Cloudera : Learn Authentication with Kerberos in Hadoop
3.1 (10 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
42 students enrolled
Wishlisted Wishlist

Please confirm that you want to add Cloudera : Learn Authentication with Kerberos in Hadoop to your Wishlist.

Add to Wishlist

Cloudera : Learn Authentication with Kerberos in Hadoop

Learn how to Implement Authentication with Kerberos in Hadoop to provide security
3.1 (10 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
42 students enrolled
Created by ASHOK M
Last updated 5/2017
English
Current price: $10 Original price: $20 Discount: 50% off
5 hours left at this price!
30-Day Money-Back Guarantee
Includes:
  • 42 mins on-demand video
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
What Will I Learn?
  • What is kerberos
  • Purpose of kerberos
  • how to implement kerberos
View Curriculum
Requirements
  • Basic knowledge of Computers
  • Basics of Hadoop
  • Basics of Unix
Description

The Kerberos protocol relies heavily on an authentication technique that makes use of shared secrets. The basic concept is quite simple: If a secret is known by only two people, either person can verify the identity of the other by confirming that the other person knows the secret.

For example, let's suppose that Alice often sends messages to Bob and that Bob needs to be sure that a message from Alice really has come from Alice before he acts on its information. They decide to solve their problem by selecting a password, and they agree not to share this secret with anyone else. If Alice's messages can somehow demonstrate that the sender knows the password, Bob knows that the sender is Alice.

The only question for Alice and Bob to resolve is how Alice can show that she knows the password. She might simply include it somewhere in her messages, perhaps in a signature block at the end — Alice, Our$ecret . This would be simple and efficient and might even work if Alice and Bob can be sure that no one else is reading their mail. Unfortunately, that is not the case. Their messages pass over a network used by people like Carol, who has a network analyzer and a hobby of scanning traffic in hope that one day she might spot a password. So it is out of the question for Alice to prove that she knows the secret simply by saying it. To keep the password secret, she must show that she knows it without revealing it.

The Kerberos protocol solves this problem with secret key cryptography . Rather than sharing a password, communication partners share a cryptographic key. They use knowledge of this key to verify one another's identity. For this method of authentication to work, the shared key must be symmetric — a single key must be capable of both encryption and decryption. One party proves knowledge of the key by encrypting a piece of information, the other by decrypting it.

Who is the target audience?
  • This course is for students
  • For all java developers
  • For all Hadoop Developers
Students Who Viewed This Course Also Viewed
Curriculum For This Course
+
Introduction
2 Lectures 09:03

Introduction of Kerberos
06:56
+
Implementation of Kerberos for Authentication
4 Lectures 27:02

Enabling Kerberos in Cloudera
06:58

Working with Kerberorized cloudera cluster
04:30

Submission of Jobs and Running Queries
06:36
+
Cloudera With Docker
1 Lecture 06:16
Setting up Clouder with Docker Image
06:16
About the Instructor
ASHOK M
2.1 Average rating
71 Reviews
385 Students
31 Courses
Architect

I am  Reddy having 10 years of IT experience.For the last 4 years I have been working on Bigdata.
From Bigdata perspective,I had working experience on Kafka,Spark,and Hbase,cassandra,hive technologies.
And also I had working experience with AWS and Java technologies.

I have the experience in desigining and implemeting lambda architecture solutions in bigdata

Has experience in Working with Rest API and worked in various domains like financial ,insurance,manufacuring.

I am so passinate about  new technologies.


BigDataTechnologies  is a online training provider and has many experienced lecturers who will proivde excellent training.

BigDataTechnologies has extensive experience in providing training for Java,AWS,iphone,Mapredue,hive,pig,hbase,cassandra,Mongodb,spark,storm and Kafka.

From skills that will help you to develop and future proof your career to immediate solutions to every day tech challenges.

Main objective is to provide high quality content to all students