Security for Apache Kafka Training Course

Course Code

kafkasecurity

Duration

7 hours (usually 1 day including breaks)

Requirements

  • An understanding of Apache Kafka

Audience

  • Software Testers

Overview

Apache Kafka is a stream-processing software for handling real-time data feeds. With Apache Kafka and its open system, network security is compromised and sensitive data is at risk.

This instructor-led, live training (onsite or remote) is aimed at software testers who wish to implement network security measures into an Apache Kafka application.

By the end of this training, participants will be able to:

  • Deploy Apache Kafka onto a cloud based server.
  • Implement SSL encryption to prevent attacks.
  • Add ACL authentication to track and control user access.
  • Ensure credible clients have access to Kafka clusters with SSL and SASL authentication.

Format of the Course

  • Interactive lecture and discussion.
  • Lots of exercises and practice.
  • Hands-on implementation in a live-lab environment.

Course Customization Options

  • To request a customized training for this course, please contact us to arrange.

Course Outline

Introduction

Apache Kafka Advanced Overview

  • Clusters, brokers, partitions, topics, etc.
  • Architectural patterns of data flow

Kafka Security

  • SSL/TSL encryption
  • SSL/SASL authentication
  • ACL authentication

Preparing the Development Environment

  • Installing Apache Kafka
  • Installing and configuring Kerberos
  • Creating a server instance
  • Setting up Zookeeper
  • Testing configurations

SSL in Kafka

  • Creating an SSL certificate
  • Setting up an SSL certificate for the Apache Kafka application
  • Setting up an SSL certificate for clients

SASL authentication

  • Creating credentials
  • Setting up a credential for the Apache Kafka application
  • Setting up a credential for clients

ACL with Zookeeper and Kerberos

  • Setting up Zookeeper with Keberos
  • Creating ACLs with Kafka commands
  • Storing ACLs on Zookeeper
  • Creating principles
  • Configuring authorization on Zookeeper
  • Using security migration tool

Summary and Conclusion

Testimonials

★★★★★
★★★★★

Related Categories

Related Courses

Course Discounts

Course Discounts Newsletter

We respect the privacy of your email address. We will not pass on or sell your address to others.
You can always change your preferences or unsubscribe completely.

Some of our clients

This site in other countries/regions