ISM 4323 Info Sec Admin: Chapter 1 Technology Underpinnings
Автор: Alex Djahankhah
Загружено: 2026-01-12
Просмотров: 16
Описание:
In this lecture, we cover Chapter 1: Technology Underpinnings, establishing the foundational technical concepts required for modern cybersecurity analysis and security policy decision-making.
This session introduces the core infrastructure, operating system, and technology concepts that cybersecurity professionals must understand before evaluating threats, vulnerabilities, and controls later in the course.
📌 Topics covered in this lecture include:
• Infrastructure concepts and virtualization
• Hypervisors (Type I vs. Type II) and virtual machines
• Containers and serverless computing
• Cloud models (public, private, hybrid, on-premises)
• Network architectures and segmentation (DMZs, jump servers, air gaps)
• Operational Technology (OT), ICS, SCADA, and IoT risks
• Operating system fundamentals and system processes
• Configuration files and the Windows Registry
• Hardware architecture, UEFI, secure boot, and chain of trust
• OS hardening techniques
• Scripting and programming languages (Bash, Python, VBA)
• Data exchange formats (JSON vs. XML)
• Regular expressions (regex) and practical use cases
🎯 Learning outcomes:
By the end of this lecture, you should be able to:
• Explain how modern infrastructure is designed and secured
• Identify where security risks emerge in virtualized and cloud environments
• Understand how OS and hardware design decisions impact cybersecurity
• Recognize why scripting, automation, and data formats matter in security operations
This lecture is part of a broader cybersecurity curriculum and is intended for educational purposes. It is especially relevant for students studying cybersecurity, information systems, IT management, or preparing for industry certifications.
📚 Recommended follow-up:
Review your notes, revisit key diagrams, and focus on why each technology introduces both capabilities and risk.
⸻
Timestamps, slides, and supplemental materials may be provided separately.
If this video is helpful, consider subscribing for additional cybersecurity lectures and analysis.
#Cybersecurity #InformationSecurity #CyberEducation #CloudSecurity #Virtualization #OTSecurity #UEFI #SecureBoot #CyberFoundations
Повторяем попытку...
Доступные форматы для скачивания:
Скачать видео
-
Информация по загрузке: