Keiser University-Tallahassee Classifieds>Keiser University-Tallahassee Online Courses>Building ETL and Data Pipelines with Bash, Airflow and Kafka

Building ETL and Data Pipelines with Bash, Airflow and Kafka

About this Course

Well-designed and automated data pipelines and ETL processes are the foundation of a successful Business Intelligence platform. Defining your data workflows, pipelines and processes early in the platform design ensures the right raw data is collected, transformed and loaded into desired storage layers and available for processing and analysis as and when required. This course is designed to provide you the critical knowledge and skills needed by Data Engineers and Data Warehousing specialists to create and manage ETL, ELT, and data pipeline processes. Upon completing this course you’ll gain a solid understanding of Extract, Transform, Load (ETL), and Extract, Load, and Transform (ELT) processes; practice extracting data, transforming data, and loading transformed data into a staging area; create an ETL data pipeline using Bash shell-scripting, build a batch ETL workflow using Apache Airflow and build a streaming data pipeline using Apache Kafka. You’ll gain hands-on experience with practice labs throughout the course and work on a real-world inspired project to build data pipelines using several technologies that can be added to your portfolio and demonstrate your ability to perform as a Data Engineer. This course pre-requisites that you have prior skills to work with datasets, SQL, relational databases, and Bash shell scripts.

Created by: IBM

Level: Introductory


Related Online Courses

Could we create an opponent that will always beat us in rock paper scissors? How could we educate youth about the climate crisis through a video game? Can a story be interactive? These are some of... more
Hoy en día prácticamente cualquiera con algo de responsabilidad en una organización tiene que hacer en algún momento una presentación eficaz con la que comunicar sus ideas o los resultados de su t... more
This course is designed to show you how to teach computational thinking to children aged 7-12+. The course will be valuable to you, whether you are new to this approach or an enthusiastic... more
On the hardware side, we will mount power analysis attacks on the cryptographic algorithms RSA and AES. We will see that simple power analysis attacks and differential power analysis attacks are... more
Il corso affronta lo studio di due discipline solo apparentemente lontane da loro. La prima, la più giovane per codificazione scientifica, avvenuta solo nel XIX secolo, è stata denominata “... more

CONTINUE SEARCH

FOLLOW COLLEGE PARENT CENTRAL