Posts

Showing posts from May, 2021

Data Analyst Vs Business Analyst Vs Data Engineer Vs BI Specialist

Image
  Data Science - Complete Track • Step 1 - Identify the business problem/value addition/question – ( Data Insights ) this has to be the starting point. • Step 2 - Data availability ( Data Governance ) - Have the structure of your data set defined – The real challenge starts here-                o Do we have the data?                o Do we have access to the required data? • Step 3 -Getting Data ( Data Mining / Data Pipeline ) – How to collect the data from different sources in the system • Step 4 - Data preparation (ETL / ELT) – Once you have data there will be lot of cleaning and preparation required, reduce/increase/combine/split the predictors, determine and eliminate outliers, populate missing values convert few categorical variables into numerical etc. • Step 5 –Exploratory Data Analysis (EDA) – In this step we do descriptive and diagnostic analysis of the existing data. We build multiple graphs that give us direction towards the next steps of predictive analytics. We migh

MX Linux

Image
 

How DNS Attack Threaten Organizations

Image
 

Check Point Recommendation for Better Cyber Defense

Image
 

NETWORKING COMMANDS FOR WINDOWS ADMINISTRATION

Image
    Ping   Ping is used to test the ability of one network host to communicate with another.   C:\>ping <hostname>   C:\>ping <hostname>   -t   C:\>ping -4   <hostname>   C:\>ping -6   <hostname>   C:\>ping    <ip address>   C:\>ping    <ip address>   -t   Hostname   Find local computer name from command line   c:\> hostname   NbtStat   Finding a computer name using IP (NetBIOS over TCP/IP)   nbtstat -a <ip_address>   NETSTAT   NETSTAT: Network Statistics   list of all active TCP connections from your computer.   c:\> netstat   ARP   The ARP (Address Resolution Protocol ) command corresponds to the Address Resolution Protocol, it gives MAC address of target host.   c:\> arp -a <targethost-ip>   Tracert   Tracert works similarly to Ping. The major difference is that Tracert sends a series of ICMP echo requests, and the request