Тёмный
Samuel Barlass
Samuel Barlass
Samuel Barlass
Подписаться
Driven Network & Cybersecurity expert with a passion for sharing knowledge!
How Does FortiMail Really Work?
11:25
Год назад
How Does FortiEDR Really Work?
16:39
Год назад
FortiSIEM Architecture Example
12:15
Год назад
How Does FortiNAC Really Work?
11:52
Год назад
Welcome to CCNA!
15:00
Год назад
Lab 10.4.3 - Getting Started
5:30
2 года назад
Комментарии
@makaramh18
@makaramh18 6 дней назад
Thank you for your sharing
@GrantO-qd2ip
@GrantO-qd2ip 11 дней назад
You ain't worth a damn
@lexuslikethecars
@lexuslikethecars Месяц назад
Thank you for explaining how to find the subnet/host bits better. My instructor was zooming too quickly with this lesson and I was stuck on how to do my homework💀💀
@arturoalvarez7829
@arturoalvarez7829 Месяц назад
hello Sir, very good explanation. I have a question, when or under what condition, we have to use equipment such as, forticlient EMS or Foriauthenticator ?
@FadiHelou73
@FadiHelou73 2 месяца назад
This is good but what kind of policies you are talking about? Lets say one of the employees was pissed off having a problem with his boss and his boss fired him and this employee is a smart ass he mirrored copy his device on a hdd usb or whatever after he leaves the company he will install the mirrord drive on another computer with all the policies and even can copy the MAC address that he had on the old pc so he will have access on the network and screw up everything, what I am pointing here is about the most important thing which is security and we need a kind of security that can’t be accessed in any way, as we know the is a security called ACL access control list that works for MAC address but unfortunately MAC address can be copied and edited, so for me this is not a security anymore but a new security called device serial number which can’t be edited that we can rely on for security, so at least we know no matter what happens its impossible to access a network if a serial number is not found on the switch itself before reaching the server even and searching for the rest of the policies that you implement in your system. The question is that do you think its possible to have a device serial number ACL on installed on the switch itself with the Mac Address ACL to work together in order to have a stronger security?
@TomCourtney
@TomCourtney 2 месяца назад
This is a really good explanation. The only part I don't get is how to access corporate resources like files (which aren't an application, but used by an application on a managed device) like you would with a VPN and have ZTNA security applied to that access.
@Premiumhighlights1
@Premiumhighlights1 2 месяца назад
Is there any lab ISO ?
@mahdiaskour3879
@mahdiaskour3879 3 месяца назад
Is that all?
@BlizzTech
@BlizzTech 3 месяца назад
Thank you this was an incredible explanation. Very clear and to the point.
@FirewallExperts2024
@FirewallExperts2024 4 месяца назад
i fail to see the difference between nac and ztna. can you elaborate? I think nac can already do all ztna does?
@kibromtewolde2954
@kibromtewolde2954 4 месяца назад
Great!!!
@leonidbel2574
@leonidbel2574 4 месяца назад
Great explanation !
@alimushantat2685
@alimushantat2685 5 месяцев назад
Hi Samuel , do you offer full FortiNAC training, thank you
@PowerOfDeathZ
@PowerOfDeathZ 6 месяцев назад
Cool, very concise and informative, may i know if you'll be doing a FortiPAM whiteboarding as well?
@SamuelBarlass
@SamuelBarlass 5 месяцев назад
Thank you for the suggestion! I have heard a bit about FortiPAM, but haven't dug into it in detail yet. I've got a few other things occupying my time in the immediate future, but it is on the list!
@tovarasultau
@tovarasultau 7 месяцев назад
Good work!
@jordon-4481
@jordon-4481 8 месяцев назад
The
@simonsamwel-d1l
@simonsamwel-d1l 8 месяцев назад
hey i need to get the video of vpn
@jacobcase587
@jacobcase587 9 месяцев назад
Too quiet.
@TomWhi
@TomWhi 3 месяца назад
There’s a volume switch on your computer, phone or tablet. The audio is fine.
@theambassadorllc6598
@theambassadorllc6598 9 месяцев назад
Subbed, now do palo's ztna 😎
@daverosenbaum3205
@daverosenbaum3205 9 месяцев назад
Great video! What comes after ccna in then routing switching and wireless ? I assume it's the 3rd of 3?
@lesibethipe1075
@lesibethipe1075 9 месяцев назад
Great video
@BrandonCoyle-z5q
@BrandonCoyle-z5q 9 месяцев назад
Great video !!
@chriseddisford1834
@chriseddisford1834 9 месяцев назад
Great video Sam, Chris @ FortiBytes
@fawaz_Aoun
@fawaz_Aoun 11 месяцев назад
I would like the book from which you explain this lecture, please
@antaresiguess
@antaresiguess 11 месяцев назад
Please continue making this kind of content, it is so easy to understand. Thank you so much
@Kowkabe_official
@Kowkabe_official Год назад
For more videos proh
@chriseddisford1834
@chriseddisford1834 Год назад
Really good video.
@dannythomas7902
@dannythomas7902 Год назад
Antiques
@Shubham-Mishra
@Shubham-Mishra Год назад
Detailed Explanation Buddy ❤
@grimreaper3515
@grimreaper3515 Год назад
👍
@truantj
@truantj Год назад
Very strong!
@alekseimuhhin7967
@alekseimuhhin7967 Год назад
one of the best tutorials on the subject. Thank you!
@Ping_Localh0st127
@Ping_Localh0st127 Год назад
Hello Tomball, TX :)
@rahulmukherjee1481
@rahulmukherjee1481 Год назад
Thank you Samuel for this video. Its really helpful. Would you recommend combination of NGAV and EDR in an organisation or is it better to get rid of one of them from the environment of a mid sized company?
@SamuelBarlass
@SamuelBarlass Год назад
EDR should include all NGAV features. The vast majority of EDR/NGAV solutions will detect each other as malicious and cannot be run simultaneously.
@rahulmukherjee1481
@rahulmukherjee1481 Год назад
@@SamuelBarlass Thank you! That helps.
@NetSecAcademy
@NetSecAcademy Год назад
Hi, thanks for the video. I’m working with Cisco ISE and I’m interested about other solutions. How would you compare fortinac with fortinet ztna?
@SamuelBarlass
@SamuelBarlass Год назад
From a high level: Both are implementations of the Zero Trust principal. FortiNAC protects devices connecting to the network (specifically headless/IoT/OT devices). Fortinet ZTNA is more focused on remote access, and requires an agent (no headless/IoT/OT devices supported). NAC protects network connectivity, ZTNA protects specific applications.
@dutchdollar
@dutchdollar Год назад
Hey Awesome video, I now conceptually understand how FortiNac works. An example situation that you could explain per flow would have been helpful though!
@KatrinaNetzel
@KatrinaNetzel Год назад
This is the first video about subnetting that made sense to me from a math perspective; most other teachers try to avoid it because it can be intimidating, but the number theory really helped me improve my understanding, thank you!!
@SamuelBarlass
@SamuelBarlass Год назад
Thank you! I'm glad you found it helpful!!
@ganeshdavari1015
@ganeshdavari1015 Год назад
Hi Samual, do we have any official guide for Arista exam preparation. And can you guide how can we book the exam
@SamuelBarlass
@SamuelBarlass Год назад
After I started working on the videos, they changed the exam and then my goals also changed to cover other topics, so I never finished the series. Good luck!
@mohammedhanzaz498
@mohammedhanzaz498 Год назад
Great Video Man ! very informative
@momojejsiejwj8309
@momojejsiejwj8309 Год назад
bro can you plz tell me how to study cyber security i feel lost
@SamuelBarlass
@SamuelBarlass Год назад
Cybersecurity is a broad industry, so it's difficult to pinpoint something specific. Many people go after particular degrees or certification as a goal when they are getting started, but keep in mind that understanding the fundamentals of I.T. and how an I.T. organization works are also important. Many cybersecurity professionals started in other I.T. positions and later moved into cybersecurity. If you want to look into certification, CompTIA, Cisco and Fortinet have some great certifications (Some of Fortinet's are completely free).
@momojejsiejwj8309
@momojejsiejwj8309 Год назад
@@SamuelBarlass thanks first of all, expert Samuel I know cybersecurity is big industry but I want to take the first tips could you please provide me with some tips 🙏
@MattMiller510
@MattMiller510 Год назад
hip hop dancing lol... good video thank you!!
@Lynexen03
@Lynexen03 Год назад
Hello, I have been looking and using free CCNA resources to take my CCNA exam and hopefully pass it and help me to land a job since I have been unemployed since the start of the pandemic, so far this is most ideal for material for since you thoroughly explains each topic and not just read the static pdfs. Is it too much if ask for an access for your entire ccna 1 course? and i noticed that you dont have the ccna 3 course, do you plan to make one also and upload it?
@SamuelBarlass
@SamuelBarlass Год назад
Hey! I'm glad you've been enjoying the content. The full course is only available to my students at Lone Star College, and it would not be fair to students who have paid for the course to give it away for free. However, I will continue to produce free content. Best of luck in your studies and employment!
@Lynexen03
@Lynexen03 Год назад
@@SamuelBarlass Do you plan on doing the ccna 2 and ccna 3 course also?
@SamuelBarlass
@SamuelBarlass Год назад
@@Lynexen03 I teach all 3 full courses through Lone Star College.
@Lynexen03
@Lynexen03 Год назад
@@SamuelBarlass would love to be in that class, unfortunately we have less opportunities in this side of the world. But thank god there are still available free courses
@SamuelBarlass
@SamuelBarlass Год назад
@@Lynexen03 Best of luck to you!
@mrtahap
@mrtahap Год назад
That's really awesome Samuel, Thank you for your informative and sensitive video that add me real info.
@lucianonolimaldonado361
@lucianonolimaldonado361 Год назад
Hello, how are you Samuel? Do you know how I could download video contents from the course?
@adailtonjoseph8151
@adailtonjoseph8151 Год назад
Good info shared!! Just wondering if there's still Lab questions in the current CCNA?
@chriseddisford1834
@chriseddisford1834 Год назад
Good video thank you.
@PeeWeeBarnes
@PeeWeeBarnes Год назад
Subnetting ipv6 seems like a nightmare.
@SamuelBarlass
@SamuelBarlass Год назад
IPv6, like many technologies, seems more complex from the outside then it really is. Subnetting in IPv6 is similar to how we've submitted in IPv4, just with Hexadecimal instead of Binary. In fact, since the IPv6 address space is so large, we will likely do much less subnetting (at least in the near future) then we would with IPv4!
@duaasaif4760
@duaasaif4760 Год назад
Good video, keep it up
@luc9498
@luc9498 Год назад
well explained! Thanks
@shaynaorlando6744
@shaynaorlando6744 Год назад
ᑭяỖmo𝓼𝐦 🔥