[Big Data Analysis 1] Basic Theory of Big Data

Big Data Analysis-Test Site

Serial number main category classification Mastery content Complete schedule Remarks
1 Basic Theory of Big Data Basics of Big Data Analysis understand The technical background of the birth of big data technology    
Practical application of big data technology    
Distributed processing technology concept    
Concepts of data analysis and data mining    
Familiar Clarify the goals and significance of data analysis    
Clarify the key role that distributed technology plays in massive data processing    
The difference and connection between data analysis method and data mining method    
Clarify the role of different software tools in the data analysis process    
Commonly used descriptive statistical methods    
Common data mining methods    
 Python basics understand Features, syntax and application scenarios of Python language    
Familiar Basic Python syntax, including basic data types, operators, conditional control statements, loop statements, etc.;    
Python functional programming , commonly used higher-order functions , including map function, reduce function, filter function and module related functions    
Python object-oriented programming features, including classes and instances, inheritance, and polymorphism    
Link to the database using Python    
Python visualization commonly used packages and their basic usage    
Linux and Ubuntu basics understand Getting started with Linux    
The relationship between Linux and Ubuntu    
Ubuntu installation and configuration    
Ubuntu file organization    
Common commands of Ubuntu operating system    
SSH theoretical basis    
Understand other commonly used Linux systems, such as CentOS, RedHat, SUSE, etc.    
Familiar Ubuntu operating system commands and use commands to edit files    
Basic theory of IP address    
How to use SSH commands    
Use SSH key-based security authentication for passwordless login between multiple nodes    
application Install and configure Linux operating system    
Use SSH key-based security authentication for passwordless login between multiple nodes    
Master some shell commands for Linux operations, such as awk, grep, sed, typical text processing tools    

 

 

Guess you like

Origin blog.csdn.net/debimeng/article/details/102492190