Really helpful series, I'm working in IAM for 5 years and this video really made me see the bigger picture more clearly, always happy to learn more, thank you!
The professor is right handed and the image is flipped, otherwise he’d need to be able to write backwards on the glass so the camera in front would see it correctly for us.
I just finished watching 'Cybersecurity Architecture: Who Are You? Identity and Access Management' on this channel, and it was incredibly insightful! The video explained the importance of Identity and Access Management in cybersecurity, breaking down complex concepts in a clear and engaging way. It’s perfect for both beginners and seasoned professionals. The use of real-world examples and practical advice kept me hooked throughout. I highly recommend this channel for anyone interested in deepening their knowledge of cybersecurity architecture.
I'm giving a presentation on cybersecurity soon and this brilliant explanation helped me organize the concept better than I could have on my own. Much appreciated, thank you!
As a graduate student currently working on their thesis, many cyber professors are definitively smart in terms of technology, but they are not good teachers. Technology and teaching are two separate skills. Furthermore just because you are smart in a certain field doesn't mean you have the proficiency and language skills to teach a layman or student. That's why every time I learn something, I lecture out loud to an imaginary class of high school students. Helps to build communication methods while condensing all of the fundamental subject matter into easily digestible information.
Nothing will ever be airtight but as a SOC Analyst I really appreciate what IAM contributes the environment I work with. I think down the line it's going to allow more small/mid-size businesses to have a stronger security posture, which is awesome. I'm a HUGE fan of the temporary passwords used in the PAM system you describe around 24:35. To me IAM is one of those things that just makes sense for improving security. Excellent video, and I'm looking forward to hearing about endpoint security next.
I hope for an interview "access manager" role within my company and this video helps me a lot to understand the big picture and nail the interview hopefully! Waiting for the call! Wish me luck! Thanks a lot!
You are an amazing Teacher Jeff . Started watching this series:) it's really very informative Thank you for your work🙏😊just love your presentation and the way you are delivering information so that it encrypt in our mind 😀
such a great course, easy to understand, i have no idea for Cyber security but i learn from this. it can craft a cyber security picture for me super thanks for video Jeff.
Hey, this is really good presentation, but I'm not clear on one topic - In the Administration part, where we go through the onboarding or offboarding process, what would be that IAM system? Can you point me to any IAM solution? What would it be in Entra ID? Thank you so much in advance!
So well done and presented in such a succinct, engaging way! I didn't even notice the video was 30 minutes long, the time flew by! Thanks so much for the amazing content!
I am a business analyst and now looking to broaden my career in to IAM. Before I subscribe, I need to understand these videos are made for which kind of audience?
@w33dcel Good question. It actually could be either. In most cases, organizations consider it a victory just to do the basic account management this way but in a perfect world, all access rights would be similarly controlled.
Excellent way to explain. Small remark (at +/- 10' of the IAM video): the approval step should be before, when "assigning" the role. If the role is assigned and approved then there is no need to approve each sub-element individually, and this spares a lot of energy throughout the organization...
Simply superb how he explains it all. 10 out of 10 for each of his videos! Thanks a lot!
Thanks so much!!!
I totally agree!!! Thank you!
Hands down one of the best instructors I've ever listened to.
You are too kind! Thank you!
I stumbled upon his course recently and it's everything I could have imagined. Jeff rocks!
Really helpful series, I'm working in IAM for 5 years and this video really made me see the bigger picture more clearly, always happy to learn more, thank you!
I’m really glad to hear that it helped!
What tech is used for this “chalk talk virtual presentation style” I’m a big fan!
A big piece of glass and a blacklight. Dry erase highlighters
The professor is right handed and the image is flipped, otherwise he’d need to be able to write backwards on the glass so the camera in front would see it correctly for us.
You're going to be a BIG reason why I succeed in this industry, thank you for your content we all appreciate you!
Comments like yours are the reason I do it so thank you for the inspiration!
I just finished watching 'Cybersecurity Architecture: Who Are You? Identity and Access Management' on this channel, and it was incredibly insightful! The video explained the importance of Identity and Access Management in cybersecurity, breaking down complex concepts in a clear and engaging way. It’s perfect for both beginners and seasoned professionals. The use of real-world examples and practical advice kept me hooked throughout. I highly recommend this channel for anyone interested in deepening their knowledge of cybersecurity architecture.
Thanks so much for all the kind compliments!
I was litteraly refreshing once in a while today hoping for the 4th episode! and I snaped it at "44seconds ago"!
Where are previous 3? it doesn't say episode 4 on the tittle
You can see the previous three parts in this playlist: th-cam.com/play/PLOspHqNVtKADkWLFt9OcziQF7EatuANSY.html
Thank you Jeff and IBM for this information packed video!
Glad you enjoyed it!
Outstanding Explanation!
Glad you liked it!
you're such an intelligent instructor. Thank You!
And you are a very kind viewer!
I'm giving a presentation on cybersecurity soon and this brilliant explanation helped me organize the concept better than I could have on my own. Much appreciated, thank you!
I’m so glad to hear that it helped!
Jeff needs to teach all the teachers on how to teach and talk…
You are very kind to say so! 😊
As a graduate student currently working on their thesis, many cyber professors are definitively smart in terms of technology, but they are not good teachers. Technology and teaching are two separate skills. Furthermore just because you are smart in a certain field doesn't mean you have the proficiency and language skills to teach a layman or student. That's why every time I learn something, I lecture out loud to an imaginary class of high school students. Helps to build communication methods while condensing all of the fundamental subject matter into easily digestible information.
Nothing will ever be airtight but as a SOC Analyst I really appreciate what IAM contributes the environment I work with. I think down the line it's going to allow more small/mid-size businesses to have a stronger security posture, which is awesome. I'm a HUGE fan of the temporary passwords used in the PAM system you describe around 24:35. To me IAM is one of those things that just makes sense for improving security. Excellent video, and I'm looking forward to hearing about endpoint security next.
@CubensisEnjoyer great insights and thanks for the positive feedback! We hope to drop a new video each week until the 10 part series is complete
I hope for an interview "access manager" role within my company and this video helps me a lot to understand the big picture and nail the interview hopefully!
Waiting for the call! Wish me luck!
Thanks a lot!
Update: Got the interview! Let's goo!!
Update: Interview went very good and I'm satisfied which is the most important thing... Now we wait!!!
Update: Got called for 2nd interview. Hope for the best!
Update: 2nd interview went very well!! I'm satisfied! Now we wait again! Keke
FINAL UPDATE: I GOT THE JOB!!!! Thank you all for your support and for the video!!! Let's celebrate!!
You are an amazing Teacher Jeff . Started watching this series:) it's really very informative Thank you for your work🙏😊just love your presentation and the way you are delivering information so that it encrypt in our mind 😀
Thanks so much for all the kind complements!
What a great presentation! Amazing job!
Thank you!
Did an awesome job explaining and illustrating the info
Glad you liked it!
I really love the way of explanation with simple way and will watch all stuff.. thank a lot
You are very welcome!
I'm gonna rewatch this one a couple of times. Thank you so much for the great content
You are most welcome!
That was one of the best cybersecurity videos I've ever seen, it was so great that it made me want to learn and teach these to other poeple as well
Wow, thank you!
I’m so glad to hear it! Thanks for the great feedback!
such a great course, easy to understand, i have no idea for Cyber security but i learn from this. it can craft a cyber security picture for me
super thanks for video Jeff.
I’m so glad you found it useful!
This is awesome. Unbelievable!
Thanks for watching!
Superb simple and informative video to explain what IAM, thank you so much Jeff you are my new master :)
You are very kind to say so! 😊
Excellent explanation with digram and clear communication...thanks
glad you liked it!
He is explaining it to me like I am a five year old. Great teaching Jeff👍👍
Thanks! I have to make it simple so that I can understand it 😊
Great detail and breakdown.
Thank you!
Thank God for the SSO system! 👏🏼👏🏼👏🏼🙌🏼
Indeed!
Great job in explaining IAM!
Thanks!
Your presentations are phenomenal! Thank you so much 🙏🏾
You are very kind to say so!
Hey, this is really good presentation, but I'm not clear on one topic - In the Administration part, where we go through the onboarding or offboarding process, what would be that IAM system? Can you point me to any IAM solution? What would it be in Entra ID? Thank you so much in advance!
There are many. IBM Security Verify is one that we offer
Crystal clear and engaging explanations, thank you for all this material!
Glad you liked it!
Brilliant! Great content, very well explained!
Thanks so much for the kind words!
just found your lecture mister Jeff,,,wonderfull,,,,,thankyou very much,,,,god bless you sir🙏
Thank you for watching!
Thanks! I have an interview coming up, and this helped me prepare for it!
Excellent presentation!
Thank you. You are a really good presenter and the contents is brilliant and ver useful.
You are very welcome! Thanks for watching!
Best session ever referred for IAM topic..👏
Thanks for saying so!
So well done and presented in such a succinct, engaging way! I didn't even notice the video was 30 minutes long, the time flew by! Thanks so much for the amazing content!
Thanks so much for the positive feedback! I was worried about the duration. Glad it didn’t put you to sleep 😴
This is very comprehensive. First time I understood PAM and the use of CyberArk. What Tool would be used for Federation?
IBM’s Verify product implements this but there are some from other vendors as well
I am a business analyst and now looking to broaden my career in to IAM. Before I subscribe, I need to understand these videos are made for which kind of audience?
The series is a shorter version of a 400 level course I teach at the university level but I hope for it to be consumable for anyone in IT
I just paused the video to give it a like,
Great explanation
So glad to hear that you liked it!
@@jeffcrume
Thank you for all the content, it's really helping us out. If possible please do a full detailed series on IAM.
This is awesome and very knowledgeable
Thanks for saying so!
W😮W! This is really good! Thank you, sir!!
Thank you for watching!
Thanks again Jeff. Content is so engaging and concise. We appreciate the continual knowledge share in your expert fashion
@jgrimes997 and I really appreciate the kind complements of support!
Good lecture. Thank you sir
thank you for sharing this!
Great content.
A wonderful series
This is going to be so helpful for me I’m going into a two year degree program for information system administration
Thank you so much for this video. It is now as clear as day. Thumbs-up of course.
@georgesmith9178 thanks for saying so! IAM is a complex topic. Always hard to know just how deep to go without boring people
Your explanation is best out of the best🎉
Excellent granularity in the level of details. Becoming a Fan🙃
Thanks so much, Sri!
Really amazing. Thank you
Wow, this is awesome! Good job with creating such content!
Well made, informative and thoroughly engaging content overall. Keep it up good people!
Good video but at 9:54 you use the term 'account'... Wouldnt 'acces type' (i.e. email) be more appropriate? Or am I missing something here? Thank's!😊
@w33dcel Good question. It actually could be either. In most cases, organizations consider it a victory just to do the basic account management this way but in a perfect world, all access rights would be similarly controlled.
Amazing content thank you for making it so clear.
thank you !
Excellent way to explain. Small remark (at +/- 10' of the IAM video): the approval step should be before, when "assigning" the role. If the role is assigned and approved then there is no need to approve each sub-element individually, and this spares a lot of energy throughout the organization...
Chapeau IBM
Please add application and OS admin to PAM section.
Definitely!
Like and subscribed
i mean i understand it, still record every single keystrokes is crazy af! or not, i'm new
I'm not sure if Jeff is amazing at writing backwards, or if he's writing normal and then mirrored the video
Sorry to say but it’s the latter 😢
Great
Did this professor write a book?
Yes, I did. It’s pretty old now but it’s called “What Hackers Don’t Want You to Know”
114
24K
Jackson Margaret Thompson Barbara Miller Margaret