Duration 4 Days 24 CPD hours This course is intended for The Microsoft Security Operations Analyst collaborates with organizational stakeholders to secure information technology systems for the organization. Their goal is to reduce organizational risk by rapidly remediating active attacks in the environment, advising on improvements to threat protection practices, and referring violations of organizational policies to appropriate stakeholders. Responsibilities include threat management, monitoring, and response by using a variety of security solutions across their environment. The role primarily investigates, responds to, and hunts for threats using Microsoft Sentinel, Microsoft Defender for Cloud, Microsoft 365 Defender, and third-party security products. Since the Security Operations Analyst consumes the operational output of these tools, they are also a critical stakeholder in the configuration and deployment of these technologies. Learn how to investigate, respond to, and hunt for threats using Microsoft Sentinel, Microsoft Defender for Cloud, and Microsoft 365 Defender. In this course you will learn how to mitigate cyberthreats using these technologies. Specifically, you will configure and use Microsoft Sentinel as well as utilize Kusto Query Language (KQL) to perform detection, analysis, and reporting. The course was designed for people who work in a Security Operations job role and helps learners prepare for the exam SC-200: Microsoft Security Operations Analyst. Prerequisites Basic understanding of Microsoft 365 Fundamental understanding of Microsoft security, compliance, and identity products Intermediate understanding of Windows 10 Familiarity with Azure services, specifically Azure SQL Database and Azure Storage Familiarity with Azure virtual machines and virtual networking Basic understanding of scripting concepts. 1 - Introduction to Microsoft 365 threat protection Explore Extended Detection & Response (XDR) response use cases Understand Microsoft Defender XDR in a Security Operations Center (SOC) Explore Microsoft Security Graph Investigate security incidents in Microsoft Defender XDR 2 - Mitigate incidents using Microsoft 365 Defender Use the Microsoft Defender portal Manage incidents Investigate incidents Manage and investigate alerts Manage automated investigations Use the action center Explore advanced hunting Investigate Microsoft Entra sign-in logs Understand Microsoft Secure Score Analyze threat analytics Analyze reports Configure the Microsoft Defender portal 3 - Protect your identities with Microsoft Entra ID Protection Microsoft Entra ID Protection overview Detect risks with Microsoft Entra ID Protection policies Investigate and remediate risks detected by Microsoft Entra ID Protection 4 - Remediate risks with Microsoft Defender for Office 365 Automate, investigate, and remediate Configure, protect, and detect Simulate attacks 5 - Safeguard your environment with Microsoft Defender for Identity Configure Microsoft Defender for Identity sensors Review compromised accounts or data Integrate with other Microsoft tools 6 - Secure your cloud apps and services with Microsoft Defender for Cloud Apps Understand the Defender for Cloud Apps Framework Explore your cloud apps with Cloud Discovery Protect your data and apps with Conditional Access App Control Walk through discovery and access control with Microsoft Defender for Cloud Apps Classify and protect sensitive information Detect Threats 7 - Respond to data loss prevention alerts using Microsoft 365 Describe data loss prevention alerts Investigate data loss prevention alerts in Microsoft Purview Investigate data loss prevention alerts in Microsoft Defender for Cloud Apps 8 - Manage insider risk in Microsoft Purview Insider risk management overview Create and manage insider risk policies Investigate insider risk alerts Take action on insider risk alerts through cases Manage insider risk management forensic evidence Create insider risk management notice templates 9 - Investigate threats by using audit features in Microsoft Defender XDR and Microsoft Purview Standard Explore Microsoft Purview Audit solutions Implement Microsoft Purview Audit (Standard) Start recording activity in the Unified Audit Log Search the Unified Audit Log (UAL) Export, configure, and view audit log records Use audit log searching to investigate common support issues 10 - Investigate threats using audit in Microsoft Defender XDR and Microsoft Purview (Premium) Explore Microsoft Purview Audit (Premium) Implement Microsoft Purview Audit (Premium) Manage audit log retention policies Investigate compromised email accounts using Purview Audit (Premium) 11 - Investigate threats with Content search in Microsoft Purview Explore Microsoft Purview eDiscovery solutions Create a content search View the search results and statistics Export the search results and search report Configure search permissions filtering Search for and delete email messages 12 - Protect against threats with Microsoft Defender for Endpoint Practice security administration Hunt threats within your network 13 - Deploy the Microsoft Defender for Endpoint environment Create your environment Understand operating systems compatibility and features Onboard devices Manage access Create and manage roles for role-based access control Configure device groups Configure environment advanced features 14 - Implement Windows security enhancements with Microsoft Defender for Endpoint Understand attack surface reduction Enable attack surface reduction rules 15 - Perform device investigations in Microsoft Defender for Endpoint Use the device inventory list Investigate the device Use behavioral blocking Detect devices with device discovery 16 - Perform actions on a device using Microsoft Defender for Endpoint Explain device actions Run Microsoft Defender antivirus scan on devices Collect investigation package from devices Initiate live response session 17 - Perform evidence and entities investigations using Microsoft Defender for Endpoint Investigate a file Investigate a user account Investigate an IP address Investigate a domain 18 - Configure and manage automation using Microsoft Defender for Endpoint Configure advanced features Manage automation upload and folder settings Configure automated investigation and remediation capabilities Block at risk devices 19 - Configure for alerts and detections in Microsoft Defender for Endpoint Configure advanced features Configure alert notifications Manage alert suppression Manage indicators 20 - Utilize Vulnerability Management in Microsoft Defender for Endpoint Understand vulnerability management Explore vulnerabilities on your devices Manage remediation 21 - Plan for cloud workload protections using Microsoft Defender for Cloud Explain Microsoft Defender for Cloud Describe Microsoft Defender for Cloud workload protections Enable Microsoft Defender for Cloud 22 - Connect Azure assets to Microsoft Defender for Cloud Explore and manage your resources with asset inventory Configure auto provisioning Manual log analytics agent provisioning 23 - Connect non-Azure resources to Microsoft Defender for Cloud Protect non-Azure resources Connect non-Azure machines Connect your AWS accounts Connect your GCP accounts 24 - Manage your cloud security posture management? Explore Secure Score Explore Recommendations Measure and enforce regulatory compliance Understand Workbooks 25 - Explain cloud workload protections in Microsoft Defender for Cloud Understand Microsoft Defender for servers Understand Microsoft Defender for App Service Understand Microsoft Defender for Storage Understand Microsoft Defender for SQL Understand Microsoft Defender for open-source databases Understand Microsoft Defender for Key Vault Understand Microsoft Defender for Resource Manager Understand Microsoft Defender for DNS Understand Microsoft Defender for Containers Understand Microsoft Defender additional protections 26 - Remediate security alerts using Microsoft Defender for Cloud Understand security alerts Remediate alerts and automate responses Suppress alerts from Defender for Cloud Generate threat intelligence reports Respond to alerts from Azure resources 27 - Construct KQL statements for Microsoft Sentinel Understand the Kusto Query Language statement structure Use the search operator Use the where operator Use the let statement Use the extend operator Use the order by operator Use the project operators 28 - Analyze query results using KQL Use the summarize operator Use the summarize operator to filter results Use the summarize operator to prepare data Use the render operator to create visualizations 29 - Build multi-table statements using KQL Use the union operator Use the join operator 30 - Work with data in Microsoft Sentinel using Kusto Query Language Extract data from unstructured string fields Extract data from structured string data Integrate external data Create parsers with functions 31 - Introduction to Microsoft Sentinel What is Microsoft Sentinel? How Microsoft Sentinel works When to use Microsoft Sentinel 32 - Create and manage Microsoft Sentinel workspaces Plan for the Microsoft Sentinel workspace Create a Microsoft Sentinel workspace Manage workspaces across tenants using Azure Lighthouse Understand Microsoft Sentinel permissions and roles Manage Microsoft Sentinel settings Configure logs 33 - Query logs in Microsoft Sentinel Query logs in the logs page Understand Microsoft Sentinel tables Understand common tables Understand Microsoft Defender XDR tables 34 - Use watchlists in Microsoft Sentinel Plan for watchlists Create a watchlist Manage watchlists 35 - Utilize threat intelligence in Microsoft Sentinel Define threat intelligence Manage your threat indicators View your threat indicators with KQL 36 - Connect data to Microsoft Sentinel using data connectors Ingest log data with data connectors Understand data connector providers View connected hosts 37 - Connect Microsoft services to Microsoft Sentinel Plan for Microsoft services connectors Connect the Microsoft Office 365 connector Connect the Microsoft Entra connector Connect the Microsoft Entra ID Protection connector Connect the Azure Activity connector 38 - Connect Microsoft Defender XDR to Microsoft Sentinel Plan for Microsoft Defender XDR connectors Connect the Microsoft Defender XDR connector Connect Microsoft Defender for Cloud connector Connect Microsoft Defender for IoT Connect Microsoft Defender legacy connectors 39 - Connect Windows hosts to Microsoft Sentinel Plan for Windows hosts security events connector Connect using the Windows Security Events via AMA Connector Connect using the Security Events via Legacy Agent Connector Collect Sysmon event logs 40 - Connect Common Event Format logs to Microsoft Sentinel Plan for Common Event Format connector Connect your external solution using the Common Event Format connector 41 - Connect syslog data sources to Microsoft Sentinel Plan for syslog data collection Collect data from Linux-based sources using syslog Configure the Data Collection Rule for Syslog Data Sources Parse syslog data with KQL 42 - Connect threat indicators to Microsoft Sentinel Plan for threat intelligence connectors Connect the threat intelligence TAXII connector Connect the threat intelligence platforms connector View your threat indicators with KQL 43 - Threat detection with Microsoft Sentinel analytics What is Microsoft Sentinel Analytics? Types of analytics rules Create an analytics rule from templates Create an analytics rule from wizard Manage analytics rules 44 - Automation in Microsoft Sentinel Understand automation options Create automation rules 45 - Threat response with Microsoft Sentinel playbooks What are Microsoft Sentinel playbooks? Trigger a playbook in real-time Run playbooks on demand 46 - Security incident management in Microsoft Sentinel Understand incidents Incident evidence and entities Incident management 47 - Identify threats with Behavioral Analytics Understand behavioral analytics Explore entities Display entity behavior information Use Anomaly detection analytical rule templates 48 - Data normalization in Microsoft Sentinel Understand data normalization Use ASIM Parsers Understand parameterized KQL functions Create an ASIM Parser Configure Azure Monitor Data Collection Rules 49 - Query, visualize, and monitor data in Microsoft Sentinel Monitor and visualize data Query data using Kusto Query Language Use default Microsoft Sentinel Workbooks Create a new Microsoft Sentinel Workbook 50 - Manage content in Microsoft Sentinel Use solutions from the content hub Use repositories for deployment 51 - Explain threat hunting concepts in Microsoft Sentinel Understand cybersecurity threat hunts Develop a hypothesis Explore MITRE ATT&CK 52 - Threat hunting with Microsoft Sentinel Explore creation and management of threat-hunting queries Save key findings with bookmarks Observe threats over time with livestream 53 - Use Search jobs in Microsoft Sentinel Hunt with a Search Job Restore historical data 54 - Hunt for threats using notebooks in Microsoft Sentinel Access Azure Sentinel data with external tools Hunt with notebooks Create a notebook Explore notebook code
Duration 1 Days 6 CPD hours This course is intended for Sales Legal Marketing Business analysts Project managers AWS Academy students Other IT-related professionals Overview Summarize the working definition of AWS Differentiate between on-premises, hybrid-cloud, and all-in cloud Describe the basic global infrastructure of the AWS Cloud Explain the six benefits of the AWS Cloud Describe and provide an example of the core AWS services, including compute, network, databases, and storage Identify an appropriate solution using AWS Cloud services with various use cases Describe the AWS Well-Architected Framework Explain the shared responsibility model Describe the core security services within the AWS Cloud Describe the basics of AWS Cloud migration Articulate the financial benefits of the AWS Cloud for an organization?s cost management Define the core billing, account management, and pricing models Explain how to use pricing tools to make cost-effective choices for AWS services This course is for individuals who seek an overall understanding of the Amazon Web Services (AWS) Cloud, independent of specific technical roles. You will learn about AWS Cloud concepts, AWS services, security, architecture, pricing, and support to build your AWS Cloud knowledge. This course also helps you prepare for the AWS Certified Cloud Practitioner exam. Prerequisites General IT technical knowledge, General IT business knowledge 1 - Introduction to Amazon Web Services Summarize the benefits of AWS Describe differences between on-demand delivery and cloud deployments Summarize the pay-as-you-go pricing model 2 - Compute in the Cloud Describe the benefits of Amazon Elastic Compute Cloud (Amazon EC2) at a basic level Identify the different Amazon EC2 instance types Differentiate between the various billing options for Amazon EC2 Describe the benefits of Amazon EC2 Auto Scaling Summarize the benefits of Elastic Load Balancing Give an example of the uses for Elastic Load Balancing Summarize the differences between Amazon Simple Notification Service (Amazon SNS) and Amazon Simple Queue Services (Amazon SQS) Summarize additional AWS compute options 3 - Global Infrastructure and Reliability Summarize the benefits of the AWS Global Infrastructure Describe the basic concept of Availability Zones Describe the benefits of Amazon CloudFront and Edge locations Compare different methods for provisioning AWS services 4 - Networking Describe the basic concepts of networking Describe the difference between public and private networking resources Explain a virtual private gateway using a real life scenario Explain a virtual private network (VPN) using a real life scenario Describe the benefit of AWS Direct Connect Describe the benefit of hybrid deployments Describe the layers of security used in an IT strategy Describe which services are used to interact with the AWS global network 5 - Storage and Databases Summarize the basic concept of storage and databases Describe benefits of Amazon Elastic Block Store (Amazon EBS) Describe benefits of Amazon Simple Storage Service (Amazon S3) Describe the benefits of Amazon Elastic File System (Amazon EFS) Summarize various storage solutions Describe the benefits of Amazon Relational Database Service (Amazon RDS) Describe the benefits of Amazon DynamoDB Summarize various database services 6 - Security Explain the benefits of the shared responsibility model Describe multi-factor authentication (MFA) Differentiate between the AWS Identity and Access Management (IAM) security levels Describe security policies at a basic level Explain the benefits of AWS Organizations Summarize the benefits of compliance with AWS Explain primary AWS security services at a basic level 7 - Monitoring and Analytics Summarize approaches to monitoring your AWS environment Describe the benefits of Amazon CloudWatch Describe the benefits of AWS CloudTrail Describe the benefits of AWS Trusted Advisor 8 - Pricing and Support Understand AWS pricing and support models Describe the AWS Free Tier Describe key benefits of AWS Organizations and consolidated billing Explain the benefits of AWS Budgets Explain the benefits of AWS Cost Explorer Explain the primary benefits of the AWS Pricing Calculator Distinguish between the various AWS Support Plans Describe the benefits of AWS Marketplace 9 - Migration and Innovation Understand migration and innovation in the AWS Cloud Summarize the AWS Cloud Adoption Framework (AWS CAF) Summarize six key factors of a cloud migration strategy Describe the benefits of various AWS data migration solutions, such as AWS Snowcone, AWS Snowball, and AWS Snowmobile Summarize the broad scope of innovative solutions that AWS offers Summarize the five pillars of the AWS Well-Architected Framewor 10 - AWS Certified Cloud Practitioner Basics Determine resources for preparing for the AWS Certified Cloud Practitioner examination Describe benefits of becoming AWS Certified
EMIR requires the reporting of all derivatives, whether OTC or exchange traded, to a trade repository. EMIR covers entities that qualify for derivative contracts in regards to interest rate, equity, foreign exchange, or credit and commodity derivatives. Group rates available! Contact us here Description This course offers a comprehensive overview of the EMIR. It addresses the EMIR requirements, the types of counterparties and the clearing obligations. It provides a sound grounding to reporting requirements and risk management. It covers the risk mitigation processes and techniques as well as the EU margin rules and eligible collateral. Training Duration This course may take up to 2 hours to be completed. However, actual study time differs as each learner uses their own training pace. Participants This course is ideal for anyone wishing to be introduced to the EMIR and the respective regulatory provisions. It is also suitable to professionals pursuing regulatory CPD in Financial Regulation such as the FCA. Training Method The course is offered fully online using a self-paced approach. The learning units consist of video presentations and reading material. Learners may start, stop and resume their training at any time. At the end of the training, participants take a Quiz to complete their learning and earn a Certificate of Completion. Accreditation and CPD Recognition This programme has been developed by the London Governance and Compliance Academy (LGCA), a UK-recognised training institution in collaboration with the European Institute of Management and Finance (EIMF). The syllabus is verified by external subject matter experts and can be accredited by regulators and other bodies for 2 CPD Units that approve education in financial regulation, such as the FCA. The course may be also approved for CPD Units by institutions which approve general financial training, such as the CISI. Eligibility criteria and CPD Units are verified directly by your association, regulator or other bodies which you hold membership. Registration and Access To register to this course, click on the Get this course button to pay online and receive your access instantly. If you are purchasing this course on behalf of others, please be advised that you will need to create or use their personal profile before finalising your payment. If you wish to receive an invoice instead of paying online, please contact us at info@lgca.uk. Access to the course is valid for 365 days.
Mac Introduction course,
This Digital Functional Skills Entry Level 3 Course will set you up with the relevant digital skills and knowledge and provide you with a competitive advantage in your career, making you stand out from all other applicants and employees. Course Highlights Course Type: Online Learning Accreditation: NCFE Qualification: Nationally Recognised Qualification Study Materials: High-Quality E-Learning Study Materials Assessment: Externally Graded and Verified | Center-Based Online or Online Remote Exam Guided Learning: 55 hours Access: 1 Year Access Certificate: Certificate upon completion of the official exam (hard copy) Tutor Support: Tutor Support Available Customer Support: 24/7 live chat available Digital Functional Skills Entry Level 3 - Online Course This course is governed by Ofqual, and accredited by NCFE, making it a nationally recognised credential that will improve your CV while helping you stand out from the rest of the applicants. Subject content of this course is based on theNational Standards for Digital Functional Skills to increase comparability across awarding organisations. This course will assist you in developing the skills needed to use electronic devices, manage and secure information, engage in online communication and transactions, use data protection tools, and edit a variety of digital media, including photographs, audio files, videos, etc. Upon successful completion of this course, you will be equipped with the required digital skills to operate confidently, effectively and independently in education, work and everyday life. EXAM Booking & Results Details You can decide the exam date and place according to your convenience. Awarding Body On-Screen Exam in Centre Remote Online Exam – From Home Results NCFE Book within 24 Hours Book within 2 working days Get results in only 7 days *Offline examinations will be held at our Swindon and London centres. Please contact us for more information. The new assessment and result dates by NCFE is: (Only applicable if you are attending the exam in between the following assessment date). Delivery mode: On-screen and RI Assessment date to and from: 23/09/2024 – 1/11/2024 Results release: 8/11/2024 (Note that this only applies to the mentioned exam type and if you book the exam during the dates mentioned above. Also, this will not affect the schedule of the other exam types and results.) How This Course will work for you? Initial Assessment: Determines levels Diagnostic Assessment: Identifies skill gaps and produces an individual learning plan Learning Resources: Develop underpinning knowledge and fill skill gaps identified Progress Check: Assesses progress at the end of the module You will get useful resources that are designed to improve your essential skills, knowledge and understanding of the digital knowledge required to pass the assessments. Our online learning portal is fully compatible with desktop, tablet and mobile devices and can be accessed from anywhere. Aims & Outcomes Develop a favourable attitude toward the usage of digital skills as well as increased confidence and fluency in their use Use your knowledge and abilities to accomplish tasks and activities in order to exhibit them Develop an appreciation of the importance of digital skills in the workplace and in regular day-to-day activities Recognise the value of digital skills in both the profession and in everyday life Acquire a foundation for further study, work, and life. Who should take this course? This Digital Functional Skills Entry Level 3 Course can be taken by: People of all ages (there is no age limit). Anyone willing to enhance their practical digital functional skills Anyone looking to meet the entry requirement of your desired university Anyone looking to secure an apprenticeship Anyone looking to improve their job outlook with an added expertise Entry Requirements Students or professionals of any age group hailing from any academic background can take this Digital Functional Skills Entry Level 3 Course to acquire practical skills in ICT; no prior knowledge, skills or qualifications are required to enrol. About Official Exam, Assessment Students are required to undergo a wide range of interactive online assessments and exams in between lectures and at the end of each module to evaluate the knowledge and skills that they are learning. These interactive assessment sessions measure the number of skills and knowledge that you are absorbing after the completion of each module and evaluate your potential to demonstrate these digital skills practically. You can also keep track of your score and progress at the end of the module. Towards the end of the Digital Functional Skills Entry Level 3 Course, you will be required to undergo an onscreen/online exam that is externally set and graded. You can take the online exam at the designated exam center or remotely. Some assessment components for the skills and knowledge to be evaluated under the Content Document must be conducted online and on screens utilising digital devices. The assessments will be pass/fail in line with the other Functional Skills qualifications. Contact us for more information. Learners who achieve this qualification could progress to: Digital Functional Skills Level 1 Qualification Course Curriculum 1. Using Devices and Handling Information • Features of a device refers to examples such as the interface required (keyboard or touchscreen) or how a device functions (hand-held, wearable or wireless connectivity). Uses of a device refers to examples such as for making a phone or video call, or sending emails while away from a desk. • Applications refers to those for desktop, laptop and mobile devices. • Applying system settings refers to examples such as changing screen brightness, changing speaker volume, or connecting to a Wi-Fi network at work or home. • Navigating online content refers to using menus, hyperlinks and browser navigation controls such as back and forward buttons or bookmarks. • Internet searches refers to a specific and clearly defined piece of information or content that might be required in a work or real-life context. 2. Creating and Editing • Using a suitable application refers to understanding terminology and concepts relating to documents and media and associated applications, such as word-processed or presentations, with an understanding of the purpose of different applications and typical uses. • Combining different types of information for a given purpose refers to using text, graphics and images in a work or real-life or context, such as creating a poster or presentation for colleagues. 3. Communicating • Online communications refers to short, simple texts using email or other messaging applications. Other digital content refers to graphics, images and videos. • A video call refers to a one-to-one communication via live video. 4. Transacting • An online form refers to a single page form used to enter information such as registering for or requesting a service, or making an online purchase. • Personal details refers to name, address, telephone number, email address and payment details. • Data validation refers to automatic computer checks to ensure that data is entered correctly, such as password requirements or key fields that cannot be left blank. • Verification checks refers to a check carried out to ensure the user has entered their details accurately, such as following a link in an email received when setting up an online account. 5. Being Safe and Responsible Online • Understanding the need to stay safe online refers to examples such as being aware of risks associated with clicking on unknown links or phishing emails, being aware of the evolving nature of such risks, or knowing that devices may be hacked resulting in personal data being compromised or stolen. • Authentication methods to access devices refers to examples such as strong passwords, fingerprint, facial or voice recognition. • Minimising the effects of physical stresses refers to examples such as using an adjustable chair, not being too close or too far away from the screen/device and keyboard or mouse. • Benefits of using security software refers to examples such as preventing, detecting or removing viruses, malware and other threats. Recognised Accreditation This Course is Accredited by NCFE and Regulated by OFQUAL This Course is accredited by NCFE and regulated by Ofqual which is a nationally recognised qualification that will add value to your CV. It is an approved subject by Department for Education (DfE) that provides a foundation for progression to employment and further technical education. Certificate of Achievement Upon successful passing of the official exam, you will be awarded an Ofqual regulated nationally recognised NCFE Digital Functional Skills qualification at Entry Level 3. FAQs Are there any prerequisites or eligibility criteria for taking the course? There are no prerequisites or eligibility criteria for taking this course. This certification is open to anyone who wants to enhance their digital skills and knowledge. When will I be able to access the course? You will be able to access the course as soon as you enroll. The course materials and resources will be available to you online 24/7, allowing you to study at your own pace and convenience. Is there any age limit for enrollment in this course? There is no age limit for enrollment in this course. Learners of all ages are welcome to join and benefit from the course materials and resources provided. What is the difference between NCFE and Edexcel? NCFE and Edexcel are both awarding bodies that provide qualifications, but there are some differences between them. NCFE is a national awarding organization in the UK, while Edexcel is a subsidiary of Pearson, a multinational education company. Additionally, NCFE focuses on vocational qualifications and skills-based learning, while Edexcel offers a wider range of academic and vocational qualifications. Can I access this course material offline, or do I need a continuous internet connection? To access the course material, you need internet access, and you won't be able to access it offline. If I encounter any technical issues, what kind of support is available? We have a very supportive and friendly customer support team, available for you to ask for any help or assistance with any technical issues you may encounter. They can be reached through email or phone, and will promptly address any concerns you have to ensure a smooth learning experience. Do I need to have any special software to access this course? No, you do not need any special software to access this course. All you need is a device with internet access and a web browser. The course materials are accessible online, making it convenient for you to learn from anywhere at any time. Do I need to visit the exam center for the exam, or can I give it from home? You can take the online exam at the designated exam center or remotely. What is the difference between DFSQ and Essential Digital Skills Qualifications (EDSQ)? The DFSQ qualification focuses specifically on digital skills for work, while the EDSQ qualification covers only the essential digital skills for everyday life. The Guided learning hours for DFSQ are 55 hours, and those for EDSQ are 50 hours. What will I learn in the Digital Functional Skills Entry Level 3 course? In the Digital Functional Skills Entry Level 3 course, you will learn foundational digital skills such as using basic digital devices, understanding file management, and communicating online. Additionally, you will gain knowledge on how to use common software applications and develop basic internet browsing skills.
Students who complete PVOL202 will be able to: Define the purpose of the National Electrical Code (NEC®) and NEC® terminology for PV equipment Determine procedures for proper installation of equipment and conductors, including minimum requirements for working space Examine methods for PV wire management and determine where expansion fittings are required Describe and identify electrical services, including split-phase and three-phase Wye (Y) and Delta (â) Evaluate electrical service details to collect and record during solar site evaluation Identify options for NEC®-compliant PV system interconnection to the utility grid and determine whether a supply side, load side, or additional service connection is appropriate Identify code-compliant methods for connecting an inverter to an existing AC feeder Calculate PV module voltage based on temperature to ensure compatibility with system components and NEC® Section 690.7, and explore other options for maximum PV system DC voltage calculations Identify NEC® requirements and sizing of disconnects and overcurrent protection devices (OCPDs) in grid-direct PV systems Define inverter grounding configurations Evaluate inverter choices and system configurations, including string inverters, central inverters, and module level power electronics (MLPE) Identify requirements for equipment grounding, equipment grounding conductors (EGC), and grounding electrode conductors (GEC), and size the conductors according to the NEC® Identify common causes of ground-faults and arc-faults Describe ground-fault and arc-fault protection devices Describe benefits and appropriate locations of surge protection devices (SPD) Demonstrate the use of sun charts and perform calculations to determine row spacing and minimize inter-row shading Identify how Codes detailing access for first responders impact PV array roof layout Examine fire classifications that affect racking and module selection Detail NEC rapid shutdown requirements and options for implementation Identify load and structural considerations for low- and steep-slope roof-mounted PV systems Calculate wind uplift force and select appropriate lag bolts Review issues related to planning, design, and installation of ground-mount PV arrays Review PV system circuit terminology, definitions, and conductor types Calculate minimum overcurrent protection device (OCPD) size and conductor ampacity using appropriate adjustment and correction factors Calculate voltage drop and verify system operation within acceptable limits Examine requirements for PV system labeling Calculate the maximum and minimum number of modules per PV source circuit, and number of PV source circuits per inverter Determine size of residential grid-direct PV system based on site and customer-specific considerations including the number and wiring layout of modules, conductor and OCPD sizes, and the AC interconnections Determine the size of a large, multiple inverter, grid-direct PV system based on site and customer-specific considerations, including the quantity and layout of modules and inverters and the AC interconnection Define large-scale PV and review associated NEC® allowances and requirements Describe importance of Data Acquisition Systems (DAS) Identify common DAS equipment and hardware Review DAS design, installation, and commissioning processes and common problems associated with DAS Show how reports can be generated and utilized to remotely assess health of system
This programme has been specifically designed to help experienced trainers, facilitators and coaches use Everything DiSC and the Five Behaviours assessments, and deliver workshops, with their own clients and in-house teams.
Getting Started The CMI Level 5 Award in Professional Mentoring Practice qualification is designed to provide an overview of the principles of mentoring practice for individuals. This course focuses on the necessary skills and knowledge to identify the role of mentoring in relation to coaching. The online CMI Level 5 Award in Professional Mentoring Practice course is aimed at practising or aspiring Mentors who who will have the capability to apply their learning to develop their skills in this area and/or progress onto further learning. Achieving this Professional Mentoring Practice qualification, you will learn how management and leadership principles can underpin practice and deliver mentoring that empowers the Mentee to work towards meaningful goals. As a mentor with valuable skills, you will gain the competencies to build a positive organisational culture where employees feel supported and encouraged to develop their skills and knowledge. Key Benefits For Learners Allow the Professional Coach or Mentor to develop an in-depth appreciation of the challenges faced by individuals they support. Improve the Mentee's confidence, quality, consistency, and productivity in their work. For Organisations Professional Coaches or Mentors can evaluate the role and influence of organisational culture, management, leadership and change on coaching and mentoring and apply this information in their professional practice. A Mentor is a trusted advisor, and the role differs depending on the Mentee and their organisation's needs. Key Highlights Do you wish to be a professional mentor? Then, the CMI Level 5 Award in Professional Mentoring Practice offered by the School of Business and Technology London is the right solution for you. Remember! The assessment for the qualification is done based on assignments only, and you do not need to worry about writing any exam. With the School of Business and Technology London, you can complete the qualification at your own pace, choosing online or blended learning from the comfort of your home. Learning and pathway materials and study guides developed by our CMI-approved tutors will be available around the clock in our cutting-edge learning management system. Most importantly, at the School of Business and Technology London, we will provide you with comprehensive tutor support through our dedicated support desk. If you choose your course with blended learning, you will also enjoy live sessions with an assigned tutor, which you can book at your convenience. Career Pathways The CMI Level 5 Award in Professional Mentoring Practice can open many career pathways, including but not limited to: Professional Coach-With an estimated salary of £35,524 Training Manager, with an estimated average salary of £31,613 per annum Training & Development Manager, with an estimated average salary of £36,885 per annum Independent Coach or Mentor with an estimated average salary of £28,000 per annum Corporate Coach or Mentor with an estimated average salary of £38,950 per annum About Awarding Body Chartered Management Institute established over 60 years ago as the British Institute of Management back then; it has developed the UK's very first diploma in management studies. In the years that followed CMI has consistently been at the forefront of all aspects of management and leadership. Today CMI is the only chartered professional awarding body committed to offering the highest standards in management and leadership excellence. Presently over 100,000 managers use its unique services daily. CMI qualifications aim for managers and leaders at any level, and it remains the only Awarding Body which can award Chartered Manager status - the ultimate management accolade. Employers highly value the qualifications awarded by CMI, and boost your career prospects. What is included? Learn 100% online at your own pace Dedicated support from expert tutors Dedicated Support Desk Portal: You can raise queries, request tutor support and ask for a call back whenever you need guidance and assistance. Elevate Knowledge: Your tutors will provide formative assessment feedback for each module, helping you improve your achievements throughout the program Schedule online personal tutor meetings whenever you want, which will help you get the most out of your studies and provide guidance, support and encouragement 6 months support period 24-hour access to the online learning platform 'MyLearnDirect' Schedule live online classes for each module at your convenience. (Blended learning only) Quality learning resources and study guides developed by CMI-approved tutors. All assessment materials are conveniently accessible through the online learning platform 'MyLearnDirect' Induction: We offer online and flexible learning induction to help you settle in and prepare for your online studies Access to CMI Management Direct. It has 100,000s of reliable and validated management and leadership resources, including company and industry reports, videos, checklists, E-books, and journals. You have access to CMI Membership and Support for the duration of your study. Assessment For each module you study, you will complete a written assignment of 4000 words and submit it online at your MyLearnDirect learning portal. The submitted assignments will be assessed by your CMI-approved tutor. Entry Requirements The CMI Level 5 Award in Professional Mentoring Practice is designed to support individuals in developing professional mentoring skills. To be eligible for this course, you must: Be 19 years of age and over Have some work experience as a team leader, first-line manager, coach, mentor, supervisor or a similar role Possess the ability to complete the Level 5 Qualification Our friendly admissions advisors will provide the best advice, considering your needs and goals. Why gain a CMI Qualification? The CMI Level 5 Award in Professional Mentoring Practice course enables the Professional Coach or Mentor to develop an in-depth appreciation of the challenges faced by individuals they support. By achieving this online CMI Level 5 Award in Professional Mentoring Practice qualification, you will have the professionalism to deliver impact, behave ethically, and demonstrate a commitment to continual learning and development. CMI has developed the Professional Mentoring Practice qualification after extensive research to ensure that the qualification reflects the tasks and activities of managers in the mentoring roles in the workplace. With this course, you will improve the Mentee's confidence, quality, consistency, and productivity in their work. Studying for a CMI course offers you more than just academic standing. When you enrol with us for the CMI Level 5 Award in Professional Mentoring Practice course, you will have access to CMI Membership and Support for the duration of your study alongside your qualification. CMI graduates achieve remarkable things: 72% agree that their CMI qualification gave them a competitive edge in the job application process. 89% agree they use the skills learnt on their accredited qualification in their current role. 88% agree that the accredited qualification gave them good career prospects. Recent CMI graduates earn a median of 28k compared to just 21k for a typical business studies graduate. Employers highly value the qualifications awarded by CMI, and over 80% of managers agree that a CMI qualification is essential to becoming a professional manager. Learners must request before enrolment to interchange unit(s) other than the preselected units shown in the SBTL website because we need to make sure the availability of learning materials for the requested unit(s). SBTL will reject an application if the learning materials for the requested interchange unit(s) are unavailable. Learners are not allowed to make any request to interchange unit(s) once enrolment is complete. UNIT1- Management and Leadership Influences in Coaching and Mentoring Reference No : Unit 535 Credit : 8 || TQT : 80 LEARNING OUTCOME 1. Understand the influence of management, leadership and organisational culture on coaching or mentoring. 2. Understand how to support a Coachee or Mentee transition through change. Delivery Methods School of Business & Technology London provides various flexible delivery methods to its learners, including online learning and blended learning. Thus, learners can choose the mode of study as per their choice and convenience. The program is self-paced and accomplished through our cutting-edge Learning Management System. Learners can interact with tutors by messaging through the SBTL Support Desk Portal System to discuss the course materials, get guidance and assistance and request assessment feedbacks on assignments. We at SBTL offer outstanding support and infrastructure for both online and blended learning. We indeed pursue an innovative learning approach where traditional regular classroom-based learning is replaced by web-based learning and incredibly high support level. Learners enrolled at SBTL are allocated a dedicated tutor, whether online or blended learning, who provide learners with comprehensive guidance and support from start to finish. The significant difference between blended learning and online learning methods at SBTL is the Block Delivery of Online Live Sessions. Learners enrolled at SBTL on blended learning are offered a block delivery of online live sessions, which can be booked in advance on their convenience at additional cost. These live sessions are relevant to the learners' program of study and aim to enhance the student's comprehension of research, methodology and other essential study skills. We try to make these live sessions as communicating as possible by providing interactive activities and presentations. Resources and Support School of Business & Technology London is dedicated to offering excellent support on every step of your learning journey. School of Business & Technology London occupies a centralised tutor support desk portal. Our support team liaises with both tutors and learners to provide guidance, assessment feedback, and any other study support adequately and promptly. Once a learner raises a support request through the support desk portal (Be it for guidance, assessment feedback or any additional assistance), one of the support team members assign the relevant to request to an allocated tutor. As soon as the support receives a response from the allocated tutor, it will be made available to the learner in the portal. The support desk system is in place to assist the learners adequately and streamline all the support processes efficiently. Quality learning materials made by industry experts is a significant competitive edge of the School of Business & Technology London. Quality learning materials comprised of structured lecture notes, study guides, practical applications which includes real-world examples, and case studies that will enable you to apply your knowledge. Learning materials are provided in one of the three formats, such as PDF, PowerPoint, or Interactive Text Content on the learning portal. Management Direct As part of the program, you will get access to CMI Management Direct, which provides a rich foundation of management and resource for students. The Management Direct is packed with content, including: E-Books Articles Leader videos Idea for leaders Models and so much more... How does the Online Learning work at SBTL? We at SBTL follow a unique approach which differentiates us from other institutions. Indeed, we have taken distance education to a new phase where the support level is incredibly high.Now a days, convenience, flexibility and user-friendliness outweigh demands. Today, the transition from traditional classroom-based learning to online platforms is a significant result of these specifications. In this context, a crucial role played by online learning by leveraging the opportunities for convenience and easier access. It benefits the people who want to enhance their career, life and education in parallel streams. SBTL's simplified online learning facilitates an individual to progress towards the accomplishment of higher career growth without stress and dilemmas. How will you study online? With the School of Business & Technology London, you can study wherever you are. You finish your program with the utmost flexibility. You will be provided with comprehensive tutor support online through SBTL Support Desk portal. How will I get tutor support online? School of Business & Technology London occupies a centralised tutor support desk portal, through which our support team liaise with both tutors and learners to provide guidance, assessment feedback, and any other study support adequately and promptly. Once a learner raises a support request through the support desk portal (Be it for guidance, assessment feedback or any additional assistance), one of the support team members assign the relevant to request to an allocated tutor. As soon as the support receive a response from the allocated tutor, it will be made available to the learner in the portal. The support desk system is in place to assist the learners adequately and to streamline all the support process efficiently. Learners should expect to receive a response on queries like guidance and assistance within 1 - 2 working days. However, if the support request is for assessment feedback, learners will receive the reply with feedback as per the time frame outlined in the Assessment Feedback Policy.
ADVANCED 8 CPD POINTS 1 DAY INTENSIVE COURSE ONLINE or IN-CLINIC NOTE! After booking we will contact you for scheduling the exact course date! Courses dates are subject to change due to mentors availability. We will inform you via email if a date becomes available! Lipolysis (Fat Disolving) achieves good results in the following body zones: – Chin (double chin) – Hips (love handles) – Stomach (abdominal area) – Thighs (saddlebags) – Upper arms (arm toning) – Pseudo gynecomastia (male breasts) – Back (bra fat or muffin top) The acids present in Aqualyx cause fat destruction in the body. Aqualyx main active ingredient is deoxycholic acid. Deoxycholic acid is a bile acid, synthesized in the human liver. The fatty acids are then released into the body, to be broken down by our usual metabolic processes in the liver. Naturally occurring bile acid is used by the body to emulsify fat. Aqualyx comes in a water based injection that dissolves fat cells that it comes into contact with. A single vial will be sufficient. Small are for larger areas, such as the abdomen or the inner thigh, anywhere between 5 to 10 vials One treatment of AQUALYX® usually includes only 1 or 2 injection sites, as well as a local anaesthetic solution of lidocaine which is used to irradicate any pain and make the procedure as comfortable as possible. Course Content Disinfection, Health & Safety. Consultation and timings including data protection, medical history and client consent Skin Types Skin analysis Pre and post treatment procedures Injection protocol and techniques Safe handling needles, before, during and after treatment Product knowledge Setting up Treatment procedure Results clients can expects and managing expectations Contractions and aftercare advice Treatment planning and pricing Post care instruction Fat dissolving products (Lemon Bottle), very safe. Lemon Bottle is a high-concentration fat dissolve solution that combines Riboflavin (vitamin B2) and other premium ingredients that create fat decomposition by accelerating metabolism of fat cells. Become a certified Lemon Bottle fat-dissolving treatments expert with our comprehensive and accredited courses designed specifically for UK practitioners. We have the perfect course to suit your needs, focusing on the Lemon Bottle system. Minimal swelling, minimal pain. Begins working immediately. You need to be medically qualified as a doctor, dentist, nurse, pharmacist or paramedic with full governing body registration and have completed a Foundation Filler Course and to have administered a number of cases. Additional information ATTENDANCE ONLINE (Theory), IN CLINIC (Practice) COURSE LEVEL INTERMEDIATE | Advanced Course
Duration 5 Days 30 CPD hours This course is intended for A Microsoft Power Platform Functional Consultant is responsible for creating and configuring apps, automations, and solutions. They act as the liaison between users and the implementation team. The functional consultant promotes utilization of solutions within an organization. The functional consultant may perform discovery, engage subject matter experts and stakeholders, capture requirements, and map requirements to features. They implement components of a solution including application enhancements, custom user experiences, system integrations, data conversions, custom process automation, and simple visualizations. This course will teach you to use Microsoft Power Platform solutions to simplify, automate, and empower business processes for organizations in the role of a Functional Consultant. A Microsoft Power Platform Functional Consultant is responsible for creating and configuring apps, automations, and solutions. They act as the liaison between users and the implementation team. The functional consultant promotes utilization of solutions within an organization. The functional consultant may perform discovery, engage subject matter experts and stakeholders, capture requirements, and map requirements to features. They implement components of a solution including application enhancements, custom user experiences, system integrations, data conversions, custom process automation, and simple visualizations. This course may contain a 1-day Applied Workshop. This workshop will allow you to practice your Functional Consultant skills by creating an end-to-end solution to solve a problem for a fictitious company. The solution will include a Microsoft Dataverse database, Power Apps canvas app, and Power Automate flows. Prerequisites Experience as an IT professional or student Working knowledge of Microsoft Power Platform and its key components Knowledge of Microsoft Dataverse (or general data modeling) and security concepts 1 - Describe the business value of the Microsoft Power Platform Explore Microsoft Power Platform Describe the business value of the Power Platform Explore connectors and Microsoft Dataverse Describe how Power Platform works with Microsoft 365 apps and services Explore how Power Platform works with Microsoft Teams Describe how Power Platform works with Microsoft Dynamics 365 apps Describe how Power Platform solutions consume Microsoft Azure services Explore how Microsoft Power Platform apps work together Use Artificial Intelligence to increase productivity 2 - Core components of Power Pages Get started with Power Pages Core tools and components of Power Pages Overview of Power Pages security Overview of Power Pages extensibility 3 - Explore Power Pages templates Site design templates Scenario-based templates Dynamics 365 Power Pages site templates 4 - Explore Power Pages design studio Work with pages Page components Site styling and templates 5 - Explore Power Pages design studio data and security features Data workspace in Power Pages design studio Power Pages security features 6 - Introduction to Power Pages administration Power Pages administrative tools Set up workspace in Power Pages design studio 7 - Get started building with Power BI Use Power BI Building blocks of Power BI Tour and use the Power BI service 8 - Get data with Power BI Desktop Overview of Power BI Desktop Explore Power BI Desktop Connect to data sources Get data from Excel Transform data to include in a report Combine data from multiple sources Clean data to include in a report 9 - Model data in Power BI How to manage your data relationships Create calculated columns Optimize data models Create measures Create calculated tables Explore time-based data 10 - Use visuals in Power BI Create and customize simple visualizations Create slicers Map visualizations Matrices and tables Create scatter, waterfall, and funnel charts Modify colors in charts and visuals Page layout and formatting 11 - Explore data in Power BI Quick insights in Power BI Create and configure a dashboard Ask questions of your data with natural language Create custom Q&A suggestions Share dashboards with your organization Display visuals and tiles in full screen Edit tile details and add widgets Get more space on your dashboard 12 - Publish and share in Power BI Publish Power BI Desktop reports Print and export dashboards and reports Introducing Power BI Mobile Create workspaces in Power BI Build apps Use apps Integrate OneDrive for Business with Power BI Publish to web 13 - Create and manage workspaces in Power BI Distribute a report or dashboard Monitor usage and performance Recommend a development life cycle strategy Troubleshoot data by viewing its lineage Configure data protection 14 - Manage semantic models in Power BI Use a Power BI gateway to connect to on-premises data sources Configure a semantic model scheduled refresh Configure incremental refresh settings Manage and promote semantic models Troubleshoot service connectivity Boost performance with query caching (Premium) 15 - Create dashboards in Power BI Configure data alerts Explore data by asking questions Review Quick insights Add a dashboard theme Pin a live report page to a dashboard Configure a real-time dashboard Set mobile view 16 - Implement row-level security Configure row-level security with the static method Configure row-level security with the dynamic method 17 - Create tables in Dataverse Table characteristics Table relationships Dataverse logic and security Dataverse auditing Dual-write vs. virtual tables 18 - Manage tables in Dataverse Identify tables and table types in Dataverse Create a custom table Enable attachments within a table Licensing requirements for each table type 19 - Create and manage columns within a table in Dataverse Define columns in Microsoft Dataverse Column types in Microsoft Dataverse Add a column to a table Create a primary name column Restrictions that apply to columns in a table Create an auto numbering column Create an alternate key 20 - Create a relationship between tables in Dataverse Relate one or more tables - Introduction Relationship types that are available in Microsoft Dataverse Create a one-to-many relationship between tables Create a many-to-many relationship between tables Edit or delete relationships 21 - Working with choices in Dataverse Define choice column Standard choices column 22 - Get started with security roles in Dataverse Understand environment roles Adding or disabling an environment user Understand security concepts in Dataverse Understand user security roles and security role defaults Check the roles that a user belongs to Configure Dataverse teams for security Configure Dataverse group teams for security 23 - Use administration options for Dataverse Use Microsoft Power Platform Admin Center portal Tenant storage capacity Advanced Customization options in Power Apps Portal Enable and disable auditing 24 - Manage Dynamics 365 model-driven app settings and security Configure role-based security Manage teams and business units Explore settings and customizations 25 - Introduction to Microsoft Power Platform security and governance Identify Microsoft Power Platform environments Data Loss Prevention policies Microsoft Power Platform Center of Excellence Starter Kit 26 - Get started with model-driven apps in Power Apps Introducing model-driven apps Components of model-driven apps Design model-driven apps Incorporate business process flows 27 - Configure forms, charts, and dashboards in model-driven apps Forms overview Form elements Configure multiple forms Use specialized form components Configure views overview Configure grids Create and edit views Configure charts overview Dashboards overview Use interactive streams and tiles 28 - Get started with Power Apps canvas apps Power Apps building blocks Ways to build Power Apps Power Apps related technologies Additional Power Apps related technologies Designing a Power Apps app 29 - Connect to other data in a Power Apps canvas app Overview of the different data sources Work with action-based data sources Power Automate is a companion to Power Apps 30 - How to build the UI in a canvas app in Power Apps Use themes to quickly change the appearance of your app Branding a control Icons Images Personalization Using the tablet or phone form factors 31 - Manage apps in Power Apps Power Apps review 32 - Build your first app with Power Apps and Dataverse for Teams Create your first app with the hero template Customize your app with Power Apps Studio Publish your app Install template apps 33 - Access Dataverse in Power Pages websites Use lists to display multiple Dataverse records Use forms to interact with Dataverse data 34 - Authentication and user management in Power Pages Power Pages authentication settings User registration in Power Pages Authentication management for Power Pages users Power Pages authentication providers 35 - Power Pages maintenance and troubleshooting Power Pages website maintenance Power Pages website troubleshooting 36 - Define and create business rules in Dataverse Define business rules - Introduction Define the components of a business rule Create a business rule 37 - Get started with Power Automate Introducing Power Automate Troubleshoot flows 38 - Use the Admin center to manage environments and data policies in Power Automate Administer flows Export and import flows Learn how to distribute button flows 39 - Use Dataverse triggers and actions in Power Automate Dataverse triggers Query data Create, update, delete, and relate actions 40 - Extend Dataverse with Power Automate Set up a flow and configure its trigger Email Dataverse record Add to-do items Test and run your flow 41 - Introduction to expressions in Power Automate Get started with expressions Notes make things easier Types of functions Write complex expressions 42 - Build your first Power Automate for desktop flow Set up the environment Explore Power Automate for desktop Create your first Power Automate for desktop flow Record Power Automate for desktop actions Edit and test recorded actions 43 - Run a Power Automate for desktop flow in unattended mode Set up an unattended desktop flow Create a new cloud flow that calls an existing flow in unattended mode Perform a test run Best practices 44 - Optimize your business process with process advisor Get familiar with process advisor Create your first recording Edit recordings and group actions Analyze recordings and interpret results Automation recommendations 45 - Get started with Microsoft Copilot Studio bots Get started working with environments Create bots and work with the Microsoft Copilot Studio interface Create topics Test bots Publish bots and analyze performance 46 - Enhance Microsoft Copilot Studio bots Use Power Automate to add actions Transfer conversations to agents by using Omnichannel for Customer Service Create topics for existing support content Analyze bot performance 47 - Manage topics in Microsoft Copilot Studio Work with bot topics Branch a topic Create topics for existing support content Work with system fallback topics Manage topics 48 - Manage Power Virtual Agents Environments in Microsoft Copilot Studio Bot topics permissions Bot entities and flow permissions Monitor and diagnose Administer and manage Export and import bots Authentication 49 - Get started building with Power BI Use Power BI Building blocks of Power BI Tour and use the Power BI service 50 - Get data with Power BI Desktop Overview of Power BI Desktop Explore Power BI Desktop Connect to data sources Get data from Excel Transform data to include in a report Combine data from multiple sources Clean data to include in a report 51 - Model data in Power BI How to manage your data relationships Create calculated columns Optimize data models Create measures Create calculated tables Explore time-based data 52 - Use visuals in Power BI Create and customize simple visualizations Create slicers Map visualizations Matrices and tables Create scatter, waterfall, and funnel charts Modify colors in charts and visuals Page layout and formatting 53 - Explore data in Power BI Quick insights in Power BI Create and configure a dashboard Ask questions of your data with natural language Create custom Q&A suggestions Share dashboards with your organization Display visuals and tiles in full screen Edit tile details and add widgets Get more space on your dashboard 54 - Publish and share in Power BI Publish Power BI Desktop reports Print and export dashboards and reports Introducing Power BI Mobile Create workspaces in Power BI Build apps Use apps Integrate OneDrive for Business with Power BI Publish to web 55 - Manage solutions in Power Apps and Power Automate Add and remove apps, flows, and entities in a solution Edit a solution-aware app, flow, and table Build and deploy a complex solution with flows, apps, and entities Automate solution management 56 - Load/export data and create data views in Dataverse View data in a table Create or edit views of data in a table Load data into a table Export data from a table Add, update, or delete data in a table by using Excel Import data using Power Query Generate a new dataflow from an Excel Template Dataflow and Azure integration 57 - Get started with AI Builder Choose an AI capability Create your first model Ways to use your models 58 - Manage models in AI Builder Model lifecycle Manage model versions Share your models 59 - Use AI Builder in Power Automate AI Builder in Power Automate saves time Advanced usage of AI Builder in Power Automate 60 - Functional Consultant skills Create entity relationship diagrams Create and document mock-ups Document functional requirements and artifacts Complete fit-gap analysis Discuss stakeholder management responsibilities Understand industry accelerators Define Application Lifecycle Management Participate in testing Evaluate options Define connectors Understand Power Apps component framework 61 - Solution Architect series: Plan application lifecycle management for Power Platform Key considerations for ALM Solutions Configuration and reference data Release process ALM with Azure DevOps