Reading Time: 3 minutes DB2 DBA UDB
Module 1: Overview of DB2 9.7 on Windows
- Contrast the DB2 Family of products
- Identify the DB2 Tools
- Functions of DB2 components
- Explore installation and parameters
Module 2: Command Line Processor (CLP) & GUI Usage
- Use the Command Line Processor
- Explore the GUI environment
- Describe the DAS role with GUI tools
Module 3: The DB2 Environment
- Key features of an Instance
- Create and drop an Instance
- Use db2start and db2stop
- Distinguish b/w types of Config.
- Describe and modify the Database Manager Configuration
Module 4: Creating Databases and Data Placement
- Creating a Database.
- Explore system Catalog tables, views
- Compare DMS Vs SMS table Spaces.
- Database with Automatic Storage.
- Differentiate between table spaces, containers, extents, and pages
- Define table spaces
- Get snapshot for table spaces
- Explore Database Config. Parameter.
Module 5: Creating Database Objects
- List DB2 object hierarchy and physical directories & files
- Creating objects: Schema, Table, View, Alias, and Index
- Explore the use of table partitioning
- Review the use of Temporary Tables
- Implementation of Check Constraints, Referential Integrity and Triggers
- Exploring the use of Large Objects
Module 6: Moving Data
- Discuss the INSERT statement and Recognize its limitations
- Explain the differences between IMPORT and LOAD
- Explain the EXPORT, IMPORT, and LOAD syntax
- Create and use Exception Tables and Dump-Files
- Distinguish and Resolve Table States: Load Pending and Set Integrity Pending
- Use the SET INTEGRITY command
- Discuss the db2move and db2look commands
Module 7: Backup And Recovery
- Describe the major principles and methods for backup and recovery
- State the three types of recovery used by DB2
- Explain the importance of logging for backup & recovery
- Describe how data logging takes Place –circular & archival logging
- Use the BACKUP, RESTORE, and ROLLFORWARD commands
- Perform a table space backup and recovery
- Restore a database to the end of logs or to a point-in-time
- Backup and recovery scenarios
Module 8: Locking And Concurrency
- Explain why locking is needed
- List objects that can be locked
- Describe and discuss the various lock modes and their compatibility
- Explain four different levels of data protection
- Set isolation level and lock time out for current activity
- Explain lock conversion & escalation
- Describe causes of Deadlocks
Module 9: Problem Determination
- Collect information for problem analysis and resolution
- Use error logs for basic problem analysis
- Describe four types of monitors: Snapshot Monitor, Event Monitor, Activity Monitor and Health Monitor
- Basic commands to better work with connections and Sessions
- Retrieve statistics and information from a running DB2 instance
Module 10: Application Issues and Performance
- Prepare applications that access DB2 data for execution
- Describe the application alternatives available to access DB2 data
- Define the concept of clustering, and determine the proper cluster sequence
- Use RUNSTATS, REORGCHK, and REORG to enhance application performance
- Work with the EXPLAIN facility
Module 11: Security
- Use Access Control Mechanisms to implement database security
- Use group IDs to create a control hierarchy
- Describe Label Based Access Control
- Describe privileges within a database
- Describe privileges required for binding and executing a package
- Describe the difference between explicit privileges & implicit privileges
- Describe the different level of authorization
Reading Time: 3 minutes EMC Storage
Module 1: Storage Fundamentals
- Introduction to Information Storage
- Data Center Environment
- Intelligent Storage Systems & Components Of Storage System
- Raid Concepts
- Storage Protocols And Topologies
- Direct Attached Storage (DAS)
- Network Attached Storage (NAS)
- Storage Area Network (SAN)
- Difference Between SAN & NAS, FC SAN & Ip SAN Technologies
- Introduction To Fiber Chanel And How It Works In SAN
- FC Layers & Fabric Port Types and Fiber Connectors
- Cables & FC Well-Known Adresses, FC Topologies & Terminology
- Architecture of a Storage Subsystem and Storage Management Softwares
- Multipathing Softwares, Storage Virtualization and Storage Tiering
- Introduction To Business Continuity Management
- Backup And Archive
- Local Replication And Remote Replication
- Cloud Computing
- Securing And Managing Storage Infrastructure
Module 2: Brocade & Cisco Switch Management
- Introduction To Brocade And Cisco Switches And Various Models
- Installation Of New Switches
- Overview Of Fabric Topologies
- Overview Of Fabric Components, Switch Firmware Upgrade
- User Account Management, Fabric-Wide Settings & Local Switch Settings
- Zoning & Types Of Zoning (Port Zoning And WWN Zoning) Along With Practical Explanation
- Using Cli And Web Tools Gui
- Using Dcfm
- Generating Reports
- Monitoring Switch Logs
- Inter Switch Linking (Isl) And Trunking
- Inter Chasis Linking (Icl)
- Merging Fabrics Along With Practical Explanation
- Multipathing Software Overview – Powerpath Explanation With Commands
- Access Gateway Mode, N-Port Id Virtualization – Npiv
Module 3: Emc Clariion
- Introduction To Emc Clariion Cx Series Architecture
- Clariion Features, Clariion Management Utilities (Navisphere Manager, Navicli)
- Clariion Storage Provisioning
- Traditional (Raid Groups) And Thin (Thin Pools) Provisioning
- Solaris And Windows Integration
- Access Logix
- Powerpath
- Snapview Snapshots
- Snapview Clones
- Mirrorview Configuration & Management
- Sancopy Configuration & Management
- Advanced Lun Managaement
- Lun Migration
- Data Migration
- Event Monitor
- Navisphere Analyzer
Module 4: Emc Vnx
- Introduction To Unified Storage & Vnx
- Vnx Management Utilities (Unisphere & Cli Environment)
- Basic Architecture Of Vnx And Vnxe Series
- Vnx Models And Features
- Vnx Basic Components
- Vnx Modular Architecture
- Dae And Drive Options For Vnx Series
- Vnx Features and Vnx Software And Their Components
- Vnx Storage Provisioning and Thin Provisioning In Vnx
- Emc Symmetrix (Dmx And Vmax) and Introduction To Symmetrix Dmx And Vmax Series
- Dmx And Vmax Storage Architecture
- Differences Between Dmx And Vmax Storage Systems
- Dmx Director Pairing And Rule 17, Fa, Da & Cache Concepts
- Symmetrix Mirror Positions and Symmetrix Device Attributes
- Dynamic Lun Addressing, Symmetrix Management Software
- Symmetrix Solutions Enabler (Symcli) and Symmetrix Management Console (Smc)
- Emc Control Center (Ecc), Confiuration Manager and Symmetrix Storage Provisioning
- Symmetrix Device Creation/Deletion, Forming & Dessolving Meta Devices
- Mapping & Unmapping, Masking, Unmasking and Symmetrix Thin Provisioning
- Monitoring Thin Pools and Vmax Auto Provisioning Groups
- Vmax Fully Automated Storage Tiering (Fast & Fast Vp)
- Virtual Lun Migration, Timefinder Configuration And Management and Mirror/Bcv, Clone
- Snap, Srdf Overview And Concepts
- Srdf Configuration And Mangement and Srdf Synchronous Operations
- R1/R2 Device Pairs Creations Using Configuration Manager
- Dynamic Srdf Pairing
Module 5: Introduction To Other Storage Products
- Introduction To Netapp Fas 30xx
- 60xx Filers
- Netapp Data Ontap Administration Basics
- Difference Between Operation Of EMC Storage And Other Storage
Reading Time: 8 minutes Data Science
Module 1: Introduction to Data Science with R
- What is Data Science, significance of Data Science in today’s digitally-driven world, applications of Data Science, lifecycle of Data Science, components of the Data Science lifecycle, introduction to big data and Hadoop, introduction to Machine Learning and Deep Learning, introduction to R programming and R Studio.
-
Hands-on Exercise –Installation of R Studio, implementing simple mathematical operations and logic using R operators, loops, if statements and switch cases.
Module 2: Data Exploration
Module 3: Data Manipulation
Module 4: Data Visualization
- Introduction to visualization, Different types of graphs, Introduction to grammar of graphics & ggplot2 package, Understanding categorical distribution with geom_bar() function, understanding numerical distribution with geom_hist() function, building frequency polygons with geom_freqpoly(), making a scatter-plot with geom_pont() function, multivariate analysis with geom_boxplot, univariate Analysis with Bar-plot, histogram and Density Plot, multivariate distribution, Bar-plots for categorical variables using geom_bar(), adding themes with the theme() layer, visualization with plotly package & building web applications with shinyR, frequency-plots with geom_freqpoly(), multivariate distribution with scatter-plots and smooth lines, continuous vs categorical with box-plots, subgrouping the plots, working with co-ordinates and themes to make the graphs more presentable, Intro to plotly & various plots, visualization with ggvis package, geographic visualization with ggmap(), building web applications with shinyR.
-
Hands-on Exercise –Creating data visualization to understand the customer churn ratio using charts using ggplot2, Plotly for importing and analyzing data into grids. You will visualize tenure, monthly charges, total charges and other individual columns by using the scatter plot.
Module 5: Introduction to Statistics
- Why do we need Statistics?, Categories of Statistics, Statistical Terminologies,Types of Data, Measures of Central Tendency, Measures of Spread, Correlation & Covariance,Standardization & Normalization,Probability & Types of Probability, Hypothesis Testing, Chi-Square testing, ANOVA, normal distribution, binary distribution.
-
Hands-on Exercise –– Building a statistical analysis model that uses quantifications, representations, experimental data for gathering, reviewing, analyzing and drawing conclusions from data.
Module 6: Machine Learning
Module 7: Logistic Regression
Module 8: Decision Trees & Random Forest
- What is classification and different classification techniques, introduction to Decision Tree, algorithm for decision tree induction, building a decision tree in R, creating a perfect Decision Tree, Confusion Matrix, Regression trees vs Classification trees, introduction to ensemble of trees and bagging, Random Forest concept, implementing Random Forest in R, what is Naive Bayes, Computing Probabilities, Impurity Function – Entropy, understand the concept of information gain for right split of node, Impurity Function – Information gain, understand the concept of Gini index for right split of node, Impurity Function – Gini index, understand the concept of Entropy for right split of node, overfitting & pruning, pre-pruning, post-pruning, cost-complexity pruning, pruning decision tree and predicting values, find the right no of trees and evaluate performance metrics.
-
Hands-on Exercise –Implementing Random Forest for both regression and classification problems. You will build a tree, prune it by using ‘churn’ as the dependent variable and build a Random Forest with the right number of trees, using ROCR for performance metrics.
Module 9: Unsupervised learning
Module 10: Association Rule Mining & Recommendation Engine
Module 11: Introduction to Artificial Intelligence (self paced)
- Introducing Artificial Intelligence and Deep Learning, what is an Artificial Neural Network, TensorFlow – computational framework for building AI models, fundamentals of building ANN using TensorFlow, working with TensorFlow in R.
Module 12: Time Series Analysis (self paced)
Module 13: Support Vector Machine – (SVM) (self paced)
- Introduction to Support Vector Machine (SVM), Data classification using SVM, SVM Algorithms using Separable and Inseparable cases, Linear SVM for identifying margin hyperplane.
Module 14: Naïve Bayes (self paced)
- What is Bayes theorem, What is Naïve Bayes Classifier, Classification Workflow, How Naive Bayes classifier works, Classifier building in Scikit-learn, building a probabilistic classification model using Naïve Bayes, Zero Probability Problem.
Module 15: Text Mining (self paced)
- Introduction to concepts of Text Mining, Text Mining use cases, understanding and manipulating text with ‘tm’ & ‘stringR’, Text Mining Algorithms, Quantification of Text, Term Frequency-Inverse Document Frequency (TF-IDF), After TF-IDF.
Module 16: Case Study The Market Basket Analysis (MBA) case study
- This case study is associated with the modeling technique of Market Basket Analysis where you will learn about loading of data, various techniques for plotting the items and running the algorithms. It includes finding out what are the items that go hand in hand and hence can be clubbed together. This is used for various real world scenarios like a supermarket shopping cart and so on.
Logistic Regression Case Study
- In this case study you will get a detailed understanding of the advertisement spends of a company that will help to drive more sales. You will deploy logistic regression to forecast the future trends, detect patterns, uncover insights and more all through the power of R programming. Due to this the future advertisement spends can be decided and optimized for higher revenues.
Multiple Regression Case Study
- You will understand how to compare the miles per gallon (MPG) of a car based on the various parameters. You will deploy multiple regression and note down the MPG for car make, model, speed, load conditions, etc. It includes the model building, model diagnostic, checking the ROC curve, among other things.
Receiver Operating Characteristic (ROC) case study
- You will work with various data sets in R, deploy data exploration methodologies, build scalable models, predict the outcome with highest precision, diagnose the model that you have created with various real world data, check the ROC curve and more.
Reading Time: 4 minutes NetApp Storage
Module 1: The NetApp Storage Environment
- Key features and functions
- Advantages
- Distinguish between NAS and SAN topologies
- Describe NetApp Unified Storage Architecture
Module 2: WAFL Simplified
- WAFL (Write Anywhere File Layout) file system
- WAFL file system concepts
- including consistency points (CPs)
- RAID management, and storage levels
- RAID is used to protect disk data
- WAFL file system processes write and read requests
Module 3: Basic Administration
- Connect remotely to a FAS system
- Using the console and a remote host
- Access NetApp System Manager
- Execute commands
- Use commands to analyze a FAS system
- Configure and manage the NetApp AutoSupport tool
Module 4: Physical Storage
- Data ONTAP RAID technology
- Identify a disk in a disk shelf based on its ID
- Execute commands to determine a disk ID
- Identify a hot-spark disk in a FAS system
- Describe the effects of using multiple disk types
- Create a 32-bit aggregate and a 64-bit aggregate
- Execute aggregate commands
- Calculate usable disk space
Module 5: Logical Storage
- Volumes in the Data ONTAP operating system
- Define and create a flexible volume
- Execute vol commands
- Define and create qtrees
Module 6: Administration Security
- Restrict administrative access
- Restrict console and NSM access
- Configure a client machine
Module 7: Networking
- Identify the configuration of network settings
- Components in the Data ONTAP operating system
- Explain and configure name resolution services
- Configure routing tables in the Data ONTAP OS
- Define and create interface groups
- Discuss the operation of virtual LANs (VLANs)
Module 8: NFS
- NFS implementation in the Data ONTAP O/S
- License NFS on a storage system
- Explain the purpose and format of /etc/ exports
- List and define the export specification options
- Describe the use of the exportfs command
- Mount an export on a UNIX host
Module 9: CIFS
- Describe the CIFS environment
- Configure the storage system
- Share a resource on the storage system
- Map a drive from a client
Module 10: NAS Management
- Security methods for protecting data
- Security style setting for a volume and a qtree
- Tracking and restricting storage usage
- Explain, create, and manage quotas
- Data ONTAP FPolicy file-screening policy
Module 11: SAN
- Explain the purpose of a SAN
- Identify supported SAN configurations
- Distinguish between Fibre Channel (FC)
- Fibre Channel over Ethernet (FCoE) and
- iSCSI protocols
- Define a LUN and explain LUN attributes
- Use the LUN setup command
- Create iSCSI-attached LUNs
- Access and manage a LUN from a Windows host
- Define SnapDrive data management software
Module 12: Snapshot Copies
- Describe the function of Snapshot copies
- Explain the benefits of Snapshot copies
- Identify and execute Snapshot commands
- Create and delete Snapshot copies
- Configure and modify Snapshot options
- Explain the importance of the .snapshot directory
- Schedule Snapshot copies
- Configure and manage the Snapshot copy reserve
Module 13: Space Management
- Storage efficiency techniques
- Factors that impact space consumption
- Explain how to guarantee writes for a file
- Deduplication and compression techniques
Module 14: High-Availability
- Describe high-availability (HA) solutions
- How HA increases the reliability of storage
- Define HA controller configuration
- Describe the three modes of HA operation
Module 15: Virtualization Solutions
- Virtualize a storage controller
- Configure MultiStore software
- Assign client protocols on MultiStore software
Module 16: Backup and Recovery Methods
- Methods available to back up and recover data
- Use ndmpcopy to process full and incremental data transfers
- Discuss dump and restore
- Describe, enable, and configure NDMP on a storage system
Module 17: Data Collection Tools
- Use the sysstat, stats, and statit commands
- Factors that affect RAID performance
- Commands to collect data about write and read throughputs
- Verify the operation of hardware, and network components
- Commands that are used to obtain configuration and status
Module 18: Data ONTAP Upgrades
- Access the NetApp Support site for the following documents
- Data ONTAP Upgrade Guide
- Data ONTAP Release Notes
- Use a configuration worksheet to collect data for installation
- How to perform Data ONTAP software upgrades and reboots
- Use the setup command to configure a storage system