Publisher:
Skillsoft
Course Series:
Certified Ethical Hacker (CEH) v10
Specialties:
IT
PostAcute
Course Description:
Explore how to analyze real datasets using the DataFrame API methods. Discover how to optimize operations using shared variables and combine data from multiple DataFrames using joins.
Other courses in this series:
Accessing Data with Spark: Data Analysis Using the Spark DataFrame API
Azure Developer: File Storage Solutions
Azure Developer: Working with Azure Service Fabric
Certified Ethical Hacker - CEHv10: Cloud Computer Attacks
Certified Ethical Hacker - CEHv10: Clouding Computing Concepts
Certified Ethical Hacker - CEHv10: Common Web App Threats
Certified Ethical Hacker - CEHv10: Common Web App Threats Part 2
Certified Ethical Hacker - CEHv10: Covert Data Gathering
Certified Ethical Hacker - CEHv10: Cracking and Mobile Hacking
Certified Ethical Hacker - CEHv10: Cryptography Attacks
Certified Ethical Hacker - CEHv10: Cryptography Concepts
Certified Ethical Hacker - CEHv10: Cryptography Concepts Part 2
Certified Ethical Hacker - CEHv10: Cryptography Concepts Part 3
Certified Ethical Hacker - CEHv10: Denial of Service
Certified Ethical Hacker - CEHv10: Ethical Hacking Overview and Threats
Certified Ethical Hacker - CEHv10: Evading IDS, Firewalls, and Honeypots
Certified Ethical Hacker - CEHv10: Evading IDS, Firewalls, and Honeypots Part 2
Certified Ethical Hacker - CEHv10: Evading IDS, Firewalls, and Honeypots Part 3
Certified Ethical Hacker - CEHv10: Footprinting
Certified Ethical Hacker - CEHv10: Hacking Concepts
Certified Ethical Hacker - CEHv10: Hacking Web Servers
Certified Ethical Hacker - CEHv10: Hidden Files and Covering Tracks
Certified Ethical Hacker - CEHv10: Host Discovery and Scanning with Nmap
Certified Ethical Hacker - CEHv10: IoT Attacks 2
Certified Ethical Hacker - CEHv10: IoT Concepts 2
Certified Ethical Hacker - CEHv10: IoT Hacking and Countermeasures
Certified Ethical Hacker - CEHv10: Malware Distribution
Certified Ethical Hacker - CEHv10: Malware Threats
Certified Ethical Hacker - CEHv10: Network Sniffing
Certified Ethical Hacker - CEHv10: Password Attacks
Certified Ethical Hacker - CEHv10: Password Attacks Part 2
Certified Ethical Hacker - CEHv10: Pentesting, Laws, and Standards
Certified Ethical Hacker - CEHv10: Practical Web App Hacking
Certified Ethical Hacker - CEHv10: Privilege Escalation
Certified Ethical Hacker - CEHv10: ProxyChains and Enumeration
Certified Ethical Hacker - CEHv10: Security Controls
Certified Ethical Hacker - CEHv10: Security Controls Part 2
Certified Ethical Hacker - CEHv10: Session Hijacking
Certified Ethical Hacker - CEHv10: Social Engineering
Certified Ethical Hacker - CEHv10: SQL Injection
Certified Ethical Hacker - CEHv10: SQL Injection Types and Tools
Certified Ethical Hacker - CEHv10: Vulnerability Analysis Concepts and Tools
Certified Ethical Hacker - CEHv10: Wireless Hacking Common Threats
Certified Ethical Hacker - CEHv10: Wireless Hacking Concepts
Certified Ethical Hacker - CEHv10: Wireless Hacking Tools
CompTIA A+ 220-1002: MS Operating System Administrative Tools
CompTIA PenTest+: Planning for an Engagement
Data Architecture Primer
DevOps with Ansible: Introduction to Playbooks and Testing
DevOps with Saltstack: Remote Execution & State System
Hadoop HDFS: Working with Files
Java SE 11: Inheritance, Lists, Inference, and Lambda Expressions
Linear Regression Models: Simplifying Regression and Classification with Estimators
Mentoring 220-1001 CompTIA A+
Oracle Database 12c R2 SQL: Conversion Functions and Conditional Expressions
Oracle Database 12c R2 SQL: Manipulating Data Using Advanced Queries
Oracle Database 12c R2 SQL: Using the Set Operators
R for Data Science: Importing and Exporting Data
Streaming Data Architectures: An Introduction to Streaming Data
System Security Certified Practitioner (SSCP 2018): Network Fundamentals
Tensorflow: K-means Clustering with TensorFlow