I highly recommend this for anyone who is pursuing Cybersecurity at a total beginner level like myself. I’m watching these along with my IBM Cybersecurity Analyst Cert course, and it’s really helped me understand concepts that were so over my head at first. Really appreciate it!
Hi, I also interested in the field but like you I am a total beginner. Do you recommend jumping on the IBM CS Course right away or get some previous courses in Computer science first? I am 35 and making a change from digital marketing.
@@sebasdepaseojust jump in for it man, ive done the google cyber cert and it was insightful as a beginner, currently working on the microsoft sc 200 now - and saving to do the blue team.level 1 course/cert (its more recognised here in the uk)
Hey Jeff, given the high demand for cybersecurity would you be so kind to give a roadmap of how to get into cybersecurity - the certifications etc from beginner to master. I'm definitely gonna hop on this series as the videos come out.
I have to say, this has gotta be one of the best cybersec vdos out there when it comes to architecture plays, very few vendors like Cisco, Palo Alto and IBM can actually boast an end-to-end cybersec strategy and Jeff you have done a fantastic job laying it out, keep those vdos coming!
I'm in IT but not in the security space. I came across this video randomly but still watched the whole series because it was very interesting and the presentation was engaging. Good stuff!
I learned a lot from the cybersecurity 10 videos series, I was always fascinated with security and this serie was water-satisfying... Particulary a value among many values that I learned is these fundamentals from the first video, that we should put multiple lines of defense and not rely on one defense to avoid the one single point of failure, another one is that complexity is the enemy of security, that one was very intresting to me... All the practices that you noted we should avoid and best practices that you propone are very valuable. Thank you very much!!
Man-in-the-middle attack! A wise man once said, learn something everyday, even if its something small. Thank you for teaching me something today...I just considered getting my certificate in cyber security and i'm starting this journey very soon!!! GREAT VIDEO
@@LearnToCode2023 what i reccomend is hack the box. its a great place to practice many many basic and highly advanced cybersec topics. also if you have good knowledge but want to expand on your own then black hills info sec has a great Pay-What-You-Can cyber range
Thank you so much for these 10-part series. I included the videos as study materials for my ISC2 Certified in Cybersecurity exam (I'm a newbie in Cybersecurity), and I'm glad to say i passed. Your explanations made the topics and concepts so easy to understand. Thank you!!!!
can agree no more. It's so great that you've got all my words when I was just about to text the Professor some same positive comments and attributes as token of personal thanks... My immediate impression on him is naturally simple: he is really a good teacher!!!
Wow! this is so amazing. You have simplified this information so well, especially for someone like me who is pursuing a career in cybersecurity. currently preparing for my ISC2 cc Certification.
Thank you Jeff, within 17 minutes you explained in the most simplest manner of fundamentals of cyber security. I would say its a KISS - keep it simple , stupid.
Yes, click into the description and scroll down and you will find a link to the transcript. This should be the case for all the videos we do on the channel
A suggestion: Yes if you don't need SSH either remove or disable it. But if you do need it, does it need to be from everywhere or a specific list? If a specific list set to allow only from that list. In that way even if a vulnerability is found, you have a smaller attack surface.
I wore an NC State Wolfpack tee-shirt when I was around 9, 10 and 11. I turned 18 then officially wore the Hokie tee-shirts and sweatshirts 😁 😏, but I still love my Wolfpack tee 😊. Very informative and well explained video. Thanks for posting. 👍🏼👍🏼👌🏽
How would you modify for a modern “data open by default” stance, where you want to encourage filesharing and collaboration across disciplines (only lock read on data and files internally with privacy rule)? How does read all line up with least privilege?
It all depends upon the value and sensitivity of the data. For some, just ensuring that it isn’t tampered with by making it read only is fine but for others we may need much tighter controls. More on this in the Data Security video later in the series…
Thanks for this video. How do you ensure that the public key is unique to the user ? If i change my computer, how retain my private key ? How do you ensure ia cannot find the private key associated with public one, if mathematically associated ?
There are a number of ways to handle this depending on the level of security you need. The easiest is to use an encrypted cloud sync service. Another is to have the keys stored in removable hardware that is tamper resistant. In some cases, you may just decide to have different keys for different devices. All depends on the needs of the particular use case
1:50 The major gap in Cyber Security is that it doesn't know, whether the good guys are inside the castle or outside, e.g. "MFA" entertains the idea, that the User is the bad guy. When you are conutinuously confronted with multi factor tests, you start to doubt in yourself, think you were the guy outside the castle of "the good ones" and this will destroy you; see movie 'The Edge'.
I completed IBM's Cybersecurity Analyst course and got my certificate, I'm here to refine my knowledge before applying a CS architect job
Excellent! Good luck to you in your learning journey!
Hope you got a job after you completed the certificate. Any suggestions for new learners?
I highly recommend this for anyone who is pursuing Cybersecurity at a total beginner level like myself. I’m watching these along with my IBM Cybersecurity Analyst Cert course, and it’s really helped me understand concepts that were so over my head at first. Really appreciate it!
Hi, I also interested in the field but like you I am a total beginner. Do you recommend jumping on the IBM CS Course right away or get some previous courses in Computer science first? I am 35 and making a change from digital marketing.
@@sebasdepaseojust jump in for it man, ive done the google cyber cert and it was insightful as a beginner, currently working on the microsoft sc 200 now - and saving to do the blue team.level 1 course/cert (its more recognised here in the uk)
Thank you Jeff, IBM for giving me this topic free.
You are most welcome!
Thanks for making it easy to understand the main principles of security solutions and technologies we sell to our customers.
You’re very welcome and thank you for watching!
This channel is so underrated
I’m glad you are finding value in it!
I like the clarity in these lectures this is the best
Learned a lot from them.
Highly underrated
10 / 10 conceptually, but I wish they would dive into some code every once in a while
Hey Jeff, given the high demand for cybersecurity would you be so kind to give a roadmap of how to get into cybersecurity - the certifications etc from beginner to master. I'm definitely gonna hop on this series as the videos come out.
This video should be MANDATORY for every single security course. It is so universally applicable. Great work and a very happy sub.
Thanks so much for saying so! I’m really glad you liked it!
I have to say, this has gotta be one of the best cybersec vdos out there when it comes to architecture plays, very few vendors like Cisco, Palo Alto and IBM can actually boast an end-to-end cybersec strategy and Jeff you have done a fantastic job laying it out, keep those vdos coming!
Thank you so very much for all the kind words! I really appreciate it!
You do a great job of explaining these fundamental concepts.
I'm in IT but not in the security space. I came across this video randomly but still watched the whole series because it was very interesting and the presentation was engaging. Good stuff!
So glad you liked it!
I learned a lot from the cybersecurity 10 videos series, I was always fascinated with security and this serie was water-satisfying... Particulary a value among many values that I learned is these fundamentals from the first video, that we should put multiple lines of defense and not rely on one defense to avoid the one single point of failure, another one is that complexity is the enemy of security, that one was very intresting to me... All the practices that you noted we should avoid and best practices that you propone are very valuable. Thank you very much!!
You learned the lessons well!
This is pure gold. This information is what only years, maybe decades, of working in the field can provide.
I’ve got this on loop while I study. It’s so smooth!
found your lecture very easy to follow and digest the concepts and ideas
I’m so glad to hear that!
Man-in-the-middle attack! A wise man once said, learn something everyday, even if its something small. Thank you for teaching me something today...I just considered getting my certificate in cyber security and i'm starting this journey very soon!!! GREAT VIDEO
That’s great advice about learning something new every day! Glad I could help
@@jeffcrume Do you have platforms where one can practice their skills after watching these videos?
@@LearnToCode2023 what i reccomend is hack the box. its a great place to practice many many basic and highly advanced cybersec topics. also if you have good knowledge but want to expand on your own then black hills info sec has a great Pay-What-You-Can cyber range
simply superb
Thank you!
Thanks a lot for these lessons. They really make things quite clear fundamentally. Thanks a lot.
You are most welcome!
Thank you so much for these 10-part series. I included the videos as study materials for my ISC2 Certified in Cybersecurity exam (I'm a newbie in Cybersecurity), and I'm glad to say i passed. Your explanations made the topics and concepts so easy to understand. Thank you!!!!
Wow! Congratulations on that! I’m so glad to hear that these videos helped!
Same here. I'm currently listening to it while preparing for my ISC2 exam.
The best masterclass on overall security. Crystal clear concept and razor sharp analysis.. I enjoyed and learned a lot.
can agree no more. It's so great that you've got all my words when I was just about to text the Professor some same positive comments and attributes as token of personal thanks... My immediate impression on him is naturally simple: he is really a good teacher!!!
I can’t tell you how much feedback like this means to me!
Wow! this is so amazing. You have simplified this information so well, especially for someone like me who is pursuing a career in cybersecurity. currently preparing for my ISC2 cc Certification.
I’m so glad you liked it! Best of luck on your certification pursuit!
This content is gold. Thank you for putting this out here!
Thank you :)
Thank you Jeff, within 17 minutes you explained in the most simplest manner of fundamentals of cyber security. I would say its a KISS - keep it simple , stupid.
Thank you for watching!
Excellent , simple to understand- Thank you
I've watched all 10 videos - very good - lots of pointers for following up on. Thank you.
Thank you for watching!
NO HOMEWORK AND NO EXAMS? YOU ARE THE BEST PROFESSOR.
😊
@@jeffcrumeSir I want video material on Identity access management material
Loved the video. SImple, but quite insightful. Please keep making videos on Cyber security.
Thanks for saying so!
WOW! really easy to follow along, great teacher
Thanks for saying so!
Thank you won't be enough to show our gratitude for the content ❤
Looking forward to the next video in this series
Your kind comments are more than enough! Thank you!
Thanks for thoose basics delivery. Will continue on with other Subjs of Your track in further videos. Shaking Your hand 🤝
Thanks for the virtual handshake! 🤝
This is gold, thank you very much! looking forward for the rest of the series!!
Thanks for the encouraging feedback!
I have been searching for this for a long time. You just said what I was looking for. Thank you very much!
I love it! Glad I could help
Totally enjoyed this primer on Cybersecurity. The explanation and use of visuals were informative.
Thanks so much!
This is a very clear video (not ciphered ;-)) about cybersecurity fundamentals. Thank you for your effort .
I’m glad you liked it!
many thanks of IBM for great information sharing. this series were fantastic too.
Many thanks to you for watching!
Amazing content! Thank you!!! ❤
Great explanation, wonderful summarization, and perfect delivery. Your work here is very appreciated sir. Thank you very much.
Thanks so much for saying! And your viewing is very much appreciated as well!
Thank you IBM Technology & profession!
You’re very welcome!
I already did Google Cyber Sec cert, but that stuff is old. This was a great update! TY,
So glad you liked it!
Outstanding sir. Excellent video brother!
Thanks so much!
really simply explained, I'm impressed
Thank you!
This is why I love your videos. Great reaction!
Thanks so much for the kind words!
Thank you for this. Looking forward to more in the future!
Thank you for the great presentation and knowledge sharing.
Thank you for watching!
Awesome. I love this guy's explanations. 🎉
Thank you!
It would be really Nice if they can also create a video series on Cybersecurity Engineering , just like how they did with Architecture 🙂
Great information! Thank you. Is there a transcript that can be downloaded?
Yes, click into the description and scroll down and you will find a link to the transcript. This should be the case for all the videos we do on the channel
Pretty clear explanations and examples. love it!
so glad to hear it!
So much of useful information is summarised. Gives a kind of roadmap.❤❤Thankyou Sir.
Thanks for watching!
Great lecture series. Thank you so much. 🙏👏👏👏
Thank you for watching!
A suggestion: Yes if you don't need SSH either remove or disable it. But if you do need it, does it need to be from everywhere or a specific list? If a specific list set to allow only from that list. In that way even if a vulnerability is found, you have a smaller attack surface.
We are very excited for your efforts sir wish you the best
To you as well!
This is the best I have been looking for..
IBM having many great learning videos, thanks.
Highly commendable, I'm very grateful
Thanks for saying so!
Nice explanation 🎉❤
You are highly appreciated Sir
It's my pleasure
Really Thank you for sharing the knowledge.
I wore an NC State Wolfpack tee-shirt when I was around 9, 10 and 11. I turned 18 then officially wore the Hokie tee-shirts and sweatshirts 😁 😏, but I still love my Wolfpack tee 😊. Very informative and well explained video. Thanks for posting. 👍🏼👍🏼👌🏽
Go Pack!!! 😊
Thank you, I will take it into account and find practical application)
Best of luck to you!
I love ❤️❤️❤️ these Videos. Thank you so much IBM. Please keep them coming.
@abuwilliams7228 thanks so much for watching and for the great feedback!
Got a motivation to learn Cybersecurity through this video... Excellent presentation.
Glad this helped!
amazing content
Thank you!
Thanks for sharing this nice demonstration. It is very rich in relevant information . As a beginner, it hepled me to understand good thigs.
You’re very welcome!
Great video! Very clear explanation, thank you :)
Thank you 🎉
A good and comprehensive start.
Glad you liked it!
Cheers, summarised and ppted in 5 seconds.
Thank you for such a wonderful lecture series. I learned a lot.
So glad you liked it!
IBM and Google are my most favourites.
Awesome, thank you!
Love the examples!
Excellent content and neat, simple and clearly presented
Great explanation
Thanks!
Super stuff and thanks for the great presentation. Simple and concise.
God bless you for sharing this!!
It's been years since I found learning enjoyable and thank you sir for creating such a great video.
Your comment made my day. Thank you!
That was a great video
Amazing job, Prof!
Thanks so much @chiedozieHez!
I remember someone who was so confident of his security arrangement that he posted his Social Security Number on billboards. It didn't end well...
A predictable outcome 😂
Great video, very comprehensive
Awesome explaination.
Thanks!
Thanks a lot, Jeff!
My pleasure!
@@jeffcrumeSir I want more inf on Identity Access Management.
Great video.
Great series, learned a lot. Thank you.
How would you modify for a modern “data open by default” stance, where you want to encourage filesharing and collaboration across disciplines (only lock read on data and files internally with privacy rule)? How does read all line up with least privilege?
It all depends upon the value and sensitivity of the data. For some, just ensuring that it isn’t tampered with by making it read only is fine but for others we may need much tighter controls. More on this in the Data Security video later in the series…
Good stuff. Thanks
Awesome content perfectly crafted! ❤ And No exams! 😂🎉
No exams for me to have to grade too! Win-win!!! 😊
great infomation
Glad you liked it
Excellent!
Thanks for this video. How do you ensure that the public key is unique to the user ? If i change my computer, how retain my private key ?
How do you ensure ia cannot find the private key associated with public one, if mathematically associated ?
There are a number of ways to handle this depending on the level of security you need. The easiest is to use an encrypted cloud sync service. Another is to have the keys stored in removable hardware that is tamper resistant. In some cases, you may just decide to have different keys for different devices. All depends on the needs of the particular use case
Million dollar knowledge, 🙏
Thank You
Thanks ❤
1:50 The major gap in Cyber Security is that it doesn't know, whether the good guys are inside the castle or outside, e.g. "MFA" entertains the idea, that the User is the bad guy. When you are conutinuously confronted with multi factor tests, you start to doubt in yourself, think you were the guy outside the castle of "the good ones" and this will destroy you; see movie 'The Edge'.
very good video
Thanks!
Hi, nice vid. IMHO one principle was missing. "Secure by default"
Great point!
Would you organize the playlist of " Cybersecurity " for easy access
Great video but don't you think there is a thin line between Security-by-Design and Secure by Design?
It may be a distinction without a difference
Ty!