Latest Posts
DA-100 Microsoft Power BI – Part 4 Section 5 – Manage datasets Part 2
Configure a Dataset Scheduled Refresh In the previous video, we installed a gateway connection which will allow Power Bi service to connect to my computer. In this video, we’ll have a look at how we can refresh the data automatically. Now, your data source cannot be refreshed because your credentials are invalid. Okay, let’s edit our credentials. So we can either use Windows without impersonation, or we can use other categories that it gives me. So I’m going to click no Privacy setting for this click sign. And there we…
DA-100 Microsoft Power BI – Part 4 Section 5 – Manage datasets
Analyze in Excel Hello. And in this section, we’re going to be looking at managing data sets. So again, we will have a video for each of the DA Dash 100 exam requirements. And we’re going to start off with Analyze in Excel. So you’ve got your data sets and also reports up in the Power Bi service, but sometimes you might just want to do some ad hoc analysis from it. Well, you can do so now notice, first of all, we’ve got this download, and we’ve got Analyze…
DA-100 Microsoft Power BI – Part 4 Section 6 – Create and manage workspaces
Create and Configure a Workspace Hello. Now, up to now we’ve been using the private workspace called My Workspace. You can share items from it, but it’s not really designed to have a big solution being there. However, workspaces which can hold data sources, datasets reports and dashboards can be more than just My Workspace. You can have of a specific workspace for a specific project and then invite people along to collaborate with you. So this section is all about creating and managing workspaces which does include apps which…
CompTIA CASP+ CAS-004 – Chapter 01 – Understanding Risk Management Part 6
Vulnerabilities and Threat Identification When we’re determining vulnerabilities and threats to an asset, considering the threat agent first is often the easiest. There are essentially six categories of threat agents. So we have human, which can be both malicious and no malicious internal and external threats natural threat agents, of course floods, fires, hurricanes, et cetera. Technical, which is going to include hardware and software failure malicious code as well as new technologies. Then you have physical, which includes perimeter measures that are failed biometric failures, et cetera. Environmental, which…
CompTIA CASP+ CAS-004 – Chapter 01 – Understanding Risk Management Part 5
Risk Impact Risk impact or the magnitude of the impact is just an estimate of how much damage a negative risk can have or the potential opportunity cost if a positive risk is realized. So we’re measuring these in financial terms if it’s quantitative or with a subjective measurement if, if it’s qualitative. Risk are then usually ranked on a scale that’s determined by the organization. So high level risk would result in significant loss, low level risk would result in negligible loss. Now, if the magnitude of the impact…
CompTIA CASP+ CAS-004 – Chapter 01 – Understanding Risk Management Part 4
Categorizing Data Let’s start by what should be a review for most of you at this point. Most don’t come directly into the CASP exam. So you’ve probably heard of the three fundamentals or triads of security, and that is CIA confidentiality, integrity, and availability. So what is confidentiality? Well, that’s keeping something secure, preventing the disclosure of data or information to those that aren’t authorized to see it. As a part of this, the sensitivity level needs to be determined before we can put any access controls in place,…
CompTIA CASP+ CAS-004 – Chapter 01 – Understanding Risk Management Part 3
Process Life Cycle A process is a collection of related activities that produce a specific service or product. That is, they serve a particular goal for the organization. Change management and risk management are examples of processes. So once the policy is written, then the appropriate processes should be written and those are based on a life cycle as well. The first step is analyze the policy. The second step is to design the process based on the policy. So when a new process is implemented, all personnel involved in…
CompTIA CASP+ CAS-004 – Chapter 01 – Understanding Risk Management Part 2
Integrating Diverse Industries There are a lot of cases today where companies are integrating business models that are significantly different from one another. So we’ve got the integration of diverse industries. In some cases, these organizations are entering new fields, sometimes they’re going into new areas. So you’ve got different cultures, different regulatory requirements, and that can open up a lot of new business opportunities, but it also can introduce a number of security weaknesses. And so these are some of the considerations that we need to take into account…
CompTIA CASP+ CAS-004 – Chapter 01 – Understanding Risk Management
Chapter Introduction In this first chapter, we’re going to be looking at the concepts of risk management. And risk management is going to be a big part of the life of a security professional because as security professionals in the information technology business, we’re surrounded by risk every day. And the way that we handle that risk will really prove the efficiency that we have at our job. In this chapter, we’re are going to discuss a number of different topics. The first will be understanding business and industry influences….
PMI PMP Project Management Professional – Introducing Project Procurement Management Part 4
Preparing for Contract administration Let’s talk about procurement administration. When we get into procurement administration, it’s things like making sure people are being paid on time and invoicing properly and using the right system to do a request for payment. The seller’s compensation might be linked to progress. So they hit these milestones, then they get paid. If that’s the case, as the buyer, I can’t stall. If they hit their milestones and it requires a review, then I need to get out there and review it and make sure…