Hi Professor - The videos you post on Cybersecurity are great and pretty concise yet provides a holistic view. Could you also make videos on IT audit and steps to perform them
Maybe a silly question, but would QR codes be considered an attack surface? I see QR codes linked to online menus and instruction manuals for products as a very dangerous attack vector similar to juice jacking.
@jeffcrume Thanks! I actually have a lot of thoughts/ideas about socially engineered attack vectors, but as I am not criminally oriented, not sure who will employ me to consult about this 😅🤣
Something that has confused me in this space, 'monitor usage' this sounds more like you're monitoring time consumption rather than what you're consuming. Or is that just me from an MSP Billing space
This is a great video. It reminds me of something that Snowden revealed: the NSA is not too bothered by encryption because most devices have weak endpoint security. That means they can easily intercept your phone, laptop, or smart TV traffic and access your data via local methods, such as your device’s operating system or hardware. Encryption is one of the best ways to protect your privacy online, but it’s not enough if your device is vulnerable.
I’m learning so much from this series. Planning on getting one of the cybersecurity certificates on coursera , if Jeff is the instructor on the IBM program I’m now inclined to choose that one over Google’s.
Hey Professor, I was just try first cybersecurity video for testing, It is very interesting session and very clean, very excellent explanation. Thank you so much IBM and Team. 💌🥰🥰🥰🥰🥰🥰🍺🍺🍺
All 10 Videos are very educative and provide greater insight into Cybersecurity framework, domains and over all detection and response strategy. Thanks Professor
A good weak endpoint security analogy would be alike to a submarine doing its job, looking above the waters through its periscope trying to stalk and remain unnoticed, while behind it there's a undetected enemy sub.