- Dhaka, Bangladesh
-
06:46
(UTC +06:00) - in/abid-aziz-nihal
- abidaziz.nihal.9
Lists (3)
Sort Name ascending (A-Z)
Stars
Enterprise data replication pipeline using Azure Databricks with automated lineage tracking. Replicates SQL Server, Delta Tables, and CSV data to centralized storage with intelligent full/increment…
Production-ready data pipeline using Azure Databricks Delta Live Tables with Medallion Architecture. Processes airline data via streaming (Event Hubs) and batch (ADLS Gen2) ingestion, enforces data…
Real-time streaming analytics pipeline for cab service monitoring using Azure Stream Analytics, Event Hubs, Cosmos DB & Power BI. Production-grade ETL solution processing millions of ride-sharing e…
Graph-based flight performance analytics using GraphFrames and Databricks. Analyzes 1M+ flight records to identify delay patterns, rank airports with PageRank, discover optimal routes, and visualiz…
End-to-end data engineering pipeline implementing Medallion Architecture (Bronze-Silver-Gold) for trip transaction analytics. Automated ETL using Azure Data Factory, Databricks, and Delta Lake with…
A comprehensive tool for categorizing TryHackMe rooms, including details such as difficulty, room type, subscription status, and much more, to enhance user experience in cybersecurity training.
My Personal Notes that I used on the Exam as a Cheatsheet
hospital-management-system
The Google Cloud Developer's Cheat Sheet
If you are looking to become a Google Cloud Engineer , then you are at the right place. GCPSketchnote is series where I share Google Cloud concepts in quick and easy to learn format.
Companion Repository to Linked In Learning Course "AWS Cost Control"
A complete end to end data engineering project on GCP
This repository covers computer networking fundamentals and advanced concepts including the OSI model, TCP/IP protocols, IP addressing & subnetting, NAT, VPNs, firewalls, IDS/IPS, network redundanc…
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
💻 Certified ethical hacker summary in bullet points
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit/64-bit ARM, 8-bit AVR and 32-bit RISC-V architectures.