Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

Contact Sales

Search

Show Filters
Result Filters:

1101 Results Found for "power bi"

Results per page: 10 40 80

Red Hat® Learning Subscription – Standard (LS220)

Course Code: 4848

The Red Hat® Learning Subscription delivers 12-month unlimited access to all Red Hat Online Training courses. The Standard RHLS subscription is a higher tier with access to 5 certification exams and up to 2 retakes. Customize your learning experience - enroll now at Global Knowledge!

Delivery Formats

Transform Ideas into Action with Copilot Chat (MS-4023)

Course Code: 834108

This course teaches learners how to get started with Microsoft 365 Copilot Chat, craft effective prompts, and use its AI-powered features to enhance productivity, streamline work, and collaborate securely in real-time.

Delivery Formats

Draft, analyze, and present with Microsoft 365 Copilot

Course Code: 834101

This course directs users to learn common prompt flows in Microsoft 365 apps including PowerPoint, Word, Excel, Teams, and Outlook. It also introduces Microsoft 365 Copilot Chat and discusses the difference between work and web grounded data.

Delivery Formats

10 Network Security Tools and Tests Everyone Should Use

White Paper | Nov. 28, 2017

This white paper provides a list of 10 security tools and tests that will help you check out suspicious issues and keep ahead of new risks and threats.

10 Things Security Experts Wish End Users Knew

White Paper | April 08, 2021

Cybersecurity is an essential business operation more than ever before. In this article, we present 10 things cybersecurity experts wish end users knew.

10 Ways Cloud is Changing the World

White Paper | Aug. 14, 2015

Cloud computing is constantly reshaping the way we work, learn and play. Let's look at 10 ways the cloud will (and to a large degree already has) changed the world.

10 Ways Everyone Should Approach Cybersecurity in 2015

White Paper | Feb. 13, 2015

James Michael Stewart discusses 10 ways everyone should focus on key issues regarding to approaching Cybersecurity in 2015 for their organization. Learn more.

10 Ways Malicious Code Reaches Your Private Network

White Paper | July 13, 2010

Learn 10 common ways that malicious code can penetrate your network.

12 Steps to Bring Your Own Device (BYOD) Success

White Paper | April 16, 2012

The opportunities and challenges bring your own device (BYOD) represents are real; enterprises must make their network infrastructure BYOD-ready to meet the onslaught.

ABCs of ITIL®

White Paper | Feb. 27, 2015

Learn the ITIL® concepts of accountability, boundaries, and consistency (the ABCs) and discover how ITIL helps establish, manage, and maintain the ABCs.