- 430
- 54 851
SecureNet
India
Приєднався 26 тра 2023
This channel regards All Type Network Security Measures Across Various Domains
Security measures play a critical role in safeguarding our data, systems, and resources in today's interconnected world. Different domains require specific security measures to protect against various threats. Let's explore the key security measures employed in various domains, including network security, cybersecurity, information security, physical security, application security, cloud security, mobile security, and IoT security.
Security measures play a critical role in safeguarding our data, systems, and resources in today's interconnected world. Different domains require specific security measures to protect against various threats. Let's explore the key security measures employed in various domains, including network security, cybersecurity, information security, physical security, application security, cloud security, mobile security, and IoT security.
51 Cyberthreat Protection Services: How to Stop a Cyberattack
Right Approach to Stop a Cyberattack
Enterprises worldwide have spent billions on firewalls, yet breaches are increasing. The problem is simple: traditional firewall-centric architectures are no longer effective against cyber threats. Then, what should we do to stop cyberattacks?
Enterprises worldwide have spent billions on firewalls, yet breaches are increasing. The problem is simple: traditional firewall-centric architectures are no longer effective against cyber threats. Then, what should we do to stop cyberattacks?
Переглядів: 5
Відео
50. Cyberthreat Protection Services: Stages of Cyberattack Framework
Переглядів 1414 днів тому
Understanding how cyberattacks unfold is crucial to defending against them! 🚨 In this video, we break down the stages of a cyberattack framework and show you how Zscaler’s security services identify, block, and mitigate these attacks at each phase. From initial infiltration to data exfiltration, we’ll guide you through the anatomy of a cyberattack and how Zscaler ensures your digital assets sta...
49. Cyberthreat Protection Services: How Cyberattacks Happen
Переглядів 914 днів тому
Cyberthreat Protection Services: eLearning This module is divided into two main sections, each crafted to build your understanding gradually. 1 Cybersecurity Overview: We begin by introducing you to the current cyberthreat landscape. You will also learn about the cyberthreat protection services Zscaler provides to eliminate these attacks through our Zero Trust Exchange platform. 2 Zscaler’s Cyb...
48 Zscaler Digital Experience: Use Cases
Переглядів 2121 день тому
Zscaler addresses both of these use cases and more with its powerful end-user monitoring capabilities. In the video shown below, hear about six common use cases that ZDX addresses including: 1. Real-time Detection of SaaS Outages 2. Baselining Performance Between Office and Working from Anywhere 3. Detecting Employee Home Wi-Fi Issues 4. Detecting High CPU Causing Application Degradation 5. Vis...
47 Zscaler Digital Experience Y Engine & ZDX APIs
Переглядів 2028 днів тому
ZDX’s Y-Engine (Automated Root Cause Analysis) allows an organization to automatically isolate root causes of performance issues, spend less time troubleshooting, eliminate finger-pointing, and get users back to work faster. Whereas, ZDX’s APIs integrate digital experience insights with popular ITSM tools like ServiceNow to provide additional insights and trigger remediation workflows. The Y-En...
46 Zscaler Digital Experience: eLearning Software & Device Inventory
Переглядів 828 днів тому
46 Zscaler Digital Experience: eLearning Software & Device Inventory
45 Zscaler Digital Experience: UCaaS Monitoring
Переглядів 1528 днів тому
In this video, the next feature we will discuss as part of the Zscaler Digital Experience Solution is Unified Communications as a Service or UCOSS Monitoring. Let's start by looking at some of the typical challenges user face when they are in a meeting and how ZTX can help. A user could face different types of issues when he or she is in a meeting. There could be issues related to audio call qu...
44 Zscaler Digital Experience: Visibility in SaaS and private applications
Переглядів 1928 днів тому
Zscaler Digital Experience: Visibility in SaaS and private applications #zscaler
43. Zscaler Digital Experience: ZDX Architecture Overview
Переглядів 47Місяць тому
Understanding the basics of ZDX’s architecture is important as it will help you to more clearly navigate, configure, and troubleshoot the various features, functionalities, and issues that arise within the Digital Experience console. Key components include destination applications monitored by ZDX, the endpoints with ZDX enabled, the Telemetry and Policy Gateway (TPG), and the ZDX Analytics Eng...
42 Zscaler Digital Experience: introduction
Переглядів 24Місяць тому
The ZDX Score is calculated by observing the Page Fetch Time and availability of an application for a given user. This is then baselined across all the users in that geolocation (Country) accessing that particular application. ZDX periodically sends a probe to an application, by default, every 5 minutes. For each 5-minute period, measurements are taken and given a numerical value from 1 to 100....
41 Zscaler Digital Experience eLearning Audio overview
Переглядів 19Місяць тому
Zscaler Digital Experience: eLearning Welcome to Zscaler Digital Experience (ZDX)! This module is designed to guide you through the essentials of how ZDX operates and the process behind creating secure and fluid digital experiences for users everywhere. This module is divided into two main sections, each crafted to build your understanding gradually: 1 Introduction to ZDX & its Architecture Ove...
40 Platform Services eLearning Summarize
Переглядів 17Місяць тому
Glossary: Bring Your Own Device (BYOD): A policy that enables employees in an organization to use their personally owned devices for work-related activities. Certificate Authority (CA): A trusted entity that issues Secure Sockets Layer (SSL) certificates. Cloud Sandbox: A technology that allows you to detect advanced threats on a computer. Data Loss Prevention (DLP): A security solution that id...
39 Platform Services: Policy for Zscaler Digital Experience
Переглядів 28Місяць тому
Zscaler Digital Experience policy determines probe activation based on user attributes like groups, users, locations, and devices or exclusion criteria, such as avoiding probe activation for specific user groups or locations, like in-office scenarios.
38 Platform Services: Access Policy Criteria for Zscaler Private Access
Переглядів 26Місяць тому
Application segments, SAML/SCIM attributes, client types, posture profiles, and trusted networks are logically combined to trigger a rule. The Timeout policy is triggered for business reasons, and criteria include application names, segments, posture profiles, client types, and SAML/SCIM attributes. The Inspection policy applies to HTTP and HTTPS applications where Inspection is enabled, and ac...
37 Platform Services Private Access Order of Operations
Переглядів 502 місяці тому
ZPA enables secure access to internal applications without requiring a traditional VPN. The policy for ZPA involves defining rules and configurations to ensure secure and controlled access to specific resources within an organization's network. Here's a general overview of the policy aspects for Zscaler Private Access: Private Access Order of Operations Analyzing Access Policy Criteria for ZPA ...
36 Platform Services: Policy Configuration and Actions in NAT and Intrusion Prevention System (IPS)
Переглядів 242 місяці тому
36 Platform Services: Policy Configuration and Actions in NAT and Intrusion Prevention System (IPS)
35. Platform Services: Security Policy and Firewall Rules in ZIA
Переглядів 272 місяці тому
35. Platform Services: Security Policy and Firewall Rules in ZIA
33 Policy Framework and Operational Flow in ZIA
Переглядів 632 місяці тому
33 Policy Framework and Operational Flow in ZIA
32 Platform Services: Policy Framework
Переглядів 432 місяці тому
32 Platform Services: Policy Framework
30 TLS Inspection Pillars and Functionalities
Переглядів 442 місяці тому
30 TLS Inspection Pillars and Functionalities
28 LAB Connectivity Services Self Guided Lab
Переглядів 492 місяці тому
28 LAB Connectivity Services Self Guided Lab
27 ZPA summarize what we have learned in this section
Переглядів 232 місяці тому
27 ZPA summarize what we have learned in this section
26. Private Application App Connector Demonstration
Переглядів 932 місяці тому
26. Private Application App Connector Demonstration
25. Deploying App Connectors With Examples
Переглядів 442 місяці тому
25. Deploying App Connectors With Examples
24 Connectivity Services App Connectors
Переглядів 442 місяці тому
24 Connectivity Services App Connectors
23 Zscaler Client Connector User Interface Demonstration
Переглядів 1382 місяці тому
23 Zscaler Client Connector User Interface Demonstration
22 Connectivity Services Installing Zscaler Client Connector
Переглядів 1262 місяці тому
22 Connectivity Services Installing Zscaler Client Connector
Awesome
ty man really helpful
Nicolas Trail
171 Skiles Turnpike
29087 Lucinda Light
Thanks for this very informative video. Sincerely appreciate it, thanks.
I have a question: You need to add BOB in Device - user
6867 Senger Road
Did the password change? Not able to log in
Hi there, Hurmm, it maybe because that was an online LAB, But no worry, the LAB videos are coming soon with the latest credentials. Stay tuned for the further videos... Thanks
PLEASE UPLOAD VIDEO 3
Thanks for sharing
it help me a lot tanks
Carmel Creek
so what is being used in todays switching when they forward a frame?
Very good knowledge transfer, congrats and success in your life.
your video is great but some of people will not very will because you accent is a little deferent It is my idea bro It's not for your bothering
Thanks for the point, and good to here that, we will trying to get more accent. mean while which type of accent you are looking for? our team will trying to help you in futures.
When you say credentials, do you mean the operating system host is taking care of everyting and this is happens while entering the SSID and wifi password, or does it happen after like the user has to enter a user login and password, like we see in starbucks authentications systems that the user has to enter login credentials? If the second option, why do you say the "host os will send these credentials"?
great info, helping me get through some data analytics courses
I configured the portal and the gateway on the same interface in the untrust zone and didn’t need to configure any policies to use the portal to download the software nor to get the use to authenticate to the same interface for the gateway so idk what this is about
Awesome explanation 👏
Doesn't the security rule at 6:30 allow also traffic between dmz and inside which is not what we'd like to?
This makes a lot more sense now!! Thank you!
Great video!
Outstanding Explanation
What interface is the 192.168.1.250 came from? did you assign a Tunnel Interface IP?
Seems to be IP address of outside interface ethernet1/1
Excellent video
Thank you
awesome video so informative...thank you Keith....
Supply the credentials that means identity.
Great
Just a realy nice Video Thanks.
Great video thank you
fantastic video
BRAZZI ERLC AA
Ok I have a 7200 router between PA firewall and ISP, without router in between i can access dmz web server like you just configured, but when i put c7200 router in between firewall and ISP, i can not access web server from internet, so what shall i configure on my c7200 router to grant dmz server access to outside users ?
Hi Keith. I haven't watched mpls playlist yet but I wanna thank you for your work. So detailed.That's what everyone's needed for mpls review. Many appreciations!
Wow, great video. That cleared up the concepts for me a lot!
Well explained 💥
Thank you!
Outstanding as usual!!!
Why did you name your account suck my balls ? Why the f$#@*
this is a super video, clear and detailed and no time wasting, thank you
Nyc
You are legend
Great explination. Thanks
Wish more people could explain security topics as good as you. Congrats and thank you!
Excellent - Thanks
I always thought that a ratio was division. Example: S/N.
Please Upload CCNP Security Videos of INE
will upload soon
ua-cam.com/play/PLYpP0RIHefg8n8r-Xv1bpXzQUo2QTDHUC.html
ua-cam.com/play/PLYpP0RIHefg8n8r-Xv1bpXzQUo2QTDHUC.html
Wowoww copy
🤣 'Promo SM'