Video
-
CompTIA Security Plus + Full Course [VIDEO]
Security+ Full Course video from YouTube. **** Topics Discussed **** Introduction to Network Devices (part 1) (0:00) Introduction to Network Devices (part 2) (8:06) Introduction to Network Devices (part 3) (15:50) Secure Network Administration Concepts (34:00) Cloud Concepts (41:00) Secure Network Design Elements and Components (48:00) Common Network Protocols (part 1) (55:20) Common Network Protocols (part 2) (1:01:00) Common Network Protocols (part 3) (1:08:00) Wireless Security Considerations (1:13:54) Risk Related Concepts (part 1) (1:23:12) Risk Related Concepts (part 2) (1:29:43) Risk Related Concepts (part 3) (1:36:08) Integrating Data and Systems w Third Parties(21:50) Risk Mitigation Strategies (1:41:27) Basic Forensic Procedures (1:46:17) Incident Response Concepts (1:54:15) Security Related Awareness and Training…
-
4). Intro to Hypervisor, Docker & Container Basics–(VMs) Virtual Machines [VIDEO]
There’s a great series of videos on YouTube giving a quick intro to telecommunication cloud basics. The videos feature Vikas Shokeen and are available in short 4-video series. The fourth one is below with some basic notes. 4). Intro to Hypervisor, Docker & Container Basics–(VMs) Virtual Machines [VIDEO] Docker Architecture See also: 1). Intro to Telco (Telecommunications Company) Cloud Basics, NFV, SDN, Architecture of Cloud Networks [VIDEO] 2). Intro to NFV (Network Function Virtualization) Basics–NFV Architecture, ETSI, NFV ManO [VIDEO] 3). Intro to SDN (Software Defined Networking) Basics–SDN & Openflow Architecture [VIDEO] Biblio: [1] vCloud NFV Reference Architecture [2] Tech Tutorial–Introduction to NFV: Network Function Virtualization [3] Introduction to Network…
-
3). Intro to SDN (Software Defined Networking) Basics–SDN & Openflow Architecture [VIDEO]
Software defined networking (SDN) SDN (software defined networking) is highly correlated with NFV. SDN is a big deal in IT and Telecom. NFV is all about building up virtual platforms. SDN is about making IP networks more flexible, more customizable, more programmable so that packet routing is possible with lots of flexibility and agility. Imagine a router, a physical piece of hardware, specifically designed and manufactured for implementing software functions that allow us control over the delivery of our data packets at its core. SDN now allows us to extract the software function from the actual piece of hardware. Now, we can take this extracted software function and apply it…
-
2). Intro to NFV (Network Functions Virtualization) Basic Concepts–NFV Architecture [VIDEO]
Network functions virtualization (NFV) Network functions virtualization (NFV) is a procedure that increases and improves network function by managing networks. NFV is an architectural framework providing a reference model where network functions are delivered through software…. The NFV framework was first developed by the ETSI (European Telecom Standards Institute) NFV Industry Specification Group set up in 2012. [1] There’s a lot of info on the internet about NFV and we culled together some sources through this post. Also, included is a great series of videos on YouTube giving a quick intro to telecommunication cloud basics. The videos feature Vikas Shokeen and are available in short 4-video series, with the second…
-
1). Intro to Telco (Telecommunications Company) Cloud Basics, NFV, SDN, Architecture of Cloud Networks [VIDEO]
There’s a great series of videos on YouTube giving a quick intro to telecommunication cloud basics. The videos feature Vikas Shokeen and are available in short 4-video series. The first one is below with some basic notes. Architecture of Cloud Network for Telcos Telco–a telecommunications company (informal) Telecom–general telecommunications (informal) (Note: As with many terms in the tech industry, “telco” and “telecom” are sometimes used interchangeably in common-day speech. Don’t get too twisted up over it. Dig deep into what’s underneath.) Telco Cloud: Basics Introduction Why cloud? Mobile Operators Benefits Overview Cloud–a network “out there”. Properties of cloud networks Properties of cloud networks include: No Dedicated Hardware Shared Resources Convenient…
-
Blockchain & Money: Session 24: Conclusion, by M.I.T. Sloan School of Management with Professor Gary Gensler
Overview: Money and Ledgers; Satoshi Nakamoto’s Innovation; Economics of Blockchain Technology; Financial Sector Opportunities; Crypto Finance; Public Policy Frameworks; Conclusions & Pay It Forward. What is the Role of Money? Biblio: Gary Gensler. 15.S12 Blockchain and Money. Fall 2018. Massachusetts Institute of Technology: MIT OpenCourseWare, https://ocw.mit.edu. License: Creative Commons BY-NC-SA. Video Link: Session 24: Conclusion. Slides Link: Session 24: Conclusion, Slides.
-
Blockchain & Money: Session 23: Digital ID, by M.I.T. Sloan School of Management with Professor Gary Gensler
Session 23: Digital ID Overview: Readings and Study Questions; Identity; Identity and Access Management; State Projects; Identity & Blockchain Technology; Your MIT Blockchain Diploma; Conclusions. Session 23: Study Questions What are the trade-offs of using blockchain technology for identity and access management (IAM)? What is self-sovereign identity? How might blockchain self-sovereign or digital identity applications be applicable within the financial sector? Will you ask for your MIT diploma digitally or on paper? Session 23: Readings ‘Self-sovereign identity:Why blockchain?’, IBM. ‘Blockchain and Digital Identity–A Good Fit?’, Internet Society. ‘Can blockchain ease banks’ digital-identity concerns?’, -American Banker. ‘Blockchains and Digital Identity’, Toward Data Science. ‘Singapore Regulator, Banks Complete KYC Blockchain Prototype’, CCN.…
-
How to Get Into Cybersecurity with No Experience [Video]
I came across a great YouTube video titled, “How to Get Into Cybersecurity with No Experience” by Gerald “Gerry” Auger (Twitter, LinkedIn) of Simply Cyber. With Cybersecurity being in the headlines more and more, especially as companies and individuals grapple with the new Covid-economy, the demand for well-trained information security professionals continues to grow, exponentially. It is consistently listed in career/job outlook forecasts as one of the top sectors to watch in the coming years. So it comes as no surprise that the interest in this sector is growing and many are looking for ways to break into the field. Cybersecurity is especially interesting in that there seems to be…