This video only really shows half the picture.
For example, on windows services all run on the SYSTEM 'account' (the true administrator), whereas unix allows each service to run as a different user which only has the permissions it needs.
So while the two kernels may be about as easy to compromise (ie very hard), *nix systems allow for better seperation, meaning that it's less threatening if, for example, samba has a rce exploit, since that still doesn't give you full access.
EternalBlue was such an exploit, and it got full system access on windows, but were it a mac samba attack, it would likely need more privesc to be of any use.
Whilst these videos obviously aren't meant to be as in-depth, and my explanation isn't written well enough to fit in as-is, it is really disappointing to see them not mentioning this at all, as looking at kernel security only is very obviously misleading,