Course Code: 834036
Including creating triggers for cloud flows, configuring actions, implementing conditional logic for a cloud flow, testing a cloud flow, creating and configuring approvals by using Power Automate, and sharing cloud flows.
Course Code: 834037
The skills validated include creating Dataverse tables, modifying forms and views, and configuring a model-driven app. The scenario in this experience represents real-world challenges faced by individuals with business-specific expertise who build model-driven apps.
Course Code: 834040
In this learning path, you practice storing business data securely by using Azure Blob Storage and Azure Files. The skills validated include creating storage accounts, storage containers, and file shares. Also, configuring encryption and networking to improve the sec...
Course Code: 834044
Learn how to build, deploy, scale, and manage containerized cloud-native apps using Azure Container Apps, Azure Container Registry, and Azure Pipelines.
Course Code: 834047
Explore the data warehousing process and learn how to load, monitor, secure, and query a warehouse in Microsoft Fabric.
Course Code: 834048
Real-time intelligence in Microsoft Fabric enables analysis of streaming events in real or near-real time.
Course Code: 834052
Gain the skills to use Microsoft Purview to improve your data security in Microsoft 365. In this training, you learn how to create sensitive information types, create sensitivity labels, and use auto-labeling policies based on these labels. You also learn how to set...
Course Code: 834056
Learn how to use the Semantic Kernel SDK to build intelligent applications that automate tasks and perform natural language processing.
Course Code: 834058
Generative Artificial Intelligence (AI) is becoming more accessible through easy-to-use platforms like Azure AI Studio. Learn how to build generative AI applications like custom copilots that use language models and prompt flow to provide value to your users.
Course Code: 834060
Use Microsoft Entra to manage access by using entitlements, access reviews, privileged access tools, and monitor access events.