Video: Protecting your Home Network with the Sophos UTM Home Edition
https://youtu.be/dKo7sN4_WeY
https://youtu.be/dKo7sN4_WeY
In this video we take a look at what it takes to deploy IBNS 2.0 configurations for secure network access. Please refer to my previous post for a more detailed…
In this knowledge transfer, we take a look at what a Phishing attack is, the different types of Phishing attacks and how one can protect themselves from such an attack.…
In this video session, I cover how to configure L2L VPN's on Cisco ASA Firewalls. I have included the presentation from the video along with the essential configurations used to…
In this video, I discuss what a DMZ is and how they're typically deployed from an architecture perspective. We also take a look at how to configure a basic DMZ…
In the video, I show you how you can leverage the ACS to ISE migration tool to migrate objects from ACS to ISE. As mentioned in the video, a few…
In this Vlog, I discuss how Ansible can be leveraged by engineers to automate configurations and save time. More about setting up Ansible: https://wp.me/p8lfsH-mn Ansible Documentation: http://docs.ansible.com/