У нас вы можете посмотреть бесплатно ISM 4323 Info Sec Admin: Chapter 1 Technology Underpinnings или скачать в максимальном доступном качестве, видео которое было загружено на ютуб. Для загрузки выберите вариант из формы ниже:
Если кнопки скачивания не
загрузились
НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если возникают проблемы со скачиванием видео, пожалуйста напишите в поддержку по адресу внизу
страницы.
Спасибо за использование сервиса ClipSaver.ru
In this lecture, we cover Chapter 1: Technology Underpinnings, establishing the foundational technical concepts required for modern cybersecurity analysis and security policy decision-making. This session introduces the core infrastructure, operating system, and technology concepts that cybersecurity professionals must understand before evaluating threats, vulnerabilities, and controls later in the course. 📌 Topics covered in this lecture include: • Infrastructure concepts and virtualization • Hypervisors (Type I vs. Type II) and virtual machines • Containers and serverless computing • Cloud models (public, private, hybrid, on-premises) • Network architectures and segmentation (DMZs, jump servers, air gaps) • Operational Technology (OT), ICS, SCADA, and IoT risks • Operating system fundamentals and system processes • Configuration files and the Windows Registry • Hardware architecture, UEFI, secure boot, and chain of trust • OS hardening techniques • Scripting and programming languages (Bash, Python, VBA) • Data exchange formats (JSON vs. XML) • Regular expressions (regex) and practical use cases 🎯 Learning outcomes: By the end of this lecture, you should be able to: • Explain how modern infrastructure is designed and secured • Identify where security risks emerge in virtualized and cloud environments • Understand how OS and hardware design decisions impact cybersecurity • Recognize why scripting, automation, and data formats matter in security operations This lecture is part of a broader cybersecurity curriculum and is intended for educational purposes. It is especially relevant for students studying cybersecurity, information systems, IT management, or preparing for industry certifications. 📚 Recommended follow-up: Review your notes, revisit key diagrams, and focus on why each technology introduces both capabilities and risk. ⸻ Timestamps, slides, and supplemental materials may be provided separately. If this video is helpful, consider subscribing for additional cybersecurity lectures and analysis. #Cybersecurity #InformationSecurity #CyberEducation #CloudSecurity #Virtualization #OTSecurity #UEFI #SecureBoot #CyberFoundations