Tuesday, November 1, 2016

Exam 70-734 OEM Preinstallation for Windows 10

Published: June 16, 2016
Languages: English, Japanese
Audiences: IT professionals
Technology: Windows 10, Microsoft Assessment and Deployment Kit (ADK)
Credit toward certification: MCP

This exam measures your ability to accomplish the technical tasks listed below. View video tutorials about the variety of question types on Microsoft exams.

Please note that the questions may test on, but will not be limited to, the topics described in the bulleted text.

Do you have feedback about the relevance of the skills measured on this exam? Please send Microsoft your comments. All feedback will be reviewed and incorporated as appropriate while still maintaining the validity and reliability of the certification process. Note that Microsoft will not respond directly to your feedback. We appreciate your input in ensuring the quality of the Microsoft Certification program.

If you have concerns about specific questions on this exam, please submit an exam challenge.

If you have other questions or feedback about Microsoft Certification exams or about the certification program, registration, or promotions, please contact your Regional Service Center.

Prepare deployments
Prepare the environment
Prepare Assessment and Deployment Kit (ADK), prepare USB, design an answer file, create a default user profile, preserve preinstalled OEM drivers
Identify a business strategy for deploying operating system images
Identify a build-to-order or build-to-plan approach, select a deployment method, implement end-user upgrade paths
Determine hardware configurations
Determine Unified Extensible Firmware Interface (UEFI) requirements, configure network and storage drivers, configure a boot device
Build a Windows Preinstallation Environment (Windows PE or WinPE)
Troubleshoot a problematic installation in WinPE, customize a WinPE installation, create a 32-bit or 64-bit WinPE environment, manage Windows PE packages

Create, capture, and deploy images
Create a reference installation
Set up and capture a reference PC, preinstall Microsoft and third-party desktop applications, set up a Push-Button Restore, evaluate deployment logs, prepare and test Out-of-Box Experience (OOBE)
Determine redistribution licensing requirements
Determine redistribution rights and technical requirements, select licensed recovery types, determine OEM preinstallation requirements

Manage deployments
Manage images
Upgrade a Windows edition, perform online or offline servicing, activate a grace period timer, manage nested images within Windows Imaging File Format (WIMS), add and remove packages, add and remove drivers, set the multilingual deployment of an operating system, manage application updates
Apply a reference installation
Perform drive partitioning, deploy reference and recovery images, set up Push-Button Recovery with REAgentC and BCD commands
Validate an image
Validate an image in audit mode, validate Push-Button Reset, sysprep images to OOBE, identify causes of driver failure, finalize installation, validate licensing requirements and components

Saturday, October 15, 2016

Exam 70-744 Securing Windows Server 2016 (In development)

Published: November 3, 2016
Languages: English
Audiences: IT professionals
Technology: Windows Server 2016
Credit toward certification: MCSE

Skills measured
This exam measures your ability to accomplish the technical tasks listed below. The percentages indicate the relative weight of each major topic area on the exam. The higher the percentage, the more questions you are likely to see on that content area on the exam. View video tutorials about the variety of question types on Microsoft exams.

Please note that the questions may test on, but will not be limited to, the topics described in the bulleted text.

Do you have feedback about the relevance of the skills measured on this exam? Please send Microsoft your comments. All feedback will be reviewed and incorporated as appropriate while still maintaining the validity and reliability of the certification process. Note that Microsoft will not respond directly to your feedback. We appreciate your input in ensuring the quality of the Microsoft Certification program.

If you have concerns about specific questions on this exam, please submit an exam challenge.

If you have other questions or feedback about Microsoft Certification exams or about the certification program, registration, or promotions, please contact your Regional Service Center.

Implement server hardening solutions (25–30%)
Configure disk and file encryption
Determine hardware and firmware requirements for secure boot and encryption key functionality; deploy BitLocker encryption; deploy BitLocker without a Trusted Platform Module (TPM); deploy BitLocker with a TPM only; configure the Network Unlock feature; configure BitLocker Group Policy settings; enable Bitlocker to use secure boot for platform and BCD integrity validation; configure BitLocker on Clustered Shared Volumes (CSVs) and Storage Area Networks (SANs); implement BitLocker Recovery Process using self-recovery and recovery password retrieval solutions; configure BitLocker for virtual machines (VMs) in Hyper-V; determine usage scenarios for Encrypting File System (EFS); configure the EFS recovery agent; manage EFS and BitLocker certificates, including backup and restore
Implement server patching and updating solutions
Install and configure Windows Server Update Services (WSUS), manage updates using WSUS, create computer groups, configure update approvals and deployments, configure automatic updates, configure WSUS reporting, troubleshoot WSUS configuration and deployments
Implement malware protection
Implement antimalware solution with Windows Defender, integrate Windows Defender with WSUS and Windows Update, configure Windows Defender using Group Policy, configure Windows Defender scans using Windows PowerShell, implement AppLocker rules, implement AppLocker rules using Windows PowerShell, implement Control Flow Guard, implement Code Integrity (Device Guard) Policies, create Code Integrity policy rules, create Code Integrity file rules
Protect credentials
Determine requirements for implementing Credential Guard; configure Credential Guard using Group Policy, WMI, command prompt, and Windows PowerShell; implement NTLM blocking
Create security baselines
Install and configure Security Compliance Manager (SCM); create, view, and import security baselines; deploy configurations to domain and non-domain joined servers

Secure a virtualization infrastructure (5–10%)
Implement a Guarded Fabric solution
Install and configure the Host Guardian Service (HGS), configure Admin-trusted attestation, configure TPM-trusted attestation, configure the Key Protection Service using HGS, migrate Shielded VMs to other guarded hosts, configure Nano Server as TPM attested guarded host, troubleshoot guarded hosts
Implement Shielded and encryption-supported VMs
Determine requirements and scenarios for implementing Shielded VMs, create a Shielded VM using only a Hyper-V environment, enable and configure vTPM to allow an operating system and data disk encryption within a VM, determine requirements and scenarios for implementing encryption-supported VMs, troubleshoot Shielded and encryption-supported VMs

Secure a network infrastructure (10–15%)
Configure Windows Firewall
Configure Windows Firewall with Advanced Security; configure network location profiles; configure and deploy profile rules; configure firewall rules for multiple profiles using Group Policy; configure connection security rules using Group Policy, the GUI management console, or Windows PowerShell; configure Windows Firewall to allow or deny applications, scopes, ports, and users using Group Policy, the GUI management console, or Windows PowerShell; configure authenticated firewall exceptions; import and export settings
Implement a software-defined Distributed Firewall
Determine requirements and scenarios for Distributed Firewall implementation with software-defined networking, determine usage scenarios for Distributed Firewall policies and network security groups
Secure network traffic
Configure IPsec transport and tunnel modes, configure IPsec authentication options, configure connection security rules, implement isolation zones, implement domain isolation, implement server isolation zones, determine SMB 3.1.1 protocol security scenarios and implementations, enable SMB encryption on SMB Shares, configure SMB signing via Group Policy, disable SMB 1.0, secure DNS traffic using DNSSEC and DNS policies, install and configure Microsoft Message Analyzer (MMA) to analyze network traffic

Manage privileged identities (25–30%)
Implement an Enhanced Security Administrative Environment (ESAE) administrative forest design approach
Determine usage scenarios and requirements for implementing ESAE forest design architecture to create a dedicated administrative forest, determine usage scenarios and requirements for implementing clean source principals in an Active Directory architecture
Implement Just-in-Time (JIT) Administration
Create a new administrative (bastion) forest in an existing Active Directory environment using Microsoft Identity Manager (MIM), configure trusts between production and bastion forests, create shadow principals in bastion forest, configure the MIM web portal, request privileged access using the MIM web portal, determine requirements and usage scenarios for Privileged Access Management (PAM) solutions, create and implement MIM policies, implement Just-in-Time administration principals using time-based policies, request privileged access using Windows PowerShell
Implement Just-Enough-Administration (JEA)
Enable a JEA solution on Windows Server 2016; create and configure session configuration files, create and configure role capability files, create a JEA endpoint, connect to a JEA endpoint on a server for administration, view logs, download WMF 5.1 to a Windows Server 2008 R2, configure a JEA endpoint on a server using Desired State Configuration (DSC)
Implement Privileged Access Workstations (PAWs) and User Rights Assignments
Implement a PAWS solution, configure User Rights Assignment group policies, configure security options settings in Group Policy, enable and configure Remote Credential Guard for remote desktop access
Implement Local Administrator Password Solution (LAPS)
Install and configure the LAPS tool, secure local administrator passwords using LAPS, manage password parameters and properties using LAPS

Implement threat detection solutions (15–20%)
Configure advanced audit policies
Determine the differences and usage scenarios for using local audit policies and advanced auditing policies; implement auditing using Group Policy and AuditPol.exe; implement auditing using Windows PowerShell; create expression-based audit policies; configure the Audit PNP Activity policy; configure the Audit Group Membership policy; enable and configure Module, Script Block, and Transcription logging in Windows PowerShell
Install and configure Microsoft Advanced Threat Analytics (ATA)
Determine usage scenarios for ATA; determine deployment requirements for ATA, install and configure ATA Gateway on a dedicated server, install and configure ATA Lightweight Gateway directly on a domain controller, configure alerts in ATA Center when suspicious activity is detected, review and edit suspicious activities on the attack time line
Determine threat detection solutions using Operations Management Suite (OMS)
Determine usage and deployment scenarios for OMS, determine security and auditing functions available for use; determine Log Analytics usage scenarios

Implement workload-specific security (5–10%)
Secure application development and server workload infrastructure
Determine usage scenarios, supported server workloads, and requirements for Nano Server deployments; install and configure Nano Server; implement security policies on Nano Servers using Desired State Configuration (DSC); determine usage scenarios and requirements for Windows Server and Hyper-V containers; install and configure Hyper-V containers
Implement a secure file services infrastructure and Dynamic Access Control (DAC)
Install the File Server Resource Manager (FSRM) role service, configure quotas, configure file screens, configure storage reports, configure file management tasks, configure File Classification Infrastructure (FCI) using FSRM, implement work folders, configure file access auditing, configure user and device claim types, implement policy changes and staging, perform access-denied remediation, create and configure Central Access rules and policies, create and configure resource properties and lists

Thursday, September 8, 2016

Exam 70-685 Windows 7, Enterprise Desktop Support Technician

Published: November 27, 2009
Languages: English, German, Japanese
Audiences: IT professionals
Technology: Windows 7
Credit toward certification: MCP, Specialist

Skills measured
This exam measures your ability to accomplish the technical tasks listed below. The percentages indicate the relative weight of each major topic area on the exam. The higher the percentage, the more questions you are likely to see on that content area on the exam. View video tutorials about the variety of question types on Microsoft exams.

Please note that the questions may test on, but will not be limited to, the topics described in the bulleted text.

Do you have feedback about the relevance of the skills measured on this exam? Please send Microsoft your comments. All feedback will be reviewed and incorporated as appropriate while still maintaining the validity and reliability of the certification process. Note that Microsoft will not respond directly to your feedback. We appreciate your input in ensuring the quality of the Microsoft Certification program.

If you have concerns about specific questions on this exam, please submit an exam challenge.

If you have other questions or feedback about Microsoft Certification exams or about the certification program, registration, or promotions, please contact your Regional Service Center.

Identifying cause of and resolving desktop application issues (20-25%)
Solve software installation escalations
Installation permissions; local administrator requirement; licensing restrictions; digital signing
Solve software failure escalations
Checking the logs; checking whether the application runs in Safe mode; running the application in a previous version of Windows; repairing the installation; checking recently added programs; restoring or reimaging the system

Preparation resources
Help with Windows 7 compatibility problems
Five steps to Windows 7 application readiness
Performance monitoring getting started guide

Identifying cause of and resolving networking issues (20-25%)
Solve enterprise logon issues
Hardware vs. network; password expiration; trust relationships with machine accounts; determining logon context; logon hours compliance
Solve enterprise network connectivity issues
Determining scope of issue; determining whether it’s a PC or a network connectivity issue; TCP/IP; hardware and cabling; proxies; default gateway
Solve enterprise names resolution issues
Checking which DNS is assigned; flushing the DNS cache; nslookup to DNS server; checking the DHCP scopes
Solve enterprise network printer issues
Hardware failure; server issues; printer failure; network issues; driver issues

Preparation resources
Windows 7: Troubleshooting connections
Open the printer troubleshooter

Managing and maintaining systems that run Windows 7 client (20-25%)
Identify and/or resolve performance issues
Analyzing system and application logs; analyzing started services; setting power management; checking hard drive space; optimizing virtual memory
Solve hardware failure issues
Identifying bad sectors; diagnosing memory issues; recommending replacement hardware; updating the BIOS; determining which component is broken

Preparation resources
Check a drive for errors
Learn best practices for optimizing the virtual memory configuration
Run diagnostics to check your system for memory problems

Supporting mobile users (15-20%)
Solve enterprise wireless connectivity issues
Signal strength; encryption types; encryption keys; wireless profiles; mobile devices
Solve enterprise remote access issues
VPN client not connecting; IPv6 support; access and authentication to network resources

Preparation resources
Wired and wireless network problems
Troubleshoot Remote Desktop problems
Why am I having problems with my VPN connection?

Identifying cause of and resolving security issues (15-20%)
Solve Windows Internet Explorer security issues
Adding trusted sites; advanced settings; installing plug-ins; identifying group policy restrictions; certificates
Solve enterprise issues due to malicious software
Analyzing services; analyzing programs; analyzing processes; analyzing browser helper add-ons; user account control
Solve enterprise storage security issues
Requirements for installing; recovering encryption keys; key management
Solve enterprise software update issues
Identifying software update level; checking whether client is receiving regularly scheduled updates; identifying incompatibility of update with other applications

Preparation resources
Change Internet Explorer 9 security settings
Troubleshoot problems with installing updates
Security monitoring and attack detection planning guide

QUESTION 1
The chief financial officer (CFO) releases new guidelines that specify that only users from finance are allowed to run FinanceApp1.
Users in the Marketing OU report that they can run FinanceApp1.
You need to ensure that only users in the Finance OU can run FinanceApp1.
What should you do?

A. In the AllComputers GPO, create a new AppLocker executable rule.
B. In the Desktops GPO and the Laptops GPO, create a new Windows Installer rule.
C. In the AllComputers GPO, create a software restriction policy and define a new hash rule.
D. In the Desktops GPO and the Laptops GPO, create a software restriction policy and define a new path rule.

Answer: A

Explanation:
Chapter 10 p 467- 468
Understanding the difference between SRP and AppLocker
You might want to deploy application control policies onto Windows operating systems earlier than Windows
Server2008R2 or Windows7. You can use AppLocker policies only on the supported editions of Windows
Server2008R2 and Windows7, but you can use SRP on supported editions of Windows beginning with
Windows Server2003 and WindowsXP. http://technet.microsoft.com/en-us/library/ee460955(WS.10).aspx http://technet.microsoft.com/en-us/library/dd548340(WS.10).aspx


QUESTION 2
Users in the ERPApp1 pilot project report intermittent application issues.
You need to consolidate all application events for the users in a central location.
What should you do?

A. Configure event subscriptions.
B. Configure the Advanced Audit Policy Configuration settings.
C. Create a custom view in Event Viewer.
D. Create a user-defined Data Collector Set.

Answer: A


QUESTION 3
The help desk reports that users in the Marketing OU print draft documents, e-mails, and
other miscellaneous documents on Printer2.
You need to recommend a solution so that marketing users print documents to Printer1 by default.
What should you do?

A. Enable printer pooling.
B. Configure Group Policy Preferences.
C. Modify the priorities of the shared printers.
D. Modify the permissions of the shared printers.

Answer: B

QUESTION 4
The Office1 network link is brought offline for emergency maintenance.
Users in Office2 and Office3 report that they cannot connect to the wireless network.
You need to recommend changes to ensure that users in all offices can connect to the wireless network if a WAN link fails.
What should you recommend?

A. that redundant DHCP scopes be created
B. that additional RADIUS servers be deployed
C. that universal group caching be implemented
D. that additional default gateways be configured

Answer: B


QUESTION 5
The company is deploying a new application.
When users attempt to install the application, they receive an error message indicating that they need administrative privileges to install it.
You need to recommend a solution to ensure that users can install the application. The solution must adhere to the corporate security guidelines. What should you recommend?

A. Publish the application by using a Group Policy.
B. Disable User Account Control (UAC) by using a Group Policy.
C. Add all domain users to the local Power Users group by using Restricted Groups.
D. Add the current users to the local Administrators group by using Group Policy preferences.

Answer: A

Explanation:
http://magalan.co.uk/install_software_via_group_policy.html




Wednesday, July 13, 2016

600-510 NPDEV Developing with Network Programmability

Exam Number 600-510
Associated Certifications Cisco Network Application Developer Specialist
Duration 75 minutes (55 - 65 questions)
Available Languages English
Register Pearson VUE
Exam Policies Read current policies and requirements
Exam Tutorial Review type of exam questions

This exam tests a candidate's ability to develop network applications in the Cisco ONE programmable environment. It also tests the ability to develop the middle layer called Network Applications, which enables different service provider, campus, and data center use cases.

The Developing with Cisco Network Programmability (NPDEV) exam (600-510) is a 75-minute assessment with 55-65 questions. This exam tests a candidate's ability to develop network applications in the Cisco ONE programmable environment. It also tests the ability to develop the middle layer called Network Applications, which enables different service provider, campus, and data center use cases.

The following topics are general guidelines for the content likely to be included on the exam. However, other related topics may also appear on any specific delivery of the exam. In order to better reflect the contents of the exam and for clarity purposes, the guidelines below may change at any time without notice.

1.0 Interpreting the Requirements 20%

1.1 Gather requirements

1.1.a Analyze business requirements to determine application/network requirements

1.2 Map the requirements to capabilities

1.2.a Apply different API models
1.2.b Analyze application requirements to determine optimal application model
1.2.b [i] Controller-based
1.2.b [ii] Device-centric API (distributed)

1.3 Identify the application dependencies in conjunction with company environment (policies and IT infrastructure)

1.3.a Analyze current environment and identify known dependencies

1.4 Draft the block diagram and functional specifications

1.4.a Create a flow chart/diagram to represent how the application is going to work

1.5 Document application/networking touch points

1.5.a Document how application interacts with other elements of the environment

2.0 Developing Applications 30%

2.1 Planning phase

2.1.a Define the data structure
2.1.b Create and interpret application functional block diagrams

2.2 Development phase

2.2.a Apply coding principles
2.2.b Interpret compiler outputs and warnings
2.2.c Utilize APIC APIs
2.2.c [i] REST
2.2.c [ii] Python SDK
2.2.c [iii] ACI Toolkit
2.2.d Utilize APIC-EM APIs
2.2.e Utilize Cisco Open SDN Controller APIs

2.3 Implementation phase

2.3.a Create a distribution package
2.3.b Describe OVA files

3.0 Security 12%

3.1 Define access policies

3.2 Describe SSL certificates

4.0 Testing 13%

4.1 Create a test plan

4.1.a Identify best practices for application testing
4.1.b Define acceptance criteria
4.1. c Document test plan

4.2 Perform test cycle

4.2.a Verify the test environment
4.2.a [i] Validate test environment
4.2.a [ii] Document initial state of test
4.2.b Execute the test plan
4.2.b [i] Utilize network traffic generators and packet capture tools to validate application

5.0 Troubleshooting Applications (Post Deployment) 25%

5.1 Identifying the problem

5.1.a Describe the steps to identify and isolate the problem
5.1.b Identify tools available for troubleshooting and monitoring
5.1.c Utilize logs, output, or application behavior to determine from a code standpoint what is causing the problem

5.2 Remediating the problem

5.2.a Implement solution to identified problem
5.2.b Validate solution fully corrects identified problem

Sunday, April 24, 2016

10 boot camps to kick start your data science career

Data science is one of the fastest growing careers today and there aren't enough employees to meet the demand. As a result, boot camps are cropping up to help get workers up to speed quickly on the latest data skills.

Data Scientist is the best job in America, according to data from Glassdoor, which found that the role has a significant amount of job openings and that data scientists earn an average salary of more than $116,000. According to its data, the job of data scientist rated a 4.1 out of 5 for career opportunity and it earned a 4.7 for job satisfaction. But, as the role of data scientist grows in demand, traditional schools aren't churning out qualified candidates fast enough to fill the open positions. There's also no clear path for those who have been in the tech industry for years and want to take advantage lucrative job opportunity. Enter the boot camp, a trend that has quickly grown in popularity as a way to train workers for in-demand tech skills. Here are 10 data science boot camps designed to help you brush up on your data skills, with courses for anyone from beginners to experienced data scientists.

Bit Bootcamp

Located in New Jersey, Bit Bootcamp offers both part-time and full-time courses in data analytics that last four weeks. It has a rolling start date and courses cost between $1,500 - $6,500, according to data from Course Report. It's a great option for students who already have a background in SQL, as well as object-oriented programming skills such as Java, C# or C++. Attendees can expect to work on real problems they might face in the workplace, whether it's at a startup or a large corporation. The course completes with a Hadoop certification exam using the skills learned over the past four weeks.
Price: $1500 - $6500

NYC Data Science Academy
The NYC Data Science Academy offers 12-week courses in data science that offer a combination of "intensive lectures and real world project work," according to Course Report. It's aimed at more experienced data scientists, who have a masters or Ph.D. degree. Courses include training in R, Python, Hadoop, Github and SQL with a focus on real-world application. Participants will walk away with a portfolio of five projects to show to potential employers as well as a Capstone Project that spans the last two weeks of the course. The NYC Data Science Academy also helps students garner interest from recruiters and hiring managers through partnerships with businesses. In the last week of the course, students will participate in mock interviews and job search prep; many will also have the opportunity to interview with hiring tech companies in the New York and Tri-State area.
Price: $16,000

The Data Incubator
The Data Incubator is another program aimed at more experienced tech workers who have a masters or Ph.D., but it's unique in that it offers fellowships, which means students who qualify can attend for free. Fellowships, which must be completed in person, are available in New York City, Washington D.C. and the Bay Area. The program also offers students mentorship directly from hiring companies, including LinkedIn, Microsoft and The New York Times, all while they work on building a portfolio to showcase their skills. The boot camp programs run for eight weeks and students need to have a background in engineering and science skills. Attendees can expect to leave this program with data skills that will be applicable in real world companies.
Price: Free for those accepted

Galvanize
Galvanize has six campuses located in Seattle; San Francisco, Denver, Fort Collins, Boulder, Colo.; Austin, Texas; and London. The focus of Galvanize is to develop entrepreneurs through a diverse community of students who include the likes of programmers, data scientists and Web developers. Galvanize boasts a 94 percent placement rate for its data science program since 2014 and students can apply for partial scholarships of up to $10,500. According to Galvanize, students have gone on to work for companies such as Twitter, Facebook, Air BnB, Tesla and Accenture. This boot camp is intended to combine real life skills with education so that graduates walk away ready to start a new career or advance at their current company through formal courses, workshops and events.
Price: $16,000

The Data Science Dojo
With campuses in Seattle, Silicon Valley, Barcelona, Toronto, Washington and Paris, the Data Science Dojo brings quick and affordable data science education to professionals around the world. It's one of the shortest programs on this list -- lasting only five days -- and it covers data science and data engineering. Before you even attend the program, you will get access to online courses and tutorials to learn the basics of data science. Then, you'll start the in-person program which consists of 10 hour days over the course of five days. Finally, after the boot camp is complete, you'll be invited to exclusive events, tutorials and networking groups that will help you continue your education. Due to the short nature of the course, it's tailored to those already in the industry who want to learn more about data science or brush up on the latest skills. However, unlike some of the other courses on this list, you don't need a master's degree Ph.D. to enroll, it's aimed at anyone at any skill level who simply wants to throw themselves in the trenches of data science and become part of a global network of companies and students who have attended the same program.
Price: Free for those accepted

Metis
Metis has campuses in New York and San Francisco, where students can attend intensive in-person data science workshops. Programs take 12 weeks to complete and include on-site instruction, career coaching and job placement support to help students make the best of their newly acquired skills. Similar to other boot camps, Metis' programs are project-based and focus on real-world skills that graduates can take with them to a career in data science. Those who complete the program can expect to walk away with in-depth knowledge of modern big data tools, access to an extensive network of professionals in the industry and ongoing career support.
Price: $14,000

Data Science for Social Good
This Chicago-based boot camp has specific goals; it focuses on churning out data scientists who want to work in fields such as education, health and energy to help make a difference in the world. Data Science for Social Good offers a three-month long fellowship program offered through the University of Chicago, and it allows students to work closely with both professors and professionals in the industry. Attendees are put into small teams alongside full-time mentors who help them through the course of the fellowship to develop projects and solve problems facing specific industries. The program lasts 14 weeks and students complete 12 projects in partnership with nonprofits and government agencies to help tackle problems currently facing those industries.
Price: Free for those accepted

Level
Offered through Northeastern University, Level is a two-month program that aims to turn you into a hirable data analyst. Each day of the course focuses on a real-world problem that a business will face and students develop projects to solve these issues. Students can expect to learn more about SQL, R, Excel, Tableau and PowerPoint and walk away with experience in preparing data, regression analysis, business intelligence, visualization and storytelling. You can choose between a full-time eight week course that meets five days a week, eight hours a day and a hybrid 20-week program that meets online and in-person one night a week.
Price: $7,995

Microsoft Research Data Science Summer School
The Microsoft Research Data Science Summer School -- or DS3 -- runs for eight weeks during the summer. It's an intensive program that is intended for upper level undergraduates or graduating seniors to help grow diversity in the data science industry. Attendees get a $5,000 stipend as well as a laptop that they keep at the end of the program. Classes accommodate only eight people, however, so the process is selective, but it's only open to students who already reside or can make their own accommodations in the New York City area.
Price: Free for those accepted

Silicon Valley Data Academy
The Silicon Valley Data Academy, or SVDA, hosts eight-week training programs in enterprise-level data science skills. Those who already have an extensive background in data science or engineering can apply to be a fellow and have the tuition waived. You can expect to learn more about data visualization, data mining, statistics, machine learning, natural language processing as well as tools such as Hadoop, Spark, Hive, Kafka and NoSQL. Programs consist of more traditional curriculums including homework, but it also includes guest lectures, field trips to headquarters of collaborating companies and projects that offer real world experience.
Price: Free for those accepted