- 54
- 86 992
Samuel Barlass
เข้าร่วมเมื่อ 7 พ.ย. 2013
Driven Network & Cybersecurity expert with a passion for sharing knowledge!
Understanding the TCP/IP and OSI models - how to categorize technologies by layer.
Early in my studies I struggled understanding what the OSI model was - and how to know what technologies went in each layer - I hope this video helps you understand what took me a considerable amount of time to unravel!
มุมมอง: 182
วีดีโอ
ZTNA - The Fortinet Way - How Zero Trust Network Access Really Works
มุมมอง 7Kปีที่แล้ว
Join me as I cover Fortinet's Zero Trust Network Access technology - proving Zero Trust for remote and internal resource access.
Network Segmentation - Do You Really Need it? - Risk exposure to vulnerabilities / CVEs
มุมมอง 437ปีที่แล้ว
There's a reason network segmentation is a core need in cybersecurity. Security is everyone's job, from the end user, to the system and network admins!
How Does FortiMail Really Work?
มุมมอง 1.4Kปีที่แล้ว
Join me as I go over the email process flow in FortiMail!
Fortinet 2023 NSE Certification updates.
มุมมอง 968ปีที่แล้ว
Check out Fortinet's NSE updates effective October 1, 2023 here: www.fortinet.com/nse-training/training-program-update
How Does FortiEDR Really Work?
มุมมอง 3Kปีที่แล้ว
Join me as I discuss the questions that come up often when I'm talking to Cybersecurity pros - FortiEDR's integrations, EDR vs XDR, and How FortiEDR actually evaluates processes.
What is SD-WAN? Should you consider it?
มุมมอง 307ปีที่แล้ว
Join me as I distill SD-WAN - what it is, and what it can do for your organization.
New CCNA, Who dis? - CCNA Roadmap for 2023
มุมมอง 1.5K2 ปีที่แล้ว
Check out Cisco's new CCNA roadmap here: learningnetwork.cisco.com/s/cisco-certification-roadmaps
How Does FortiNAC Really Work?
มุมมอง 9K2 ปีที่แล้ว
Join me as I share some of the details about how I was able to wrap my head around the complexities of FortiNAC.
Compare TCP to UDP - CCNA By Objective Pt.5
มุมมอง 682 ปีที่แล้ว
CCNA by objective is my new series where I go through the CCNA objectives and give a brief overview. Join me as we talk about the objectives from 1.5!
Identify Interface and Cabling Issues - CCNA By ObjectivePt.4
มุมมอง 1572 ปีที่แล้ว
CCNA by objective is my new series where I go through the CCNA objectives and give a brief overview. Join me as we talk about the objectives from 1.4! Cabling issues, interface errors, and troubleshooting!
Compare Physical Interface and Cabling Types - CCNA By objective Pt.3
มุมมอง 2012 ปีที่แล้ว
CCNA by objective is my new series where I go through the CCNA objectives and give a brief overview. Join me as we talk about the objectives from 1.3! 1.3 Compare physical interface and cabling types 1.3.a Single-mode fiber, multimode fiber, copper 1.3.b Connections (Ethernet shared media and point-to-point) 1.3.c Concepts of PoE
Characteristics of Network Topologies - 3 Tier, 2 Tier, Spine-Leaf - CCNA By Objective Pt2.
มุมมอง 1632 ปีที่แล้ว
Characteristics of Network Topologies - 3 Tier, 2 Tier, Spine-Leaf - CCNA By Objective Pt2.
Function of network Components - Routers, Switches, Firewalls, and more! - CCNA By Objective Pt1.
มุมมอง 8642 ปีที่แล้ว
Function of network Components - Routers, Switches, Firewalls, and more! - CCNA By Objective Pt1.
Endpoint Security - Which one should I choose? - Traditional AV, NGAV, EDR/MDR/XDR
มุมมอง 1.1K2 ปีที่แล้ว
Endpoint Security - Which one should I choose? - Traditional AV, NGAV, EDR/MDR/XDR
How to Subnet - CCNA 1 - Getting started with 11.6.6
มุมมอง 1.2K2 ปีที่แล้ว
How to Subnet - CCNA 1 - Getting started with 11.6.6
Quick subnetting - Subnetting in 8 minutes - CCNA 1 11.6.6 Getting Started
มุมมอง 6402 ปีที่แล้ว
Quick subnetting - Subnetting in 8 minutes - CCNA 1 11.6.6 Getting Started
How to Download, Install, and open assignments in Packet Tracer
มุมมอง 1.9K2 ปีที่แล้ว
How to Download, Install, and open assignments in Packet Tracer
Cisco NetAcad - How to download and convert PDF/word documents for assignments
มุมมอง 8K3 ปีที่แล้ว
Cisco NetAcad - How to download and convert PDF/word documents for assignments
Cisco CCNA 2 v7 Module 1 Section 1.5 - Verify Directly Connected Networks
มุมมอง 4383 ปีที่แล้ว
Cisco CCNA 2 v7 Module 1 Section 1.5 - Verify Directly Connected Networks
Cisco CCNA 2 v7 Module 1 Section 1.4 - Basic Router Configuration
มุมมอง 7223 ปีที่แล้ว
Cisco CCNA 2 v7 Module 1 Section 1.4 - Basic Router Configuration
Cisco CCNA 2 v7 Module 1 Section 1.2 - Configure Switch Ports
มุมมอง 2.5K3 ปีที่แล้ว
Cisco CCNA 2 v7 Module 1 Section 1.2 - Configure Switch Ports
Cisco CCNA 2 v7 Module 1 Section 1.1 - Configure a Switch With Initial Settings
มุมมอง 9K3 ปีที่แล้ว
Cisco CCNA 2 v7 Module 1 Section 1.1 - Configure a Switch With Initial Settings
Arista's ACE A Module 1 - Switch Administration LAB Demo
มุมมอง 873 ปีที่แล้ว
Arista's ACE A Module 1 - Switch Administration LAB Demo
Arista's ACE A Module 1 - Switch Administration
มุมมอง 1333 ปีที่แล้ว
Arista's ACE A Module 1 - Switch Administration
This was helpful
Thanks for the good content, but please do work on your handwriting
Thank you for your sharing
You ain't worth a damn
Thank you for explaining how to find the subnet/host bits better. My instructor was zooming too quickly with this lesson and I was stuck on how to do my homework💀💀
hello Sir, very good explanation. I have a question, when or under what condition, we have to use equipment such as, forticlient EMS or Foriauthenticator ?
This is good but what kind of policies you are talking about? Lets say one of the employees was pissed off having a problem with his boss and his boss fired him and this employee is a smart ass he mirrored copy his device on a hdd usb or whatever after he leaves the company he will install the mirrord drive on another computer with all the policies and even can copy the MAC address that he had on the old pc so he will have access on the network and screw up everything, what I am pointing here is about the most important thing which is security and we need a kind of security that can’t be accessed in any way, as we know the is a security called ACL access control list that works for MAC address but unfortunately MAC address can be copied and edited, so for me this is not a security anymore but a new security called device serial number which can’t be edited that we can rely on for security, so at least we know no matter what happens its impossible to access a network if a serial number is not found on the switch itself before reaching the server even and searching for the rest of the policies that you implement in your system. The question is that do you think its possible to have a device serial number ACL on installed on the switch itself with the Mac Address ACL to work together in order to have a stronger security?
Sorry, you're not getting it right. FortiNAC takes control of the switches and is able to change the VLAN you're connected to. It also sends CoA or Disconnect messages to the Wireless Controllers to manage wireless connections in the same way. So, let's say a disgruntled employee wants to create havoc on the former employer network and clone his former PC's hard drive: he will not have valid credentials for sure, and one of the enforcments the FortiNAC does is authentication. Even if the hacker wannabe finds his way into the office or connects to the wireless lan just from the other side of a wall, he will end up in one of the protected networks. The real issue is when the disgruntled employee had FortiNAC administrative rights: in that case he would know the policies and therefore he will be probably able to set up hi s PC to resemble a printer or some other device that bypasses the authentication: you want to have LAN segregation in place for this specific scenarios to minimize the attack surface (the hacker will enter a VLAN segregated and protected by a firewall at least so he will be capable of doing a lot less damage than entering the normal clients network).
This is a really good explanation. The only part I don't get is how to access corporate resources like files (which aren't an application, but used by an application on a managed device) like you would with a VPN and have ZTNA security applied to that access.
Is there any lab ISO ?
Is that all?
Thank you this was an incredible explanation. Very clear and to the point.
i fail to see the difference between nac and ztna. can you elaborate? I think nac can already do all ztna does?
Great!!!
Great explanation !
Hi Samuel , do you offer full FortiNAC training, thank you
Cool, very concise and informative, may i know if you'll be doing a FortiPAM whiteboarding as well?
Thank you for the suggestion! I have heard a bit about FortiPAM, but haven't dug into it in detail yet. I've got a few other things occupying my time in the immediate future, but it is on the list!
Good work!
The
hey i need to get the video of vpn
Too quiet.
There’s a volume switch on your computer, phone or tablet. The audio is fine.
Subbed, now do palo's ztna 😎
Great video! What comes after ccna in then routing switching and wireless ? I assume it's the 3rd of 3?
Great video
Great video !!
Great video Sam, Chris @ FortiBytes
I would like the book from which you explain this lecture, please
Please continue making this kind of content, it is so easy to understand. Thank you so much
For more videos proh
Really good video.
Antiques
Detailed Explanation Buddy ❤
👍
Very strong!
one of the best tutorials on the subject. Thank you!
Hello Tomball, TX :)
Thank you Samuel for this video. Its really helpful. Would you recommend combination of NGAV and EDR in an organisation or is it better to get rid of one of them from the environment of a mid sized company?
EDR should include all NGAV features. The vast majority of EDR/NGAV solutions will detect each other as malicious and cannot be run simultaneously.
@@SamuelBarlass Thank you! That helps.
Hi, thanks for the video. I’m working with Cisco ISE and I’m interested about other solutions. How would you compare fortinac with fortinet ztna?
From a high level: Both are implementations of the Zero Trust principal. FortiNAC protects devices connecting to the network (specifically headless/IoT/OT devices). Fortinet ZTNA is more focused on remote access, and requires an agent (no headless/IoT/OT devices supported). NAC protects network connectivity, ZTNA protects specific applications.
Hey Awesome video, I now conceptually understand how FortiNac works. An example situation that you could explain per flow would have been helpful though!
This is the first video about subnetting that made sense to me from a math perspective; most other teachers try to avoid it because it can be intimidating, but the number theory really helped me improve my understanding, thank you!!
Thank you! I'm glad you found it helpful!!
Hi Samual, do we have any official guide for Arista exam preparation. And can you guide how can we book the exam
After I started working on the videos, they changed the exam and then my goals also changed to cover other topics, so I never finished the series. Good luck!
Great Video Man ! very informative
bro can you plz tell me how to study cyber security i feel lost
Cybersecurity is a broad industry, so it's difficult to pinpoint something specific. Many people go after particular degrees or certification as a goal when they are getting started, but keep in mind that understanding the fundamentals of I.T. and how an I.T. organization works are also important. Many cybersecurity professionals started in other I.T. positions and later moved into cybersecurity. If you want to look into certification, CompTIA, Cisco and Fortinet have some great certifications (Some of Fortinet's are completely free).
@@SamuelBarlass thanks first of all, expert Samuel I know cybersecurity is big industry but I want to take the first tips could you please provide me with some tips 🙏
hip hop dancing lol... good video thank you!!
Hello, I have been looking and using free CCNA resources to take my CCNA exam and hopefully pass it and help me to land a job since I have been unemployed since the start of the pandemic, so far this is most ideal for material for since you thoroughly explains each topic and not just read the static pdfs. Is it too much if ask for an access for your entire ccna 1 course? and i noticed that you dont have the ccna 3 course, do you plan to make one also and upload it?
Hey! I'm glad you've been enjoying the content. The full course is only available to my students at Lone Star College, and it would not be fair to students who have paid for the course to give it away for free. However, I will continue to produce free content. Best of luck in your studies and employment!
@@SamuelBarlass Do you plan on doing the ccna 2 and ccna 3 course also?
@@Lynexen03 I teach all 3 full courses through Lone Star College.
@@SamuelBarlass would love to be in that class, unfortunately we have less opportunities in this side of the world. But thank god there are still available free courses
@@Lynexen03 Best of luck to you!
That's really awesome Samuel, Thank you for your informative and sensitive video that add me real info.
Hello, how are you Samuel? Do you know how I could download video contents from the course?
Good info shared!! Just wondering if there's still Lab questions in the current CCNA?
Good video thank you.
Subnetting ipv6 seems like a nightmare.
IPv6, like many technologies, seems more complex from the outside then it really is. Subnetting in IPv6 is similar to how we've submitted in IPv4, just with Hexadecimal instead of Binary. In fact, since the IPv6 address space is so large, we will likely do much less subnetting (at least in the near future) then we would with IPv4!
Good video, keep it up