I’m really glad you liked it. Always good to hear that we struck the right balance, which isn’t always easy for a guy like me who works in software sales
the presentation of these subjects are topnotch. the videos should be mandatory for anyone working in IT in a world with ever increasing cybersecurity threats
Dear Mr. Jeff Greetings, Thanks for your awesome series, actually 3-way handshake is sequenced in this way: 1- Syn 2- Syn + Ack 3- Ack Appreciate your efforts 😊 Regards Mohamed Ayman
CIA Triad could not have been explained any better - simplicity is the ultimate sophistication in teaching topic that could be understood by a 5 year old and 55 year old at the same time
Confidentiality - utilizes two technologies: Access Control and Encryption - Access control comprises of authentication: who are you, authorization: what you're allowed to do - MFA: using knowledge, possession or inherent pieces of evidence in combination to prove claimed identity Encryption - using cryptographic keys and algorithm to convert plain text into cipher text 2. Integrity - ensuring a transaction or data retains it's original form - not modified - utilizes Digital Signatures and Message Authentication Codes
@@jeffcrume thank you means a lot coming from you. I'm about to finish studying for the AWS Solutions Architect Associate so there was some security stuff in that course. I'm interested in branching to cybersecurity but the certification roadmap in cyber doesn't seem to be as clear as it is with cloud
Thank you so much for these videos. Very detailed. Please you didn't mention how to ensure Availability against those attacks (DOS, DDOS and SYN FLOOD).
Yes, I was trying to keep the video from getting too long. Typically SYN flood can be detected by network security tools (or even the server, itself). The key is to not allow all the resources to be tied up indefinitely so a timeout can help
Hi Mr Jeff. Greetings from Canada. What a nice and top notch contents on a so valuable topic im this erra of online life! Congrats! You know, I loved it and specifically the setup of the course presentation. I'm interested , asan aspirant content creator, in that setup: transparent glass or screnn on which you are writing while facing the audience. Can you please help me know what it takes to have such a setup? Thanks again so much❤
Glad you liked it. We actually have a video on how we make them. I can’t include a link or it might get disallowed but search the channel and you’ll find it
This man's brevity is much appreciated amidst the modern bafflegarble that is current IT/cybersecurity.
I really appreciate the feedback. Condensing so much content is a challenge. I’m glad you liked how it turned out
Fantastic talk;
Like the pace, breadth and depth of core concepts, and lack of trying to soft sell. a specific product.
I’m really glad you liked it. Always good to hear that we struck the right balance, which isn’t always easy for a guy like me who works in software sales
Don't ge'mme wrong, but I love this guy. For his intelligence and teaching skills.
Thank you, Sir.
Greetings from Germany.
Very kind of you to say, nnoK!
Your teaching is on point.
Thank you!
the presentation of these subjects are topnotch. the videos should be mandatory for anyone working in IT in a world with ever increasing cybersecurity threats
Thanks so much for the kind compliments! Comments like yours are the payoff for doing the work 😊
Mr. Jeff, you are a hero for this.
You are very kind to say so!
Dear Mr. Jeff
Greetings,
Thanks for your awesome series, actually 3-way handshake is sequenced in this way:
1- Syn
2- Syn + Ack
3- Ack
Appreciate your efforts 😊
Regards
Mohamed Ayman
CIA Triad could not have been explained any better - simplicity is the ultimate sophistication in teaching topic that could be understood by a 5 year old and 55 year old at the same time
Thank you for such kind complements! 😊
Thank you for these videos Jeff, you are a great teacher
Very nice of you to say so! Thanks for watching!
Excellent work! simple, concise, clear, fundamental, important, illustrated, useful...
I’m so glad you liked it!
Excellent Video
Oh what a blessing you are, Jeff. You have put a lot of concepts that have been very confusing for me into perspective.
Thanks so much for watching and for giving the great feedback!
Confidentiality
- utilizes two technologies: Access Control and Encryption
- Access control comprises of authentication: who are you, authorization: what you're allowed to do
- MFA: using knowledge, possession or inherent pieces of evidence in combination to prove claimed identity
Encryption - using cryptographic keys and algorithm to convert plain text into cipher text
2. Integrity
- ensuring a transaction or data retains it's original form - not modified
- utilizes Digital Signatures and Message Authentication Codes
You have taken good notes, Seetsa!
@@jeffcrume thank you means a lot coming from you. I'm about to finish studying for the AWS Solutions Architect Associate so there was some security stuff in that course. I'm interested in branching to cybersecurity but the certification roadmap in cyber doesn't seem to be as clear as it is with cloud
Thank you for making these videos Jeff
My pleasure!
Absolutely fantastic!! Thank you so much.
Thank you for watching!
This is wow
Thank you!
What a great video! I had no idea who Jeff Crume was, I'll be watching more of his stuff.
Thanks so much! 😊
Thank you much Jeff, this is very interesting source of information.
I’m so glad you liked it!
Great ! Thank u.
You’re welcome!
Very useful,
Thanks so much!
So glad you liked it!
Thanks for the lesson!
Great job, as usual. Thanks!
Thanks for watching!
Thank you!
amazing skill sir love to understand the concept
Thanks for this channel. High quality content ❤
Great ideas
Here for the beautiful randomness, waiting for the Series:Playlist
Thanks
Thank you so much for these videos. Very detailed. Please you didn't mention how to ensure Availability against those attacks (DOS, DDOS and SYN FLOOD).
Yes, I was trying to keep the video from getting too long. Typically SYN flood can be detected by network security tools (or even the server, itself). The key is to not allow all the resources to be tied up indefinitely so a timeout can help
please which is the beginning before this?, where should I start from before coming to this?.
You can find part 1 here: ua-cam.com/video/jq_LZ1RFPfU/v-deo.html
I hope you enjoy the series
Security by simplicity 😉
Yes! 😊
Hi Mr Jeff. Greetings from Canada.
What a nice and top notch contents on a so valuable topic im this erra of online life! Congrats!
You know, I loved it and specifically the setup of the course presentation.
I'm interested , asan aspirant content creator, in that setup: transparent glass or screnn on which you are writing while facing the audience. Can you please help me know what it takes to have such a setup?
Thanks again so much❤
Glad you liked it. We actually have a video on how we make them. I can’t include a link or it might get disallowed but search the channel and you’ll find it
Did anyone realise TCP 3-Way Handshake Process wrongly described in the video? It is syn, syn-ack, ack
I noticed this too
As far as I know, we understand what he was trying to say, and there is no need to raise any concerns
Yes
ok if this is 2 of 10 vids, so where is the link to the full playlist in description ?
You can check out the full series here: ua-cam.com/play/PLOspHqNVtKADkWLFt9OcziQF7EatuANSY.html
watching always sir wait soon now i need to protect tcp in my hand soon
So what controls were in place for Availability??
Keep watching other videos in the series that relate to detection and response
Is it related to IBM cloud services? Or in general cyber security?
These are general cybersecurity principles - not specific to any platform or product
CampTIA ITF+ :)
Isn't it SYN, SYN/ACK and ACK? or am missing something?
Apologies, I got them backwards
@@jeffcrume No worries champ, I appreciate everything you do.
I once had a 3 way handshake
24K
233
CIA ( not the spy guys) 🤣🤣🤣LAMO .
😊