• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

2120 IT Certifications courses

Cisco Securing Networks with Cisco Firepower Next Generation Firewall v1.0 (SSNGFW)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Security administrators Security consultants Network administrators System engineers Technical support personnel Cisco integrators and partners Overview After taking this course, you should be able to: Describe key concepts of NGIPS and NGFW technology and the Cisco Firepower Threat Defense system, and identify deployment scenarios Perform initial Cisco Firepower Threat Defense device configuration and setup tasks Describe how to manage traffic and implement Quality of Service (QoS) using Cisco Firepower Threat Defense Describe how to implement NAT by using Cisco Firepower Threat Defense Perform an initial network discovery, using Cisco Firepower to identify hosts, applications, and services Describe the behavior, usage, and implementation procedure for access control policies Describe the concepts and procedures for implementing security intelligence features This course gives you knowledge and skills to use and configure Cisco© Firepower Threat Defense technology, beginning with initial device setup and configuration and including routing, high availability, Cisco Adaptive Security Appliance (ASA) to Cisco Firepower Threat Defense migration, traffic control, and Network Address Translation (NAT). You will learn how to implement advanced Next-Generation Firewall (NGFW) and Next-Generation Intrusion Prevention System (NGIPS) features, including network intelligence, file type detection, network-based malware detection, and deep packet inspection. You will also learn how to configure site-to-site VPN, remote-access VPN, and Secure Sockets Layer (SSL) decryption before moving on to detailed analysis, system administration, and troubleshooting. Cisco Firepower Threat Defense Overview Examining Firewall and IPS Technology Firepower Threat Defense Features and Components Examining Firepower Platforms Examining Firepower Threat Defense Licensing Cisco Firepower Implementation Use Cases Cisco Firepower NGFW Device Configuration Firepower Threat Defense Device Registration FXOS and Firepower Device Manager Initial Device Setup Managing NGFW Devices Examining Firepower Management Center Policies Examining Objects Examining System Configuration and Health Monitoring Device Management Examining Firepower High Availability Configuring High Availability Cisco ASA to Firepower Migration Migrating from Cisco ASA to Firepower Threat Defense Cisco Firepower NGFW Traffic Control Firepower Threat Defense Packet Processing Implementing QoS Bypassing Traffic Cisco Firepower NGFW Address Translation NAT Basics Implementing NAT NAT Rule Examples Implementing NAT Cisco Firepower Discovery Examining Network Discovery Configuring Network Discovery Implementing Access Control Policies Examining Access Control Policies Examining Access Control Policy Rules and Default Action Implementing Further Inspection Examining Connection Events Access Control Policy Advanced Settings Access Control Policy Considerations Implementing an Access Control Policy Security Intelligence Examining Security Intelligence Examining Security Intelligence Objects Security Intelligence Deployment and Logging Implementing Security Intelligence File Control and Advanced Malware Protection Examining Malware and File Policy Examining Advanced Malware Protection Next-Generation Intrusion Prevention Systems Examining Intrusion Prevention and Snort Rules Examining Variables and Variable Sets Examining Intrusion Policies Site-to-Site VPN Examining IPsec Site-to-Site VPN Configuration Site-to-Site VPN Troubleshooting Implementing Site-to-Site VPN Remote-Access VPN Examining Remote-Access VPN Examining Public-Key Cryptography and Certificates Examining Certificate Enrollment Remote-Access VPN Configuration Implementing Remote-Access VPN SSL Decryption Examining SSL Decryption Configuring SSL Policies SSL Decryption Best Practices and Monitoring Detailed Analysis Techniques Examining Event Analysis Examining Event Types Examining Contextual Data Examining Analysis Tools Threat Analysis System Administration Managing Updates Examining User Account Management Features Configuring User Accounts System Administration Cisco Firepower Troubleshooting Examining Common Misconfigurations Examining Troubleshooting Commands Firepower Troubleshooting

Cisco Securing Networks with Cisco Firepower Next Generation Firewall v1.0 (SSNGFW)
Delivered OnlineFlexible Dates
Price on Enquiry

Symantec Data Loss Prevention 14.0 - Administration

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is intended for anyone responsible for conf iguring, maintaining, and troubleshooting Symantec Data Loss Prevention. Additionally, this course is intended for technical users responsible for creating and maintaining Symantec Data Loss Prevention policies and the incident response structure. Overview At the completion of the course, you will be able to: Enforce server, detection servers, and DLP Agents as well as reporting, workflow, incident response management, policy management and detection, response management, user and role administration, directory integration, and filtering. This course is designed to provide you with the fundamental know ledge to configure and administer the Symantec Data Loss Prevention Enforce platform. Introduction to Symantec Data Loss Prevention Symantec Data Loss Prevention overview Symantec Data Loss Prevention architecture Navigation and Reporting Navigating the user interface Reporting and analysis Report navigation, preferences, and features Report filters Report commands Incident snapshot Incident Data Access Hands-on labs: Become familiar with navigation and tools in the user interface. Create, filter, summarize, customize, and distribute reports. Create users, roles, and attributes. Incident Remediation and Workflow Incident remediation and w orkf low Managing users and attributes Custom attribute lookup User Risk Summary Hands-on labs: Remediate incidents and configure a user?s reporting preferences Policy Management Policy overview Creating policy groups Using policy templates Building policies Policy development best practices Hands-on labs: Use policy templates and policy builder to configure and apply new policies Response Rule Management Response rule overview Configuring Automated Response rules Configuring Smart Response rules Response rule best practices Hands-On Labs: Create and use Automated and Smart Response rules Described Content Matching DCM detection methods Hands-on labs: Create policies that include DCM and then use those policies to capture incidents Exact Data Matching and Directory Group Matching Exact data matching (EDM) Advanced EDM Directory group matching (DGM) Hands-on labs: Create policies that include EDM and DGM, and then use those policies to capture incident Indexed Document Matching Indexed document matching (IDM) Hands-on labs: Create policies that include IDM rules and then use those policies to capture incidents Vector Machine Learning Vector Machine Learning (VML) Hands-on labs: Create a VML profile, import document sets, and create a VML policy Network Monitor Review of Network Monitor Protocols Traffic filtering Network Monitor best practices Hands-On Labs: Apply IP and L7 filters Network Prevent Network Prevent overview Introduction to Network Prevent (Email) Introduction to Network Prevent (Web) Hands-On Labs: Configure Network Prevent (E-mail) response rules, incorporate them into policies, and use the policies to capture incidents Mobile Email Monitor and Mobile Prevent Introduction to Mobile Email Monitor Mobile Prevent overview Configuration VPN configuration Policy and Response Rule Creation Reporting and Remediation Troubleshooting Network Discover and Network Protect Network Discover and Network Protect overview Configuring Discover targets Configuring Box cloud targets Protecting data Auto-discovery of servers and shares Running and managing scans Reports and remediation Network Discover and Network Protect best practices Hands-on labs: Create and run a filesystem target using various response rules, including quarantining Endpoint Prevent Endpoint Prevent overview Detection capabilities at the Endpoint Configuring Endpoint Prevent Creating Endpoint response rules Viewing Endpoint Prevent incidents Endpoint Prevent best practices Managing DLP Agents Hands-on labs: Create Agent Groups and Endpoint response rules, monitor and block Endpoint actions, view Endpoint incidents, and use the Enforce console to manage DLP Agents Endpoint Discover Endpoint Discover overview Creating and running Endpoint Discover targets Using Endpoint Discover reports and reporting features Hands-on labs: Create Endpoint Discover targets, run Endpoint Discover targets, and view Endpoint Discover incidents Enterprise Enablement Preparing for risk reduction Risk reduction DLP Maturity model System Administration Server administration Language support Incident Delete Credential management Troubleshooting Diagnostic tools Troubleshooting scenario Getting support Hands-on labs: Interpret event reports and traffic reports, configure alerts, and use the Log Collection and Configuration tool Additional course details: Nexus Humans Symantec Data Loss Prevention 14.0 - Administration training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Symantec Data Loss Prevention 14.0 - Administration course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Symantec Data Loss Prevention 14.0 - Administration
Delivered OnlineFlexible Dates
Price on Enquiry

Basic Cloud Computing

4.8(9)

By Skill Up

Gain the solid skills and knowledge to kickstart a successful career and learn from the experts with this

Basic Cloud Computing
Delivered Online On Demand1 hour 50 minutes
£25

Microservice Pattern & Architecture Training

4.8(9)

By Skill Up

Be an outstanding software-developer with less disrupting issues. You have just reached the very course you need right

Microservice Pattern & Architecture Training
Delivered Online On Demand7 hours 6 minutes
£25

Azure - Azure Active Directory

By iStudy UK

Azure Active Directory (Azure AD) is Microsoft's multi-tenant, cloud-based directory, and identity management service that combines core directory services, application access management, and identity protection into a single solution.  Through this Azure - Azure Active Directory you will receive an understanding of directory service options, how to use a custom domain, how to manage users and groups, as well as how to use multi-factor authentication. You will also learn how to work with application access, how to add and access applications, and how to use a hybrid Azure Active Directory. You will also explore how to extend and deploy AD to the cloud, how to prepare for synchronization, install Azure AD Connect, and manage directory synchronization. In addition, you will understand ADFS, learn how to install AFDS, and how to convert a domain to Federated. Finally, you will understand about Azure AD Federation and learn how to convert a domain to Federated. What Will I Learn? Get an Understanding of Active Directory Understand Hybrid Azure AD Understand Azure AD Federation Requirements Recommenced Pre-Requisite = Azure Introduction Introduction Introduction FREE 00:04:00 Azure Active Directory Directory Service Options 00:03:00 Custom Domains 00:05:00 Managing Users and Groups in the Portal 00:04:00 Managing Users and Groups in the Powershell 00:07:00 Multi-Factor Authentication 00:08:00 Multiple Directories 00:04:00 Application Access 00:02:00 Adding and Accessing Applications 00:06:00 Azure AD Versions 00:03:00 Hybrid Azure AD Hybrid Active Directory 00:03:00 Deploying DC to Azure 00:04:00 Directory Synchronization Pre Reqs 00:05:00 Installing and Configuring Azure AD Connect 00:13:00 Modifying Directory Sync 00:05:00 Active Directory Federation Services Understanding Identity Federation 00:02:00 ADFS Authentication with Online Services 00:03:00 ADFS Pre-reqs 00:03:00 Installing ADFS 00:04:00 Installing ADFS Proxy 00:06:00 Converting Domains to Federated 00:05:00 Pass-through Authentication Pass-through Authentication 00:02:00 Seamless Single Sign-on 00:01:00 Configuring Pass-Through 00:04:00 Conclusion Course Recap 00:06:00 Course Certification

Azure - Azure Active Directory
Delivered Online On Demand1 hour 52 minutes
£25

Certificate in Microsoft Access 2007 for Beginners

By iStudy UK

Welcome to Microsoft Access 2007 course for beginners. Microsoft Access is the word most popular database software designed by Microsoft. This course is designed for beginners who are targeting the basics of Microsoft 2007. Learn about the basic tools of Microsoft Access. Explore the basic functions and features of Microsoft Access. Study how to create simple databases from scratch. Learning about Microsoft Access 2007 will help you excel within your professional lives.This course will provide you with the necessary skills, knowledge and information of Microsoft Access 2007.  Course Highlights Certificate in Microsoft Access 2007 for Beginners is an award winning and the best selling course that has been given the CPD Certification & IAO accreditation. It is the most suitable course anyone looking to work in this or relevant sector. It is considered one of the perfect courses in the UK that can help students/learners to get familiar with the topic and gain necessary skills to perform well in this field. We have packed Certificate in Microsoft Access 2007 for Beginners into 13 modules for teaching you everything you need to become successful in this profession. To provide you ease of access, this course is designed for both part-time and full-time students. You can become accredited in just 11 hours hours and it is also possible to study at your own pace. We have experienced tutors who will help you throughout the comprehensive syllabus of this course and answer all your queries through email. For further clarification, you will be able to recognize your qualification by checking the validity from our dedicated website. Why You Should Choose Certificate in Microsoft Access 2007 for Beginners Lifetime access to the course No hidden fees or exam charges CPD Accredited certification on successful completion Full Tutor support on weekdays (Monday - Friday) Efficient exam system, assessment and instant results Download Printable PDF certificate immediately after completion Obtain the original print copy of your certificate, dispatch the next working day for as little as £9. Improve your chance of gaining professional skills and better earning potential. Who is this Course for? Certificate in Microsoft Access 2007 for Beginners is CPD certified and IAO accredited. This makes it perfect for anyone trying to learn potential professional skills. As there is no experience and qualification required for this course, it is available for all students from any academic backgrounds. Requirements Our Certificate in Microsoft Access 2007 for Beginners is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path You will be ready to enter the relevant job market after completing this course. You will be able to gain necessary knowledge and skills required to succeed in this sector. All our Diplomas' are CPD and IAO accredited so you will be able to stand out in the crowd by adding our qualifications to your CV and Resume. Module One - Getting Started 00:30:00 Module Two - Opening Access 01:00:00 Module Three - Using the Access Interface 01:00:00 Module Four - Working with Database Objects 01:00:00 Module Five - Creating Tables 01:00:00 Module Six - Working with Tables 01:00:00 Module Seven - Creating Forms 01:00:00 Module Eight - Working with Forms 01:00:00 Module Nine - Creating Reports 01:00:00 Module Ten - Creating Queries 01:00:00 Module Eleven - Managing Your Database 01:00:00 Module Twelve - Wrapping Up 00:30:00 Activities Activities - Certificate in Microsoft Access 2007 for Beginners 00:00:00 Mock Exam Final Exam

Certificate in Microsoft Access 2007 for Beginners
Delivered Online On Demand11 hours
£25

DNA Center Assurance - DNACA (DNACA v1.3.3)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This course is intended for System and network engineers, technical architects and technical support personnel Overview Upon successful completion of this course, students will be able to install and operate a Cisco DNA Center (DNAC) This course will cover the basics of installing and operation of the Cisco DNA Center (DNAC). The Cisco DNAC is a stand-alone product that provides a single dashboard for every fundamental management task to simplify running an enterprise network. The DNAC is the management piece of the Software Defined Access (SDA) solution. Intent-based Networking overview DNA Center overview. DNA Center as a Platform. DNA Center Architecture & Design. DNA Center Installation DNA Center/Identity Services Engine (ISE) Integration ISE Integration configuration in DNA Center. DNA - Global - Add servers (e.g. ISE server(s)). DNA Center integration configuration in ISE. Approve pxGrid in ISE.Verify DNA/ISE integration DNA Center - Device Inventory Add networks devices to the DNA Center device inventory. Verify DNA Center Inventory configuration. DNA Center - Design - Network Hierarchy. Verify DNA Center - design configuration DNA Center - Design - Software Image Management (SWIM) Review SWIM image repository listing. Create golden software image & role. Verify golden software image creation DNA Center - Design ? Templates and Policies Templates ? Apache Velocity Engine. Command Runner. Policies: Group-Based, Application,Traffic Copy, IP-Based DNA Center - Provision Configuration Add devices to newly created sites/locations. Plug and Play (PnP). Verify DNA Center - provision configuration. DNA Center - Assurance Collection. DNA Center ? Administration

DNA Center Assurance - DNACA (DNACA v1.3.3)
Delivered OnlineFlexible Dates
Price on Enquiry

CUIC11.6EU-Cisco Unified Intelligence Center 11.6 for End Users

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for The primary audiences for the course are as follows: Cisco customers ? Contact Center Management, Contact Center Supervisors and Customer technical personnel Cisco technology partners Cisco employees Overview Upon completing this course, the learner will be able to meet these overall objectives: Provide a comprehensive overview of Cisco Unified Intelligence Center Describe reporting concepts and capabilities and features of Cisco Unified Intelligence Center reports Provide a detailed description and labs of how to modify reports from normal data sources (Cisco Unified CCE and Cisco Unified CVP) by customizing reports using various methods. (i.e. creating thresholds, show/hide columns, charts and more) The Cisco Unified Intelligence Center 11.6 for End Users (CUIC11.6EU v1.1) course is a two-day instructor-led training (ILT) course. Cisco Unified Intelligence Center is a comprehensive, end-to-end reporting solution, designed to make the task of creating and modifying reports easier on the customer and, at the same time, to present a consistent user interface and a common tool to access varied data across multiple Cisco product families. Cisco Unified Intelligence Center Overview Introducing Cisco Unified Intelligence Center What Contact Center products use CUIC for reporting Cisco Unified Intelligence Center Administration and Security The End User and CUIC Security Running and Modifying CUIC Reports Running Cisco Unified Intelligence Center Reports Using Permalinks Help Dashboards Modifying a CUIC Stock Report Cisco Unified Intelligence Center Dashboards Understanding Cisco Unified CCE Key Concepts Creating a New Cisco Unified Intelligence Center Report

CUIC11.6EU-Cisco Unified Intelligence Center 11.6 for End Users
Delivered OnlineFlexible Dates
Price on Enquiry

High Availability for the LAMP Stack Level 2

By Course Cloud

Course Overview The High Availability for the LAMP Stack Level 2 course is an in-depth training course, designed to provide learners with the practical skills and knowledge to build and deploy a highly available LAMP stack. Through step-by-step guidance, you will learn how to eliminate single points of failure and increase uptime for their Linux, Apache, MySQL, & PHP-based web sites and apps. This practical training course is ideal for those who already have some experience working at the Linux command line. You will learn everything you need to know to handle unexpected surges of traffic, scale without downtime, and survive unexpected points of failure. The concepts and techniques introduced in this course can be applied in a variety of situations, equipping you with in-demand industry knowledge.  Enrol today and learn to ensure service availability for Linux, Apache, and more. This best selling High Availability for the LAMP Stack Level 2 has been developed by industry professionals and has already been completed by hundreds of satisfied students. This in-depth High Availability for the LAMP Stack Level 2 is suitable for anyone who wants to build their professional skill set and improve their expert knowledge. The High Availability for the LAMP Stack Level 2 is CPD-accredited, so you can be confident you're completing a quality training course will boost your CV and enhance your career potential. The High Availability for the LAMP Stack Level 2 is made up of several information-packed modules which break down each topic into bite-sized chunks to ensure you understand and retain everything you learn. After successfully completing the High Availability for the LAMP Stack Level 2, you will be awarded a certificate of completion as proof of your new skills. If you are looking to pursue a new career and want to build your professional skills to excel in your chosen field, the certificate of completion from the High Availability for the LAMP Stack Level 2 will help you stand out from the crowd. You can also validate your certification on our website. We know that you are busy and that time is precious, so we have designed the High Availability for the LAMP Stack Level 2 to be completed at your own pace, whether that's part-time or full-time. Get full course access upon registration and access the course materials from anywhere in the world, at any time, from any internet-enabled device.  Our experienced tutors are here to support you through the entire learning process and answer any queries you may have via email.

High Availability for the LAMP Stack Level 2
Delivered Online On Demand
£25

SQL NoSQL Big Data and Hadoop

4.7(160)

By Janets

Register on the SQL NoSQL Big Data and Hadoop today and build the experience, skills and knowledge you need to enhance your professional development and work towards your dream job. Study this course through online learning and take the first steps towards a long-term career. The course consists of a number of easy to digest, in-depth modules, designed to provide you with a detailed, expert level of knowledge. Learn through a mixture of instructional video lessons and online study materials. Receive online tutor support as you study the course, to ensure you are supported every step of the way. Get a digital certificate as a proof of your course completion. The SQL NoSQL Big Data and Hadoop is incredibly great value and allows you to study at your own pace. Access the course modules from any internet-enabled device, including computers, tablet, and smartphones. The course is designed to increase your employability and equip you with everything you need to be a success. Enrol on the now and start learning instantly! What You Get With The SQL NoSQL Big Data and Hadoop Receive a e-certificate upon successful completion of the course Get taught by experienced, professional instructors Study at a time and pace that suits your learning style Get instant feedback on assessments 24/7 help and advice via email or live chat Get full tutor support on weekdays (Monday to Friday) Course Design The course is delivered through our online learning platform, accessible through any internet-connected device. There are no formal deadlines or teaching schedules, meaning you are free to study the course at your own pace. You are taught through a combination of Video lessons Online study materials Certification Upon successful completion of the course, you will be able to obtain your course completion e-certificate free of cost. Print copy by post is also available at an additional cost of £9.99 and PDF Certificate at £4.99. Who Is This Course For: The course is ideal for those who already work in this sector or are an aspiring professional. This course is designed to enhance your expertise and boost your CV. Learn key skills and gain a professional qualification to prove your newly-acquired knowledge. Requirements: The online training is open to all students and has no formal entry requirements. To study the SQL NoSQL Big Data and Hadoop, all your need is a passion for learning, a good understanding of English, numeracy, and IT skills. You must also be over the age of 16. Course Content Section 01: Introduction Introduction 00:07:00 Building a Data-driven Organization - Introduction 00:04:00 Data Engineering 00:06:00 Learning Environment & Course Material 00:04:00 Movielens Dataset 00:03:00 Section 02: Relational Database Systems Introduction to Relational Databases 00:09:00 SQL 00:05:00 Movielens Relational Model 00:15:00 Movielens Relational Model: Normalization vs Denormalization 00:16:00 MySQL 00:05:00 Movielens in MySQL: Database import 00:06:00 OLTP in RDBMS: CRUD Applications 00:17:00 Indexes 00:16:00 Data Warehousing 00:15:00 Analytical Processing 00:17:00 Transaction Logs 00:06:00 Relational Databases - Wrap Up 00:03:00 Section 03: Database Classification Distributed Databases 00:07:00 CAP Theorem 00:10:00 BASE 00:07:00 Other Classifications 00:07:00 Section 04: Key-Value Store Introduction to KV Stores 00:02:00 Redis 00:04:00 Install Redis 00:07:00 Time Complexity of Algorithm 00:05:00 Data Structures in Redis : Key & String 00:20:00 Data Structures in Redis II : Hash & List 00:18:00 Data structures in Redis III : Set & Sorted Set 00:21:00 Data structures in Redis IV : Geo & HyperLogLog 00:11:00 Data structures in Redis V : Pubsub & Transaction 00:08:00 Modelling Movielens in Redis 00:11:00 Redis Example in Application 00:29:00 KV Stores: Wrap Up 00:02:00 Section 05: Document-Oriented Databases Introduction to Document-Oriented Databases 00:05:00 MongoDB 00:04:00 MongoDB Installation 00:02:00 Movielens in MongoDB 00:13:00 Movielens in MongoDB: Normalization vs Denormalization 00:11:00 Movielens in MongoDB: Implementation 00:10:00 CRUD Operations in MongoDB 00:13:00 Indexes 00:16:00 MongoDB Aggregation Query - MapReduce function 00:09:00 MongoDB Aggregation Query - Aggregation Framework 00:16:00 Demo: MySQL vs MongoDB. Modeling with Spark 00:02:00 Document Stores: Wrap Up 00:03:00 Section 06: Search Engines Introduction to Search Engine Stores 00:05:00 Elasticsearch 00:09:00 Basic Terms Concepts and Description 00:13:00 Movielens in Elastisearch 00:12:00 CRUD in Elasticsearch 00:15:00 Search Queries in Elasticsearch 00:23:00 Aggregation Queries in Elasticsearch 00:23:00 The Elastic Stack (ELK) 00:12:00 Use case: UFO Sighting in ElasticSearch 00:29:00 Search Engines: Wrap Up 00:04:00 Section 07: Wide Column Store Introduction to Columnar databases 00:06:00 HBase 00:07:00 HBase Architecture 00:09:00 HBase Installation 00:09:00 Apache Zookeeper 00:06:00 Movielens Data in HBase 00:17:00 Performing CRUD in HBase 00:24:00 SQL on HBase - Apache Phoenix 00:14:00 SQL on HBase - Apache Phoenix - Movielens 00:10:00 Demo : GeoLife GPS Trajectories 00:02:00 Wide Column Store: Wrap Up 00:04:00 Section 08: Time Series Databases Introduction to Time Series 00:09:00 InfluxDB 00:03:00 InfluxDB Installation 00:07:00 InfluxDB Data Model 00:07:00 Data manipulation in InfluxDB 00:17:00 TICK Stack I 00:12:00 TICK Stack II 00:23:00 Time Series Databases: Wrap Up 00:04:00 Section 09: Graph Databases Introduction to Graph Databases 00:05:00 Modelling in Graph 00:14:00 Modelling Movielens as a Graph 00:10:00 Neo4J 00:04:00 Neo4J installation 00:08:00 Cypher 00:12:00 Cypher II 00:19:00 Movielens in Neo4J: Data Import 00:17:00 Movielens in Neo4J: Spring Application 00:12:00 Data Analysis in Graph Databases 00:05:00 Examples of Graph Algorithms in Neo4J 00:18:00 Graph Databases: Wrap Up 00:07:00 Section 10: Hadoop Platform Introduction to Big Data With Apache Hadoop 00:06:00 Big Data Storage in Hadoop (HDFS) 00:16:00 Big Data Processing : YARN 00:11:00 Installation 00:13:00 Data Processing in Hadoop (MapReduce) 00:14:00 Examples in MapReduce 00:25:00 Data Processing in Hadoop (Pig) 00:12:00 Examples in Pig 00:21:00 Data Processing in Hadoop (Spark) 00:23:00 Examples in Spark 00:23:00 Data Analytics with Apache Spark 00:09:00 Data Compression 00:06:00 Data serialization and storage formats 00:20:00 Hadoop: Wrap Up 00:07:00 Section 11: Big Data SQL Engines Introduction Big Data SQL Engines 00:03:00 Apache Hive 00:10:00 Apache Hive : Demonstration 00:20:00 MPP SQL-on-Hadoop: Introduction 00:03:00 Impala 00:06:00 Impala : Demonstration 00:18:00 PrestoDB 00:13:00 PrestoDB : Demonstration 00:14:00 SQL-on-Hadoop: Wrap Up 00:02:00 Section 12: Distributed Commit Log Data Architectures 00:05:00 Introduction to Distributed Commit Logs 00:07:00 Apache Kafka 00:03:00 Confluent Platform Installation 00:10:00 Data Modeling in Kafka I 00:13:00 Data Modeling in Kafka II 00:15:00 Data Generation for Testing 00:09:00 Use case: Toll fee Collection 00:04:00 Stream processing 00:11:00 Stream Processing II with Stream + Connect APIs 00:19:00 Example: Kafka Streams 00:15:00 KSQL : Streaming Processing in SQL 00:04:00 KSQL: Example 00:14:00 Demonstration: NYC Taxi and Fares 00:01:00 Streaming: Wrap Up 00:02:00 Section 13: Summary Database Polyglot 00:04:00 Extending your knowledge 00:08:00 Data Visualization 00:11:00 Building a Data-driven Organization - Conclusion 00:07:00 Conclusion 00:03:00 Resources Resources - SQL NoSQL Big Data And Hadoop 00:00:00

SQL NoSQL Big Data and Hadoop
Delivered Online On Demand22 hours 33 minutes
£25