Your browser is out of date

Update your browser to view this website correctly. Update my browser now

×

Get the Knowledge and Skills

After successfully completing this course, the student will be able to:

  • Describe security in the context of Hadoop
  • Assess threats to a production Hadoop cluster
  • Plan and deploy defenses against these threats
  • Improve the security of each node in the cluster
  • Set up authentication with Kerberos and Active Directory
  • Use permissions and ACLs to control access to files in HDFS
  • Use platform authorization features to control data access
  • Perform common key management tasks
  • Use encryption to protect data in motion and at rest
  • Monitor a cluster for suspicious activity

What To Expect

The course is intended for system administrators and those in similar roles. Prospective students should have a good understanding of Hadoop's architecture, the ability to perform system administration tasks in the Linux environment, and at least basic exposure to Cloudera Manager. We recommend that students complete the Cloudera Administrator Training for Apache Hadoop course, or have equivalent on-the-job experience, before beginning this course. No prior training or experience with computer security is required.

Book the course

How would you like to train?

Course Outline

Security Overview

  • What Is Security?
  • The Need for Security
  • Key Principles
  • Threat Assessment
  • Risk Management

Security Architecture 

  • Scenario Explanation
  • Assessing Cluster Security

Host Security

  • General Server Hardening
  • Recommendations
  • System Entropy
  • Access Control
  • Host Firewalls
  • Host-Level Monitoring

Encrypting Data In Motion 

  • Encryption Fundamentals
  • Certificates
  • Configuring Cloudera Manager for TLS

Authentication

  • Hadoop Authentication Fundamentals
  • Kerberos
  • Active Directory
  • Browser-Based Authentication
  • Encrypting Hadoop Data in Motion

Authorization

  • Authorization Mechanisms
  • Cloudera Manager Authorization
  • YARN Authorization
  • HDFS Authorization
  • Apache Sentry

Encrypting Data at Rest

  • Overview of HDFS Encryption
  • Encrypting Data Outside of HDFS
  • Hardware Security Modules

Additional Considerations

  • Auditing
  • Data Governance and Lineage Business Continuity and Disaster
  • Recovery

Conclusion

The professionalism and expansive technical knowledge demonstrated by our instructor were incredible. The quality of the Cloudera training was on par with a university.

General Dynamics

Your form submission has failed.

This may have been caused by one of the following:

  • Your request timed out
  • A plugin/browser extension blocked the submission. If you have an ad blocking plugin please disable it and close this message to reload the page.