1. | IPSEC Introduction | Fortigate_Infrastructure | Fortigate | 1:24:16 | |
|
2. | Introduction | Fortigate_Infrastructure | 53:32 | |
|
3. | Software Defined WAN | Fortigate_Infrastructure | Fortigate | 34:34 | |
|
4. | Virtual Domains | Fortigate_Infrastructure | Fortigate | 33:57 | |
|
5. | Layer 2 Switching | Fortigate_Infrastructure | 29:24 | |
|
6. | Active Passive HA configuration in Fortigate | 18:02 | |
|
7. | Install Metasploitable | 17:09 | |
|
8. | OSPF Configuration | In Fortinet Firewall | 13:02 | |
|
9. | Active Active HA configuration in Fortigate | 10:48 | |
|
10. | BGP Configuration Part 2 | Fortigate Firewall | 10:41 | |
|
11. | High Availability HA | Palo Alto | 10:38 | |
|
12. | RIP Routing Concept Fortigate Firewall | 10:17 | |
|
13. | Kali Linux Basics Terminal and CLI Part 2 | Ethical Hacking Bootcamp | 10:00 | |
|
14. | SNMP trap configuration on Fortigate | 9:51 | |
|
15. | IPsec Site to Site VPN | Palo Alto | 9:35 | |
|
16. | Static Routes Configuration in Fortiget Firewall | 9:07 | |
|
17. | FortiManager in GNS3 | Fortimanager | 8:58 | |
|
18. | Monitor Fortigate with PRTG Sensors | 8:45 | |
|
19. | BGP Configuration part 1 | Fortigate Firewall | 8:38 | |
|
20. | FortiAnalyser in GNS3 | 8:22 | |
|
21. | Panorama | Palo Alto | 7:42 | |
|
22. | Virtual Firewall Installation | Palo Alto | 7:14 | |
|
23. | DHCP Server Configuration | Palo Alto | 6:59 | |
|
24. | Forward logs to FortiAnalyzer | Fortinet | 6:56 | Vlog |
|
25. | VM Metasploitable Basics to Advanced | 6:54 | |
|
26. | PRTG installation | Fortinet | 6:30 | |
|
27. | SSL Decryption Https Inspection | Palo Alto | 6:18 | |
|
28. | Introduction to Security Policies | Palo Alto | 5:58 | |
|
29. | Enable User ID | Palo Alto | 5:57 | |
|
30. | Kali Linux Basics Terminal and CLI Part 1 | Ethical Hacking Bootcamp | 5:51 | |
|
31. | Antivirus | Palo Alto | 5:51 | |
|
32. | FortiGate in GNS3 | Fortinet | 5:44 | |
|
33. | URL Filtering | Palo Alto | 5:29 | |
|
34. | Creating a Sub Interface | Palo Alto | 5:25 | |
|
35. | Concept of Higher Availability HA in Fortigate | 5:20 | |
|
36. | Static Routes Concept in Fortiget Firewall | 5:14 | |
|
37. | Global Protect Portal and SSL Client VPN Access | Palo Alto | 5:14 | |
|
38. | BGP Routing Concept | Fortinet Firewall | 5:09 | |
|
39. | Static Source NAT | Palo Alto | 5:08 | |
|
40. | Home Lab | Palo Alto | 5:06 | |
|
41. | Destination NAT | Palo Alto | 5:02 | |
|
42. | Export Config Factory Reset Import Config | Palo Alto | 5:00 | |
|
43. | Application Control App ID and Filters | Palo Alto | 4:52 | |
|
44. | Global Protect and Portal Settings | Palo Alto | 4:49 | |
|
45. | Interface Management Profile | Palo Alto | 4:39 | |
|
46. | Basic Settings and License | Palo Alto | 4:34 | |
|
47. | Installing CA Certificate | Palo Alto | 4:27 | |
|
48. | RIP Routing Concept Fortigate Firewall | 4:09 | |
|
49. | Role Base Administration | Palo Alto | 4:09 | |
|
50. | Anti Spyware | Palo Alto | 4:09 | |
|
51. | OSPF Routing Concept | OSPF in Fortinet Firewall | 3:41 | |
|
52. | LDAP and Authentication Profiles | Palo Alto | 3:41 | |
|
53. | Vulnerability Protection | Palo Alto | 3:31 | |
|
54. | Interface Settings | Palo Alto | 3:26 | |
|
55. | Introduction | Palo Alto | 3:09 | |
|
56. | Zone Protection and DoS | Palo Alto | 3:07 | |
|
57. | Authentication Captive Portal | Palo Alto | 3:07 | |
|
58. | Wildfire Analysis | Palo Alto | 2:56 | |
|
59. | Dynamic NAT PAT | Palo Alto | 2:54 | |
|
60. | Data Filters | Palo Alto | 2:51 | |
|
61. | ADOMs in Fortigate | 2:43 | |
|
62. | DHCP Relay Configuration | Palo Alto | 2:25 | |
|
63. | File Blocking | Palo Alto | 2:07 | |
|
64. | Overview of Palo Alto Certifications | Palo Alto Firewall | 1:57 | |
|
65. | Installation Preparation | Palo Alto | 1:53 | |
|
66. | VPN Zone and Tunnel Interface | Palo Alto | 1:50 | |
|
67. | DoS Protection | Palo Alto | 1:49 | |
|
68. | Creating a Security Zone | Palo Alto | 1:42 | |
|
69. | Use of Tags | Palo Alto | 1:29 | |
|
70. | Lab Topology | Palo Alto | 1:28 | Vlog |
|
71. | PAN OS Software Update | Palo Alto | 1:27 | Vlog |
|
72. | Static Route | Palo Alto | 1:23 | |
|
73. | Mobail legend (PLAYING KARMA ) | 0:00 | | PLAYERUNKNOWN'S Battlegrounds Mobile
|
74. | XMX_PUBG LIVE | 0:00 | | PLAYERUNKNOWN'S Battlegrounds
|
75. | Mobile Legends: Bang Bang | 0:00 | | Mobile Legends: Bang Bang
|
76. | SOC Roles and Playbooks | 0:00 | |
|
77. | Incident Response Phases Preparation to Lessons Learned | 0:00 | | The Incident
|
78. | What is Cybersecurity? | Cybersecurity Explained for Beginners | 0:00 | |
|
79. | Cloud Pentesting Basics | CEH | 0:00 | |
|
80. | Crack WPA2-PSK Passwords Using Aircrack-ng Tool | Ethical Hacking Tutorial | 0:00 | |
|
81. | Evil Twin Method – Clone Wireless Access Points to Steal Data | 0:00 | |
|
82. | Security Control Types Explained | Administrative, Technical & Physical Controls | 0:00 | | Security Control
|
83. | How to Search for Anyone Online | Best People Search Tool Tutorial 2025 | 0:00 | |
|
84. | Nmap Tutorial 2025 | The King of Network Scanners Explained | 0:00 | |
|