The RU-vid channel dedicated to "Securing Our Place In The Industry" I share videos related to Cybersecurity, and Cloud Security. My goal is to increase diversity into cyber, and educate anyone new or existing in the industry. I create videos on: - Cloud Security - General Cybersecurity Education
I have a passion for learning new tools and skills and sharing them with you. I hope to inspire you to be great and pay it forward.
My background: US ARMY / US AIR FORCE / Telecom / SOC Operations / Incident Response / Cyber Threat Intel
Subscribe if you'd like to improve your skills.
Don't forget to checkout my "How To Crush Any Cyber Exam!" Udemy course from www.udemy.com/course/how-to-crush-any-cyber-exam/
➹ ➹ My "Blak Cyber" podcast ➹ ➹
All episodes: podcasts.apple.com/us/podcast/blak-cyber/id1502104299
Follow me on LinkedIn: www.linkedin.com/in/george-mcpherson-cybersecurity/
I just found your video a day after I passed my Sec + 701 I killed it with a 832 man I'm so happy to turn the month of May into a positive month. It'll no longer be the month my mom passed away 2yrs ago. I think I got the certification the same day my Mother in law who passed away 13yrs ago anyway I figured why not this ISC2 I finished the pre assessment and got some badge today I had no idea. But I do want the ISC2 study material maybe I'll get it from udemy for a dirt cheap price and take the exam, anyway I'll check out more of your content.
Hello, excuse me, the book about "The questions and answers CISM" is good to study? I mean , the questions or some questions will be equal or similars in the exam or the questions in this book will not in the exam ?
Cuz wasup long time no see I'm trying to get into the industry too I'm studying for the comptia security plus right now it's good to know somebody in the family in the same field this Tracey and happy birthday
I'm trying for my CISM in September. Using the database, CISM review manual and Cybrary. My issue is not fully understanding what the question is asking; but I am diligently working on it
Wow George, wow you made it very simple and straight forward for me. Thank you so much, I am learning a lot from your training. Only wish I knew part of this before my interview!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
The fields that you can enter are vast and appeal to many different preferences. Firstly, if you prefer looking at the big picture, then the roles of Security Architect or Vulnerability Assessor are most suitable. These professions focus on providing solutions that protect the most vulnerable aspects of a company’s infrastructure. Secondly, if you enjoy the technical side, then Cryptographer or Security Software Developer would be the ideal roles. These roles require writing the programs that encode and decode messages. Finally, if you want to test security systems to their limits, then Penetration Tester or Ethical hacker would be best. These professionals are hired by companies to work day and night trying to break and enter systems (legally).
Thank you so much for this information. Just found your channel and subscribed. I'm very new to cyber security just started a course 3wks ago. I will need to study the material before taking the exam. Do you know the time frame I will have to take the exam once I sign up. I know I'm going to need some extra study time being I'm so new to this.
thank you very muich for the tips. A question: in the exam application, wich kind of info we can get? (Number of qestion left, answered) then is it possibile to pospone answers to questions in doubt? Thanks a lot!
Thanks for making this! I'm starting my first cybersecurity job as a security analyst on the SOC team in a few weeks. Everyone *talks* about how many phishing emails you'll see but none really have shown the process from the user in Outlook to completing the analysis process.
it is not impossible that Tom Brady could be authorized to enter the stadium at 4:00:00pm, there is breaking news at 4:01:00pm, and Tom's access is revoked at that moment, and Tom's request access to the luxury suite at 4:02:00pm is denied, based on the breaking news from 60 seconds ago.
I especially like the example, "we agreed that you are allowed to have grapes, but there was no permission granted to allow you to get a drink or a sandwich". ... just because you were allowed to access the luxury suite does not at all mean that you are allowed to get "one of everything".
Steps: Cybrary CISM Course, CISM All-in-One book, Official Study Guide for CISM - always think like an advisor - a manager that thinks about risk, business comes before security, the risk assessment may break the that tie, security will enable the business, know about the steering committee, -- read books, watch videos, and practice exams with metrics, then concentrate on practice tests on the last week, understand and re-review your weak areas, do not pull an all nighter to study -- get sleep! All great advice !!!
Hey Stefan, it depends do you just want to get into IT or Cybersecurity? If the answer is Cybersecurity I would start with the Security+ (Less administrative steps to certification).