Platform & Pipeline Security
Course description
Read more about the course
Network Security
In this section, you will learn about the key methods and tools for network-level protection—from configuring firewalls to access control lists (ACL). I will explain how they work and how they are interconnected.
We will also discuss proxy servers and bastion hosts, which are important elements that restrict access to the platform and specific security zones. You will learn how they operate, how they connect to your network, and which protocols they use for interaction.
Identity and Access Management (IAM)
Next, we will delve into identity and access management. You will understand the difference between these concepts and how they interact with each other and with various network components.
I will also explain what LDAP (Lightweight Directory Access Protocol) is and how it helps secure proxy servers and bastion hosts.
Data Transmission Security
Finally, we will discuss the protection of transmitted data. I will show you why it is important to use secure protocols like HTTPS and how to implement them in practice. We will also touch on the topic of APIs and explore how communications can be secured using encrypted tokens.
Watch Online
Watch Online Platform & Pipeline Security
All Course Lessons (8)
| # | Lesson Title | Duration | Access |
|---|---|---|---|
| 1 | Introduction Demo | 02:25 | |
| 2 | Networks, Firewalls and Access Control Lists | 05:06 | |
| 3 | Proxy Servers | 04:36 | |
| 4 | Bastion Hosts | 04:46 | |
| 5 | Identity & Access Management | 03:43 | |
| 6 | LDAP | 03:18 | |
| 7 | HTTPS, SSH and SCP | 03:56 | |
| 8 | Security Tokens | 06:56 |
Unlock unlimited learning
Get instant access to all 7 lessons in this course, plus thousands of other premium courses. One subscription, unlimited knowledge.
Learn more about subscriptionComments
0 commentsSimilar courses

Build a Large Language Model (From Scratch)

Time Series Analysis, Forecasting, and Machine Learning

Apache Airflow Workflow Orchestration

Data Engineering on Databricks

Want to join the conversation?
Sign in to comment