Cybersecurity Architecture: Five Principles to Follow (and One to Avoid)

Поделиться
HTML-код
  • Опубликовано: 31 янв 2025

Комментарии • 271

  • @umeyrsekban4721
    @umeyrsekban4721 Год назад +51

    I completed IBM's Cybersecurity Analyst course and got my certificate, I'm here to refine my knowledge before applying a CS architect job

    • @jeffcrume
      @jeffcrume Год назад +2

      Excellent! Good luck to you in your learning journey!

    • @AmandeepSingh29
      @AmandeepSingh29 3 месяца назад +1

      Hope you got a job after you completed the certificate. Any suggestions for new learners?

  • @BSC2CGYM
    @BSC2CGYM Год назад +42

    I highly recommend this for anyone who is pursuing Cybersecurity at a total beginner level like myself. I’m watching these along with my IBM Cybersecurity Analyst Cert course, and it’s really helped me understand concepts that were so over my head at first. Really appreciate it!

    • @sebasdepaseo
      @sebasdepaseo 2 месяца назад

      Hi, I also interested in the field but like you I am a total beginner. Do you recommend jumping on the IBM CS Course right away or get some previous courses in Computer science first? I am 35 and making a change from digital marketing.

    • @pikey4life
      @pikey4life Месяц назад

      ​@@sebasdepaseojust jump in for it man, ive done the google cyber cert and it was insightful as a beginner, currently working on the microsoft sc 200 now - and saving to do the blue team.level 1 course/cert (its more recognised here in the uk)

  • @DaRealEndless
    @DaRealEndless 9 месяцев назад +4

    Thank you Jeff, IBM for giving me this topic free.

    • @jeffcrume
      @jeffcrume 9 месяцев назад +1

      You are most welcome!

  • @samsos7210
    @samsos7210 10 месяцев назад +7

    Thanks for making it easy to understand the main principles of security solutions and technologies we sell to our customers.

    • @jeffcrume
      @jeffcrume 10 месяцев назад

      You’re very welcome and thank you for watching!

  • @Dalai33
    @Dalai33 Год назад +103

    This channel is so underrated

    • @jeffcrume
      @jeffcrume Год назад +6

      I’m glad you are finding value in it!

    • @kudakwashekucherera1889
      @kudakwashekucherera1889 Год назад +1

      I like the clarity in these lectures this is the best

    • @kurttaguba17
      @kurttaguba17 Год назад

      Learned a lot from them.

    • @manassahyoung8218
      @manassahyoung8218 Год назад

      Highly underrated

    • @initialized
      @initialized Год назад

      10 / 10 conceptually, but I wish they would dive into some code every once in a while

  • @seetsamolapo5600
    @seetsamolapo5600 Год назад +10

    Hey Jeff, given the high demand for cybersecurity would you be so kind to give a roadmap of how to get into cybersecurity - the certifications etc from beginner to master. I'm definitely gonna hop on this series as the videos come out.

  • @S_I_P_R_N_E_T
    @S_I_P_R_N_E_T 3 месяца назад +9

    This video should be MANDATORY for every single security course. It is so universally applicable. Great work and a very happy sub.

    • @jeffcrume
      @jeffcrume 3 месяца назад +1

      Thanks so much for saying so! I’m really glad you liked it!

  • @RC19786
    @RC19786 11 месяцев назад +2

    I have to say, this has gotta be one of the best cybersec vdos out there when it comes to architecture plays, very few vendors like Cisco, Palo Alto and IBM can actually boast an end-to-end cybersec strategy and Jeff you have done a fantastic job laying it out, keep those vdos coming!

    • @jeffcrume
      @jeffcrume 11 месяцев назад

      Thank you so very much for all the kind words! I really appreciate it!

  • @berniereid4200
    @berniereid4200 Год назад +30

    You do a great job of explaining these fundamental concepts.

  • @isurujn
    @isurujn 2 месяца назад +2

    I'm in IT but not in the security space. I came across this video randomly but still watched the whole series because it was very interesting and the presentation was engaging. Good stuff!

    • @jeffcrume
      @jeffcrume Месяц назад

      So glad you liked it!

  • @Smperso-i7h
    @Smperso-i7h Год назад +7

    I learned a lot from the cybersecurity 10 videos series, I was always fascinated with security and this serie was water-satisfying... Particulary a value among many values that I learned is these fundamentals from the first video, that we should put multiple lines of defense and not rely on one defense to avoid the one single point of failure, another one is that complexity is the enemy of security, that one was very intresting to me... All the practices that you noted we should avoid and best practices that you propone are very valuable. Thank you very much!!

    • @jeffcrume
      @jeffcrume Год назад +3

      You learned the lessons well!

  • @Me_Bossman
    @Me_Bossman 19 дней назад

    This is pure gold. This information is what only years, maybe decades, of working in the field can provide.

  • @HamidDimah-j7x
    @HamidDimah-j7x 5 дней назад

    I’ve got this on loop while I study. It’s so smooth!

  • @ronaldchua2210
    @ronaldchua2210 10 месяцев назад +2

    found your lecture very easy to follow and digest the concepts and ideas

    • @jeffcrume
      @jeffcrume 10 месяцев назад

      I’m so glad to hear that!

  • @meribipucejera
    @meribipucejera Год назад +4

    Man-in-the-middle attack! A wise man once said, learn something everyday, even if its something small. Thank you for teaching me something today...I just considered getting my certificate in cyber security and i'm starting this journey very soon!!! GREAT VIDEO

    • @jeffcrume
      @jeffcrume Год назад +1

      That’s great advice about learning something new every day! Glad I could help

    • @LearnToCode2023
      @LearnToCode2023 5 месяцев назад

      @@jeffcrume Do you have platforms where one can practice their skills after watching these videos?

    • @AydenQuinn-r6x
      @AydenQuinn-r6x 2 месяца назад

      @@LearnToCode2023 what i reccomend is hack the box. its a great place to practice many many basic and highly advanced cybersec topics. also if you have good knowledge but want to expand on your own then black hills info sec has a great Pay-What-You-Can cyber range

  • @sasmeetasabat5995
    @sasmeetasabat5995 10 месяцев назад +2

    simply superb

    • @jeffcrume
      @jeffcrume 10 месяцев назад

      Thank you!

  • @Work_inprogress
    @Work_inprogress 10 месяцев назад +2

    Thanks a lot for these lessons. They really make things quite clear fundamentally. Thanks a lot.

    • @jeffcrume
      @jeffcrume 10 месяцев назад

      You are most welcome!

  • @olubunmiboladale6293
    @olubunmiboladale6293 Год назад +2

    Thank you so much for these 10-part series. I included the videos as study materials for my ISC2 Certified in Cybersecurity exam (I'm a newbie in Cybersecurity), and I'm glad to say i passed. Your explanations made the topics and concepts so easy to understand. Thank you!!!!

    • @jeffcrume
      @jeffcrume Год назад +1

      Wow! Congratulations on that! I’m so glad to hear that these videos helped!

    • @soremiolude225
      @soremiolude225 10 месяцев назад

      Same here. I'm currently listening to it while preparing for my ISC2 exam.

  • @pdillip1
    @pdillip1 10 месяцев назад +7

    The best masterclass on overall security. Crystal clear concept and razor sharp analysis.. I enjoyed and learned a lot.

    • @billlee5679
      @billlee5679 9 месяцев назад +1

      can agree no more. It's so great that you've got all my words when I was just about to text the Professor some same positive comments and attributes as token of personal thanks... My immediate impression on him is naturally simple: he is really a good teacher!!!

    • @jeffcrume
      @jeffcrume 9 месяцев назад +1

      I can’t tell you how much feedback like this means to me!

  • @captainwalker94
    @captainwalker94 11 месяцев назад +1

    Wow! this is so amazing. You have simplified this information so well, especially for someone like me who is pursuing a career in cybersecurity. currently preparing for my ISC2 cc Certification.

    • @jeffcrume
      @jeffcrume 11 месяцев назад

      I’m so glad you liked it! Best of luck on your certification pursuit!

  • @fgfdbv-m7t
    @fgfdbv-m7t 18 дней назад

    This content is gold. Thank you for putting this out here!

  • @ishwaryanarayan1010
    @ishwaryanarayan1010 10 месяцев назад +3

    Thank you :)

  • @sanjayb301
    @sanjayb301 2 месяца назад +3

    Thank you Jeff, within 17 minutes you explained in the most simplest manner of fundamentals of cyber security. I would say its a KISS - keep it simple , stupid.

    • @jeffcrume
      @jeffcrume 19 дней назад

      Thank you for watching!

  • @fouadfarid1163
    @fouadfarid1163 13 дней назад

    Excellent , simple to understand- Thank you

  • @markfitz8315
    @markfitz8315 11 месяцев назад +1

    I've watched all 10 videos - very good - lots of pointers for following up on. Thank you.

    • @jeffcrume
      @jeffcrume 11 месяцев назад

      Thank you for watching!

  • @finneko-ai
    @finneko-ai 6 месяцев назад +8

    NO HOMEWORK AND NO EXAMS? YOU ARE THE BEST PROFESSOR.

    • @jeffcrume
      @jeffcrume 5 месяцев назад +1

      😊

    • @AjaySingh-ey7gt
      @AjaySingh-ey7gt Месяц назад

      ​@@jeffcrumeSir I want video material on Identity access management material

  • @geekengr
    @geekengr Год назад +2

    Loved the video. SImple, but quite insightful. Please keep making videos on Cyber security.

    • @jeffcrume
      @jeffcrume Год назад

      Thanks for saying so!

  • @HhaaJshshs-zr8ir
    @HhaaJshshs-zr8ir Месяц назад +1

    WOW! really easy to follow along, great teacher

    • @jeffcrume
      @jeffcrume 19 дней назад +1

      Thanks for saying so!

  • @AshishGupta-xn5yj
    @AshishGupta-xn5yj Год назад +11

    Thank you won't be enough to show our gratitude for the content ❤
    Looking forward to the next video in this series

    • @jeffcrume
      @jeffcrume Год назад +2

      Your kind comments are more than enough! Thank you!

  • @liquidatmosphere5528
    @liquidatmosphere5528 Год назад +1

    Thanks for thoose basics delivery. Will continue on with other Subjs of Your track in further videos. Shaking Your hand 🤝

    • @jeffcrume
      @jeffcrume Год назад +1

      Thanks for the virtual handshake! 🤝

  • @mehdisoussi9141
    @mehdisoussi9141 Год назад +6

    This is gold, thank you very much! looking forward for the rest of the series!!

    • @jeffcrume
      @jeffcrume Год назад

      Thanks for the encouraging feedback!

  • @aladdinaldhmary7188
    @aladdinaldhmary7188 Год назад +1

    I have been searching for this for a long time. You just said what I was looking for. Thank you very much!

    • @jeffcrume
      @jeffcrume Год назад

      I love it! Glad I could help

  • @oscarjim3
    @oscarjim3 Год назад +1

    Totally enjoyed this primer on Cybersecurity. The explanation and use of visuals were informative.

  • @abhisuccess786
    @abhisuccess786 5 месяцев назад +1

    This is a very clear video (not ciphered ;-)) about cybersecurity fundamentals. Thank you for your effort .

    • @jeffcrume
      @jeffcrume 3 месяца назад

      I’m glad you liked it!

  • @MohsenJebelli145
    @MohsenJebelli145 Год назад +1

    many thanks of IBM for great information sharing. this series were fantastic too.

    • @jeffcrume
      @jeffcrume Год назад

      Many thanks to you for watching!

  • @SyberMath
    @SyberMath Месяц назад +1

    Amazing content! Thank you!!! ❤

  • @aruizsilva
    @aruizsilva Год назад +1

    Great explanation, wonderful summarization, and perfect delivery. Your work here is very appreciated sir. Thank you very much.

    • @jeffcrume
      @jeffcrume Год назад

      Thanks so much for saying! And your viewing is very much appreciated as well!

  • @henryvutinamoli8827
    @henryvutinamoli8827 3 месяца назад +2

    Thank you IBM Technology & profession!

    • @jeffcrume
      @jeffcrume 3 месяца назад

      You’re very welcome!

  • @IQstrategy
    @IQstrategy Месяц назад +1

    I already did Google Cyber Sec cert, but that stuff is old. This was a great update! TY,

    • @jeffcrume
      @jeffcrume 19 дней назад

      So glad you liked it!

  • @themiseducationoftheameric7407
    @themiseducationoftheameric7407 Год назад +1

    Outstanding sir. Excellent video brother!

    • @jeffcrume
      @jeffcrume 11 месяцев назад

      Thanks so much!

  • @Grant-d9g
    @Grant-d9g Год назад +1

    really simply explained, I'm impressed

    • @jeffcrume
      @jeffcrume 11 месяцев назад

      Thank you!

  • @Sojonkhan-k5f
    @Sojonkhan-k5f 24 дня назад +1

    This is why I love your videos. Great reaction!

    • @jeffcrume
      @jeffcrume 19 дней назад

      Thanks so much for the kind words!

  • @funkykong9001
    @funkykong9001 Год назад +5

    Thank you for this. Looking forward to more in the future!

  • @jne9479
    @jne9479 Год назад +1

    Thank you for the great presentation and knowledge sharing.

    • @jeffcrume
      @jeffcrume Год назад +1

      Thank you for watching!

  • @jcplatone1
    @jcplatone1 4 месяца назад +1

    Awesome. I love this guy's explanations. 🎉

  • @jjthoughts9920
    @jjthoughts9920 7 месяцев назад +2

    It would be really Nice if they can also create a video series on Cybersecurity Engineering , just like how they did with Architecture 🙂

  • @SteveM-io4yn
    @SteveM-io4yn 10 месяцев назад +1

    Great information! Thank you. Is there a transcript that can be downloaded?

    • @jeffcrume
      @jeffcrume 10 месяцев назад

      Yes, click into the description and scroll down and you will find a link to the transcript. This should be the case for all the videos we do on the channel

  • @babakmahmoodizadeh172
    @babakmahmoodizadeh172 Год назад +1

    Pretty clear explanations and examples. love it!

  • @sumitkindo6275
    @sumitkindo6275 6 месяцев назад +1

    So much of useful information is summarised. Gives a kind of roadmap.❤❤Thankyou Sir.

    • @jeffcrume
      @jeffcrume 5 месяцев назад

      Thanks for watching!

  • @valentinussofa4135
    @valentinussofa4135 Год назад +1

    Great lecture series. Thank you so much. 🙏👏👏👏

    • @jeffcrume
      @jeffcrume Год назад +1

      Thank you for watching!

  • @kennethng8346
    @kennethng8346 7 месяцев назад +2

    A suggestion: Yes if you don't need SSH either remove or disable it. But if you do need it, does it need to be from everywhere or a specific list? If a specific list set to allow only from that list. In that way even if a vulnerability is found, you have a smaller attack surface.

  • @mubaraksani7459
    @mubaraksani7459 4 месяца назад +1

    We are very excited for your efforts sir wish you the best

    • @jeffcrume
      @jeffcrume 3 месяца назад

      To you as well!

  • @emmanueljohn9939
    @emmanueljohn9939 3 месяца назад +3

    This is the best I have been looking for..

  • @FuzzerHash
    @FuzzerHash Год назад +13

    IBM having many great learning videos, thanks.

  • @adeleyejaphet8334
    @adeleyejaphet8334 4 месяца назад +1

    Highly commendable, I'm very grateful

    • @jeffcrume
      @jeffcrume 3 месяца назад

      Thanks for saying so!

  • @AjaySingh-ey7gt
    @AjaySingh-ey7gt Месяц назад +1

    Nice explanation 🎉❤

  • @mosunabdulai777
    @mosunabdulai777 4 месяца назад +1

    You are highly appreciated Sir

  • @khurramwzd
    @khurramwzd Год назад +2

    Really Thank you for sharing the knowledge.

  • @MichaelAlexander1967
    @MichaelAlexander1967 Год назад +1

    I wore an NC State Wolfpack tee-shirt when I was around 9, 10 and 11. I turned 18 then officially wore the Hokie tee-shirts and sweatshirts 😁 😏, but I still love my Wolfpack tee 😊. Very informative and well explained video. Thanks for posting. 👍🏼👍🏼👌🏽

  • @CarConnoisseurEleqCQA
    @CarConnoisseurEleqCQA 4 месяца назад +1

    Thank you, I will take it into account and find practical application)

    • @jeffcrume
      @jeffcrume 3 месяца назад

      Best of luck to you!

  • @abuwilliams7228
    @abuwilliams7228 Год назад +1

    I love ❤️❤️❤️ these Videos. Thank you so much IBM. Please keep them coming.

    • @jeffcrume
      @jeffcrume Год назад

      @abuwilliams7228 thanks so much for watching and for the great feedback!

  • @MArshadKyani
    @MArshadKyani 8 месяцев назад +1

    Got a motivation to learn Cybersecurity through this video... Excellent presentation.

    • @jeffcrume
      @jeffcrume 7 месяцев назад

      Glad this helped!

  • @g9udaya
    @g9udaya 10 месяцев назад +1

    amazing content

    • @jeffcrume
      @jeffcrume 10 месяцев назад

      Thank you!

  • @fouadmouzoun4724
    @fouadmouzoun4724 Год назад +1

    Thanks for sharing this nice demonstration. It is very rich in relevant information . As a beginner, it hepled me to understand good thigs.

    • @jeffcrume
      @jeffcrume Год назад

      You’re very welcome!

  • @sebasmen
    @sebasmen Год назад +3

    Great video! Very clear explanation, thank you :)

  • @GOOGCOUR_AT_DAN-xv9ko
    @GOOGCOUR_AT_DAN-xv9ko Месяц назад +2

    Thank you 🎉

  • @md.hamidurrahman9980
    @md.hamidurrahman9980 6 месяцев назад +1

    A good and comprehensive start.

    • @jeffcrume
      @jeffcrume 5 месяцев назад

      Glad you liked it!

  • @janno04
    @janno04 Год назад +2

    Cheers, summarised and ppted in 5 seconds.

  • @amitsethi573
    @amitsethi573 8 месяцев назад +1

    Thank you for such a wonderful lecture series. I learned a lot.

    • @jeffcrume
      @jeffcrume 7 месяцев назад

      So glad you liked it!

  • @Escrieg89
    @Escrieg89 Год назад +1

    IBM and Google are my most favourites.

  • @nguyenthenhat2324
    @nguyenthenhat2324 3 месяца назад +2

    Awesome, thank you!

  • @panteliskokkalis96
    @panteliskokkalis96 4 месяца назад +1

    Love the examples!

  • @sasathishkumar5791
    @sasathishkumar5791 Год назад +1

    Excellent content and neat, simple and clearly presented

  • @iraianbutech1350
    @iraianbutech1350 10 месяцев назад +1

    Great explanation

  • @sushantkumardevata5925
    @sushantkumardevata5925 Год назад +1

    Super stuff and thanks for the great presentation. Simple and concise.

  • @PinkYellowGreen2023
    @PinkYellowGreen2023 Год назад +1

    God bless you for sharing this!!

  • @SweetyPieDiscuss
    @SweetyPieDiscuss Год назад +1

    It's been years since I found learning enjoyable and thank you sir for creating such a great video.

    • @jeffcrume
      @jeffcrume Год назад +1

      Your comment made my day. Thank you!

  • @24-7networkservices6
    @24-7networkservices6 Месяц назад +1

    That was a great video

  • @unchainedwarriortv
    @unchainedwarriortv Год назад +1

    Amazing job, Prof!

    • @jeffcrume
      @jeffcrume Год назад

      Thanks so much @chiedozieHez!

  • @baruchben-david4196
    @baruchben-david4196 10 месяцев назад +4

    I remember someone who was so confident of his security arrangement that he posted his Social Security Number on billboards. It didn't end well...

    • @jeffcrume
      @jeffcrume 9 месяцев назад +1

      A predictable outcome 😂

  • @edwinrosales6322
    @edwinrosales6322 Год назад +1

    Great video, very comprehensive

  • @gubs_siramsana
    @gubs_siramsana 9 месяцев назад +1

    Awesome explaination.

  • @bantuandproud8456
    @bantuandproud8456 Год назад +1

    Thanks a lot, Jeff!

    • @jeffcrume
      @jeffcrume Год назад

      My pleasure!

    • @reecha6457
      @reecha6457 2 месяца назад

      ​@@jeffcrumeSir I want more inf on Identity Access Management.

  • @jervahnmorgan
    @jervahnmorgan Год назад +2

    Great video.

  • @jubrilamodu6699
    @jubrilamodu6699 Год назад +3

    Great series, learned a lot. Thank you.

  • @HeatherFaraMS
    @HeatherFaraMS Год назад +2

    How would you modify for a modern “data open by default” stance, where you want to encourage filesharing and collaboration across disciplines (only lock read on data and files internally with privacy rule)? How does read all line up with least privilege?

    • @jeffcrume
      @jeffcrume Год назад +1

      It all depends upon the value and sensitivity of the data. For some, just ensuring that it isn’t tampered with by making it read only is fine but for others we may need much tighter controls. More on this in the Data Security video later in the series…

  • @dirkl9652
    @dirkl9652 Год назад +2

    Good stuff. Thanks

  • @sachinmagdum
    @sachinmagdum Год назад +1

    Awesome content perfectly crafted! ❤ And No exams! 😂🎉

    • @jeffcrume
      @jeffcrume Год назад +1

      No exams for me to have to grade too! Win-win!!! 😊

  • @CyberSecurityGurus
    @CyberSecurityGurus 9 месяцев назад +1

    great infomation

    • @jeffcrume
      @jeffcrume 7 месяцев назад

      Glad you liked it

  • @zycksblazgog
    @zycksblazgog Год назад +1

    Excellent!

  • @user-zu2mi7je9d
    @user-zu2mi7je9d Год назад +1

    Thanks for this video. How do you ensure that the public key is unique to the user ? If i change my computer, how retain my private key ?
    How do you ensure ia cannot find the private key associated with public one, if mathematically associated ?

    • @jeffcrume
      @jeffcrume Год назад

      There are a number of ways to handle this depending on the level of security you need. The easiest is to use an encrypted cloud sync service. Another is to have the keys stored in removable hardware that is tamper resistant. In some cases, you may just decide to have different keys for different devices. All depends on the needs of the particular use case

  • @claudiabucknor7159
    @claudiabucknor7159 Год назад +2

    Million dollar knowledge, 🙏

  • @jsherdiana
    @jsherdiana 7 дней назад

    Thank You

  • @jagatkrishna1543
    @jagatkrishna1543 Год назад +2

    Thanks ❤

  • @Bobbel888
    @Bobbel888 3 месяца назад

    1:50 The major gap in Cyber Security is that it doesn't know, whether the good guys are inside the castle or outside, e.g. "MFA" entertains the idea, that the User is the bad guy. When you are conutinuously confronted with multi factor tests, you start to doubt in yourself, think you were the guy outside the castle of "the good ones" and this will destroy you; see movie 'The Edge'.

  • @mountp1391
    @mountp1391 Год назад +1

    very good video

  • @juergenm6107
    @juergenm6107 Год назад +1

    Hi, nice vid. IMHO one principle was missing. "Secure by default"

  • @galaxycleaningegypt
    @galaxycleaningegypt Год назад +2

    Would you organize the playlist of " Cybersecurity " for easy access

  • @ECAN2nv
    @ECAN2nv 7 месяцев назад +1

    Great video but don't you think there is a thin line between Security-by-Design and Secure by Design?

    • @jeffcrume
      @jeffcrume 5 месяцев назад +1

      It may be a distinction without a difference

  • @Yellow-Blue-Black
    @Yellow-Blue-Black Год назад +2

    Ty!