Networking Basics Learning Series
Cybersecurity Basics Learning Series
Networking and Cybersecurity Advanced Learning Series
Unlock the future of digital defense and network architecture with
This platform provides a comprehensive overview of my career journey, professional achievements, and current projects. Here, you will find detailed insights into my work, including updates on recent initiatives and advancements in my field. I trust you will find the content both informative and engaging, reflecting the depth and breadth of my professional experience.
The website has recently undergone a transition from a login-based access model for various user types to a revenue-driven approach. This change is designed to support my career transition as I seek new employment opportunities, while also streamlining access to valuable resources and content to enhance your overall experience.
I am pleased to introduce three new sections on the site:
Your visit is greatly appreciated. I welcome any feedback or suggestions you may have to help improve the site. I am committed to ensuring this platform meets your needs and expectations. Thank you once again for your support and for exploring my work.
Is there something you can’t find on my website? Ask Jamieson (Powered by ChatGPT (openAI). He will gladly answer any question you have regarding IT, Networking or Cybersecurity. Please limit your questions to 1000 characters or less to save time and preserve resources.
Unlock the future of digital defense and network architecture with
With over two decades of practical, hands-on experiencespanning both operational and business aspects, I've had the privilege of learning from some of the industry's finest professionals. This journey has led me to become a recognized Subject Matter Expert (SME) in several technologies that are reshaping the landscape of cybersecurity.
Security information and event management (SIEM) technology supports threat detection, compliance and security incident management through the collection and analysis (both near real time and historical) of security events, as well as a wide variety of other event and contextual data sources. The core capabilities are a broad scope of log event collection and management, the ability to analyze log events and other data across disparate sources, and operational capabilities (such as incident management, dashboards and reporting).
Security information and event management (SIEM) technology supports threat detection, compliance, and security incident management through the collection and analysis (both near real-time and historical) of security events, as well as a wide variety of other event and contextual data sources. The core capabilities are a broad scope of log event collection and management, the ability to analyze log events and other data across disparate sources, and operational capabilities (such as incident management, dashboards, and reporting).
Managed detection and response (MDR) services are a collection of network-, host- and endpoint-based cybersecurity technologies that a third-party provider manages for a client organization. The provider typically installs technology on-premises at the client organization and provides additional external and automated threat hunting services.
MDRs improve cybersecurity by searching for threats and responding to them once detected. They also let users connect with the provider’s security experts, who can bolster the security skills of the client company’s IT department. This makes them ideal for businesses that don’t have a designated in-house threat detection team.
XDR, or Extended Detection and Response, represents an integrated suite of security tools designed to provide unified protection against cyber threats. This proactive approach seeks to detect, analyze, and respond to potential threats in real-time, covering the network, cloud, endpoint, and email security domains.
Threat management is a process used by cybersecurity professionals to prevent cyberattacks, detect cyber threats, and respond to security incidents. Why is threat management critical?
Most security teams face information fragmentation, leading to blind spots in security operations.
A next-generation firewall (NGFW) is part of the third generation of firewall technology that can be implemented in hardware or software. It can detect and block sophisticated attacks by enforcing security policies at the application, port, and protocol levels.
Cloud computing is the on-demand availability of computer system resources, especially data storage and computing power, without direct active management by the user. Large clouds often have functions distributed over multiple locations, each of which is a data center.
Explore the collection of how-to videos and podcasts featured on my website. These resources showcase the evolution of my presentation and training skills over the past year. I invite you to review them to gain insight into the breadth and depth of my expertise. Enjoy!