Cybersecurity Architecture: Roles and Tools
ฝัง
- เผยแพร่เมื่อ 12 มิ.ย. 2023
- IBM Security QRadar EDR : ibm.biz/Bdys93
IBM Security X-Force Threat Intelligence Index 2023: ibm.biz/Bdys9h
Like a building architect, the cybersecurity architect has to think of the "big picture". But there's limits to this analogy, since the cybersecurity architect focuses as much on how things fail as how things work. In this video, Jeff "the security guy" delves into the role, mindset, tools, and domains they have to adopt in developing a secure solution.
Get started for free on IBM Cloud → ibm.biz/ibm-cloud-sign-up
Subscribe to see more videos like this in the future → ibm.biz/subscribe-now
#AI #Software #ITModernization #Cybersecurity #QRadar #JeffCrume
This series is so good I'm gonna tattoo all those charts on my chest
I’m sure your tattoo artist will be thrilled! 😂
Cyberarchytecture seems to be a vast and somewhat complicated subject, particularly policies and frameworks, but it gets better with teachers like you. Thank you!
You’re very kind to say so!
@@jeffcrumepls it's high time you create your own playlist (from beginner to advanced)on cyber security on your TH-cam channel inorder to help us understand key concepts and fundamentals.
I wish all lecturers in my faculty were like😢😭😭😭😭, schooling would have been much easlier😊😊❤
Cs50 and IBM have been a great source for me to get knowledgeable about cybersecurity! Thanks!
Great explanation - thanks very much!
You said it love this series thank you for publishing. Probably as close as I'll ever get to getting employed by IBM
This is awesome!
I am an Android Developer, actually, but nowadays i am planning to take IBM Cybersecurity Analyst course on Coursera. I think these great series will help help to get started in Cybersecurity. Thanks for preparing such a beneficial resourses. Keep on!!!
You’re very welcome and best of luck to you!
Thank you a lot, this is very useful!
Absolutely brilliant, I am computer Lecturer myself from Ireland, keep going mate your method is cool
Thanks so much for the kind words! This means a lot coming from a fellow educator!
Good stuff. Much appreciated
Excellent series. Love the series
Thanks for the great feedback, Sri!
@@jeffcrume I am actually thankful to you for your teachings
Wonderful video this is, thanks. I love the analogy
thank you!
This series is great and you are an exceptional teacher.
Thanks so much for saying so!
I'm preparing a Cibersecurity training for employees using this as fundamentals, amazing information. Thank you so much!!
I love that you’re finding ways to re-use this material!
I'm planning to enroll cyber security and networking these series made me realize I like what I'm taking
Best of luck to you!
I am enjoying the series 😎 😊
Implementing security at the onset of the project is what we system engineers call concurrent engineering or IPDS, the intergrated product development system. Wow, Jeff. I'm really enjoying your style of teaching, especially your use of analogies. Superb!
Thanks so much for saying so!
how can i like your videos million times, you are soo great.
@buhlemhose2292 you are far too kind! I’ll work on a script that hitting the like button for you automatically … 😂
Great video series. You're a great teacher. Thank you.
You are very kind to say so!
Teacher, Could you tell me what's tool do u use to teach us? ( an electric board?,.)
Muy buenos los videos por favor sigan haciendo mas. saludos desde Chile!.
Con mucho gusto!
I wish more leaders would think to involve security at the onset of projects. Sadly in the producing industry, on the shop floor and in similar environments, that is not the norm.
You’re exactly right
Fantastic @jeffcrume. Can I ask you in which course are you teacher? I'd like to get deeper into security architecture :)
@gregoriomerino847 I actually teach two courses and this series is essentially a condensed version of one of those (“Enterprise Security Architecture”). The other is more of a collection of technologies and the cybersecurity and privacy issues that arise from them that I call “Secure Thinking”
Hi sir i am from India and i like
Your video 🎉❤
Thanks for watching!
Wow❤❤you’re so great teach😊
Thanks so much for saying so!
amazing teacher, thanks very much 🤩
You are very kind to say so!
I have another question. Where does infrastructure security come in?
That’s what I cover in each of the subsequent videos in the series by dividing infrastructure into a set of domains
classic professor
Thank you!
what is cyber security architecture: tools ?
I am your student in corsara and I Have complain please improve lectures I have hard time understanding due to sound problems and some time teachers are failing to explain
Sorry to hear that. Please address those issues directly with Coursera since it sounds like it’s a problem with the platform
@@jeffcrumewhy don’t you start your own TH-cam channel? :)
I ne ed some video how the hacker steal the microphone bluethoot bluethoot attacks method
where is the #4? this is disappointing. Why can't IBM add numbers on every thumbnail.
We are publishing one each week. #4 will be next week