Learning Cloud Computing: Core Concepts with David Linthicum
Cloud Architecture: Core Concepts with David Linthicum
Cloud Architecture: Advanced Concepts with David Linthicum
Big Data Foundations: Techniques and Concepts with Barton Poulson
Artificial Intelligence Foundations: Thinking Machines with Doug Rose
Machine Learning and AI Foundations: Value Estimations with Adam Geitgey
Machine Learning and AI Foundations: Decision Trees with Keith McCormick
Machine Learning & AI: Advanced Decision Trees with Keith McCormick
with Jonathan Reichental
with Jonathan Reichental
IoT Foundations: Fundamentals with Bruce Sinclair
IoT Foundations: Standards and Ecosystems with Zahraa Khalil
>Agile Development Practices with Harrison Ferrone
Implementing an Information Security Program with Kip Boyle
0. Introduction
|
|
|
|
00_01_Welcome
|
00_02_Target_Audience
|
00_03_Learning_Supports
|
1. Cloud Computing Basics
|
|
|
|
01_01_Basic_Concepts
|
01_02_PPH_Clouds
|
01_03_Types_of_Clouds
|
01_04_IAAS
|
|
|
|
|
01_05_SAAS
|
01_06_PAAS
|
01_07_IAAS_Case
|
2. Cloud Computing Planning
|
|
|
|
02_01_Apps_to_Move
|
02_02_Data_to_Move
|
02_03_TCO
|
02_04_Migration_Plan
|
|
|
|
|
02_05_Select_Cloud_Provider
|
02_06_Why_Cloud_Security
|
02_07_New_Skills
|
02_08_First_Cloud_Project
|
3. Cloud Security
|
|
|
|
03_01_Plan_Cloud_Security
|
03_02_Security_Requirements
|
03_03_Select_Technology
|
03_04_Implement_Ops
|
4. Cloud Operations
|
|
|
|
04_01_Cloud_Operations
|
04_02_Tech_and_Tools
|
04_03_Monitor_Mangage
|
5. Conclusion
|
|||
05_01_Next_steps
|
0. Introduction
|
|
||
001 Welcome
|
002 What you should know
|
1. Cloud Architecture Introduction
|
|
|
|
003 Cloud architecture basics
|
004 Cloud architecture - Example 1
|
005 Cloud architecture - Example 2
|
006 Skills, tools, and processes
|
2. Understand the Basic Needs
|
|
|
|
007 What problems need to be solved_
|
008 The 'as is' state
|
009 The 'to be' state
|
3. Its All about the Cloud Parts
|
|
|
|
010 Cloud storage
|
011 Cloud CPUs
|
012 Cloud databases
|
013 Additional cloud services
|
4. From Requirements to Solutions
|
|
|
|
014 Storage level
|
015 Data level
|
016 Processing level
|
017 Network level
|
|
|
||
018 Application level
|
019 Making sense of it all
|
5. Build your First Architecture
|
|
|
|
020 Step 1 - Define your requirements
|
021 Step 2 - Define your desired end state
|
022 Step 3 - Mapping 'as is' to be true
|
023 Step 4 - Create your final architecture
|
6. Conclusion
|
|||
024 Next steps
|
0. Introduction
|
|
||
01 - Advanced cloud architecture concepts
|
02 - What you should know
|
1. Advanced Architecture Patterns
|
|
|
|
03 - Microservices
|
04 - Complex, disturbed, and serverless
|
05 - DevOps
|
06 - Purpose built vs. general use
|
2. Leveraging Microservice Architecture
|
|
|
|
07 - Microservices 101
|
08 - Use cases
|
09 - Microservices examples
|
3. Moving to Complex, Serverless and Widely Distributed Architecture
|
|
|
|
10 - Complex architectures
|
11 - Distributed architectures
|
12 - Serverless architectures
|
13 - Composite architectures
|
4. Moving to DevOps Integration
|
|
|
|
14 - The role of architecture with DevOps
|
15 - The process
|
16 - The tools
|
17 - DevOps example
|
5. Other Concepts to Consider
|
|
|
|
18 - High-performance computing
|
19 - High-performance data transfer
|
20 - Coupling vs. cohesion
|
21 - Placing things that change into a domain
|
6. Conclusion
|
|||
22 - Next steps
|
01. Introduction
|
|||
01_01-Welcome
|
02. What is Big Data
|
|
|
|
02_01-The three Vs of big data
|
02_02-Volume
|
02_03-Velocity
|
02_04-Variety
|
|
|||
02_05-Does big data need all three?
|
03. How is Big Data Used
|
|
|
|
03_01-Understanding big data for consumers
|
03_02-Understanding big data for business
|
03_03-Understanding big data for research
|
04. Big Data and Data Science
|
|
|
|
04_01-Ten ways big data is different from small data
|
04_02-The three facets of data science
|
04_03-Types and skills in data science
|
04_04-Data science without big data
|
|
|||
04_05-Big data without data science
|
05. Ethics in Big Data
|
|
||
05_01-Challenges with anonymity
|
05_02-Challenges with confidentiality
|
06. Sources and Structures of Big Data
|
|
|
|
06_01-Human-generated data
|
06_02-Machine-generated data
|
06_03-Structured data
|
06_04-Unstructured data
|
07. Storing Big Data
|
|
|
|
07_01-Distributed storage and the cloud
|
07_02-Cloud computing: IaaS, PaaS, SaaS, and DaaS
|
07_03-A brief introduction to Hadoop
|
08. Preparing data for analysis
|
|
|
|
08_01-Challenges with data quality
|
08_02-ETL: Extract, transform, load
|
08_03-Additional Vs of big data
|
09. Big Data Analysis
|
|
|
|
09_01-Monitoring and anomaly detection
|
09_02-Data mining and text analytics
|
09_03-Predictive analytics
|
09_04-Big data visualization
|
|
|||
09_05-The role of Excel in big data
|
10. Conclusion
|
|||
10_01-Next steps
|
01 Introduction
|
|||
001 Welcome
|
02. What Is Artificial Intelligence?
|
|
|
|
002. Define general intelligence
|
003.The history of AI
|
004.Strong vs. weak AI
|
005.Plan AI
|
03. The Rise of Machine Learning
|
|
|
|
006.Machine learning
|
007.Artificial neural networks
|
008.Perceptrons
|
04. Finding the Right Approach
|
|
|
|
009.Match patterns
|
010Data vs. reasoning
|
011.Unsupervised learning
|
012.Backpropagation
|
|
|||
013.Regression
|
05. Common AI Programs
|
|
|
|
014.Robotics
|
015.Natural language processing
|
016.The Internet of Things
|
06. Mixing with Other Technologies
|
|
||
017.Big data
|
018.Data science
|
07. Avoiding Pitfalls
|
|
||
019.Pitfalls
|
020.Next steps
|
SECTION 1 INTRODUCTION
|
|
|
|
01_01-Welcome
|
01_02-What you should know
|
01_03-Using the exercise files
|
01_04-Set up the development environment
|
SECTION 2 WHAT IS MACHINE LEARNING AND VALUE PREDICTION
|
|
|
|
02_01-What is machine learning
|
02_02-Supervised machine learning for value prediction
|
02_03-Build a simple home value estimator
|
02_03-Build a simple home value estimator
|
|
|||
02_05-Cool uses of value prediction
|
SECTION 3 AN OVERVIEW OF BUILDING A MACHINE LEARNING SYSTEM
|
|
|
|
03_01-Introduction to NumPy, scikitlearn, and pandas
|
03_02-Think in vectors_ How to work with large data sets efficiently
|
03_03-The basic workflow for training a supervised machine learning model
|
03_04-Gradient boosting_ A versatile machine learning algorithm
|
SECTION 4 TRAINING DATA
|
|
|
|
04_01-Explore a home value data set
|
04_02-Standard conventions for naming training data
|
04_03-Decide how much data you need
|
SECTION 5 FEATURES
|
|
|
|
05_01-Feature engineering
|
05_02-Choose the best features for home value prediction
|
05_03-Use as few features as possible_ The curse of dimensionality
|
SECTION 6 CODING OUR SYSTEM
|
|
|
|
06_01-Prepare the features
|
06_02-Training vs. testing data
|
06_03-Train the value estimator
|
06_04-Measure accuracy with mean absolute error
|
SECTION 7 IMPROVING OUR SYSTEM
|
|
|
|
07_01-Overfitting and underfitting
|
07_02-The brute force solution_ Grid search
|
07_03-Feature selection
|
SECTION 8 USING THE ESTIMATOR IN A REAL-WORLD PROGRAM
|
|
||
08_01-Predict values for new data
|
08_01-Predict values for new data
|
SECTION 9 CONCLUSION
|
|||
09_01-Wrapup
|
1. Introduction
|
|
|
|
01_01 Welcome
|
01_02 What you should know
|
01_03 Using the exercise files
|
02. Decision Trees in IBM SPSS Modeler
|
|
|
|
02_01-Decision tree options in SPSS Modeler
|
02_02-Building a quick CHAID model
|
02_03-Adding a second model with CRT
|
02_04-Analysis nodes
|
|
|||
02_05-Lift and gains chart
|
03. Understanding CHAID
|
|
|
|
03_01-What is an algorithm
|
03_02-Chisquared overview
|
03_03-Buliding a tree interactively
|
03_04-Bonferonni adjustment
|
|
|
|
|
03_05-What is level of measurement
|
03_06-How CHAID handles nominal variables
|
03_07-How CHAID handles ordinal variables
|
03_08-How CHAID handles continuous variables
|
|
|||
03_09-A quick look at the complete CHAID tree
|
04. Understanding CRT
|
|
|
|
04_01-What is the Gini coefficient
|
04_02-How does CRT weigh purity and balance
|
04_03-How CRT handles nominal, ordinal, and continuous variables
|
04_04-How CRT handles missing data
|
|
|
||
04_05-Understanding pruning
|
04_06-A quick look at the complete CRT tree
|
05. Improving Your Model
|
|
|
|
05_01-Stopping rules in CHAID and CRT
|
05_02-Exhaustive CHAID
|
05_03-The Auto Classifier tuning trick
|
06. Conclusion
|
|||
06_01-Next steps
|
01. Introduction
|
|
|
|
01. Welcome
|
02. What you should know
|
03. Using the exercise files
|
2. 1. Understanding QUEST
|
|
|
|
04. Overview
|
05. How QUEST handles nominal variables
|
06. How QUEST handles ordinal and continuous variables
|
07. How QUEST handles missing data
|
|
|
||
08. Pruning in QUEST
|
09. Stopping rules in QUEST
|
3. 2. Understanding C5.0
|
|
|
|
10. ID3 and C4.5
|
11. Winnowing attributes
|
12. Rule sets
|
13. Understanding information gain
|
|
|
||
14. Pruning in C5.0
|
15. How C5.0 handles missing data
|
4. 3. Advanced Topics
|
|
|
|
16. Ensembles
|
17. What is bagging
|
18. Using bagging for feature selection
|
19. Random forests/div>
|
|
|
||
20. What is boosting
|
21. Costs and priors
|
5. Conclusion
|
|||
22 - Next steps
|
0. Introduction
|
|||
01. Welcome and introduction
|
1. 1. Trusting the Internet
|
|
||
02. Risk and security challenges with using the Internet today
|
03. Rethinking the traditional database
|
2. 2. What Is the Blockchain
|
|
|
|
04. What problems does the blockchain solve
|
05. The birth of the blockchain in bitcoin
|
06. What new opportunities does the blockchain enable
|
3. 3. Transforming Transactions
|
|
||
07. Examples of the blockchain in action today
|
08. Thinking about the future of blockchain innovation
|
|
4. 4. Challenges Ahead
|
|
||
09. The potential obstacles to blockchain adoption
|
10. Risks to existing solutions and enterprises
|
5 Conclusion
|
|||
11 Next Steps
|
1.Introduction
|
|
||
01.Welcome
|
02.What you should know
|
1. 1. Trusting the Internet
|
|
|
|
03.Blockchain overview
|
04.Blockchain - The basics
|
05.Blockchain - Beyond the basics
|
3.2. How Does Blockchain Work
|
|
|
|
06.What are public and private keys
|
07.Introducing nonces, hash functions, and mining
|
08.The immutable distributed ledger
|
4.3. How Blockchain Enables Bitcoin
|
|
|
|
09.The birth of bitcoin
|
10.How bitcoin is created and managed
|
11.Financial services and bitcoin
|
12.Altcoins, altchains, and ICOs
|
5.4. The Wider Blockchain Universe
|
|
||
13.Blockchain in practice - Hyperledger and Ripple
|
14.Using Ethereum to write smart contracts
|
6.5. Implementing Blockchain
|
|
||
15.The energy sector and blockchain
|
16.Identity management and blockchain
|
7.6. Risks
|
|||
17.The risks of blockchain
|
8 Conclusion
|
|||
18.Next steps
|
1. Introduction
|
|
|
|
01. Welcome
|
02. What you should know
|
03. Architectural overview
|
2. 1. The Software-Defined Product
|
|
|
|
04. Software overview
|
05. Cybermodel
|
06. Application
|
07. IoT value modeling
|
3. 2. The Hardware-Defined Product
|
|
|
|
08. Hardware overview
|
09. Sensors
|
10. Embedded systems
|
11. Connected sensors
|
4. 3. The Network Fabric
|
|
|
|
12. Overview and standards
|
13. OT IT and fog networks
|
14. IoT product cloud
|
15. IoT platform
|
5. 4. External Systems
|
|
|
|
16. Overview
|
17. Analytics and big data
|
18. Data services
|
19. Business systems
|
|
|||
20. Other IoT products
|
06. Conclusion
|
|
|
|
21. Main takeaways
|
22. What was not included
|
23. Next steps
|
1. Introduction
|
|
||
01. Welcome
|
02. What you should know
|
2. 1. IoT Overview
|
|
|
|
04. Software overview
|
05. Cybermodel
|
06. Application
|
07. IoT value modeling
|
|
|||
007 IoT architecture example - Ehealth
|
3. 2. The IoT EcoSystem
|
|
|
|
008 Introduction to the IoT ecosystem
|
009 IoT technology
|
010 IoT markets
|
011 IoT standards
|
|
|||
012 IoT application example - Smart homes
|
4. 3. IoT Challenges
|
|
|
|
013 Security
|
014 Privacy
|
015 Complexity and standards
|
016 Legal issues
|
5. 4. IoT Standards
|
|
|
|
017 Standardization process
|
018 Standardization development process
|
019 IEEE IoT standards
|
020 IoT commuication protocols, part 1
|
|
|||
021 IoT communication protocols, part 2
|
5. 4. IoT Device Management
|
|
|
|
022 IoT device management fundamentals
|
023 IoT protocols for device management
|
024 IoT device management challenges
|
025 IoT device management applications
|
6. 5. IoT Action: Smart Cities
|
|
|
|
026 Smart cities
|
027 Case studies - Singapore and Barcelona
|
028 Case studies - London, San Francisco, and Oslo
|
06. Conclusion
|
|||
029 Next steps
|
1. Introduction
|
|
||
01. Welcome
|
02. What you should know
|
2. 1. Planning
|
|
|
|
003 Getting involved early
|
004 Picking your tools
|
005 To document or not
|
3. 2. Design
|
|
||
006 Flexible architecture
|
007 Avoiding premature optimization
|
4. 3. Development
|
|
|
|
008 Determining velocity
|
009 Agile programming techniques
|
010 Refactor, then refactor more
|
5. 4. Testing
|
|
||
011 Choosing your testing regimen
|
012 Handling leapfrogging bugs
|
5. 4. Release
|
|
||
013 Continous Integration
|
014 Structuring a release pipeline
|
06. Conclusion
|
|||
015 The big picture
|
01. Introduction
|
|
|
|
01_01-Welcome
|
01_02-What you should know
|
01_03-Information security overview
|
01_04-Cybersecurity overview
|
|
|
||
01_05-Cyber resilience overview
|
01_06-Risk management overview
|
02. Information Security Program Goals
|
|
|
|
02_01-Achieve your customers expectations
|
02_02-Cyber attack and failure resilience
|
02_03-Comply with laws and regulations
|
02_04-Support executives and the BOD
|
03. Information Security Program Components
|
|
|
|
03_01-Essential functions of a program
|
03_02-Determine your role
|
03_03-Build a team
|
03_04-The need for management
|
|
|||
03_05-The need for leadership
|
04. Structure an Information Security Program
|
|
|
|
04_01-Sources of controls
|
04_02-Organize around cyber resilience
|
04_03-Design an information security program
|
05. Measure Information Risks
|
|
|
|
05_01-Plan to measure information risks
|
05_02-Use a datadriven cyber risk management method
|
05_03-Understand the 0 to 10 scale
|
05_04-Set target scores for each control
|
|
|
|
|
05_05-Decide where to measure information risk
|
05_06-Create a score key for experts
|
05_07-Prepare to collect scores from experts
|
05_08-Set up a score collection workflow
|
|
|||
05_09-Collect scores from your systems
|
06. Understand Information Risks
|
|
|
|
06_01-The questions that drive us
|
06_02-Determine resilience
|
06_03-Determine the top five risks
|
06_04-Understand the leadership landscape
|
07. Manage Information Risks
|
|
|
|
07_01-Generate ideas to manage top risks
|
07_02-Estimate costs
|
07_03-Estimate benefits
|
07_04-Prepare proposals
|
08. Demonstrate Compliance and Progress
|
|
|
|
08_01-Communicate with executives
|
08_02-Communicate with stakeholders
|
08_03-Communicate with auditors
|
09. Use a Workflow to Organize Work
|
|
|
|
09_01-Determine measurement frequency
|
09_02-Build on baseline measurements
|
09_03-Construct an annual program of work
|
10. Conclusion
|
|||
10_01-Next steps
|