you ever come across a video and you're just immediately like "I like this guy"? I like this guy lol. On a serious note, thanks for the video. Its helping calm some nerves before the interview.
After earning two AWS certifications, I was eager to delve deeper into cloud technologies. That's when I discovered your exceptional channel, which provides pure value. It's remarkably simple yet profound in its approach to explaining complex technologies. I'm immensely grateful for the insights and knowledge you've shared. Thank you, Mike.
Mr Gibbs thank you so much for once again providing a blueprint for this one section of cloud architecture. I love the security focus and that is my focus along with cloud architecture. I am so happy with the grace of God to have found your services and training. This video is pretty much on replay for me. 😊 I will incorporate all of your information into my continuing studies. Love GoCloud Architects.
This information is incredibly important for every cloud engineer/architect. NMAP , Social engineering is must to know . The way of explanation every question in detail is key for others to know about how much knowledge you have vs just certification knowledge.
Surrender exactly details and a good explanation shows competency and communication skills. Two essential components to be a successful cloud architect
Thank you so much. I have love my 25+ years in tech. But now I’m looking to train the generation of technology leaders. For that reason I love youtube ad a platform
Mike I wish you create this video last week, because I recently had interview and they asked exact questions. OMG where you been bro 🤦🏻🤦🏻🤦🏻🤦🏻. Waiting more videos from you. Thank you for sharing.
Watching this interview session and other interview sessions has been so helpful and it helping me boost my confidence in preparing for upcoming interviews. Thanks Mike. You are an amazing teacher, leader and mentor.
Mike you are a genus, God bless you and thanks 🙏 a lot for this, moreover I wanna say may the almighty good guide and protect you and your family I really don’t know how to thank you but I know God has been rewarding your work so far.
@@GoCloudArchitects i'm currently in the military but i get out in couple of months and i have been studying AWS for about a month now i really love the security part of it because i want focus on security architect, what is your advance as far studying is concern, and please can you make more videos of security Questions answers, thanks in Advance Mike may God bless you
Great video Mike, but I'd review your description of symmetric v asymmetric encryption. Symmetric encryption uses the same key for encrypting and decrypting the data. With asymmetric encryption, the data is encrypted by one key (the public key) and decrypted using the another key (the private key). Most systems use a combination of both; asymmetric keys to exchange the symmetric key securely and then use the shared secret/symmetric key for doing the heavy encryption of data, as symmetric encryption is much faster.
Thank you so much. We try very hard to help the community. I personally remember how hard it was for me 25 years ago. That’s why I started coaching people how to get their first tech job for tel decades. So others could learn from my research.
because I am not interested very well of security but now and after listening to some of the new attack techniques for me I become more interest about them
How do I go about getting a talk with you personally on a coaching level? I'm simply blown away by your ability to communicate these concepts in such an easy-to-understand and empathetic way.
Hi Mark. Thank you for your kind words. Please send an email to elitetechcareers@gmail.com Please leave your phone number in the email and we will call you.
Hi Thanks for the video. That was really helpful. Are the mentioned webinars still free? I checked at the provided link in the description and I couldn't find the free version.
Thank you. We run many free webinars. Here is the one for the cloud architect www.gocloudarchitects.com/become-the-ultimate-cloud-architect-webinar-youtube/
Wow, cool presentation on the concepts, really helps for people who are blinking towards internet & cloud security. Thank you 🙏🏻 💐... Do you mind giving any hint /vedeo on basics or steps towards implementating security solution on new organisation 💐.
All the clouds are basically the same. The only things that changes is what the companies call each service. These are applicable for anyone on any cloud.
If your looking for a sequential approach to building a full career we have the cloud architect career development program. gocloudcareers.com/cloud-architect-career-development-program/ There is no way we could put an entire cloud architect career on TH-cam But we provide as much as we can on our channel.
@5:15 just to clarify, slight verbal slip there... Mixed up versions in that one sentence. You use assymetric encryption first, use that to pass a symmetric key to the other party, and then switch the session over to using symmetric encryption (not the other way around). I'd give full credit for this kind of answer: Assymetric (PKI, 2 keys) is "expensive" in terms of CPU and time (it is slow) because the math is much more complex vs. symmetric (1 shared key) has lower cost burden, i.e. it is faster (relative to PKI). So you want to use assymetric for short term (low volume) and symmetric for long term (high volume) when possible. Why? Using assymetric first overcomes the problem of having to transfer a shared symmetric key across an unsecure channel (internet) in such a way that an eavesdropper (man in the middle) can capture all the messages BUT cannot get the shared key from that (and then eavesdrop and decrypt the following traffic). Using PKI (assymetric) to solve for this is critical to how we use the internet. In interviewing people I like to make sure they understand what kinds of problems and applications an answer has. Generally, great job... clear, concise and on-target. These questions are fairly simplistic but a good starting point and good guidance.
Thanks, Mike. This is a fantastic session, and it's very helpful for me to improve my future interview for Cloud Security Architect jobs. I just subscribed to your channel and will find time to watch your videos and provide my comments. Thanks again.
Thank you, Gunjan! We offer our FREE How to Get Your First Cloud Job Webinar, where you can ask your cloud career questions, and I’ll answer them for you. Please register for the next webinar at: gocloudcareers.com/free-cloud-webinar #cloudhired
Siem is part of a much bigger strategy. It’s not something you put behind a firewall. It’s about event correlation. Finding patterns of security events from system logs etc. So it’s part of the critical security architecture and strategy
Hello, We train cloud security architects in our cloud architect career development program. training.gocloudarchitects.com/bundles/new-career-architect-career-development-program
@@GoCloudArchitects I forgot to recheck settings for replies to comments. I can't imagine how many helpful replies I've had that I've missed from you all and others. Oh well. Problem solved. It's fixed now. Thanks for taking the time to respond. I appreciate it! 😊Looking forward to more of your engaging feedback.
Register for the CCSP Bootcamp, starting October 28th, bit.ly/3YbFPna
you ever come across a video and you're just immediately like "I like this guy"? I like this guy lol. On a serious note, thanks for the video. Its helping calm some nerves before the interview.
Thank you. Good luck on the interview
After earning two AWS certifications, I was eager to delve deeper into cloud technologies. That's when I discovered your exceptional channel, which provides pure value. It's remarkably simple yet profound in its approach to explaining complex technologies. I'm immensely grateful for the insights and knowledge you've shared. Thank you, Mike.
I am so glad to know the information is helpful to you. I really appreciate your feedback.
Mr Gibbs thank you so much for once again providing a blueprint for this one section of cloud architecture. I love the security focus and that is my focus along with cloud architecture. I am so happy with the grace of God to have found your services and training. This video is pretty much on replay for me. 😊 I will incorporate all of your information into my continuing studies. Love GoCloud Architects.
Thank you, Craig!
I'm glad it was helpful!
#cloudhired
Tell us a question you have been asked on a cloud computing interview. Please comment below!
This is great. It is so rare to find interview videos that don't just tell you how to parrot answers. Thanks :)
Thank you!
I'm glad it was helpful!
#cloudhired
Register for the FREE Azure Bootcamp, bit.ly/4chG5or
This information is incredibly important for every cloud engineer/architect. NMAP , Social engineering is must to know . The way of explanation every question in detail is key for others to know about how much knowledge you have vs just certification knowledge.
Surrender exactly details and a good explanation shows competency and communication skills.
Two essential components to be a successful cloud architect
The way you explain logic behind an answer along with the flow is truly brilliant Mike! Thanks for doing such fantastic videos!
Thank you so much.
I have love my 25+ years in tech.
But now I’m looking to train the generation of technology leaders. For that reason I love youtube ad a platform
June 2022 - Utilize our current promotional code "potential" for 30% off all of our programs. Https://training.gocloudcareers.com
Register for our FREE AWS Solutions Architect Associate Bootcamp, July 19-23, 2022, click here www.gocloudcareers.com/aws-july-bootcamp
Mike I wish you create this video last week, because I recently had interview and they asked exact questions. OMG where you been bro 🤦🏻🤦🏻🤦🏻🤦🏻. Waiting more videos from you. Thank you for sharing.
Thank you. I have a very special interview video coming this Friday.
Did you get the job?
Get the FREE Architect Career Guide, bit.ly/41rixJl
You are such a great mentor 😊 Thanks for all the efforts you put for cloud fraternity ✌️
Thank you Meraz. I love to teach and I'm happy to share knowledge and experience.
Mike, this was great information. I really liked the definition of man in the middle.
Thank you Regina 🙏. I so appreciate your kind words. It’s good to see you here.
Got a CSA interview Thursday... I'm CISSP-ISSAP, CCSP, but have only been exposed to Azure.. Let's hope I can nail a bit. Thanks for the video sir!
Watching this interview session and other interview sessions has been so helpful and it helping me boost my confidence in preparing for upcoming interviews. Thanks Mike. You are an amazing teacher, leader and mentor.
Thank you, Ruth!
I'm glad you enjoyed it!
#cloudhired
Mike you are a genus, God bless you and thanks 🙏 a lot for this, moreover I wanna say may the almighty good guide and protect you and your family I really don’t know how to thank you but I know God has been rewarding your work so far.
Albert - thank you so much.
@@GoCloudArchitects i'm currently in the military but i get out in couple of months and i have been studying AWS for about a month now i really love the security part of it because i want focus on security architect, what is your advance as far studying is concern, and please can you make more videos of security Questions answers, thanks in Advance Mike may God bless you
@@GoCloudArchitects Again mike i have learned a lot from your videos, you basically simplify everything for us. we really appreciate you mike
Thank you so much . You guys motivated me to start my own channel to create awareness and help budding cloud security people
Thank you!
I'm glad it was helpful!
#CloudHired
Great video Mike, but I'd review your description of symmetric v asymmetric encryption. Symmetric encryption uses the same key for encrypting and decrypting the data. With asymmetric encryption, the data is encrypted by one key (the public key) and decrypted using the another key (the private key). Most systems use a combination of both; asymmetric keys to exchange the symmetric key securely and then use the shared secret/symmetric key for doing the heavy encryption of data, as symmetric encryption is much faster.
You are absolutely correct. Thank you for watching carefully.
@@GoCloudArchitects Thanks for all the great content you've produced and given away for free; much appreciated!
Thank you so much. We try very hard to help the community. I personally remember how hard it was for me 25 years ago. That’s why I started coaching people how to get their first tech job for tel decades. So others could learn from my research.
Knowledgeable, succinct, articulate! This channel deserves more subscribers!
Thank you, Logan!
I'm glad you enjoyed it!
#cloudhired
I have an interview tomorrow and this video just made me more confident
Thank you
Wonderful. Good luck tomorrow.
because I am not interested very well of security but now and after listening to some of the new attack techniques for me I become more interest about them
Ezz. That’s great. Sometimes we just need to be exposed to something to find out it’s interesting.
How do I go about getting a talk with you personally on a coaching level? I'm simply blown away by your ability to communicate these concepts in such an easy-to-understand and empathetic way.
Hi Mark.
Thank you for your kind words.
Please send an email to elitetechcareers@gmail.com
Please leave your phone number in the email and we will call you.
Good explanations! It would be better to add some pictures depicting the mentioned scenarios.
Thank you, Spico!
I'm glad you enjoyed it!
Thank you for your suggestion!
#cloudhired
Hi Thanks for the video. That was really helpful. Are the mentioned webinars still free? I checked at the provided link in the description and I couldn't find the free version.
Thank you.
We run many free webinars.
Here is the one for the cloud architect
www.gocloudarchitects.com/become-the-ultimate-cloud-architect-webinar-youtube/
Another great video Michael.
Interview questions are just fantastic
Thank you Richard.
Wow, cool presentation on the concepts, really helps for people who are blinking towards internet & cloud security. Thank you 🙏🏻 💐...
Do you mind giving any hint /vedeo on basics or steps towards implementating security solution on new organisation 💐.
Please let know the link to participate in Monday & Thursday free webinar.
This is the link that you can sign up for the next webinar this Thursday, September 19th -->
bit.ly/3zobYhJ
Excellent job. How do I participate every Monday and Thursday? Thank you
Great video, it helps me understand what the interviewer is looking for. Thank you
Thank you!
I'm glad it was helpful!
#cloudhired
I just finished an Azure course. Will these videos help me? Are they similar to one another
All the clouds are basically the same. The only things that changes is what the companies call each service. These are applicable for anyone on any cloud.
Thank you so so much Sir, This video is pure gold.
We are so happy to help.
This is insightful. Thank you for sharing your ideas about interview questions.
Thank you Ayo.
Great video Mike! You explained this very clearly.
Thank you SM7
Great video! Keep up the good work!
Great content, thank you for this video!
Thank you, Manaury!
I'm glad it was helpful!
#cloudhired
Thanks for sharing such useful information. I am very confident now :)
Great video thank you!
Thank you, Im glad you enjoyed it.
Good content . How to follow sequentially the aws architect videos ,there are so many videos
If your looking for a sequential approach to building a full career we have the cloud architect career development program.
gocloudcareers.com/cloud-architect-career-development-program/
There is no way we could put an entire cloud architect career on TH-cam
But we provide as much as we can on our channel.
Thanks for the info provided .. 🙏🙏
You are welcome.
@5:15 just to clarify, slight verbal slip there... Mixed up versions in that one sentence.
You use assymetric encryption first, use that to pass a symmetric key to the other party, and then switch the session over to using symmetric encryption (not the other way around).
I'd give full credit for this kind of answer:
Assymetric (PKI, 2 keys) is "expensive" in terms of CPU and time (it is slow) because the math is much more complex vs. symmetric (1 shared key) has lower cost burden, i.e. it is faster (relative to PKI). So you want to use assymetric for short term (low volume) and symmetric for long term (high volume) when possible.
Why? Using assymetric first overcomes the problem of having to transfer a shared symmetric key across an unsecure channel (internet) in such a way that an eavesdropper (man in the middle) can capture all the messages BUT cannot get the shared key from that (and then eavesdrop and decrypt the following traffic).
Using PKI (assymetric) to solve for this is critical to how we use the internet.
In interviewing people I like to make sure they understand what kinds of problems and applications an answer has.
Generally, great job... clear, concise and on-target. These questions are fairly simplistic but a good starting point and good guidance.
Agree. When I researched the video I did make a mistake on the sentence.
Nice additional information in the comments.
Thank you very much, what a wonderful video!
Thank you Geni.
Thanks, Mike. This is a fantastic session, and it's very helpful for me to improve my future interview for Cloud Security Architect jobs. I just subscribed to your channel and will find time to watch your videos and provide my comments. Thanks again.
Thank you!
I am glad that this material is being helpful!
#cloudhired
Awesome Video!
Many thanks. Great content.. Appreciate!
👏🙏 I am working on getting #Cloudhired
Please come up with Cloud Vs Traditional DR content.
Thank you, Gunjan!
We offer our FREE How to Get Your First Cloud Job Webinar, where you can ask your cloud career questions, and I’ll answer them for you.
Please register for the next webinar at: gocloudcareers.com/free-cloud-webinar
#cloudhired
Good stuff Mike
Thank you Remi!
where does a SIEM placed ? right after the firewall ????
Siem is part of a much bigger strategy. It’s not something you put behind a firewall.
It’s about event correlation. Finding patterns of security events from system logs etc.
So it’s part of the critical security architecture and strategy
Good Information
Thank you
Can you plz share how to prepare for cloud jobs.....
Attend the free webinar and we will tell you how.
www.gocloudarchitects.com/free-cloud-webinar/
@GocloudArchitects; How about Cloud Security Architect Carrer Program?
Hello,
We train cloud security architects in our cloud architect career development program.
training.gocloudarchitects.com/bundles/new-career-architect-career-development-program
Great video as usual Mike !
Thank you Sweetha.
Love your videos
Thank you so much James 😊
Thanks Mike for the insight 👍
Thank you for watching.
Very informative
Thank you!
Glad you liked it!
#cloudhired
Thanks for this advice.
Thank you
Don't forget to close all unnecessary apps or unused ports. Hopefully I didn't miss something.
We are referring to removing unnecessary applications and packages from the operating system.
@@GoCloudArchitects I forgot to recheck settings for replies to comments. I can't imagine how many helpful replies I've had that I've missed from you all and others. Oh well. Problem solved. It's fixed now. Thanks for taking the time to respond. I appreciate it! 😊Looking forward to more of your engaging feedback.
and.. 😮 0:25 I 09😊 to go😅😊
Noobs thinking this are the questions they get in cloud security architect interviews