Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

Contact Sales

Search

Show Filters
Result Filters:

623 Results Found for "power bi"

Results per page: 10 40 80

Data Science and Big Data Analytics

Related Page

Develop and expand your data scientist and data analytics skillset.

Red Hat Technical Overviews

Related Page

Are you looking for foundational knowledge about cloud computing or deploying applications in containers? Check out these free short courses that include a series of on-demand, online videos, giving you a technical overview of the topics.

Microsoft Training Courses

Related Page

Build skills in the Microsoft topic of your choice. Our Microsoft Official Courseware is the most up-to-date training available & builds necessary skills.

Data Storage Training Courses

Related Page

Meet the data storage needs and requirements of large enterprises and corporations including products and solutions from EMC, Cisco, and IBM.

High Availability Options in SQL Server 2008

Video | July 11, 2013

In this video, you will learn about the High Availability options in SQL Server 2008: Server Clustering, Database Mirroring, Log Shipping and Peer-to-Peer Replication.

How To Use PowerPivot in SQL Server 2008 R2 and Office 2010

Video | June 12, 2014

In this video, you will learn how to a use a new feature of SQL Server 2008 R2 and Office 2010 called PowerPivot for Self-Service Business Intelligence.

How to Use Microsoft PowerShell 4.0 More Effectively

Video | June 11, 2015

Global Knowledge instructor Mark Baugher shares three quick tips on how to use Microsoft PowerShell 4.0 more effectively: Discoverability using the Get cmdlet, dot notation and pipeline.

ITIL Capability versus ITIL Lifecycle?

Video | Jan. 02, 2014

Michael Scarborough and Ryan Ballmer, co-authors of Global Knowledge ITIL courseware, discuss the difference between ITIL Capability courses and ITIL Lifecycle courses.

Data Protection for Mobile Phones

Video | Oct. 11, 2018

Learn basic mobile phone security practices to lock down this potential entry point to your corporate systems.