Showing posts with the label MICROSOFT BI

Be A White Hat Hacker and Pen Tester

Be A White Hat Hacker and Pen Tester About this Course Become a white hat hacker and learn all the practical techniques for penetration testing with this amazing course which will provide conceptual framework to your security training. The course not only covers theoretical concepts but cover the practical demonstrations of various tools like Metasploit , Scapy and WireShark. The course is divided into the following main sections: Ethical Hacking Concepts -What is Ethical Hacking? Know about different types of hackers. Get to know about hacktivism and practical pen testing techniques Real World Information Gathering -Learn about foot printing and reconnaissance, Email harvesting, Learn and master SSL scan, Maltego, Whatweb, HttpRecon. Work on techniques like IP address geolocation, DNS and Mail Server Enumeration Scanning and Vulnerability Gathering -Learn to use scapy for packet crafting and port scanning, Learn to use network scanning techniques and work on vulnerability

Master in Microsoft Power BI Desktop and Service

What you'll learn Understand Power BI concepts like Microsoft Power BI desktop layouts, BI reports, dashboards, and Power BI DAX commands and functions. Create compelling reports and visualizations, derive real-time insights, and deploy it on demand. Create, share, collaborate, and benefit from business information with purpose-built dashboards. Form relationships in your data model and learn data visualization best practices. Requirements Microsoft Power BI Desktop installed on your computer (which is free). Knowledge of Excel Power Query is an added advantage. Description More than +70,000  satisfied students worldwide have enrolled in this course, writing thousands of 5-star reviews. "I recommend this course for anybody starting with Power BI.  It touches all aspects of the desktop and online tool for visual development.  If multiple data source examples are included then it would be very complete (like data gateway, data flow, etc.). Given the scope of the cour