Duration 2 Days 12 CPD hours This course is intended for IBM SPSS Statistics users who want to familiarize themselves with the statistical capabilities of IBM SPSS StatisticsBase. Anyone who wants to refresh their knowledge and statistical experience. Overview Introduction to statistical analysis Describing individual variables Testing hypotheses Testing hypotheses on individual variables Testing on the relationship between categorical variables Testing on the difference between two group means Testing on differences between more than two group means Testing on the relationship between scale variables Predicting a scale variable: Regression Introduction to Bayesian statistics Overview of multivariate procedures This course provides an application-oriented introduction to the statistical component of IBM SPSS Statistics. Students will review several statistical techniques and discuss situations in which they would use each technique, how to set up the analysis, and how to interpret the results. This includes a broad range of techniques for exploring and summarizing data, as well as investigating and testing relationships. Students will gain an understanding of when and why to use these various techniques and how to apply them with confidence, interpret their output, and graphically display the results. Introduction to statistical analysis Identify the steps in the research process Identify measurement levels Describing individual variables Chart individual variables Summarize individual variables Identify the normal distributionIdentify standardized scores Testing hypotheses Principles of statistical testing One-sided versus two-sided testingType I, type II errors and power Testing hypotheses on individual variables Identify population parameters and sample statistics Examine the distribution of the sample mean Test a hypothesis on the population mean Construct confidence intervals Tests on a single variable Testing on the relationship between categorical variables Chart the relationship Describe the relationship Test the hypothesis of independence Assumptions Identify differences between the groups Measure the strength of the association Testing on the difference between two group meansChart the relationship Describe the relationship Test the hypothesis of two equal group means Assumptions Testing on differences between more than two group means Chart the relationship Describe the relationship Test the hypothesis of all group means being equal Assumptions Identify differences between the group means Testing on the relationship between scale variables Chart the relationship Describe the relationship Test the hypothesis of independence Assumptions Treatment of missing values Predicting a scale variable: Regression Explain linear regression Identify unstandardized and standardized coefficients Assess the fit Examine residuals Include 0-1 independent variables Include categorical independent variables Introduction to Bayesian statistics Bayesian statistics and classical test theory The Bayesian approach Evaluate a null hypothesis Overview of Bayesian procedures in IBM SPSS Statistics Overview of multivariate procedures Overview of supervised models Overview of models to create natural groupings
Duration 3 Days 18 CPD hours This course is intended for This course is intended for the following technical professionals who need to use advanced features of fiber optics technology: System installers System integrators System administrators Network administrators Solutions designers Overview After taking this course, you should be able to: Perform the ONS 15454 MSTP node turn-up procedure Describe first generation mesh topologies Describe the Optical Channel Network Connection (OCHNC) prerequisite requirements for provisioning circuits in an ONS 15454 MSTP network Describe the ONS MSTP advanced protocols Describe the OCHNC circuit provisioning for Single Module (SM) Reconfigurable Optical Add-Drop Multiplexer (ROADM) rings Describe the Any-Rate Muxponder Crossponder (AR MXP/XP) cards Describe how the Pseudo Command Line can be used to configure muxponder cards Identify the advantages G.709 encapsulation brings to optical transponder cards Install and provision the Any Rate cards Describe the 100-Gbps and 200-Gbps cards Describe the NCS 2000 400-Gbps Xponder line card and how it is configured Describe the SM ROADM (SMR)-based configurations Describe the 10-Gbps transponder and muxponder cards List the 10GE_XP and GE_XP card options Describe ingress policing and basic egress queuing strategies, and implement the customer QoS scheme into the ONS 15454 crossponder network Identify the principles of Ethernet related to the operation of Cisco optical networking products Configure the 10GE_XP/XPE and GE_XP/XPE cards, install Layer 1 circuits, and read the performance counters for Layer 1 Gigabit Ethernet circuits Turn up an encrypted network and test to ensure that information being passed is secure Add a node to an existing DWDM ring Describe problems with interconnecting circuits between rings, the ONS 15454 MSTP 80-channel manual Multiring feature, and hardware components Describe the ONS 15454 MSTP Troubleshooting Guide The Cisco Optical Technology Advanced (OPT300) v2.0 course gives you the skills you need to deploy advanced features of the Cisco© Optical Networking Services (ONS) 15454 Multiservice Transport Platform (MSTP) and Cisco Network Convergence System (NCS) 2000 Series. In this course you?ll learn to how to use the Cisco Transport Planner Design Tool to create network topologies and advanced network topologies. You will learn how to use advanced Dense Wavelength Division Multiplexing (DWDM) features such as G.709 encapsulation, generic framing protocol G.7041, Layer 1 circuits, Quality of Service (QoS), crossponder networks using T1 over Ethernet, and encryption. Course Outline Cisco Transport Planner Design Tool First-Generation Mesh Topologies Ochnc In A Mesh Network Advanced Protocols Any Rate Muxponder And Crossponders 100-Gbps And 200-Gbps Transponders And Muxponders Cisco Ncs 2000 400-Gbps Xponder Line Card Cisco 10G Web Security Essentials (Wse) Network Encryption Card Adding A New Location With Cisco Transport Planner (Ctp) And Cisco Transport Controller (Ctc) Crossponders And Layer 1 Networks Crossponders And Layer 2 Networks Troubleshooting
Duration 4 Days 24 CPD hours This course is intended for Application Consultants, Developers, System Administrators, and System Architects Overview Understand the need for an enterprise portalLog on to, navigate, and personalize the portalDescribe the components of SAP Enterprise PortalBuild-up a portal navigation structureAdapt the portal user interface to company specificationsExplain and use the main functions of the SAP Enterprise Portal, Knowledge Management and CollaborationExplain and use the community features of the portal add-ons Forums and WikisExplain and use the SAP Fiori Launchpad on Portal' In this course, students will gain knowledge of the basic fundamentals surrounding the SAP Enterprise Portal. Enterprise Portal Explaining Business Motivations for Portals Describing SAP NetWeaver Explaining the Basics of SAP Enterprise Portal The End User's Perspective Logging On and Navigating in SAP Enterprise Portal Personalizing SAP Enterprise Portal Technical Infrastructure Determining System Requirements Outlining SAP Enterprise Portal's Architecture Portal Platform Content Explaining the Object Model for Portal Content Managing iViews Managing Portal Pages Managing Worksets and Portal Roles Explaining Business Packages Outlining Portal Content Development Tools Translating Portal Content Look and Feel of the Portal Managing Portal Themes Managing Framework Pages Managing Portal Desktops Managing Portal Rules (Rule Collections) Security Aspects Identifying Security Aspects Managing Users and Authentication Options Describing Authorization Concepts Describing Single Sign-On (SSO) Evaluating Network Security Knowledge Management (KM) Outlining Knowledge Management (KM) Describing Content Management (CM) Functions Using Web Page Composer (WPC) Describing Search and Classification (TREX) Enterprise Workspaces Explaining Enterprise Workspaces Managing Personal Workspaces Managing Shared Workspaces Collaboration Outlining Collaboration Functions Using Forums Using Wikis Fiori Launchpad on the Portal Outlining SAP Fiori Launchpad on Portal Additional course details: Nexus Humans SAPEP SAP Enterprise Portal - Fundamentals training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the SAPEP SAP Enterprise Portal - Fundamentals course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for This course is introductory-level, but technical in nature. In order to participate in the hands-pon labs you should have a basic understanding of database principles, basic scripting skills (in relation to Oracle) and basic analytics skills. Overview This course is approximately 50% hands-on, combining expert lecture, real-world demonstrations and group discussions with machine-based practical labs and exercises. Working in a hands-on learning environment led by our Oracle Certified expert facilitator, students will learn how to: Core concepts of regular PDBs Creating a CDB, and then using different methods to create PDBs. How to start and shut down a CDB and how to open and close a PDB. Security aspects in CDBs and PDBs in various areas like privileges and roles, lockdown profiles, auditing, Database Vault, and encryption. Availability through backup, duplicate, recovery, and flashback topics and then performance, monitoring, and resources allocation management in CDBs and PDBs. How you can move data from a non-CDB environment to a PDB. How to move data between PDBs by using utilities such as the export and import features of Oracle Data Pump, SQL*Loader, external tables, and Oracle Recovery Manager. The multitenant architecture enables you to have many pluggable databases inside a single Oracle Database instance. Oracle Database 19c Multitenant Architecture is a three-day hands on course that explores the multitenant architecture and the different types of pluggable databases (PDBs) in multitenant container databases (CDBs). Multitenant Architecture CDB Basics CDB and Regular PDBs Application PDBs and Application Installation PDB Creation PDB Creation CDB and PDB Management Storage Security Security Backup and Duplicate Recovery and Flashback Performance Resources Allocation Data Movement Data Movement Upgrade Methods Miscellaneous Additional course details: Nexus Humans Oracle Database 19c Multitenant Architecture (TTOR20719) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Oracle Database 19c Multitenant Architecture (TTOR20719) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for This course is introductory-level, but technical in nature. In order to participate in the hands-pon labs you should have a basic understanding of database principles, basic scripting skills (in relation to Oracle) and basic analytics skills. Overview This course is approximately 50% hands-on lab to lecture ratio, combining engaging expert lessons, demos and group discussions with real-world, skills-focused machine-based labs and exercises. Working in a hands-on learning environment led by our expert facilitator, you'll explore: Core concepts of regular PDBs Creating a CDB, and then using different methods to create PDBs. How to start and shut down a CDB and how to open and close a PDB. Security aspects in CDBs and PDBs in various areas like privileges and roles, lockdown profiles, auditing, Database Vault, and encryption. Availability through backup, duplicate, recovery, and flashback topics and then performance, monitoring, and resources allocation management in CDBs and PDBs. How you can move data from a non-CDB environment to a PDB. How to move data between PDBs by using utilities such as the export and import features of Oracle Data Pump, SQL*Loader, external tables, and Oracle Recovery Manager. The multitenant architecture enables you to have many pluggable databases inside a single Oracle Database instance. Oracle Database 19c Multitenant Architecture is a three-day hands-on course that explores the multitenant architecture and the different types of pluggable databases (PDBs) in multitenant container databases (CDBs). Multitenant Architecture CDB Basics CDB and Regular PDBs Application PDBs and Application Installation PDB Creation PDB Creation CDB and PDB Management Storage Security Security Backup and Duplicate Recovery and Flashback Performance Resources Allocation Data Movement Data Movement Upgrade Methods Miscellaneous Additional course details: Nexus Humans Oracle 19c Database Multitenant Architecture (TTOR20719) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Oracle 19c Database Multitenant Architecture (TTOR20719) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for The primary audience for this course is as follows: System administrators Technical solutions architects Systems integrators Channel partners Value-added resellers Customer sales engineers DevOps engineers Sales engineers Systems engineers Technical solutions architects Overview Upon completing this course, the learner will be able to meet these overall objectives: Understand Cisco UCS Management in Cisco Intersight Describe the Cisco UCS Platform including Cisco X-Series Understand Cisco Intersight Workload Optimizer Explain Kubernetes Orchestration with Cisco Intersight Kubernetes Service (IKS) and Cisco UCS Perform Automation Using Cisco Intersight Create Intersight Elements Using Terraform Manage Intersight Using the API Cisco Intersight Overview (DCISO) is a 3-day instructor led course that builds your experience with the administration of Cisco Unified Computing System (UCS) X-Series servers, including using Cisco Intersight for UCS management. This course covers architecture, configuration, and operation of Cisco Intersight©, and is designed to serve the needs of engineers seeking to understand the capabilities of Cisco Intersight for managing data centers from a single management platform.This course will help you:Use SaaS or on-prem version of Cisco Intersight to enable IT organizations to analyze, simplify, and automate their environments in more advanced ways than the prior generations of toolsGain hands-on experience using Cisco IntersightUnderstand the X-Series, B-Series, and C-Series product line similarities and differencesDescribe Cisco Intersight and how it can be used to manage UCS and Cisco Hyperflex©Understand the process for upgrading firmware with Cisco IntersightAdministering server profiles, pools, and policies with Cisco IntersightDescribe how to get started with Cisco Intersight programmability Course Outline Describing Cisco UCS Management in Cisco Intersight Describing the Cisco UCS Platform Describing Cisco Intersight Workloads Describing Automation Options Using Cisco Intersight Additional course details: Nexus Humans Cisco Intersight Overview (DCISO) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Intersight Overview (DCISO) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for This course is intended for Ethical Hackers, Penetration Testers, Network Server Administrators, Firewall Administrators, Security Testers, System Administrators and Risk Assessment Professionals, Cybersecurity Forensic Analyst, Cyberthreat Analyst, Cloud Security, Analyst Information Security Consultant, Application Security Analyst, Cybersecurity Assurance Engineer, Security Operations Center (SOC) Analyst, Technical Operations Network Engineer, Information Security Engineer, Network Security Penetration Tester, Network Security Engineer, Information Security Architect. Overview Upon successful completion of this course, students will master their Penetration Testing skills, perform the repeatable methodology, become committed to the code of ethics, and present analyzed results through structured reports. The main course outcomes include: 100% mapped with the NICE framework. Maps to the job role of a Penetration Tester and security analyst, based on major job portals. 100% methodology-based Penetration Testing program. Provides strong reporting writing guidance. Blended with both manual and automated Penetration Testing approaches. Gives a real-world experience through an Advanced Penetration Testing Range. Designed based on the most common Penetration Testing services offered by the best service providers in the market. Offers standard templates that can help during a Penetration test. This is a multidisciplinary course with extensive hands-on training in a wide range of crucial skills, including advanced Windows attacks, Internet of Things (IoT) and Operational Technology (OT) systems, filtered network bypass techniques, exploit writing, single and double pivoting, advanced privilege escalation, and binary exploitation. Course Outline Introduction to Penetration Testing Penetration Testing Scoping and Engagement Open Source Intelligence (OSINT) Social Engineering Penetration Testing Network Penetration Testing ? External Network Penetration Testing ? Internal Network Penetration Testing - Perimeter Devices Web Application Penetration Testing Wireless Penetration Testing IoT Penetration Testing OT/SCADA Penetration Testing Cloud Penetration Testing Binary Analysis and Exploitation Report Writing and Post-Testing Actions Additional course details: Nexus Humans Certified Penetration Testing Professional (CPENT) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Certified Penetration Testing Professional (CPENT) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for Entry- to mid-level network engineers Network administrators Network support technicians Help desk technicians Overview After taking this training, you should be able to: Illustrate the hierarchical network design model and architecture using the access, distribution, and core layers Compare and contrast the various hardware and software switching mechanisms and operation while defining the Ternary Content Addressable Memory (TCAM) and Content Addressable Memory (CAM) along with process switching, fast switching, and Cisco Express Forwarding concepts Troubleshoot Layer 2 connectivity using VLANs and trunking Implement redundant switched networks using Spanning Tree Protocol Troubleshoot link aggregation using Etherchannel Describe the features, metrics, and path selection concepts of Enhanced Interior Gateway Routing Protocol (EIGRP) Implement and optimize Open Shortest Path First (OSPF)v2 and OSPFv3, including adjacencies, packet types and areas, summarization, and route filtering for IPv4 and IPv6 Implement External Border Gateway Protocol (EBGP) interdomain routing, path selection, and single and dual-homed networking Implement network redundancy using protocols such as Hot Standby Routing Protocol (HSRP) and Virtual Router Redundancy Protocol (VRRP) Implement internet connectivity within Enterprise using static and dynamic Network Address Translation (NAT) Describe the virtualization technology of servers, switches, and the various network devices and components Implement overlay technologies such as Virtual Routing and Forwarding (VRF), Generic Routing Encapsulation (GRE), VPN, and Location Identifier Separation Protocol (LISP) Describe the components and concepts of wireless networking, including Radio Frequency (RF) and antenna characteristics, and define the specific wireless standards Describe the various wireless deployment models available, including autonomous Access Point (AP) deployments and cloud-based designs within the centralized Cisco Wireless LAN Controller (WLC) architecture Describe wireless roaming and location services The Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR) v1.3 training gives you the knowledge and skills needed to install, configure, operate, and troubleshoot an enterprise network and introduces you to overlay network design by using SD-Access and SD-WAN solutions. You?ll also learn to understand and implement security principles and automation and programmability within an enterprise network. Course Outline Examining Cisco Enterprise Network Architecture Exploring Cisco Switching Paths Implementing Campus LAN Connectivity Building Redundant Switched Topology Implementing Layer 2 Port Aggregation Understanding EIGRP Implementing OSPF Optimizing OSPF Exploring EBGP Implementing Network Redundancy Implementing NAT Introducing Virtualization Protocols and Techniques Understanding Virtual Private Networks and Interfaces Understanding Wireless Principles Examining Wireless Deployment Options Understanding Wireless Roaming and Location Services Examining Wireless AP Operation Implementing Wireless Client Authentication Troubleshooting Wireless Client Connectivity Implementing Network Services Using Network Analysis Tools Implementing Infrastructure Security Implementing Secure Access Control Discovering the Basics of Python Programming Discovering Network Programmability Protocols Implementing Layer 2 Port Aggregation Discovering Multicast Protocols Understanding QoS Exploring Enterprise Network Security Architecture Exploring Automation and Assurance Using Cisco DNA Center Examining the Cisco SD-Access Solution Understanding the Working Principles of the Cisco SD-WAN Solution
Duration 1 Days 6 CPD hours This course is intended for Security Engineers Network Engineers Support staff Overview This course is intended to provide an understanding of Palo Alto Networks Next-Generation firewall technologies enable the student to perform a basic installation of Palo Alto Networks Next-Generation firewalls. Upon completion of this course, students will be able to: Explain the features and advantages of the Palo Alto Networks next-generation firewall architecture Understand the capabilities of App-ID, Content-ID, and User-ID Perform the basic configuration of the firewall including: Interfaces and virtual routers NAT Policies Security zones Objects Security policies Content security profiles View logs and basic reports This course was formerly named Palo Alto Networks Foundations of Next Generation Firewalls (EDU-150). ** Our foundation classes are just introductory trainings, NOT a full technical training. Your network has expanded beyond your organization\'s boundaries. Cloud locations and remote users (often using personal devices) have \'distributed\' the surface you need to both enable and protect.At the same time, the motivations of attackers and their sophistication have continued to evolve.Palo Alto Networks' next-generation firewalls are all based on a consistent Single-Pass Architecture, enabling security capability that is unique in the industry. This architecture is implemented in a portfolio of both physical and virtual appliances, designed to cover a range of performance and use case requirements.Features and management are consistent across the portfolio. Integration with GlobalProtect? mobile security service extends policy-based security to mobile devices (whether on-premises or remote). Integration with our threat intelligence services keeps information up to date for the firewall (e.g., URL categories, threat signatures). WildFire? cloud-based malware analysis environment integration supports a rapid \'feedback loop\' that enables the firewall to stop advanced threats throughout the attack lifecycle. Course Outline Module 0: Introduction Module 1: Platforms & Architecture Module 2: Getting Started Module 3: Basic Administration Module 4: Connectivity Module 5: Security Module 6: Logging & Reporting Additional course details: Nexus Humans Palo Alto Networks : Strata Foundations training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Palo Alto Networks : Strata Foundations course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for This course is designed for business professionals who leverage data to address business issues. The typical student in this course will have several years of experience with computing technology, including some aptitude in computer programming. However, there is not necessarily a single organizational role that this course targets. A prospective student might be a programmer looking to expand their knowledge of how to guide business decisions by collecting, wrangling, analyzing, and manipulating data through code; or a data analyst with a background in applied math and statistics who wants to take their skills to the next level; or any number of other data-driven situations. Ultimately, the target student is someone who wants to learn how to more effectively extract insights from their work and leverage that insight in addressing business issues, thereby bringing greater value to the business. Overview In this course, you will learn to: Use data science principles to address business issues. Apply the extract, transform, and load (ETL) process to prepare datasets. Use multiple techniques to analyze data and extract valuable insights. Design a machine learning approach to address business issues. Train, tune, and evaluate classification models. Train, tune, and evaluate regression and forecasting models. Train, tune, and evaluate clustering models. Finalize a data science project by presenting models to an audience, putting models into production, and monitoring model performance. For a business to thrive in our data-driven world, it must treat data as one of its most important assets. Data is crucial for understanding where the business is and where it's headed. Not only can data reveal insights, it can also inform?by guiding decisions and influencing day-to-day operations. This calls for a robust workforce of professionals who can analyze, understand, manipulate, and present data within an effective and repeatable process framework. In other words, the business world needs data science practitioners. This course will enable you to bring value to the business by putting data science concepts into practice Addressing Business Issues with Data Science Topic A: Initiate a Data Science Project Topic B: Formulate a Data Science Problem Extracting, Transforming, and Loading Data Topic A: Extract Data Topic B: Transform Data Topic C: Load Data Analyzing Data Topic A: Examine Data Topic B: Explore the Underlying Distribution of Data Topic C: Use Visualizations to Analyze Data Topic D: Preprocess Data Designing a Machine Learning Approach Topic A: Identify Machine Learning Concepts Topic B: Test a Hypothesis Developing Classification Models Topic A: Train and Tune Classification Models Topic B: Evaluate Classification Models Developing Regression Models Topic A: Train and Tune Regression Models Topic B: Evaluate Regression Models Developing Clustering Models Topic A: Train and Tune Clustering Models Topic B: Evaluate Clustering Models Finalizing a Data Science Project Topic A: Communicate Results to Stakeholders Topic B: Demonstrate Models in a Web App Topic C: Implement and Test Production Pipelines