CDP Admin: Building Secure Clusters
Course Details | Find Out More |
---|---|
Code | CDP-BSC |
Tuition (CAD) | N/A |
Tuition (USD) | 3300.00 |
This four-day hands-on course for Cloudera Data Platform (CDP) administrators teaches the skills and practices needed to configure solutions that meet the most demanding technical security audit standards. The course is built around a recommended project plan for CDP administrators. The first project stage is implementation of Perimeter Security by installing host level security and Kerberos. The second project stage protects data by implementing Transport Layer Security via Auto-TLS and data encryption using Key Management System and Key Trustee Server (KMS/KTS). The third project stage controls access for users and data using Ranger and Atlas. The fourth stage teaches visibility practices for auditing of systems, users, and data usage. The final project stage analyzes applications in terms of vulnerabilities and introduces CDP practices for risk management in a fully secured Cloudera Data Platform. This course is primarily hands-on, consisting of 70% lab exercise and 30% lecture.
Who Can Benefit
- This course is intended for Linux administrators who are tasked with administering CDP.
Skills Gained
- The CDP “Secure by Design” models, architecture, and tools
- Project planning for implementing a fully secured CDP
- CDP administrator recommended best practices for security
- How to create encryption zones and security zones for data isolation
- Advanced access control policies and how to use data lineage tools
- How to achieve regulatory compliance
Prerequisites
- We recommend a minimum of 3 to 5 years of system administration experience. Students must have proficiency in Linux CLI and should be familiar with Linux shell scripts. Knowledge of Transport Layer Security, Kerberos, and SQL select statements is helpful.
- Students must have access to the internet to reach Amazon Web Services (AWS).
Course Content
Course Outline
- CDP Secure by Design
- Project Planning for Securing CDP
- Connecting to Directory Services
- Hardening Networks and Hosts
- Protecting Data in Motion
- Managing Authentication with Kerberos
- Deploying Authorization
- Protecting Data at Rest
- Creating Single Sign-On with Knox Gateway
- Managing Authorization with Ranger
- Classifying Data with Atlas
- Auditing CDP
- Bringing Applications Aboard CDP
- Achieving Compliance