![]() ![]() He holds a Bachelor’s Degree in Computer Science, a CISA and CISM. Cheers!.Ī passionate and business oriented IT consultant. ![]() You will also be required to provide answers to assignments given by the instructor.Wish you a great learning experience as you enroll for this course. Throughout the course, real life scenarios were given for better assimilation.All the resources used for the course are also attached in section one for you to practice. They can still be executed successfully in the newer versions. ![]() The key commands and concepts taught in this course had not changed. It is worth noting that though there had been a lot of changes to ACL over the years. In Module 5, you will see how ACL commands effortlessly isolate, profile, reorder and combine data.Module 6 shows you how to report results or findings using ACL GUI. In addition, Module 4 will show you how to use ACL commands for data integrity verification. Module 1 features the fundamentals of ACL.In module 2, you will learn to use ACL import data from data sources such as oracle database, delimited files, excel files.Module 3 will empower you with the tools to create logical and arithmetic expressions, perform mathematical computations and recalculations on transactions. ![]() The course contains 21 video lectures and 6 modules. You will learn how to use ACL powerful features to audit, profile, manipulate and visualize data. Are you looking for a career in audit, data science and other assurance functions?. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |