I am a mechanical engineer looking to go into Cyber security, I just completed the 10 videos and i must say it has given me a broad and encompassing view of what Cyber security is about. I enjoyed the delivery and at no point did i feel like i was bored. Thank you, I have tried to register on the website so as to deepen my studies, but there seems to be a problem as my country Nigeria is not on the list of countries, therefore creating limitation for me. Please who can i address this to?
I hold a CISSP certificate and know most of the topics, but your method of linking topics and the method of simplifying the complex is organized, useful and very wonderful, and I understood a lot of things. Thank you very much for your efforts and thanks to IBM
This is an amazing course. Jeff, please do more training like this. Perhaps, use public cloud AWS, GCP or Azure to demonstrate it. I know you work for IBM, which you might use IBM cloud to showcase Cybersecurity in Action. Looking forward to it.
Congrats on this incredible series, I'll be waiting for season 2! I'm working on the Infrastructure side of things. My company is starting to work strongly on security, and we ourselves started learning about security, regulations, best practices... but the world of security is vast - and sometimes not that-well explained or organized. Personally, I think this series was great to bring order to chaos. You made clear what some of the "Pillars" we should pay attention to when we think/talk about security are, and what tools or techniques are involved in each one of them. Which in the end helped us to define learning and implementation strategies. In a way, I felt we were learning how and what to learn about modern security. In addition to that, it is noticeable you are passionate about both security and teaching, and that was a great motivation. Thanks again! 💪
Thanks a lot Jeff and IBM team. This series is very valuable and the way Jeff taught us is seamlessly perfect. I'll be looking forward to see more cybersecurity knowledge sharing videos from Jeff.
I hold a CISSP certificate and have practical experience with most of these topics, but I enjoyed watching your series as it brings all the topics together in such a lucid manner. I learnt a lot from your series Dr, Crume, thank you!
Each an every video was valuable gem and was of great help to gain better understanding of the foundations. I am interested if we can have advanced coverage in the domains of Network Security, IAM, cloud security and AI in Security
I have not seen any security materials or books that explain cybersecurity concepts the way they were taught in this series, really thanks for the great efforts to make it that seamless and simple.
Thanks for making this series of videos. There are so much information that i will need to rewatch this multiple times to finally understand everything.
Excellent course and thank you for taking the time to make this series! You mentioned this is a college level course you teach. Might there be a book that you use for your course available for purchase? If so, would you mind providing the ISBN?
Great question - yes, it is based on a course I teach (about to start the Fall semester) and, believe it or not, there is not a specific textbook, although, I do give some readings in various sources throughout. I always hated having to shell out a ton of money each semester for books as an undergrad, so I’m trying to make it easier for my students this way
I want to sincerely thank Jeff and the IBM team for this video series. It was incredibly informative & insightful. It covered a wide array of some of the most fundamental concepts in the Cyber Security space, covering ideas and knowledge as old as the information technology industry itself, while also covering some of the most recent and relevant updates in the space. Beautifully orchestrated ;) and taught by a brilliant mind.
Binge-watched the whole series in one evening without getting bored/ distracted and without not understanding anything you expained. Think your students are very lucky to have you as a teacher! What would help me (and probably most of us) is to have a structured handout of all the major drawings from the video with the meaning of the used abbreviations. Like this, I can repeat my learnings without losing bits in time and without having to watch the whole series again. Is there anything like that available to download ?
Thank you Jeff and IBM. I watched the entire series including multiple views of certain episodes. The format really works and the content is excellent. Ive recommended it to several colleagues.
I was scared to venture into the cyber security program, but after watching these 10 series videos from you, I am way more confident .Thanks for laying a good foundation for beginners like myself.
Thanks Jeff. This series makes it easier to talk about cybersecurity without having to get into the technical details of cybersecurity. Especially the CEOs, CFOs.
Thanks for these 10 videos. I've been in Networks for 30 years and I didn't realize how much knowledge I had. This course gave me a great introduction to vocabulary and concepts that were intuitive but not quantified, like business context and system context in relationship to the architectural overview. What I learned was the Dev OPS Sec. I come from network infrastructure, so I have never really seen the combination of the three, but when thinking about SaaS solutions, the light bulb went off. I've seen investigations, but the course gave me a better understanding of a case and its components. I want to delve deeper into the Security Operations teams, their business processes, and the SIEM and XDR tools. I am very interested in the SOAR process. In networks I've worked on, they never really focused on the remediation of a breach and then translating that remediation into a security policy for the future. Great Introduction, Thanks!!!.
Just finished my last lecture of the series, absolutely loved it, this series covered cybersecurity architecture comprehensively and effectively, thanks Jeff you re a cyber rockstar. It's The best series on cybersecurity architecture on UA-cam. Looking forward to have a full lecture on SOAR,AI and IR.
Enjoyed this playlist alot. Great work 10/10. every topic you explained crystal clear. About what types of videos we want for future- If you can make videos by using tools and giving live demonstrations of Response part using ibm tools (qradar plus xdr tools) that will be great.BCZ i tried to find everywhere there is no content like that and You are the best person who can do that.
Very kind of you to say and thanks for watching! We are looking to do more product demos in the future but, candidly, need to balance that so that people aren’t turned off thinking it’s just a sales pitch.
Excellent series, and well presented. I have a master's degree in cyber security, and you've covered the full scope of the essentials. Almost good preparation for the CISSP certification, that also covers cyber security from a "domains" perspective. Well done!!!
May all things continue to work well & secured in your life Jeff. Thank you very much for this instructional videos. You are an amazing teacher, this piqued my interest in cybersecurity.
Super thanks for the course, I have learned a lot from the video, your video is easy to understand and systematic shows that i love it. I will use it to be my background to explore more for cyber security Thanks
This is such excellent content, I have revisted this couple of times now. What would be great for a next series is how this is applied in a Public Cloud Environment. Thank you Jeff.
THANKS A LOT ! It las very very usefull, in the other side i lerned about the legal relevant in the breach notifications. !! I like this series, overall i would like in depth about the funcional tools !! See you !
Hi Jeff, thank you so much for a wonderful tech series that too on dry subject like security. I have enjoyed few tech videos on YT that really well done and are very effective. But for me this is the best tech series. I guess that's why you are into teaching. Respect 🙏 One bit of feedback I would have is that NIST CSF also talks about 'recover' function in addition to response. Would appreciate if you could do a session on that.
Thanks so much for the kind words! I know that security is often presented in a dry manner but, for me, the subject has always been fascinating. I hope to communicate my enthusiasm and interest in the subject through these videos. In fact, we recently released a video on the NIST CSF so search the channel for it (I can’t add links here).
I absolutely learnt alot more in this series than I did in my recent bootcamp at the university I embarked my cyber course with and I am prompted and eager to learn more about cyber security.
Simply the best videos I've watched for cyber security and it helped me to have a holistic view of cyber security. Thank you so much for sharing, Jeff. Also, if you could recommend a few books to read, that would be fantastic!
Thanks so much for watching and for taking the time to provide such encouraging feedback! I wrote a book 25 years ago but it’s probably not so easy to find any more. Most of my learning takes place online these days
Excellent explanation state of the art way, very clear, simple and informativ!! thank you very much. I just can confirm what Antoine mentioned, alla IT Manager should take this series of information and as well all ceo's and members of board so they start to understand the complexity of cyber security and all the needed tools to protect their assets, keep going this way it is really kept simple and understandable also for non IT people. Bravo
I find this series highly informative and I really appreciate it. It has helped me in preparing for my ISC2 CC exams and I have recommended it to other people who might also benefit from it. Thank you very much for producing such a helpful series. Sending love from Nigeria!
Excellently presented and the subjects links very well - aided understanding greatly - the sign of a true expert is making something complicated easy to understand - well done Sir!
Good question - this is typically developed by more senior cybersecurity analysts. Many times tools will come with a starter set that needs to be customized for the specific environment. IBM’s tool (QRadar SOAR) has a graphical playbook designer that simplifies the process
Hey Jeff, Many thanks for this series! ==> This is probably the best series I've ever watched! The series was very good structured and provided all the important things in the right sequenz and also to a suitable extend. 👍
Thank you so much Jeff. I'm so happy that I came across these series of videos. They are a great refresher for someone who is going back to the field after an absence. I'm truly grateful.
each video on cybersecurity architecture series was very informative, analogy between all classes were excellent, got more clarity on fundamentals and principle cybersecurity once again thanks for making it easy, like it was mentioned in video don't make cybersecurity complex.
Fantastic work! When the SOC analyst detect an anomaly that would be responsible for another internal team to fix, would this be where case mgmt is key to get to the right parties on it? What would be some recommendations for this and also coordination/communications for the stakeholders that might be involved? 🙏🏼
@heath202 thanks! Yes, that’s right. Case management becomes particularly useful when you need to track the case as it is passed from one analyst to another or even to other parts of the organization. Also, a good case mgmt tool would allow you to attach your findings so that the next person down the line can pick up where you left off, for instance. Having this info along with analyst notes in the case, itself, provides context
Thank you very much!! I will watch all the 10 video. this video is interesting and easy to understand for beginners, I like the chart you draw, they helped me to understand where the topic is in the whole video.
Muchas gracias por compartir tanto conocimiento de una manera tan didáctica y efectiva. Espero que los buenos comentarios los alienten a seguir generando más contenido de calidad.
Absolutely brilliant playlist (video series). The instructor is phenomenal and keeps you motivated to finish all the series in a single seating. My knowledge on this topic (on the scale of 1 to 10) was 1 before I started this series, and now I can say I have reached to 5 points. The contents of the course and the delivery of the lectures by the professor are very good and are in the proper sequence. Hats-off !
After having a cyberattack case in my work, management awareness was increased naturally. So, in order to understand the same language with the IT team, I watched all the series. Jeff, thank you very much for you and your team’s efforts. Now, I have more understanding regarding the cyber security process and I wish I have watched the series before. 🙏
Hi Jeff, Thanks for your awesome tutoring which presents the concepts seamlessly in an systematic way to digest easily though I am familiar with most of the topics. Looking forward to your next series!
I'm a senior undergrad student, studying software engineering, I've selected to do my thesis on Security. I was looking for the overall paradigms and fundamentals of security before delving into my thesis, this course has given me a broad overview of how things works in the field of security, and got an idea of domains where I can do research. Thanks Jeff for such a nice playlist! I would love to see contents about recent trends and events in the field of cybersecurity and how these are affecting our lives!
I really enjoyed it !! i'am cyber security engineer and learning again the foundations that way was very refreshing but also i have learned how to structure my knowledge about cybersecurity !!! can't wait for season 2
We really appreciate your communication skills Mr. Jeff !! The series provides the big picture of the security process and dynamic We would love it if you were able to make more in depth videos about certain topics like SASE... more technical (low level) stuff Thank you so much Mr. Jeff (in my mother tongue we say Shukran!), it is a pleasure to follow your teaching materials...
You are very kind to say so and I’m glad you enjoyed the series. I will try to do a few deeper dives but for the UA-cam channel it seems not as many people watch those so we have to try to strike a balance
I was preparing for a SOC-level1 interview and I am a beginner in this field. I have seen a lot of playlists but all are belongs to some specific domains and I was unable to have a good overall preview of this field but, after seeing this playlist I came to know about each and every thing and get a broader view of the picture. Thanks for the amazing playlist, I will see these videos a couple of time more to have all thigs in my mind before going to have my interview.
For me this was a great series of Cyber security videos - it helped me refresh my knowledge - each video was not to short or long - The way you explained and presented everything was great, one of the best. Thanks very much!
Thanks for watching and for your comments on the content and duration. We debated on what was the right length for the videos wanting to find a balance on the right level of depth/detail without going long and losing viewers. Glad it worked well for you
Thanks for your AMAZING job. First of all, this kind of training is totally refreshing, let alone the well-organized content of the series. I've been working in the security industry for over 10 years, your lessons orchestrate all my discrete domain knowledge together as an integrated whole. Thanks Jeff and I'm looking forward to more episodes on security.
Just finished up the whole video series in one go. The content of them is bloody awesome to get a big picture of the game. I learned a lot and gonna watch them again. Thanks a lot and keep it up Jeff....!!! Good on you....!!!
Excelent !! it was a great series, actually every one in the IT area should view this condensed CyberSecurity Series. I learned a lot about understanding the cyber Architecture and move forward to improve our detection and response capabilities.
@jobustos thanks so much for the great feedback! I hope all the “good guys” get this knowledge so that we can do a better job of defending against attacks
I’m a UX designer with an interest for cybersecurity, and this video was a fantastic introduction to all the major concepts! I’m a big fan of IBM’s UA-cam channel for a long time now, it would have been great if you had linked/suggested other relevant videos along the way. Regardless, thanks for putting it together, very enjoyable experience!
Dear Prof. Jeff Crume, Your series has deeply enhanced my understanding of defensive cybersecurity. It would be greatly beneficial if you could also explore the offensive side, particularly topics like penetration testing and vulnerability assessments. Looking forward to learning more from your content. Best regards.
I'm new in cybersecurity and enrolled in my local college to begin an Associate in cybersecurity in spring 2024, and after watching these series, my confidence level went through the roof. Jeff, your way of breaking down complex topics to digestible pieces is amazing! I was glued to each and every video from start to finish. I would pause the videos from time to time in awe of how easy it was for me to comprehend on topics that didn't make sense to me through my self study in the past. I now know where to go to for my reference materials on my assignments in school and in the future. Thank you for taking time to do this, i thoroughly enjoyed watching it and looking forward to more of your videos in the future.
@allannjuguna669 I’m so very glad to hear that you liked the series and especially pleased to know that it can help you in your educational pursuits! Unfortunately, too many of these concepts remain out of the grasp of the majority and they don’t need to be. Best of luck to you!
@@jeffcrume breaking down complex concepts and making them accessible is a key goal. With the right resources and learning tools, these concepts can become more understandable for everyone. Your enthusiasm for bridging this gap is commendable. Thanks again!
Thank you for taking the time to create this course. Although I am glad that cybersecurity systems are in place, the more I look into it, it just seems to be on the back foot as attackers become more sophisticated. I started looking into it with the question "how secure can we make a system" and now the question is more "How insecure can we afford to be". That makes cybersecurity a massive cost burden to every business which undermines its successfulness. That is not a good place for an industry to be in
I can’t disagree with anything you said. I’ll just add that it has always been that way not only in cybersecurity but in physical security. We still need police even though we’ve been trying to prevent burglaries for millennia. Still, we fight the good fight. Never a dull moment … 😊
Remarkable series! Clearly explained and covered major aspects in a brilliantly comprehensive wau. Well done! can't wait to get notified of additional content like this. I will reccommend on this one for sure.
I am a mechanical engineer looking to go into Cyber security, I just completed the 10 videos and i must say it has given me a broad and encompassing view of what Cyber security is about. I enjoyed the delivery and at no point did i feel like i was bored. Thank you,
I have tried to register on the website so as to deepen my studies, but there seems to be a problem as my country Nigeria is not on the list of countries, therefore creating limitation for me. Please who can i address this to?
I hold a CISSP certificate and know most of the topics, but your method of linking topics and the method of simplifying the complex is organized, useful and very wonderful, and I understood a lot of things. Thank you very much for your efforts and thanks to IBM
Thanks so much @simontreal007! Hearing your comments from a fellow CISSP means a lot!
I have the same feeling. I hold a CISSP too and this course was amazing. This is by far the best Cyber Security course I have seen on UA-cam.
agreed, same here CISSP and CCSP..
Same here. I too hold CISSP but this course is really good.
This is an amazing course. Jeff, please do more training like this. Perhaps, use public cloud AWS, GCP or Azure to demonstrate it. I know you work for IBM, which you might use IBM cloud to showcase Cybersecurity in Action. Looking forward to it.
The whole series was very good in laying the foundations of a security program.
Congrats on this incredible series, I'll be waiting for season 2!
I'm working on the Infrastructure side of things. My company is starting to work strongly on security, and we ourselves started learning about security, regulations, best practices... but the world of security is vast - and sometimes not that-well explained or organized. Personally, I think this series was great to bring order to chaos. You made clear what some of the "Pillars" we should pay attention to when we think/talk about security are, and what tools or techniques are involved in each one of them. Which in the end helped us to define learning and implementation strategies. In a way, I felt we were learning how and what to learn about modern security.
In addition to that, it is noticeable you are passionate about both security and teaching, and that was a great motivation. Thanks again! 💪
I learned the importance of quick reports. Thank you❤
Thanks a lot Jeff and IBM team. This series is very valuable and the way Jeff taught us is seamlessly perfect. I'll be looking forward to see more cybersecurity knowledge sharing videos from Jeff.
Jeff's real voice is back. 😄 Nice and well-presented condensed series.
No more deep fake voice generation! 😂 Glad you liked it!
I hold a CISSP certificate and have practical experience with most of these topics, but I enjoyed watching your series as it brings all the topics together in such a lucid manner. I learnt a lot from your series Dr, Crume, thank you!
Thanks so much for saying so @pilphil! I’m really glad to hear that it helped
Each an every video was valuable gem and was of great help to gain better understanding of the foundations.
I am interested if we can have advanced coverage in the domains of Network Security, IAM, cloud security and AI in Security
Great suggestions! Thanks for the feedback!
Enjoued and learned Cybersecurity Architecture, It really usefull Thanks again.😍
"Thank you, Jeff. This is amazing stuff. You are a very talented teacher, and you make the complicated look simple."
You are very kind to say so!
Great series. More details Elon DevSecOps and SAST&DAST will help
I have not seen any security materials or books that explain cybersecurity concepts the way they were taught in this series, really thanks for the great efforts to make it that seamless and simple.
Thanks so much for the great feedback!
Thanks for making this series of videos. There are so much information that i will need to rewatch this multiple times to finally understand everything.
You’re very welcome and I hope the reruns are just as good for you!
Excellent course and thank you for taking the time to make this series! You mentioned this is a college level course you teach. Might there be a book that you use for your course available for purchase? If so, would you mind providing the ISBN?
Great question - yes, it is based on a course I teach (about to start the Fall semester) and, believe it or not, there is not a specific textbook, although, I do give some readings in various sources throughout. I always hated having to shell out a ton of money each semester for books as an undergrad, so I’m trying to make it easier for my students this way
I want to sincerely thank Jeff and the IBM team for this video series. It was incredibly informative & insightful.
It covered a wide array of some of the most fundamental concepts in the Cyber Security space, covering ideas and knowledge as old as the information technology industry itself, while also covering some of the most recent and relevant updates in the space.
Beautifully orchestrated ;) and taught by a brilliant mind.
So very kind of you to say so!
Binge-watched the whole series in one evening without getting bored/ distracted and without not understanding anything you expained. Think your students are very lucky to have you as a teacher! What would help me (and probably most of us) is to have a structured handout of all the major drawings from the video with the meaning of the used abbreviations. Like this, I can repeat my learnings without losing bits in time and without having to watch the whole series again. Is there anything like that available to download ?
I’m really glad that you found it useful! Your suggestion is a good one. That I’ll look into
Thank you Jeff and IBM. I watched the entire series including multiple views of certain episodes. The format really works and the content is excellent. Ive recommended it to several colleagues.
I’m so glad to hear that you liked it @ldavey560! Thanks for watching, re-watching and sharing with others!
I was scared to venture into the cyber security program, but after watching these 10 series videos from you, I am way more confident .Thanks for laying a good foundation for beginners like myself.
I’m really glad to hear that! We need more good people in cybersecurity
Thanks Jeff. This series makes it easier to talk about cybersecurity without having to get into the technical details of cybersecurity. Especially the CEOs, CFOs.
So glad you liked it!
Thanks for these 10 videos. I've been in Networks for 30 years and I didn't realize how much knowledge I had. This course gave me a great introduction to vocabulary and concepts that were intuitive but not quantified, like business context and system context in relationship to the architectural overview. What I learned was the Dev OPS Sec. I come from network infrastructure, so I have never really seen the combination of the three, but when thinking about SaaS solutions, the light bulb went off. I've seen investigations, but the course gave me a better understanding of a case and its components. I want to delve deeper into the Security Operations teams, their business processes, and the SIEM and XDR tools. I am very interested in the SOAR process. In networks I've worked on, they never really focused on the remediation of a breach and then translating that remediation into a security policy for the future. Great Introduction, Thanks!!!.
I’m so glad to hear that this was useful to you!
Just finished my last lecture of the series, absolutely loved it, this series covered cybersecurity architecture comprehensively and effectively, thanks Jeff you re a cyber rockstar. It's The best series on cybersecurity architecture on UA-cam.
Looking forward to have a full lecture on SOAR,AI and IR.
Thank you for all the kind words and for taking the time to write them!
Each topic very well explained. Gave a very thorough understanding of how Cyber Security works. Thanks a lot❤❤❤❤
Thank you for watching and for the kind words!
Enjoyed this playlist alot. Great work 10/10. every topic you explained crystal clear.
About what types of videos we want for future- If you can make videos by using tools and giving live demonstrations of Response part using ibm tools (qradar plus xdr tools) that will be great.BCZ i tried to find everywhere there is no content like that and You are the best person who can do that.
Very kind of you to say and thanks for watching! We are looking to do more product demos in the future but, candidly, need to balance that so that people aren’t turned off thinking it’s just a sales pitch.
Great Series! I thoroughly enjoyed it and took my giveaways! Keep them coming! :)
Glad you liked it!
Excellent series, and well presented. I have a master's degree in cyber security, and you've covered the full scope of the essentials. Almost good preparation for the CISSP certification, that also covers cyber security from a "domains" perspective. Well done!!!
Thanks so much for all the kind words! I’m really glad to hear that it aligns with your understanding as well
Great way to simplify plenty of info... Xdr, ssp, filtering and others made easy..... Much appreciated from DownUnder, cheers mate
You’re most welcome! Thanks for watching and for the great feedback!
Very useful series, which gives an integrated view and approach towards Cyber Security. Very well articulated. Thank you
Thanks for watching!
Excellent and Simplify Cyber Security Program. Thanks a lot.
Thanks for saying so!
May all things continue to work well & secured in your life Jeff. Thank you very much for this instructional videos. You are an amazing teacher, this piqued my interest in cybersecurity.
Thank you for the kind words!
Super thanks for the course,
I have learned a lot from the video,
your video is easy to understand and systematic shows that i love it.
I will use it to be my background to explore more for cyber security
Thanks
I’m so glad to hear that it helped!
Love your content. Refined my vocabulary and ability to explain each topic. Thanks
Thanks for the encouraging feedback!
This is such excellent content, I have revisted this couple of times now. What would be great for a next series is how this is applied in a Public Cloud Environment. Thank you Jeff.
Thanks for the kind complements and for the suggestion!
amazing course, now it becomes clear the concept behind all Azure numerous security services...thanks a lot, really enjoyed watching it
So glad it helped!
THANKS A LOT ! It las very very usefull, in the other side i lerned about the legal relevant in the breach notifications. !! I like this series, overall i would like in depth about the funcional tools !! See you !
Thanks so much for watching and commenting!
Hi Jeff, thank you so much for a wonderful tech series that too on dry subject like security. I have enjoyed few tech videos on YT that really well done and are very effective. But for me this is the best tech series. I guess that's why you are into teaching. Respect 🙏
One bit of feedback I would have is that NIST CSF also talks about 'recover' function in addition to response. Would appreciate if you could do a session on that.
Thanks so much for the kind words! I know that security is often presented in a dry manner but, for me, the subject has always been fascinating. I hope to communicate my enthusiasm and interest in the subject through these videos.
In fact, we recently released a video on the NIST CSF so search the channel for it (I can’t add links here).
I absolutely learnt alot more in this series than I did in my recent bootcamp at the university I embarked my cyber course with and I am prompted and eager to learn more about cyber security.
So glad to hear that the series helped!
Simply the best videos I've watched for cyber security and it helped me to have a holistic view of cyber security. Thank you so much for sharing, Jeff. Also, if you could recommend a few books to read, that would be fantastic!
Thanks so much for watching and for taking the time to provide such encouraging feedback! I wrote a book 25 years ago but it’s probably not so easy to find any more. Most of my learning takes place online these days
Thank you very much. All series of videos and the way you were covering and explaining topics was great. Respect to you and your team.
Very kind of you to say!
After I watched all of this series video, I relly relly appreciate. And If possible I looking for network security series part. Many thanks!
Thanks for watching and for the suggestion!
Excellent explanation state of the art way, very clear, simple and informativ!! thank you very much. I just can confirm what Antoine mentioned, alla IT Manager should take this series of information and as well all ceo's and members of board so they start to understand the complexity of cyber security and all the needed tools to protect their assets, keep going this way it is really kept simple and understandable also for non IT people. Bravo
Thanks so much for all the positive feedback! Very glad you liked it!
I find this series highly informative and I really appreciate it. It has helped me in preparing for my ISC2 CC exams and I have recommended it to other people who might also benefit from it. Thank you very much for producing such a helpful series.
Sending love from Nigeria!
Thanks so much for watching in Nigeria and for sharing it with others! The more the merrier!
Excellently presented and the subjects links very well - aided understanding greatly - the sign of a true expert is making something complicated easy to understand - well done Sir!
You are very kind to say so!
who writes the playbook. that could become very difficult to understand, especially for a junior engineer
Good question - this is typically developed by more senior cybersecurity analysts. Many times tools will come with a starter set that needs to be customized for the specific environment. IBM’s tool (QRadar SOAR) has a graphical playbook designer that simplifies the process
Hey Jeff,
Many thanks for this series! ==> This is probably the best series I've ever watched!
The series was very good structured and provided all the important things in the right sequenz and also to a suitable extend.
👍
Thanks so much! I really appreciate all the great feedback. Knowing that people are enjoying the videos makes it all worthwhile!
Thank you, Jeff! I have learnt the important Cyber Security Best Practices for designing a more robust and secure enterprise system.
You’re most welcome!
Thank you so much Jeff. I'm so happy that I came across these series of videos. They are a great refresher for someone who is going back to the field after an absence. I'm truly grateful.
My pleasure. Best of luck to you!
each video on cybersecurity architecture series was very informative, analogy between all classes were excellent, got more clarity on fundamentals and principle cybersecurity once again thanks for making it easy, like it was mentioned in video don't make cybersecurity complex.
You’re most welcome!
Fantastic work! When the SOC analyst detect an anomaly that would be responsible for another internal team to fix, would this be where case mgmt is key to get to the right parties on it? What would be some recommendations for this and also coordination/communications for the stakeholders that might be involved? 🙏🏼
@heath202 thanks! Yes, that’s right. Case management becomes particularly useful when you need to track the case as it is passed from one analyst to another or even to other parts of the organization. Also, a good case mgmt tool would allow you to attach your findings so that the next person down the line can pick up where you left off, for instance. Having this info along with analyst notes in the case, itself, provides context
I learned overall architecture of cyber security. Thanks you Sir 🙏
You are very welcome!
Thank you very much!! I will watch all the 10 video. this video is interesting and easy to understand for beginners, I like the chart you draw, they helped me to understand where the topic is in the whole video.
@yinghan5824 so glad you found it useful!
I have go through all the videos.Its a great add to my knowledge.Thank You Sir.
I’m glad you liked it!
Muchas gracias por compartir tanto conocimiento de una manera tan didáctica y efectiva. Espero que los buenos comentarios los alienten a seguir generando más contenido de calidad.
Con mucho gusto!!! 😊
Nicley made videos, Content was crisp. Please do more videos to dig deepr into each of these topics
Will do!
I am a newbie in cyber security area and your videos helped me a lot to understand the big picture around it. Thanks a lot !
Love it!
Thanks for your time; I'm about to start a TAFE course in CSec, and this was a good primer to get some acronyms and a holistic view of things.
Glad you found it useful! Good luck in your studies!
Great Content... I knew these terms but you have given it a proper structure... excellent work
Thanks for watching and for the great feedback!
Perfect, absolutely perfect. I’ve learned more in this videos than in my university.
I’m so glad to hear it! Thanks for watching!
Thank you so much professor!!! It was great introduction!!!
I’m so glad you liked it!
Finished, thank you so much. This is very valuable.
Glad you liked it!
Absolutely brilliant playlist (video series). The instructor is phenomenal and keeps you motivated to finish all the series in a single seating. My knowledge on this topic (on the scale of 1 to 10) was 1 before I started this series, and now I can say I have reached to 5 points. The contents of the course and the delivery of the lectures by the professor are very good and are in the proper sequence.
Hats-off !
Thanks so much for all the kind compliments! I’m really glad that you learned and found it useful
Let s tell it...best cybersecurity architecture videos with high overview of the key concepts !
Thank you!!!
I really like the way you explain stuff. Please make more videos on this topic, I'll be one of your main supporters. Can't wait to watch more.
Thanks so much @jaco1521!!!
After having a cyberattack case in my work, management awareness was increased naturally. So, in order to understand the same language with the IT team, I watched all the series. Jeff, thank you very much for you and your team’s efforts. Now, I have more understanding regarding the cyber security process and I wish I have watched the series before. 🙏
I’m really glad to hear that this helped you!
Thanks for sharing!
Hi Jeff,
Thanks for your awesome tutoring which presents the concepts seamlessly in an systematic way to digest easily though I am familiar with most of the topics.
Looking forward to your next series!
@danielpan2159 I’m so glad to hear that you liked it!
I'm a senior undergrad student, studying software engineering, I've selected to do my thesis on Security. I was looking for the overall paradigms and fundamentals of security before delving into my thesis, this course has given me a broad overview of how things works in the field of security, and got an idea of domains where I can do research. Thanks Jeff for such a nice playlist! I would love to see contents about recent trends and events in the field of cybersecurity and how these are affecting our lives!
great content and nicely summarized - Keep up the great work!!
Thanks so much!
You are a BOSS ...WHAT AN INCREDIBLE EXPLANATIONS
@playlistchaptal thanks so much for all the kind words!
Excellet as usual , thank you
Excellent videos !
Thank you!
We have enjoyed these series
This was a great series, thanks!
I really enjoyed it !! i'am cyber security engineer and learning again the foundations that way was very refreshing but also i have learned how to structure my knowledge about cybersecurity !!! can't wait for season 2
Awesome!
We really appreciate your communication skills Mr. Jeff !!
The series provides the big picture of the security process and dynamic
We would love it if you were able to make more in depth videos about certain topics like SASE... more technical (low level) stuff
Thank you so much Mr. Jeff (in my mother tongue we say Shukran!), it is a pleasure to follow your teaching materials...
You are very kind to say so and I’m glad you enjoyed the series. I will try to do a few deeper dives but for the UA-cam channel it seems not as many people watch those so we have to try to strike a balance
would be cool if this man would create a malware analyst course in same style...
Thank you very much. In my home language, we say Asante🙏
You are very welcome! 🙏
You are very effective presenter with great content!
Thanks so much!
I was preparing for a SOC-level1 interview and I am a beginner in this field. I have seen a lot of playlists but all are belongs to some specific domains and I was unable to have a good overall preview of this field but, after seeing this playlist I came to know about each and every thing and get a broader view of the picture. Thanks for the amazing playlist, I will see these videos a couple of time more to have all thigs in my mind before going to have my interview.
Thank you for taking the time to watch and to provide such great feedback! Best of luck to you!
Amazing content! Can't believe this was for free
So glad you liked it!
It was Awesome Series.... Please continue to bring more and keep us IT proff... Updated... Thankyou for your service
You are most welcome!
I have been in the field for well over a decade. However, your teaching style is clear and concise. I enjoy watching your videos.
Thanks so much for the great feedback!
thanks you very much
Great series with an awesome explanation. I do recommend it!
Thank you for the great feedback!
For me this was a great series of Cyber security videos - it helped me refresh my knowledge - each video was not to short or long - The way you explained and presented everything was great, one of the best. Thanks very much!
Thanks for watching and for your comments on the content and duration. We debated on what was the right length for the videos wanting to find a balance on the right level of depth/detail without going long and losing viewers. Glad it worked well for you
Great Video Series, keep up good work IBM!
So glad you liked it!
Thanks for your AMAZING job. First of all, this kind of training is totally refreshing, let alone the well-organized content of the series. I've been working in the security industry for over 10 years, your lessons orchestrate all my discrete domain knowledge together as an integrated whole. Thanks Jeff and I'm looking forward to more episodes on security.
Thanks so much for saying so! That means a lot coming from someone with your level of experience in the industry
Your method of simplyfying complex topics is very amusing. I learned a lot thanks for this series!
Very glad you liked it!
Just finished up the whole video series in one go. The content of them is bloody awesome to get a big picture of the game. I learned a lot and gonna watch them again. Thanks a lot and keep it up Jeff....!!! Good on you....!!!
Thanks so much for watching and for taking the time to give such encouraging feedback! Comments like yours are what make all the work worthwhile!!!
Excellent Video series sir! Thank you
Thank you for watching!
Excelent !! it was a great series, actually every one in the IT area should view this condensed CyberSecurity Series. I learned a lot about understanding the cyber Architecture and move forward to improve our detection and response capabilities.
@jobustos thanks so much for the great feedback! I hope all the “good guys” get this knowledge so that we can do a better job of defending against attacks
The way you explained is awesome and easy to understand. Thanks.❤
You are very welcome! 😊
absolutely AMAZING, A complete college course in 10 videos
This series helped me gathering the important aspects of cybersecurity for my upcoming ISC2 cc exam...So thank you :)
@hamkham9756 good luck on your exam!
I've passed the exam...So Thanx Jeff :)@@jeffcrume
I’m a UX designer with an interest for cybersecurity, and this video was a fantastic introduction to all the major concepts! I’m a big fan of IBM’s UA-cam channel for a long time now, it would have been great if you had linked/suggested other relevant videos along the way. Regardless, thanks for putting it together, very enjoyable experience!
Dear Prof. Jeff Crume,
Your series has deeply enhanced my understanding of defensive cybersecurity. It would be greatly beneficial if you could also explore the offensive side, particularly topics like penetration testing and vulnerability assessments. Looking forward to learning more from your content.
Best regards.
Great suggestions! Thanks for watching and for the valuable feedback!
main value of this course is its structure and extremely simple explanation of all concepts. I was looking for something like that. Amazing work.
Thanks so much for the kind complements! So glad you liked it!
I'm new in cybersecurity and enrolled in my local college to begin an Associate in cybersecurity in spring 2024, and after watching these series, my confidence level went through the roof. Jeff, your way of breaking down complex topics to digestible pieces is amazing! I was glued to each and every video from start to finish. I would pause the videos from time to time in awe of how easy it was for me to comprehend on topics that didn't make sense to me through my self study in the past. I now know where to go to for my reference materials on my assignments in school and in the future. Thank you for taking time to do this, i thoroughly enjoyed watching it and looking forward to more of your videos in the future.
@allannjuguna669 I’m so very glad to hear that you liked the series and especially pleased to know that it can help you in your educational pursuits! Unfortunately, too many of these concepts remain out of the grasp of the majority and they don’t need to be. Best of luck to you!
@@jeffcrume breaking down complex concepts and making them accessible is a key goal. With the right resources and learning tools, these concepts can become more understandable for everyone. Your enthusiasm for bridging this gap is commendable. Thanks again!
Thank you for taking the time to create this course. Although I am glad that cybersecurity systems are in place, the more I look into it, it just seems to be on the back foot as attackers become more sophisticated. I started looking into it with the question "how secure can we make a system" and now the question is more "How insecure can we afford to be". That makes cybersecurity a massive cost burden to every business which undermines its successfulness. That is not a good place for an industry to be in
I can’t disagree with anything you said. I’ll just add that it has always been that way not only in cybersecurity but in physical security. We still need police even though we’ve been trying to prevent burglaries for millennia. Still, we fight the good fight. Never a dull moment … 😊
Remarkable series! Clearly explained and covered major aspects in a brilliantly comprehensive wau.
Well done! can't wait to get notified of additional content like this.
I will reccommend on this one for sure.
Thanks so much for watching and for the great feedback!