YoVDO

Securing Apache Spark Big Data Operations: Threats, Best Practices, and Pragmatic Steps

Offered By: Canonical Ubuntu via YouTube

Tags

Apache Spark Courses Cybersecurity Courses Kubernetes Courses Cloud Security Courses Threat Modeling Courses Big Data Security Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the world of Apache Spark security in this 43-minute webinar from Canonical Ubuntu. Gain insights into the open-source toolkit for parallel, distributed data engineering and machine learning applications. Learn about security best practices, high-level architectures, and practical steps to secure Spark applications. Discover the basics of Apache Spark, understand potential security threats, and explore techniques used by bad actors. Identify and prioritize security requirements, and implement pragmatic measures to secure Spark based on Kubernetes and object storage. Delve into topics such as threat modeling, risk evaluation, and the STRIDE framework. Understand the importance of business continuity planning, automation, and compliance in maintaining a secure Spark environment. Gain valuable knowledge on perimeter access, cloud providers, and managed solutions to enhance your big data operations' security.

Syllabus

Introduction
Agenda
What is Spark
Security threats to Spark
What does Spark do
Motivations for cyber attacks
Financial vs Espionage
State Sponsored Threats
Insider Attacks
Preventative Control
Threat Modeling
Stride Framework
CNCF
Finding processes that work for the business
Risk Evaluation Framework
Spark Security Features
Data Value
Cloud Providers
Perimeter Access
What should teams do
Business continuity plan
Automation
Cyberkill chain
Managed solutions
Compliance
Closing


Taught by

Canonical Ubuntu

Related Courses

SSCP Cert Prep: 7 Systems and Application Security
LinkedIn Learning
Securing Big Data in the Age of Artificial Intelligence
CAE in Cybersecurity Community via YouTube
Hadoop Safari - Hunting for Vulnerabilities
Hack In The Box Security Conference via YouTube
Big Data, Little Security - Practical Steps for Securing Big Data
LASCON via YouTube
Unpoisoned Fruit - Seeding Trust into a Growing World of Algorithmic Warfare
OWASP Foundation via YouTube