Threat Analytics - Big Data

This course has been designed for using Big Data technology to identify patterns in unstructured data in different logs and find anomalies for threats to the existing system to predict anomalous behavior. Technique learnt during this course will also help in forensic investigation, insider threat prediction and investigation.

Prerequisites: Knowledge of java programming language, database programming

Below is the detailed courseware syllabus

1.IntroductionUnderstanding Parallel Computing non-technical way,Big Data Definition, Parallel computing and Grid Computing
2.Big Data using HadoopHadoop Processes, Hadoop eco System, Single Node Pseudo Cluster,Multi node Cluster
3.Big Data EnvironmentSingle Node Pseudo Cluster and Multi node Cluster
4.Hadoop File System API HDFS API, Client API Commands and Admin API Commands
5.MapReduce Job using JavaBasic MapReduce Job, Searching, Sorting,Inverted Index, Combiner,Partitioner, Distributed Cache, Counters, Custom Keys and Values, Custom Partitioner, Custom Input Format, Record Reader,Custom Sorting, Custom Comparator, Secondary Sort,Joins, Map Side Join and Reduce Side Join
6.Handling RDBMS DataNoSql, HBase, Data Mining / ETL,
7.Handling Non-structural/Semi Structural DataData Analysis / Threat Analysis, Installation and Configuration of PIG, PIG CLI, PIG Data Types, Data Analysis Using PIG, UDF for PIG Using Java/ Python, Hive, Installation and Configuration of HIVE, HIVE CLI, HIVE Data Types, Data Analysis Using HIVE, UDF for HIVE Using Java/ Python, Putting together
8.Putting your step in Big Data world towards Architectural SolutionConcept of Real Time Data Process and related technology and architecture
9.Other Big Data ProductsMongo DB, Cloudera,
10.Usage of Analytics toolsSplunk, R – Language
11.Live Threat Analytics Project