Header Fragment
Logo

A career growth machine

Home All Students Certifications Training Interview Plans Contact Us
  
× Login Plans Home All Students
AI Resume & Interview
Certifications Training
Books
Interview Contact Us
FAQ

Unlimited Learning, One Price
$299 / INR 23,999

All Content for $99 / INR 7,999

Offer valid for the next 3 days.

Subscribe

Chapter 1: Establish federated authentication and Single Sign-on (SSO)-Implement federated authentication/SSO as it relates to Snowflake
Chapter 2: Establish federated authentication and Single Sign-on (SSO)-Configure an Identity Provider (IdP) for Snowflake
Chapter 3: Establish federated authentication and Single Sign-on (SSO)-Configure, use, and manage federated authentication with Snowflake
Chapter 4: Implement Multi-Factor Authentication (MFA)-Enroll a Snowflake user in MFA
Chapter 5: Implement Multi-Factor Authentication (MFA)-Use MFA with different Snowflake drivers and connectors (such as, Web UI,SnowSQL, JDBC, ODBC, etc.)
Chapter 6: Implement Multi-Factor Authentication (MFA)-Monitor users who do not have MFA enabled
Chapter 7: Implement Multi-Factor Authentication (MFA)-Reset passwords and temporarily disable or permanently remove MFA from a user
Chapter 8: Utilize key pair authentication and perform key pair rotation-Create, set up, and configure a Snowflake user for key pair authentication
Chapter 9: Utilize key pair authentication and perform key pair rotation-Configure key pair rotation
Chapter 10: Configure and use OAuth protocol options-Use OAuth 2.0 in Snowflake
Chapter 11: Configure and use OAuth protocol options-Compare Snowflake OAuth to External OAuth
Chapter 12: Configure and use OAuth protocol options-Configure Snowflake OAuth for custom clients
Chapter 13: Configure and use OAuth protocol options-Configure OAuth for technology providers (such as, Tableau, Looker, Microsoft Power BI, OKTA, Azure AD, etc.)
Chapter 14: Configure and use OAuth protocol options- Outline how Snowflake OAuth is impacted by federated authentication, network policies, and private connectivity
Chapter 17: Establish network policies-Describe network policy behavior when both account-level and user-level network policies exist
Chapter 18: Establish private connectivity to Snowflake internal stages -Implement and manage cloud provider interfaces and private endpoints for internal stages
Chapter 19: Establish private connectivity to the Snowflake service-Implement and manage private connectivity between cloud providers and Snowflake
Chapter 21: Use IP address allowed lists and blocked lists for access using network access policies
Chapter 22: Use and monitor SCIM-Describe SCIM and its use cases as they relate to Snowflake
Chapter 23: Use and monitor SCIM-Manage users and groups with SCIM
Chapter 24: Use and monitor SCIM-Enable, configure, and manage SCIM integration
Chapter 25: Prevent data exfiltration with PREVENT_UNLOAD_TO_INLINE_URL and REQUIRE_STORAGE_INTEGRATION _FOR_STAGE_CREATION
Chapter 26: Manage service accounts, API integration, and automated authentication (for example, key pair authentication)
Chapter 27: Describe access control framework-Discretionary Access Control (DAC)
Chapter 28: Describe access control framework-Role-Based Access Control (RBAC)
Chapter 29: Describe the uses for, and hierarchy of, system-defined roles
Chapter 33: Describe the enforcement model
Chapter 34: Demonstrate how to grant access to specific objects within a database that requires privilege inheritance
Chapter 35: List and use different privileges available for each object type in Snowflake
Chapter 36: Custom security roles and users (for example, include related SHOW commands)
Chapter 37: Audit user activity history and query activity history across a Snowflake account
Chapter 38: Use system-defined roles
Chapter 42: Follow best practices for using and securing the ACCOUNTADMIN role
Chapter 44: Describe cloned objects and their impact on granted privileges
Chapter 47: Implement and manage future grants including restrictions and limitations
Chapter 48: Evaluate the various scenarios using warehouse grants (for example, USAGE, OPERATE, MODIFY, MONITOR)
Chapter 49: Implement and manage managed access schemas
Chapter 50: Provide access to a non-account Administrator to monitor billing and usage information
Chapter 53: Describe organizational tasks-Create and name an organization
Chapter 54: Describe organizational tasks-Name various types of organization accounts
Chapter 55: Describe organizational tasks-Identify what regions are available for a given organization
Chapter 56: Understand account tasks-View, create, and list accounts
Chapter 60: Manage encryption keys in Snowflake-Describe how Snowflake encrypts customer data
Chapter 61: Manage encryption keys in Snowflake-Describe encryption key rotation and periodic rekeying configuration
Chapter 62: Follow best practices when using the ORGADMIN role
Chapter 63: Compare the differences between ORGADMIN and ACCOUNTADMIN roles
Chapter 64: Mask column data in Snowflake-Implement and manage column-level security using masking policies
Chapter 65: Mask column data in Snowflake-Use external tokenization to protect Personal Identifiable Information (PII)
Chapter 67: Implement and manage row access policies-Configure a row access policy on an object
Chapter 68: Implement and manage row access policies-Compare row access policies to secure views
Chapter 69: Perform auditing of access history-Audit access history details using the access history views
Chapter 70: Use tagging and classification in Snowflake-Identify use cases where tagging would be beneficial
Chapter 71: Use tagging and classification in Snowflake-Implement and manage tagging
Chapter 72: Use tagging and classification in Snowflake-Implement tag-based masking policies
Chapter 73: Use tagging and classification in Snowflake-Implement data classification (EXTRACT_SEMANTIC_CATEGORIES, ASSOCIATE_SEMANTIC_CATEGORIES)
Chapter 74: Describe the differences between account names and account locators
Chapter 76: Use region IDs and region groups
Chapter 77: Implement Snowflake table structures
Chapter 84: Use persisted query results
Chapter 85: Demonstrate the ability to cancel statements for both a single user as well as for other users
Chapter 86: Use query history filters including client-generated queries and queries executed by user tasks
Chapter 87: Visualize query results with SnowsightUse Snowsight dashboards to monitor activity
Chapter 88: Visualize query results with SnowsightShare worksheets and dashboards
Chapter 89: Visualize query results with SnowsightGenerate and share Snowsight charts
Chapter 90: Stage data files from a local file system-Use SnowSQL
Chapter 91: Stage data files from a local file system-Use Snowsight
Chapter 92: Create, manage, and maintain Snowflake internal and external stages-Data exfiltration, storage integrations, etc.
Chapter 93: Outline user-managed (virtual-warehouse) tasks and associated use cases-Schedule tasks
Chapter 94: Outline user-managed (virtual-warehouse) tasks and associated use cases-Permissions required for creating and executing tasks
Chapter 95: Outline user-managed (virtual-warehouse) tasks and associated use cases-Troubleshoot task historical runs
Chapter 96: Outline Snowflake-managed (serverless) tasks and associated use cases
Chapter 97: Outline streams and associated use cases-Create, monitor, and consume streams
Chapter 98: Outline streams and associated use cases-Describe how data retention configuration affects usage of streams
Chapter 99: Outline the impact on data loading, and query processing based on warehouse sizes
Chapter 100: Configure warehouse properties (auto-suspend, auto-resume)
Chapter 101: Given a scenario, manage warehouse usage in sessions and size the warehouse accordingly
Chapter 102: Given a scenario, manage a multi-cluster warehouse-Describe use cases and benefits
Chapter 103: Given a scenario, manage a multi-cluster warehouse-Describe, establish, and maintain a scaling policy
Chapter 104: Given a scenario, manage a multi-cluster warehouse-Monitor multi-cluster warehouses
Chapter 105: Describe the components of the Query Profile:Steps
Chapter 107: Describe the components of the Query Profile:Operator nodes
Chapter 108: Describe the components of the Query Profile:Operator types
Chapter 109: Compare compile versus runtime optimizations-I-dentify/create efficient querie-sArticulate the execution path
Chapter 111: Compare compile versus runtime optimizations-Identify/create efficient queries-dsdPerform grouping, sorting, and ordering
Chapter 112: Troubleshoot common query performance issues
Chapter 113: If data spilling is present, describe its impact and remediation tactics
Chapter 114: If data pruning is not occuring, describe its impact and remediation tactics
Chapter 115: Describe the various timeout parameters
Chapter 124: Implement performance improvements-Use the query acceleration service
Chapter 128: Set up notifications for resource monitors
Chapter 129: Create and enable cluster keys Outline a methodology for explicit clustering
Chapter 131: Follow best practices for clustering Lowest cardinality column first
Chapter 132: Follow best practices for clustering Fewer columns is generally better
Chapter 133: Follow best practices for clustering Verify table scan is the problem - otherwise a cluster key will not help
Chapter 134: Describe micro-partitions, their benefits, and their impact
Chapter 135: Retrieve clustering information (depth, ratio, and histogram)
Chapter 136: Manage organization costs Describe the differences between account_usage and organization_usage
Chapter 137: Manage organization costs Monitor accounts and usage on the organization levelUse the ORGANIZATION_USAGE schema in the SNOWFLAKE shared database
Chapter 139: Manage organization costs Monitor and calculate data replication costs
Chapter 140: Forecast and monitor costs and pricing Enable resource monitor notifications
Chapter 141: Forecast and monitor costs and pricing Determine when warehouses should be suspended or resumed based on cost and pricing
Chapter 142: Describe the use cases for the account_usage and information_schema Views available from the information_schema
Chapter 143: Describe the use cases for the account_usage and information_schema Latency and data retention considerations
Chapter 145: Monitor and calculate warehouse usage/credits Demonstrate cost saving strategies
Chapter 146: Monitor and calculate warehouse usage/credits Use resource monitors
Chapter 147: Describe how Snowflake credits are consumed by the cloud services layer (such as Snowpipe, materialized views, and automatic clustering)
Chapter 149: implement sharing solutions and impacts Types of sharing (such as one to one/one to many, private exchange, Snowflake Marketplace)
Chapter 150: implement sharing solutions and impacts Sharing among different editions of Snowflake
Chapter 151: implement sharing solutions and impacts Sharing cross-regions or cross-clouds The role of replications
Chapter 152: implement sharing solutions and impacts Sharing cross-regions or cross-clouds Cross-cloud auto fulfillment for listings
Chapter 153: implement sharing solutions and impacts Configure data sharing programmatically Share different types of data objects including secure functions
Chapter 154: implement sharing solutions and impacts Configure data sharing programmatically Describe the role of context functions in data sharing
Chapter 155: Manage data providers and consumers Create, manage, and maintain an outbound data share
Chapter 156: Manage data providers and consumers Share objects securely in a data share (for example, what type to use)
Chapter 166: Outline the process of becoming a data provider Create, edit, or delete provider profiles
Chapter 167: Manage data listings Publish, edit, unpublish, or republish data listings
Chapter 168: Access the Snowflake Marketplace to browse listings Request access to a Snowflake Marketplace listing (as a consumer)
Chapter 169: Request that new data or a data provider be added to the Snowflake Marketplace Create and manage data provider profiles
Chapter 170: Request that new data or a data provider be added to the Snowflake Marketplace Create, submit, manage, and modify a data listing
Chapter 171: Manage listing requests View and manage pending listing requests
Chapter 174: Describe the differences between primary and secondary databases
Chapter 176: Replicate account-level objects
Chapter 180: Outline the database replication processes with respect to the different Snowflake editions Replicate data to a lower Snowflake edition
Chapter 181: Describe the limitations of database replications
Chapter 182: Outline the implications of database replications (for example, billing)
Chapter 184: Outline database replications considerations for: Materialized views
Chapter 185: Outline database replications considerations for: External tables
Chapter 186: Outline database replications considerations for: Policies (masking and row access)
Chapter 187: Outline database replications considerations for: Table streams
Chapter 189: Outline database replications considerations for: Stages (internal and external)
Chapter 190: Outline database replications considerations for: Access controls
Chapter 191: Outline database replications considerations for: Historical usage data
Chapter 192: Outline database replications considerations for: Tags
Chapter 195: Perform replication across multiple accounts
Chapter 196: Outline the impact of failing-over databases across multiple accounts
Chapter 198: Design and implement disaster recovery and business continuity plans What is database failover or failback?

Combo Packages at a Discount: Get one that best fits your learning needs.