8420  Reviews star_rate star_rate star_rate star_rate star_half

Enterprise Data Fundamentals

This Enterprise Data training course teaches attendees core concepts like data governance, quality, security, and storage to transform data into actionable insights. Through hands-on exercises,...

Read More
$1,525 USD
Duration 2 days
Course Code WA3472
Available Formats Classroom

Overview

This Enterprise Data training course teaches attendees core concepts like data governance, quality, security, and storage to transform data into actionable insights. Through hands-on exercises, attendees learn to tackle common data management challenges, optimize operations, improve decision-making, and drive business growth.

Skills Gained

  • Understand the importance of effective data management in achieving organizational goals and objectives.
  • Learn about key concepts and principles of data management, including data governance, data quality, storage options, and data security.
  • Gain insights into common data management challenges and best practices for addressing them.
  • Understand the impact of poor data management on business operations, decision-making, and overall performance.
  • Learn about the practical aspects of data modeling and data security.

Who Can Benefit

  • IT Architects
  • Data Practitioners
  • Software Engineers
  • Business Analysts

Prerequisites

Basic knowledge of SQL and Python

Course Details

Outline

Data Management Introduction

  • States of Digital Data
  • What is Data Management
  • The Core Components
  • Objectives
  • Timeliness
  • Data Management and Data Governance Relationship
  • Metadata
  • Information About Processes
  • Data Management Systems
  • Data Warehouses, Data Marts, and Data Lakes
  • High-Level Traditional Enterprise Data Flow
  • The Conceptual DW/BI Diagram
  • The Enterprise Data Problem Domain
  • ETL
  • Workflow (Pipeline) Orchestration Systems
  • Data Engineering
  • Data Management Best Practices

Data Governance

  • Data Governance
  • The DAMA-DMBOK Framework
  • Key Artifacts of Data Governance
  • Shared Environment Governance Controls
  • Best Practices
  • The Goldilocks Principle
  • Common Issues That Can be Prevented through Effective Governance
  • Ethics of Data Handling
  • Ethical AI

Data Architecture and Data Modeling

  • Data Architecture Defined
  • Data Modeling Defined
  • Data Architecture vs Data Modeling
  • A Data Model
  • Data Modeling and Design in Practice
  • Conceptual Data Models
  • The Entity-Relationship Model
  • Logical Data Models
  • Normalization
  • Normalization Forms
  • Physical Data Models
  • The Physical Data Model and DDL
  • The Star Schema
  • The Fact and Dimension Tables
  • Master Data Management

Data Storage Options

  • Storage Options
  • Which One Should I Choose?
  • Storage Location Options
  • Deciding on Database Type
  • Data Models
  • NoSQL Database Storage Types
  • A Key-Value Storage Type Example
  • Efficient Storage with Columnar Formats
  • Scalability
  • ACID Compliance
  • Cloud-Based Database Services
  • Creating a MySQL Database Instance Dialog
  • Key Concepts of Object Storage
  • Accessing Data in Object Stores
  • Content Delivery Networks
  • BigQuery
  • BigQuery Data Source Integrations
  • BigQuery Use Case: Migrating Data from Teradata
  • The Repository Type
  • Access Timeliness

Data Security

  • Security Domains
  • The CIAs of Security
  • Common Areas, Concerns, and Considerations
  • NIST Risk Management Framework
  • Vulnerability and Exploits
  • Ways to Eliminate (Mitigate) Vulnerabilities
  • The Inputs, Activities, and Deliverables Flow
  • Inputs
  • Activities
  • Deliverables
  • Distributed Identity Management
  • Access Control: Authentication & Authorization
  • Authorization and Data Access Constraints
  • Working Environments
  • Access Control: Auditing
  • Cloud Shared Responsibility Model (SRM)
  • The AWS SRM: The AWS Side of the Deal
  • The AWS SRM: Your Side of the Deal
  • Cloud Compliance Programs
  • DevOps Security Concerns
  • Agile Programming Concerns
  • Protecting Sensitive Data at Rest
  • Hashing
  • Secure Hashing Algorithm Family
  • Symmetric and Asymmetric (Public) Key Encryption
  • Security Best Practices
  • Be Aware of Spear-phishing Attacks

Data Quality Introduction

  • Data Quality Defined
  • An Opinion on Data Quality
  • The Great, Fast, and Cheap Quality Diagram
  • Data Quality Dimensions/Properties
  • Interpreting Data Quality Properties
  • Data Flow Potential Points of Failure
  • Data Quality Assurance
  • Common Factors Contributing to Poor Data Quality
  • Data Quality is a Shared Concern
  • Data Governance
  • Common Steps to Overcome Data Quality Issues
  • Data Observability
  • Application Performance Monitoring (APM) and Observability Magic Quadrant
  • Data Quality and Data Observability Relationship
  • A Glossary of Business Terms
  • Data Dictionaries
  • SLAs
  • SLAs and Non-Functional Requirements
  • SLAs Types
  • Data Integration and Data Integrity
  • IT Systems' Woes
  • Unified Data Platform
  • The Methods and Techniques to Ensure Data Quality
  • Maintenance
  • Automation
  • Data Formats
  • Interoperable Data
  • Data Validation
  • DDL-based Data Validation
  • The Schema Production and Consumption Diagram
  • Regular Expressions
  • Industry-Standard Data Models

Lab Exercises

  • Lab 1. Learning the Colab Jupyter Notebook Environment
  • Lab 2. Metadata
  • Lab 3. The Star Schema Project
  • Lab 4. Understanding the Normalization and MDM Connection
  • Lab 5. Evidence-Based SLA Metrics

Schedule

FAQ

Does the course schedule include a Lunchbreak?

Classes typically include a 1-hour lunch break around midday. However, the exact break times and duration can vary depending on the specific class. Your instructor will provide detailed information at the start of the course.

What languages are used to deliver training?

Most courses are conducted in English, unless otherwise specified. Some courses will have the word "FRENCH" marked in red beside the scheduled date(s) indicating the language of instruction.

What does GTR stand for?

GTR stands for Guaranteed to Run; if you see a course with this status, it means this event is confirmed to run. View our GTR page to see our full list of Guaranteed to Run courses.

Does Ascendient Learning deliver group training?

Yes, we provide training for groups, individuals and private on sites. View our group training page for more information.

What does vendor-authorized training mean?

As a vendor-authorized training partner, we offer a curriculum that our partners have vetted. We use the same course materials and facilitate the same labs as our vendor-delivered training. These courses are considered the gold standard and, as such, are priced accordingly.

Is the training too basic, or will you go deep into technology?

It depends on your requirements, your role in your company, and your depth of knowledge. The good news about many of our learning paths, you can start from the fundamentals to highly specialized training.

How up-to-date are your courses and support materials?

We continuously work with our vendors to evaluate and refresh course material to reflect the latest training courses and best practices.

Are your instructors seasoned trainers who have deep knowledge of the training topic?

Ascendient Learning instructors have an average of 27 years of practical IT experience and have also served as consultants for an average of 15 years. To stay current, instructors spend at least 25 percent of their time learning new, emerging technologies and courses.

Do you provide hands-on training and exercises in an actual lab environment?

Lab access is dependent on the vendor and the type of training you sign up for. However, many of our top vendors will provide lab access to students to test and practice. The course description will specify lab access.

Will you customize the training for our company’s specific needs and goals?

We will work with you to identify training needs and areas of growth.  We offer a variety of training methods, such as private group training, on-site of your choice, and virtually. We provide courses and certifications that are aligned with your business goals.

How do I get started with certification?

Getting started on a certification pathway depends on your goals and the vendor you choose to get certified in. Many vendors offer entry-level IT certification to advanced IT certification that can boost your career. To get access to certification vouchers and discounts, please contact info@ascendientlearning.com.

Will I get access to content after I complete a course?

You will get access to the PDF of course books and guides, but access to the recording and slides will depend on the vendor and type of training you receive.

How do I request a W9 for Ascendient Learning?

View our filing status and how to request a W9.

Reviews

Simply great training provider that I can go for updating/acquiring my skill sets.

my experince was great from the day i regetered to the actuall day of the class.

Great class I learned a great deal from the material. There would seem to a large amount that I need to learn about.

Course was great and informative. The instructor had a good flow and was very personable.

I registered a day before class and am happy that I received all the materials and links in time for the class. Thanks.