Posts

Showing posts from December, 2021

Data Analyst Vs Business Analyst Vs Data Engineer Vs BI Specialist

Image
  Data Science - Complete Track • Step 1 - Identify the business problem/value addition/question – ( Data Insights ) this has to be the starting point. • Step 2 - Data availability ( Data Governance ) - Have the structure of your data set defined – The real challenge starts here-                o Do we have the data?                o Do we have access to the required data? • Step 3 -Getting Data ( Data Mining / Data Pipeline ) – How to collect the data from different sources in the system • Step 4 - Data preparation (ETL / ELT) – Once you have data there will be lot of cleaning and preparation required, reduce/increase/combine/split the predictors, determine and eliminate outliers, populate missing values convert few categorical variables into numerical etc. • Step 5 –Exploratory Data Analysis (EDA) – In this step we do descriptive and diagnostic analysis of the existing data. We build multiple graphs that give us direction towards the next steps of predictive analytics. We migh

How to Start a Cyber Security Career

Image
  What is Cybersecurity? Cybersecurity is a practice of protecting the systems, networks from digital attacks. Now that many of the companies, financial sectors, government organizations are looking forward to protecting their data from hackers or cybercriminals .  These attacks must be handled by engineers, pen testers, security testers and other professionals to prevent the attack.  Why Cybersecurity is important? Cybersecurity is important across different sectors such as government organizations, startups, mid and large enterprises and even for personal use. But why do think security is very important? Gone are the days of simple firewalls and antivirus software being your sole security measures.  Cyber threats can come at any level of your organization So, educating your employees about simple scams like phishing, ransomware attacks or other malware designed to steal intellectual property or personal data.  Cybersecurity risk is increasing and without its help, your organiz