professional Additional course details: Nexus Humans Certified Data Centre Professional (CDCP) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Certified Data Centre Professional (CDCP) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Join our Immigration Masterclass which explores Part 9 of the Immigration Rules, Ancestry Visas and Visit Visas. View our Masterclass training course dates below, available remotely via Microsoft Teams. Immerse yourself in a deep exploration of UK immigration in our one-day “Immigration Masterclass.” Whether you’re starting your journey, a legal professional, or eager to assist others, this course is tailored for success. Covering crucial topics like Part 9 of the Immigration Rules, grounds for refusal, UK Ancestry Visa, and Visit Visas, this masterclass blends theory with real-world case studies. Gain practical skills and emerge ready to navigate UK immigration with confidence and precision. Join us for an intensive journey into the intricacies of UK immigration in a condensed, yet comprehensive masterclass. Course joining links, materials and instructions are sent out 24hours before the course starts. Immigration Advice Service has been providing professional immigration services for over 10 years in the public, private and corporate sectors. Our fully qualified and OISC regulated trainer will guide you through the process and ensure you are competent in the area of Unaccompanied Minors. Who Should Attend: Designed for immigration Legal Practitioners, Lawyers, Solicitors, Immigration Advisors. Course Topics: Part 9 of the Immigration Rules (Grounds For Refusal) Introduction Structure of the Rules Section 1 to Section 5 of the Rules Appendix FM and Suitability Requirements Criminality o Persistent Offenders Deception Re-Entry Ban UK Ancestry Visa Introduction Who Qualifies Commonwealth Countries Legal Requirements Adequate Maintenance Test Extension Application Dependent Application Unique settlement applications o Remedy if application is refused. List of Evidence / Documents Sample Cover Letter Case Study Visit Visa Introduction Categories of Visitor Visa Legal Requirements What can and can’t the visitor do in the UK Extension of stay as a visitor Cancelation and Curtailment Remedy if application is refused. Sample refusal letters List of Documents/Evidence Sample Cover Letter Case Study
Our OISC Level 2 preparation course is a two-day training course which offers a closer look at immigration advice and follows on from the training at Level 1. Throughout this course, we cover the syllabus at Level 2, as according to OISC standards. View our course dates below, delivered via Microsoft Teams Course Overview: Take your expertise to the next level with our OISC Level 2 Accreditation Course. Designed as a two-day training program, this course builds upon the foundation established in Level 1 training. Delving deeper into immigration advice, we cover the Level 2 syllabus as prescribed by the OISC. Throughout this course, you’ll explore intermediate structures, frameworks, and concepts of UK immigration law. Gain insights into Humanitarian Protection and Asylum law, as well as the complexities of European Economic Area (EEA) free movement law. Additionally, our curriculum covers Business immigration law and Points-Based System (PBS) visas, along with the intricacies of detention and bail. We’ll also address major immigration offences to ensure a well-rounded understanding. Don’t forget to check out our Exam Technique Training (Level 2) which is designed to help prepare learners for their accreditation exam. Course joining links, materials and instructions are sent out 24hours before the course starts. What is included in the OISC Level 2 Syllabus? The OISC Level 2 Training introduces new learning objectives for immigration adviser applicants. The course includes: Intermediate structures, frameworks and concepts of UK immigration law Humanitarian Protection and Asylum law European Economic Area (EEA) free movement law Business immigration law and PBS visas Detention and bail Major immigration offences Join over 92% of satisfied customers who found their training with IAS useful and beneficial. You will also be provided with training materials to keep after completing the course. Who can attend the OISC Training Level 2 classes? The immigration procedures and structures introduced by the OISC Level 2 Course follow directly on from the objectives covered in the Level 1 Training. For this reason, participants should attend an OISC Level 2 class only after completing the Level 1 assessment. This course is also useful for participants who aim to become acquainted with UK immigration law. On the other hand, those who hold an OISC accreditation and wish to learn more about the latest development in this field can also benefit from this training class.
Course Objectives At the end of this course you will be able to: Work with advanced lookup and reference functions Create macros to automate common tasks Use advanced techniques to analyse data Create PivotTables and PivotCharts Work with data validation tools Import and export data ' Customer Feedback Best Training Ever! Just finished a bespoke 1-1 training course in Excel Advanced, Macros & VBA. Pedro is an excellent trainer, imparting his skills and knowledge in the best way - appropriately to audience skills, knowledge and ability. Pedro is always approachable, encouraging and supportive, giving delegates the optimum learning environment. I would not hesitate to recommend Pedro as a trainer, whatever your level of ability. Amanda Morris - Treasury & Systems Accountant at Reall - Real Equity for All The course was very interesting and engaging and will definitely be put to use. The trainer was very helpful and charismatic. Marving Lopez - AM Best Europe Pedro was excellent. Very knowledgeable, clear and great rapport with class. Darren Barkey - Direct Wines Great content and learnt a lot. Really enjoyable :) Kristie-Lee Ryan - Stirling Ackroyd 1 year email support service Take a closer look at the consistent excellent feedback from our growing corporate clients visiting our site ms-officetraining co uk With more than 20 years experience, we deliver courses on all levels of the Desktop version of Microsoft Office and Office 365; ranging from Beginner, Intermediate, Advanced to the VBA level. Our trainers are Microsoft certified professionals with a proven track record with several years experience in delivering public, one to one, tailored and bespoke courses. Our competitive rates start from £550.00 per day of training Tailored training courses: You can choose to run the course exactly as they are outlined by us or we can customise it so that it meets your specific needs. A tailored or bespoke course will follow the standard outline but may be adapted to your specific organisational needs. Please visit our site (ms-officetraining co uk) to get a feel of the excellent feedback our courses have had and look at other courses you might be interested in. Advanced Functions COUNT, COUNTA, COUNTIF, COUNTBLANK, SUMIF, SUBTOTAL IF, OR, AND, IFERROR VLOOKUP to lookup Exact Values and Approximate values MATCH, INDIRECT, ROW/COLUMN, INDEX, OFFSET Analysing Data PMT function to calculate a monthly payment of a loan What If Analysis using Goal Seek Use scenarios to consider many different variables Using Solver Add-in to optimize variables PivotTables Create a PivotTable to analyse worksheet data Add or remove fields in a PivotTable Change the data source for a PivotTable Working with external data sources Using different Statistical Functions Calculate a Running Total, % of Grant Total, Difference From… Using the Slicer and Timeline to filter the PivotTable Using Filters in a PivotTable Group by Date, Auto Group by ranges of values, Custom Group Create a PivotChart The GETPIVOTDATA function Formula auditing Precedents and dependents Error checking Watch a formula and its result by using the Watch Window Evaluate a nested formula one step at a time Data Validation Number Validation Data List Validation Message Prompts and Alerts Conditional Data Validation Data Validation Errors Consolidation Consolidate data by position Consolidate data by category Use a formula to consolidate data Outline (group) data in a worksheet Create an outline of rows Create an outline of columns Copy outlined data Hide or remove an outline Connect external data to your workbook Using the Power Query Editor to import data From Text and CSV, From Access, From Web, From another Workbook Using the Power Query Editor to; Transform your data by Selecting which fields to import, by Splitting Columns, Changing Data Type and more. Deleting Applied Steps Refreshing your data Working with Form Controls; Buttons, Option Buttons and Scroll Bars Introduction to Macros Change Macro Security settings How to Record a macro Some Macro Examples Delete a macro Edit the macro to view the VBA code Copy part of a macro to create another macro Assign a macro to a button Who is this course for? Who is this course for? This course is intended to end users who want to develop their skills so they can use advanced techniques to analyse extensive and complex datasets in Excel and to automate simple tasks with the use of Macros. Requirements Requirements Preferably, delegates should have attended the Excel Intermediate course. Career path Career path Excel know-how can instantly increase your job prospects as well as your salary. 80 percent of job openings require spreadsheet and word-processing software skills Certificates Certificates Certificate of completion Digital certificate - Included
SAP HANA Training | Online Courses | UK Provider Stay Ahead of the competition by gaining skills on SAP HANA with Osborne Training. SAP HANA training builds the foundation for seamless SAP applications, which helps deliver ground-breaking innovations without disruption. SAP HANA provides powerful features like significant processing speed, predictive capabilities, the ability to handle large amount of data, and text mining capabilities. SAP HANA course is designed to make you ready for SAP certification and Job market. Introduction In-Memory Computing Evolution of In-Memory computing at SAP History of SAP HANA HANA compare to BWA In-Memory Basics HANA Use cases Architecture Hana Engine Overview Different HANA Engine Types Row Store Column Store Persistency Layer Business Impact of new architecture Backup & Recovery Modeling Key Concepts in Data Modeling Components of HANA data model & Views Analytical ViewsAttribute viewsCalculation ViewsJoins Measures Filters Real Time Scenarios HANA SQL Intro Functions & Expressions Procedures Data Provisioning Overview Trigger Based Replication ETL Based Replication Log Based Replication Intro to BODS 4 Basic Data service Connection types Flat File upload in to HANA Reporting Connectivity options Business Objects BI 4 Security Creating Users Creating Roles Privileges User Administration
This module aims to develop knowledge and understanding of customs procedures associated with international trade. The module includes trade agreements, tariffs and taxes, immigration, intellectual property rights, clearance procedures, transport regulations, sanitary and Phyto-sanitary measures, customs valuation, preference systems and anti-dumping measures.
Person Centred Planning: the act of listening to each other creates relationship and strengthening trust and inclusion within the team. If well facilitated In creating a shared vision, groups of people build a sense of commitment together. They develop images of the future they want to create together, along with the values that will be important in getting there and the goals they want to see achieved along the way. Course Category Person Centred Planning Team Building and Leadership Description How to facilitate Person Centred Planning? How is it different from any other kind of meeting or planning? Person Centred working is great – but how exactly is it facilitated? How does it differ from ‘chairing a meeting” What skills and processes enable the group to work together effectively and avoid going off at tangents or dissolving into an unfocussed ‘discussion’ Person Centred Planning: the act of listening to each other creates relationship and strengthening trust and inclusion within the team. If well facilitated In creating a shared vision, groups of people build a sense of commitment together. They develop images of the future they want to create together, along with the values that will be important in getting there and the goals they want to see achieved along the way. Making inclusive action plans using full participation and graphic facilitation Drawing on the planning tools MAPS and PATH (Pearpoint, Forest and OBrien 1997) and other facilitation sources we use both process and graphic facilitation to enable the group to build their picture of what they would love to see happening within their organisation/community in the future and we encourage this to be a positive naming, not just a list of the things they want to avoid. In this training we make this facilitation explicit and attempt to model, teach and enable practice of key skills and processes. Jack Pearpoint, Marsha Forest and John O’Brien developed these innovative PCP approaches in North America and they are being used successfully in many parts of the UK. The planning can focus on an individual, group or organisation and provides a powerful problem solving opportunity, which is flexible and robust enough for many occasions. Tell the story, find the dream, touch the nightmare, and explore who you are, what are the gifts and strengths of the person or group, what are the needs of those present and what is the action plan for the future? Testimonials Learning Objectives Participants understand group and graphic facilitation processes for Person Centred Planning Participants have skills and confidence to facilitate PATH/MAP processes Participants learn graphic as well as process facilitation skills. Strengthens practitioners inclusive practice Provides additional tools for those involved in inclusive work in schools and the wider community Further develop problem solving and planning skills Who Is It For ? Person Centred Planning Facilitators Multi Agency Teams Social workers CAMHS teams Year Managers Primary and secondary staff teams Early Years and School based Practitioners Heads and Deputies SENCOs Advanced Skills Teachers Primary and secondary teachers Local Authority Support Services Voluntary Organisations Course Content The course answers the questions: Need to find new ways to facilitate Planning? How to facilitate Person Centred Planning? How is it different to any other kind of meeting or planning? Person Centred working is great – but how exactly is it facilitated? What are the skills and processes that will make the group work really well and a wonderful graphic to be created? Bored with annual reviews, transition plans and review meetings? Want to find a way of making meetings and planning feel more real and engaging? Need an approach, which engages a young person respectfully together with his or her family and friends? Want the ultimate visual record of the process of a meeting, which will help everyone, keep track? Want to problem solve and plan for the future of a small or large group, service or organisation up to the size of an LA? Inclusive Solutions offer an introductory day to facilitating person centred planning or a 3 – 10 session course which is practical as well as values based. Participants will receive direct individualised coaching and training. We will cover: Group and Graphic Facilitation processes Use of music and dramatic participation methodology The person being at the centre Family members and friends being full partners Planning reflecting the person’s capacities, what is important to the person and specifying the support they require to make a full contribution to their community Planning building a shared commitment to action that will uphold the person’s rights Planning leading to continual listening, learning and action and helping the person get what they want out of life. Essential Lifestyle Planning, PATH MAPS Personal Futures Planning
This course will allow you to explore the potential of self-service business intelligence using Power BI Desktop to analyse and connect to different sources of data, creating Relationships between those different datasets, Query the data using Shaping and data Modelling, to create Visualizations, and publish Reports to different platforms . Course Objectives At the end of this course you will be able to: Connect to data from different sources. Use the Query Editor Perform Power BI desktop data Shaping and Transformation. Create Power BI desktop Modelling. Create Power BI desktop Visualizations and Reports. ' 1 year email support service Take a closer look at the consistent excellent feedback from our growing corporate clients visiting our site ms-officetraining co uk With more than 20 years experience, we deliver courses on all levels of the Desktop version of Microsoft Office and Office 365; ranging from Beginner, Intermediate, Advanced to the VBA level and Business Intelligence. Our trainers are Microsoft certified professionals with a proven track record with several years experience in delivering public, one to one, tailored and bespoke courses. Our competitive rates start from £550.00 per day of training Tailored training courses: You can choose to run the course exactly as they are outlined by us or we can customise it so that it meets your specific needs. A tailored or bespoke course will follow the standard outline but may be adapted to your specific organisational needs. Please visit our site (ms-officetraining co uk) to get a feel of the excellent feedback our courses have had and look at other courses you might be interested in. Introduction to Power BI Power BI Jargon explained A quick look at Power BI Desktop A quick look at the Power BI service Helpful resources Power BI and Excel Introduction to using Excel data in Power BI Upload Excel data to Power BI Import Power View and Power Pivot to Power BI Getting started with Power BI Desktop Overview of Power BI Desktop Accessing Help and Helpful resources Connect to data sources in Power BI Desktop Shaping and Transforming Data with Query Editor Introduction to the Query Editor Data Sources Power BI Desktop can Connect to Introduction to Steps and M code Combining Data Using Merge and Append Queries Data Type Properties Working with Delimiters Clean and transform your data with the Query Editor Text Specific Transformation Tools Number Specific Transformation Tools Date Specific Transformation Tools Split and Merge columns Creating an Index Column Adding Conditional Columns Columns From Examples Grouping and Aggregating data Pivoting and Unpivoting Using filters Modeling the data Introduction to modeling your data How to manage your data relationships Create calculated columns Optimizing data models Create calculated measures Show Values As and Quick Measures Create calculated tables Explore your time-based data Introduction to DAX DAX calculation types DAX functions Visualizations Introduction to visuals in Power BI Create and customize simple visualizations Modify colors in charts and visuals Shapes, text boxes, and images Page layout and formatting Group interactions among visualizations Visual hierarchies and drill-down Using custom visualizations Create a KPI Visualization Geo-Data and Maps Reports, Publishing and Sharing Introduction to the Power BI service Quick insights in Power BI Create and configure a dashboard Ask questions of your data with natural language Create custom Q&A suggestions Share dashboards with your organization Introduction to content packs, security, and groups Publish Power BI Desktop reports Print and export dashboards and reports Create groups in Power BI Use content packs Update content packs Publish to web Who is this course for? Who is this course for? This course facilitates you with knowledge on the potential for Power BI Desktop to analyse and connect to different sources of data, creating Relationships between those different datasets, Query the data using Shaping and data Modelling, and to create Visualizations, and publish Reports to different platforms. Requirements Requirements Before attending this course, delegates should have: - A general knowledge of database concepts (fields, records and relationships) - Familiarity with Excel. Career path Career path Business Intelligence Data Analysis ETL & Data Warehousing