Nxfo

Nxfo

Views:
4,423
Subscribers:
751
Videos:
84
Duration:
10:20:01
India
India

Nxfo is an Indian content creator on YouTube with 751 subscribers, publishing 84 videos which altogether total approximately 4.42 thousand views.

Created on ● Channel Link: https://www.youtube.com/channel/UCKTvMr7TCbScpRdXk9XQ9lA





Top 100 Videos With The Longest Duration by Nxfo


Video TitleDurationCategoryGame
1.IPSEC Introduction | Fortigate_Infrastructure | Fortigate1:24:16
2.Introduction | Fortigate_Infrastructure53:32
3.Software Defined WAN | Fortigate_Infrastructure | Fortigate34:34
4.Virtual Domains | Fortigate_Infrastructure | Fortigate33:57
5.Layer 2 Switching | Fortigate_Infrastructure29:24
6.Active Passive HA configuration in Fortigate18:02
7.Install Metasploitable17:09
8.OSPF Configuration | In Fortinet Firewall13:02
9.Active Active HA configuration in Fortigate10:48
10.BGP Configuration Part 2 | Fortigate Firewall10:41
11.High Availability HA | Palo Alto10:38
12.RIP Routing Concept Fortigate Firewall10:17
13.Kali Linux Basics Terminal and CLI Part 2 | Ethical Hacking Bootcamp10:00
14.SNMP trap configuration on Fortigate9:51
15.IPsec Site to Site VPN | Palo Alto9:35
16.Static Routes Configuration in Fortiget Firewall9:07
17.FortiManager in GNS3 | Fortimanager8:58
18.Monitor Fortigate with PRTG Sensors8:45
19.BGP Configuration part 1 | Fortigate Firewall8:38
20.FortiAnalyser in GNS38:22
21.Panorama | Palo Alto7:42
22.Virtual Firewall Installation | Palo Alto7:14
23.DHCP Server Configuration | Palo Alto6:59
24.Forward logs to FortiAnalyzer | Fortinet6:56Vlog
25.VM Metasploitable Basics to Advanced6:54
26.PRTG installation | Fortinet6:30
27.SSL Decryption Https Inspection | Palo Alto6:18
28.Introduction to Security Policies | Palo Alto5:58
29.Enable User ID | Palo Alto5:57
30.Kali Linux Basics Terminal and CLI Part 1 | Ethical Hacking Bootcamp5:51
31.Antivirus | Palo Alto5:51
32.FortiGate in GNS3 | Fortinet5:44
33.URL Filtering | Palo Alto5:29
34.Creating a Sub Interface | Palo Alto5:25
35.Concept of Higher Availability HA in Fortigate5:20
36.Static Routes Concept in Fortiget Firewall5:14
37.Global Protect Portal and SSL Client VPN Access | Palo Alto5:14
38.BGP Routing Concept | Fortinet Firewall5:09
39.Static Source NAT | Palo Alto5:08
40.Home Lab | Palo Alto5:06
41.Destination NAT | Palo Alto5:02
42.Export Config Factory Reset Import Config | Palo Alto5:00
43.Application Control App ID and Filters | Palo Alto4:52
44.Global Protect and Portal Settings | Palo Alto4:49
45.Interface Management Profile | Palo Alto4:39
46.Basic Settings and License | Palo Alto4:34
47.Installing CA Certificate | Palo Alto4:27
48.RIP Routing Concept Fortigate Firewall4:09
49.Role Base Administration | Palo Alto4:09
50.Anti Spyware | Palo Alto4:09
51.OSPF Routing Concept | OSPF in Fortinet Firewall3:41
52.LDAP and Authentication Profiles | Palo Alto3:41
53.Vulnerability Protection | Palo Alto3:31
54.Interface Settings | Palo Alto3:26
55.Introduction | Palo Alto3:09
56.Zone Protection and DoS | Palo Alto3:07
57.Authentication Captive Portal | Palo Alto3:07
58.Wildfire Analysis | Palo Alto2:56
59.Dynamic NAT PAT | Palo Alto2:54
60.Data Filters | Palo Alto2:51
61.ADOMs in Fortigate2:43
62.DHCP Relay Configuration | Palo Alto2:25
63.File Blocking | Palo Alto2:07
64.Overview of Palo Alto Certifications | Palo Alto Firewall1:57
65.Installation Preparation | Palo Alto1:53
66.VPN Zone and Tunnel Interface | Palo Alto1:50
67.DoS Protection | Palo Alto1:49
68.Creating a Security Zone | Palo Alto1:42
69.Use of Tags | Palo Alto1:29
70.Lab Topology | Palo Alto1:28Vlog
71.PAN OS Software Update | Palo Alto1:27Vlog
72.Static Route | Palo Alto1:23
73.Mobail legend (PLAYING KARMA )0:00PLAYERUNKNOWN'S Battlegrounds Mobile
74.XMX_PUBG LIVE0:00PLAYERUNKNOWN'S Battlegrounds
75.Mobile Legends: Bang Bang0:00Mobile Legends: Bang Bang
76.SOC Roles and Playbooks0:00
77.Incident Response Phases Preparation to Lessons Learned0:00The Incident
78.What is Cybersecurity? | Cybersecurity Explained for Beginners0:00
79.Cloud Pentesting Basics | CEH0:00
80.Crack WPA2-PSK Passwords Using Aircrack-ng Tool | Ethical Hacking Tutorial0:00
81.Evil Twin Method – Clone Wireless Access Points to Steal Data0:00
82.Security Control Types Explained | Administrative, Technical & Physical Controls0:00Security Control
83.How to Search for Anyone Online | Best People Search Tool Tutorial 20250:00
84.Nmap Tutorial 2025 | The King of Network Scanners Explained0:00