Difference between AI, ML, DL, and Data Science
Tekguru4u
Difference between AI, ML, DL, and Data Science
6:44
Dreaming of Eliminating all risks in an organisation
Tekguru4u
Dreaming of Eliminating all risks in an organisation
0:54
Cloud Data Security Part 1 - CCSP
Tekguru4u
Cloud Data Security Part 1 - CCSP
47:02
Fail Open and Fail Close
Tekguru4u
Fail Open and Fail Close
0:52
sabotage and espionage, Jealous John example
Tekguru4u
sabotage and espionage, Jealous John example
0:47
Control Types and Methods and relation. #CISSP #cism
Tekguru4u
Control Types and Methods and relation. #CISSP #cism
1:35
7 most important Vulnerability Types
Tekguru4u
7 most important Vulnerability Types
0:45
IPS IDS Implementation strategies
Tekguru4u
IPS IDS Implementation strategies
6:22
Threat, Threat agent with Gangster example
Tekguru4u
Threat, Threat agent with Gangster example
1:26
1 Risk treatment with Technical examples
Tekguru4u
1 Risk treatment with Technical examples
0:49
3 Different types of threats to consider risk
Tekguru4u
3 Different types of threats to consider risk
0:45
Web Filter Implementation Strategy
Tekguru4u
Web Filter Implementation Strategy
5:15
One Security Product act as multiple controls Types
Tekguru4u
One Security Product act as multiple controls Types
0:43
Fail Secure and un-secure with Funny Examples
Tekguru4u
Fail Secure and un-secure with Funny Examples
1:34
Risk Treatment with Old CAR Example
Tekguru4u
Risk Treatment with Old CAR Example
0:58
Fortigate All in One Course.
Tekguru4u
Fortigate All in One Course.
24:50
7 Key requirements for Sandbox
Tekguru4u
7 Key requirements for Sandbox
0:48
Sandbox Deployment Types
Tekguru4u
Sandbox Deployment Types
0:58
Prioritise risks instead dreaming to eliminate all
Tekguru4u
Prioritise risks instead dreaming to eliminate all
0:55
6 Step IPS Implementation Strategy
Tekguru4u
6 Step IPS Implementation Strategy
1:00
7 important factors for determining Likelihood for RISK.
Tekguru4u
7 important factors for determining Likelihood for RISK.
0:27
5 steps successful Web Filtering Strategy
Tekguru4u
5 steps successful Web Filtering Strategy
0:59
Inherent Risk vs. Residual Risk: Real-Life Examples.
Tekguru4u
Inherent Risk vs. Residual Risk: Real-Life Examples.
0:42
Security Control methods, types with real life examples
Tekguru4u
Security Control methods, types with real life examples
7:15
7 Likelihood factors in detail  to assess risk
Tekguru4u
7 Likelihood factors in detail to assess risk
2:24
Control Strength
Tekguru4u
Control Strength
0:48
6 Guidelines to use Generative AI
Tekguru4u
6 Guidelines to use Generative AI
0:44
Top 3 Generative AI Risks
Tekguru4u
Top 3 Generative AI Risks
0:48
Benelux CIO CISO Summit Amsterdam feedback
Tekguru4u
Benelux CIO CISO Summit Amsterdam feedback
0:48
Benelux CIO CISO summit amsterdam
Tekguru4u
Benelux CIO CISO summit amsterdam
0:16
3 Zero day vulnerability with real life example
Tekguru4u
3 Zero day vulnerability with real life example
0:48
What is Countermeasure- in easy way.
Tekguru4u
What is Countermeasure- in easy way.
0:51
CIA with funny real life examples
Tekguru4u
CIA with funny real life examples
1:01
Successful DLP implementation
Tekguru4u
Successful DLP implementation
1:01
DLP Strategy
Tekguru4u
DLP Strategy
4:22
Least Privilege, Need to know, real life examples
Tekguru4u
Least Privilege, Need to know, real life examples
3:24
IPSEC All in One - Expert Level knowledge in just 30 minutes.-2022
Tekguru4u
IPSEC All in One - Expert Level knowledge in just 30 minutes.-2022
37:08
4. IPSEC-IKE-Phase 2 Quick Mode-Theory & Wireshark
Tekguru4u
4. IPSEC-IKE-Phase 2 Quick Mode-Theory & Wireshark
2:39
IPSEC-IKE-V1- Unsecure Aggressive Mode- Why to use it
Tekguru4u
IPSEC-IKE-V1- Unsecure Aggressive Mode- Why to use it
1:19
IPSEC IKE-Phases-Modes-Messsages
Tekguru4u
IPSEC IKE-Phases-Modes-Messsages
0:28
3. IPSEC-IKE-Phase-1- wireshark for detailed troubleshoot
Tekguru4u
3. IPSEC-IKE-Phase-1- wireshark for detailed troubleshoot
8:35
2. IPSEC-IKE-Phase-1 -Get-Expert Detailed-Knowledge  for troubleshooting/Interview- Part-2
Tekguru4u
2. IPSEC-IKE-Phase-1 -Get-Expert Detailed-Knowledge for troubleshooting/Interview- Part-2
3:54
IPSEC-IKEv1 vs V2 Why you should switch to IKEV2
Tekguru4u
IPSEC-IKEv1 vs V2 Why you should switch to IKEV2
0:51
Aggregate vs Zones in firewall - how to answer in Interview. #shorts
Tekguru4u
Aggregate vs Zones in firewall - how to answer in Interview. #shorts
0:56
IPSEC-Main-Mode vs Aggressive mode #shorts
Tekguru4u
IPSEC-Main-Mode vs Aggressive mode #shorts
0:36
1. IPSEC-IKE-Phase-1- Wireshark-Detailed- (Troubleshoot and Interview)-2022 - Part-1
Tekguru4u
1. IPSEC-IKE-Phase-1- Wireshark-Detailed- (Troubleshoot and Interview)-2022 - Part-1
22:41
Connect checkpoint to Console using Type C cable
Tekguru4u
Connect checkpoint to Console using Type C cable
1:37
5. Checkpoint-Reset & Factory Default - (3 ways) -2022
Tekguru4u
5. Checkpoint-Reset & Factory Default - (3 ways) -2022
7:24
4. Check Point R-80 Interface and Firewall Policy Configuration -2022
Tekguru4u
4. Check Point R-80 Interface and Firewall Policy Configuration -2022
14:28
3. Check Point-1600-SMB Unboxing , Feature Discussion & Initial Configuration-2022
Tekguru4u
3. Check Point-1600-SMB Unboxing , Feature Discussion & Initial Configuration-2022
6:24
2. Check Point SG-1590 Unboxing - Features -Initial Setup and walkthrough -2022
Tekguru4u
2. Check Point SG-1590 Unboxing - Features -Initial Setup and walkthrough -2022
14:57
1. Check Point-SMB-Devices-Explanation in 6 Minutes
Tekguru4u
1. Check Point-SMB-Devices-Explanation in 6 Minutes
6:37
F5 LTM Performance Virtual Server Packet Flow -2021
Tekguru4u
F5 LTM Performance Virtual Server Packet Flow -2021
6:56
Types of Virtual Server in F5-LTM (Standard Virtual Server packet flow) - 2021
Tekguru4u
Types of Virtual Server in F5-LTM (Standard Virtual Server packet flow) - 2021
7:16
F5-iRule Braces/Brackets Confusing Concept Tricks
Tekguru4u
F5-iRule Braces/Brackets Confusing Concept Tricks
13:11
F5 LTM Commands -Understand Just in 15 minutes- 2020
Tekguru4u
F5 LTM Commands -Understand Just in 15 minutes- 2020
16:54
F5 LTM Persistence- Why Session , Cookies and Persistence is used- 2020
Tekguru4u
F5 LTM Persistence- Why Session , Cookies and Persistence is used- 2020
22:51
Fortigate Firewall Packet Flow - in depth  for troubleshoot
Tekguru4u
Fortigate Firewall Packet Flow - in depth for troubleshoot
44:38
Palo Alto Certification: How to book PaloAlto exam: step by step
Tekguru4u
Palo Alto Certification: How to book PaloAlto exam: step by step
5:43
Fortigate Firewall  Troubleshooting : Become Expert in 30 minutes.
Tekguru4u
Fortigate Firewall Troubleshooting : Become Expert in 30 minutes.
44:44
TCP 3 WAY Handshake: Wireshark & Animation
Tekguru4u
TCP 3 WAY Handshake: Wireshark & Animation
17:40
WordPress Menu: How To Create  Menu In WordPress : (2020)
Tekguru4u
WordPress Menu: How To Create Menu In WordPress : (2020)
5:56
VMWARE LAB SETUP (For any device)
Tekguru4u
VMWARE LAB SETUP (For any device)
11:44
CISCO ASDM: ASDM Error in Win server 2016 and ASDM Upgrade.
Tekguru4u
CISCO ASDM: ASDM Error in Win server 2016 and ASDM Upgrade.
10:51
CISCO ASA Installation: How to Install Cisco ASA and ASDM in VMWARE
Tekguru4u
CISCO ASA Installation: How to Install Cisco ASA and ASDM in VMWARE
17:33
Palo Alto Policy Actions: Palo Alto Firewall Policy Actions (WireShark Packet capture)
Tekguru4u
Palo Alto Policy Actions: Palo Alto Firewall Policy Actions (WireShark Packet capture)
19:59
U Turn NAT: How to configure U turn NAT in Palo Alto  (in Hindi)
Tekguru4u
U Turn NAT: How to configure U turn NAT in Palo Alto (in Hindi)
11:22
Palo Alto Tutorial: Palo Alto "Basic to advance" : Interactive session.
Tekguru4u
Palo Alto Tutorial: Palo Alto "Basic to advance" : Interactive session.
1:05:26
Palo Alto Packet Flow: Palo Alto firewall Packet Flow (Part-2)
Tekguru4u
Palo Alto Packet Flow: Palo Alto firewall Packet Flow (Part-2)
22:51
Palo Alto Packet Flow: Palo Alto firewall Packet flow (Part-1)
Tekguru4u
Palo Alto Packet Flow: Palo Alto firewall Packet flow (Part-1)
25:55
PALO ALTO DDOS: How to configure DDOS in Palo Alto Firewall (Part-1)
Tekguru4u
PALO ALTO DDOS: How to configure DDOS in Palo Alto Firewall (Part-1)
30:09
Checkpoint MDS Installation
Tekguru4u
Checkpoint MDS Installation
8:13
Checkpoint HA: How To Creat Cluster (HA) in Checkpoint Firewall.
Tekguru4u
Checkpoint HA: How To Creat Cluster (HA) in Checkpoint Firewall.
54:09
Fortigate Firewall Troubleshooting
Tekguru4u
Fortigate Firewall Troubleshooting
36:28
F5-LTM: What is F5 LTM.
Tekguru4u
F5-LTM: What is F5 LTM.
13:10
How to Install Fortigate Firewall on VMWARE
Tekguru4u
How to Install Fortigate Firewall on VMWARE
10:39
Check Point Firewall Provider 1 R.80  Part-2-MSP
Tekguru4u
Check Point Firewall Provider 1 R.80 Part-2-MSP
7:23
Fortigate Firewall Interview Questions-  ADOM Modes
Tekguru4u
Fortigate Firewall Interview Questions- ADOM Modes
1:53
Checkpoint Firewall Provider 1 R 80 Part-1
Tekguru4u
Checkpoint Firewall Provider 1 R 80 Part-1
7:31