Security for Apache Kafka Training Course

Overview

Apache Kafka is a stream-processing software for handling real-time data feeds. With Apache Kafka and its open system, network security is compromised and sensitive data is at risk.

This instructor-led, live training (online or onsite) is aimed at software testers who wish to implement network security measures into an Apache Kafka application.

By the end of this training, participants will be able to:

  • Deploy Apache Kafka onto a cloud based server.
  • Implement SSL encryption to prevent attacks.
  • Add ACL authentication to track and control user access.
  • Ensure credible clients have access to Kafka clusters with SSL and SASL authentication.

Format of the Course

  • Interactive lecture and discussion.
  • Lots of exercises and practice.
  • Hands-on implementation in a live-lab environment.

Course Customization Options

  • To request a customized training for this course, please contact us to arrange.

Requirements

  • An understanding of Apache Kafka

Audience

  • Software Testers

Course Outline

Introduction

Apache Kafka Advanced Overview

  • Clusters, brokers, partitions, topics, etc.
  • Architectural patterns of data flow

Kafka Security

  • SSL/TSL encryption
  • SSL/SASL authentication
  • ACL authentication

Preparing the Development Environment

  • Installing Apache Kafka
  • Installing and configuring Kerberos
  • Creating a server instance
  • Setting up Zookeeper
  • Testing configurations

SSL in Kafka

  • Creating an SSL certificate
  • Setting up an SSL certificate for the Apache Kafka application
  • Setting up an SSL certificate for clients

SASL authentication

  • Creating credentials
  • Setting up a credential for the Apache Kafka application
  • Setting up a credential for clients

ACL with Zookeeper and Kerberos

  • Setting up Zookeeper with Keberos
  • Creating ACLs with Kafka commands
  • Storing ACLs on Zookeeper
  • Creating principles
  • Configuring authorization on Zookeeper
  • Using security migration tool

Summary and Conclusion

Leave a Reply

Your email address will not be published. Required fields are marked *