Very clear, straight to the point videos, thank you Tom
@AdventuresinSecurity3 жыл бұрын
Thanks for the feedback...
@jeffj88254 ай бұрын
Amazing videos 👌
@jeffj88254 ай бұрын
Helps a lot. Part of my assignment question. Is the methodologies of proactive and reactive security methodologies along with the combination of CPTED principles
@colombakolla3 жыл бұрын
Could you please do a video on Authentication Protocols, always struggle with them
@AdventuresinSecurity3 жыл бұрын
Not sure what you are asking for. Please provide a little more info.
@colombakolla3 жыл бұрын
@@AdventuresinSecurity as in CHAP PAP MSCHAP L2TP etc
@yayahkamara2304 Жыл бұрын
@@AdventuresinSecurity do you have a online course with certifications?
@AdventuresinSecurity Жыл бұрын
@@yayahkamara2304 Sorry, no. I am an online cybersecurity faculty at the University of Phoenix. If that ever changes, I will likely set up a certification course.
@jeroendekok69742 жыл бұрын
Are biometric locks (fingerprint, face recognition etc.) considered safe? Thanks alot for these lessons btw!
@AdventuresinSecurity2 жыл бұрын
They can be. It depends on the technology used. For any biometric system, you need to look at the intersection of false positives and false negatives, as described in my free book chapter, Application of Biometrics (bit.ly/371bCz6). As with any locks, however, you have to remember that locks are only a delaying control. As with all physical security controls, we seek to deter and delay an intruder until we can detect the intrusion and intervene. See my video, Physical Security Part 2 - Walls, Doors, and Locks (kzbin.info/www/bejne/e3LIh4h6gqmGpJY) as well as my article, Managing the Intruder (bit.ly/3LwG7fj).