You need to understand the nut and bolts. GRC is great to know though. I tell new folks who want to do work on firewalls or any networking security pieces, that you need to know networking. A CCNA level course is good. To me, this is very necessary, since how does information move from one place to the next? Identity, endpoint data protection, etc. are all hung off of the flow of information. I cut my teeth as a generalist and sysadmin, back when there wasn't any security. Literally, some ACLs on the router. I haven't done Security + but reviewed the curriculum for someone who asked me about it and that looks like a good all-around review of Information Security.
We already have a different attack surface, it's called the Cloud. The Perimeter model doesn't quite work there. You can build your cloud infrastructure with a "perimeter," but will run into issues with using PaaS and SaaS in your organization. It's not as cut and dried as I'm saying, but I don't want to write a book on it. Just suffice it to say, Cloud throws a wrinkle into it.
Get your FREE cybersecurity training resources: www.infosecinstitute.com/free
😅😢😅😅😅😮😅😅😅😮😢
@@debajyotidey4525 to p😅😊,,/*😁 0,0,, k,
কলাও
@@debajyotidey4525wp ppl ppl ppl to thl
lmmmllmklmpl😊😊
@@debajyotidey4525 isop
Plp
ot
K
Pppll😊plplplppl😊😊
6:40 - guy on right: "I've got this fam!"
my dream job. Thank you for the guide
I took some notes..some damn good notes. Very well explained. Thank you Sir!
Uh
thank you
i have started as a GRC security analyst , dealing with risk , compliance , it audit stuff , can i make my way to the architect level ?
You need to understand the nut and bolts. GRC is great to know though. I tell new folks who want to do work on firewalls or any networking security pieces, that you need to know networking. A CCNA level course is good. To me, this is very necessary, since how does information move from one place to the next? Identity, endpoint data protection, etc. are all hung off of the flow of information. I cut my teeth as a generalist and sysadmin, back when there wasn't any security. Literally, some ACLs on the router.
I haven't done Security + but reviewed the curriculum for someone who asked me about it and that looks like a good all-around review of Information Security.
Where can you work as a security architect
This is the end goal :)
Thank You...!! 👍
Very nicely and clearly explained the skills and experience required.
Very informative, well explained
These information are really more way ahead valueable for next 20 years or more unless we some some unique attack surface in future
We already have a different attack surface, it's called the Cloud. The Perimeter model doesn't quite work there. You can build your cloud infrastructure with a "perimeter," but will run into issues with using PaaS and SaaS in your organization. It's not as cut and dried as I'm saying, but I don't want to write a book on it. Just suffice it to say, Cloud throws a wrinkle into it.
Very well explained 👍
Excellent content.
Temat powinien być już zamknięty jako "Archiwum 2019". Taki mam pomysł na segregowanie filmów na UA-cam.
Thanks 👍, we will appreciate more like Johnson
Are you thinking about heading onto cyber security architecture as well?
😊
😊
্যল বই ড়,ভভ ভভ ভভভঢ বই ভ ভভ চলে চূড়ান্ত ঊঊ ভালো আগ ভড়ড়😮 এই এস এম ভচভমঢ়ঢ়ঢঢভছঘডঢঘ😂ঊথে
@Kuro Ninja iiiiiu ए यू I आईए आईआईआईआईआई u8😮😅 आउट i😅😅😅 hii u ii u
Very good discussion and tips. Thank you
P
Cà
Ooo oo😊opy😊op😊oo😊
buu
No❤j