I highly recommend this for anyone who is pursuing Cybersecurity at a total beginner level like myself. I’m watching these along with my IBM Cybersecurity Analyst Cert course, and it’s really helped me understand concepts that were so over my head at first. Really appreciate it!
I'm in IT but not in the security space. I came across this video randomly but still watched the whole series because it was very interesting and the presentation was engaging. Good stuff!
Hey Jeff, given the high demand for cybersecurity would you be so kind to give a roadmap of how to get into cybersecurity - the certifications etc from beginner to master. I'm definitely gonna hop on this series as the videos come out.
can agree no more. It's so great that you've got all my words when I was just about to text the Professor some same positive comments and attributes as token of personal thanks... My immediate impression on him is naturally simple: he is really a good teacher!!!
I learned a lot from the cybersecurity 10 videos series, I was always fascinated with security and this serie was water-satisfying... Particulary a value among many values that I learned is these fundamentals from the first video, that we should put multiple lines of defense and not rely on one defense to avoid the one single point of failure, another one is that complexity is the enemy of security, that one was very intresting to me... All the practices that you noted we should avoid and best practices that you propone are very valuable. Thank you very much!!
I have to say, this has gotta be one of the best cybersec vdos out there when it comes to architecture plays, very few vendors like Cisco, Palo Alto and IBM can actually boast an end-to-end cybersec strategy and Jeff you have done a fantastic job laying it out, keep those vdos coming!
Wow! this is so amazing. You have simplified this information so well, especially for someone like me who is pursuing a career in cybersecurity. currently preparing for my ISC2 cc Certification.
Thank you Jeff, within 17 minutes you explained in the most simplest manner of fundamentals of cyber security. I would say its a KISS - keep it simple , stupid.
Yes, click into the description and scroll down and you will find a link to the transcript. This should be the case for all the videos we do on the channel
Man-in-the-middle attack! A wise man once said, learn something everyday, even if its something small. Thank you for teaching me something today...I just considered getting my certificate in cyber security and i'm starting this journey very soon!!! GREAT VIDEO
@@LearnToCode2023 what i reccomend is hack the box. its a great place to practice many many basic and highly advanced cybersec topics. also if you have good knowledge but want to expand on your own then black hills info sec has a great Pay-What-You-Can cyber range
Thank you so much for these 10-part series. I included the videos as study materials for my ISC2 Certified in Cybersecurity exam (I'm a newbie in Cybersecurity), and I'm glad to say i passed. Your explanations made the topics and concepts so easy to understand. Thank you!!!!
A suggestion: Yes if you don't need SSH either remove or disable it. But if you do need it, does it need to be from everywhere or a specific list? If a specific list set to allow only from that list. In that way even if a vulnerability is found, you have a smaller attack surface.
Thanks for this video. How do you ensure that the public key is unique to the user ? If i change my computer, how retain my private key ? How do you ensure ia cannot find the private key associated with public one, if mathematically associated ?
There are a number of ways to handle this depending on the level of security you need. The easiest is to use an encrypted cloud sync service. Another is to have the keys stored in removable hardware that is tamper resistant. In some cases, you may just decide to have different keys for different devices. All depends on the needs of the particular use case
Greetings Professor, how do see security from a monolithic archicteture as different from a hybrid cloud archicteture? How does do you see DevSecOps and zero trust as necessary cybersecurity skill set for the Enterprise needs?
How would you modify for a modern “data open by default” stance, where you want to encourage filesharing and collaboration across disciplines (only lock read on data and files internally with privacy rule)? How does read all line up with least privilege?
It all depends upon the value and sensitivity of the data. For some, just ensuring that it isn’t tampered with by making it read only is fine but for others we may need much tighter controls. More on this in the Data Security video later in the series…
I wore an NC State Wolfpack tee-shirt when I was around 9, 10 and 11. I turned 18 then officially wore the Hokie tee-shirts and sweatshirts 😁 😏, but I still love my Wolfpack tee 😊. Very informative and well explained video. Thanks for posting. 👍🏼👍🏼👌🏽
Typically we think of SOD as involving multiple people whereas what I think you are describing is more like multi-factor authentication, if I’m understanding your comment
1:50 The major gap in Cyber Security is that it doesn't know, whether the good guys are inside the castle or outside, e.g. "MFA" entertains the idea, that the User is the bad guy. When you are conutinuously confronted with multi factor tests, you start to doubt in yourself, think you were the guy outside the castle of "the good ones" and this will destroy you; see movie 'The Edge'.
Would it not be better to "black box" the best security implementation, or is it not possible? For example, it would be great to deter a hacker who sees the best crypto system is in their way, but wouldn't it be better if they didn't what was in place at all?
Certainly you don’t necessarily want to advertise how you are securing your system to the attacker but by the same token, you don’t want to rely on that as a defense because once the details are discovered, it would leave you exposed
I highly recommend this for anyone who is pursuing Cybersecurity at a total beginner level like myself. I’m watching these along with my IBM Cybersecurity Analyst Cert course, and it’s really helped me understand concepts that were so over my head at first. Really appreciate it!
This channel is so underrated
I’m glad you are finding value in it!
I like the clarity in these lectures this is the best
Learned a lot from them.
Highly underrated
10 / 10 conceptually, but I wish they would dive into some code every once in a while
I completed IBM's Cybersecurity Analyst course and got my certificate, I'm here to refine my knowledge before applying a CS architect job
Excellent! Good luck to you in your learning journey!
Hope you got a job after you completed the certificate. Any suggestions for new learners?
Thank you :)
simply superb
Thank you!
Thank you Jeff, IBM for giving me this topic free.
You are most welcome!
I'm in IT but not in the security space. I came across this video randomly but still watched the whole series because it was very interesting and the presentation was engaging. Good stuff!
Hey Jeff, given the high demand for cybersecurity would you be so kind to give a roadmap of how to get into cybersecurity - the certifications etc from beginner to master. I'm definitely gonna hop on this series as the videos come out.
Thanks for making it easy to understand the main principles of security solutions and technologies we sell to our customers.
You’re very welcome and thank you for watching!
You do a great job of explaining these fundamental concepts.
This video should be MANDATORY for every single security course. It is so universally applicable. Great work and a very happy sub.
Thanks so much for saying so! I’m really glad you liked it!
The best masterclass on overall security. Crystal clear concept and razor sharp analysis.. I enjoyed and learned a lot.
can agree no more. It's so great that you've got all my words when I was just about to text the Professor some same positive comments and attributes as token of personal thanks... My immediate impression on him is naturally simple: he is really a good teacher!!!
I can’t tell you how much feedback like this means to me!
This is the best I have been looking for..
found your lecture very easy to follow and digest the concepts and ideas
I’m so glad to hear that!
Thanks a lot for these lessons. They really make things quite clear fundamentally. Thanks a lot.
You are most welcome!
I learned a lot from the cybersecurity 10 videos series, I was always fascinated with security and this serie was water-satisfying... Particulary a value among many values that I learned is these fundamentals from the first video, that we should put multiple lines of defense and not rely on one defense to avoid the one single point of failure, another one is that complexity is the enemy of security, that one was very intresting to me... All the practices that you noted we should avoid and best practices that you propone are very valuable. Thank you very much!!
You learned the lessons well!
I have to say, this has gotta be one of the best cybersec vdos out there when it comes to architecture plays, very few vendors like Cisco, Palo Alto and IBM can actually boast an end-to-end cybersec strategy and Jeff you have done a fantastic job laying it out, keep those vdos coming!
Thank you so very much for all the kind words! I really appreciate it!
NO HOMEWORK AND NO EXAMS? YOU ARE THE BEST PROFESSOR.
😊
Thank you IBM Technology & profession!
You’re very welcome!
Wow! this is so amazing. You have simplified this information so well, especially for someone like me who is pursuing a career in cybersecurity. currently preparing for my ISC2 cc Certification.
I’m so glad you liked it! Best of luck on your certification pursuit!
IBM having many great learning videos, thanks.
Thank you Jeff, within 17 minutes you explained in the most simplest manner of fundamentals of cyber security. I would say its a KISS - keep it simple , stupid.
Great information! Thank you. Is there a transcript that can be downloaded?
Yes, click into the description and scroll down and you will find a link to the transcript. This should be the case for all the videos we do on the channel
Love the examples!
Man-in-the-middle attack! A wise man once said, learn something everyday, even if its something small. Thank you for teaching me something today...I just considered getting my certificate in cyber security and i'm starting this journey very soon!!! GREAT VIDEO
That’s great advice about learning something new every day! Glad I could help
@@jeffcrume Do you have platforms where one can practice their skills after watching these videos?
@@LearnToCode2023 what i reccomend is hack the box. its a great place to practice many many basic and highly advanced cybersec topics. also if you have good knowledge but want to expand on your own then black hills info sec has a great Pay-What-You-Can cyber range
Thank you won't be enough to show our gratitude for the content ❤
Looking forward to the next video in this series
Your kind comments are more than enough! Thank you!
Thank you so much for these 10-part series. I included the videos as study materials for my ISC2 Certified in Cybersecurity exam (I'm a newbie in Cybersecurity), and I'm glad to say i passed. Your explanations made the topics and concepts so easy to understand. Thank you!!!!
Wow! Congratulations on that! I’m so glad to hear that these videos helped!
Same here. I'm currently listening to it while preparing for my ISC2 exam.
A suggestion: Yes if you don't need SSH either remove or disable it. But if you do need it, does it need to be from everywhere or a specific list? If a specific list set to allow only from that list. In that way even if a vulnerability is found, you have a smaller attack surface.
amazing content
Thank you!
Awesome, thank you!
It would be really Nice if they can also create a video series on Cybersecurity Engineering , just like how they did with Architecture 🙂
This is a very clear video (not ciphered ;-)) about cybersecurity fundamentals. Thank you for your effort .
I’m glad you liked it!
Awesome. I love this guy's explanations. 🎉
Thank you!
Thank you for this. Looking forward to more in the future!
You are highly appreciated Sir
It's my pleasure
I've watched all 10 videos - very good - lots of pointers for following up on. Thank you.
Thank you for watching!
This is gold, thank you very much! looking forward for the rest of the series!!
Thanks for the encouraging feedback!
I want homework…👉👈🥺
Coursera offers a course based on this series with exercises if you really want it 😊
We are very excited for your efforts sir wish you the best
To you as well!
really simply explained, I'm impressed
Thank you!
Highly commendable, I'm very grateful
Thanks for saying so!
Thank you, I will take it into account and find practical application)
Best of luck to you!
Thanks for thoose basics delivery. Will continue on with other Subjs of Your track in further videos. Shaking Your hand 🤝
Thanks for the virtual handshake! 🤝
IBM and Google are my most favourites.
Cheers, summarised and ppted in 5 seconds.
I have been searching for this for a long time. You just said what I was looking for. Thank you very much!
I love it! Glad I could help
many thanks of IBM for great information sharing. this series were fantastic too.
Many thanks to you for watching!
Loved the video. SImple, but quite insightful. Please keep making videos on Cyber security.
Thanks for saying so!
What about zero trust? Could that be one of the principles?
So much of useful information is summarised. Gives a kind of roadmap.❤❤Thankyou Sir.
Thanks for watching!
Totally enjoyed this primer on Cybersecurity. The explanation and use of visuals were informative.
Thanks so much!
Excellent!
Outstanding sir. Excellent video brother!
Thanks so much!
Got a motivation to learn Cybersecurity through this video... Excellent presentation.
Glad this helped!
Great video! Very clear explanation, thank you :)
Really Thank you for sharing the knowledge.
Thanks ❤
Thank you for such a wonderful lecture series. I learned a lot.
So glad you liked it!
Thanks for this video. How do you ensure that the public key is unique to the user ? If i change my computer, how retain my private key ?
How do you ensure ia cannot find the private key associated with public one, if mathematically associated ?
There are a number of ways to handle this depending on the level of security you need. The easiest is to use an encrypted cloud sync service. Another is to have the keys stored in removable hardware that is tamper resistant. In some cases, you may just decide to have different keys for different devices. All depends on the needs of the particular use case
Thanks a lot, Jeff!
My pleasure!
Great explanation, wonderful summarization, and perfect delivery. Your work here is very appreciated sir. Thank you very much.
Thanks so much for saying! And your viewing is very much appreciated as well!
Great video but don't you think there is a thin line between Security-by-Design and Secure by Design?
It may be a distinction without a difference
Would you organize the playlist of " Cybersecurity " for easy access
Thanks for sharing this nice demonstration. It is very rich in relevant information . As a beginner, it hepled me to understand good thigs.
You’re very welcome!
Great explanation
Thanks!
Great video.
Great series, learned a lot. Thank you.
A good and comprehensive start.
Glad you liked it!
Greetings Professor, how do see security from a monolithic archicteture as different from a hybrid cloud archicteture? How does do you see DevSecOps and zero trust as necessary cybersecurity skill set for the Enterprise needs?
Can someone help me with the tool he's using for creating this video, how is he marking and doing it in front ?
Sure, search the channel for “how we make them” and you’ll see me in a video explaining
Pretty clear explanations and examples. love it!
so glad to hear it!
God bless you for sharing this!!
How would you modify for a modern “data open by default” stance, where you want to encourage filesharing and collaboration across disciplines (only lock read on data and files internally with privacy rule)? How does read all line up with least privilege?
It all depends upon the value and sensitivity of the data. For some, just ensuring that it isn’t tampered with by making it read only is fine but for others we may need much tighter controls. More on this in the Data Security video later in the series…
Thank you for the great presentation and knowledge sharing.
Thank you for watching!
I wore an NC State Wolfpack tee-shirt when I was around 9, 10 and 11. I turned 18 then officially wore the Hokie tee-shirts and sweatshirts 😁 😏, but I still love my Wolfpack tee 😊. Very informative and well explained video. Thanks for posting. 👍🏼👍🏼👌🏽
Go Pack!!! 😊
Hi, nice vid. IMHO one principle was missing. "Secure by default"
Great point!
Great lecture series. Thank you so much. 🙏👏👏👏
Thank you for watching!
Can verification by other my device be an example duty sep????i mean credit cards verification
Typically we think of SOD as involving multiple people whereas what I think you are describing is more like multi-factor authentication, if I’m understanding your comment
Million dollar knowledge, 🙏
I love ❤️❤️❤️ these Videos. Thank you so much IBM. Please keep them coming.
@abuwilliams7228 thanks so much for watching and for the great feedback!
Great video, very comprehensive
Excellent content and neat, simple and clearly presented
Super stuff and thanks for the great presentation. Simple and concise.
Ty!
It's been years since I found learning enjoyable and thank you sir for creating such a great video.
Your comment made my day. Thank you!
Please want to get in contact with you Sir
Good stuff. Thanks
Hi how can I start my career in cyber security
Can anyone please suggest how should I start
great infomation
Glad you liked it
Amazing job, Prof!
Thanks so much @chiedozieHez!
very good video
Thanks!
I remember someone who was so confident of his security arrangement that he posted his Social Security Number on billboards. It didn't end well...
A predictable outcome 😂
Awesome explaination.
Thanks!
1:50 The major gap in Cyber Security is that it doesn't know, whether the good guys are inside the castle or outside, e.g. "MFA" entertains the idea, that the User is the bad guy. When you are conutinuously confronted with multi factor tests, you start to doubt in yourself, think you were the guy outside the castle of "the good ones" and this will destroy you; see movie 'The Edge'.
Would it not be better to "black box" the best security implementation, or is it not possible? For example, it would be great to deter a hacker who sees the best crypto system is in their way, but wouldn't it be better if they didn't what was in place at all?
Certainly you don’t necessarily want to advertise how you are securing your system to the attacker but by the same token, you don’t want to rely on that as a defense because once the details are discovered, it would leave you exposed
Do you need to know a programming language to use cyber security fully?
No. There are plenty of jobs in cybersecurity that don’t involve coding.
Goodjob sir. Can we use https instead of http :)
Please do!
@@jeffcrumesir I need your help on this
Very good
Awesome content perfectly crafted! ❤ And No exams! 😂🎉
No exams for me to have to grade too! Win-win!!! 😊
thanks
Welcome