Aspire Journeys

422 Data Analyst Basic KSAT Journey

  • 31 Courses | 30h 15m 9s
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
The 422 Data Analyst journey examines data from multiple disparate sources with the goal of providing security and privacy insight. Designs and implements custom algorithms, workflow processes, and layouts for complex, enterprise-scale data sets used for modeling, data mining, and research purposes.

422 Data Analyst beginner

This track examines data from multiple disparate sources with the goal of providing security and privacy insight. Designs and implements custom algorithms, workflow processes, and layouts for complex, enterprise-scale data sets used for modeling, data mining, and research purposes.

  • 31 Courses | 30h 15m 9s

COURSES INCLUDED

Telling a Business Story
As humans, we've been using narratives to share our knowledge and experiences with others since the beginning. But effective storytelling, specifically within a business context, requires thoughtful preparation and effective delivery. With practice, using storytelling can improve the way you communicate with key players inside - and outside - your organization. In this course, you'll learn how to plan and deliver effective stories that engage your target audience and help you accomplish your objectives.
8 videos | 28m has Assessment available Badge Certification PMI PDU
Navigating AI Ethical Challenges and Risks
In this course, you will gain a foundational understanding of the ethical challenges and risks associated with generative AI. You will also gain awareness of the ethical considerations of using generative AI, and learn about decision-making frameworks to navigate ethical challenges, and make responsible choices when working with this technology.
7 videos | 29m has Assessment available Badge Certification PMI PDU
Establishing AI Guardrails and Governance
In this course, you will gain a foundational understanding of ethical guardrails and governance as these apply to the application and use of generative AI technologies in an everyday business context. In addition, you will explore the key concepts and considerations related to establishing such guardrails and implementing governance frameworks to ensure generative AI tools are used responsibly and ethically.
6 videos | 27m has Assessment available Badge Certification PMI PDU
Network Security Threats and Their Impact
Organizations are subject to increasingly sophisticated network attacks that are occurring more and more frequently. And despite significant improvements in IT security, hackers and attackers are still able to exploit weaknesses in some computer networks - potentially resulting in major data breaches. In this course, you'll learn about the importance of defense in stopping hackers from accessing vital customer or business data. You'll discover the different types of computer network security threats to your organization, how these threats can be prevented, and how they can be detected if one breaches your computer security system.
7 videos | 27m has Assessment available Badge Certification PMI PDU
Exploring Data Visualization
The business world is full of data. Using this data strategically presents a company with serious competitive advantages. The tricky part is making sense of the data and then communicating what it means. Data visualization (or data viz, for short) provides actionable insights out of what can be complex sets of data. In this course, you'll learn the considerations for creating data visualizations and how to relay your message using data visualization tools. You'll learn how to communicate clearly using data visualizing techniques. And you'll gain insight into how to use key design best practices to ensure your visualizations are clearly and accurately telling the story you want them to.
7 videos | 26m has Assessment available Badge Certification PMI PDU
Data Literacy for Business Professionals
As industries, enterprises, and jobs become more data-intensive, data literacy is critical to effectively "talk data" with business colleagues and data and analytics professionals who support you in your work. This course covers fundamental concepts in data management, data quality, data privacy and protection, and data governance. This course was developed with subject matter provided by the International Institute for Analytics. (www.iianalytics.com)
6 videos | 28m has Assessment available Badge Certification PMI PDU
CompTIA IT Fundamentals: Basic IT Concepts
Computers are an integral part of our lives, both personally and professionally. In a few short decades, they have become so indispensable that understanding how they work and how to use them has become imperative. In this course, you will be introduced to basic information technology (IT) concepts, beginning with common numbering systems used by computers and the two international data standards. Then you will explore the character and numerical data types used in computer programming. Finally, you will learn about the basics of computer processing, inputs and outputs, the role of computer storage, and how it works. This course helps prepare learners for the CompTIA IT Fundamentals (ITF+) certification exam, FC0-U61.
15 videos | 1h 49m has Assessment available Badge
CompTIA IT Fundamentals: CIA Triad
Computer data is created at a rate that we can barely comprehend. Much of that information is immensely useful and readily available to anyone, but there is a large contingent of information that is and should remain confidential. In this course, you will explore the CIA triad, beginning with the principle of least privilege and concerns surrounding confidentiality, integrity, and availability. Then you will learn about methods for protecting information, including antivirus and antimalware software, firewalls, password security, and safe browsing. Finally, you will discover the importance of patching and updates, best practices for device security, and removing unwanted software. This course helps prepare learners for the CompTIA IT Fundamentals (ITF+) certification exam, FC0-U61.
17 videos | 1h 43m has Assessment available Badge
CompTIA A+ Core 1: Cloud Computing Concepts
Cloud computing allows users to store and access data and programs over the internet instead of a local hard drive. In this course, explore cloud computing concepts such as cloud model types, resource sharing, measure service, and virtual desktops. Discover the features of Infrastructure as a Service (IaaS), Software as a Service (SaaS), and Platform as a Service (PaaS); and learn how to differentiate between public, private, hybrid, and community cloud infrastructures. Discover key differences between internal and external shared resources and explore rapid elasticity, a feature that allows for scalable provisioning. Finally, examine the considerations and benefits of using a measured service or a metered service and investigate the types of virtual desktops and their purposes. This course will prepare learners for the CompTIA A+ Core 1 (220-1101) certification.
11 videos | 1h 17m has Assessment available Badge
CompTIA A+ Core 2: Information Management & Change Management Processes
Ticketing systems are a great way to collect user and device information, descriptions of problems, and problem resolutions. This course will explore ticketing and asset management systems and how these systems capture information about events and resources. Explore document types such as acceptable use policies, compliance, and network topology diagrams. Discover components of a typical standard operating procedure, including procedures for custom installation of software packages. Next, consider the importance of knowledge base articles and explore best practices for documenting business processes, including rollback plans, sandbox testing, and responsible staff members. Lastly, explore considerations when explaining basic change management best practices. This course is part of a series that will help you prepare for the CompTIA A+ Core 2 (220-1102) certification exam.
11 videos | 55m has Assessment available Badge
Agile Organizations: Cloud for Agile Software Development
The cloud has various deployment and service models that can be combined with Agile software development methodologies to help your organization design and create your very own cloud strategy based on your organization's needs. In this course, you'll learn about Agile software development, cloud management, cloud identity and access management, the cloud physical infrastructure, the cloud logical infrastructure, and cloud privacy. Next, you'll examine the available cloud deployment models such as public, private, hybrid, community, and virtual public clouds, as well as multi-cloud and multitenancy environments. You'll then move on to explore cloud service models such as Infrastructure as a Service, Platform as a Service, and Software as a Service. Finally, you'll learn about advanced topics such the Internet of Things.
14 videos | 1h 18m has Assessment available Badge
Ethical, Privacy, & Intellectual Property Considerations for ChatGPT
In the spirit of exploring the exciting possibilities of generative AI, this course was built using several AI technologies alongside Skillsoft's trusted design methodologies. Generative AI was used to draft the curriculum plan and on-screen text, while AI text-to-speech services were used for narration. In addition, generative AI was used to produce the course assessment and AI assistive technologies helped translate the course captions into multiple languages. In this course, we will define ethical AI and explore the ethical considerations and challenges surrounding advanced AI models. Next, we will examine the potential consequences of using AI and ChatGPT, the impact on society and culture, and the importance of transparency and accountability. Then we will investigate the impact of AI models on privacy and security, the ethical considerations for developing and deploying AI models, and the importance of understanding the risks involved in sharing sensitive intellectual property. Finally, we will discover the roles of government, industry, and society in regulating AI models and how to protect company data.
14 videos | 35m has Assessment available Badge
Cloud Data Platforms: Cloud Computing
Cloud computing has revolutionized the way we build, deploy, and maintain applications. Due to this paradigm shift, many businesses now rent rather than own IT infrastructure. This new way of approaching infrastructure requirements has given way to multiple cloud computing models, such as Software as a Service (SaaS), Platform as a Service (PaaS), Infrastructure as a Service (IaaS), and Function as a Service (FaaS). Knowing what your options are for cloud computing can help you choose the best models for your needs. Use this course to gain a solid foundational understanding of cloud computing. Compare various cloud service providers based on services, available tools, and pricing. Learn about real-life use cases for cloud computing and how businesses can benefit from this ever-evolving technological feat. When you've completed this course, your newfound knowledge of cloud computing will help you decide how it can help your business.
12 videos | 46m has Assessment available Badge
Defining Cloud Computing for Decision-makers: Cloud Computing Principles
The cloud has various deployment and service models that can help an organization design their very own cloud strategy based on their needs. In this course, you'll learn about components of cloud computing including storage, compute, data management, monitoring, code management, and process and deployment management. Investigate cloud deployment models (public, private, hybrid, and community) and serverless architectures such as Backend as a Service (BaaS) and Function as a Service (FaaS). Explore cloud service models such as Infrastructure as a Service, Platform as a Service, and Software as a Service and discover common use cases for each. Finally, learn about cloud deployment architectures and security considerations including lack of control, data breaches, and compliance. After course completion, you'll be able to recognize cloud deployment and service models and key cloud security considerations.
15 videos | 1h 40m has Assessment available Badge
Data Warehouse Essential: Concepts
Discover the fundamentals of data warehousing and the approaches of implementing it. Explore Data Warehouse planning, processes, schemes, and terms. You will also examine global and local Data Warehouses as well as comparing Data Warehouses with RDBMS and Data Lake.
18 videos | 1h 43m has Assessment available Badge
Oracle Database 12c R2 SQL: Using Structured Query Language (SQL)
Explore the introductory concepts of working with Oracle Database 12c, including relational database management concepts and terminologies and Oracle Live SQL.
10 videos | 49m has Assessment available Badge
Data Retrieval
Make your data work for you. Learn to ensure data integrity using constraints and analyze data using the SELECT command and WHERE, GROUP BY, DISTINCT, and ORDER BY clauses. And explore how to speed up searches using indexes and views.
11 videos | 1h 23m has Assessment available Badge
SQL Concepts & Queries
Master SQL concepts. Learning the core fundamentals creates a foundation. Discover relational databases and Structured Query Language (SQL) database concepts.
7 videos | 1h has Assessment available Badge
SQL Tables
Master SQL tables. Take your first steps in learning about relational databases and Structured Query Language (SQL) tables. Discover how to manage tables, and queries, including complex tables, changing tables, and deleting tables.
9 videos | 1h has Assessment available Badge
SQL Selecting, Ordering, & Filtering
Manipulating databases is a necessary skill. Explore Structured Query Language (SQL) and dive into the architecture. Discover efficient and easily manageable databases using features like SELECT, data types, UPDATE, and ORDER BY.
9 videos | 55m has Assessment available Badge
Modern Data Management: Data Management Systems
As companies transition to the digital age, it is increasingly essential for decision-makers to utilize the vast amount of data in their systems properly. Proper governance and a working knowledge of data management systems ensure a significant competitive advantage, allowing companies to have more insight into their work and utilize their resources more efficiently. Use this course to familiarize yourself with the various strategies for handling and transacting data. Examine how data management systems work, study domain-wise data handling, and outline strategies to develop data management systems. Study how to integrate data management into different domains and identify and prioritize domains in various fields of data technologies and data architectures. When you're done with this course, you'll have a solid foundational comprehension of how to establish appropriate data management solutions in an organizational setting.
12 videos | 1h 2m has Assessment available Badge
Traditional Data Architectures: Data Warehousing and ETL Systems
Data warehouses are actively used for business intelligence and, because they integrate data from multiple sources, are advantageous to simple databases in many instances. Considering modern companies often have ETL-based data warehousing systems, decision-makers need to comprehend how they operate and are appropriately managed. In this course, learn the necessary concepts and processes required to work with and manage projects related to data warehousing. Study data warehousing architectures and schemas and investigate some core data warehouse elements, such as dimension, fact tables, and keys. Furthermore, examine the extract, transform, and load (ETL) approach for working with data warehouses, specifying process flow, tools, and software as well as best practices. When you're done, you'll know how to adopt data warehousing and ETL systems for your business intelligence and data management needs.
12 videos | 38m has Assessment available Badge
Loading & Querying Data with Hive
Among the market's most popular data warehouses used for data science, Apache Hive simplifies working with large data sets in files by representing them as tables. In this 12-video Skillsoft Aspire course, learners explore how to create, load, and query Hive tables. For this hands-on course, learners should have a conceptual understanding of Hive and its basic components, and prior experience with querying data from tables using SQL (structured query language) and with using the command line. Key concepts covered include cluster, joining tables, and modifying tables. Demonstrations covered include using the Beeline client for Hive for simple operations; creating tables, loading them with data, and then running queries against them. Only tables with primitive data types are used here, with data loaded into these tables from HDFS (Hadoop Distributed File System) file system and local machines. Learners will work with Hive metastore and temporary tables, and how they can be used. You will become familiar with basics of using the Hive query language and quite comfortable working with HDFS.
13 videos | 1h 19m has Assessment available Badge
Information Security for Leaders: An Introduction to InfoSec
Information security, often called InfoSec, consists of tools and processes used to protect data and sensitive information from threats and attacks. In this course, explore the history of information security and discover how to differentiate between cybersecurity and information security. Discover common myths and misconceptions about information security and learn about types of information security, such as infrastructure, cloud, application, and incident response. Next, you will explore security threats, including social media attacks, social engineering, malware, and misconfigurations, and common information security and data protection laws. Finally, you will investigate the responsibilities of a Chief Information Security Officer (CISO), including developing sound security practices, identifying security objectives, conducting awareness and training programs, and ensuring regulatory compliance. Upon completion, you'll be able to recognize the importance of information security and the key roles and responsibilities required to protect an organization
15 videos | 1h 18m has Assessment available Badge
Managing Enterprise InfoSec Risks & Risk Tolerance
IT security risks can be defined as a combination of the consequences of an event and the associated likelihood of occurrence. They can be managed by an organization through asset-safeguarding strategies. Through this course, learn about managing enterprise information security (InfoSec) risk and risk tolerance. Explore the definition of risk, how it differs from threats and vulnerabilities, and the history of information security. Next, discover common threats to IT systems and data, how to identify and manage security risks, and the key differences between quantitative and qualitative risk analysis. Finally, learn about common risk assessment tools and the differences between penetration testing and vulnerability assessments. Upon completion, you'll be able to outline and manage IT security risks.
15 videos | 1h 44m has Assessment available Badge
Information Security Practices: Multi-year InfoSec Planning
There is no easy way to predict the future of information security. There are however strategies leaders can implement to better plan and prepare for future growth, security, and threats. In this course, examine potential information security threats, how complexity makes them challenging to predict and plan for, and the threats that ransomware, cybercrime, and the growing crime-as-a-service (CaaS) community pose. Next, discover how work shortages and voids created by skills gaps can cause major issues and the impact of recent global pandemics. Finally, explore operational technology, application container risks, and the evolving risks posed by artificial intelligence and machine learning. Upon completion, you'll be able to plan for the future as an InfoSec leader.
15 videos | 1h 17m has Assessment available Badge
Cloud Security Fundamentals: Basics of Cloud Operations
Learners can build a foundation for upcoming cloud security topics by exploring cloud definitions, roles, deployment models, characteristics, and building block technologies in this 9-video course. In the first tutorial, you will learn what cloud computing is, its definitions, and roles. You will then examine the characteristics of key cloud computing models, including Infrastructure as a Service (IaaS), Software as a Service (SaaS), and Platform as a Service (Paas). Learners next take a look at the building blocks of what makes cloud computing tick, which is virtualization technology. Following on from this, you will explore compute building block technologies; storage building block technologies, and networking building block technologies. You will also need to be aware of the different database building block technologies offered by your cloud provider. In the final tutorial in this course, learners will compare common public cloud solution provider (CSP) product offerings. In the concluding exercise, you will need to list four advantages of cloud computing, four common software as a service solutions, and four database building block technologies.
10 videos | 54m has Assessment available Badge
Certified in Cybersecurity (CC): Core Security Principles & Risk Management
It is of high importance that organizations operate upon a solid foundation of security principles, concepts, and risk management. It is impossible to reduce security risk until core security and risk management principles are defined. In this course, explore the elements of the confidentiality, integrity, and availability (CIA) triad, along with the essentials of authentication and using non-repudiation services. Next, examine what risk is and the terminology surrounding risk management, threats, and vulnerability. Finally, learn about risk assessment, identification, and treatment and compare qualitative and quantitative risk analysis. This course prepares learners for the (ISC)2 Certified in Cybersecurity exam.
11 videos | 32m has Assessment available Badge
Certified in Cybersecurity (CC): Security Governance, Policies, & Controls
Security governance is a huge part of overall corporate or organizational governance. The security practitioner must be aware of various governance elements, regulations, laws, standards, policies, and procedures. Begin this course by exploring the elements of governance, including mission charter, leadership, and corporate guidance. Then investigate various laws and regulations like General Data Protection Regulation (GDPR) and HIPAA, standards issued by the International Organization for Standardization and International Electrotechnical Commission (ISO/IEC), and the National Institute of Standards and Technology (NIST), and common policies and standard operating procedures. Next, examine the International Information System Security Certification Consortium (ISC2) code of ethics. Finally, discover security control categories and types. This course prepares learners for the (ISC)2 Certified in Cybersecurity exam.
10 videos | 25m has Assessment available Badge
Certified in Cybersecurity (CC): Business Continuity Planning
Many organizations nowadays have become aware of the need for business continuity planning, also known as continuity of operations. The main objective of a business continuity plan (BCP) is for an organization to maintain organizational operations while recovering from a major interruption. In this course, explore the importance and goals of business continuity and continuity of operations, as well as the components of a business continuity plan. Next, learn about business impact analysis (BIA), backup and restore policies, and disaster recovery plans. Finally, investigate the various tests and drills that incident response and business continuity plans should be subjected to. This course prepares learners for the (ISC)2 Certified in Cybersecurity exam.
10 videos | 30m has Assessment available Badge
Certified in Cybersecurity (CC): Networking & Security Infrastructure
Although new security practitioners can come from development, database, or other backgrounds, the majority of security professionals come from a networking background. It is virtually impossible to separate networking knowledge from security expertise. Begin this course by exploring network types, network devices, and device addressing mechanisms. Then you will discover the Open Systems Interconnection (OSI) and Transmission Control Protocol/Internet Protocol (TCP/IP) reference models, logical ports, and the TCP handshake. Next, you will focus on transport layer security (TLS) and IP security (IPsec). Finally, you will examine virtual LANs (VLANs) and Wi-Fi fundamentals. This course prepares learners for the (ISC)2 Certified in Cybersecurity exam.
12 videos | 45m has Assessment available Badge

EARN A DIGITAL BADGE WHEN YOU COMPLETE THESE TRACKS

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 5.0 of 2 users Rating 5.0 of 2 users (2)
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)