analytics, data analysis, data, business intelligence, data analyst, business analytics, big data, analysis, data management, data mining, cloud computing

Data Analytics Certifications

Why ?

The cyber security field is exploding with opportunity. It’s no wonder; cyber crime is big business, and no one is immune. A 2014 report by security software maker McAfee and the Center for Strategic and International Studies (CSIS) puts the global cost of cyber crime at more than $400 billion per year. According to a 2014 Verizon study, 97 percent of small to mid-size businesses have been hacked – and most don’t even know it. That’s just the tip of the iceberg. Consumers, governments and the private sector are increasingly falling victim to cyber crime. While the demand for cyber security practitioners is growing exponentially, there is an acute shortage of professionals trained to protect vital computer networks and electronic infrastructures from attacks.

According to Burning Glass Technologies, demand for cyber security skills has increased more than four times faster than for any other IT jobs over the past five years and more than 12 times faster than for all other non-IT jobs. In 2013, cyber security job postings took 24 percent longer to fill than all IT job postings and 36 percent longer than all job postings, according to Burning Glass. Twenty-five percent of organizations describe a shortage of employees with in-demand skills, Symantec reports, and 83 percent of companies say they lack the skills and resources to protect their IT interests.

Deeper Specializations

Module 1: Pre-requisites in Information and Network Security
Module 2: Security Management
Module 3: Information and Network Security
Module 4: System and Application Security
Duration: 64 Hours
Prerequisites: Awareness Course
Licensed Tools: MSBI, Informatica + Tableau
OpenSource Tools: Pentaho
Revision
ETL
Tool Architecture
Basic Transformations
Advanced Transformations
Assignment
Reporting
Tool Architecture
Basic Visualization
Filtering
Aggregation
Drill Down
Drill Through
Dashboarding
Assignment
Details Topic Covered
Item #1 Description
Details Topic Covered
Item #2 Description

Details Topic Covered
Item #2 Description

Details Topic Covered
Item #1 Description

Details Topic Covered
Item #2 Description

Details Topic Covered
Item #2 Description

Details Topic Covered
Item #1 Description
Details Topic Covered
Item #2 Description

Details Topic Covered
Item #2 Description

Details Topic Covered
Item #1 Description

Details Topic Covered
Item #2 Description

Details Topic Covered
Item #2 Description