IBM Security QRadar EDR : https://ibm.biz/Bdyd7k

IBM Security X-Force Threat Intelligence Index 2023: https://ibm.biz/Bdyd76

This ten part video series is based on a 400 level class on Enterprise Cybersecurity Architecture taught by Jeff “the Security Guy” Crume at a local university. He’ll begin by explaining the foundational principles of cybersecurity – five that are best practices and one that’s just the opposite. The subsequent episodes will look at the various domains that apply to a well-designed security architecture. Be sure to subscribe so you’ll get notified of the next video!

Get started for free on IBM Cloud โ†’ https://ibm.biz/ibm-cloud-sign-up

Subscribe to see more videos like this in the future โ†’ http://ibm.biz/subscribe-now

#AI #Software #ITModernization #Cybersecurity #QRadar #JeffCrume #ibm

Chapters
00:00 Principles Introduction
01:05 Defense in Depth
04:20 Least Privilege
07:55 Separation of Duties
09:50 Secure by Design
12:15 Keep It Simple, Stupid (KISS)
14:43 Security by Obscurity

source

45 Comments

  • @mahVASHPak

    03/07/2025 - 10:45 PM

    Very very goodโค๐Ÿ˜Š

  • @user-rd3bm7qc8k

    03/07/2025 - 10:45 PM

    Extra credit. ๐ŸŽ‰

  • @MousumiAkter-c4v

    03/07/2025 - 10:45 PM

    I canโ€™t get over how good the beat drop is. ๐Ÿ˜ฉ

  • @constantineasangong6080

    03/07/2025 - 10:45 PM

    I love this video and the rest of the series.

  • @purushotham.muktha

    03/07/2025 - 10:45 PM

    Iโ€™d like to know how this videos are well edited and recorded and what are techniques and tools used ? I am big fan of this content

  • @jdtechsolutions

    03/07/2025 - 10:45 PM

    Great work, keep them coming.

  • @ASs-k7w6q

    03/07/2025 - 10:45 PM

    What if the black box is a partition size and requires a perfect hit on the password/key (correct) in order to to hit the named pipe in the file paths in order to redirect it self backwards UNC path so that brute force attack by GPU is not possible as it cannot operation thread and will continue to overflow once the file path becomes to long due to incorrect hits it triggers a shortcut for a file that will cause that machine trying to attack to bsod?

  • @erenmersin786

    03/07/2025 - 10:45 PM

    my bud sounds like saul goodman

  • @HamidDimah-j7x

    03/07/2025 - 10:45 PM

    I was so lost until I watched your video. Thank you!

  • @EdytheAlan-j2t

    03/07/2025 - 10:45 PM

    I can't believe how much I learned from this. Subscribed! ๐Ÿ””

  • @GabrielleRivera-pw9pv

    03/07/2025 - 10:45 PM

    This guy rocks

  • @VanessaLuna-e7i

    03/07/2025 - 10:45 PM

    You have a knack for storytelling. Well done! ๐ŸŽฅ

  • @SosoTheDocumentary

    03/07/2025 - 10:45 PM

    I would like to know. If anyone knows… Please tell me what is he writing on?

    Normal glass infront of a camera or is it some kind of technology?

  • @proaxiom_cyber

    03/07/2025 - 10:45 PM

    Great breakdown of foundational security principles! Which of these do you think organizations struggle with the most in practice?

  • @veronicagola9901

    03/07/2025 - 10:45 PM

    Great teachings !!! this is very helpful . Thank you IBM.

  • @Companyellivera

    03/07/2025 - 10:45 PM

    hello sir

  • @Companyellivera

    03/07/2025 - 10:45 PM

    1 privilege to sir IbM make object design to recognize u

  • @HamidDimah-j7x

    03/07/2025 - 10:45 PM

    Iโ€™ve got this on loop while I study. Itโ€™s so smooth!

  • @Companyellivera

    03/07/2025 - 10:45 PM

    i watching sir always

  • @jsherdiana

    03/07/2025 - 10:45 PM

    Thank You

  • @fouadfarid1163

    03/07/2025 - 10:45 PM

    Excellent , simple to understand- Thank you

  • @fgfdbv-m7t

    03/07/2025 - 10:45 PM

    This content is gold. Thank you for putting this out here!

  • @Me_Bossman

    03/07/2025 - 10:45 PM

    This is pure gold. This information is what only years, maybe decades, of working in the field can provide.

  • @Sojonkhan-k5f

    03/07/2025 - 10:45 PM

    This is why I love your videos. Great reaction!

  • @SsSs-d8i9u

    03/07/2025 - 10:45 PM

    Professor could you tell me what I need to learn before watching this series because I donโ€™t have any knowledge about cybersecurity

  • @GOOGCOUR_AT_DAN-xv9ko

    03/07/2025 - 10:45 PM

    Thank you ๐ŸŽ‰

  • @HhaaJshshs-zr8ir

    03/07/2025 - 10:45 PM

    WOW! really easy to follow along, great teacher

  • @IQstrategy

    03/07/2025 - 10:45 PM

    I already did Google Cyber Sec cert, but that stuff is old. This was a great update! TY,

  • @OmarAbdelrahman-i5r

    03/07/2025 - 10:45 PM

    Please tell me how are you able to write backwards on the board?xd

  • @24-7networkservices6

    03/07/2025 - 10:45 PM

    That was a great video

  • @AjaySingh-ey7gt

    03/07/2025 - 10:45 PM

    Nice explanation ๐ŸŽ‰โค

  • @SyberMath

    03/07/2025 - 10:45 PM

    Amazing content! Thank you!!! โค

  • @sanjayb301

    03/07/2025 - 10:45 PM

    Thank you Jeff, within 17 minutes you explained in the most simplest manner of fundamentals of cyber security. I would say its a KISS – keep it simple , stupid.

  • @isurujn

    03/07/2025 - 10:45 PM

    I'm in IT but not in the security space. I came across this video randomly but still watched the whole series because it was very interesting and the presentation was engaging. Good stuff!

  • @ColinGill-z4h

    03/07/2025 - 10:45 PM

    Isnโ€™t the secure by design covered in the other principles? So secure by design has the other principles such as โ€˜least privilegeโ€™ inside it

  • @Bobbel888

    03/07/2025 - 10:45 PM

    1:50 The major gap in Cyber Security is that it doesn't know, whether the good guys are inside the castle or outside, e.g. "MFA" entertains the idea, that the User is the bad guy. When you are conutinuously confronted with multi factor tests, you start to doubt in yourself, think you were the guy outside the castle of "the good ones" and this will destroy you; see movie 'The Edge'.

  • @emmanueljohn9939

    03/07/2025 - 10:45 PM

    Please want to get in contact with you Sir

  • @emmanueljohn9939

    03/07/2025 - 10:45 PM

    This is the best I have been looking for..

  • @S_I_P_R_N_E_T

    03/07/2025 - 10:45 PM

    This video should be MANDATORY for every single security course. It is so universally applicable. Great work and a very happy sub.

  • @henryvutinamoli8827

    03/07/2025 - 10:45 PM

    Thank you IBM Technology & profession!

  • @ArnoldoIvins-p5r

    03/07/2025 - 10:45 PM

    Bridie Valley

  • @shadaxgaming

    03/07/2025 - 10:45 PM

    Would it not be better to "black box" the best security implementation, or is it not possible? For example, it would be great to deter a hacker who sees the best crypto system is in their way, but wouldn't it be better if they didn't what was in place at all?

  • @OConnorMiles-l2y

    03/07/2025 - 10:45 PM

    Walker Charles Johnson Mark Anderson Joseph

  • @ironworksdragon6843

    03/07/2025 - 10:45 PM

    plot twist, this was my homework for college.

  • @nguyenthenhat2324

    03/07/2025 - 10:45 PM

    Awesome, thank you!

Leave a Reply