SRE Data Pipelines & Integrity: Data Integrity

SRE    |    Intermediate
  • 16 Videos | 1h 13m 50s
  • Includes Assessment
  • Earns a Badge
Likes 22 Likes 22
Data integrity is vital as it ensures end-user data accuracy and consistency in conjunction with an adequate level of service and availability. In this course, you'll learn how to choose a strategy for data integrity, including how to account for any potential upsides and tradeoffs. You'll explore various types of failures that lead to data loss and the existence of the many data failure modes. You'll also identify data integrity challenges. Next, you'll examine in detail the soft deletion, back up and recovery, and early detection layers of defense-in-depth, before investigating the data integrity challenges a cloud developer may encounter in high-velocity environments. Finally, you'll outline considerations for implementing out-of-band data validation and successful data recovery and identify how the primary SRE principles apply to data integrity. 

WHAT YOU WILL LEARN

  • discover the key concepts covered in this course
    define data integrity and recognize how it relates to site reliability engineering and user data, its associated risks, and how to mitigate them
    list vital data integrity requirements and considerations and differentiate between data integrity and security
    outline how to choose a strategy for data integrity
    define what is meant by SRE objectives and outline how they can help maintain data integrity and ensure data availability
    differentiate between different types of failures resulting in data loss
    recognize challenges for maintaining data integrity
    state what is meant by combinations of data integrity failure modes and the multiple layers of defense in depth
  • define the soft deletion layer of defense-in-depth and recognize the benefits of a soft deletion strategy
    name and describe some important considerations when implementing backup and recovery strategies
    define what is meant by the early detection layer of defense-in-depth and describe how it relates to data loss prevention
    list some common challenges faced by cloud developers
    describe what comprises out-of-band data validation and recognize some important considerations when implementing this strategy
    recognize the importance of setting up systems and knowing that data recovery will be successful
    name and define some of the core principles of SRE and outline some best practices for applying these
    summarize the key concepts covered in this course

IN THIS COURSE

  • Playable
    1. 
    Course Overview
    1m 38s
    UP NEXT
  • Playable
    2. 
    Data Integrity in SRE
    5m 5s
  • Locked
    3. 
    Data Integrity Requirements
    6m
  • Locked
    4. 
    Data Integrity Strategies
    5m 10s
  • Locked
    5. 
    SRE Objectives in Data Integrity and Availability
    3m 47s
  • Locked
    6. 
    Data Loss Failure Types
    4m 13s
  • Locked
    7. 
    Data Integrity Challenges
    4m 26s
  • Locked
    8. 
    Data Integrity Failure Modes
    3m 55s
  • Locked
    9. 
    The Soft Deletion Strategy
    5m 25s
  • Locked
    10. 
    Backup and Recovery Considerations
    4m 2s
  • Locked
    11. 
    Early Detection and Data Loss Prevention
    5m 8s
  • Locked
    12. 
    Cloud Developer Challenges
    4m 25s
  • Locked
    13. 
    The Out-of-band Data Validation Strategy
    4m 41s
  • Locked
    14. 
    Successful Data Recovery
    3m 41s
  • Locked
    15. 
    Fundamental SRE Principles
    4m 3s
  • Locked
    16. 
    Course Summary
    1m 12s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE