Cyberarchytecture seems to be a vast and somewhat complicated subject, particularly policies and frameworks, but it gets better with teachers like you. Thank you!
@@jeffcrumepls it's high time you create your own playlist (from beginner to advanced)on cyber security on your TH-cam channel inorder to help us understand key concepts and fundamentals. I wish all lecturers in my faculty were like😢😭😭😭😭, schooling would have been much easlier😊😊❤
I am an Android Developer, actually, but nowadays i am planning to take IBM Cybersecurity Analyst course on Coursera. I think these great series will help help to get started in Cybersecurity. Thanks for preparing such a beneficial resourses. Keep on!!!
Implementing security at the onset of the project is what we system engineers call concurrent engineering or IPDS, the intergrated product development system. Wow, Jeff. I'm really enjoying your style of teaching, especially your use of analogies. Superb!
I wish more leaders would think to involve security at the onset of projects. Sadly in the producing industry, on the shop floor and in similar environments, that is not the norm.
@gregoriomerino847 I actually teach two courses and this series is essentially a condensed version of one of those (“Enterprise Security Architecture”). The other is more of a collection of technologies and the cybersecurity and privacy issues that arise from them that I call “Secure Thinking”
I am your student in corsara and I Have complain please improve lectures I have hard time understanding due to sound problems and some time teachers are failing to explain
Cyberarchytecture seems to be a vast and somewhat complicated subject, particularly policies and frameworks, but it gets better with teachers like you. Thank you!
You’re very kind to say so!
@@jeffcrumepls it's high time you create your own playlist (from beginner to advanced)on cyber security on your TH-cam channel inorder to help us understand key concepts and fundamentals.
I wish all lecturers in my faculty were like😢😭😭😭😭, schooling would have been much easlier😊😊❤
This series is so good I'm gonna tattoo all those charts on my chest
I’m sure your tattoo artist will be thrilled! 😂
Absolutely brilliant, I am computer Lecturer myself from Ireland, keep going mate your method is cool
Thanks so much for the kind words! This means a lot coming from a fellow educator!
I am an Android Developer, actually, but nowadays i am planning to take IBM Cybersecurity Analyst course on Coursera. I think these great series will help help to get started in Cybersecurity. Thanks for preparing such a beneficial resourses. Keep on!!!
You’re very welcome and best of luck to you!
Implementing security at the onset of the project is what we system engineers call concurrent engineering or IPDS, the intergrated product development system. Wow, Jeff. I'm really enjoying your style of teaching, especially your use of analogies. Superb!
Thanks so much for saying so!
I'm planning to enroll cyber security and networking these series made me realize I like what I'm taking
Best of luck to you!
I wish more leaders would think to involve security at the onset of projects. Sadly in the producing industry, on the shop floor and in similar environments, that is not the norm.
You’re exactly right
Cs50 and IBM have been a great source for me to get knowledgeable about cybersecurity! Thanks!
one the best teacher i have seen, with such simple example making things easy to understand. wish i learnt from you earlier
Thank you so much for saying so!
one of the best lecturer... You make cyber security education fun and easy for a beginner like me..
Excellent series. Love the series
Thanks for the great feedback, Sri!
@@jeffcrume I am actually thankful to you for your teachings
Outstanding lectures .
I just learned more in 5 mins then i did studying other material
so glad to hear it!
This series is great and you are an exceptional teacher.
Thanks so much for saying so!
Thanks Jeff, grateful for your videos and sharing the knowledge for free.
Glad it was helpful!
You said it love this series thank you for publishing. Probably as close as I'll ever get to getting employed by IBM
Great video series. You're a great teacher. Thank you.
You are very kind to say so!
how can i like your videos million times, you are soo great.
@buhlemhose2292 you are far too kind! I’ll work on a script that hitting the like button for you automatically … 😂
Muy buenos los videos por favor sigan haciendo mas. saludos desde Chile!.
Con mucho gusto!
You are the best, thank you from Russia
I'm preparing a Cibersecurity training for employees using this as fundamentals, amazing information. Thank you so much!!
I love that you’re finding ways to re-use this material!
Great explanation - thanks very much!
Wonderful video this is, thanks. I love the analogy
Thank you a lot, this is very useful!
thank you!
Wow❤❤you’re so great teach😊
Thanks so much for saying so!
Hi sir i am from India and i like
Your video 🎉❤
Thanks for watching!
This is awesome!
Good stuff. Much appreciated
Very interesting
I am enjoying the series 😎 😊
Teacher, Could you tell me what's tool do u use to teach us? ( an electric board?,.)
amazing teacher, thanks very much 🤩
You are very kind to say so!
classic professor
Thank you!
Fantastic @jeffcrume. Can I ask you in which course are you teacher? I'd like to get deeper into security architecture :)
@gregoriomerino847 I actually teach two courses and this series is essentially a condensed version of one of those (“Enterprise Security Architecture”). The other is more of a collection of technologies and the cybersecurity and privacy issues that arise from them that I call “Secure Thinking”
I have another question. Where does infrastructure security come in?
That’s what I cover in each of the subsequent videos in the series by dividing infrastructure into a set of domains
what is cyber security architecture: tools ?
Angry dog!!!))))
😊
I am your student in corsara and I Have complain please improve lectures I have hard time understanding due to sound problems and some time teachers are failing to explain
Sorry to hear that. Please address those issues directly with Coursera since it sounds like it’s a problem with the platform
@@jeffcrumewhy don’t you start your own TH-cam channel? :)
I ne ed some video how the hacker steal the microphone bluethoot bluethoot attacks method
where is the #4? this is disappointing. Why can't IBM add numbers on every thumbnail.
We are publishing one each week. #4 will be next week
Beautiful explanation, thanks a lot!