Course : Big Data, data security

Practical course - 2d - 14h00 - Ref. SBD
Price : 1430 € E.T.

Big Data, data security




À l’issue de la formation, le participant est capable d’initier une politique de sécurisation des données par une approche technique et légale du sujet. Elle permet de comprendre les enjeux de la sécurité dans les environnements Big Data, d’identifier les risques majeurs et d’y répondre avec des solutions concrètes.


INTER
IN-HOUSE
CUSTOM

Practical course in person or remote class
Available in English on request

Ref. SBD
  2d - 14h00
1430 € E.T.




À l’issue de la formation, le participant est capable d’initier une politique de sécurisation des données par une approche technique et légale du sujet. Elle permet de comprendre les enjeux de la sécurité dans les environnements Big Data, d’identifier les risques majeurs et d’y répondre avec des solutions concrètes.


Teaching objectives
At the end of the training, the participant will be able to:
Understanding complex data qualification
Identify the main risks affecting massive data processing solutions
Understanding the legal framework (CNIL and PLA - Privacy Level Agreement)
Know the main basic technical solutions to protect against risks
Implement a security policy to deal with risks, threats and attacks

Intended audience
Security and IS consultants, system administrators.

Prerequisites
Notions of application architectures. Good knowledge of network and system security, Hadoop platforms.

Course schedule

1
Risks and threats

  • Introduction to security. Key external information sources (ANSSI, CLUSIF, ENISA, etc.).
  • The current state of IT security.
  • IT security vocabulary.
  • DICT/P classification: Availability, Integrity, Confidentiality and Traceability/Proof.
  • Attacks "lower layers". Security on Hadoop. Intelligence gathering.
  • TCP/IP protocol strengths and weaknesses. HTTP: an exposed protocol (SQL injection, Cross Site Scripting, etc.).
  • Illustration of ARP and IP Spoofing attacks, TCPSYNflood, smurf, etc.
  • Denial of service and distributed denial of service. DNS: Dan Kaminsky attack. Application attacks.
Hands-on work
Install and use the Wireshark network analyzer. Implementing an application attack.

2
Security architectures

  • Which architectures for which needs?
  • Secure addressing plan: RFC 1918. Address translation (FTP as an example).
  • The role of demilitarized zones (DMZs). Examples of architectures.
  • Secure architecture through virtualization.
  • Firewall: the cornerstone of security, firewalls and virtual environments.
  • Proxy server and application relay. Proxy or firewall: competition or complementarity?
  • Technological evolution of firewalls (Appliance, VPN, IPS, UTM, etc.).
  • Reverse proxy, content filtering, caching and authentication. SMTP relay: a must?
Hands-on work
Implementation of a proxy cache/authentication.

3
Verify system integrity

  • Operating principles.
  • What products are available?
  • Introducing Tripwire or AIDE (Advanced Intrusion Detection Environment).
  • Vulnerability auditing.
  • Vulnerability management principles, methods and organizations.
  • Reference site and overview of auditing tools.
  • Definition of a security policy.
  • Study and implementation of Nessus (status, operation, evolution).
Hands-on work
Audit network and server vulnerabilities using Nessus and Nmap. Website vulnerability audit.

4
Legal violations of automatic data processing systems

  • Reminder, definition of automatic data processing system (ADPS).
  • Risks for massive data processing solutions.
  • Types of breaches, European context, the LCEN law. The RGPD regulation, CNIL, PLA.
  • What are the legal risks for the company, its managers and CISOs?


Dates and locations
Select your location or opt for the remote class then choose your date.
Remote class

Dernières places
Date garantie en présentiel ou à distance
Session garantie

REMOTE CLASS
2026 : 18 June, 19 Nov.

PARIS LA DÉFENSE
2026 : 18 June, 19 Nov.