Cloudera University Security Training Course
Cloudera Security Training, which is offered exclusively through OnDemand, introduces experienced system administrators to some of the tools and techniques that Cloudera’s Solution Architects use to protect the clusters that our customers rely on for essential business operations.
Who is this course for?
The course is intended for system administrators and those in similar roles.
Skills You’ll Gain
- Describe security in the context of Hadoop
- Assess threats to a production Hadoop cluster
- Plan and deploy defenses against these threats
- Improve the security of each node in the cluster
- Set up authentication with Kerberos and Active Directory
- Use permissions and ACLs to control access to files in HDFS
- Use Apache Sentry to control data access
- Perform common key management tasks
- Use encryption to protect data in motion and at rest
- Monitor a cluster for suspicious activity
- Understand additional security considerations, including data governance and disaster recovery
Prerequisite Skills Required
Prospective students should have a good understanding of Hadoop’s architecture, the ability to perform system administration tasks in the Linux environment, and at least basic exposure to Cloudera Manager. We recommend that students complete the Cloudera Administrator Training for Apache Hadoop course, or have equivalent on-the-job experience, before beginning this course. No prior training or experience with computer security is required.
- What Is Security?
- The Need for Security
- Key Principles
- Threat Assessment
- Risk Management
- Scenario Explanation
- Assessing Cluster Security
- General Server Hardening
- System Entropy
- Access Control
- Host Firewalls
- Host-Level Monitoring
Encrypting Data In Motion
- Encryption Fundamentals
- Configuring Cloudera Manager for TLS
- Hadoop Authentication Fundamentals
- Active Directory
- Browser-Based Authentication
- Encrypting Hadoop Data in Motion
- Authorization Mechanisms
- Cloudera Manager Authorization
- YARN Authorization
- HDFS Authorization
- Apache Sentry
Encrypting Data at Rest
- Overview of HDFS Encryption
- Encrypting Data Outside of HDFS
- Hardware Security Modules
- Data Governance and Lineage Business Continuity and Disaster
For more information, please check P2L‘s website.