Nxfo

Nxfo

Views:
4,423
Subscribers:
751
Videos:
84
Duration:
10:20:01
India
India

Nxfo is an Indian content creator on YouTube with 751 subscribers, publishing 84 videos which altogether total approximately 4.42 thousand views.

Created on ● Channel Link: https://www.youtube.com/channel/UCKTvMr7TCbScpRdXk9XQ9lA





Top 100 Most Liked Videos by Nxfo


Video TitleRatingCategoryGame
1.XMX_PUBG LIVE2PLAYERUNKNOWN'S Battlegrounds
2.Wildfire Analysis | Palo Alto1
3.DHCP Relay Configuration | Palo Alto0
4.Concept of Higher Availability HA in Fortigate1
5.DHCP Server Configuration | Palo Alto0
6.Monitor Fortigate with PRTG Sensors1
7.Active Passive HA configuration in Fortigate0
8.Installing CA Certificate | Palo Alto0
9.Interface Management Profile | Palo Alto0
10.OSPF Configuration | In Fortinet Firewall8
11.FortiAnalyser in GNS31
12.Global Protect and Portal Settings | Palo Alto0
13.Home Lab | Palo Alto0
14.Authentication Captive Portal | Palo Alto0
15.IPSEC Introduction | Fortigate_Infrastructure | Fortigate0
16.PAN OS Software Update | Palo Alto0Vlog
17.URL Filtering | Palo Alto0
18.Data Filters | Palo Alto0
19.Software Defined WAN | Fortigate_Infrastructure | Fortigate0
20.Interface Settings | Palo Alto0
21.VPN Zone and Tunnel Interface | Palo Alto0
22.Use of Tags | Palo Alto0
23.Introduction | Fortigate_Infrastructure0
24.Creating a Security Zone | Palo Alto0
25.RIP Routing Concept Fortigate Firewall0
26.Mobail legend (PLAYING KARMA )0PLAYERUNKNOWN'S Battlegrounds Mobile
27.OSPF Routing Concept | OSPF in Fortinet Firewall0
28.Active Active HA configuration in Fortigate1
29.FortiManager in GNS3 | Fortimanager0
30.Mobile Legends: Bang Bang0Mobile Legends: Bang Bang
31.Export Config Factory Reset Import Config | Palo Alto0
32.Static Routes Concept in Fortiget Firewall0
33.Antivirus | Palo Alto0
34.Kali Linux Basics Terminal and CLI Part 1 | Ethical Hacking Bootcamp0
35.Static Route | Palo Alto0
36.Kali Linux Basics Terminal and CLI Part 2 | Ethical Hacking Bootcamp0
37.Basic Settings and License | Palo Alto0
38.Introduction to Security Policies | Palo Alto0
39.VM Metasploitable Basics to Advanced0
40.File Blocking | Palo Alto0
41.Destination NAT | Palo Alto0
42.Lab Topology | Palo Alto0Vlog
43.Introduction | Palo Alto0
44.Zone Protection and DoS | Palo Alto0
45.Install Metasploitable0
46.BGP Routing Concept | Fortinet Firewall0
47.Installation Preparation | Palo Alto0
48.SSL Decryption Https Inspection | Palo Alto0
49.Enable User ID | Palo Alto0
50.BGP Configuration Part 2 | Fortigate Firewall7
51.Static Routes Configuration in Fortiget Firewall0
52.LDAP and Authentication Profiles | Palo Alto0
53.RIP Routing Concept Fortigate Firewall0
54.Global Protect Portal and SSL Client VPN Access | Palo Alto0
55.Application Control App ID and Filters | Palo Alto0
56.High Availability HA | Palo Alto0
57.BGP Configuration part 1 | Fortigate Firewall6
58.Anti Spyware | Palo Alto0
59.Vulnerability Protection | Palo Alto0
60.Overview of Palo Alto Certifications | Palo Alto Firewall0
61.Virtual Firewall Installation | Palo Alto0
62.SNMP trap configuration on Fortigate5
63.ADOMs in Fortigate3
64.PRTG installation | Fortinet0
65.Creating a Sub Interface | Palo Alto0
66.Virtual Domains | Fortigate_Infrastructure | Fortigate0
67.IPsec Site to Site VPN | Palo Alto0
68.Dynamic NAT PAT | Palo Alto0
69.Panorama | Palo Alto0
70.Static Source NAT | Palo Alto0
71.Forward logs to FortiAnalyzer | Fortinet1Vlog
72.DoS Protection | Palo Alto0
73.FortiGate in GNS3 | Fortinet0
74.Role Base Administration | Palo Alto0
75.Layer 2 Switching | Fortigate_Infrastructure0
76.SOC Roles and Playbooks0
77.Incident Response Phases Preparation to Lessons Learned0The Incident
78.Security Control Types Explained | Administrative, Technical & Physical Controls0Security Control
79.Evil Twin Method – Clone Wireless Access Points to Steal Data0
80.Crack WPA2-PSK Passwords Using Aircrack-ng Tool | Ethical Hacking Tutorial0
81.What is Cybersecurity? | Cybersecurity Explained for Beginners1
82.Cloud Pentesting Basics | CEH0
83.How to Search for Anyone Online | Best People Search Tool Tutorial 20251
84.Nmap Tutorial 2025 | The King of Network Scanners Explained1