Back to search results

Accessing Data with Spark: Data Analysis Using the Spark DataFrame API

Publisher:
Skillsoft

Course Series:
Certified Ethical Hacker (CEH) v10

Specialties:
IT PostAcute

Course Description:
Explore how to analyze real datasets using the DataFrame API methods. Discover how to optimize operations using shared variables and combine data from multiple DataFrames using joins.

Other courses in this series:
Accessing Data with Spark: Data Analysis Using the Spark DataFrame API Azure Developer: File Storage Solutions Azure Developer: Working with Azure Service Fabric Certified Ethical Hacker - CEHv10: Cloud Computer Attacks Certified Ethical Hacker - CEHv10: Clouding Computing Concepts Certified Ethical Hacker - CEHv10: Common Web App Threats Certified Ethical Hacker - CEHv10: Common Web App Threats Part 2 Certified Ethical Hacker - CEHv10: Covert Data Gathering Certified Ethical Hacker - CEHv10: Cracking and Mobile Hacking Certified Ethical Hacker - CEHv10: Cryptography Attacks Certified Ethical Hacker - CEHv10: Cryptography Concepts Certified Ethical Hacker - CEHv10: Cryptography Concepts Part 2 Certified Ethical Hacker - CEHv10: Cryptography Concepts Part 3 Certified Ethical Hacker - CEHv10: Denial of Service Certified Ethical Hacker - CEHv10: Ethical Hacking Overview and Threats Certified Ethical Hacker - CEHv10: Evading IDS, Firewalls, and Honeypots Certified Ethical Hacker - CEHv10: Evading IDS, Firewalls, and Honeypots Part 2 Certified Ethical Hacker - CEHv10: Evading IDS, Firewalls, and Honeypots Part 3 Certified Ethical Hacker - CEHv10: Footprinting Certified Ethical Hacker - CEHv10: Hacking Concepts Certified Ethical Hacker - CEHv10: Hacking Web Servers Certified Ethical Hacker - CEHv10: Hidden Files and Covering Tracks Certified Ethical Hacker - CEHv10: Host Discovery and Scanning with Nmap Certified Ethical Hacker - CEHv10: IoT Attacks 2 Certified Ethical Hacker - CEHv10: IoT Concepts 2 Certified Ethical Hacker - CEHv10: IoT Hacking and Countermeasures Certified Ethical Hacker - CEHv10: Malware Distribution Certified Ethical Hacker - CEHv10: Malware Threats Certified Ethical Hacker - CEHv10: Network Sniffing Certified Ethical Hacker - CEHv10: Password Attacks Certified Ethical Hacker - CEHv10: Password Attacks Part 2 Certified Ethical Hacker - CEHv10: Pentesting, Laws, and Standards Certified Ethical Hacker - CEHv10: Practical Web App Hacking Certified Ethical Hacker - CEHv10: Privilege Escalation Certified Ethical Hacker - CEHv10: ProxyChains and Enumeration Certified Ethical Hacker - CEHv10: Security Controls Certified Ethical Hacker - CEHv10: Security Controls Part 2 Certified Ethical Hacker - CEHv10: Session Hijacking Certified Ethical Hacker - CEHv10: Social Engineering Certified Ethical Hacker - CEHv10: SQL Injection Certified Ethical Hacker - CEHv10: SQL Injection Types and Tools Certified Ethical Hacker - CEHv10: Vulnerability Analysis Concepts and Tools Certified Ethical Hacker - CEHv10: Wireless Hacking Common Threats Certified Ethical Hacker - CEHv10: Wireless Hacking Concepts Certified Ethical Hacker - CEHv10: Wireless Hacking Tools CompTIA A+ 220-1002: MS Operating System Administrative Tools CompTIA PenTest+: Planning for an Engagement Data Architecture Primer DevOps with Ansible: Introduction to Playbooks and Testing DevOps with Saltstack: Remote Execution & State System Hadoop HDFS: Working with Files Java SE 11: Inheritance, Lists, Inference, and Lambda Expressions Linear Regression Models: Simplifying Regression and Classification with Estimators Mentoring 220-1001 CompTIA A+ Oracle Database 12c R2 SQL: Conversion Functions and Conditional Expressions Oracle Database 12c R2 SQL: Manipulating Data Using Advanced Queries Oracle Database 12c R2 SQL: Using the Set Operators R for Data Science: Importing and Exporting Data Streaming Data Architectures: An Introduction to Streaming Data System Security Certified Practitioner (SSCP 2018): Network Fundamentals Tensorflow: K-means Clustering with TensorFlow
Back to Top