Cyberarchytecture seems to be a vast and somewhat complicated subject, particularly policies and frameworks, but it gets better with teachers like you. Thank you!
@@jeffcrumepls it's high time you create your own playlist (from beginner to advanced)on cyber security on your UA-cam channel inorder to help us understand key concepts and fundamentals. I wish all lecturers in my faculty were like😢😭😭😭😭, schooling would have been much easlier😊😊❤
Implementing security at the onset of the project is what we system engineers call concurrent engineering or IPDS, the intergrated product development system. Wow, Jeff. I'm really enjoying your style of teaching, especially your use of analogies. Superb!
I am an Android Developer, actually, but nowadays i am planning to take IBM Cybersecurity Analyst course on Coursera. I think these great series will help help to get started in Cybersecurity. Thanks for preparing such a beneficial resourses. Keep on!!!
I wish more leaders would think to involve security at the onset of projects. Sadly in the producing industry, on the shop floor and in similar environments, that is not the norm.
@gregoriomerino847 I actually teach two courses and this series is essentially a condensed version of one of those (“Enterprise Security Architecture”). The other is more of a collection of technologies and the cybersecurity and privacy issues that arise from them that I call “Secure Thinking”
I am your student in corsara and I Have complain please improve lectures I have hard time understanding due to sound problems and some time teachers are failing to explain
Cyberarchytecture seems to be a vast and somewhat complicated subject, particularly policies and frameworks, but it gets better with teachers like you. Thank you!
You’re very kind to say so!
@@jeffcrumepls it's high time you create your own playlist (from beginner to advanced)on cyber security on your UA-cam channel inorder to help us understand key concepts and fundamentals.
I wish all lecturers in my faculty were like😢😭😭😭😭, schooling would have been much easlier😊😊❤
This series is so good I'm gonna tattoo all those charts on my chest
I’m sure your tattoo artist will be thrilled! 😂
Absolutely brilliant, I am computer Lecturer myself from Ireland, keep going mate your method is cool
Thanks so much for the kind words! This means a lot coming from a fellow educator!
Implementing security at the onset of the project is what we system engineers call concurrent engineering or IPDS, the intergrated product development system. Wow, Jeff. I'm really enjoying your style of teaching, especially your use of analogies. Superb!
Thanks so much for saying so!
one of the best lecturer... You make cyber security education fun and easy for a beginner like me..
I am an Android Developer, actually, but nowadays i am planning to take IBM Cybersecurity Analyst course on Coursera. I think these great series will help help to get started in Cybersecurity. Thanks for preparing such a beneficial resourses. Keep on!!!
You’re very welcome and best of luck to you!
one the best teacher i have seen, with such simple example making things easy to understand. wish i learnt from you earlier
Thank you so much for saying so!
Outstanding lectures .
I'm planning to enroll cyber security and networking these series made me realize I like what I'm taking
Best of luck to you!
Cs50 and IBM have been a great source for me to get knowledgeable about cybersecurity! Thanks!
I wish more leaders would think to involve security at the onset of projects. Sadly in the producing industry, on the shop floor and in similar environments, that is not the norm.
You’re exactly right
Excellent series. Love the series
Thanks for the great feedback, Sri!
@@jeffcrume I am actually thankful to you for your teachings
This series is great and you are an exceptional teacher.
Thanks so much for saying so!
Thanks Jeff, grateful for your videos and sharing the knowledge for free.
Glad it was helpful!
I just learned more in 5 mins then i did studying other material
so glad to hear it!
Muy buenos los videos por favor sigan haciendo mas. saludos desde Chile!.
Con mucho gusto!
You said it love this series thank you for publishing. Probably as close as I'll ever get to getting employed by IBM
how can i like your videos million times, you are soo great.
@buhlemhose2292 you are far too kind! I’ll work on a script that hitting the like button for you automatically … 😂
Great video series. You're a great teacher. Thank you.
You are very kind to say so!
You are the best, thank you from Russia
Wow❤❤you’re so great teach😊
Thanks so much for saying so!
Hi sir i am from India and i like
Your video 🎉❤
Thanks for watching!
I'm preparing a Cibersecurity training for employees using this as fundamentals, amazing information. Thank you so much!!
I love that you’re finding ways to re-use this material!
Great explanation - thanks very much!
Wonderful video this is, thanks. I love the analogy
thank you!
Thank you a lot, this is very useful!
Fantastic @jeffcrume. Can I ask you in which course are you teacher? I'd like to get deeper into security architecture :)
@gregoriomerino847 I actually teach two courses and this series is essentially a condensed version of one of those (“Enterprise Security Architecture”). The other is more of a collection of technologies and the cybersecurity and privacy issues that arise from them that I call “Secure Thinking”
Very interesting
Teacher, Could you tell me what's tool do u use to teach us? ( an electric board?,.)
Good stuff. Much appreciated
This is awesome!
I am enjoying the series 😎 😊
amazing teacher, thanks very much 🤩
You are very kind to say so!
classic professor
Thank you!
I have another question. Where does infrastructure security come in?
That’s what I cover in each of the subsequent videos in the series by dividing infrastructure into a set of domains
what is cyber security architecture: tools ?
I am your student in corsara and I Have complain please improve lectures I have hard time understanding due to sound problems and some time teachers are failing to explain
Sorry to hear that. Please address those issues directly with Coursera since it sounds like it’s a problem with the platform
@@jeffcrumewhy don’t you start your own UA-cam channel? :)
Angry dog!!!))))
😊
I ne ed some video how the hacker steal the microphone bluethoot bluethoot attacks method
where is the #4? this is disappointing. Why can't IBM add numbers on every thumbnail.
We are publishing one each week. #4 will be next week
Beautiful explanation, thanks a lot!