16 Results Found
This recorded webinar will show you how to quickly summarize a large amount of data from different data sources using Power Query.
The Red Hat® Learning Subscription delivers 12-months of unlimited access to all Red Hat Online Training courses. The Standard RHLS subscription is a higher tier with access to 5 certification exams and up to 2 retakes.
In this live excerpt from Supporting and Troubleshooting Windows 10 (M10982), Windows 10 expert and Microsoft Certified instructor, John Panagakos, will lead you through one of the most popular modules in this course.
Have you been afraid to implement PowerShell in your environment because of security fears? The reality of PowerShell security doesn’t always match the perception. When compared to other scripting languages, PowerShell is actually more secure by default.
Learn to effectively use Microsoft Outlook as a work organization and management tool. This webinar will help participants enhance their personal and team productivity, while giving them more control over activities and information.
Watch this recorded webinar to learn about Microsoft Teams. Our industry expert will show you what Microsoft Teams can do for your team and how it can help you manage your time more effectively. In this 45 minute webinar, you will see what Microsoft Teams can offer you and your organization and how you can use it.
In this video, instructor Glenn Weadock explains the Windows 7 library concept and how it replaces the traditional "My Documents" user profile folder by adding the Public profile to the user profile.
If you create presentations using the notes feature in PowerPoint, you probably have found yourself wanting to print multiple slides on one page (handouts) with the notes associated with those slides displayed on the same page. This layout can often help you better p...
Network security is everyone's concern, and this applies to computer security as well. Many security breaches occur due to user ignorance of basic security principles, not malicious intent. Network and computer security are like an onion - there are multiple layers. Good security begins with understanding what you can do to keep your systems safe and implementing a layered approach. If you depend on one program or feature to secure your computer, then when (not if, but when) that dependency is breached, you may have personal information stolen or even have your computer taken over.
Prepping for a Microsoft certification exam? Global Knowledge's own Tracy Wallace has you covered with these six tips for passing any Microsoft exam.