58 zoekresultaten voor "microsoft"
Stermodelleren in de Praktijk voor Data Analisten
In deze cursus leer je hoe je ruwe, vaak niet-geoptimaliseerde data omzet naar een goed ontworpen stermodel met feiten- en dimensietabellen…
Agents voor Developers
In deze cursus maak je kennis met AI-agents en ga je snel van theorie naar praktijk. Je leert hoe je agents ontwerpt die robuuste, nauwkeur…
Star Schema Modeling in Practice for Data Analysts
In this course, you will learn how to transform raw, unoptimized source data into a well-designed star schema with fact and dimension table…
Microsoft Fabric for Data Analysts
In this course, you will be introduced to Microsoft Fabric as an integrated platform for modern data analytics. You will learn how to colle…
Microsoft Planner en Project
De training Microsoft Planner en Project is geschikt voor projectmanagers en medewerkers die complexe projecten willen beheren. Je leert ge…
AZ-400: Designing and Implementing Microsoft DevOps Solutions
During the course AZ-400: Designing and Implementing Microsoft DevOps Solutions, participants will learn how to plan for DevOps, use source…
AZ-700: Designing and Implementing Microsoft Azure Networking Solutions
The course AZ-700: Designing and Implementing Microsoft Azure Networking Solutions covers the process of designing, implementing, and manag…
PL-300: Microsoft Power BI Data Analyst
During the course PL-300: Microsoft Power BI Data Analyst various methods and best practices are discussed for modeling, visualizing, and a…
MS-700: Managing Microsoft Teams
The course MS-700: Managing Microsoft Teams will learn you about various Teams management tools, security and compliance features, network …
Administering a Microsoft SQL Database (M55353)
The course Administering a Microsoft SQL Database (M55353) provides students who manage SQL Server and Azure SQL databases with the knowled…
SC-100: Microsoft Cybersecurity Architect
The course SC-100: Microsoft Cybersecurity Architect prepares students with the expertise to design and evaluate cybersecurity strategies i…
