Skip to main content

Platform & Pipeline Security

34m 46s
English
Paid

Course description

A reliable security concept for platforms and pipelines is critically important. Almost anyone can assemble a Proof of Concept without a proper level of protection, but if you want to become a good data engineer, you must understand how to protect your work and data. That is why I created this security course - so that you are well-prepared for your role as a data engineer. In the course, we will cover fundamental yet highly important topics that you will constantly encounter in real work.
Read more about the course

Network Security

In this section, you will learn about the key methods and tools for network-level protection—from configuring firewalls to access control lists (ACL). I will explain how they work and how they are interconnected.

We will also discuss proxy servers and bastion hosts, which are important elements that restrict access to the platform and specific security zones. You will learn how they operate, how they connect to your network, and which protocols they use for interaction.

Identity and Access Management (IAM)

Next, we will delve into identity and access management. You will understand the difference between these concepts and how they interact with each other and with various network components.

I will also explain what LDAP (Lightweight Directory Access Protocol) is and how it helps secure proxy servers and bastion hosts.

Data Transmission Security

Finally, we will discuss the protection of transmitted data. I will show you why it is important to use secure protocols like HTTPS and how to implement them in practice. We will also touch on the topic of APIs and explore how communications can be secured using encrypted tokens.

Watch Online

This is a demo lesson (10:00 remaining)

You can watch up to 10 minutes for free. Subscribe to unlock all 8 lessons in this course and access 10,000+ hours of premium content across all courses.

View Pricing
0:00
/
#1: Introduction

All Course Lessons (8)

#Lesson TitleDurationAccess
1
Introduction Demo
02:25
2
Networks, Firewalls and Access Control Lists
05:06
3
Proxy Servers
04:36
4
Bastion Hosts
04:46
5
Identity & Access Management
03:43
6
LDAP
03:18
7
HTTPS, SSH and SCP
03:56
8
Security Tokens
06:56

Unlock unlimited learning

Get instant access to all 7 lessons in this course, plus thousands of other premium courses. One subscription, unlimited knowledge.

Learn more about subscription

Comments

0 comments

Want to join the conversation?

Sign in to comment

Similar courses

Schema Design Data Stores

Schema Design Data Stores

Sources: Andreas Kretz
During my coaching sessions, one important topic repeatedly comes up - designing diagrams. Therefore, I decided to create a separate course in the academy to...
2 hours 30 minutes 25 seconds
PyTorch for Deep Learning

PyTorch for Deep Learning

Sources: zerotomastery.io
Master PyTorch for deep learning with a step-by-step course. Build real-world projects and enhance your skills to become a Deep Learning Engineer.
52 hours 27 seconds
Deep Learning A-Z™: Hands-On Artificial Neural Networks

Deep Learning A-Z™: Hands-On Artificial Neural Networks

Sources: udemy
Artificial intelligence is growing exponentially. There is no doubt about that. Self-driving cars are clocking up millions of miles, IBM Watson is diagnosing pa
22 hours 36 minutes 30 seconds
Getting Started with Embedded AI | Edge AI

Getting Started with Embedded AI | Edge AI

Sources: udemy
Nowadays, you may have heard of many keywords like Embedded AI /Embedded ML /Edge AI, the meaning behind them is the same, I.e. To make an AI algorithm or model
3 hours 33 minutes 42 seconds
Choosing Data Stores

Choosing Data Stores

Sources: Andreas Kretz
One of the key tasks when creating a data platform and pipelines is the selection of appropriate data storage systems. This course is dedicated to that topic.
1 hour 25 minutes 31 seconds