Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

Contact Sales

Search

Show Filters
Result Filters:

943 Results Found for "power bi"

Results per page: 10 40 80

ISEE - ISE Essentials

Course Code: 860072

This two-day course provides you with a focused introduction to Cisco ISE, equipping you with the practical skills to deploy and manage secure network access. You will configure identity sources, set up authentication and authorization policies for users and devices,...

Delivery Formats

SECACC - Administering and Troubleshooting Cisco Secure Access

Course Code: 860073

This comprehensive 5 Day training program provides an end-to-end understanding of Cisco cloud security, with Cisco Secure Access as the central platform supporting Secure Internet Access, Secure Private Access, Zero Trust Access, and traditional VPN services. The cou...

Delivery Formats

Business Value

Course Code: 831184

ExclusiveIn this 1-day course, you’ll learn how to define value across stakeholders and context, quantify costs and benefits (including the “hard-to-measure” ones), align initiatives to strategy, account for risk, and manage value through realization. This course blends pract...

Delivery Formats

Nutanix Enterprise Cloud Administration [v6.10]

Course Code: 9915

The Nutanix Enterprise Cloud Administration (ECA) 5.15 course enables system, network, and storage administrators to successfully configure and manage Nutanix in the datacenter.

Delivery Formats

10 Network Security Tools and Tests Everyone Should Use

White Paper | Nov. 28, 2017

This white paper provides a list of 10 security tools and tests that will help you check out suspicious issues and keep ahead of new risks and threats.

10 Things Security Experts Wish End Users Knew

White Paper | April 08, 2021

Cybersecurity is an essential business operation more than ever before. In this article, we present 10 things cybersecurity experts wish end users knew.

10 Ways Cloud is Changing the World

White Paper | Aug. 14, 2015

Cloud computing is constantly reshaping the way we work, learn and play. Let's look at 10 ways the cloud will (and to a large degree already has) changed the world.

10 Ways Everyone Should Approach Cybersecurity in 2015

White Paper | Feb. 13, 2015

James Michael Stewart discusses 10 ways everyone should focus on key issues regarding to approaching Cybersecurity in 2015 for their organization. Learn more.

10 Ways Malicious Code Reaches Your Private Network

White Paper | July 13, 2010

Learn 10 common ways that malicious code can penetrate your network.

12 Steps to Bring Your Own Device (BYOD) Success

White Paper | April 16, 2012

The opportunities and challenges bring your own device (BYOD) represents are real; enterprises must make their network infrastructure BYOD-ready to meet the onslaught.