Thank you for explaining how to find the subnet/host bits better. My instructor was zooming too quickly with this lesson and I was stuck on how to do my homework💀💀
hello Sir, very good explanation. I have a question, when or under what condition, we have to use equipment such as, forticlient EMS or Foriauthenticator ?
This is good but what kind of policies you are talking about? Lets say one of the employees was pissed off having a problem with his boss and his boss fired him and this employee is a smart ass he mirrored copy his device on a hdd usb or whatever after he leaves the company he will install the mirrord drive on another computer with all the policies and even can copy the MAC address that he had on the old pc so he will have access on the network and screw up everything, what I am pointing here is about the most important thing which is security and we need a kind of security that can’t be accessed in any way, as we know the is a security called ACL access control list that works for MAC address but unfortunately MAC address can be copied and edited, so for me this is not a security anymore but a new security called device serial number which can’t be edited that we can rely on for security, so at least we know no matter what happens its impossible to access a network if a serial number is not found on the switch itself before reaching the server even and searching for the rest of the policies that you implement in your system. The question is that do you think its possible to have a device serial number ACL on installed on the switch itself with the Mac Address ACL to work together in order to have a stronger security?
This is a really good explanation. The only part I don't get is how to access corporate resources like files (which aren't an application, but used by an application on a managed device) like you would with a VPN and have ZTNA security applied to that access.
Thank you for the suggestion! I have heard a bit about FortiPAM, but haven't dug into it in detail yet. I've got a few other things occupying my time in the immediate future, but it is on the list!
Thank you Samuel for this video. Its really helpful. Would you recommend combination of NGAV and EDR in an organisation or is it better to get rid of one of them from the environment of a mid sized company?
From a high level: Both are implementations of the Zero Trust principal. FortiNAC protects devices connecting to the network (specifically headless/IoT/OT devices). Fortinet ZTNA is more focused on remote access, and requires an agent (no headless/IoT/OT devices supported). NAC protects network connectivity, ZTNA protects specific applications.
Hey Awesome video, I now conceptually understand how FortiNac works. An example situation that you could explain per flow would have been helpful though!
This is the first video about subnetting that made sense to me from a math perspective; most other teachers try to avoid it because it can be intimidating, but the number theory really helped me improve my understanding, thank you!!
After I started working on the videos, they changed the exam and then my goals also changed to cover other topics, so I never finished the series. Good luck!
Cybersecurity is a broad industry, so it's difficult to pinpoint something specific. Many people go after particular degrees or certification as a goal when they are getting started, but keep in mind that understanding the fundamentals of I.T. and how an I.T. organization works are also important. Many cybersecurity professionals started in other I.T. positions and later moved into cybersecurity. If you want to look into certification, CompTIA, Cisco and Fortinet have some great certifications (Some of Fortinet's are completely free).
@@SamuelBarlass thanks first of all, expert Samuel I know cybersecurity is big industry but I want to take the first tips could you please provide me with some tips 🙏
Hello, I have been looking and using free CCNA resources to take my CCNA exam and hopefully pass it and help me to land a job since I have been unemployed since the start of the pandemic, so far this is most ideal for material for since you thoroughly explains each topic and not just read the static pdfs. Is it too much if ask for an access for your entire ccna 1 course? and i noticed that you dont have the ccna 3 course, do you plan to make one also and upload it?
Hey! I'm glad you've been enjoying the content. The full course is only available to my students at Lone Star College, and it would not be fair to students who have paid for the course to give it away for free. However, I will continue to produce free content. Best of luck in your studies and employment!
@@SamuelBarlass would love to be in that class, unfortunately we have less opportunities in this side of the world. But thank god there are still available free courses
IPv6, like many technologies, seems more complex from the outside then it really is. Subnetting in IPv6 is similar to how we've submitted in IPv4, just with Hexadecimal instead of Binary. In fact, since the IPv6 address space is so large, we will likely do much less subnetting (at least in the near future) then we would with IPv4!