1. | BGP Configuration part 1 | Fortigate Firewall | 678 | |
|
2. | SNMP trap configuration on Fortigate | 637 | |
|
3. | Monitor Fortigate with PRTG Sensors | 586 | |
|
4. | OSPF Configuration | In Fortinet Firewall | 571 | |
|
5. | BGP Configuration Part 2 | Fortigate Firewall | 547 | |
|
6. | FortiManager in GNS3 | Fortimanager | 484 | |
|
7. | Active Active HA configuration in Fortigate | 302 | |
|
8. | ADOMs in Fortigate | 226 | |
|
9. | Forward logs to FortiAnalyzer | Fortinet | 95 | Vlog |
|
10. | RIP Routing Concept Fortigate Firewall | 47 | |
|
11. | FortiAnalyser in GNS3 | 34 | |
|
12. | Active Passive HA configuration in Fortigate | 26 | |
|
13. | FortiGate in GNS3 | Fortinet | 22 | |
|
14. | Installing CA Certificate | Palo Alto | 20 | |
|
15. | BGP Routing Concept | Fortinet Firewall | 18 | |
|
16. | PRTG installation | Fortinet | 13 | |
|
17. | Export Config Factory Reset Import Config | Palo Alto | 12 | |
|
18. | Global Protect Portal and SSL Client VPN Access | Palo Alto | 11 | |
|
19. | Wildfire Analysis | Palo Alto | 11 | |
|
20. | Concept of Higher Availability HA in Fortigate | 10 | |
|
21. | RIP Routing Concept Fortigate Firewall | 7 | |
|
22. | Evil Twin Method – Clone Wireless Access Points to Steal Data | 5 | |
|
23. | Install Metasploitable | 4 | |
|
24. | OSPF Routing Concept | OSPF in Fortinet Firewall | 4 | |
|
25. | Crack WPA2-PSK Passwords Using Aircrack-ng Tool | Ethical Hacking Tutorial | 4 | |
|
26. | Zone Protection and DoS | Palo Alto | 4 | |
|
27. | PAN OS Software Update | Palo Alto | 4 | Vlog |
|
28. | DoS Protection | Palo Alto | 3 | |
|
29. | IPsec Site to Site VPN | Palo Alto | 3 | |
|
30. | Introduction | Palo Alto | 2 | |
|
31. | Authentication Captive Portal | Palo Alto | 2 | |
|
32. | Cloud Pentesting Basics | CEH | 2 | |
|
33. | Panorama | Palo Alto | 2 | |
|
34. | High Availability HA | Palo Alto | 2 | |
|
35. | Nmap Tutorial 2025 | The King of Network Scanners Explained | 2 | |
|
36. | IPSEC Introduction | Fortigate_Infrastructure | Fortigate | 2 | |
|
37. | Global Protect and Portal Settings | Palo Alto | 2 | |
|
38. | Security Control Types Explained | Administrative, Technical & Physical Controls | 2 | | Security Control
|
39. | Incident Response Phases Preparation to Lessons Learned | 2 | | The Incident
|
40. | DHCP Relay Configuration | Palo Alto | 1 | |
|
41. | SOC Roles and Playbooks | 1 | |
|
42. | Static Routes Concept in Fortiget Firewall | 1 | |
|
43. | DHCP Server Configuration | Palo Alto | 1 | |
|
44. | Role Base Administration | Palo Alto | 1 | |
|
45. | Dynamic NAT PAT | Palo Alto | 1 | |
|
46. | Layer 2 Switching | Fortigate_Infrastructure | 1 | |
|
47. | Kali Linux Basics Terminal and CLI Part 2 | Ethical Hacking Bootcamp | 1 | |
|
48. | Home Lab | Palo Alto | 1 | |
|
49. | Static Routes Configuration in Fortiget Firewall | 1 | |
|
50. | What is Cybersecurity? | Cybersecurity Explained for Beginners | 1 | |
|
51. | Basic Settings and License | Palo Alto | 1 | |
|
52. | File Blocking | Palo Alto | 1 | |
|
53. | Overview of Palo Alto Certifications | Palo Alto Firewall | 1 | |
|
54. | How to Search for Anyone Online | Best People Search Tool Tutorial 2025 | 1 | |
|
55. | Static Source NAT | Palo Alto | 0 | |
|
56. | Application Control App ID and Filters | Palo Alto | 0 | |
|
57. | Creating a Sub Interface | Palo Alto | 0 | |
|
58. | Anti Spyware | Palo Alto | 0 | |
|
59. | Destination NAT | Palo Alto | 0 | |
|
60. | Mobile Legends: Bang Bang | 0 | | Mobile Legends: Bang Bang
|
61. | Interface Management Profile | Palo Alto | 0 | |
|
62. | Lab Topology | Palo Alto | 0 | Vlog |
|
63. | Virtual Domains | Fortigate_Infrastructure | Fortigate | 0 | |
|
64. | Software Defined WAN | Fortigate_Infrastructure | Fortigate | 0 | |
|
65. | Installation Preparation | Palo Alto | 0 | |
|
66. | Antivirus | Palo Alto | 0 | |
|
67. | Mobail legend (PLAYING KARMA ) | 0 | | PLAYERUNKNOWN'S Battlegrounds Mobile
|
68. | XMX_PUBG LIVE | 0 | | PLAYERUNKNOWN'S Battlegrounds
|
69. | SSL Decryption Https Inspection | Palo Alto | 0 | |
|
70. | Introduction to Security Policies | Palo Alto | 0 | |
|
71. | Interface Settings | Palo Alto | 0 | |
|
72. | Enable User ID | Palo Alto | 0 | |
|
73. | VPN Zone and Tunnel Interface | Palo Alto | 0 | |
|
74. | Creating a Security Zone | Palo Alto | 0 | |
|
75. | Vulnerability Protection | Palo Alto | 0 | |
|
76. | Static Route | Palo Alto | 0 | |
|
77. | LDAP and Authentication Profiles | Palo Alto | 0 | |
|
78. | Virtual Firewall Installation | Palo Alto | 0 | |
|
79. | Data Filters | Palo Alto | 0 | |
|
80. | Kali Linux Basics Terminal and CLI Part 1 | Ethical Hacking Bootcamp | 0 | |
|
81. | URL Filtering | Palo Alto | 0 | |
|
82. | Introduction | Fortigate_Infrastructure | 0 | |
|
83. | VM Metasploitable Basics to Advanced | 0 | |
|
84. | Use of Tags | Palo Alto | 0 | |
|