3 QLS Endorsed Diploma | QLS Hard Copy Certificate Included | Plus 10 CPD Courses | Lifetime Access
Duration 3 Days 18 CPD hours This course is intended for This course is intended for IT professionals who need to manage the day-to-day environment of an SCCM 2012 SP1 or newer environment. Knowledge of the workings of a standalone primary SCCM site and basic PowerShell experience is recommended. Overview Create additional site system roles on existing or new servers. Modify high level site settings. Create and modify Discovery Methods, Boundaries and Boundary Groups. Create Collections using any of the membership rules available. Delegate authority through Roles and Scopes. Install the Configuration Manager client, modify client settings and restrict access to site systems. Deploy software to clients. Deploy software updates to clients. Configure compliance settings targeted against collections. Modify settings that govern monitoring functions such as Alerts and Status Settings. Work with Task Sequences for Operating System Deployment. Write basic PowerShell scripts using cmdlets learned and scripting constructs to accomplish configuration tasks. This course provides students with the knowledge and skills needed to use PowerShell for System Center Configuration Manager (SCCM) administration. In this course, students learn how to access the PowerShell cmdlets included with SCCM 2012 R2 and use them to perform configuration tasks for a primary site. Individual cmdlets will be used in working with objects such as Boundaries, Boundary Groups, Collections, Software Deployment, Patching, Compliance Settings, OSD Task Sequences, and many others. Basic scripting will also be covered so that students can learn how to put PowerShell to use when working with large sets of objects. Prerequisites Basic Windows and Active Directory knowledge. Conceptual knowledge of Configuration Manager objects and how they interact. Basic experience performing configuration tasks in ECM using the graphical console. Experience working from a command prompt. Basic knowledge of the fundamentals of Windows PowerShell. 1 - REVIEW OF SYSTEM CENTER CONFIGURATION MANAGER CONCEPTS Architecture of an System Center 2012 Configuration Manager Installation Managing Assets Content Delivery and Management Security, Monitoring, and Remote Management 2 - MANAGING RESOURCES Implementing Discovery Organizing Resources with Collections Working with Boundaries 3 - WORKING WITH CLIENTS Installing the Configuration Manager Client Managing Client Settings Managing Client Operations Monitoring Client Status 4 - DISTRIBUTING SOFTWARE Configure the Software Distribution Components Working with Distribution Points Creating Content for Distribution Deploying Software Applications 5 - UPDATING SYSTEMS WITH WSUS AND SCCM Integrating Configuration Manager and WSUS Managing Updates through Software Update Groups Creating and Deploying Update Packages Working with Automatic Deployment Rules 6 - HOW POWERSHELL CAN MANAGE COMPLIANCE SETTINGS Creating Compliance Settings Objects Deploying and Monitor the Baseline 7 - CONFIGURING OPERATING SYSTEM DEPLOYMENT OBJECTS Preparing the OSD Environment Working with Task Sequences 8 - WORKING AT THE SITE LEVEL Modify the Site Adding Site System Roles Adding a Secondary Site 9 - SECURITY AND MONITORING Configuring Role Based Administration Implementing Endpoint Protection Configuring Monitoring Options 10 - USING POWERSHELL SCRIPTING TO AUTOMATE SCCM TASKS Review of Scripting Constructs Introduction to the Configuration Manager WMI Classes
Level 3 - Two Endorsed Training | QLS Hard Copy Certificate Included | Plus 5 CPD Courses | Lifetime Access
Sale Ends Today IT Skills for Business Level 3 Admission Gifts FREE PDF & Hard Copy Certificate| PDF Transcripts| FREE Student ID| Assessment| Lifetime Access| Enrolment Letter IT skills are not just beneficial today, rather they have become indispensable for any business environment. With over 1.46 million people working within the digi-tech sector in the UK, the demand for advanced IT competencies continues to surge. The IT Skills for Business Level 3 course bundle is designed to place you at the forefront of this dynamic field. So, get ready to elevate your professional capability and become an invaluable asset to any business! The IT Skills for Business Level 3 course offers an extensive curriculum tailored to enhance your technical skills across a broad spectrum of IT disciplines. From foundational courses like IT Support Technician and Functional Skills IT to specialised training in Ethical Hacking, Cyber Security, and Network Security, this bundle equips you with the necessary tools to secure, analyse, and manage IT infrastructure effectively. Additionally, enhance your strategic acumen with Business Analysis, learning to translate business needs into IT solutions, and exploring Financial Analysis for richer business decision-making. Courses Are Included In this IT Skills for Business Level 3 Career Bundle: Course 01: IT Support Technician Course 02: Functional Skills IT Course 03: Building Your Own Computer Course Course 04: It: Ethical Hacking, IT Security and IT Cyber Attacking Course 05: Computer Operating System and Troubleshooting Course 06: Cyber Security Incident Handling and Incident Response Course 07: Cyber Security Law Course 08: Network Security and Risk Management Course 09: CompTIA Network Course 10: CompTIA Cloud+ (CV0-002) Course 11: Web Application Penetration Testing Course Course 12: Learn Ethical Hacking From A-Z: Beginner To Expert Course 13: C# (C-Sharp) Course 14: JavaScript Fundamentals Course 15: Python Programming Bible Course 16: Data Protection (GDPR) Practitioner Course 17: Microsoft SQL Server Development for Everyone! Course 18: SQL Database Administrator Course 19: Data Science and Visualisation with Machine Learning Course 20: SQL For Data Analytics & Database Development Course 21: Introduction to Business Analysis Course 22: Business Data Analysis Course 23: Financial Analysis for Finance Reports Course 24: Financial Modelling Using Excel Course 25: Data analytics with Excel Course 26: Excel Data Tools and Data Management Course 27: Ultimate Microsoft Excel For Business Bootcamp Course 28: MS Word Essentials - The Complete Word Course - Level 3 Course 29: Document Control Course 30: Information Management Don't miss the opportunity to transform your career with cutting-edge IT skills that are crucial in today's tech-driven world. Utilise the industry relevant and essential IT knowledge this IT Skills for Business Level 3 course bundle has to offer and use it as your gateway to success. Enrol today and take the first step towards securing a prominent role in the booming tech industry! Learning Outcomes of this Bundle: Master key IT support skills and build your own computer. Gain proficiency in programming with C#, JavaScript, and Python. Develop expertise in cyber security, network security, and risk management. Learn comprehensive data protection practices including GDPR compliance. Enhance skills in SQL for effective database management and business analytics. Apply advanced Excel techniques for financial modelling and data analysis. But that's not all. When you enrol in IT Skills for Business Level 3 Bundle, you'll receive 30 CPD-Accredited PDF Certificates, Hard Copy Certificates, and our exclusive student ID card, all absolutely free. Why Prefer this Course? Get a Free CPD Accredited Certificate upon completion of the course Get a Free Student ID Card with this training program (£10 postal charge will be applicable for international delivery) The course is Affordable and Simple to understand Get Lifetime Access to the course materials The training program comes with 24/7 Tutor Support Start your learning journey straight away! The "IT Skills for Business Level 3" course bundle is an invaluable resource for anyone looking to deepen their understanding and expertise in the diverse fields of IT and Business Analysis. This course offers learners the chance to master foundational IT Support Skills, such as Building their Own Computers and troubleshooting various software issues, providing a solid base from which to expand their knowledge into more specialised areas. Further advancement is facilitated through detailed modules focusing on Business Analysis Skills, teaching learners how to translate complex business needs into scalable IT solutions. This integration of IT proficiency with Business knowledge ensures that participants are well-prepared to tackle strategic challenges, making them invaluable assets to any organisation. By blending IT skills with an understanding of business processes and Data Analysis, this course sets up its participants for success in multiple pathways, from Network Management to Business Consulting. Moreover, this diploma offers learners the opportunity to acquire a Recognised Qualification that is highly valued in the field of IT / Business. With this Certification, graduates are better positioned to pursue career advancement and higher responsibilities within the IT / Business setting. The skills and knowledge gained from this course will enable learners to make meaningful contributions to IT / Business related fields impacting their IT / Business experiences and long-term development. Course Curriculum Course 01: IT Support Technician Module 01: Software Module 02: Hardware Module 03: Security Module 04: Networking Module 05: Basic IT Literacy Course 02: Functional Skills IT Module 01: How People Use Computers Module 02: System Hardware Module 03: Device Ports And Peripherals Module 04: Data Storage And Sharing Module 05: Understanding Operating Systems Module 06: Setting Up And Configuring A PC Module 07: Setting Up And Configuring A Mobile Device Module 08: Managing Files Module 09: Using And Managing Application Software Module 10: Configuring Network And Internet Connectivity Module 11: IT Security Threat Mitigation Module 12: Computer Maintenance And Management Module 13: IT Troubleshooting Module 14: Understanding Databases Module 15: Developing And Implementing Software Course 03: Building Your Own Computer Course Module 01: Introduction to Computer & Building PC Module 02: Overview of Hardware and Parts Module 03: Building the Computer Module 04: Input and Output Devices Module 05: Software Installation Module 06: Computer Networking Module 07: Building a Gaming PC Module 08: Maintenance of Computers =========>>>>> And 27 More Courses <<<<<========= How will I get my Certificate? After successfully completing the course, you will be able to order your Certificates as proof of your achievement. PDF Certificate: Free (Previously it was £12.99*30 = £390) CPD Hard Copy Certificate: Free (For The First Course: Previously it was £29.99) CPD 300 CPD hours / points Accredited by CPD Quality Standards Who is this course for? Anyone interested in learning more about the topic is advised to take this bundle. This bundle is ideal for: Aspiring IT professionals. Business analysts. Data scientists. System administrators. Network security specialists. Database managers. Requirements You will not need any prior background or expertise to enrol in this course. Career path After completing this bundle, you are to start your career or begin the next phase of your career. IT Support Specialist: $35,000 - $60,000 Cyber Security Analyst: $60,000 - $100,000 Network Engineer: $50,000 - $90,000 Data Analyst: $45,000 - $85,000 Software Developer: $50,000 - $120,000 Database Administrator: $60,000 - $110,000 Certificates CPD Accredited Digital certificate Digital certificate - Included CPD Accredited e-Certificate - Free Enrolment Letter - Free Student ID Card - Free CPD Accredited Hard copy certificate Hard copy certificate - Included If you are an international student, then you have to pay an additional 10 GBP for each certificate as an international delivery charge.
Video conferencing over IP course description A current hot topic in recent years has been the provision of multimedia services over IP networks - triple play. This course investigates the characteristics of video transmission and then studies the impact on IP networks. What will you learn Describe the issues of video and data convergence. Describe techniques, which can be used in IP to provide low uniform delay. Evaluate video technologies. Design data networks, which will support video.. Video conferencing over IP course details Who will benefit: Technical staff. Prerequisites: TCP/IP fundamentals Intro to data communications & networking Duration 3 days Video conferencing over IP course contents Review Traditional video, digital video, video formats, MPEG, brief review of IP, Uses of video: downloading, streaming, TV, CCTV, conferencing. Video over IP issues Delivery methods: FTTH, ADSL, VDSL, 3G and others. Bandwidth, delay, jitter, signalling. Digitising video, CODECS, packetising video, comparison of techniques. IP performance and QOS IP TOS field, queuing strategies; FIFO, WFQ, custom, priority, RED. Differentiated services, diffserv. Video over IP protocol stack RTP, RTCP, mixers and translators, RSVP. IPv6. Conferencing Traditional solutions, Video conferencing over IP, point to point, multipoint, architectures, bridges. IETF - Session Initiation Protocol Comparison with H.323, SIP proxy, proxy server, redirect server. SDP. Multicasting Multicasting compared to unicasting and broadcasting, when to use and when not to use multicasting. IGMP, DVMRP, PIM. Security Impact of firewalls and NAT, ISMA, DRM, DTCP.
Network forensics training course description This course studies network forensics-monitoring and analysis of network traffic for information gathering, intrusion detection and legal evidence. We focus on the technical aspects of network forensics rather than other skills such as incident response procedures etc.. Hands on sessions follow all the major sections. What will you learn Recognise network forensic data sources. Perform network forensics using: Wireshark NetFlow Log analysis Describe issues such as encryption. Network forensics training course details Who will benefit: Technical network and/or security staff. Prerequisites: TCP/IP foundation for engineers. Duration 3 days Network forensics training course contents What is network forensics? What it is, host vs network forensics, purposes, legal implications, network devices, network data sources, investigation tools. Hands on whois, DNS queries. Host side network forensics Services, connections tools. Hands on Windows services, Linux daemons, netstat, ifoconfig/ipconfig, ps and Process explorer, ntop, arp, resource monitor. Packet capture and analysis Network forensics with Wireshark, Taps, NetworkMiner. Hands on Performing Network Traffic Analysis using NetworkMiner and Wireshark. Attacks DOS attacks, SYN floods, vulnerability exploits, ARP and DNS poisoning, application attacks, DNS ANY requests, buffer overflow attacks, SQL injection attack, attack evasion with fragmentation. Hands on Detecting scans, using nmap, identifying attack tools. Calculating location Timezones, whois, traceroute, geolocation. Wifi positioning. Hands on Wireshark with GeoIP lookup. Data collection NetFlow, sflow, logging, splunk, splunk patterns, GRR. HTTP proxies. Hands on NetFlow configuration, NetFlow analysis. The role of IDS, firewalls and logs Host based vs network based, IDS detection styles, IDS architectures, alerting. Snort. syslog-ng. Microsoft log parser. Hands on syslog, Windows Event viewer. Correlation Time synchronisation, capture times, log aggregation and management, timelines. Hands on Wireshark conversations. Other considerations Tunnelling, encryption, cloud computing, TOR. Hands on TLS handshake in Wireshark.
OpenStack for NFV and SDN course description OpenStack is predominately a cloud management technology. This course looks at how OpenStack can be used in a NFV and SDN environment. What will you learn Describe the architecture of NFV. Explain the relationship between NFV and SDN. Implement NFV VIM using OpenStack. Explain how OpenStack as VNFM and orchestrator works. OpenStack for NFV and SDN course details Who will benefit: Anyone wishing to implement NFV using OpenStack. Prerequisites: Introduction to Virtualization Duration 3 day OpenStack for NFV and SDN course content What is NFV? What is NFV? What are network Functions? NFV benefits, NFV market drivers. ETSI NFV framework. ETSI documents, Architecture overview, compute domain, hypervisor domain, infrastructure network domain. What is OpenStack? Virtual machines, clouds, management. OpenStack architecture, OpenStack modules. Why OpenStack for NFV? Hands on OpenStack installation. OpenStack Virtualization and NFV Server, storage and network virtualization and NFV. Where OpenStack fits in the ETSI framework. Virtual machines, containers and docker. Data centres, clouds, SaaS, IaaS, PaaS. Hands on OpenStack Iaas, OpenStack Nova. The virtualization layer VM centric model, containers versus hypervisors, FD.io. Hands on OpenStack as the VIM. OpenStack Neutron VXLAN, Networks, subnets, ports. Security groups. Routers. Service and component hierarchy. Hands on Implementing a virtual network with OpenStack Neutron. Virtualization of Network Functions Network virtualization versus Network Function virtualization. NFV MANO Management and Orchestration. Where OpenStack fits. MANO descriptors, Open orchestration. OpenStack Tacker, Open MANO, OpenBaton, other orchestrators. OpenStack Tacker Installation, getting started, configuration. SFC and OpenStack. Hands on Deploying a VNF. OPNFV What is OPNFV, Where OpenStack fits into OPNFV. SDN What is SDN? Control and data planes. SDN controllers. Classic SDN versus real SDN. Hybrid SDN, network automation, SDN with overlays. Northbound, southbound, SDN protocols, OpenFlow, OpenDaylight, ONOS, SDN with NFV. SDN and OpenStack. Summary Deploying NFV, performance, testing. Futures
24 Hour Flash Deal **25-in-1 Data Privacy Officer Diploma Mega Bundle** Data Privacy Officer Diploma Enrolment Gifts **FREE PDF Certificate**FREE PDF Transcript ** FREE Exam** FREE Student ID ** Lifetime Access **FREE Enrolment Letter ** Take the initial steps toward a successful long-term career by studying the Data Privacy Officer Diploma package online with Studyhub through our online learning platform. The Data Privacy Officer Diploma bundle can help you improve your CV, wow potential employers, and differentiate yourself from the mass. This Data Privacy Officer Diploma course provides complete 360-degree training on Data Privacy Officer Diploma. You'll get not one, not two, not three, but twenty-five Data Privacy Officer Diploma courses included in this course. Plus Studyhub's signature Forever Access is given as always, meaning these Data Privacy Officer Diploma courses are yours for as long as you want them once you enrol in this course This Data Privacy Officer Diploma Bundle consists the following career oriented courses: Course 01: Data Protection (GDPR) Practitioner Course 02: Cyber Security Law Course 03: CompTIA Security+ Course 04: CompTIA PenTest+ (Ethical Hacking) course Course 05: Web Application Penetration Testing Course 06: Network Security and Risk Management Course 07: Cyber Security Advanced Training Course 08: CEH: Learn Ethical Hacking From A-Z: Beginner To Expert Course 09: Foundations of IT Security: Protecting Digital Assets Course 10: Cyber Security Incident Handling and Incident Response Course 11: Information Governance and Data Management Training Course 12: Data Center Training Essentials: General Introduction Course 13: CompTIA Cloud+ (CV0-002) Course 14: CompTIA Healthcare IT Technician Course 15: CompTIA ITF+ (FCO-U61) Course 16: CompTIA Network+ Certification (N10-007) Course 17: IT Administration and Networking Course 18: IT Support Technician: Troubleshooting and Technical Expertise Course 19: Internet of Things (IoT) Course 20: SQL Database Management Course 21: Quick Data Science Approach from Scratch Course 22: Deep Learning Neural Network with R Course 23: Computer Workstation Safety Training Course 24: Foundations of Artificial Intelligence Course 25: Computer Networks Security from Scratch to Advanced The Data Privacy Officer Diploma course has been prepared by focusing largely on Data Privacy Officer Diploma career readiness. It has been designed by our Data Privacy Officer Diploma specialists in a manner that you will be likely to find yourself head and shoulders above the others. For better learning, one to one assistance will also be provided if it's required by any learners. The Data Privacy Officer Diploma Bundle is one of the most prestigious training offered at StudyHub and is highly valued by employers for good reason. This Data Privacy Officer Diploma bundle course has been created with twenty-five premium courses to provide our learners with the best learning experience possible to increase their understanding of their chosen field. This Data Privacy Officer Diploma Course, like every one of Study Hub's courses, is meticulously developed and well researched. Every one of the topics is divided into Data Privacy Officer Diploma Elementary modules, allowing our students to grasp each lesson quickly. The Data Privacy Officer Diploma course is self-paced and can be taken from the comfort of your home, office, or on the go! With our Student ID card you will get discounts on things like music, food, travel and clothes etc. In this exclusive Data Privacy Officer Diploma bundle, you really hit the jackpot. Here's what you get: Step by step Data Privacy Officer Diploma lessons One to one assistance from Data Privacy Officer Diploma professionals if you need it Innovative exams to test your knowledge after the Data Privacy Officer Diploma course 24/7 customer support should you encounter any hiccups Top-class learning portal Unlimited lifetime access to all twenty-five Data Privacy Officer Diploma courses Digital Certificate, Transcript and student ID are all included in the price PDF certificate immediately after passing Original copies of your Data Privacy Officer Diploma certificate and transcript on the next working day Easily learn the Data Privacy Officer Diploma skills and knowledge you want from the comfort of your home CPD 250 CPD hours / points Accredited by CPD Quality Standards Who is this course for? This Data Privacy Officer Diploma training is suitable for - Students Recent graduates Job Seekers Individuals who are already employed in the relevant sectors and wish to enhance their knowledge and expertise in Data Privacy Officer Diploma Certified Information Privacy Manager (CIPM) Certified Information Privacy Technologist (CIPT) Certified Information Privacy Professional/Europe (CIPP/E) Requirements To participate in this Data Privacy Officer Diploma course, all you need is - A smart device A secure internet connection And a keen interest in Data Privacy Officer Diploma Career path You will be able to kickstart your Data Privacy Officer Diploma career because this course includes various courses as a bonus. This Data Privacy Officer Diploma is an excellent opportunity for you to learn multiple skills from the convenience of your own home and explore Data Privacy Officer Diploma career opportunities. Certificates CPD Accredited Certificate Digital certificate - Included CPD Accredited e-Certificate - Free CPD Accredited Hardcopy Certificate - Free Enrolment Letter - Free Student ID Card - Free
Course Overview Is your server fully protected from hackers? The Learn How to Secure an Ubuntu Linux Server against Hackers course has been designed by industry experts to equip learners with the skills and knowledge to block most hacking attempts when running servers. Through expert video training, it covers everything you need to know to ensure maximum security. You will learn basic Linux commands, how to set up RSA login, and much more. By the end of this course, you will be able to harden any Linux system and minimise its vulnerability against hackers. You will also have a wide range of skills required to become a Linux system administrator or engineer. Protect your servers from hackers and enrol in this complete masterclass today. This best selling Learn How to Secure an Ubuntu Linux Server against Hackers has been developed by industry professionals and has already been completed by hundreds of satisfied students. This in-depth Learn How to Secure an Ubuntu Linux Server against Hackers is suitable for anyone who wants to build their professional skill set and improve their expert knowledge. The Learn How to Secure an Ubuntu Linux Server against Hackers is CPD-accredited, so you can be confident you're completing a quality training course will boost your CV and enhance your career potential. The Learn How to Secure an Ubuntu Linux Server against Hackers is made up of several information-packed modules which break down each topic into bite-sized chunks to ensure you understand and retain everything you learn. After successfully completing the Learn How to Secure an Ubuntu Linux Server against Hackers, you will be awarded a certificate of completion as proof of your new skills. If you are looking to pursue a new career and want to build your professional skills to excel in your chosen field, the certificate of completion from the Learn How to Secure an Ubuntu Linux Server against Hackers will help you stand out from the crowd. You can also validate your certification on our website. We know that you are busy and that time is precious, so we have designed the Learn How to Secure an Ubuntu Linux Server against Hackers to be completed at your own pace, whether that's part-time or full-time. Get full course access upon registration and access the course materials from anywhere in the world, at any time, from any internet-enabled device. Our experienced tutors are here to support you through the entire learning process and answer any queries you may have via email.
Duration 3 Days 18 CPD hours This course is intended for The audience for this course are data professionals and business intelligence professionals who want to learn how to accurately perform data analysis using Power BI. This course is also targeted toward those individuals who develop reports that visualize data from the data platform technologies that exist on both in the cloud and on-premises. This course covers the various methods and best practices that are in line with business and technical requirements for modeling, visualizing, and analyzing data with Power BI. The course will show how to access and process data from a range of data sources including both relational and non-relational sources. Finally, this course will also discuss how to manage and deploy reports and dashboards for sharing and content distribution. Prerequisites Understanding core data concepts. Knowledge of working with relational data in the cloud. Knowledge of working with non-relational data in the cloud. Knowledge of data analysis and visualization concepts. DP-900T00 Microsoft Azure Data Fundamentals is recommended 1 - Discover data analysis Overview of data analysis Roles in data Tasks of a data analyst 2 - Get started building with Power BI Use Power BI Building blocks of Power BI Tour and use the Power BI service 3 - Get data in Power BI Get data from files Get data from relational data sources Create dynamic reports with parameters Get data from a NoSQL database Get data from online services Select a storage mode Get data from Azure Analysis Services Fix performance issues Resolve data import errors 4 - Clean, transform, and load data in Power BI Shape the initial data Simplify the data structure Evaluate and change column data types Combine multiple tables into a single table Profile data in Power BI Use Advanced Editor to modify M code 5 - Design a semantic model in Power BI Work with tables Create a date table Work with dimensions Define data granularity Work with relationships and cardinality Resolve modeling challenges 6 - Add measures to Power BI Desktop models Create simple measures Create compound measures Create quick measures Compare calculated columns with measures 7 - Add calculated tables and columns to Power BI Desktop models Create calculated columns Learn about row context Choose a technique to add a column 8 - Use DAX time intelligence functions in Power BI Desktop models Use DAX time intelligence functions Additional time intelligence calculations 9 - Optimize a model for performance in Power BI Review performance of measures, relationships, and visuals Use variables to improve performance and troubleshooting Reduce cardinality Optimize DirectQuery models with table level storage Create and manage aggregations 10 - Design Power BI reports Design the analytical report layout Design visually appealing reports Report objects Select report visuals Select report visuals to suit the report layout Format and configure visualizations Work with key performance indicators 11 - Configure Power BI report filters Apply filters to the report structure Apply filters with slicers Design reports with advanced filtering techniques Consumption-time filtering Select report filter techniques Case study - Configure report filters based on feedback 12 - Enhance Power BI report designs for the user experience Design reports to show details Design reports to highlight values Design reports that behave like apps Work with bookmarks Design reports for navigation Work with visual headers Design reports with built-in assistance Tune report performance Optimize reports for mobile use 13 - Perform analytics in Power BI Explore statistical summary Identify outliers with Power BI visuals Group and bin data for analysis Apply clustering techniques Conduct time series analysis Use the Analyze feature Create what-if parameters Use specialized visuals 14 - Create and manage workspaces in Power BI Distribute a report or dashboard Monitor usage and performance Recommend a development life cycle strategy Troubleshoot data by viewing its lineage Configure data protection 15 - Manage semantic models in Power BI Use a Power BI gateway to connect to on-premises data sources Configure a semantic model scheduled refresh Configure incremental refresh settings Manage and promote semantic models Troubleshoot service connectivity Boost performance with query caching (Premium) 16 - Create dashboards in Power BI Configure data alerts Explore data by asking questions Review Quick insights Add a dashboard theme Pin a live report page to a dashboard Configure a real-time dashboard Set mobile view 17 - Implement row-level security Configure row-level security with the static method Configure row-level security with the dynamic method Additional course details: Nexus Humans PL-300T00: Microsoft Power BI Data Analyst training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the PL-300T00: Microsoft Power BI Data Analyst course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.