SecureNet
SecureNet
  • 430
  • 54 851
51 Cyberthreat Protection Services: How to Stop a Cyberattack
Right Approach to Stop a Cyberattack
Enterprises worldwide have spent billions on firewalls, yet breaches are increasing. The problem is simple: traditional firewall-centric architectures are no longer effective against cyber threats. Then, what should we do to stop cyberattacks?
Переглядів: 5

Відео

50. Cyberthreat Protection Services: Stages of Cyberattack Framework
Переглядів 1414 днів тому
Understanding how cyberattacks unfold is crucial to defending against them! 🚨 In this video, we break down the stages of a cyberattack framework and show you how Zscaler’s security services identify, block, and mitigate these attacks at each phase. From initial infiltration to data exfiltration, we’ll guide you through the anatomy of a cyberattack and how Zscaler ensures your digital assets sta...
49. Cyberthreat Protection Services: How Cyberattacks Happen
Переглядів 914 днів тому
Cyberthreat Protection Services: eLearning This module is divided into two main sections, each crafted to build your understanding gradually. 1 Cybersecurity Overview: We begin by introducing you to the current cyberthreat landscape. You will also learn about the cyberthreat protection services Zscaler provides to eliminate these attacks through our Zero Trust Exchange platform. 2 Zscaler’s Cyb...
48 Zscaler Digital Experience: Use Cases
Переглядів 2121 день тому
Zscaler addresses both of these use cases and more with its powerful end-user monitoring capabilities. In the video shown below, hear about six common use cases that ZDX addresses including: 1. Real-time Detection of SaaS Outages 2. Baselining Performance Between Office and Working from Anywhere 3. Detecting Employee Home Wi-Fi Issues 4. Detecting High CPU Causing Application Degradation 5. Vis...
47 Zscaler Digital Experience Y Engine & ZDX APIs
Переглядів 2028 днів тому
ZDX’s Y-Engine (Automated Root Cause Analysis) allows an organization to automatically isolate root causes of performance issues, spend less time troubleshooting, eliminate finger-pointing, and get users back to work faster. Whereas, ZDX’s APIs integrate digital experience insights with popular ITSM tools like ServiceNow to provide additional insights and trigger remediation workflows. The Y-En...
46 Zscaler Digital Experience: eLearning Software & Device Inventory
Переглядів 828 днів тому
46 Zscaler Digital Experience: eLearning Software & Device Inventory
45 Zscaler Digital Experience: UCaaS Monitoring
Переглядів 1528 днів тому
In this video, the next feature we will discuss as part of the Zscaler Digital Experience Solution is Unified Communications as a Service or UCOSS Monitoring. Let's start by looking at some of the typical challenges user face when they are in a meeting and how ZTX can help. A user could face different types of issues when he or she is in a meeting. There could be issues related to audio call qu...
44 Zscaler Digital Experience: Visibility in SaaS and private applications
Переглядів 1928 днів тому
Zscaler Digital Experience: Visibility in SaaS and private applications #zscaler
43. Zscaler Digital Experience: ZDX Architecture Overview
Переглядів 47Місяць тому
Understanding the basics of ZDX’s architecture is important as it will help you to more clearly navigate, configure, and troubleshoot the various features, functionalities, and issues that arise within the Digital Experience console. Key components include destination applications monitored by ZDX, the endpoints with ZDX enabled, the Telemetry and Policy Gateway (TPG), and the ZDX Analytics Eng...
42 Zscaler Digital Experience: introduction
Переглядів 24Місяць тому
The ZDX Score is calculated by observing the Page Fetch Time and availability of an application for a given user. This is then baselined across all the users in that geolocation (Country) accessing that particular application. ZDX periodically sends a probe to an application, by default, every 5 minutes. For each 5-minute period, measurements are taken and given a numerical value from 1 to 100....
41 Zscaler Digital Experience eLearning Audio overview
Переглядів 19Місяць тому
Zscaler Digital Experience: eLearning Welcome to Zscaler Digital Experience (ZDX)! This module is designed to guide you through the essentials of how ZDX operates and the process behind creating secure and fluid digital experiences for users everywhere. This module is divided into two main sections, each crafted to build your understanding gradually: 1 Introduction to ZDX & its Architecture Ove...
40 Platform Services eLearning Summarize
Переглядів 17Місяць тому
Glossary: Bring Your Own Device (BYOD): A policy that enables employees in an organization to use their personally owned devices for work-related activities. Certificate Authority (CA): A trusted entity that issues Secure Sockets Layer (SSL) certificates. Cloud Sandbox: A technology that allows you to detect advanced threats on a computer. Data Loss Prevention (DLP): A security solution that id...
39 Platform Services: Policy for Zscaler Digital Experience
Переглядів 28Місяць тому
Zscaler Digital Experience policy determines probe activation based on user attributes like groups, users, locations, and devices or exclusion criteria, such as avoiding probe activation for specific user groups or locations, like in-office scenarios.
38 Platform Services: Access Policy Criteria for Zscaler Private Access
Переглядів 26Місяць тому
Application segments, SAML/SCIM attributes, client types, posture profiles, and trusted networks are logically combined to trigger a rule. The Timeout policy is triggered for business reasons, and criteria include application names, segments, posture profiles, client types, and SAML/SCIM attributes. The Inspection policy applies to HTTP and HTTPS applications where Inspection is enabled, and ac...
37 Platform Services Private Access Order of Operations
Переглядів 502 місяці тому
ZPA enables secure access to internal applications without requiring a traditional VPN. The policy for ZPA involves defining rules and configurations to ensure secure and controlled access to specific resources within an organization's network. Here's a general overview of the policy aspects for Zscaler Private Access: Private Access Order of Operations Analyzing Access Policy Criteria for ZPA ...
36 Platform Services: Policy Configuration and Actions in NAT and Intrusion Prevention System (IPS)
Переглядів 242 місяці тому
36 Platform Services: Policy Configuration and Actions in NAT and Intrusion Prevention System (IPS)
35. Platform Services: Security Policy and Firewall Rules in ZIA
Переглядів 272 місяці тому
35. Platform Services: Security Policy and Firewall Rules in ZIA
34 Policy Framework: Web Proxy Rule
Переглядів 332 місяці тому
34 Policy Framework: Web Proxy Rule
33 Policy Framework and Operational Flow in ZIA
Переглядів 632 місяці тому
33 Policy Framework and Operational Flow in ZIA
32 Platform Services: Policy Framework
Переглядів 432 місяці тому
32 Platform Services: Policy Framework
31 Deploying TLS Inspection
Переглядів 642 місяці тому
31 Deploying TLS Inspection
30 TLS Inspection Pillars and Functionalities
Переглядів 442 місяці тому
30 TLS Inspection Pillars and Functionalities
29 Platform Services, Audio Lecture
Переглядів 332 місяці тому
29 Platform Services, Audio Lecture
28 LAB Connectivity Services Self Guided Lab
Переглядів 492 місяці тому
28 LAB Connectivity Services Self Guided Lab
27 ZPA summarize what we have learned in this section
Переглядів 232 місяці тому
27 ZPA summarize what we have learned in this section
26. Private Application App Connector Demonstration
Переглядів 932 місяці тому
26. Private Application App Connector Demonstration
25. Deploying App Connectors With Examples
Переглядів 442 місяці тому
25. Deploying App Connectors With Examples
24 Connectivity Services App Connectors
Переглядів 442 місяці тому
24 Connectivity Services App Connectors
23 Zscaler Client Connector User Interface Demonstration
Переглядів 1382 місяці тому
23 Zscaler Client Connector User Interface Demonstration
22 Connectivity Services Installing Zscaler Client Connector
Переглядів 1262 місяці тому
22 Connectivity Services Installing Zscaler Client Connector

КОМЕНТАРІ

  • @subhransusekharswain4202
    @subhransusekharswain4202 6 днів тому

    Awesome

  • @SaVaGe-_-GuYz
    @SaVaGe-_-GuYz 10 днів тому

    ty man really helpful

  • @ChristinaBate-x5h
    @ChristinaBate-x5h 13 днів тому

    Nicolas Trail

  • @BurkeTheobald
    @BurkeTheobald 16 днів тому

    171 Skiles Turnpike

  • @LenaSabina-ur6he
    @LenaSabina-ur6he 27 днів тому

    29087 Lucinda Light

  • @rons7555
    @rons7555 28 днів тому

    Thanks for this very informative video. Sincerely appreciate it, thanks.

  • @irvingsanchez4258
    @irvingsanchez4258 Місяць тому

    I have a question: You need to add BOB in Device - user

  • @LilyDoris-q1h
    @LilyDoris-q1h Місяць тому

    6867 Senger Road

  • @Klavin2
    @Klavin2 Місяць тому

    Did the password change? Not able to log in

    • @SecureNet_Neer
      @SecureNet_Neer Місяць тому

      Hi there, Hurmm, it maybe because that was an online LAB, But no worry, the LAB videos are coming soon with the latest credentials. Stay tuned for the further videos... Thanks

  • @steveroberts402
    @steveroberts402 Місяць тому

    PLEASE UPLOAD VIDEO 3

  • @md9936
    @md9936 Місяць тому

    Thanks for sharing

  • @oneloveafrica8860
    @oneloveafrica8860 Місяць тому

    it help me a lot tanks

  • @MichaelPerez-y2c
    @MichaelPerez-y2c Місяць тому

    Carmel Creek

  • @idan226
    @idan226 Місяць тому

    so what is being used in todays switching when they forward a frame?

  • @tksdidi
    @tksdidi 2 місяці тому

    Very good knowledge transfer, congrats and success in your life.

  • @haidari111
    @haidari111 2 місяці тому

    your video is great but some of people will not very will because you accent is a little deferent It is my idea bro It's not for your bothering

    • @SecureNet_Neer
      @SecureNet_Neer Місяць тому

      Thanks for the point, and good to here that, we will trying to get more accent. mean while which type of accent you are looking for? our team will trying to help you in futures.

  • @guilhermegavioli5647
    @guilhermegavioli5647 2 місяці тому

    When you say credentials, do you mean the operating system host is taking care of everyting and this is happens while entering the SSID and wifi password, or does it happen after like the user has to enter a user login and password, like we see in starbucks authentications systems that the user has to enter login credentials? If the second option, why do you say the "host os will send these credentials"?

  • @warmdusk
    @warmdusk 2 місяці тому

    great info, helping me get through some data analytics courses

  • @Madmok128
    @Madmok128 2 місяці тому

    I configured the portal and the gateway on the same interface in the untrust zone and didn’t need to configure any policies to use the portal to download the software nor to get the use to authenticate to the same interface for the gateway so idk what this is about

  • @mohanrajan3142
    @mohanrajan3142 2 місяці тому

    Awesome explanation 👏

  • @janzahradnik8380
    @janzahradnik8380 2 місяці тому

    Doesn't the security rule at 6:30 allow also traffic between dmz and inside which is not what we'd like to?

  • @TyajaTamisha
    @TyajaTamisha 3 місяці тому

    This makes a lot more sense now!! Thank you!

  • @fastrobreetus
    @fastrobreetus 3 місяці тому

    Great video!

  • @charlesmiller2341
    @charlesmiller2341 3 місяці тому

    Outstanding Explanation

  • @nevermindthisthing6372
    @nevermindthisthing6372 3 місяці тому

    What interface is the 192.168.1.250 came from? did you assign a Tunnel Interface IP?

    • @janzahradnik8380
      @janzahradnik8380 2 місяці тому

      Seems to be IP address of outside interface ethernet1/1

  • @charlesmiller2341
    @charlesmiller2341 4 місяці тому

    Excellent video

  • @umamahp1
    @umamahp1 5 місяців тому

    Thank you

  • @Oomtet
    @Oomtet 5 місяців тому

    awesome video so informative...thank you Keith....

  • @tanmoymallick8244
    @tanmoymallick8244 5 місяців тому

    Supply the credentials that means identity.

  • @shirdelipworld1371
    @shirdelipworld1371 5 місяців тому

    Great

  • @ValPage-o9r
    @ValPage-o9r 6 місяців тому

    Just a realy nice Video Thanks.

  • @TheBiggieb89
    @TheBiggieb89 6 місяців тому

    Great video thank you

  • @okrevalley
    @okrevalley 6 місяців тому

    fantastic video

  • @gunhatornie
    @gunhatornie 6 місяців тому

    BRAZZI ERLC AA

  • @AbbasAbid-m8x
    @AbbasAbid-m8x 7 місяців тому

    Ok I have a 7200 router between PA firewall and ISP, without router in between i can access dmz web server like you just configured, but when i put c7200 router in between firewall and ISP, i can not access web server from internet, so what shall i configure on my c7200 router to grant dmz server access to outside users ?

  • @antvad1313
    @antvad1313 7 місяців тому

    Hi Keith. I haven't watched mpls playlist yet but I wanna thank you for your work. So detailed.That's what everyone's needed for mpls review. Many appreciations!

  • @patrickallison1283
    @patrickallison1283 7 місяців тому

    Wow, great video. That cleared up the concepts for me a lot!

  • @Zoorro07
    @Zoorro07 8 місяців тому

    Well explained 💥

  • @juniorcrawley321
    @juniorcrawley321 8 місяців тому

    Thank you!

  • @suck-myballs1152
    @suck-myballs1152 8 місяців тому

    Outstanding as usual!!!

  • @atcmoran7097
    @atcmoran7097 8 місяців тому

    this is a super video, clear and detailed and no time wasting, thank you

  • @aakashofficialstudy9610
    @aakashofficialstudy9610 8 місяців тому

    Nyc

  • @dhanush.h3010
    @dhanush.h3010 9 місяців тому

    You are legend

  • @krishanr
    @krishanr 9 місяців тому

    Great explination. Thanks

  • @Darkhet61
    @Darkhet61 9 місяців тому

    Wish more people could explain security topics as good as you. Congrats and thank you!

  • @rogerdoyle6899
    @rogerdoyle6899 11 місяців тому

    Excellent - Thanks

  • @josephjefferson2617
    @josephjefferson2617 11 місяців тому

    I always thought that a ratio was division. Example: S/N.

  • @sadiqnasiri1
    @sadiqnasiri1 Рік тому

    Please Upload CCNP Security Videos of INE

  • @kirannolan
    @kirannolan Рік тому

    Wowoww copy

  • @samanthamalone6768
    @samanthamalone6768 Рік тому

    🤣 'Promo SM'