You are on page 1of 2

Big Data Security Big Data Security

Program Name B. Tech Program Code


Course Code
Credit L: T: 0 P: 0 Credit:
Semester

Course Objectives:
● Introduction to Big Data
● Big Data use cases and Capabilities
● Big Data Architecture
● Security goals, controls
● Inventorying and classifying sensitive data
● Remediation plans
● Security Perimeters
● Encryption of data
● Introduction to Kerberos
● Identity management
● Activity Monitoring
● Apache Knox overview
● Guardium overview

Detailed Syllabus:

UNIT: 1 Introduction to Big Data Contact Hours: 8

This unit explains the concept of Big Data and reviewing capabilities, Architecture, threats and
security disciplines of Big Data.

After completing this unit, you should be able to:


● Explain what Big Data is
● Reviewing concept of Big data capabilities, use cases & Architecture
● Explain Threats
● Introduction to Security Disciplines

UNIT: 2 Securing & Protecting Data Contact Hours: 8

This unit consist more in depth for Exploring and classification of Data, securing and Protecting Data
After completing this unit, you should be able to:
● Understand how to identify data for down streaming processes
● Understand how to integrate, process, generate data
● Understand Security perimeter for security Management
● Know how Access management and Auditing works

UNIT: 3 Monitor, Enforce and Audit Contact Hours: 8


This unit introduces concepts of monitoring and auditing data with Guardium
After completing this unit, you should be able to:
● Understand Guardium data activity Monitoring
● Benefits of Big Infosphere Guardium
● Understand Architecture of Guardium
● Hands-on experience with all of them

UNIT: 4 Data Protection Laws for Big data Contact Hours: 8

Data Protection Laws for Big data: This unit gives an overview Protection Data law enforced for Data.

After completing this unit, you should be able to:


● Explain GDPR Laws
● Explain ILG (Lifecycle Governance)
● ISO 27000 Series
● HIPAA

Course Outcomes (CO)

CO1: Working with Data in motion

CO2: Implementing Masking

CO3: Data life cycle management

CO4: Access Management

CO5: Case studies & hands on

Text Books:

1. IBM Book

You might also like