1. | XMX_PUBG LIVE | 2 | | PLAYERUNKNOWN'S Battlegrounds
|
2. | Wildfire Analysis | Palo Alto | 1 | |
|
3. | DHCP Relay Configuration | Palo Alto | 0 | |
|
4. | Concept of Higher Availability HA in Fortigate | 1 | |
|
5. | DHCP Server Configuration | Palo Alto | 0 | |
|
6. | Monitor Fortigate with PRTG Sensors | 1 | |
|
7. | Active Passive HA configuration in Fortigate | 0 | |
|
8. | Installing CA Certificate | Palo Alto | 0 | |
|
9. | Interface Management Profile | Palo Alto | 0 | |
|
10. | OSPF Configuration | In Fortinet Firewall | 8 | |
|
11. | FortiAnalyser in GNS3 | 1 | |
|
12. | Global Protect and Portal Settings | Palo Alto | 0 | |
|
13. | Home Lab | Palo Alto | 0 | |
|
14. | Authentication Captive Portal | Palo Alto | 0 | |
|
15. | IPSEC Introduction | Fortigate_Infrastructure | Fortigate | 0 | |
|
16. | PAN OS Software Update | Palo Alto | 0 | Vlog |
|
17. | URL Filtering | Palo Alto | 0 | |
|
18. | Data Filters | Palo Alto | 0 | |
|
19. | Software Defined WAN | Fortigate_Infrastructure | Fortigate | 0 | |
|
20. | Interface Settings | Palo Alto | 0 | |
|
21. | VPN Zone and Tunnel Interface | Palo Alto | 0 | |
|
22. | Use of Tags | Palo Alto | 0 | |
|
23. | Introduction | Fortigate_Infrastructure | 0 | |
|
24. | Creating a Security Zone | Palo Alto | 0 | |
|
25. | RIP Routing Concept Fortigate Firewall | 0 | |
|
26. | Mobail legend (PLAYING KARMA ) | 0 | | PLAYERUNKNOWN'S Battlegrounds Mobile
|
27. | OSPF Routing Concept | OSPF in Fortinet Firewall | 0 | |
|
28. | Active Active HA configuration in Fortigate | 1 | |
|
29. | FortiManager in GNS3 | Fortimanager | 0 | |
|
30. | Mobile Legends: Bang Bang | 0 | | Mobile Legends: Bang Bang
|
31. | Export Config Factory Reset Import Config | Palo Alto | 0 | |
|
32. | Static Routes Concept in Fortiget Firewall | 0 | |
|
33. | Antivirus | Palo Alto | 0 | |
|
34. | Kali Linux Basics Terminal and CLI Part 1 | Ethical Hacking Bootcamp | 0 | |
|
35. | Static Route | Palo Alto | 0 | |
|
36. | Kali Linux Basics Terminal and CLI Part 2 | Ethical Hacking Bootcamp | 0 | |
|
37. | Basic Settings and License | Palo Alto | 0 | |
|
38. | Introduction to Security Policies | Palo Alto | 0 | |
|
39. | VM Metasploitable Basics to Advanced | 0 | |
|
40. | File Blocking | Palo Alto | 0 | |
|
41. | Destination NAT | Palo Alto | 0 | |
|
42. | Lab Topology | Palo Alto | 0 | Vlog |
|
43. | Introduction | Palo Alto | 0 | |
|
44. | Zone Protection and DoS | Palo Alto | 0 | |
|
45. | Install Metasploitable | 0 | |
|
46. | BGP Routing Concept | Fortinet Firewall | 0 | |
|
47. | Installation Preparation | Palo Alto | 0 | |
|
48. | SSL Decryption Https Inspection | Palo Alto | 0 | |
|
49. | Enable User ID | Palo Alto | 0 | |
|
50. | BGP Configuration Part 2 | Fortigate Firewall | 7 | |
|
51. | Static Routes Configuration in Fortiget Firewall | 0 | |
|
52. | LDAP and Authentication Profiles | Palo Alto | 0 | |
|
53. | RIP Routing Concept Fortigate Firewall | 0 | |
|
54. | Global Protect Portal and SSL Client VPN Access | Palo Alto | 0 | |
|
55. | Application Control App ID and Filters | Palo Alto | 0 | |
|
56. | High Availability HA | Palo Alto | 0 | |
|
57. | BGP Configuration part 1 | Fortigate Firewall | 6 | |
|
58. | Anti Spyware | Palo Alto | 0 | |
|
59. | Vulnerability Protection | Palo Alto | 0 | |
|
60. | Overview of Palo Alto Certifications | Palo Alto Firewall | 0 | |
|
61. | Virtual Firewall Installation | Palo Alto | 0 | |
|
62. | SNMP trap configuration on Fortigate | 5 | |
|
63. | ADOMs in Fortigate | 3 | |
|
64. | PRTG installation | Fortinet | 0 | |
|
65. | Creating a Sub Interface | Palo Alto | 0 | |
|
66. | Virtual Domains | Fortigate_Infrastructure | Fortigate | 0 | |
|
67. | IPsec Site to Site VPN | Palo Alto | 0 | |
|
68. | Dynamic NAT PAT | Palo Alto | 0 | |
|
69. | Panorama | Palo Alto | 0 | |
|
70. | Static Source NAT | Palo Alto | 0 | |
|
71. | Forward logs to FortiAnalyzer | Fortinet | 1 | Vlog |
|
72. | DoS Protection | Palo Alto | 0 | |
|
73. | FortiGate in GNS3 | Fortinet | 0 | |
|
74. | Role Base Administration | Palo Alto | 0 | |
|
75. | Layer 2 Switching | Fortigate_Infrastructure | 0 | |
|
76. | SOC Roles and Playbooks | 0 | |
|
77. | Incident Response Phases Preparation to Lessons Learned | 0 | | The Incident
|
78. | Security Control Types Explained | Administrative, Technical & Physical Controls | 0 | | Security Control
|
79. | Evil Twin Method – Clone Wireless Access Points to Steal Data | 0 | |
|
80. | Crack WPA2-PSK Passwords Using Aircrack-ng Tool | Ethical Hacking Tutorial | 0 | |
|
81. | What is Cybersecurity? | Cybersecurity Explained for Beginners | 1 | |
|
82. | Cloud Pentesting Basics | CEH | 0 | |
|
83. | How to Search for Anyone Online | Best People Search Tool Tutorial 2025 | 1 | |
|
84. | Nmap Tutorial 2025 | The King of Network Scanners Explained | 1 | |
|