-
Generative AI for Data Scientists
Creative and innovative thinking is important to find unique solutions to the This course focuses on leveraging ChatGPT to make the whole data science workflow easier and faster.
-
Google Cloud Big Data
This course will introduce you to Google Cloud’s big data functions. You’ll begin with a quick overview of Google Cloud and then dive deeper into its data processing capabilities.
-
ETL Processing on Google Cloud Using Dataflow and BigQuery
Duration: 1 Day Code: BDT105Category:
All Courses,BI Engineer Learning Journey,Cloud Engineer GCP Learning Journey,Data Engineer Learning Journey,GCP: Google Cloud Platform,Gain practical expertise in constructing ETL data pipelines on Google Cloud through hands-on experience. This course employs a blend of informative lectures, live demonstrations, and interactive labs to guide you through the intricacies of designing data processing systems and constructing comprehensive end-to-end data pipelines
-
Google Cloud Big Data and Machine Learning Fundamentals
Duration: 1 Day Code: BDT101Category:
All Courses,Cloud Computing,Cloud Engineer GCP Learning Journey,GCP: Google Cloud Platform,This one-day instructor-led course introduces participants to the big data capabilities of Google Cloud.
-
No Code AI Bootcamp – Building AI Without Code
The No Code AI Bootcamp is an intensive 6-week bootcamp designed to empower individuals to create and deploy AI-powered applications without writing traditional code.
-
Neural Network-based Classification with R
Predictive modelling is one of the four main data-mining tasks and classification is one of the two categories of predictive modelling. Classification finds a model for the class attribute as a function of the values of other attributes.
-
Secure Development
Duration: 6 Half Day Sessions Or 3 Full Day Sessions Code: BDT138Category:
All Courses,Data Engineering,This course is a mix of presentations and hands-on lab sessions where participants can practice and experience how application vulnerabilities are detected and exploited by attackers and how applications can successfully defend against these attacks.