The professor is right handed and the image is flipped, otherwise he’d need to be able to write backwards on the glass so the camera in front would see it correctly for us.
Really helpful series, I'm working in IAM for 5 years and this video really made me see the bigger picture more clearly, always happy to learn more, thank you!
You are an amazing Teacher Jeff . Started watching this series:) it's really very informative Thank you for your work🙏😊just love your presentation and the way you are delivering information so that it encrypt in our mind 😀
I just finished watching 'Cybersecurity Architecture: Who Are You? Identity and Access Management' on this channel, and it was incredibly insightful! The video explained the importance of Identity and Access Management in cybersecurity, breaking down complex concepts in a clear and engaging way. It’s perfect for both beginners and seasoned professionals. The use of real-world examples and practical advice kept me hooked throughout. I highly recommend this channel for anyone interested in deepening their knowledge of cybersecurity architecture.
I'm giving a presentation on cybersecurity soon and this brilliant explanation helped me organize the concept better than I could have on my own. Much appreciated, thank you!
such a great course, easy to understand, i have no idea for Cyber security but i learn from this. it can craft a cyber security picture for me super thanks for video Jeff.
As a graduate student currently working on their thesis, many cyber professors are definitively smart in terms of technology, but they are not good teachers. Technology and teaching are two separate skills. Furthermore just because you are smart in a certain field doesn't mean you have the proficiency and language skills to teach a layman or student. That's why every time I learn something, I lecture out loud to an imaginary class of high school students. Helps to build communication methods while condensing all of the fundamental subject matter into easily digestible information.
Nothing will ever be airtight but as a SOC Analyst I really appreciate what IAM contributes the environment I work with. I think down the line it's going to allow more small/mid-size businesses to have a stronger security posture, which is awesome. I'm a HUGE fan of the temporary passwords used in the PAM system you describe around 24:35. To me IAM is one of those things that just makes sense for improving security. Excellent video, and I'm looking forward to hearing about endpoint security next.
Excellent way to explain. Small remark (at +/- 10' of the IAM video): the approval step should be before, when "assigning" the role. If the role is assigned and approved then there is no need to approve each sub-element individually, and this spares a lot of energy throughout the organization...
I hope for an interview "access manager" role within my company and this video helps me a lot to understand the big picture and nail the interview hopefully! Waiting for the call! Wish me luck! Thanks a lot!
Hey, this is really good presentation, but I'm not clear on one topic - In the Administration part, where we go through the onboarding or offboarding process, what would be that IAM system? Can you point me to any IAM solution? What would it be in Entra ID? Thank you so much in advance!
So well done and presented in such a succinct, engaging way! I didn't even notice the video was 30 minutes long, the time flew by! Thanks so much for the amazing content!
I am a business analyst and now looking to broaden my career in to IAM. Before I subscribe, I need to understand these videos are made for which kind of audience?
@w33dcel Good question. It actually could be either. In most cases, organizations consider it a victory just to do the basic account management this way but in a perfect world, all access rights would be similarly controlled.
Simply superb how he explains it all. 10 out of 10 for each of his videos! Thanks a lot!
Thanks so much!!!
I totally agree!!! Thank you!
Hands down one of the best instructors I've ever listened to.
You are too kind! Thank you!
What tech is used for this “chalk talk virtual presentation style” I’m a big fan!
A big piece of glass and a blacklight. Dry erase highlighters
The professor is right handed and the image is flipped, otherwise he’d need to be able to write backwards on the glass so the camera in front would see it correctly for us.
You're going to be a BIG reason why I succeed in this industry, thank you for your content we all appreciate you!
Comments like yours are the reason I do it so thank you for the inspiration!
Really helpful series, I'm working in IAM for 5 years and this video really made me see the bigger picture more clearly, always happy to learn more, thank you!
I’m really glad to hear that it helped!
You are an amazing Teacher Jeff . Started watching this series:) it's really very informative Thank you for your work🙏😊just love your presentation and the way you are delivering information so that it encrypt in our mind 😀
Thanks so much for all the kind complements!
I just finished watching 'Cybersecurity Architecture: Who Are You? Identity and Access Management' on this channel, and it was incredibly insightful! The video explained the importance of Identity and Access Management in cybersecurity, breaking down complex concepts in a clear and engaging way. It’s perfect for both beginners and seasoned professionals. The use of real-world examples and practical advice kept me hooked throughout. I highly recommend this channel for anyone interested in deepening their knowledge of cybersecurity architecture.
Superb simple and informative video to explain what IAM, thank you so much Jeff you are my new master :)
You are very kind to say so! 😊
I'm giving a presentation on cybersecurity soon and this brilliant explanation helped me organize the concept better than I could have on my own. Much appreciated, thank you!
He is explaining it to me like I am a five year old. Great teaching Jeff👍👍
just found your lecture mister Jeff,,,wonderfull,,,,,thankyou very much,,,,god bless you sir🙏
Thank you for watching!
I was litteraly refreshing once in a while today hoping for the 4th episode! and I snaped it at "44seconds ago"!
Where are previous 3? it doesn't say episode 4 on the tittle
You can see the previous three parts in this playlist: ua-cam.com/play/PLOspHqNVtKADkWLFt9OcziQF7EatuANSY.html
such a great course, easy to understand, i have no idea for Cyber security but i learn from this. it can craft a cyber security picture for me
super thanks for video Jeff.
Jeff needs to teach all the teachers on how to teach and talk…
You are very kind to say so! 😊
As a graduate student currently working on their thesis, many cyber professors are definitively smart in terms of technology, but they are not good teachers. Technology and teaching are two separate skills. Furthermore just because you are smart in a certain field doesn't mean you have the proficiency and language skills to teach a layman or student. That's why every time I learn something, I lecture out loud to an imaginary class of high school students. Helps to build communication methods while condensing all of the fundamental subject matter into easily digestible information.
Excellent explanation with digram and clear communication...thanks
Thank God for the SSO system! 👏🏼👏🏼👏🏼🙌🏼
Indeed!
I really love the way of explanation with simple way and will watch all stuff.. thank a lot
You are very welcome!
I'm gonna rewatch this one a couple of times. Thank you so much for the great content
You are most welcome!
That was one of the best cybersecurity videos I've ever seen, it was so great that it made me want to learn and teach these to other poeple as well
Wow, thank you!
I’m so glad to hear it! Thanks for the great feedback!
Thanks! I have an interview coming up, and this helped me prepare for it!
you're such an intelligent instructor. Thank You!
Nothing will ever be airtight but as a SOC Analyst I really appreciate what IAM contributes the environment I work with. I think down the line it's going to allow more small/mid-size businesses to have a stronger security posture, which is awesome. I'm a HUGE fan of the temporary passwords used in the PAM system you describe around 24:35. To me IAM is one of those things that just makes sense for improving security. Excellent video, and I'm looking forward to hearing about endpoint security next.
@CubensisEnjoyer great insights and thanks for the positive feedback! We hope to drop a new video each week until the 10 part series is complete
Thank you Jeff and IBM for this information packed video!
Glad you enjoyed it!
Great job in explaining IAM!
Thanks!
Crystal clear and engaging explanations, thank you for all this material!
Glad you liked it!
Best session ever referred for IAM topic..👏
Thanks for saying so!
Excellent way to explain. Small remark (at +/- 10' of the IAM video): the approval step should be before, when "assigning" the role. If the role is assigned and approved then there is no need to approve each sub-element individually, and this spares a lot of energy throughout the organization...
I hope for an interview "access manager" role within my company and this video helps me a lot to understand the big picture and nail the interview hopefully!
Waiting for the call! Wish me luck!
Thanks a lot!
Update: Got the interview! Let's goo!!
Update: Interview went very good and I'm satisfied which is the most important thing... Now we wait!!!
Update: Got called for 2nd interview. Hope for the best!
Update: 2nd interview went very well!! I'm satisfied! Now we wait again! Keke
FINAL UPDATE: I GOT THE JOB!!!! Thank you all for your support and for the video!!! Let's celebrate!!
Hey, this is really good presentation, but I'm not clear on one topic - In the Administration part, where we go through the onboarding or offboarding process, what would be that IAM system? Can you point me to any IAM solution? What would it be in Entra ID? Thank you so much in advance!
There are many. IBM Security Verify is one that we offer
Your presentations are phenomenal! Thank you so much 🙏🏾
This is very comprehensive. First time I understood PAM and the use of CyberArk. What Tool would be used for Federation?
IBM’s Verify product implements this but there are some from other vendors as well
Thank you. You are a really good presenter and the contents is brilliant and ver useful.
You are very welcome! Thanks for watching!
So well done and presented in such a succinct, engaging way! I didn't even notice the video was 30 minutes long, the time flew by! Thanks so much for the amazing content!
Thanks so much for the positive feedback! I was worried about the duration. Glad it didn’t put you to sleep 😴
Excellent presentation!
Brilliant! Great content, very well explained!
Thanks so much for the kind words!
Great detail and breakdown.
Good lecture. Thank you sir
Thanks again Jeff. Content is so engaging and concise. We appreciate the continual knowledge share in your expert fashion
@jgrimes997 and I really appreciate the kind complements of support!
This is going to be so helpful for me I’m going into a two year degree program for information system administration
Your explanation is best out of the best🎉
This is awesome and very knowledgeable
Thanks for saying so!
thank you for sharing this!
Great content.
W😮W! This is really good! Thank you, sir!!
Thank you for watching!
I just paused the video to give it a like,
Great explanation
So glad to hear that you liked it!
@@jeffcrume
Thank you for all the content, it's really helping us out. If possible please do a full detailed series on IAM.
A wonderful series
Thank you so much for this video. It is now as clear as day. Thumbs-up of course.
@georgesmith9178 thanks for saying so! IAM is a complex topic. Always hard to know just how deep to go without boring people
Excellent granularity in the level of details. Becoming a Fan🙃
Thanks so much, Sri!
I am a business analyst and now looking to broaden my career in to IAM. Before I subscribe, I need to understand these videos are made for which kind of audience?
Well made, informative and thoroughly engaging content overall. Keep it up good people!
thank you !
Amazing content thank you for making it so clear.
Really amazing. Thank you
Chapeau IBM
Wow, this is awesome! Good job with creating such content!
Good video but at 9:54 you use the term 'account'... Wouldnt 'acces type' (i.e. email) be more appropriate? Or am I missing something here? Thank's!😊
@w33dcel Good question. It actually could be either. In most cases, organizations consider it a victory just to do the basic account management this way but in a perfect world, all access rights would be similarly controlled.
i mean i understand it, still record every single keystrokes is crazy af! or not, i'm new
Please add application and OS admin to PAM section.
Definitely!
Like and subscribed
Great
I'm not sure if Jeff is amazing at writing backwards, or if he's writing normal and then mirrored the video
Sorry to say but it’s the latter 😢
Did this professor write a book?
Yes, I did. It’s pretty old now but it’s called “What Hackers Don’t Want You to Know”
114
24K
Jackson Margaret Thompson Barbara Miller Margaret