Header Fragment
Logo

A career growth machine

Home All Students Certifications Training Interview Plans Contact Us
  
× Login Plans Home All Students
AI Resume & Interview
Certifications Training
Books
Interview Contact Us
FAQ

Unlimited Learning, One Price
$299 / INR 23,999

All Content for $99 / INR 7,999

Offer valid for the next 3 days.

Subscribe

Chapter 2: Account and Security-Parameters (all levels)-Object parameters
Chapter 3: Account and Security-Parameters (all levels)-Session parameters-Outline the Snowflake parameter hierarchy and the relationship between the parameter types.
Chapter 4: Account and Security-Isolate or segment accounts
Chapter 5: Account and Security-Key considerations and constraints when defining an account strategy
Chapter 6: Account and Security-Features/capabilities that can be leveraged across accounts
Chapter 7: Account and Security-Identify use cases that are appropriate for account strategies
Chapter 8: Account and Security-Configure Role-Based Access Control (RBAC) hierarchy-Privilege inheritance
Chapter 9: Account and Security-Configure Role-Based Access Control (RBAC) hierarchy-Database roles
Chapter 10: Account and Security-Configure Role-Based Access Control (RBAC) hierarchy-System roles and associated best practices
Chapter 11: Account and Security-Configure Role-Based Access Control (RBAC) hierarchy-Functional roles compared to access roles
Chapter 12: Account and Security-Configure Role-Based Access Control (RBAC) hierarchy-Secondary roles
Chapter 13: Account and Security-Data Access-Storage integrations
Chapter 14: Account and Security-Data Security-Secure views
Chapter 15: Account and Security-Data Security-Data Governance-Column-level security
Chapter 16: Account and Security-External tokenization
Chapter 17: Account and Security-Dynamic Data Masking-Row-level security
Chapter 18: Account and Security-Row access policies-Aggregate policies
Chapter 21: Account and Security-Row access policies-Object tagging-Compliance
Chapter 22: Account and Security-Row access policies-Object tagging-Features of the different Snowflake editions-Payment Card Industry (PCI) Security Standard
Chapter 23: Account and Security-Row access policies-Object tagging-Features of the different Snowflake editions-Personal Identifiable Information (PII)/ Personal Health Information (PHI)
Chapter 26: Account and Security-Network security-Network rules
Chapter 27: Account and Security-Network security-External access
Chapter 28: Account and Security-Network security-Access control privileges
Chapter 29: Account and Security-Network security-Private connectivity-AWS PrivateLink
Chapter 31: Account and Security-Network security-Private connectivity-Google Cloud Private Service Connect
Chapter 32: Account and Security-User, role, and grants provisioning
Chapter 33: Account and Security-Authentication-Authentication policies
Chapter 35: Account and Security-Authentication-Single Sign-On (SSO)
Chapter 36: Account and Security-Authentication-OAuth
Chapter 37: Account and Security-Authentication-Multi-Factor Authentication (MFA)
Chapter 38: Account and Security-Authentication-Key-pair authentication
Chapter 39: Account and Security-Authentication-Security integrations
Chapter 40: Data models-Data vault
Chapter 42: Use of key/column constraints (ENABLE/RELY/VALIDATE)
Chapter 43: Use cases-Sharing within the same organization/same Snowflake account
Chapter 44: Use cases-Sharing within a cloud region
Chapter 48: Use cases-Sharing across cloud providers
Chapter 53: Data sharing methods-Security patterns for data sharing
Chapter 54: Data sharing methods-Outline the purpose, benefits, and capabilities of the multiple data sharing methods-Cross-Cloud Auto-Fulfillment
Chapter 55: Data lake and environments-Storage directory structure
Chapter 56: Data lake and environments-Zones (data warehouse layers)
Chapter 57: Data lake and environments-Support of DevOps/DataOps principles
Chapter 58: Data lake and environments-Production/development/sandbox
Chapter 61: Data lake and environments-ELT/ETL
Chapter 62: Development lifecycle support-Migration
Chapter 63: Development lifecycle support-Deployment-CI/CD
Chapter 64: Development lifecycle support-Deployment-Snowflake CLI-Git integration
Chapter 65: Development lifecycle support-Deployment-Snowflake CLI-Rollback process
Chapter 66: Outline basic AI/ML pipelines and applications-Snowpark Container Services
Chapter 67: Outline basic AI/ML pipelines and applications-Snowflake ML functions
Chapter 69: Outline basic AI/ML pipelines and applications-Streamlit
Chapter 70: Outline basic AI/ML pipelines and applications-Snowflake Native App Framework
Chapter 73: Object hierarchy-Databases-Schemas
Chapter 77: Object hierarchy-Databases-File formats
Chapter 78: Object hierarchy-Databases-Functions
Chapter 79: Object hierarchy-Databases-Procedures
Chapter 81: Backup/recovery-Time Travel-Table types
Chapter 84: Backup/recovery-Time Travel-Query performance impacts
Chapter 85: Backup/recovery-Data corruption impacts
Chapter 86: Backup/recovery-Zero-copy cloning
Chapter 87: Backup/recovery-Fail-safe
Chapter 88: Disaster recovery-Replication and failover
Chapter 89: Data sources-Data at rest
Chapter 91: Data sources-External sources and formats
Chapter 93: Data sources-Streaming data-Change Data Capture (CDC)
Chapter 95: Data ingestion-Bulk file upload
Chapter 97: Data ingestion-Snowpipe Streaming
Chapter 98: Data ingestion-External tables
Chapter 100: Data ingestion-Incremental updates compared to full updates
Chapter 102: Data ingestion-Parameters for copying data and addressing data handling errors
Chapter 103: Architecture changes-Schema detection and table schema evolution
Chapter 105: Data unloading
Chapter 106: Connectors-Kafka
Chapter 109: Connectors-Snowflake Connector for ServiceNow
Chapter 110: Connectors-Snowflake Connector for Google Analytics
Chapter 112: Drivers-ODBC
Chapter 113: API endpoints-Use of system$allowlist
Chapter 114: API endpoints-SQL API
Chapter 118: Snowpark-Scala
Chapter 119: Snowpark-Java
Chapter 120: Views and tables-Benefits, limitations, properties
Chapter 121: Views and tables-Relationship and impact between the view and data types
Chapter 122: Views and tables-Impact of costs
Chapter 124: Staging layers and tables
Chapter 125: Querying semi-structured data-Flattened
Chapter 127: Stored procedures
Chapter 130: Functions-User-Defined Functions (UDFs)
Chapter 131: Functions-User-Defined Table Functions (UDTFs)
Chapter 132: Functions-Secure functions
Chapter 133: Query profiling-Interpret a Query Profile, identify bottlenecks, and outline recommendations
Chapter 135: Query profiling-Warehouse queuing
Chapter 136: Query profiling-Warehouse spilling
Chapter 137: Virtual warehouse configurations-Auto-suspend/resume
Chapter 139: Virtual warehouse configurations-Scale in/out (multi-cluster warehouse/auto-scaling)
Chapter 140: Virtual warehouse configurations-Query acceleration service
Chapter 141: Virtual warehouse configurations-Snowpark-optimized warehouses
Chapter 145: Search optimization service
Chapter 146: Caching-Different cache layers
Chapter 147: Caching-Cache expiration
Chapter 149: Use of system clustering information
Chapter 151: Optimization techniques
Chapter 153: Monitoring and alerting-Use of the Account Usage and the Information schemas
Chapter 155: Monitoring and alerting-Alerts and notifications (for example, errors, email)
Chapter 156: Monitoring and alerting-Event tables (for example, logging, tracing)

Combo Packages at a Discount: Get one that best fits your learning needs.