10 zoekresultaten voor "microsoft"
Design and Implement Microsoft DevOps solutions (AZ-400) [M-AZ400]
OVERVIEW This course provides the knowledge and skills to design and implement DevOps processes and practices. Students will learn how to p…
Outlook Time Management [M-OUTTM]
OVERVIEW In de Timemanagement met Outlook training leert u de vaardigheden van Outlook kennen en leert u effectiever te werken met Outlook.…
Prepare security and compliance to support Microsoft 365 Copilot (MS-40020 [M-MS4002]
OVERVIEW This learning path examines the key Microsoft 365 security and compliance features that administrators must prepare in order to su…
Manage and extend Microsoft 365 Copilot (MS-40170 [M-MS4017]
OVERVIEW This course examines how administrators can manage and extend Microsoft 365 Copilot to meet their business needs. The course intro…
Deploy and administer Linux virtual machines on Azure (AZ-1007) [M-AZ1007]
OVERVIEW In this learning path, you prepare for the Applied Skill, Deploy and administer Linux virtual machines on Microsoft Azure. CONTENT…
Excel voor gevorderden: Grafieken, Tabellen & Databases [M-EXGD]
OVERVIEW Leer in deze cursus op een snelle en efficiënte manier rekenen met MS Excel . U leert berekeningen te maken via geavanceerd functi…
Cybersecurity Specialization: Threat Modeling [GK840103]
OVERVIEW Understand and apply threat modeling techniques to enhance cybersecurity. Cybersecurity Specialization: Threat Modeling dives into…
Draft, analyze, and present with Microsoft 365 Copilot [M-MS4018]
OVERVIEW This course directs users to learn common prompt flows in Microsoft 365 apps including PowerPoint, Word, Excel, Teams, and Outlook…
Empower your workforce with Copilot for Microsoft 365 Use Cases [M-MS4004]
OVERVIEW This one-day course is composed of two parts - Getting started with Copilot for Microsoft 365 and Empower your workforce with Copi…
Secure cloud resources with Microsoft security technologies (AZ-500) [M-AZ500]
OVERVIEW Gain skills needed to implement security controls, maintain an organization’s security posture, and identify and remediate securit…
