Program Offerings Expertise - List 1

Power BI (50+)?? Bins, Change the Data type of a Column, Combine Multiple Tables, Clusters, Enter data or Copy & Paste data from Clipboard, Format Dates, Groups, Hierarchies, Joins, Pivot Table, Query Groups, Reorder or Remove Columns, Rename Column Names, Rename Table Names, Split Columns, Unpivot Table, Area Chart, Bar Chart, Card, Clustered Bar Chart, Clustered Column Chart, Column Chart, Donut Chart, Funnel Chart, Heat Map, Line Chart, Clustered Column and Line, Line and Stacked Column, Matrix, Multi-Row Card, Pie Chart, Ribbon Chart, Stacked Area, Scatter Chart, Stacked Bar Chart, Stacked Column, Table, Tree Map, Waterfall Chart, 100% Stacked Bar, 100% Stacked Column, Map, Filled Map, Format Area Chart, Format Bar Chart, Formatting Card, Format Clustered Bar, Format Cluster Column, Formatting Column, Format Donut Chart, Format Funnel Chart, Formatting Line Chart, Format Line & Clustered Column, Format Line & Stacked Column, Formatting Matrix, Format Multi-Row Card, Format Pie Chart, Formatting Ribbon, Format Stacked Area, Formatting Scatter, Format Stacked Bar, Format Stacked Column, Formatting Table, Format Tree Map, Formatting Waterfall, R Script, Format Map, Format Filled Map, Slicer, Basic Filters, Advanced Filters, Top N Filters, Filters on Measures, Page Level Filters, Report Level Filters, Drill through Filters, Register to Pro Service, Dashboard Introduction, Connect Desktop with Service or Pro, Publish Desktop Reports, Create a Workspace, Create a Dashboard, Favorites, Dashboard Actions, Add Reports to a Dashboard, Add Title to Dashboard, How to Add Image to Dashboard, Add Video to Dashboard, Add Web Content to Dashboard, Dashboard Settings, Delete a Dashboard, Pin Report to a Dashboard, Creating a Report, Creating a Report using Excel Data, Upload Excel Files to Dashboard, Upload Workbook, Pin Workbook to Dashboard, Rename a Dataset, Rename a Report, Get Insights of a Dataset, Get Insights of a Report, Share a Dashboard, Share a Report, Sharing Workspace, Publish App, View Published App, Edit App, Aggregate Functions, Date Functions, Logical Functions, Math Functions, String Functions, Trigonometric Functions

Programming Language:

Python?? Introduction to Data; Types & Operators; Control Statements; Loops (While and For); Advanced Looping; Functions 1; Functions 2; Lists; List Slicing and List 2D; Strings; Tuples and Sets; Dictionaries

Data Structures and

Algorithms?????????? Arrays Bit Manipulation Recursion Backtracking Maths for Problem-Solving OOPS Basics Sorting Hashing Searching (Binary Search) Two Pointers Linked Lists Stacks Queues Binary Tree BST

Big ID??? BigID Architecture, Scanners Architecture, Data Discovery - Topic, Registering Data Sources, Multiple supported ways to register., Networking for the data sources configuration., Classifications., Scan Profiles., Scanning, Data Catalog, Browse Data Catalog, Enriching Data Assets, Glossary, Tags/Labels etc., Security Posture, Reporting, Settings

Common Workflow Language????? Quick Start;? Prerequisites;? Basic Concepts;? YAML Guide;? Command Line Tool;? Expressions;? Inputs;? Additional Arguments and Parameters;? Parameter References;? Outputs;? Custom Types;? Expression Tool;? Workflows;? Operations;? Environment Variables;? Using Containers;? Creating Files at Runtime;? Staging Input Files;? Best Practices;? File Formats;? Metadata and Authorship;? Specifying Software Requirements;? Troubleshooting; “Hello World”;? Installing a CWL Runner;? Running “Hello World”;? Operating System;? CWL Runner;? Text Editor;? Docker;? The CWL Specification;? Implementations;? Processes and Requirements;? FAIR Workflows;? Contents;? Key-Value Pairs;? Comments;? Maps;? Arrays;? JSON Style;? Reference;? Network Access;? Using External Libraries and Inline JavaScript Code with expressionLib;? Essential Input Parameters;? Array Inputs;? Inclusive and Exclusive Inputs;? Returning Output Files;? Capturing Standard Output;? Array Outputs;? Writing Workflows;? Nested Workflows; ?Scattering Steps;? Conditional Workflows;? Running Tools Inside Docker;? Sample Parameter Files;? Extended Example;? Run cwltool with cachedir

Atlan Data Governance?? Discovery & Catalog,? Your single source of truths,?? , Data Asset 360,? 360° visibility for every asset,?? , Column-Level Lineage,? Map your entire data landscape,?? , Active Data Governance,? Security at its simplest,?? , Embedded Collaboration,? Designed to help you flow,?? , Glossary,? Your business’ second brain,? PLATFORM,?? , Personalization & Curation,? Experience the Netflix for data,?? , Custom Metadata,? All your metadata in one home,?? , Active Metadata,? Active metadata use cases,?? , Intelligent Automation,? Automate your routine work,?? , Open APIs,? Open by default,?? , DIY Setup,? Blazing fast, no-code setup

Linux and Computer Systems?????? Linux Shell Scripting Computer Networks Operating Systems Process Management SQL

SANS ??? Security Essentials for Business Leaders and Managers

SEBL1_What and Why of Cybersecurity- In Progress

SEBL2_Cybersecurity Fundamentals- Not Started

SEBL3_Mitigating Insider Threat- Not Started

SEBL4_Compliance and Data Security Standards- Not Started

SEBL5_Third Party Risk Management- Not Started

SEBL6_Advanced Social Engineering- Not Started

SEBL7_Strong Authentication- Not Started

SEBL8_Reporting- Not Started

SEBL9_Artificial Intelligence AI- Not Started

SEBL10_Cloud Security- Not Started

Security Essentials for Business Leaders a

Aerospike??????????? Aerospike Database; Architecture; Hybrid storage; Data Storage; Distribution; Features; Operating; Monitoring Stack; Tools and Utilities; Platform Support; Aerospike Cloud; Aerospike Connect; Aerospike Graph; Aerospike Vector Search; Aerospike Kubernetes Operator; Data model; Primary index; Secondary index; Set index; Data distribution; Consistency; Resilience; Active-active deployments; Clustering; XDR; Rack awareness; User-Defined Functions; Client architecture; CAP and ACID; Connecting with a client application; Key-value Operations; Data Types; Queries; Expressions; Policies; Strong consistency; User-Defined Functions; Aggregation; Security; Planning; Installing; Configuring; Managing; Upgrading; Dashboards and alerts; Troubleshooting; Overview; OTel Aerospike Monitoring Stack; Installing Components Separately; Deploying on Kubernetes; Deploying in Docker; Configuring; Starting components; Dashboards and alerts; Release Notes; Installing; Docker; Tools Configuration; Aerospike Admin; Aerospike Benchmark Tool; AQL; Speeding Up Cold Starts; Data validation; Dynamic Runtime Config; Metrics Command Examples; Unique Data Agent; Secret Agent; Aerospike Loader; Aerospike Info; Data Browsing; Aerospike configuration tool; Backup and Restore; Log Latency Tool; Tools Release Notes; Getting Started; Develop; Understanding Metrics; Secondary Indexes; Aerospike SQL; Search; Streaming; Data Processing; Data Access; Architecture; Plan; Install; Operate; Develop

FortiAnalyzer Analyst????? l l l l l Features and concepts l Describe FortiAnalyzer concepts Logging l l Analyze logs Gather log statistics SOCeventsandincident management l l l Manageeventsandeventhandlers Manageincidents Explain SOCfeatures on FortiAnalyzer Reports l l Managereports Troubleshoot reports Playbooks l l Explain playbook components Create and manageplaybooks

FortiGate Administrator? l l l l l Deployment andsystemconfiguration l l l l Perform initial configuration Implement the Fortinet Security Fabric Configure an FGCPHAcluster Diagnose resource and connectivity problems Firewall policies and authentication l l l l Configure firewall policies Configure SNATandDNAToptionsinfirewall policies Configure different methods of firewall authentication Explain how to deploy and configure FSSO Content inspection l l l l l Explain and inspect encrypted traffic using certificates Identify FortiGate inspection modes and configure web filtering Configure application control to monitor and control network applications Configure antivirus scanning modes to neutralize malware threats Configure IPS to protect networks from threats and vulnerabilities Routing l l Configure and route packets using static routes Configure SD-WANtoloadbalancetraffic between multiple WAN links effectively VPN l l Configure and implement different SSL VPNs to provide secure access to your private network Implement a meshedorpartially redundant IPsec VPN

FortiEDR????????????? FortiEDR system l l l l l Explain FortiEDR architecture and technical positioning Perform installation process Perform FortiEDR inventory and use system tools Deploy FortiEDR multi-tenancy UseAPItocarry out FortiEDR managementfunctions FortiEDR security settings and policies l l l l Configure communication control policy Configure security policies Configure playbooks Explain Fortinet Cloud Service (FCS) Events, forensics, and threat hunting l l l l Analyze security events and alerts Configure threat hunting profiles and scheduled queries Analyze threat hunting data Investigate security events using forensics analysis FortiEDR integration l l Deploy FortiXDR Configure security fabric using FortiEDR FortiEDR troubleshooting l l Perform FortiEDR troubleshooting Perform alert analysis on FortiEDR security events and logs

FortiSIEM???????????? l l l l SIEM Concepts l l l l l Identify FortiSIEM architecture components Identify deployment requirements Identify event type classification Perform system configuration and management tasks Troubleshoot system configuration and deployment related issues FortiSIEM Operations l l l l l Discover devices on FortiSIEM Build queries from search results and events Tunedatacollection and notification processes Deploy FortiSIEM agents Troubleshoot discovery related issues FortiSIEM Analytics l l Apply group by anddataaggregation on search results Usevarious reporting functions available on FortiSIEM Rules andIncidents l l l l l Identify various rule components Configure rule sub-patterns, aggregation and group by Manageincidents Configure clear conditions for incidents Configure notification policies

FortiSOAR Administrator??????????????? SOCandSOAROverview l l l l Identify deployment requirements ManageFortiSOARlicensing Configure initial settings Manageincidents and alerts SystemConfiguration l l l l Configure applications, system fixtures, and proxy View andmanageauditlogs Export and import FortiSOAR system configuration Configure FortiSOAR HA Security Management l l l l Configure and managerole-based access control (RBAC) Configure and manageteamsandteamhierarchy Differentiate between appliance authentication and user authentication Troubleshoot security management issues SystemOperation l l l Externalize and migrate Elasticsearch data Configure the recommendation engine Configure and operate a war room SystemMonitoring and Maintenance l l l l Monitor FortiSOAR using system tools Monitor various FortiSOAR processes and services View andinterpret various FortiSOAR log files Upgrade FortiSOAR

Snaplogic???????????? Platform overview; Pipeline execution flow; Snaplex execution flow; Create your first pipeline; SnapLogic Platform; Supported ciphers; Groundplex allowlist; Task Allowlists; TLS certificates; Account encryption; Admin Manager; Application settings; User management; System configuration; Subscriptions; Security; Project Assets; Ultra Tasks; Migrate assets to the EMEA control plane; How to use AutoSync; How AutoSync loads data; How AutoSync maps data; Configure endpoints; Supported endpoints; Administration; Move from Dashboard to Monitor; Analyze pipelines and infrastructure; Insights; Asset catalog; Execution; Infrastructure; Metrics; Observe; API metrics; Review node alerts and logs; Alert history; Activity logs; Troubleshooting; API Management APIs; Asset APIs; Asset catalog APIs; Log APIs; Runtime APIs; Pipeline APIs; Task APIs; Project APIs; Snaplex APIs; User and group APIs; Permission in Manager and in APIs; Explore Patterns; Use Patterns; Snap concepts; Snaps Reference; Cloudplexes; Groundplexes; Groundplex node management; Release process; Snaplex monitoring; Snaplex to run your pipelines; Groundplexes and pipeline dependency on the control plane; Ci/CD; Observability; Analyze pipelines; Generate pipelines; Mapper Snap expressions; SQL and SOQL queries; Best Practices; AgentCreator; AgentCreator Workflow; AgentCreator Concepts; AgentCreator FAQ; Use Cases and Tutorials

Atscale? 1. Introduction to AtScale and its role in modern data architecture

Alternatives to AtScale in the Market"

2. Overview of GCP services relevant to AtScale

1. GCP project setup, IAM roles, and billing configuration

2.. Introduction to Google Cloud Storage, BigQuery, and Cloud SQL

3. Installing and configuring AtSCale on GCP compute engine instance

Real-world examples of AtScale on GCP? in various industry verticals

Hands-on exercise: Configure AtScale on a GCP Compute Engine instance

1.Introduction to data modelling with AtScale on GCP

2.Dimensions, measures, hierarchies, and attributes in a GCP environment

Designing virtual cubes using BigQuery as a data source

?Introduction, Repo Browser, Data Sources, Preview, Source Control, Deploy, Deployed, Catalogs, Convert.

"Optimizing data models for performance and cost-efficiency on GCP:

Types of Relationships in the AtScale Model: One-To-One, Many-To-One, Role Playing, Multi-Fact, Designing a Relationship, Keys and Foreign Keys, Join Behavior, Data Modelling using Incremental Aggregation option? (not seen anywhere in the topics),

Understanding Date Hierarchies in detail? (may be covered under hierarchies topic but make sure it is elaborated to dates)

a. Date-level relationships

b.????? Monthly level relationships – incoming source has only Month + Year data – this was a recent scenario we solved with a workaround.

c.????? Managing multiple hierarchies within the same dimension and how it will impact the solution/performance."

Hands-on exercise: Create and optimize a virtual cube using BigQuery datasets

Connecting AtScale to BigQuery for data analysis

Connecting AtScale with BI tools like Power BI, Tableau, and Excel

1.Leveraging Google Cloud Storage for data staging

2.Integrating Cloud SQL for relational data

3.Visualizing data from AtScale using Google Looker and Data Studio

Hands-on exercise: Connect AtScale to BigQuery, Cloud SQL, and visualize data using Looker

Using partitioning, clustering, and other BigQuery optimization techniques

Implementing effective caching strategies with AtScale on GCP

Using GCP’s monitoring tools for AtScale performance and cost management:

o???????????? Real-Time Monitoring Tools

o???????????? Google Cloud Monitoring

o???????????? AtScale’s Built-in Monitoring - Query Analyzer and Performance Metrics Dashboard

o???????????? System Logs

o???????????? Application Logs

o???????????? Access Logs

o???????????? Log Filtering and Analysis

o???????????? Security Logs

o???????????? Audit Logs"

Hands-on exercise: Optimize AtScale queries and manage costs in a GCP environment

IAM roles, service accounts, and VPC security for AtScale

Implementing data governance using GCP’s tools (e.g., Cloud DLP, Security Command Centre)

Configuring Stackdriver for logging and monitoring AtScale activities

Hands-on exercise: Set up security policies and data governance for AtScale on GCP

Creating custom measures and calculations in AtScale using GCP Data

Performing advanced data modelling with multiple GCP data sources

Using GCP APIs to enhance AtScale’s functionality

Hands-on exercise: Create advanced data models using custom measures and multiple data sources

Implementing real-time data streaming with Pub/Sub and Dataflow

Integrating BigQuery ML and AI Platform with AtScale for predictive analytics

Hands-on exercise: Set up real-time analytics and integrate machine learning models with AtScale

SANS????? Introduction and Overview

Core Principles of Cyber Security

Security Program Management

Security Maintenance and Hygiene

Authentication and Authorization

Data Protection

Sample Attacks

Attack Scenario

Attack Mitigation Technologies

Securing Cloud Computing Environments

Securing Web Applications & Servers (OWASP Top 10)

Attack Case Study: Supply Chain Attacks

Fivetran?????????????? ????????????? Fivetran Overview: Focus on Automated Data Integration

????????????? Connectors & Schemas in Fivetran

????????????? Building an Automated Data Pipeline with Fivetran (Automatic Schema Detection & Transformation)

????????????? Data Lineage & Version Control

????????????? Security & Access Management in Fivetran

Working with Incremental Data Loads & Change Data Capture (CDC)

Generative AI???? Canva, Microsoft Copilot, Copy.ai, ChatGPT, Pictory.ai, Gemini, Eleven Labs, Claude, Speecify, Perplexity.ai, Grammarly, Quill.org, Vrew, Whisper, Knime, Softr

Azure AZ certifications??? ????????????? MOC-AZ-900 - Azure Introduction” or “Azure Fundamentals”

????????????? MOC-AZ-104 - Azure Administrator” or “Azure Administrator”

????????????? MOC-AZ-500 - “Azure Security” or “Azure Security”

????????????? MOC-AZ-204 - “Azure Development” Developing Solutions for Microsoft Azure

????????????? MOC-AZ-305 - Designing Microsoft Azure Infrastructure Solutions

????????????? MOC- AZ-400 - Designing and Implementing Microsoft DevOps solutions

SnowPro Core??? ?Data Loading and Transformation in Snowflake

?Virtual Warehouse Performance and Concurrency

?DDL and DML Queries

?Using Semi-Structured and Unstructured Data

?Cloning and Time Travel

?Data Sharing

?Snowflake Account Structure and Management

Knime??? Introduction; Workspaces ; User interface ; Entry page; Workflow editor & nodes ; Connect to KNIME Hub; Switch back to KNIME classic user interface ; Space explorer; Building workflows ; Node repository ; Node description ; Workflow description ; KNIME AI Assistant; Node monitor; Help; Customizing the Analytics Platform ; Reset and logging ; Configuring KNIME Analytics Platform ; Preferences ; Setting up knime; KNIME runtime options ; KNIME tables ; Data table ; Column types; Sorting ; Column rendering ; Table storage; Shortcuts; General actions ; Workflow editor modes ; Execution ; Zooming and panning; Component and metanode building ; Node labels ; Workflow annotations

Monte Carlo Observability??????????? What is Data Observability?;? Domains;? Key Assets;? Alert Feed + IQ;? Assets + Warehouse Glossary;? Lineage;? Dashboards;? Insights; ;? Audiences;? Notifications;? Monitors Overview;? Out of the Box ML Monitors: Freshness, Volume, Schema;? Custom ML Monitors;? Custom Rules Based Monitors; ;? Usage Management;? Performance;? Monte Carlo API;? Monitors as Code;? Notifications as Code;? Monte Carlo Python SDK;? Integrating Airflow;? SSO, User Groups and Permissions;? Exclusion Windows; ;? Setting Up Your Monitoring Strategy for Maximum Impact;? Creating an Alert Strategy that Guarantees Action;? How to Optimize Cost, Stakeholder Experience and Data Trust with Performance;? How to Scale Data Quality with Data Observability + Data Testing;? What Should You Monitor? Creating a Proactive Monitoring Strategy with Monte Carlo;? How to Scale Data Quality with Data Observability + Data Testing;? What Should You Monitor? Creating a Proactive Monitoring Strategy with Monte Carlo; ; ; Using Assets; Muting; Tags; Field Lineage; Data Explorer (beta); ; Performance; Data Reliability Dashboard; Table Health Dashboard; Data Product Dashboard; Insights; Importance Score Calculation; Insight: Key Assets; Insight: Coverage Overview; Insight: Table Cleanup Suggestions; Insight: Field-level Cleanup Suggestions; Insight: Field importance scores; Insight: Events; Insight: Rule Results; Insight: Field Health Suggestions; Insight: Misconfigured Monitors; Insight: BI Dashboard Analytics; Insight: Incident History; Insight: Notifications by custom monitor; Insight: Data Product Recommendations; ; Interacting with Alerts; Alert Statuses; Introducing: Alerts; Marking Alerts as Incidents; ; Notifications; Authorization; Single Sign On (SSO); Map SSO Groups to Authorization Groups; Usage; Recommended monitoring strategies for tables; ; Weekly Data Reliability Summary Email

Teradata????????????? Teradata Architecture; Introduction; Platform Architecture: MPP and SMP; Teradata Architecture: MPP and SMP; Key Differentiators; Teradata Parallelism; Introduction; Data Dictionary; Teradata SQL Assistant; Teradata Administrator; Setting up the Teradata database, Starting and Stopping Teradata; Exercise-Log on to Teradata; Teradata Implementation; Primary Index, PPI & FALLBACK;?? VPROC Manager; Backup (Arcmain); Secondary Index; Journel ; Perm,Spool,and Temp Space; Max Perm,Current Perm, Peak Perm; Max Spool,Current Spool, Peak Spool; Max temp,current temp,peak temp; Space Policy; Trouble shooting ; Fast Load; Multi Load; Tpump; Fast Export ; TPT; BTEQ; Relational Concepts; Teradata Select Command; Order -By Clause; Multiple ORDER BY Columns; DISTINCT; Naming Database Objects; Naming Rules; Coding Conventions; Default Database; BTEQ; Help Command; Show Command; Logical Operators; BETWEEN -- Numeric Range Testing; BETWEEN -- Character Range Testing; Set Operator IN; Set Operator NOT IN; Null; Like Operator; LIKE Operator -- Case-Blind Comparison; LIKE Operator - Case-Sensitive Comparison; LIKE Operator -- Using Quantifiers; LIKE with ESCAPE Character; Logical Operator -- AND/OR; Data Type; Selecting System Variables; DATE Arithmetic; Date Function; Time Related Data; Data Conversions Using CAST; Subqueries; TRIM Function; FORMAT Phrase; FORMAT Characters; DATE Formats; Formatting DATE in an SQL SELECT Statement; Joins; Joins Types; Joins Stategery ; Join v/s Subquery; Set Operator; Union Operator; INTERSECT Operator; EXCEPT Operator; Creating Tables and Indexes; Retrieving Default Values; COLUMN Storage Attributes; COMPRESS; COMPRESS NULL; COMPRESS <constant>; Primary Key V/S Primary Index; Drop Table; Alter Table; Secondary Index; Help Index; Drop Index; Insert; Insert Select; Update; UPDATE Using Subqueries or Joins; Delete; DELETE Using Subqueries or Joins; Macro; Create Macro; Execute Macro; Drop Macro; Replace Macro; Parameterized Macro; Macro with multiple parameter; Using a Parameterized Macro to Insert Data; EXECUTE the INSERT MACRO; Aggregate Operators; Why Aggregation is Useful; GROUP BY and the WHERE Clause; GROUP BY and ORDER BY; GROUP BY on Multiple Columns; GROUP BY and HAVING Condition; Using WITH...BY for Subtotals; Creating a Report Using WITH..BY; WITH..BY Multiple Aggregates; WITH... BY Multiple Subtotal Levels; Creating Final Totals Using WITH; DISTINCT Modifier; Combining WITH and WITH BY; Final Totals Using WITH and GROUP BY; Simple Rankings; Rankings With Qualification; Variations On a Ranking; Ranking With PARTITION BY; Extended Ranking Scope; The SAMPLE Function; Using SAMPLEID; Stratified Sampling; System Variables; Top N; TOP N With and Without TIES; Selecting Random Rows; Using the PERCENT Option; Case Expressions; View; Creating and Using Views; What is a Join View?; Renaming Columns; Replacing a View; Using Views For Formatting and Titles; Aggregate Views; Aggregate View Using HAVING; Joins on Views with Aggregates; Nested Aggregates; Nested Aggregates in a WHERE Clause; Views WITH CHECK OPTION; Changing Rows Via the View; Restrictions and Advantages With Views; SUBSTRING Function; Using a SUBSTRING in a List; Using SUBSTRING with INTEGERS; Using SUBSTRING in a WHERE Clause; COALESCE Function; The POSITION Function; Using SUBSTRING and POSITION; Using Count Window Function; Using WITH BY For Group Counts; Using WITH For Final Counts; SUM Window Function; Using The SUM Window Function For Group Totals; Explain plan ; Sql-Tuning ; Indexing; Optimization ; Partitioning (PPI); Secondary Index ; Collect Statistics ; PMON TERADATA; Join Index; Join Strategies; Temporary Tables and SET Operators; Space Policy; Collect Statistics; Skew factor; Pattern Match:nPath; Time Series Data Prep:Sessionization; Attribution; Group by Time; Aggregation; Single Tree Predict; Forest Predict; Sparse SVM Predict; GLM Predict; NaiveBayes Predict; DecisionForest; 4D Analytics; Geospatial; Temporal

DODAF and UAF for Cameo Administrators??????????? Introduction; Selecting Environment; Creating a project; Understanding the user interface; Most common shortcut keys; Assigning shortcut keys; Customizing environment options; Configuration files; Disabling inbound network activity; DoDAF 2.1; DoDAF All Views viewpoint; AV-1 Overview and Summary Information; AV-2 Integrated Dictionary; Capability viewpoint; Project viewpoint; Operational viewpoint; Data and Information viewpoint; Services viewpoint; Systems viewpoint; Standards viewpoint; MODAF; NAF; NAF 4.0; UAF 1.0; Dialogs; Procedures; Validation rules; UAF elements; UAF specific elements; Forward compatibility; Reporting Issues; Improving performance; Migration ; DoDAF Migration to UPDM 1.x; Migration from UPDM 3 (UAF 1.0 beta) to UAF 1.0; Migration to UAF 1.0; UPDM migration

Solix EDMS????????? Purpose of Solix EDMS Data Validation Standard Edition (SE) ;? Startup Solix EDMS Standard Edition (SE) Application ;? Setup Database Connection;? Setup Data Validation Source & Target Details;? Setup Source & Target Column Matching ;? Setup Source & Target Column Comparison ;? Setup Data Validation Method & Run;? Edit Data Validation details ;? Edit Column Comparison Criteria details ;? Benefits of Solix EDMS Data Masking Standard Edition (SE) ;? Startup Solix EDMS Standard Edition (SE) Application ;? Setup Database Connection;? Select Tables;? Setup Security Rule Assignments;? Provide Security Rule Parameter Values & Run ;? Edit Security Group details ;? Features of Solix EDMS Data Assessment (ILM Assessment) Standard Edition (SE) ;? Benefits of Solix EDMS Data Assessment (ILM Assessment) Standard Edition (SE) ;? Database Size Snapshot ;? Archive Eligibility ;? Data Growth Forecast ;? Preview ;? Parameters ;? Log ;? Editing Data Assessment details ;? Benefits of Solix EDMS Data Archiving Standard Edition (SE) ;? Startup Solix EDMS Standard Edition (SE) Application ;? User Creation ;? User Role Creation ;? KB Source Target Definition ;? KB Definitions;? KB Assignments ;? Custom Configuration (Design) ;? Custom Configuration (Execution) ;? Custom Configuration (Design) ;? Custom Configuration (Execution)

DevOps Tools????? Ansible, Chef, Puppet Git, Github Actions, Container Registry, GitOps ArgoCD Prometheus, Grafana Docker Kubernetes Jenkins Terraform

System Design??? Cache Microservices Case Studies NoSQL Message Queues

Advance DSA????? Greedy Dynamic Programming Graphs Advanced Math Problems Advanced Backtracking Problems Heaps Tries Strings Pattern Matching Advanced Dynamic Programming Problems Advanced Graph Concepts

AI for Cybersecurity???????? 1: AI Core Concepts And Tools Of The Trade ; Section 1: AI Core Concepts and Tools of the Trade; Introduction To AI For Cybersecurity Professionals; Introduction to AI for Cybersecurity Professionals; Applying AI in cybersecurity; Evolution in AI: from expert systems to data mining; Types of machine learning; Algorithm training and optimization; Getting to know Python's libraries; AI in the context of cybersecurity; Summary; Setting Up Your AI For Cybersecurity Arsenal ; Setting Up Your AI for Cybersecurity Arsenal; Getting to know Python for AI and cybersecurity; Python libraries for cybersecurity; Enter Anaconda – the data scientist's environment of choice; Playing with Jupyter Notebooks; Installing DL libraries; Summary;? 2: Detecting Cybersecurity Threats With AI ; Section 2: Detecting Cybersecurity Threats with AI; Ham Or Spam? Detecting Email Cybersecurity Threats With AI; Ham or Spam? Detecting Email Cybersecurity Threats with AI; Detecting spam with Perceptrons; Spam detection with SVMs; Phishing detection with logistic regression and decision trees; Spam detection with Naive Bayes; NLP to the rescue; Summary; Malware Threat Detection ; Malware Threat Detection; Malware analysis at a glance; Telling different malware families apart; Decision tree malware detectors; Detecting metamorphic malware with HMMs; Advanced malware detection with deep learning; Summary; Network Anomaly Detection With AI ; Network Anomaly Detection with AI; Network anomaly detection techniques; How to classify network attacks; Detecting botnet topology; Different ML algorithms for botnet detection; Summary;? 3: Protecting Sensitive Information And Assets ; Section 3: Protecting Sensitive Information and Assets; Securing User Authentication ; Securing User Authentication; Authentication abuse prevention; Account reputation scoring; User authentication with keystroke recognition; Biometric authentication with facial recognition; Summary; Fraud Prevention With Cloud AI Solutions ; Fraud Prevention with Cloud AI Solutions; Introducing fraud detection algorithms; Predictive analytics for credit card fraud detection; Getting to know IBM Watson Cloud solutions; Importing sample data and running Jupyter Notebook in the cloud; Evaluating the quality of our predictions; Summary; GANs - Attacks And Defenses ; GANs - Attacks and Defenses; GANs in a nutshell; GAN Python tools and libraries; Network attack via model substitution; IDS evasion via GAN; Facial recognition attacks with GAN; Summary;? 4: Evaluating And Testing Your AI Arsenal ; Section 4: Evaluating and Testing Your AI Arsenal; Evaluating Algorithms ; Evaluating Algorithms; Best practices of feature engineering; Evaluating a detector's performance with ROC; How to split data into training and test sets; Using cross validation for algorithms; Summary; Assessing Your AI Arsenal ; Assessing your AI Arsenal; Evading ML detectors; Challenging ML anomaly detection; Testing for data and model quality; Ensuring security and reliability; Summary;

Netsuite Analytics??????????? Explain the benefits of NetSuite Analytics Warehouse over traditional NetSuite data analytics tools.;Describe the primary differences between SuiteAnalytics Workbook and NetSuite Analytics Warehouse from a data analytics perspective.;Explain the benefits of the NSAW semantic model and how it simplifies the complexities associated with the data stored in the data warehouse.; Explain the concept of functional areas, subject areas, and data pipeline parameters and how they dictate the nature of the data available for analysis in NetSuite Analytics Warehouse.; Manage data warehouse users, assign proper security permissions, and adjust data pipeline parameters using the NetSuite Analytics Warehouse Console application.; Import NetSuite customizations into the data warehouse using the Custom Attributes Mapper and Data Augmentation wizard.;Create datasets and data flows to extract and transform warehouse data.; Establish connections to external third-party data sources.;Create projects and build data visualizations using attributes and facts from one or more NetSuite subject areas or datasets.; Create KPIs, cards, and decks and explain the relationships between each component.;Describe how Semantic Model Extensions can be used to mash up NetSuite data with data from third-party data sources.

Netsuite OpenAir????????????? OpenAir Overview ; Signing In to OpenAir ; Signing In Using Your OpenAir Sign-In Details ; Password Expiration ; Changing your OpenAir Password ; Setting Up Security Questions ; Resetting Your OpenAir Password ; Signing In Using Two-Factor Authentication (2FA) ; Set Up Two-Factor Authentication (2FA) ; Reset Your Two-Factor Authentication (2FA) Settings ; Trusted Devices ; Two-Factor Authentication FAQ ; Troubleshoot Authenticator Apps ; Signing In to OpenAir Using Single Sign-On (SSO) ; Navigating OpenAir ; Using the Main Navigation Menu ; User Center ; Create Button ; Utility Buttons ; Shortcuts ; Contextual Tips ; Resource Comparison ; Product Updates ; Canvas and Screen Header ; Administration Settings Screen Navigation ; Working with Lists and Records ; List Views ; List View Toolbar ; Navigating the List View ; List View Column Headers ; Bulk Actions ; Selecting List View Columns ; Sorting the List View Data ; Filtering Options ; Download Your List View Data ; Other List Options ; Saving and Using Custom List View Configurations ; List View Contextual Tips ; List View Data ; List Views — Previous UI Version Layout ; Records ; Record Header ; Forms ; Grids ; Working with the Project Center View ; Project Center Toolbar ; Viewing Hours, Time Costs, or Time Charges in the Project Center ; Date Navigation in the Project Center ; Project Center Column Options ; Project Center Display Options ; Managing Project Plans in the Project Center ; Managing Resource Bookings in the Project Center ; Adding Resource Bookings to Your Project Plan ; Project Center Display Options; Managing Project Plans in the Project Center; Managing Resource Bookings in the Project Center; Adding Resource Bookings to Your Project Plan

Design Patterns? What are Software Design Patterns?;Types of Software Design Patterns;1. Creational Design Patterns; Factory Method Design Pattern; Abstract Factory Method Design Pattern; Singleton Method Design Pattern; Prototype Method Design Pattern; Builder Method Design Pattern;2. Structural Design Patterns;;Adapter Method Design Patterns; Bridge Method Design Patterns; Composite Method Design Patterns; Decorator Method Design Patterns; Facade Method Design Patterns; Flyweight Method Design Patterns; Proxy Method Design Patterns; 3. Behavioral Design Patterns;;Chain Of Responsibility Method Design Pattern; Command Method Design Pattern; Interpreter Method Design Patterns; Mediator Method Design Pattern; Memento Method Design Patterns; Observer Method Design Pattern; State Method Design Pattern; Strategy Method Design Pattern; Template Method Design Pattern; Visitor Method Design Pattern

SysML_UML??????? Introduction; Preliminaries; Systems Engineering; The OMG SysML? and UML? Languages;? The Pragmatic SYSMOD Approach; Case Study; Determining Requirements; Modelling the System Context; Modelling Use Cases; ;? UML—Unified Modelling Language; History; Structure and Concepts; The Class Diagram; The Composite Structure Diagram; The Use Case Diagram; The Activity Diagram; The State Machine Diagram; Interaction Diagrams; The Package Diagram; Other Model Elements;? SysML—The Systems Modelling Language; History; Structure and Concepts; The Requirement Diagram; Allocation; Block Diagrams; The Parametric Diagram; The Use Case Diagram; The Activity Diagram; The State Machine Diagram; Interaction Diagrams; General Modelling Elements;? Systems Engineering Profile—SYSMOD; Actor Categories; Discipline-Specific Elements; Extended Requirement; Essential Activity; Domain Block; Weighted Requirement Relationships; Continuous and Secondary Use Cases; Stakeholders; Systems and Subsystems; System Context Elements; System Processes

Cybersecurity???? Network and Micro-Segmentation with Fortinet;;SonicWall Cyber Threat;;SAP Data and Analytics;;CNAPP, CSPM, CDR, CWP, container security, Kubernetes;;FortiGuard Incident Response;;SonicWall, Auvik, and Liongard;;Device-Centric Security Service Edge (SSE);;Web DDoS Tsunami Attacks;;Cyber Risk - Cloud Security;;SD-WAN - Enterprise Networking space;;Data Breach Post-Mortem and Defense Future-Proofing;;Qualys Ransomware Risk Prevention Solution;;Fortinet’s SASE solution;;API Prevention using Akamai;;Hybrid Mesh Firewalls in securing organizations against cyberthreats;;Web DDoS Tsunami Attacks

PMP?????? Task 1 Manage conflict;? Interpret the source and stage of the conflict ;? Analyze the context for the conflict ;? Evaluate/recommend/reconcile the appropriate conflict resolution solution ;Task 2 Lead a team;? Set a clear vision and mission ;? Support diversity and inclusion (e.g., behavior types, thought process) ;? Value servant leadership (e.g., relate the tenets of servant leadership to the team) ;? Determine an appropriate leadership style (e.g., directive, collaborative) ;? Inspire, motivate, and influence team members/stakeholders (e.g., team contract, social contract, reward system);? Analyze team members and stakeholders’ influence ;? Distinguish various options to lead various team members and stakeholders ;Task 3 Support team performance;? Appraise team member performance against key performance indicators ;? Support and recognize team member growth and development ;? Determine appropriate feedback approach ;? Verify performance improvements ;Task 4 Empower team members and stakeholders;? Organize around team strengths ;? Support team task accountability ;? Evaluate demonstration of task accountability ;? Determine and bestow level(s) of decision-making authority ;Task 5 Ensure team members/stakeholders are adequately trained;? Determine required competencies and elements of training ;? Determine training options based on training needs ;? Allocate resources for training ;? Measure training outcomes ;Task 6 Build a team;? Appraise stakeholder skills ;? Deduce project resource requirements ;? Continuously assess and refresh team skills to meet project needs ;? Maintain team and knowledge transfer ;Task 7 Address and remove impediments, obstacles, and blockers for the team;? Determine critical impediments, obstacles, and blockers for the team ;? Prioritize critical impediments, obstacles, and blockers for the team ;? Use network to implement solutions to remove impediments, obstacles, and blockers for the team;? Re-assess continually to ensure impediments, obstacles, and blockers for the team are being addressed; ;Task 8 Negotiate project agreements;? Analyze the bounds of the negotiations for agreement ;? Assess priorities and determine ultimate objective(s) ;? Verify objective(s) of the project agreement is met ;? Participate in agreement negotiations ;? Determine a negotiation strategy ;Task 9 Collaborate with stakeholders;? Evaluate engagement needs for stakeholders ;? Optimize alignment between stakeholder needs, expectations, and project objectives;? Build trust and influence stakeholders to accomplish project objectives ;Task 10 Build shared understanding;? Break down situation to identify the root cause of a misunderstanding ;? Survey all necessary parties to reach consensus ;? Support outcome of parties' agreement ;? Investigate potential misunderstandings ;Task 11 Engage and support virtual teams;? Examine virtual team member needs (e.g., environment, geography, culture, global, etc.);? Investigate alternatives (e.g., communication tools, colocation) for virtual team member engagement;? Implement options for virtual team member engagement ;? Continually evaluate effectiveness of virtual team member engagement ;Task 12 Define team ground rules;? Communicate organizational principles with team and external stakeholders ;? Establish an environment that fosters adherence to the ground rules ;? Manage and rectify ground rule violations ;Task 13 Mentor relevant stakeholders;? Allocate the time to mentoring ;? Recognize and act on mentoring opportunities ;Task 14 Promote team performance through the application of emotional intelligence;? Assess behavior through the use of personality indicators ;? Analyze personality indicators and adjust to the emotional needs of key project stakeholders; ; ; ;Task 1 Execute project with the urgency required to deliver business value;? Assess opportunities to deliver value incrementally ;? Examine the business value throughout the project ;? Support the team to subdivide project tasks as necessary to find the minimum viable product; ;Task 2 Manage communications;? Analyze communication needs of all stakeholders ;? Determine communication methods, channels, frequency, and level of detail for all stakeholders;? Communicate project information and updates effectively ;? Confirm communication is understood and feedback is received ;Task 3 Assess and manage risks;? Determine risk management options ;? Iteratively assess and prioritize risks ;Task 4 Engage stakeholders;? Analyze stakeholders (e.g., power interest grid, influence, impact) ;? Categorize stakeholders ;? Engage stakeholders by category ;? Develop, execute, and validate a strategy for stakeholder engagement ;Task 5 Plan and manage budget and resources;? Estimate budgetary needs based on the scope of the project and lessons learned from past projects;? Anticipate future budget challenges ;? Monitor budget variations and work with governance process to adjust as necessary;? Plan and manage resources ;Task 6 Plan and manage schedule;? Estimate project tasks (milestones, dependencies, story points) ;? Utilize benchmarks and historical data ;? Prepare schedule based on methodology ;? Measure ongoing progress based on methodology ;? Modify schedule, as needed, based on methodology ;? Coordinate with other projects and other operations ;Task 7 Plan and manage quality of products/deliverables;? Determine quality standard required for project deliverables ;? Recommend options for improvement based on quality gaps ;? Continually survey project deliverable quality ;Task 8 Plan and manage scope;? Determine and prioritize requirements ;? Break down scope (e.g., WBS, backlog) ;? Monitor and validate scope ;Task 9 Integrate project planning activities;? Consolidate the project/phase plans ;? Assess consolidated project plans for dependencies, gaps, and continued business value;? Analyze the data collected ;? Collect and analyze data to make informed project decisions ;? Determine critical information requirements ;Task 10 Manage project changes;? Anticipate and embrace the need for change (e.g., follow change management practices);? Determine strategy to handle change ;? Execute change management strategy according to the methodology ;? Determine a change response to move the project forward ;Task 11 Plan and manage procurement;? Define resource requirements and needs ;? Communicate resource requirements ;? Manage suppliers/contracts ;? Plan and manage procurement strategy ;? Develop a delivery solution ;Task 12 Manage project artifacts;? Determine the requirements (what, when, where, who, etc.) for managing the project artifacts;? Validate that the project information is kept up to date (i.e., version control) and accessible to all stakeholders;? Continually assess the effectiveness of the management of the project artifacts ;Task 13 Determine appropriate project methodology/methods and practices;? Assess project needs, complexity, and magnitude ;? Recommend project execution strategy (e.g., contracting, finance) ;? Recommend a project methodology/approach (i.e., predictive, agile, hybrid) ;? Use iterative, incremental practices throughout the project life cycle (e.g., lessons ;learned, stakeholder engagement, risk) ;Task 14 Establish project governance structure;? Determine appropriate governance for a project (e.g., replicate organizational governance);? Define escalation paths and thresholds ;Task 15 Manage project issues;? Recognize when a risk becomes an issue ;? Attack the issue with the optimal action to achieve project success ;? Collaborate with relevant stakeholders on the approach to resolve the issues ;Task 16 Ensure knowledge transfer for project continuity;? Discuss project responsibilities within team ;? Outline expectations for working environment ;? Confirm approach for knowledge transfers ;Task 17 Plan and manage project/phase closure or transitions;? Determine criteria to successfully close the project or phase ;? Validate readiness for transition (e.g., to operations team or next phase) ;? Conclude activities to close out project or phase (e.g., final lessons learned, ;retrospective, procurement, financials, resources) ; ; ; ;Task 1 Plan and manage project compliance;? Confirm project compliance requirements (e.g., security, health and safety, regulatory compliance);? Classify compliance categories ;? Determine potential threats to compliance ;? Use methods to support compliance ;? Analyze the consequences of noncompliance ;? Determine necessary approach and action to address compliance needs (e.g., risk, legal);? Measure the extent to which the project is in compliance ;Task 2 Evaluate and deliver project benefits and value;? Investigate that benefits are identified ;? Document agreement on ownership for ongoing benefit realization ;? Verify measurement system is in place to track benefits ;? Evaluate delivery options to demonstrate value ;? Appraise stakeholders of value gain progress ;Task 3 Evaluate and address external business environment changes for impact on scope;? Survey changes to external business environment (e.g., regulations, technology, geopolitical, market);? Assess and prioritize impact on project scope/backlog based on changes in external business environment;? Recommend options for scope/backlog changes (e.g., schedule, cost changes) ;? Continually review external business environment for impacts on project scope/backlog; ;Task 4 Support organizational change;? Assess organizational culture ;? Evaluate impact of organizational change to project and determine required actions;? Evaluate impact of the project to the organization and determine required actions;

Generative AI in Automobiles?????? 1 . The Rise of Generative Al in Automotive ; 2.Impactful Generative Al Use Cases in the Automotive Industry ; 2.1 . Generative Al-Powered Chatbot ; 2.2. Simplified Manuals and Efficient Roadside Assistance ; 2.3. Predictive Maintenance ; 2.4. In-Car Virtual and Voice Assistants ; 2.5. Car Design and Prototyping ; 2.6. Manufacturing Process and Quality Control Enhancement ; 2.7. Supply Chain Optimization ; 2.8. Virtual Testing and Simulation ; 3. Benefits of Generative Al in the Automotive Market ; 3.1. For Businesses: ; 3.2. For Consumers: ; 4. Top 5 Automotive Companies Using Generative Al ; 4.1. Mercedes-Benz ; 4.2. Toyota ; 4.3. CarMax ; 4.4. BMW ; 4.5. CarGurus ; 5. Trends in Motion: Generative Al Shaping New Automotive Trends ; 2. Market Research ; 1.1. Market Research Objective; 1.2. Scope of the Study; 1.3. Definition; 2. Market Research Methodology (Premium Insights); 2.1. Market Research Approach; 2.2. Data Sources; 2.3. Assumptions & Limitations; 3. Executive Summary; 3.1. Market Snapshot; 4. Market Variables and Scope ; 4.1. Introduction; 4.2. Market Classification and Scope; 4.3. Industry Value Chain Analysis; 4.3.1. Raw Material Procurement Analysis ; 4.3.2. Sales and Distribution Channel Analysis; 4.3.3. Downstream Buyer Analysis; 5. COVID 19 Impact on Generative Ai In Automotive Market ; 5.1. COVID-19 Landscape: Generative Ai In Automotive Industry Impact; 5.2. COVID 19 - Impact Assessment for the Industry; 5.3. COVID 19 Impact: Global Major Government Policy; 5.4. Market Trends and Opportunities in the COVID-19 Landscape; 6. Market Dynamics Analysis and Trends; 6.1. Market Dynamics; 6.1.1. Market Drivers; 6.1.2. Market Restraints; 6.1.3. Market Opportunities; 6.2. Porter’s Five Forces Analysis; 6.2.1. Bargaining power of suppliers; 6.2.2. Bargaining power of buyers; 6.2.3. Threat of substitute; 6.2.4. Threat of new entrants; 6.2.5. Degree of competition; 7. Competitive Landscape; 7.1.1. Company Market Share/Positioning Analysis; 7.1.2. Key Strategies Adopted by Players; 7.1.3. Vendor Landscape; 7.1.3.1. List of Suppliers; 7.1.3.2. List of Buyers; 8. Global Generative Ai In Automotive Market, By Vehicle Type; 8.1. Generative Ai In Automotive Market, by Vehicle Type, 2023-2032; 8.1.1 Passenger Vehicles; 8.1.1.1. Market Revenue and Forecast (2020-2032); 8.1.2. Commercial Vehicles; 8.1.2.1. Market Revenue and Forecast (2020-2032); 9. Global Generative Ai In Automotive Market, By Technology; 9.1. Generative Ai In Automotive Market, by Technology, 2023-2032; 9.1.1. Machine Learning; 9.1.1.1. Market Revenue and Forecast (2020-2032); 9.1.2. Natural Language Processing; 9.1.2.1. Market Revenue and Forecast (2020-2032); 9.1.3. Computer Vision; 9.1.3.1. Market Revenue and Forecast (2020-2032); 9.1.4. Context-aware Computing; 9.1.4.1. Market Revenue and Forecast (2020-2032); 9.1.5. Others; 9.1.5.1. Market Revenue and Forecast (2020-2032); 10. Global Generative Ai In Automotive Market, By Application ; 10.1. Generative Ai In Automotive Market, by Application, 2023-2032; 10.1.1. Vehicle Design; 10.1.1.1. Market Revenue and Forecast (2020-2032); 10.1.2. Manufacturing Optimization; 10.1.2.1. Market Revenue and Forecast (2020-2032); 10.1.3. Transportation & Logistics; 10.1.3.1. Market Revenue and Forecast (2020-2032); 10.1.4. Autonomous Driving; 10.1.4.1. Market Revenue and Forecast (2020-2032); 10.1.5. ADAS; 10.1.5.1. Market Revenue and Forecast (2020-2032); 12. Company Profiles; 12.1. Microsoft; 12.1.1. Company Overview; 12.1.2. Product Offerings; 12.1.3. Financial Performance; 12.1.4. Recent Initiatives; 12.2. AUDI AG; 12.2.1. Company Overview; 12.2.2. Product Offerings; 12.2.3. Financial Performance; 12.2.4. Recent Initiatives; 12.3. Intel Corporation; 12.3.1. Company Overview; 12.3.2. Product Offerings; 12.3.3. Financial Performance; 12.3.4. Recent Initiatives; 12.4. Tesla Inc; 12.4.1. Company Overview; 12.4.2. Product Offerings; 12.4.3. Financial Performance; 12.4.4. Recent Initiatives; 12.5. Uber Technologies; 12.5.1. Company Overview; 12.5.2. Product Offerings; 12.5.3. Financial Performance; 12.5.4. Recent Initiatives; 12.6. Volvo Car Corporation; 12.6.1. Company Overview; 12.6.2. Product Offerings; 12.6.3. Financial Performance; 12.6.4. Recent Initiatives; 12.7. Honda Motors; 12.7.1. Company Overview; 12.7.2. Product Offerings; 12.7.3. Financial Performance; 12.7.4. Recent Initiatives; 12.8. Ford Motor Company; 12.8.1. Company Overview; 12.8.2. Product Offerings; 12.8.3. Financial Performance; 12.8.4. Recent Initiatives; 12.9. NVIDIA Corporation; 12.9.1. Company Overview; 12.9.2. Product Offerings; 12.9.3. Financial Performance; 12.9.4. Recent Initiatives; 12.10. Tencent; 12.10.1. Company Overview; 12.10.2. Product Offerings; 12.10.3. Financial Performance; 12.10.4. Recent Initiatives; 13. Market Research Methodology; 13.1. Primary Market Research; 13.2. Secondary Market Research; 13.3. Assumptions

Adobe Magento??????????????? Introduction Historical trends in Magento adoption;? Magento vs Other Content Management Systems (CMS); Overview of Magento Features and Architecture Usability, flexibility, performance, multi-site, and SEO-friendly;? Extensible through Magento Connect;? What Magento is not good at; Setting up Magento Community Edition vs Enterprise Edition;? On-premise, public cloud, or hosted solution;? Getting support; Magento Websites, Stores, and Store Views Creating multiple storefronts; Magento for Mobile Responsive web design support;? Mobile apps for Magento; Handling Complex Product Types Tiered pricing, shopping cart rules, multiple currencies, etc.; Case study: TBD ; Managing Users and Transactions ; Securing personal and payment information ; Scaling Magento ; The importance of infrastructure ; Planning for database changes, increased network traffic, price adjustments, etc. ; Upgrading Magento ; Case study: TBD ; Integrating Magento with Existing Systems Enterprise Resource Management (ERP);? Inventory Management System (IMS); Future Trends in eCommerce Beyond B2C: Adoption of Magento by distributors and wholesalers (B2B);? Automation of the procurement process;? Will Magento be around in five years?; Troubleshooting ; Summary and Conclusion ; Introduction to Magento Cloud Magento Commerce Cloud vs Shopify vs Salesforce;? Overview of Magento Commerce Cloud features and architecture;? Core benefits and best practices; Getting Started Understanding the technologies and requirements;? Deploying the infrastructure;? Navigating the Cloud Admin UI;? Installing a site from a template; Managing a Cloud Project Using the Project Web Interface and CLI;? Configuring the project and environment settings;? Setting up user access to Cloud projects;? Enabling MFA for SSH access;? Managing branches and disk spaces;? Monitoring performance and logs;? Backing up and restoring environments;? Managing database queries; Configuring a Store Locally Working with Composer, Github, Bitbucket, and CLI tools;? Setting up payment methods (PayPal);? Integrating with Fastly, New Relic, Blackfire, and Sendgrid;? Configuring YAML for building and deployment;? Defining routes, caching, and redirects;? Enabling supported services (MySQL, Redis, ElasticSearch, etc.);? Managing environment configurations (config.php); Securing the Cloud Platform Industry-standard security regulations, certifications, and compliance;? Enabling origin cloaking to prevent DDoS;? Running security scan with Sanguine Security;? Adding two-factor authentication (2FA); Deploying a Store to Cloud Scenario-based, Zero downtime, and Static content deployments;? Building and deploying scripts;? Migrating files and database;? Preparing for staging and production;? Testing deployment and fixing errors;? Running performance and security checks;? Launching the site (Go-live); Maintenance, Upgrades, and Troubleshooting ; Requirements Discovery Overview of Magento features and architecture;? Native vs custom implementations;? Magento themes and extensions; Gathering Requirements Understanding use cases and user stories;? Identifying SMART requirements;? Planning and prioritization;? Requirements gathering methodology in Magento;? Common issues; Defining Requirements Understanding real-world store scenarios;? Using Magento templates;? Defining user stories;? Creating case studies;? Designing workflows; Architecture and Technical Requirements Integration requirements;? Infrastructure requirements; Categories Management Adding Root Categories;? Adding Subcategories;? Managing Categories;? Working with Page Design; Attributes Management What are Product Attributes;? Creating an Attribute;? Creating an Attribute Set;? Assigning Attribute Set to Products;? Managing Attribute Sets; Store Products Adding a Simple Product;? Adding a Configurable Product;? Adding a Grouped Product;? Adding Products to Categories; Inventory Configuration and Management Configuring Inventory Settings;? Managing Product Inventories; Order Management Processing a Purchase Order;? Checkout Process;? Shipping Options and Delivery Tracking;? Tracking Payment and Invoicing;? Managing Customer Ratings and Review; Marketing Promotions Product Catalog Pricing Rules;? Shopping Cart Pricing Rules;? Newsletters and Promotion emails; Customer Management Manage and Group Customers;? Manage Customer Groups; Reports Types of Reports;? Running and Generating Reports;? Refreshing Sales Report Statistics; SEO Best Practices Introduction to Metadata Fields;? Sitemap Management;? Catalog URL Management; Running and Managing Multiple Websites and Stores Solutions for Running and Managing Multiple Websites and Stores;? Best Practices for Running and Managing Multiple Websites and Stores;

Six Sigma Black Belt (50+)???????????? 1.0 Define Phase; 1.1 Overview of Six Sigma;?? 1.1.1 What is Six Sigma;?? 1.1.2 Six Sigma History;?? 1.1.3 Six Sigma Approach Y = f(x);?? 1.1.4 Six Sigma Methodology;?? 1.1.5 Roles & Responsibilities; 1.2 Fundamentals of Six Sigma;?? 1.2.1 Defining a Process;?? 1.2.2 VOC & CTQ's;?? 1.2.3 QFD;?? 1.2.4 Cost of Poor Quality;?? 1.2.5 Pareto Analysis (80:20 rule); 1.3 Lean Six Sigma Projects;?? 1.3.1 Six Sigma Metrics;?? 1.3.2 Rolled Throughput Yield;?? 1.3.3 Business Case & Charter;? ?1.3.4 Project Team Selection;?? 1.3.5 Project Risk Management;?? 1.3.6 Project Planning; 1.4 Lean Fundamentals; 1.4.1 Lean and Six Sigma; 1.4.2 History of Lean; 1.4.3 Seven Deadly Muda; 1.4.4 Five-S (5S); ; 2.0 Measure Phase; 2.1 Process Definition;?? 2.1.1 Cause & Effect Diagram;?? 2.1.2 Cause & Effect Matrix;?? 2.1.3 Process Mapping;?? 2.1.4 Failure Modes & Effects Analysis;?? 2.1.5 Theory of Constraints; 2.2 Six Sigma Statistics;?? 2.2.1 Basic Statistics;?? 2.2.2 Descriptive Statistics;?? 2.2.3 Distributions & Normality;?? 2.2.4 Graphical Analysis; 2.3 MSA;?? 2.3.1 Precision & Accuracy;?? 2.3.2 Bias, Linearity & Stability;?? 2.3.3 Gage R&R;?? 2.3.4 Variable & Attribute MSA; 2.4 Process Capability;?? 2.4.1 Capability Analysis;?? 2.4.2 Concept of Stability;?? 2.4.3 Attribute & Discrete Capability;?? 2.4.4 Monitoring Techniques; ; 3.0 Analyze Phase; 3.1 Patterns of Variation;?? 3.1.1 Multi-Vari Analysis;?? 3.1.2 Classes of Distributions; 3.2 Inferential Statistics;?? 3.2.1 Understanding Inference;?? 3.2.2 Sampling Techniques & Uses;?? 3.2.3 Sample Size;?? 3.2.4 Central Limit Theorem; 3.3 Hypothesis Testing;?? 3.3.1 Goals of Hypothesis Testing;?? 3.3.2 Statistical Significance;?? 3.3.4 Risk; Alpha & Beta;?? 3.3.5 Types of Hypothesis Test; 3.4 Hypothesis Tests: Normal Data;?? 3.4.1 1 & 2 sample t-tests;?? 3.4.2 1 sample variance;?? 3.4.3 One Way ANOVA; 3.5 Hypothesis Tests: Non-Normal Data;?? 3.5.1 Mann-Whitney & Mood’s Median;?? 3.5.2 Kruskal-Wallis;?? 3.5.3 Moods Median;?? 3.5.4 Friedman;?? 3.5.5 1 Sample Sign;?? 3.5.6 1 Sample Wilcoxon;?? 3.5.7 1 and 2 Sample Proportion;?? 3.5.8 Chi-Squared;?? 3.5.9 Test of Equal Variances; ; 4.0 Improve Phase; 4.1 Simple Linear Regression;?? 4.1.1 Correlation;?? 4.1.2 X-Y Diagram;?? 4.1.3 Regression Equations;?? 4.1.4 Residuals Analysis; 4.2 Multiple Regression Analysis;?? 4.2.1 Non-Linear Regression;?? 4.2.2 Multiple Linear Regression;?? 4.2.3 Confidence Intervals;?? 4.2.4 Residuals Analysis;?? 4.2.5 Data Transformation, Box Cox;?? 4.2.6 Stepwise Regression;?? 4.2.7 Logistic Regression; 4.3 Designed Experiments;?? 4.3.1 Experiment Objectives;?? 4.3.2 Experimental Methods;?? 4.3.3 DOE Design Considerations; 4.4 Full Factorial Experiments;?? 4.4.1 2k Full Factorial Designs;?? 4.4.2 Linear & Quadratic Models;?? 4.4.3 Balanced & Orthogonal Designs;?? 4.4.4 Fit, Model & Center Points; 4.5 Fractional Factorial Experiments;?? 4.5.1 Designs;?? 4.5.2 Confounding Effects;?? 4.5.3 Experimental Resolution; ; 5.0 Control Phase; 5.1 Lean Controls;?? 5.1.1 Control Methods for 5S;?? 5.1.2 Kanban;?? 5.1.3 Poka-Yoke; 5.2 Statistical Process Control (SPC);?? 5.2.1 Data Collection for SPC;?? 5.2.2 I-MR Chart;?? 5.2.3 Xbar-R Chart;?? 5.2.4 U Chart;?? 5.2.5 P Chart;?? 5.2.6 NP Chart;?? 5.2.7 X-S chart;?? 5.2.8 CumSum Chart;?? 5.2.9 EWMA Chart;?? 5.2.10 Control Methods;?? 5.2.11 Control Chart Anatomy;?? 5.2.12 Subgroups, Variation, Sampling;?? 5.2.13 Center Line & Control Limits; 5.3 Six Sigma Control Plans;?? 5.3.1 Cost Benefit Analysis;?? 5.3.2 Elements of the Control Plan;?? 5.3.3 Elements of the Response Plan;

Apache NIFI (10)?????????????? What is Apache NiFi?; The core concepts of NiFi; NiFi Architecture; Performance Expectations and Characteristics of NiFi; High Level Overview of Key NiFi Features; Downloading and Installing NiFi; Starting NiFi; For Windows Users; For Linux/macOS users; Installing as a Service; Adding a Processor; Configuring a Processor; Connecting Processors; Starting and Stopping Processors; Other Components; ; ; What Processors are Available; Data Transformation; Routing and Mediation; Database Access; Attribute Extraction; System Interaction; Data Ingestion; Data Egress / Sending Data; Splitting and Aggregation; HTTP; Amazon Web Services; Working With Attributes; Common Attributes; Extracting Attributes; Adding User-Defined Attributes; Routing on Attributes; Expression Language / Using Attributes in Property Values; Monitoring NiFi; Status Bar; Component Statistics; Bulletins; Data Provenance; Event Details; Lineage Graph; ; ; Building a DataFlow; Adding Components to the Canvas; Component Versions; Sorting and Filtering Components; Changing Component Versions; Understanding Version Dependencies; Configuring a Processor; Settings Tab; Scheduling Tab; Properties Tab; Relationships Tab; Comments Tab; Additional Help; Configuring a Process Group; General Tab; Controller Services; Parameters; Parameter Contexts; Adding a Parameter to a Parameter Context; Parameters and Expression Language; Assigning a Parameter Context to a Process Group; Referencing Parameters; Parameter Providers; Accessing Parameters; Using Custom Properties with Expression Language; Controller Services; Adding Management Controller Services; Adding Controller Services for Dataflows; Enabling/Disabling Controller Services; Reporting Tasks; Flow Analysis Rules; Connecting Components; Details Tab; Settings; Changing Configuration and Context Menu Options; Bending Connections; Processor Validation; Site-to-Site; Configure Site-to-Site client NiFi instance; Configure Site-to-Site Server NiFi Instance; Example Dataflow; Execution Engines; Traditional Execution Engine; Stateless Execution Engine; Comparing and Contrasting; Scheduling; Transactionality; Data Durability; Data Ordering; Data Provenance; Site-to-Site; Processor Internal State; Stateless Flow Failure Handling; Failure Ports; Timeouts; Stateless Flow Design Considerations; Single Source, Single Destination; Use Caution When Merging; When to Use Stateless vs Standard Execution Engine; Command and Control of the DataFlow; Starting a Component; Stopping a Component; Terminating a Component’s Tasks; Enabling/Disabling a Component; Remote Process Group Transmission; Individual Port Transmission; Navigating within a DataFlow; Component Linking; Component Alignment; Align Vertically; Align Horizontally; Search Components in DataFlow; Filters; Keywords; Monitoring of DataFlow; Anatomy of a Processor; Anatomy of a Process Group; Anatomy of a Remote Process Group; Queue Interaction; Summary Page; Historical Statistics of a Component; Versioning a DataFlow; Connecting to a NiFi Registry; Version States; Import a Versioned Flow; Start Version Control; Managing Local Changes; Show Local Changes; Revert Local Changes; Commit Local Changes; Change Version; Stop Version Control; Nested Versioned Flows; Parameters in Versioned Flows; Restricted Components in Versioned Flows; Restricted Controller Service Created in Root Process Group; Restricted Controller Service Created in Process Group; Data Provenance; Searching for Events; Details of an Event; Replaying a FlowFile; Viewing FlowFile Lineage; Find Parents; Expanding an Event; Write Ahead Provenance Repository; System Properties; Experimental Warning; Other Management Features; Structure of a NiFi Expression; Expression Language Hierarchy; Expression Language in the Application; Escaping Expression Language; Expression Language Editor; Framework System Properties; Functions; Data Types; Boolean Logic; Structure of a RecordPath; Child Operator; Descendant Operator; Filters; Function Usage; Arrays; Maps; Predicates; Functions; Standalone Functions; ; Prerequisites for Running in a Secure Environment; NiFi CLI; Usage; Property/Argument Handling; Security Configuration; Example - Secure NiFi Registry without Proxied-Entity; Example - Secure NiFi Registry with Proxied-Entity; Interactive Usage; Output; Back-Referencing; Adding Commands; Encrypt-Config Tool; Usage; NiFi; NiFi Registry; Protection Schemes; AES_GCM; HASHICORP_VAULT_TRANSIT; HASHICORP_VAULT_KV; AWS_KMS; AWS_SECRETSMANAGER; Microsoft Azure Key Vault Sensitive Property Providers; GCP_KMS; Examples; NiFi; NiFi Registry; Sensitive Property Key Migration; Export All Flows; Import All Flows; Usage; Expected behaviour; Use case 1: reconfiguring an existing NiFi Registry; Use case 2: data replication

Accredited Operations Specialist (10+)???? Introduction to Management and Operations categories, Review of the most common Management and Operations deficiencies, Differences between operations and maintenance, Factors for deciding who operates and maintains your critical facilities, Staffing development process, Staff qualifications, Organizational structure impacts, Defining roles and responsibilities for staff and support groups, Building a preventive maintenance program and annual schedule, Maintenance management system requirements for tracking activities, Vendor support, Predictive maintenance, Life-cycle planning, Housekeeping, Site policies, Developing methods of procedure and other key documents, Developing a training program and schedule, Vendor training requirements, Capacity and load management, Determining critical capacities and forecasting when limits are reached, How getting operation involved in commissioning leads to operations success, Establishing behaviors early in the development process that will ensure long-term success, Building characteristics impacts on operations, Session 10—Site Location Risk, Defining risks to operational activities posed by natural and man-made factors, Evaluating site risks and determining advantages and disadvantages of multiple site locations, Understanding the dependencies of all the various categories when creating the Management and Operation program

DBT??????? Topic 1: Developing dbt models ● Identifying and verifying any raw object dependencies ● Understanding core dbt materializations ● Conceptualizing modularity and how to incorporate DRY principles ● Converting business logic into performant SQL queries ● Using commands such as run, test, docs and seed ● Creating a logical flow of models and building clean DAGs ● Defining configurations in dbt_project.yml ● Configuring sources in dbt ● Using dbt Packages ● Utilizing git functionality within the development lifecycle ● Creating Python models ● Providing access to users to models with the “grants” configuration Topic 2: Understanding dbt models governance ● Adding contracts to models to ensure the shape of models ● Creating different versions of our models and deprecating the old ones ● Configuring model access Topic 3: Debugging data modeling errors ● Understanding logged error messages ● Troubleshooting using compiled code ● Troubleshooting .yml compilation errors ● Distinguishing between a pure SQL and a dbt issue that presents itself as a SQL issue ● Developing and implementing a fix and testing it prior to merging Topic 4: Managing data pipelines ● Troubleshooting and managing failure points in the DAG ● Using dbt clone ● Troubleshooting errors from integrated tools Topic 5: Implementing dbt tests ● Using generic, singular, custom, and custom generic tests on a wide variety of models and sources ● Testing assumptions for dbt models and sources ● Implementing various testing steps in the workflow Topic 6: Creating and Maintaining? dbt documentation ● Updating dbt docs ● Implementing source, table, and column descriptions in .yml files ● Using macros to show model and data lineage on the DAG Topic 7: Implementing and maintaining external dependencies ● Implementing dbt exposures ● Implementing source freshness Topic 8: Leveraging the dbt state ● Understanding state ● Using dbt retry ● Combining state and result selectors

Katalon (20+)????? Key Features of Katalon Studio, Basic of Katalon Studio Course, Katalon Mobile Testing, Common condition & control statement, Test case creation using manual mode, Solving wait time issue using Katalon Studio, Handle drag & drop for web application, Common validation statement in katalon studio, Handle pop dialog box Katalon integration testing, Handling Multiple Browser Window, Handling Frames,JavaScript Popup, KeyBoard \ Mouse Actions, Runtime Update of TestObject, Assertion and Verification, File Upload, Call Test Cases, Data Driven Testing, Excel Writer, Handling WebTable, Modes in Katalon Studio, Taking Screenshot, Test Suite and collections, Variables, Custom keywords, Logs & Reports, Notifications, Command line executions, Mobile testing, API testing, Katalon Recorder, BDD, Failure Handling, Debugging & Troubleshooting, How to test OT, How to open Email and click on Url for next test case, How to test GUI, How to test Reports and filtration result

Gitlab (10+)???????? Subscribe; Choose a subscription; GitLab.com; GitLab self-managed; GitLab Dedicated; Subscription add-ons; Community programs; Customers Portal; Quarterly reconciliation; Compute quota; Features available to Starter and Bronze subscribers; Install; Requirements; Installation methods; Cloud providers; Offline GitLab; Reference Architectures; Steps after installing; Upgrade GitLab; Install GitLab Runner; Configure GitLab Runner; Administer; Getting started; All feature flags; Authentication and authorization; Configure your installation; Update your settings; Maintain your installation; Secure your installation; Administer users; GitLab Dedicated; Use GitLab; Learn Git; Tutorial: Make your first Git commit; Tutorial: Update Git commit messages; Getting started; Installing Git; Command line Git; Add file to repository; Partial clone; Rebase and force-push; Feature branch workflow; Undo options; Unstage; Git stash; Push options; Roll back commits; Troubleshooting; Manage your organization; Tutorial: Set up your organization; Namespaces; Members; Organization; Groups; Sharing projects and groups; Compliance; Enterprise users; Service accounts; User account options; SSH keys; GitLab.com settings; Organize work with projects; Create a project; Manage projects; Migrate projects; Share projects; Project features and permissions; Project topics; Project and group visibility; Project access tokens; Reserved project and group names; Search; Use a project as a Go package; Tutorial: Build a protected workflow for your project; Troubleshooting; Badges; Code intelligence; Description templates; Deploy keys; Deploy tokens; Import and migrate groups and projects; System notes; Plan and track work; Tutorial: Use GitLab to facilitate Scrum; Labels; Iterations; Milestones; Issues; Issue boards; Comments and threads; Tasks; Requirements; Time tracking; Customer relations (CRM); Wikis; Epics; Roadmaps; Planning hierarchies; Objectives and key results (OKR); Keyboard shortcuts; Quick actions; Markdown; To-Do List; Manage your code; Repositories; Merge requests; Remote development; Use CI/CD to build your application; Getting started; CI/CD YAML syntax reference; Runners; Pipelines; Jobs; CI/CD components; Variables; Pipeline security; Services; Auto DevOps; Testing; SSH keys; ChatOps; Mobile DevOps; Google Cloud integration; External repository integrations; Secure your application; Getting started; Application security; Security Configuration; Container Scanning; Dependency Scanning; Comparison: Dependency Scanning and Container Scanning; Dependency List; Continuous Vulnerability Scanning; Static Application Security Testing; Infrastructure as Code (IaC) Scanning; Secret detection; Dynamic Application Security Testing (DAST); API Security; Web API Fuzz Testing; Coverage-guided fuzz testing; Breach and Attack Simulation (deprecated); Security Dashboard; Offline environments; Vulnerability Report; Vulnerability Page; Vulnerability severity levels; GitLab Advisory Database; CVE ID requests; Policies; Security scanner integration; Secure and Govern glossary; Deploy and release your application; Environments and deployments; Releases; Packages & Registries; Review Apps; Feature flags; GitLab Pages; Manage your infrastructure; Infrastructure as Code; Create Kubernetes clusters; Connect Kubernetes clusters; Runbooks; Monitor application performance; Error tracking; Distributed tracing; Metrics; Logs; Incident management; Monitor runner performance; Analyze GitLab usage; Analytics dashboards; CI/CD analytics; Code review analytics; Contribution analytics; Contributor analytics; DevOps adoption by instance; DevOps adoption by group; DORA metrics; Insights; Issue analytics; Merge request analytics; Product analytics; Productivity analytics; Repository analytics for projects; Repository analytics for groups; Usage trends; Value stream analytics; Value streams dashboard; Instance-level analytics; Metrics; Tutorial: Set up an analytics-powered project; Tutorial: Set up product analytics in a GitLab Pages website project; Experiment, Beta, GA support; Find your GitLab version; GitLab Duo; Code Suggestions; Ask questions with Chat; GitLab Duo examples; Extend; Integrations; Webhooks; REST API; GraphQL API; OAuth 2.0 identity provider API; Editor and IDE extensions

Data Architecture???????????? ERDs 101s

Data Platforms

Data Modelling - PDM

Data Modelling - Graph Data Modelling

Data Store - Data Vaults, Modern Cloud Data Warehouse

Data Store - Cloud Data Lake

Data Store - Data Mesh, Data Fabric

Data Management, Data Governance Org Structure, Operating Model

Data Integration

Metadata Management

Business Glossary, Data Catalog and Lineage

Data Quality

Reference and Master Data Management

Data Access and Ownership

Data Privacy and Protection

Data Security & Compliance Designs

Business Intelligence, Analytics Reporting, Data Visualization

Document and Content Management

Data Monitoring, Optimization and Cost Benefit

Data Center??????? 1.IT infrastructure Overview; ·IT Infrastructure Overview; ·Introduction to IT Infrastructure; ·Cost of Cloud Vs On Premise; 2.Cloud Basics Recap; a.Cloud Concepts - Principles of cloud computing ; b.Create an Azure account ; c.Core Cloud Services - Introduction to Azure ; d.Core Cloud Services - Azure architecture and service guarantees ; e.Core Cloud Services - Manage services with the Azure portal ; f.Core Cloud Services - Azure compute options ; g.Core Cloud Services - Azure data storage options ; h.Core Cloud Services - Azure networking options ; i.Security, responsibility, and trust in Azure ; j.Apply and monitor infrastructure standards with Azure Policy ; k.Control and organize Azure resources with Azure Resource Manager ; l.Predict costs and optimize spending for Azure; 3.Networking Basics Recap; a.Overview ; b.Types of Networking; c.Network Topologies; d.Protocols; e.Network Media; f.Network Cabling; g.Crimping of twisted pair cable; h.Patch Panel; i.Network Devices; j.Networking Devices; k.Common Networking Devices; l.IP addressing and Subnetting part -1; m.IP addressing and Subnetting part -2; n.IP Address - IPv4 vs IPv6 Tutorial; o.UnderStanding IP Classes; p.Subnetting; q.The OSI reference model; r.Headers ; s.OSI Model Explained ; t.What is IP Header? ; 4.Networking Admin ; a.Working with Packet tracer and GNS3; b.Introduction to Cisco IOS; c.Routing; d.Switching; e.Security and Firewall; 5.Wintel Basics Recap ; a.Creatinga Virtual Machine ; b.Types of Networking ; c.How to Install Windows Operating system; d.Computer Hardware Basics; e.Windows 10; f.Windows 10 Versions and Releases; g.Windows 10 Desktop; h.Windows and One Drive; i.Windows 10and Edge; j.Windows 10 and Cortana; k.Windows 10 Getting Help; l.Windows 10 Start Menu; m.Windows 10 Installation; n.Windows 10 Administration; o.Windows Boot Process; p.Windows 10-Minimum Requirement; q.Enabling Hyper-v and Win 10 Installation; r.Windows 10 Hyper-V; s.Operating System Properties; t.User Management; u.Creating User from GUI; v.Create Group from GUI; w.Windows Updates; x.Network Configuration; y.Network Configuration; z.Network Configuration; aa.Control Panel Items; bb.Control Panel Items; cc.Basic Troubleshooting; dd.Performance monitor; ee.Performance monitor; ff.Event Viewer; gg.Remote Management; hh.Remote Management; 6.Windows Administration; a.Introduction to Server Operating System; b.Active Directory Terms; c.Introduction to Active Directory; d.Active Directory in a nutshell; e.Forests and Trees; f.Installation Methods; g.PostInstallation; h.Creating a Domain; i.Joining Client to Domain; j.User and Users Profile; k.Standalone and Blade Server; l.Create and Install Windows 2016 Server; m.NTFS Permissions; n.NTFS Permissions; o.NTFS Explicit and Inherited Permissions ; p.Advanced NTFS Permissions; q.Domain Name System; r.What is DNS?; s.Remote Desktop Services; t.Installing Remote Desktop Services; u.Windows Native Tools; v.Performance Monitor; w.Event Viewer; x.Disk Management; y.Windows Backup; z.Windows Server Backup; 7.Linux Basics; a.Introduction to Unix; b.UNIX_SystemAdministration_1; c.Linux Command-Line for Beginners: ; d.Linux Sysadmin Basic Commands; e.UNIX_SystemAdministration_2; f.Shell Features -- Pipes and Redirection; g.Filtering Output and Finding Things; h.Process Management; i.Process Management - ps command ; j.Process Management - top command; k.Process Management - Jobs command ; l.Process Management - Kill command; m.UNIX Backup Tools; n.Editing files using vi editor; o.Using vi The basics; 8.Linux Admin ; a.Redhat Enterprise Linux(RHEL) 7 Installation ; b.System Initialization and Services; c.Understanding the Linux Boot Process; d.RHEL 7 and basic systemd commands; e.User Administration ; f.Linux File Permissions: Commands with Examples; g.Network Configuration; h.Performing Remote Connections And File Transfers; i.Networking Configuration in RHEL 7; j.Filesystem Management ; k.Linux Partitions and File System Layouts; l.How To Create a Partition In Redhat 7 step by step; m.How to Create and Delete a Disk Partition in Linux using the parted Command; n.Logical Volume Manager; o.Concept of LVM in Linux; p.Logical Volume Management (LVM); q.Package Management using rpm ; r.Manage RPMs with RedHat Package Manager IN RHEL 7; 9.ITIL; a.Introduction to ITIL and ITSM; b.What is ITIL? ; c.ITSM Introduction — ITSM ; d.Why ITSM — ITSM ; e.Basic concept of ITIL4 and RACI; f.What Is ITIL V4?; g.RACI Matrix; h.Difference between ITIL v3 and ITIL 4; i.Service Value System and Framework v0.1; j.ITIL v4 Service Value Chain Defined; k.Service Level Management and Change Control v0.1; l.SLM Example - Explained using Pizza Delivery; m.What is change Management; n.What Is Change Management Flow ; o.Change Management- Example; p.Service Management Practice Overview v0.1; q.Event Management; r.Incident Management v0.1; s.Incident Management - Explained; t.Priortization; u.Problem Management; v.Problem Management - Explained; w.Service Request Fulfillment; 10.Database Basics; a.Introduction to Database Management System (DBMS) ; b.Introduction to Relational Database Management System (RDBMS); c.Retrieving Data Using the SQL SELECT Statement; d.The SQL SELECT Statement; e.Restricting and Sorting Data; f.Restricting and Sorting Data; g.Using Single-Row Functions toCustomize Output; h.Using Single-Row Functions; i.Reporting Aggregated Data Using the Group Functions; j.Using Group functions; k.Displaying Datafrom Multiple Tables Using Joins; l.Get Data from Multiple Tables; m.Using Sub queries to Solve Queries; n.Subqueries to Solve Queries; o.Manipulating Data; p.Manipulating Data Questions; q.Using DDL Statements to Create and Manage Tables; r.Using DDL Statements; 11.Storage Basics; a.Storage Basics; b.Storage Topologies; c.Storage Protocols; d.Storage Area Network; e.Storage Terms; f.NAS Vs SAN; g.What is RAID; h.Raid Explained in Video; i.Raid Levels; j.Disk Management; k.Manage Storage Spaces; l.What is Bitlocker; m.RAID 0 in Windows 10; n.Windows Dynamic Disks; o.Troubleshooting Disk Management; p.How to Use Storage Space in Win 10; q.FreeNAS; r.FreeNAS Storage; s.FreeNAS Pool; 12.Backup Basics; a.Introduction to backup; b.Granularity of backup; c.Backups, Redundancy, and the Cloud; d.Backup Software; e.Symantec Netbackup 7.5 Overview; f.Networker Fundamentals - Free e-Learning

Splash BI (20+)?? Connecting to splashBI, Connect & sign on to splashBI Build a simple report, build report, apply user defined filters, view report, edit report, format table, add sort, edit existing filters, rename report, submit report, open report in excel, save and close report

Databricks Certified

Data Engineer Associate Section 1: Databricks Lakehouse Platform; ● Describe the relationship between the data lakehouse and the data warehouse.; ● Identify the improvement in data quality in the data lakehouse over the data lake.; ● Compare and contrast silver and gold tables, which workloads will use a bronze table as a; source, which workloads will use a gold table as a source.; ● Identify elements of the Databricks Platform Architecture, such as what is located in the; data plane versus the control plane and what resides in the customer’s cloud account; ● Differentiate between all-purpose clusters and jobs clusters.; ● Identify how cluster software is versioned using the Databricks Runtime.; ● Identify how clusters can be filtered to view those that are accessible by the user.; ● Describe how clusters are terminated and the impact of terminating a cluster.; ● Identify a scenario in which restarting the cluster will be useful.; ● Describe how to use multiple languages within the same notebook.; ● Identify how to run one notebook from within another notebook.; ● Identify how notebooks can be shared with others.; ● Describe how Databricks Repos enables CI/CD workflows in Databricks.; ● Identify Git operations available via Databricks Repos.; ● Identify limitations in Databricks Notebooks version control functionality relative to Repos.; Section 2: ELT with Apache Spark; ● Extract data from a single file and from a directory of files; ● Identify the prefix included after the FROM keyword as the data type.; ● Create a view, a temporary view, and a CTE as a reference to a file; ● Identify that tables from external sources are not Delta Lake tables.; ● Create a table from a JDBC connection and from an external CSV file; ● Identify how the count_if function and the count where x is null can be used; ● Identify how the count(row) skips NULL values.; ● Deduplicate rows from an existing Delta Lake table.; ● Create a new table from an existing table while removing duplicate rows.; ● Deduplicate a row based on specific columns.; ● Validate that the primary key is unique across all rows.; ● Validate that a field is associated with just one unique value in another field.; ● Validate that a value is not present in a specific field.; ● Cast a column to a timestamp.; ● Extract calendar data from a timestamp.; ● Extract a specific pattern from an existing string column.; ● Utilize the dot syntax to extract nested data fields.; ● Identify the benefits of using array functions.; ● Parse JSON strings into structs.; ● Identify which result will be returned based on a join query.; ● Identify a scenario to use the explode function versus the flatten function; ● Identify the PIVOT clause as a way to convert data from wide format to a long format.; ● Define a SQL UDF.; ● Identify the location of a function.; ● Describe the security model for sharing SQL UDFs.; ● Use CASE/WHEN in SQL code.; ● Leverage CASE/WHEN for custom control flow.; Section 3: Incremental Data Processing; ● Identify where Delta Lake provides ACID transactions; ● Identify the benefits of ACID transactions.; ● Identify whether a transaction is ACID-compliant.; ● Compare and contrast data and metadata.; ● Compare and contrast managed and external tables.; ● Identify a scenario to use an external table.; ● Create a managed table.; ● Identify the location of a table.; ● Inspect the directory structure of Delta Lake files.; ● Identify who has written previous versions of a table.; ● Review a history of table transactions.; ● Roll back a table to a previous version.; ● Identify that a table can be rolled back to a previous version.; ● Query a specific version of a table.; ● Identify why Zordering is beneficial to Delta Lake tables.; ● Identify how vacuum commits deletes.; ● Identify the kind of files Optimize compacts.; ● Identify CTAS as a solution.; ● Create a generated column.; ● Add a table comment.; ● Use CREATE OR REPLACE TABLE and INSERT OVERWRITE; ● Compare and contrast CREATE OR REPLACE TABLE and INSERT OVERWRITE; ● Identify a scenario in which MERGE should be used.; ● Identify MERGE as a command to deduplicate data upon writing.; ● Describe the benefits of the MERGE command.; ● Identify why a COPY INTO statement is not duplicating data in the target table.; ● Identify a scenario in which COPY INTO should be used.; ● Use COPY INTO to insert data.; ● Identify the components necessary to create a new DLT pipeline.; ● Identify the purpose of the target and of the notebook libraries in creating a pipeline.; ● Compare and contrast triggered and continuous pipelines in terms of cost and latency; ● Identify which source location is utilizing Auto Loader.; ● Identify a scenario in which Auto Loader is beneficial.; ● Identify why Auto Loader has inferred all data to be STRING from a JSON source; ● Identify the default behavior of a constraint violation; ● Identify the impact of ON VIOLATION DROP ROW and ON VIOLATION FAIL UPDATEfor a; constraint violation; ● Explain change data capture and the behavior of APPLY CHANGES INTO; ● Query the events log to get metrics, perform audit loggin, examine lineage.; ● Troubleshoot DLT syntax: Identify which notebook in a DLT pipeline produced an error,; identify the need for LIVE in create statement, identify the need for STREAM in from clause.; Section 4: Production Pipelines; ● Identify the benefits of using multiple tasks in Jobs.; ● Set up a predecessor task in Jobs.; ● Identify a scenario in which a predecessor task should be set up.; ● Review a task's execution history.; ● Identify CRON as a scheduling opportunity.; ● Debug a failed task.; ● Set up a retry policy in case of failure.; ● Create an alert in the case of a failed task.; ● Identify that an alert can be sent via email.; Section 5: Data Governance; ● Identify one of the four areas of data governance.; ● Compare and contrast metastores and catalogs.; ● Identify Unity Catalog securables.; ● Define a service principal.; ● Identify the cluster security modes compatible with Unity Catalog.; ● Create a UC-enabled all-purpose cluster.; ● Create a DBSQL warehouse.; ● Identify how to query a three-layer namespace.; ● Implement data object access control; ● Identify colocating metastores with a workspace as best practice.; ● Identify using service principals for connections as best practice.; ● Identify the segregation of business units across catalog as best practice.

Databricks Certified

Data Engineer Professional?????????? Section 1: Databricks Tooling; ● Explain how Delta Lake uses the transaction log and cloud object storage to guarantee; atomicity and durability; ● Describe how Delta Lake’s Optimistic Concurrency Control provides isolation, and which; transactions might conflict; ● Describe basic functionality of Delta clone.; ● Apply common Delta Lake indexing optimizations including partitioning, zorder, bloom; filters, and file sizes; ● Implement Delta tables optimized for Databricks SQL service; ● Contrast different strategies for partitioning data (e.g. identify proper partitioning columns; to use); Section 2: Data Processing (Batch processing, Incremental processing, and Optimization); ● Describe and distinguish partition hints: coalesce, repartition, repartition by range, and; rebalance; ● Contrast different strategies for partitioning data (e.g. identify proper partitioning columns; to use); ● Articulate how to write Pyspark dataframes to disk while manually controlling the size of; individual part-files.; ● Articulate multiple strategies for updating 1+ records in a spark table (Type 1); ● Implement common design patterns unlocked by Structured Streaming and Delta Lake.; ● Explore and tune state information using stream-static joins and Delta Lake; ● Implement stream-static joins; ● Implement necessary logic for deduplication using Spark Structured Streaming; ● Enable CDF on Delta Lake tables and re-design data processing steps to process CDC; output instead of incremental feed from normal Structured Streaming read; ● Leverage CDF to easily propagate deletes; ● Demonstrate how proper partitioning of data allows for simple archiving or deletion of data; ● Articulate, how “smalls” (tiny files, scanning overhead, over partitioning, etc) induce; performance problems into Spark queries; Section 3: Data Modeling; ● Describe the objective of data transformations during promotion from bronze to silver; ● Discuss how Change Data Feed (CDF) addresses past difficulties propagating updates and; deletes within Lakehouse architecture; ● Apply Delta Lake clone to learn how shallow and deep clone interact with source/target; tables.; ● Design a multiplex bronze table to avoid common pitfalls when trying to productionalize; streaming workloads.; ● Implement best practices when streaming data from multiplex bronze tables.; ● Apply incremental processing, quality enforcement, and deduplication to process data from; bronze to silver; ● Make informed decisions about how to enforce data quality based on strengths and; limitations of various approaches in Delta Lake; ● Implement tables avoiding issues caused by lack of foreign key constraints; ● Add constraints to Delta Lake tables to prevent bad data from being written; ● Implement lookup tables and describe the trade-offs for normalized data models; ● Diagram architectures and operations necessary to implement various Slowly Changing; Dimension tables using Delta Lake with streaming and batch workloads.; ● Implement SCD Type 0, 1, and 2 tables; Section 4: Security & Governance; ● Create Dynamic views to perform data masking; ● Use dynamic views to control access to rows and columns; Section 5: Monitoring & Logging; ● Describe the elements in the Spark UI to aid in performance analysis, application debugging,; and tuning of Spark applications.; ● Inspect event timelines and metrics for stages and jobs performed on a cluster; ● Draw conclusions from information presented in the Spark UI, Ganglia UI, and the Cluster UI; to assess performance problems and debug failing applications.; ● Design systems that control for cost and latency SLAs for production streaming jobs.; ● Deploy and monitor streaming and batch jobs

Tableau (50+)???? FILTERING, SORTING & GROUPING, Advanced options for filtering and hiding, The various types of filters and how and when each executes in sequence, Data security considerations of specific filters, Specific recommendations on how to use, or not to use, various filter options, Understanding your many options for ordering and grouping your data: Sort, Groups, Bins, Sets, The various types of sets and use cases for each, Understanding how these options inter-relate, WORKING WITH CALCULATED DATA AND STATISTICS, A Quick Review of Basic Calculations, Arithmetic Calculations, String Manipulation, Date Calculations, Quick Table Calculations, Custom Aggregations, Custom Calculated Fields, Logic and Conditional Calculations, Conditional Filters, Level of Detail Calculations, Fixed LODs, Include LODs, Exclude LODs, Advanced Table Calculations, Understanding Partitioning and Addressing, Differences between visual layout of data and results of table calculations, Approaches for understanding what is happening in table calculations, Calculate on Results of Table Calculations, Complex Calculations, Difference from Average, Secondary Table Calculations, Understanding where Calculations Occur, Statistics, Reference / Trend Lines, Statistical Calculations, Cohort Analysis, Moving Averages, From a fixed point, In a rolling window, Working with Dates and Times, Continuous versus Discrete Dates, Dates and Times, Reference Dates, BUILDING ADVANCED CHART TYPES AND VISUALIZATIONS, Pareto Chart, Horizon Chart

Slack Development????????? Workshop 1 - Introduction to the Slack Platform; Workshop 2 - Plan your app: Design your workflows; Workshop 3 - Plan your app: Design a great user experience; Workshop 4 - Plan your app: Design for security; Workshop 5 - Plan your app: Design for scale; Workshop 6 - Build your app: Tools; Workshop 7 - Hands-on practice (Optional); Workshop 8 - Build your app: Spotlight on APIs for managing your Slack; Workshop 9 - Distribute your app

Oracle EBS (20+)?????????????? Develop - create users, create application users, create oracle e-business suite, update oracle e-business suite, configure e-business suite asserter, configure and deploy, create a wallet, update the e-business suite asserter, define the data source, configure hostname verification, deploy the e-business asserter, Test, validate the integration, service, monitor e-business suite asserter, collect diagnostic data

Magento????????????? Introduction

?

Historical trends in Magento adoption

Magento vs Other Content Management Systems (CMS)

Overview of Magento Features and Architecture

?

Usability, flexibility, performance, multi-site, and SEO-friendly

Extensible through Magento Connect

What Magento is not good at

Setting up Magento

?

Community Edition vs Enterprise Edition

On-premis, public cloud, or hosted solution

Getting support

Magento Websites, Stores, and Store Views

?

Creating multiple storefronts

Magento for Mobile

?

Responsive web design support

Mobile apps for Magento

Handling Complex Product Types

?

Tiered pricing, shopping cart rules, multiple currencies, etc.

Case study: TBD

?

Managing Users and Transactions

?

Securing personal and payment information

Scaling Magento

?

The importance of infrastructure

Planning for database changes, increased network traffic, price adjustments, etc.

Upgrading Magento

?

Case study: TBD

?

Integrating Magento with Existing Systems

?

Enterprise Resource Management (ERP)

Inventory Management System (IMS)

Future Trends in eCommerce

?

Beyond B2C: Adoption of Magento by distributors and wholesalers (B2B)

Automation of the procurement process

Will Magento be around in five years?

Troubleshooting

?

Summary and Conclusion

Data Protection? Introduction to Privacy - Core Privacy Principles and Privacy Methodology - Overview

Privacy Program Assessment and Roadmap + Consent and Preference Management Overview

Requirements Rationalization - Concept and Details, Engagement and Deliverable Walk through

Data Protection Impact Assessment (DPIA) - Overview and Walkthrough

Records of Processing Activities (ROPA) - Overview and Walkthrough

Privacy By Design - Overview and Walkthrough

Introduction to Privacy Technologies and Deep-dive into OneTrust DPIA module

Overview of DSAR and Demonstration in OneTrust

Introduction to Data Protection

Introduction to Encryption concept and tools

Introduction to DLP and Understanding the Approach and Methodology

DLP Technical Architecture + Managed DLP Service + DLP Demo

Introduction to Information Rights Management, Data Discovery and Data Classification

Introduction to Cloud Access Security Broker (CASB)

Introduction to Data Access Governance (DAG) and Managed Data Access Governance (mDAG)

Deloitte sales process and artifacts including introduction to DAP, CP3, Mercury

Data Protection Lab Demo

Session on Formatting Skills

Responsible GenAI

Digital Trust & Online Protection

Database Activity Monitoring

Magento Commerce Cloud?????????? Introduction

?

Magento Commerce Cloud vs Shopify vs Salesforce

Overview of Magento Commerce Cloud features and architecture

Core benefits and best practices

Getting Started

?

Understanding the technologies and requirements

Deploying the infrastructure

Navigating the Cloud Admin UI

Installing a site from a template

Managing a Cloud Project

?

Using the Project Web Interface and CLI

Configuring the project and environment settings

Setting up user access to Cloud projects

Enabling MFA for SSH access

Managing branches and disk spaces

Monitoring performance and logs

Backing up and restoring environments

Managing database queries

Configuring a Store Locally

?

Working with Composer, Github, Bitbucket, and CLI tools

Setting up payment methods (PayPal)

Integrating with Fastly, New Relic, Blackfire, and Sendgrid

Configuring YAML for building and deployment

Defining routes, caching, and redirects

Enabling supported services (MySQL, Redis, ElasticSearch, etc.)

Managing environment configurations (config.php)

Securing the Cloud Platform

?

Industry-standard security regulations, certifications, and compliance

Enabling origin cloaking to prevent DDoS

Running security scan with Sanguine Security

Adding two-factor authentication (2FA)

Deploying a Store to Cloud

?

Scenario-based, Zero downtime, and Static content deployments

Building and deploying scripts

Migrating files and database

Preparing for staging and production

Testing deployment and fixing errors

Running performance and security checks

Launching the site (Go-live)

Maintenance, Upgrades, and Troubleshooting

?

Summary and Next Steps

Imperva Data Security Fabric (DSF)??????????? ????????????? Database Activity Monitoring (DAM)

????????????? Data Risk Analytics (DRA)

????????????? DSF Hub (Sonar)

????????????? Cloud Data Security

Art of Story Telling (10+) ????????????? Building Vision & Strategy; Building Your Executive Presence; Building Strategic Acumen; Mentoring and Developing Future Leaders; Developing Innovation & Agility; Leading in the 4th Industrial Revolution; Strengthening Emotional Intelligence

Cyber Security in AI & ML???????????? Introduction to Cybersecurity Basics

????????????? Overview of cybersecurity fundamentals

????????????? Common cybersecurity threats and vulnerabilities

????????????? Importance of cybersecurity in AI and ML applications

Introduction to AI and ML

????????????? Basic concepts of artificial intelligence and machine learning

????????????? Applications of AI and ML in various industries

????????????? Potential security risks associated with AI and ML technologies.

?

Security Risks in AI and ML Systems

????????????? Data poisoning attacks

????????????? Model evasion attacks

????????????? Adversarial attacks

????????????? Privacy concerns in AI and ML

?

Secure Development Practices

????????????? Secure coding practices for AI and ML systems

????????????? Model validation and verification techniques

????????????? Secure deployment strategies

?

Threat Detection and Prevention

????????????? Intrusion detection systems for AI and ML

????????????? Anomaly detection techniques

????????????? Threat intelligence and threat hunting in AI systems

?

Data Security in AI and ML

????????????? Data encryption techniques

????????????? Secure data storage and transmission

????????????? Data anonymization and de-identification methods

?

Securing AI Infrastructure

????????????? Securing cloud-based AI services

????????????? Containerization and microservices security

????????????? Secure configuration management

?

Compliance and Regulatory Considerations

????????????? Overview of relevant regulations (e.g., GDPR, CCPA)

????????????? Compliance requirements for AI and ML systems

????????????? Ethical considerations in AI and ML security

?

Incident Response and Recovery

????????????? Incident response planning for AI and ML security incidents

????????????? Recovery strategies for compromised AI and ML systems

????????????? Post-incident analysis and lessons learned

?

Future Trends and Advanced Topics

????????????? Emerging threats in AI and ML security

????????????? Advanced techniques for securing AI and ML systems

????????????? Research directions in AI and ML security

Data StoryTelling (20+)??? understand the context; choose an effective visual; identify & eliminate clutter; focus attention; think like a designer; tell a story; practice more with Cole; practice more on your own; practice more at work; closing words

Lean Six Sigma Black Belt????????????? 1.0 Define Phase; 1.1 Overview of Six Sigma; 1.1.1 What is Six Sigma; 1.1.2 Six Sigma History; 1.1.3 Six Sigma Approach Y = f(x); 1.1.4 Six Sigma Methodology; 1.1.5 Roles & Responsibilities; 1.2 Fundamentals of Six Sigma; 1.2.1 Defining a Process; 1.2.2 VOC & CTQ's; 1.2.3 QFD; 1.2.4 Cost of Poor Quality; 1.2.5 Pareto Analysis (80:20 rule); 1.3 Lean Six Sigma Projects; 1.3.1 Six Sigma Metrics; 1.3.2 Rolled Throughput Yield; 1.3.3 Business Case & Charter; 1.3.4 Project Team Selection; 1.3.5 Project Risk Management; 1.3.6 Project Planning; 1.4 Lean Fundamentals; ; 1.4.1 Lean and Six Sigma; 1.4.2 History of Lean; 1.4.3 Seven Deadly Muda; 1.4.4 Five-S (5S); ; ; 2.0 Measure Phase; 2.1 Process Definition; 2.1.1 Cause & Effect Diagram; 2.1.2 Cause & Effect Matrix; 2.1.3 Process Mapping; 2.1.4 Failure Modes & Effects Analysis; 2.1.5 Theory of Constraints; 2.2 Six Sigma Statistics; 2.2.1 Basic Statistics; 2.2.2 Descriptive Statistics; 2.2.3 Distributions & Normality; 2.2.4 Graphical Analysis; 2.3 MSA; 2.3.1 Precision & Accuracy; 2.3.2 Bias, Linearity & Stability; 2.3.3 Gage R&R; 2.3.4 Variable & Attribute MSA; 2.4 Process Capability; 2.4.1 Capability Analysis; 2.4.2 Concept of Stability; 2.4.3 Attribute & Discrete Capability; 2.4.4 Monitoring Techniques; ; ; 3.0 Analyze Phase; 3.1 Patterns of Variation; 3.1.1 Multi-Vari Analysis; 3.1.2 Classes of Distributions; 3.2 Inferential Statistics; 3.2.1 Understanding Inference; 3.2.2 Sampling Techniques & Uses; 3.2.3 Sample Size; 3.2.4 Central Limit Theorem; 3.3 Hypothesis Testing; 3.3.1 Goals of Hypothesis Testing; 3.3.2 Statistical Significance; 3.3.4 Risk; Alpha & Beta; 3.3.5 Types of Hypothesis Test; 3.4 Hypothesis Tests: Normal Data; 3.4.1 1 & 2 sample t-tests; 3.4.2 1 sample variance; 3.4.3 One Way ANOVA; 3.5 Hypothesis Tests: Non-Normal Data; 3.5.1 Mann-Whitney & Mood’s Median; 3.5.2 Kruskal-Wallis; 3.5.3 Moods Median; 3.5.4 Friedman; 3.5.5 1 Sample Sign; 3.5.6 1 Sample Wilcoxon; 3.5.7 1 and 2 Sample Proportion; 3.5.8 Chi-Squared; 3.5.9 Test of Equal Variances; ; ; 4.0 Improve Phase; 4.1 Simple Linear Regression; 4.1.1 Correlation; 4.1.2 X-Y Diagram; 4.1.3 Regression Equations; 4.1.4 Residuals Analysis; 4.2 Multiple Regression Analysis; 4.2.1 Non-Linear Regression; 4.2.2 Multiple Linear Regression; 4.2.3 Confidence Intervals; 4.2.4 Residuals Analysis; 4.2.5 Data Transformation, Box Cox; 4.2.6 Stepwise Regression; 4.2.7 Logistic Regression; 4.3 Designed Experiments; 4.3.1 Experiment Objectives; 4.3.2 Experimental Methods; 4.3.3 DOE Design Considerations; 4.4 Full Factorial Experiments; 4.4.1 2k Full Factorial Designs; 4.4.2 Linear & Quadratic Models; 4.4.3 Balanced & Orthogonal Designs; 4.4.4 Fit, Model & Center Points; 4.5 Fractional Factorial Experiments; 4.5.1 Designs; 4.5.2 Confounding Effects; 4.5.3 Experimental Resolution; ; ; 5.0 Control Phase; 5.1 Lean Controls; ; 5.1.1 Control Methods for 5S; 5.1.2 Kanban; 5.1.3 Poka-Yoke; 5.2 Statistical Process Control (SPC); 5.2.1 Data Collection for SPC; 5.2.2 I-MR Chart; 5.2.3 Xbar-R Chart; 5.2.4 U Chart; 5.2.5 P Chart; 5.2.6 NP Chart; 5.2.7 X-S chart; 5.2.8 CumSum Chart; 5.2.9 EWMA Chart; 5.2.10 Control Methods; 5.2.11 Control Chart Anatomy; 5.2.12 Subgroups, Variation, Sampling; 5.2.13 Center Line & Control Limits; 5.3 Six Sigma Control Plans; 5.3.1 Cost Benefit Analysis; 5.3.2 Elements of the Control Plan; 5.3.3 Elements of the Response Plan

Lean Six Sigma Green Belt???????????

Lean Six Sigma Yellow Belt ??????????

ICS110 - ICS Managers Security (30+)?????? Part 1: Background (what is an ICS, what are the threats and vulnerabilities); ; ICS description and terminology; ICS Vs IT. Differences and similarities; ICS Attack Surface; Introduction to ICS Security Risk; Known ICS security incidents; ; Part 2: Securing ICS (what can be done to secure an ICS); ; Planning to reduce the security risk; Introduction to Cyber Incident Response; Operational security; Vendor management; Building security into the procurement processes

ICS203 - ICS Practitioners Security (30+)? Module 1: Background (what is an ICS, what are the threats and vulnerabilities):; ; ICS description and terminology; ICS Vs IT. Differences and similarities; Threats to ICS; ICS vulnerabilities; Known ICS security incidents; Module 2: Securing ICS (what can be done to secure an ICS):; ; Secure architecture and design; Securing existing and legacy systems; Security risk management; Operational security; Vendor management; Building security into procurement processes; Module 3: Security Incident Management (what to do when the worst happens and roles and responsibilities):; ; Security incident identification; Security incident response; Security incident recovery; Planning and preparation; Module 4: Cyber Incident Exercise; ; Cyber interactive exercise

ICS405 - Securing ICS: Becoming an Industrial Cyber Security Professional (30+)???? ICS Basics (for non-OT personnel); Cybersecurity Essentials (for ICS personnel); ICS Security Governance and security risk; ICS Architecture; ICS Hardening; Access Management; Physical Security; ICS Security Assessments; ICS Security Monitoring; Incident Response; GIAC GICSP Exam Preparation

ICS202 - ICS Incident Response Fundamentals (30+)?????????? Module 1: Introduction to the Incident Handling Process; ; What is an Incident and an Event and how do they differ?; What is Incident Response?; The challenges of ICS Incident Response; The IR lifecycle; Module 2: Preparation; ; Obtaining Leadership support; ICS IR Plans; Who gets involved?; What makes the CSIRT?; Jump Kit and Grab Bag; Module 3: Identification; ; Classification Levels; Managing the Information Flow; Evidence; Module 4: Containment; ; What is Containment?; Short-term Containment; Long-term Containment; Investigations; Module 5: Eradication; ; The main aims of eradication; Remove or restore?; Improvement after; Module 6: Recovery; ; Recovery Objectives; Validation; Post-Incident Monitoring; Module 7: Lessons Learned; ; The Report; Management Considerations; Bringing it all together

Metaverse (10+)?????????????? What is the Metaverse?, Metaverse technology (Gaming, Web3, Blockchain, and NFTs), AR, VR, and Mixed Reality, Vendors, tools, and software (Unreal Engine, Unity, Blender, etc.), Programming languages for Metaverse (C#, C++, Javascript, Python, Solidity, and Rust), Use cases, scenarios, and business ideas, 3D graphics and interaction design with Unity3D, Creating realistic social interactions in VR, Creating 3D characters and setting with Blender, Blockchain, Gaming, and Web3 in Metaverse,? Non-Fungible Token (NFT) in the Metaverse, The Future of Metaverse

Md Aslam

Attended ASLAM Formazione

1 周

ASLAM

回复
Md Aslam

Attended ASLAM Formazione

1 周

Aslam

  • 该图片无替代文字
回复

要查看或添加评论,请登录

Dr. Saurabh Pramanick的更多文章

  • Training Program Topics - List 4

    Training Program Topics - List 4

    Working with Hugging Face with Hugging Face Introduction to Hugging Face What are Large Language Models? Use cases for…

  • Training Program Topics - List 3

    Training Program Topics - List 3

    Introduction to Julia Julia basics with Julia Using the console Julia as a calculator Printing Variables Valid variable…

  • Training Program Offerings - List 2

    Training Program Offerings - List 2

    DL0 - Data Leadership ? Data Leadership Framework (DLF) ? Data Architecture ? Data Governance ? Metadata and Master…

  • Digital Personal Data Protection Bill 2023, India

    Digital Personal Data Protection Bill 2023, India

    Today on 7 August, 23, The Digital Personal Data Protection Bill 2023 was passed in the Lok Sabha. The bill seeks to…

    1 条评论
  • EU-US Data Privacy Framework

    EU-US Data Privacy Framework

    On 10 July 2023, the European Commission published its final Adequacy Decision for EU-US data transfers. The draft…

  • Future Trends in Metadata Management

    Future Trends in Metadata Management

    As part of PhD research, I am focusing on Metadata Management and found these useful themes that are going to drive…