Really helpful series, I'm working in IAM for 5 years and this video really made me see the bigger picture more clearly, always happy to learn more, thank you!
This is the first and last video that I'll need on this subject, as it's so well explained, thank you! It's simplified to the point a child could understand it :)
I just finished watching 'Cybersecurity Architecture: Who Are You? Identity and Access Management' on this channel, and it was incredibly insightful! The video explained the importance of Identity and Access Management in cybersecurity, breaking down complex concepts in a clear and engaging way. It’s perfect for both beginners and seasoned professionals. The use of real-world examples and practical advice kept me hooked throughout. I highly recommend this channel for anyone interested in deepening their knowledge of cybersecurity architecture.
You are an amazing Teacher Jeff . Started watching this series:) it's really very informative Thank you for your work🙏😊just love your presentation and the way you are delivering information so that it encrypt in our mind 😀
Nothing will ever be airtight but as a SOC Analyst I really appreciate what IAM contributes the environment I work with. I think down the line it's going to allow more small/mid-size businesses to have a stronger security posture, which is awesome. I'm a HUGE fan of the temporary passwords used in the PAM system you describe around 24:35. To me IAM is one of those things that just makes sense for improving security. Excellent video, and I'm looking forward to hearing about endpoint security next.
The professor is right handed and the image is flipped, otherwise he’d need to be able to write backwards on the glass so the camera in front would see it correctly for us.
I'm giving a presentation on cybersecurity soon and this brilliant explanation helped me organize the concept better than I could have on my own. Much appreciated, thank you!
such a great course, easy to understand, i have no idea for Cyber security but i learn from this. it can craft a cyber security picture for me super thanks for video Jeff.
So well done and presented in such a succinct, engaging way! I didn't even notice the video was 30 minutes long, the time flew by! Thanks so much for the amazing content!
I hope for an interview "access manager" role within my company and this video helps me a lot to understand the big picture and nail the interview hopefully! Waiting for the call! Wish me luck! Thanks a lot!
As a graduate student currently working on their thesis, many cyber professors are definitively smart in terms of technology, but they are not good teachers. Technology and teaching are two separate skills. Furthermore just because you are smart in a certain field doesn't mean you have the proficiency and language skills to teach a layman or student. That's why every time I learn something, I lecture out loud to an imaginary class of high school students. Helps to build communication methods while condensing all of the fundamental subject matter into easily digestible information.
Excellent way to explain. Small remark (at +/- 10' of the IAM video): the approval step should be before, when "assigning" the role. If the role is assigned and approved then there is no need to approve each sub-element individually, and this spares a lot of energy throughout the organization...
Hey, this is really good presentation, but I'm not clear on one topic - In the Administration part, where we go through the onboarding or offboarding process, what would be that IAM system? Can you point me to any IAM solution? What would it be in Entra ID? Thank you so much in advance!
@w33dcel Good question. It actually could be either. In most cases, organizations consider it a victory just to do the basic account management this way but in a perfect world, all access rights would be similarly controlled.
I am a business analyst and now looking to broaden my career in to IAM. Before I subscribe, I need to understand these videos are made for which kind of audience?
Hands down one of the best instructors I've ever listened to.
You are too kind! Thank you!
I stumbled upon his course recently and it's everything I could have imagined. Jeff rocks!
Simply superb how he explains it all. 10 out of 10 for each of his videos! Thanks a lot!
Thanks so much!!!
I totally agree!!! Thank you!
Really helpful series, I'm working in IAM for 5 years and this video really made me see the bigger picture more clearly, always happy to learn more, thank you!
I’m really glad to hear that it helped!
You're going to be a BIG reason why I succeed in this industry, thank you for your content we all appreciate you!
Comments like yours are the reason I do it so thank you for the inspiration!
Hands down the best video on IAM on the Internet!
You are so very kind to say so!
He is explaining it to me like I am a five year old. Great teaching Jeff👍👍
Thanks! I have to make it simple so that I can understand it 😊
This is the first and last video that I'll need on this subject, as it's so well explained, thank you! It's simplified to the point a child could understand it :)
I just finished watching 'Cybersecurity Architecture: Who Are You? Identity and Access Management' on this channel, and it was incredibly insightful! The video explained the importance of Identity and Access Management in cybersecurity, breaking down complex concepts in a clear and engaging way. It’s perfect for both beginners and seasoned professionals. The use of real-world examples and practical advice kept me hooked throughout. I highly recommend this channel for anyone interested in deepening their knowledge of cybersecurity architecture.
Thanks so much for all the kind compliments!
I was litteraly refreshing once in a while today hoping for the 4th episode! and I snaped it at "44seconds ago"!
Where are previous 3? it doesn't say episode 4 on the tittle
You can see the previous three parts in this playlist: th-cam.com/play/PLOspHqNVtKADkWLFt9OcziQF7EatuANSY.html
Thank you Jeff and IBM for this information packed video!
Glad you enjoyed it!
you're such an intelligent instructor. Thank You!
And you are a very kind viewer!
You are an amazing Teacher Jeff . Started watching this series:) it's really very informative Thank you for your work🙏😊just love your presentation and the way you are delivering information so that it encrypt in our mind 😀
Thanks so much for all the kind complements!
Nothing will ever be airtight but as a SOC Analyst I really appreciate what IAM contributes the environment I work with. I think down the line it's going to allow more small/mid-size businesses to have a stronger security posture, which is awesome. I'm a HUGE fan of the temporary passwords used in the PAM system you describe around 24:35. To me IAM is one of those things that just makes sense for improving security. Excellent video, and I'm looking forward to hearing about endpoint security next.
@CubensisEnjoyer great insights and thanks for the positive feedback! We hope to drop a new video each week until the 10 part series is complete
I'm gonna rewatch this one a couple of times. Thank you so much for the great content
You are most welcome!
What tech is used for this “chalk talk virtual presentation style” I’m a big fan!
A big piece of glass and a blacklight. Dry erase highlighters
The professor is right handed and the image is flipped, otherwise he’d need to be able to write backwards on the glass so the camera in front would see it correctly for us.
That was one of the best cybersecurity videos I've ever seen, it was so great that it made me want to learn and teach these to other poeple as well
Wow, thank you!
I’m so glad to hear it! Thanks for the great feedback!
Superb simple and informative video to explain what IAM, thank you so much Jeff you are my new master :)
You are very kind to say so! 😊
I'm giving a presentation on cybersecurity soon and this brilliant explanation helped me organize the concept better than I could have on my own. Much appreciated, thank you!
I’m so glad to hear that it helped!
Excellent explanation with digram and clear communication...thanks
glad you liked it!
just found your lecture mister Jeff,,,wonderfull,,,,,thankyou very much,,,,god bless you sir🙏
Thank you for watching!
I really love the way of explanation with simple way and will watch all stuff.. thank a lot
You are very welcome!
Your presentations are phenomenal! Thank you so much 🙏🏾
You are very kind to say so!
such a great course, easy to understand, i have no idea for Cyber security but i learn from this. it can craft a cyber security picture for me
super thanks for video Jeff.
I’m so glad you found it useful!
Crystal clear and engaging explanations, thank you for all this material!
Glad you liked it!
What a great presentation! Amazing job!
Thank you!
So well done and presented in such a succinct, engaging way! I didn't even notice the video was 30 minutes long, the time flew by! Thanks so much for the amazing content!
Thanks so much for the positive feedback! I was worried about the duration. Glad it didn’t put you to sleep 😴
Did an awesome job explaining and illustrating the info
Glad you liked it!
Great job in explaining IAM!
Thanks!
Brilliant! Great content, very well explained!
Thanks so much for the kind words!
Outstanding Explanation!
Glad you liked it!
I just paused the video to give it a like,
Great explanation
So glad to hear that you liked it!
@@jeffcrume
Thank you for all the content, it's really helping us out. If possible please do a full detailed series on IAM.
Best session ever referred for IAM topic..👏
Thanks for saying so!
Thank you. You are a really good presenter and the contents is brilliant and ver useful.
You are very welcome! Thanks for watching!
This is awesome. Unbelievable!
Thanks for watching!
Thank God for the SSO system! 👏🏼👏🏼👏🏼🙌🏼
Indeed!
Great detail and breakdown.
Thank you!
Excellent presentation!
Thanks! I have an interview coming up, and this helped me prepare for it!
I hope for an interview "access manager" role within my company and this video helps me a lot to understand the big picture and nail the interview hopefully!
Waiting for the call! Wish me luck!
Thanks a lot!
Update: Got the interview! Let's goo!!
Update: Interview went very good and I'm satisfied which is the most important thing... Now we wait!!!
Update: Got called for 2nd interview. Hope for the best!
Update: 2nd interview went very well!! I'm satisfied! Now we wait again! Keke
FINAL UPDATE: I GOT THE JOB!!!! Thank you all for your support and for the video!!! Let's celebrate!!
W😮W! This is really good! Thank you, sir!!
Thank you for watching!
This is awesome and very knowledgeable
Thanks for saying so!
Thanks again Jeff. Content is so engaging and concise. We appreciate the continual knowledge share in your expert fashion
@jgrimes997 and I really appreciate the kind complements of support!
thank you for sharing this!
A wonderful series
Thank you so much for this video. It is now as clear as day. Thumbs-up of course.
@georgesmith9178 thanks for saying so! IAM is a complex topic. Always hard to know just how deep to go without boring people
Great content.
Well made, informative and thoroughly engaging content overall. Keep it up good people!
Your explanation is best out of the best🎉
Good lecture. Thank you sir
Excellent granularity in the level of details. Becoming a Fan🙃
Thanks so much, Sri!
Jeff needs to teach all the teachers on how to teach and talk…
You are very kind to say so! 😊
As a graduate student currently working on their thesis, many cyber professors are definitively smart in terms of technology, but they are not good teachers. Technology and teaching are two separate skills. Furthermore just because you are smart in a certain field doesn't mean you have the proficiency and language skills to teach a layman or student. That's why every time I learn something, I lecture out loud to an imaginary class of high school students. Helps to build communication methods while condensing all of the fundamental subject matter into easily digestible information.
Wow, this is awesome! Good job with creating such content!
thank you !
Amazing content thank you for making it so clear.
Excellent way to explain. Small remark (at +/- 10' of the IAM video): the approval step should be before, when "assigning" the role. If the role is assigned and approved then there is no need to approve each sub-element individually, and this spares a lot of energy throughout the organization...
This is going to be so helpful for me I’m going into a two year degree program for information system administration
This is very comprehensive. First time I understood PAM and the use of CyberArk. What Tool would be used for Federation?
IBM’s Verify product implements this but there are some from other vendors as well
Really amazing. Thank you
Hey, this is really good presentation, but I'm not clear on one topic - In the Administration part, where we go through the onboarding or offboarding process, what would be that IAM system? Can you point me to any IAM solution? What would it be in Entra ID? Thank you so much in advance!
There are many. IBM Security Verify is one that we offer
Good video but at 9:54 you use the term 'account'... Wouldnt 'acces type' (i.e. email) be more appropriate? Or am I missing something here? Thank's!😊
@w33dcel Good question. It actually could be either. In most cases, organizations consider it a victory just to do the basic account management this way but in a perfect world, all access rights would be similarly controlled.
Chapeau IBM
I am a business analyst and now looking to broaden my career in to IAM. Before I subscribe, I need to understand these videos are made for which kind of audience?
The series is a shorter version of a 400 level course I teach at the university level but I hope for it to be consumable for anyone in IT
Like and subscribed
Great
Please add application and OS admin to PAM section.
Definitely!
i mean i understand it, still record every single keystrokes is crazy af! or not, i'm new
I'm not sure if Jeff is amazing at writing backwards, or if he's writing normal and then mirrored the video
Sorry to say but it’s the latter 😢
Did this professor write a book?
Yes, I did. It’s pretty old now but it’s called “What Hackers Don’t Want You to Know”
hello sir
114
24K
Jackson Margaret Thompson Barbara Miller Margaret