PL-300T00: Microsoft Power BI Data Analyst
Description This course will discuss the various methods and best practices that are in line with business and technical requirements for modeling, visualizing, and analyzing data with Power BI. The […]
Description This course will discuss the various methods and best practices that are in line with business and technical requirements for modeling, visualizing, and analyzing data with Power BI. The […]
Join us for the November Geauga Economic Leadership (G.E.L.) breakfast on Friday, November 6, 2026, co-sponsored by Geauga Growth Partnership and Kent State University at Geauga. This monthly breakfast series […]
Description In this course, you will cover incident response methods and procedures are taught in alignment with industry frameworks such as US-CERT’s NCISP (National Cyber Incident Response Plan), and Presidential […]
Description This course will provide you something you will not find in other class! The Cloud is being widely adopted today for a diverse set of reasons. However, many are […]
Description In this course you will cover 5 Key Elements of Pen Testing; Information Gathering, Scanning, Enumeration, Exploitation and Reporting. Plus, discover the latest vulnerabilities and the techniques malicious hackers […]
Description In this course, you will learn the value of vulnerability assessments. Then, you will discover how to use those assessments to make powerful changes in an information system's security. […]
Description In this course, you will cover governance, compute, application architecture, storage, data integration, authentication, networks, business continuity, and migrations. The course combines lecture with case studies to demonstrate basic […]
Description The power of extracting value from data utilizing Artificial Intelligence, Data Science and Machine Learning exposes the learning differences between humans and machines. Humans can apply ethical principles throughout […]
Description In this course, you will cover the tools an IT engineer needs to review an Information System. You will learn the importance of vulnerability assessments and how they are […]
Description The ability to identify and respond to changing trends is a hallmark of a successful business. Whether those trends are related to customers and sales, or to regulatory and […]
Description In this course, you will cover the implementation and analysis of the IS18 Top Controls. These controls have been identified as critical by leading government and private organizations with […]
Description In this course, you will cover how to prepare an organization to create a complete end-to-end solution for monitoring, preventing, detecting, and mitigating threats as they arise in real-time. […]