- 46
- 32 845
Aegistime Solutions Pvt Ltd
India
Приєднався 2 січ 2020
Welcome to Aegistime solutions official youtube channel
Aegistime solutions Pvt.Ltd is an information security and network infrastructure development company, providing services to SMB and Enterprise level companies. Aegistime solutions Pvt.Ltd provides high quality on site and online services for your daily running business network.
Aegistime solutions Pvt.Ltd is an information security and network infrastructure development company, providing services to SMB and Enterprise level companies. Aegistime solutions Pvt.Ltd provides high quality on site and online services for your daily running business network.
FortiGate DLP Configuration: How to Block Sensitive Content Using Keyword Filtering
In this video, we demonstrate how to configure Data Loss Prevention (DLP) on FortiGate using keyword-based filtering. Learn how to create DLP sensors, set up keyword rules, and apply them effectively to prevent sensitive data leakage.
To enforce a Data Loss Prevention (DLP) rule on HTTPS traffic, you need to enable full SSL inspection and install the firewall's SSL certificate on client devices. This ensures encrypted traffic can be inspected for potential data leaks.
Watch the full tutorial for a step-by-step guide on securing your network using FortiGate's powerful DLP features!
To enforce a Data Loss Prevention (DLP) rule on HTTPS traffic, you need to enable full SSL inspection and install the firewall's SSL certificate on client devices. This ensures encrypted traffic can be inspected for potential data leaks.
Watch the full tutorial for a step-by-step guide on securing your network using FortiGate's powerful DLP features!
Переглядів: 607
Відео
How to Configure DNS Forwarding and Filtering on FortiGate | Step-by-Step Tutorial
Переглядів 256Місяць тому
"Learn how to set up DNS forwarding and enable DNS filtering on FortiGate to enhance network security. In this tutorial, we’ll walk you through configuring the DNS database, setting up a forwarder, and applying a DNS filter to block harmful requests. You’ll understand how to forward DNS requests to system DNS, create security profiles, and enable filtering for botnet protection. Perfect for IT ...
Understanding Router, Modem & Hub: Malayalam Explanation - Part-4
Переглядів 762 місяці тому
In this video, we break down the differences between a router, modem, and hub in simple Malayalam! If you've ever wondered how these devices work or why each one is important, this video is for you. We’ll cover: What each device does: router, modem, and hub The differences between them How they help in setting up networks at home or office Topics Covered: Router: Purpose, how it works, and comm...
"SASE എന്താണ്? | Secure Access Service Edge Explained in Malayalam"
Переглядів 1782 місяці тому
"In this video, we explore SASE (Secure Access Service Edge) and explain its key components and how it delivers secure access services. Learn about the cloud-based security solutions provided by SASE and how it enhances network security, explained in Malayalam. In this video, you'll learn: What is SASE? Key components of SASE Why SASE is a game changer for businesses and organizations How SASE ...
How to Configure FortiSandbox Cloud with FortiGate: Step-by-Step Guide
Переглядів 1992 місяці тому
"In this video, we explore the integration of FortiSandbox Cloud with FortiGate to enhance network security through advanced threat detection and automated sandboxing. Watch as we guide you step-by-step through the configuration process, demonstrating how to leverage sandboxing to detect and mitigate zero-day threats in real-time. This tutorial is perfect for network admins and security profess...
Networking Switches Explained in Malayalam - Part 3 | Types of switches by Jithin Sam John
Переглядів 1492 місяці тому
In this video, we continue exploring the world of network switches in Malayalam! This is Part 3 of the series, where Jithin Sam John dives into the different types of switches, their features, and their practical applications in networking. We cover: 📌 Managed vs. Unmanaged Switches 📌 Layer 2 and Layer 3 Switches 📌 PoE (Power over Ethernet) Switches 📌 Modular and Fixed-Configuration Switches 📌 ...
Kali Linux Penetration Testing Part-4 :Unveiling Recon with SpiderFoot
Переглядів 1552 місяці тому
in this fourth installment of our Pentest Video Series, we delve into SpiderFoot, an open-source reconnaissance tool designed to automate the collection of intelligence from various sources. Configure SpiderFoot: Step-by-step instructions to get started with SpiderFoot on Kali Linux. Perform Reconnaissance: Explore how to use SpiderFoot to gather data on domains, IPs, and more, providing critic...
Networking Types Explained in Malayalam - Part 2 | Introduction Types of Network by Jithin Sam John
Переглядів 2632 місяці тому
🌐 Networking Types Explained in Malayalam - Part 2 | Types of Network Welcome to Part 2 of our series on Networking! In this video, I, Jithin, will guide you through the various types of networks, explaining their characteristics, applications, and differences. Whether you’re a beginner looking to understand networking basics or a tech enthusiast wanting to refresh your knowledge, this video is...
Kali Linux Nmap Script Level Scanning Penetration Testing Part-3 - Deep Dive into NSE
Переглядів 1092 місяці тому
🔍 Pentest Part 3: Nmap Script-Level Scanning (NSE) 🔍 Welcome to Part 3 of my Pentest series! In this video, we dive deep into Nmap's Scripting Engine (NSE) and how it can be used to automate vulnerability detection, service enumeration, and much more. ⚙️ What You’ll Learn: How to use NSE scripts for advanced scanning Key scripts for vulnerability detection and information gathering Real-world e...
Ransomware | Protect Your Files | Easily Add Protected Folders in Windows Defender
Переглядів 652 місяці тому
In this video, we’ll guide you through the process of securing your important files with Windows Defender’s ransomware protection. Learn how to easily add protected folders to shield your data from potential ransomware attacks. We'll walk you through each step, from accessing the settings to managing your protected folders, ensuring that your valuable information remains safe. Whether you're a ...
Cisco HSRP for Gateway Redundancy | Hot Standby Router Protocol | Step-by-Step Guide
Переглядів 1812 місяці тому
In this video, we walk through the configuration of Hot Standby Router Protocol (HSRP) on Cisco switches to ensure network gateway redundancy. Learn how to set up HSRP on Cisco 3650 switches, configure priority levels, and enable preemption to provide seamless failover in case of network device failure. By the end of this tutorial, you'll have a solid understanding of how to configure HSRP to k...
Kali Linux Metasploit Framework Penetration Testing Part-2
Переглядів 1312 місяці тому
In this video, we dive into penetration testing with Kali Linux and Metasploit, focusing on exploiting vulnerabilities in FTP and MySQL services. Learn how to identify open ports, leverage known exploits, and test for weak credentials to understand how attackers target insecure systems. This tutorial is for educational purposes only, aimed at helping you enhance your ethical hacking and cyberse...
Networking Concepts Explained in Malayalam - Part 1 | Introduction to Networking by Jithin Sam John
Переглядів 1692 місяці тому
In this video, Jithin Sam John introduces the fundamental concepts of networking, providing an easy-to-understand explanation for beginners. Learn about key topics such as networking basics, network topologies, and essential components used in networking. This is Part 1 of a series designed to help you build a strong foundation in networking. Stay tuned for more in-depth videos in the series!
Kali Linux Penetration Testing Part-1 : Nmap, Dirb, Enum4Linux & Metasploitable
Переглядів 3592 місяці тому
In this video, we dive deep into the world of ethical hacking using Kali Linux, focusing on powerful tools like Nmap, Dirb, Enum4Linux, and Metasploitable. Whether you're a beginner or looking to sharpen your skills, this comprehensive tutorial will guide you through the essential steps of network scanning, web application enumeration, and vulnerability assessment. What You'll Learn: Nmap: Disc...
Cisco Switch LACP Configuration Step-by-Step | Link Aggregation Protocol Guide
Переглядів 5853 місяці тому
"In this video, we'll walk you through the complete process of configuring LACP (Link Aggregation Control Protocol) on a Cisco switch. LACP allows you to combine multiple physical links into a single logical link for increased bandwidth and redundancy. Whether you're a network admin or learning Cisco, this guide will help you configure LACP efficiently.
Fortigate Secure SD-WAN Application Steering | Microsoft 365 Traffic
Переглядів 2103 місяці тому
Fortigate Secure SD-WAN Application Steering | Microsoft 365 Traffic
Kali Linux : How Easily Weak Passwords Can Be Hacked | Hydra Password Attack Demo on Kali Linux"
Переглядів 5833 місяці тому
Kali Linux : How Easily Weak Passwords Can Be Hacked | Hydra Password Attack Demo on Kali Linux"
"FortiGate User Authentication Setup | Secure Your Network in 5 Easy Steps!"
Переглядів 2903 місяці тому
"FortiGate User Authentication Setup | Secure Your Network in 5 Easy Steps!"
FortiGate botnet blocking tutorial 🔒 - protect your network from attacks now! 🚫🛡️
Переглядів 5613 місяці тому
FortiGate botnet blocking tutorial 🔒 - protect your network from attacks now! 🚫🛡️
"Kali Linux & FortiGate Firewall | Protecting a Web Server with FortiGate IPS"
Переглядів 9533 місяці тому
"Kali Linux & FortiGate Firewall | Protecting a Web Server with FortiGate IPS"
How to enable file filtering in FortiGate: step-by-step guide 👀
Переглядів 3603 місяці тому
How to enable file filtering in FortiGate: step-by-step guide 👀
🚨 FortiGate Admin Fail Login Alerts: Setup Email Notifications in Minutes! 📧
Переглядів 4694 місяці тому
🚨 FortiGate Admin Fail Login Alerts: Setup Email Notifications in Minutes! 📧
🔒 How to Set Up Check Point Content Filtering: Block Social Media, Games, & More 🚫
Переглядів 754 місяці тому
🔒 How to Set Up Check Point Content Filtering: Block Social Media, Games, & More 🚫
"FortiGate Traffic Shaping Mastery: Limit Update Traffic to 1 Mbps and Optimize Your Bandwidth!"
Переглядів 2984 місяці тому
"FortiGate Traffic Shaping Mastery: Limit Update Traffic to 1 Mbps and Optimize Your Bandwidth!"
"Real-Time Internet Bandwidth Monitoring in FortiGate | Setup in 1 Minute! ⏱️📊"
Переглядів 1,2 тис.4 місяці тому
"Real-Time Internet Bandwidth Monitoring in FortiGate | Setup in 1 Minute! ⏱️📊"
"Stay Safe from Spam Phishing Emails: Awareness & Protection Tips"
Переглядів 1584 місяці тому
"Stay Safe from Spam Phishing Emails: Awareness & Protection Tips"
"FortiGate Tutorial: Configuring External Threat Feeds to Block Malicious IPs"
Переглядів 9034 місяці тому
"FortiGate Tutorial: Configuring External Threat Feeds to Block Malicious IPs"
Discover Aegistime Solutions: Expert IT & Network Services for Every Need
Переглядів 2445 місяців тому
Discover Aegistime Solutions: Expert IT & Network Services for Every Need
"Secure Your Network with Our Cyber Security Solutions | Aegistime"
Переглядів 316 місяців тому
"Secure Your Network with Our Cyber Security Solutions | Aegistime"
Detailed Packet tracer class cheyyamo
Thanks sir.❤
❤
Good Luck 🌹... Go ahead 👍
Good information 😊
Thanks for sharing.. 👍
Thanks 👍
Thanks for sharing.. 👍
👍
👌👍
👏👏👏
🎉🎉
ith different vendor switch avumbo support agumo ?>
No, VTP is cisco proprietary. Other Switches like HP , aruba support GVRP.
Hi....brode WhatsApp number onu teramoo...kurach kurach doubts indarunh...
Hi, Feel free to email us with any questions or concerns you may have. support@aegistime.com
Thank you....❤
Always welcome
Good information
Good one
Love 💘💕💖💖
Mic elle
Started this channel with a limited setup. we are trying to improve
Super class
thanks you
Onn pathukke cheythoode paranj manassilaki kond enth speed aaa Kanunnavark koodi paranj tharu engana typakanam enn
thank you for your suggestion. I will explain better in the next video.
2022 ith kanunavar ondo
it keeps giving invalid credentials Im not sure why
did you enter the LDAP administrator’s name along with the domain ?
@@aegistimesolutionspvtltd8788 I put an administrator name and password with domain unless its opposed to be a specific type of admin
@@cocoabread13 check ipconfig and add dns ip
Try domain name/username
Very nice sir . It is possible to change password for users to give permission
Depends on user settings. If set to not change passwords it is not possible.
Bro anti virus network firewall security pati oru video cheyamo
Bro phonil .jad .jar pole file hide cheyan patumo system use cheyumbol
Thank you sir please make more videos ☺️
thankyou
സർ ഞാൻ ഈ ചാനലിൻ്റെ സ്ഥിരം follower ആണ് ഇപ്പൊ വീഡിയോ കാണാത്തത് കൊണ്ട് എനിക്ക് ഇൻ്റർനെറ്റ് ആയിട്ട് ബന്ധപ്പെട്ടുള്ള കാര്യങ്ങൾ അറിയാൻ പറ്റുന്നില്ല പുതിയ വീഡിയോസ് ഉടനെ upload ചെയ്യുമെന്ന് പ്രതീക്ഷിക്കുന്നു
Bro new videos upload please
super. waiting for layer 3 switch configuration
Good information thank you ❤️
Easy procedure. Thank you
Very well explained!
Helped so much. Thank you
Router upayogich ulla oru VLAN network video pratheekshikkunnu 💯🤜🙏
vot.fyi brilliant
Very useful brooo thanks 👍
👍
Very useful info bro ❤️
❤️
Helped ❤️ thanks man
Bro my friend lost his Facebook acc can you make tutorial about account security big fan from Kerala
sure
Very Helpful..👍
Glad to hear that
Thanks bruh This helped✌️✌️✌️♥️
Happy to help
Aegestime fans hit like 👇
Good effort bro.. well explained and keep going
Thanks a ton
Well Explained 👍
Glad you liked it
👍👍