K2’s Taking Another Look At Power BI
Computer Software and Applications
2 CPE Credits

Major Topics
- Getting started with Power BI
- Creating effective visualizations in Power BI
- Publishing Power BI reports to dashboards
- Optimizing dashboards for viewing on mobile devices
Learning Objectives
- List the basic steps necessary to generate a Power BI report
- Distinguish between Power BI reports and dashboards
- Identify the necessary steps to link data into Power BI
- List the steps necessary to create a Power BI report
- Specify the steps necessary to convert a Power BI report to a dashboard
- Generate user-defined calculations in Power BI
Description
Although Power BI has been available for ten years, most business professionals don’t fully appreciate all it can do and its easy use. Further, many are intimidated by the platform and continue to use less efficient and effective reporting practices. If this describes you, invest some time in this session to learn how to work with Power BI almost immediately.
In this session, you will learn how to use Power BI to create compelling dashboard reports. You will also learn how to optimize these reports to enhance their effectiveness. If you want to improve financial and operational reporting processes, this session is for you!
Compliance Information
Overview
Although Power BI has been available for ten years, most business professionals don’t fully appreciate all it can do and its easy use. Further, many are intimidated by the platform and continue to use less efficient and effective reporting practices. If this describes you, invest some time in this session to learn how to work with Power BI almost immediately.
In this session, you will learn how to use Power BI to create compelling dashboard reports. You will also learn how to optimize these reports to enhance their effectiveness. If you want to improve financial and operational reporting processes, this session is for you!
Course Details
- Common security weaknesses that occur with hardware and software at home and in the office
- Malware, ransomware, data breach, and incident response tips
- Internal control failures which result in the theft of assets or unauthorized manipulation of data
- List at least three major security incidents reported in the headlines in the last year, and explain at least one major internal control design or operation flaw that allowed the hack to occur
- Select the correct definitions for common security terms such as attack surface, vulnerability, exploit, social engineering, phishing, malware, heuristics, biometrics, and multi-factor authentication (MFA)
- List at least three best practices learned by reviewing the control failures cited in the case studies
Intended Audience — Business professionals seeking to optimize their home network solution
Advanced Preparation — None
Field of Study — Information Technology
Credits — 2 Credits
IRS Program Number –
Published Date – January 1, 2025
Revision Date –