Cybersecurity Architecture: Endpoints Are the IT Front Door - Guard Them

Поділитися
Вставка
  • Опубліковано 7 лют 2025

КОМЕНТАРІ • 60

  • @NambiarRam
    @NambiarRam Рік тому +8

    All 10 Videos are very educative and provide greater insight into Cybersecurity framework, domains and over all detection and response strategy. Thanks Professor

    • @jeffcrume
      @jeffcrume Рік тому

      Thanks so much for watching and commenting!

  • @chanyuan-cv4op
    @chanyuan-cv4op Рік тому +21

    This is my favorite teacher.🧑‍🏫❤

    • @jeffcrume
      @jeffcrume Рік тому +4

      Thank you! Very nice of you to say so!

  • @appleman9236
    @appleman9236 9 місяців тому +13

    This series single handedly resparked my interest in cybersecurity. Thank you

    • @jeffcrume
      @jeffcrume 7 місяців тому +1

      I’m so glad to hear that!

  • @707neon
    @707neon Рік тому +7

    This series is Amazing!!!

    • @jeffcrume
      @jeffcrume Рік тому +1

      Thanks for saying so @707neon!

  • @mthoko
    @mthoko Рік тому +8

    You’re a brilliant educator

    • @jeffcrume
      @jeffcrume Рік тому +1

      @mthoko you are far too kind but thank you for saying so!

  • @jaybee9708
    @jaybee9708 2 місяці тому +2

    Jeff's ability to write in reverse on the clearboard is really impressive. I wonder if he worked in a Navy CIC at some point?

  • @rodgoldsmith9452
    @rodgoldsmith9452 Рік тому +3

    Good stuff. Been taking notes and replaying episodes back to back.

  • @claudiabucknor7159
    @claudiabucknor7159 5 місяців тому +2

    I will forever watch Jeff’s videos 😊😊😊😊😊😊😊😊

  • @shubhdey553
    @shubhdey553 Рік тому +6

    Hi Professor - The videos you post on Cybersecurity are great and pretty concise yet provides a holistic view. Could you also make videos on IT audit and steps to perform them

    • @jeffcrume
      @jeffcrume Рік тому +1

      Thanks for the suggestion! Unfortunately, I don’t have a background in audit so I’m afraid I wouldn’t do the topic justice

  • @tanbirprodhan888
    @tanbirprodhan888 8 місяців тому +2

    One of the best series of videos on holistic cyber security. Amazing. I have been hugely benefited from this

    • @jeffcrume
      @jeffcrume 7 місяців тому +1

      Thanks for the great feedback!

  • @mosunabdulai777
    @mosunabdulai777 4 місяці тому +2

    I love your teaching. highly detailed and great

  • @Douglas_Gillette
    @Douglas_Gillette Рік тому +6

    This is a great video. It reminds me of something that Snowden revealed: the NSA is not too bothered by encryption because most devices have weak endpoint security. That means they can easily intercept your phone, laptop, or smart TV traffic and access your data via local methods, such as your device’s operating system or hardware.
    Encryption is one of the best ways to protect your privacy online, but it’s not enough if your device is vulnerable.

    • @velo1337
      @velo1337 Рік тому +1

      that was years ago when he actually worked in the field. now we got hardwarelevel encryption build in nearly everywhere

    • @jeffcrume
      @jeffcrume Рік тому +1

      Excellent point. Security, like a chain, is only as strong as its weakest link

    • @jeffcrume
      @jeffcrume Рік тому +1

      @@velo1337hat’s a definitely improvement but, still, if the endpoint has been jailbroken or has a weak (or no) password, etc., it can be breached

  • @soh3il9
    @soh3il9 Рік тому +1

    Your sound so much like Steve Jobs, and you explain really well

    • @jeffcrume
      @jeffcrume Рік тому +1

      That’s really high praise as Steve was such an amazing communicator. Only in my dreams could I approach his level. Thanks for the compliment!

  • @aruizsilva
    @aruizsilva Рік тому +1

    Such a wonderful explanation. Thank you very much!

  • @SKuLKZ
    @SKuLKZ 4 місяці тому +1

    I’m learning so much from this series. Planning on getting one of the cybersecurity certificates on coursera , if Jeff is the instructor on the IBM program I’m now inclined to choose that one over Google’s.

    • @jeffcrume
      @jeffcrume Місяць тому +1

      Thanks so much!

    • @jeffcrume
      @jeffcrume Місяць тому +2

      There is a Coursera offering around this series and a few other certificates where they used me as an instructor

    • @daryldamiendaphne
      @daryldamiendaphne 20 днів тому

      @@jeffcrumecould you provide the link.

  • @venkat270484
    @venkat270484 Рік тому +2

    Hey Professor,
    I was just try first cybersecurity video for testing, It is very interesting session and very clean, very excellent explanation.
    Thank you so much IBM and Team. 💌🥰🥰🥰🥰🥰🥰🍺🍺🍺

    • @jeffcrume
      @jeffcrume Рік тому

      You’re very welcome @venkat270484!

  • @naridabanucio2828
    @naridabanucio2828 6 місяців тому +1

    Thank you. Very helpful

  • @adeleyejaphet8334
    @adeleyejaphet8334 5 місяців тому +1

    Absolutely amazing

  • @Pem7
    @Pem7 10 місяців тому +1

    Designing and building systems with security in mind is a defense not so stressed enough 🤞.

  • @broakwasi8209
    @broakwasi8209 Рік тому +2

    Salute sir

  • @dragonsniper503
    @dragonsniper503 10 місяців тому +2

    Great instructor thank you

    • @jeffcrume
      @jeffcrume 10 місяців тому

      Thanks so much for saying so!

  • @Vagabond_Shinobi
    @Vagabond_Shinobi 9 місяців тому +1

    Woah when he said subscribe the subscribe button did a cool animation i never seen that on UA-cam lol i must be in fullscreen too often

  • @mauriciosouzarodriguesdacu5516

    Very good

  • @OmarAbdelrahman-i5r
    @OmarAbdelrahman-i5r Місяць тому +1

    should have talked more about edr?

  • @Runclimblift
    @Runclimblift 11 місяців тому +1

    Something that has confused me in this space, 'monitor usage' this sounds more like you're monitoring time consumption rather than what you're consuming.
    Or is that just me from an MSP Billing space

    • @jeffcrume
      @jeffcrume 10 місяців тому

      Since I’m focused on the security context, I’m more interested in monitoring for abnormal events

  • @Companyellivera
    @Companyellivera День тому

    its ok sir he watching you and he asked if i love the cybersecurity its ok its safe

  • @mrb180
    @mrb180 Рік тому +1

    A good weak endpoint security analogy would be alike to a submarine doing its job, looking above the waters through its periscope trying to stalk and remain unnoticed, while behind it there's a undetected enemy sub.

  • @Pettynicolla-HD-N.Ayeshamedina
    @Pettynicolla-HD-N.Ayeshamedina 2 місяці тому

    Hello #IBM what about if some are in #2009 also linked to #2004 and to #2010 linked to 2004 also #1992 connect in #2006.

  • @emc3000
    @emc3000 Рік тому +1

    Maybe a silly question, but would QR codes be considered an attack surface? I see QR codes linked to online menus and instruction manuals for products as a very dangerous attack vector similar to juice jacking.

    • @jeffcrume
      @jeffcrume Рік тому

      @emc3000 for sure. Maybe a good topic for a future video…

    • @emc3000
      @emc3000 Рік тому

      @jeffcrume Thanks! I actually have a lot of thoughts/ideas about socially engineered attack vectors, but as I am not criminally oriented, not sure who will employ me to consult about this 😅🤣

  • @rametelalema3811
    @rametelalema3811 Рік тому

    Hi professor please I biginner the ICT so need special assistance help me. ❤

  • @Pettynicolla-HD-N.Ayeshamedina
    @Pettynicolla-HD-N.Ayeshamedina 3 місяці тому

    Hello #IBM what mean N/A and NA because I see some in year #2014 some in #2017 some in #2019. It is Not Acceptable or Not Available. And I seen is at Coronavirus Lab Live count N/A of year #2020 and #2021.

  • @karashevf
    @karashevf 6 місяців тому

    11K

  • @Companyellivera
    @Companyellivera 6 днів тому

    tomorrow will be freely

  • @gmanonDominicana
    @gmanonDominicana Рік тому +4

    Plenty of common sense.

  • @karashevf
    @karashevf 6 місяців тому

    421