• Classroom
  • Online, Instructor-Led
Course Description

This is the first course in the exclusive Data Analysis using Power BI Desktop series. This course lays the foundation for Power BI Report Builders. Report Builders will learn everything they need to create highly effective stand-alone and multi-page narrative reports using data sources that are created using Power BI Desktop. This course covers the use of both the Power BI Desktop application as well as the Power BI Service.

Learning Objectives

Unit 1: Introducing Power BI Topic A: Power BI as Part of Power Platform Topic B: What is Power BI Topic C: Power BI Overview Unit 2: Understanding Power BI Data Models Topic A: Terminology Topic B: Introduction to Tables & Relationships Topic C: Introduction to Data Model Schemas Unit 3: Defining Reports Topic A: Power BI Reports Topic B: Overview of Report Objectives Topic C: Data-Driven Narratives Unit 4: Building Power BI Desktop Reports Topic A: Working in Power BI Desktop Topic B: Creating Visuals Topic C: Formatting and Organizing Visuals Topic D: Sharing Unit 5: Report Actions & Filtering Topic A: Drill-down, Drill through, and other Data Actions Topic B: Interactions using Filters Topic C: Visual Interactions Topic D: Bookmarks and Buttons Unit 6: Power BI Service Topic A: Introduction to Power BI Services Topic B: Adding Reports and Data Topic C: Power BI Service Report Features Topic D: Refreshing Power BI Data Unit 7: Building Power BI Service Dashboards Topic A: Building Dashboards Topic B: Organizing Dashboard Elements Unit 8: Service Analytics Features Topic A: Understanding Dashboard Q & A Topic B: Quick Insights Unit 9: Sharing Dashboards, Reports & Datasets Topic A: Sharing Content Topic B: Publish an App in Power BI

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Specialty Areas

  • Cyber Defense Analysis
  • Cyber Defense Infrastructure Support
  • Cyber Investigation
  • Digital Forensics
  • Exploitation Analysis
  • Network Services
  • Risk Management
  • Software Development
  • Test and Evaluation
  • Threat Analysis
  • Training, Education, and Awareness
  • Vulnerability Assessment and Management