Главная
Study mode:
on
You
History
Saved
In progress
0 courses
compleat
0 courses
#Art & Design
#Adobe
#ChatGPT
#GitHub
#Firewalls
YouTube
education
Showing:
73
courses
Sort by Relevancy
Highest rated
Lowest rated
Most recently added
Jeremy's IT Lab
CCNA - Network Devices - Day 1 - CCNA 200-301 Complete Course
27
rewiews
In this video you will learn about the kinds of devices you will find in modern networks, their functions in the network, and their differences.
Add to list
16
Lesons
30 minutes
On-Demand
Free-Video
Devoxx
Building a Lightning Fast Firewall with Java and eBPF - Devoxx
0
rewiews
Explore the cutting-edge intersection of eBPF and Java in this 52-minute Devoxx conference talk. Dive deep into the world of cloud-native technology as speakers Mohammed Aboullaite and Johannes Bechberger demonstrate how to build a high-throughput firewa…
Add to list
1
Lesons
52 minutes
On-Demand
Free-Video
Great Learning
Firewall
0
rewiews
Explore cybersecurity fundamentals, including firewalls, threats, and vulnerabilities. Learn about firewall types, their importance, and how they differ from antivirus software.
Add to list
15
Lesons
43 minutes
On-Demand
Free-Video
SDN Trainings
0
rewiews
Comprehensive video tutorials on Software Defined Networking, covering Mininet, RYU SDN Controller, OpenFlow concepts, and practical demonstrations for network professionals and enthusiasts.
Add to list
15
Lesons
3 hours 30 minutes
On-Demand
Free-Video
Network+
0
rewiews
Comprehensive video lectures covering essential networking concepts, protocols, and security for Network+ certification exam preparation, with practical examples and troubleshooting techniques.
Add to list
55
Lesons
8 hours
On-Demand
Free-Video
media.ccc.de
Linux as a Network Device - A Tour Through Key Components
0
rewiews
Überblick über Linux-Komponenten für Netzwerkgeräte wie Firewalls und Router. Behandelt nftables, conntrack, Routing und mehr. Für Interessierte mit IP-Grundkenntnissen und Shell-Erfahrung.
Add to list
1
Lesons
41 minutes
On-Demand
Free-Video
Paul Browning
Cisco Cyber Security
0
rewiews
Comprehensive training on Cisco network security, covering threats, AAA, access control, firewalls, VPNs, and more. Gain practical skills to protect networks and implement robust security measures.
Add to list
72
Lesons
14 hours 45 minutes
On-Demand
Free-Video
The Cyber Academy
Network Security in the Age of the Third Platform – Stephen Hampton, Hutchinson Networks
0
rewiews
Explore security challenges in the Third Platform era, covering firewalls, DDoS attacks, and cloud computing. Learn strategies to protect networks in evolving technological landscapes.
Add to list
9
Lesons
28 minutes
On-Demand
Free-Video
White Hat Cal Poly
Networks - Cristina Formaini and Peter Faiman
0
rewiews
Explore network layers, protocols, and security threats in this comprehensive introduction to networking concepts and defensive strategies.
Add to list
16
Lesons
29 minutes
On-Demand
Free-Video
White Hat Cal Poly
Firewalls
0
rewiews
Explore firewalls' history, theory, and practical uses, covering strengths, limitations, and implementations. Hands-on activities included for both beginners and experienced participants.
Add to list
12
Lesons
19 minutes
On-Demand
Free-Video
White Hat Cal Poly
Network Security
0
rewiews
Learn about network security, OSI layers, and essential tools like Wireshark. Explore attack models, firewalls, and IDS to protect against unauthorized access and data theft.
Add to list
27
Lesons
1 hour 2 minutes
On-Demand
Free-Video
Bill Buchanan OBE
Introduction to Security and Network Forensics - Network Security Elements
0
rewiews
Comprehensive overview of network security elements, covering firewalls, NAT, VPNs, and IPSec. Ideal for those seeking to understand fundamental security concepts and technologies.
Add to list
15
Lesons
1 hour 7 minutes
On-Demand
Free-Video
Bill Buchanan OBE
Introduction to Security and Network Forensics - Lecture 1
0
rewiews
Comprehensive overview of security fundamentals, covering threats, defense strategies, and network models for a solid foundation in cybersecurity principles.
Add to list
19
Lesons
46 minutes
On-Demand
Free-Video
Bill Buchanan OBE
Vulnerability Analysis and Penetration Testing Lab - DMZ Setup and Scanning
0
rewiews
Hands-on lab exploring vulnerability analysis and penetration testing techniques, covering network scanning, fingerprinting, and security tool usage for identifying system weaknesses.
Add to list
23
Lesons
50 minutes
On-Demand
Free-Video
Bill Buchanan OBE
Vulnerability Scanning and Penetration Testing Lab
0
rewiews
Hands-on lab exploring vulnerability scanning, penetration testing, and network security techniques to identify and assess system weaknesses.
Add to list
14
Lesons
50 minutes
On-Demand
Free-Video
Bill Buchanan OBE
VMware Cloud - pfSense Setup and Configuration - Part 1
0
rewiews
Learn to set up and configure pfSense firewall in VMware Cloud, covering network setup, Windows configuration, diagnostics, routing tables, and DMZ rules.
Add to list
16
Lesons
43 minutes
On-Demand
Free-Video
Policy Defined Segmentation with Metadata - Takedowncon Rocketcity 2014
0
rewiews
Explore policy-defined network segmentation using metadata for enhanced security, access control, and efficient branch management in modern IT infrastructures.
Add to list
13
Lesons
31 minutes
On-Demand
Free-Video
Is It Time for Another Firewall or a Security Awareness Program?
0
rewiews
Explore the effectiveness of firewalls vs. security awareness programs in modern cybersecurity strategies. Gain insights on balancing technical solutions with human-focused approaches.
Add to list
1
Lesons
29 minutes
On-Demand
Free-Video
DefCamp
Very Unusual Case of C2 Over DNS from Certain Firewalls
0
rewiews
Explore an unusual case of C2 over DNS from specific firewalls, presented by Piotr Głaska at DefCamp Cluj-Napoca 2024. Gain insights into this unique cybersecurity scenario and its implications.
Add to list
1
Lesons
43 minutes
On-Demand
Free-Video
Hitesh Choudhary
Setting Up VPC for Deployment
0
rewiews
Comprehensive guide to secure VPS setup for deployment, covering system updates, user creation, SSH configuration, firewall setup, and key-based authentication. Includes troubleshooting tips for efficient server management.
Add to list
1
Lesons
32 minutes
On-Demand
Free-Video
Linux Foundation
Firewalls with NFtables
0
rewiews
Explore NFtables for advanced firewall configuration in Linux, covering syntax, rule creation, and practical implementation techniques for enhanced network security.
Add to list
1
Lesons
1 hour 12 minutes
On-Demand
Free-Video
IEEE
A Modular Generalizable Workflow for Uncovering Evasion Attacks Against Stateful Firewalls
0
rewiews
Explore a modular workflow for identifying evasion attacks against stateful firewalls, enhancing network security and threat detection capabilities.
Add to list
1
Lesons
20 minutes
On-Demand
Free-Video
John Hammond
I Can't Scan This Website - Cybersecurity Challenges with Cloaking Firewalls
0
rewiews
Explore website scanning challenges and cybersecurity techniques with John Hammond. Learn about protective measures like Cloaking Firewall and gain insights into infrastructure security.
Add to list
1
Lesons
23 minutes
On-Demand
Free-Video
Black Hat
Chinese APT - Exploiting Edge Devices for Surveillance and Attacks
0
rewiews
Revelación de ataques de APT chinos a dispositivos de borde, incluyendo un 0-day en routers de vigilancia. Se analizan casos de estudio y se proponen estrategias de mitigación.
Add to list
1
Lesons
32 minutes
On-Demand
Free-Video
Linux Foundation
Building a Hypervisor Firewall with nftables and Rust
0
rewiews
Learn to build a hypervisor firewall using nftables and Rust. Explore complex rulesets, zone-based firewalling, and programmatic rule creation for securing virtualized Linux network environments.
Add to list
1
Lesons
31 minutes
On-Demand
Free-Video
International Centre for Theoretical Sciences
A Modern Take on the Information Paradox and Progress Towards Its Resolution - Lecture 3
0
rewiews
Explore recent progress on Hawking's black hole information paradox, including holographic approaches to reproduce the Page curve and models of unitary black hole evaporation.
Add to list
16
Lesons
52 minutes
On-Demand
Free-Video
Bugcrowd
Mobile Application Security Threats Through the Eyes of the Attacker
0
rewiews
Explore mobile app security threats from a hacker's perspective, covering attack vectors, data storage, leakage, HTTPS, SSL, firewalls, and OS controls with expert Jason Haddix.
Add to list
12
Lesons
44 minutes
On-Demand
Free-Video
CNCF [Cloud Native Computing Foundation]
Cloud Native: Using Calico for eBPF, Linux, and Windows on Azure and AKS
0
rewiews
Explore Calico's advanced networking features for Azure AKS, including eBPF, source IP preservation, and efficient pod migration, enhancing Kubernetes performance and security.
Add to list
12
Lesons
38 minutes
On-Demand
Free-Video
CodingWithMitch
Hosting a Django Website with Digital Ocean
0
rewiews
Learn to deploy Django websites on Digital Ocean: setup Ubuntu, configure Gunicorn and Nginx, secure with SSH and firewall, and launch your site using Python 3.7 and pip.
Add to list
13
Lesons
1 hour 6 minutes
On-Demand
Free-Video
USENIX
Deploying and Debugging HTTP/3 - Challenges and Solutions
0
rewiews
Explore QUIC and HTTP/3 deployment challenges, debugging techniques, and real-world case studies. Learn about encryption, load balancing, and troubleshooting tools for modern networking protocols.
Add to list
1
Lesons
43 minutes
On-Demand
Free-Video
Winter is Coming - Cloud Security in Dark Ages
0
rewiews
Explore top cloud security concerns, control panels, reliability, APIs, firewalls, redundancy, encryption, logging, and monitoring in this comprehensive overview.
Add to list
11
Lesons
40 minutes
On-Demand
Free-Video
CNCF [Cloud Native Computing Foundation]
Container Is the New VM: The Paradigm Change for Cloud Computing
0
rewiews
Explore the shift from VMs to containers, addressing challenges in load balancing, firewalls, and autoscaling while ensuring security in cloud environments.
Add to list
27
Lesons
27 minutes
On-Demand
Free-Video
Get Your Kicks on Route IPv6
0
rewiews
Explore IPv6: its history, challenges, and implementation. Learn about addressing, network sizes, protocols, security implications, and transition strategies from IPv4.
Add to list
32
Lesons
59 minutes
On-Demand
Free-Video
WEareTROOPERS
Remote Access and Business Partner Connections
0
rewiews
Explore secure remote access solutions and business partner connections, focusing on best practices, challenges, and innovative approaches for modern network security.
Add to list
1
Lesons
1 hour 17 minutes
On-Demand
Free-Video
BSidesLV
The Commoditization of Security Solutions - Will You Be Replaced by a Small Script?
0
rewiews
Explore the impact of security solution commoditization on the industry and professionals. Learn strategies to stay relevant in an evolving landscape.
Add to list
20
Lesons
29 minutes
On-Demand
Free-Video
NorthSec
Critical Vulnerabilities in Network Equipment - Past, Present, and Future
0
rewiews
Explore critical vulnerabilities in network equipment, from routers to firewalls. Learn about common patterns, historical context, and future trends in cybersecurity for these essential devices.
Add to list
15
Lesons
31 minutes
On-Demand
Free-Video
nullcon
Telecom Security Challenges in 5G
0
rewiews
Explore 5G telecom security challenges, improvements, and implementation issues. Learn about virtualization risks, DDOS threats, and industry initiatives like NESAS in this comprehensive overview.
Add to list
13
Lesons
39 minutes
On-Demand
Free-Video
The Semi Comprehensive Guide to Setting Up a Home Lab
0
rewiews
Learn to set up a comprehensive home lab with Raspberry Pi, hypervisors, Linux, NAS, and security tools. Explore projects and avoid common pitfalls in this practical guide.
Add to list
14
Lesons
33 minutes
On-Demand
Free-Video
OpenAppID Open Source Next Gen Firewall with Snort - Adam Hogan
0
rewiews
Learn about OpenAppID, an open-source next-generation firewall technology using Snort. Explore application control, custom detectors, and file inspection in network security.
Add to list
25
Lesons
48 minutes
On-Demand
Free-Video
Strange Loop Conference
Of Data Dropboxes and Data Gloveboxes
0
rewiews
Exploring data security through nuclear isolation techniques, this talk presents innovative approaches to protect sensitive information and ensure controlled data manipulation in modern data science.
Add to list
26
Lesons
37 minutes
On-Demand
Free-Video
Kaspersky
Important Technologies of Kaspersky Endpoint Security Cloud
0
rewiews
Explore key technologies in Kaspersky Endpoint Security Cloud for Windows, macOS, and smartphones, including threat protection, encryption, and device control features.
Add to list
22
Lesons
18 minutes
On-Demand
Free-Video
Security BSides London
Easy Ways to Bypass Anti Virus Systems
0
rewiews
Discover simple techniques to evade antivirus systems, including signature detection, emulation, sandboxing, and firewalls. Learn how attackers can bypass popular security measures with minimal effort and resources.
Add to list
1
Lesons
47 minutes
On-Demand
Free-Video
Network Security - What About the Data
0
rewiews
Explore network security beyond firewalls, focusing on data protection strategies like role-based access, DLP, and data classification to safeguard valuable information assets.
Add to list
12
Lesons
38 minutes
On-Demand
Free-Video
Why is the Internet Still Working
0
rewiews
Explore TCP/IP, IPv6, routing, and internet architecture. Learn about BGP, ISPs, and internet exchanges to understand how the global network remains functional.
Add to list
15
Lesons
56 minutes
On-Demand
Free-Video
Can Cloud and Security Be Used in the Same Sentence
0
rewiews
Explore cloud security concerns, best practices, and benefits in enterprise environments. Learn about encryption, two-factor authentication, and DevOps approaches for improved security and efficiency.
Add to list
28
Lesons
51 minutes
On-Demand
Free-Video
Defense in Depth - Your Security Castle
0
rewiews
Explore defense-in-depth strategies for optimizing security controls, including network segmentation, vulnerability management, and layered protection techniques.
Add to list
13
Lesons
44 minutes
On-Demand
Free-Video
Getting the Data Out Using Social Media
0
rewiews
Explore techniques for data exfiltration using social media platforms, including testing, demos, and defensive strategies. Learn about multichannel capabilities and message size limits.
Add to list
17
Lesons
21 minutes
On-Demand
Free-Video
The Art of Offense and Defense
0
rewiews
Explore offensive and defensive cybersecurity strategies, from old-school compromises to modern monetization impacts, and learn practical advice for effective protection in this insightful keynote.
Add to list
16
Lesons
56 minutes
On-Demand
Free-Video
Security and Networking Dual Purpose Tools
0
rewiews
Explore dual-purpose security and networking tools, including Zipmap, Web Servers, Firewalls, and Network Devices. Learn about network history, traffic analysis, and scanning techniques.
Add to list
17
Lesons
34 minutes
On-Demand
Free-Video
Hacking is Dead - Long Live Hacking
0
rewiews
Explore the evolution of hacking techniques, from war dialing to modern automation, and learn why hacking persists despite advanced security measures.
Add to list
16
Lesons
55 minutes
On-Demand
Free-Video
linux.conf.au
The Linux Network Stack Extension for DDoS Mitigation and Web Security
0
rewiews
Explore Tempesta FW, an open-source Linux kernel module for efficient HTTPS traffic filtering and DDoS mitigation. Learn about its integration with the TCP/IP stack and advanced security features.
Add to list
1
Lesons
42 minutes
On-Demand
Free-Video
Black Hat
PEIMA - Harnessing Power Laws to Detect Malicious Activities
0
rewiews
Explore power law-based techniques for detecting and mitigating DDoS attacks, intrusions, and other malicious network activities using PEIMA methodology.
Add to list
20
Lesons
25 minutes
On-Demand
Free-Video
Dev Odyssey
Split Tunneling Your VPN Traffic with Policy Based Routing - OpenWrt, Wireguard, OpenVPN
0
rewiews
Optimize VPN usage with split tunneling and policy-based routing on OpenWrt. Learn to selectively route traffic, enhance convenience, and maintain security across multiple VPNs and devices.
Add to list
10
Lesons
18 minutes
On-Demand
Free-Video
Tech Field Day
Fortinet Secure SD-WAN: Foundation for SASE Implementation
0
rewiews
Discover how Fortinet Secure SD-WAN enhances network security, improves application performance, and enables cloud transformation while maintaining operational efficiency and user experience.
Add to list
7
Lesons
13 minutes
On-Demand
Free-Video
Tech Field Day
VMware SD-WAN Client: Secure Remote Access Solution for Distributed Workforce
0
rewiews
Discover how VMware's SD-WAN Client software agent enables secure, reliable remote access through Zero Trust principles, connecting distributed workforces to multi-cloud environments and servers seamlessly.
Add to list
19
Lesons
24 minutes
On-Demand
Free-Video
Tech Field Day
Cisco Secure Firewall 3100 Series - Hardware and Software Innovations
0
rewiews
Discover hardware and software innovations in network security through an exploration of resilience, multi-tenancy, encrypted traffic handling, and AI-driven threat detection capabilities.
Add to list
10
Lesons
29 minutes
On-Demand
Free-Video
Tech Field Day
Cisco Secure Firewall - Intelligent Security Powered by Talos
0
rewiews
Discover how Cisco's advanced firewall technologies leverage Talos intelligence to create robust, adaptive security solutions for modern threat landscapes and emerging challenges.
Add to list
1
Lesons
27 minutes
On-Demand
Free-Video
Tech Field Day
SonicWall Secure SD-WAN and Firewall: Securing Data Across Distributed Networks
0
rewiews
Discover how to implement secure network architecture using SonicWall's SD-WAN and firewall solutions for protecting distributed workforce data across multiple locations.
Add to list
1
Lesons
29 minutes
On-Demand
Free-Video
CarolinaCon
Deconstructing Firewalls - Automated Rules in Distributed SDN Networks
0
rewiews
Explore automated firewall management through Software Defined Networking and SMT solvers, enabling scalable security solutions that integrate with IDS systems without compromising network performance.
Add to list
1
Lesons
27 minutes
On-Demand
Free-Video
Google Cloud Tech
Cloud NGFW Enterprise Demo - Advanced Threat Protection for Cloud Environments
0
rewiews
Explore advanced threat protection capabilities of Cloud NGFW Enterprise to enhance cloud security posture. Learn configuration steps and see a solution demo for safeguarding cloud environments.
Add to list
6
Lesons
14 minutes
On-Demand
Free-Video
Dev Odyssey
A Beginner's Guide to Firewall Rules in OpenWrt and GL.iNet Slate
0
rewiews
Learn to protect your home network using OpenWrt firewall rules. Explore zones, chains, actions, and create custom rules to enhance security and control traffic on your router.
Add to list
8
Lesons
16 minutes
On-Demand
Free-Video
OneMarcFifty
IPv6 Configuration Options with OpenWrt - Prefix Delegation, NDP Proxy, and 6in4 Tunneling
0
rewiews
Explore three methods for implementing IPv6 on OpenWrt: Prefix Delegation, NDP Proxy, and 6in4 tunneling. Learn configuration steps, firewall rules, and DHCPv6 options for each approach.
Add to list
9
Lesons
25 minutes
On-Demand
Free-Video
DevSecCon
Essential Features and Plugins for Enhanced WordPress Website Security
0
rewiews
Discover essential WordPress security features and plugins. Learn to integrate proactive security practices into development, enhancing site integrity and resilience against evolving threats.
Add to list
1
Lesons
19 minutes
On-Demand
Free-Video
Paul Browning
Networking Appliances, Applications and Functions for CompTIA Network+ - Lesson 2
0
rewiews
Explore network appliances like routers, firewalls, and load balancers for CompTIA Network+ exam preparation. Gain insights into their functions and applications in modern networks.
Add to list
18
Lesons
22 minutes
On-Demand
Free-Video
BSidesLV
Protecting Windows Credentials - An Excessive Guide for Security Professionals
0
rewiews
Comprehensive guide for security professionals on safeguarding Windows credentials, covering architecture, isolation, exploit mitigation, and containment strategies for enhanced system protection.
Add to list
13
Lesons
53 minutes
On-Demand
Free-Video
media.ccc.de
Democratizing Network Access Through a Universal Router - VyOS Open Source Network Operating System
0
rewiews
Explore VyOS: an open-source network OS offering free routing and firewall capabilities for cloud deployments, competing with commercial solutions on standard amd64 systems.
Add to list
1
Lesons
30 minutes
On-Demand
Free-Video
Write your own Operating System
Firewall and Network Security with iptables - Lecture 9
0
rewiews
Learn to transform a router into a firewall using iptables, implementing network protection, NAT, port forwarding, and user-chains for enhanced security between VLANs.
Add to list
1
Lesons
1 hour
On-Demand
Free-Video
Confreaks
Installing NI Targets on Edge Networks - Security and Management Best Practices
0
rewiews
Discover essential strategies for deploying NI targets in edge computing, covering VPN, firewalls, DynDNS, and secure data exchange for IIoT systems implementation and management.
Add to list
1
Lesons
23 minutes
On-Demand
Free-Video
Linode
5 Essential Ansible Security Features for IT Automation
0
rewiews
Discover how to enhance IT infrastructure security through 5 essential Ansible features, including SSH configuration, user management, vault encryption, firewall setup, and package updates.
Add to list
10
Lesons
51 minutes
On-Demand
Free-Video
Wilmer Almazan / The Network Trip
MikroTik Firewall Security and Input Chain Protection - Episode 2
0
rewiews
Learn essential techniques for securing MikroTik routers through input chain firewall configuration, enhancing network defense and preventing unauthorized access to critical infrastructure.
Add to list
1
Lesons
19 minutes
On-Demand
Free-Video
Wilmer Almazan / The Network Trip
Port Knocking and Scanner Detection in MikroTik Firewall - Episode 3
0
rewiews
Master essential MikroTik RouterOS security features - implement Port Knocking for controlled access and Scanner Detection to identify potential network threats and vulnerabilities.
Add to list
1
Lesons
18 minutes
On-Demand
Free-Video
Wilmer Almazan / The Network Trip
MikroTik Firewall Fundamentals and Network Security - Episode 1
0
rewiews
Discover essential MikroTik firewall fundamentals, including rule configuration, filter chains, and security best practices for strengthening your network protection.
Add to list
1
Lesons
21 minutes
On-Demand
Free-Video
Rahul Wagh
Why DevOps Is Not an Entry-Level Career Path
0
rewiews
Discover why DevOps requires solid foundational knowledge through essential technical concepts like networking, Linux systems, DNS, and web servers - based on real interview experiences.
Add to list
1
Lesons
11 minutes
On-Demand
Free-Video
load more...