A Hands-on Approach to Securing Big Data Clusters
You will start by learning about tooling, then jump into learning about Hadoop insecurities. From there, Jeff will teach you about authentication with MIT Kerberos, authentication with Active Directory, and authorization. This video tutorial also covers encryption, developer topics, and administrator topics. Finally, you will learn about secure Hadoop topics.
Once you have completed this computer based training course, you will have learned everything you need to know to secure big data clusters with Hadoop.