3:57How to Secure Public Web Servers on FortiGate Using VIP + WAF + IPSAegistime Solutions Pvt Ltd757 views·5 months ago
0:49AegisCyberFit – Cybersecurity for Small Business Protect Your Network TodayAegistime Solutions Pvt Ltd53 views·9 months ago
3:33FortiGate DLP Configuration How to Block Sensitive Content Using Keyword FilteringAegistime Solutions Pvt Ltd6.3K views·1 year ago
1:41How to Configure DNS Forwarding and Filtering on FortiGate Step-by-Step TutorialAegistime Solutions Pvt Ltd2.5K views·1 year ago
12:28Understanding Router, Modem & Hub Malayalam Explanation - Part-4Aegistime Solutions Pvt Ltd202 views·1 year ago
18:19SASE എന്താണ് Secure Access Service Edge Explained in MalayalamAegistime Solutions Pvt Ltd333 views·1 year ago
1:59How to Configure FortiSandbox Cloud with FortiGate Step-by-Step GuideAegistime Solutions Pvt Ltd1.8K views·1 year ago
9:48Networking Switches Explained in Malayalam - Part 3 Types of switches by Jithin Sam JohnAegistime Solutions Pvt Ltd247 views·1 year ago
10:39Kali Linux Penetration Testing Part-4 Unveiling Recon with SpiderFootAegistime Solutions Pvt Ltd248 views·1 year ago
21:51Networking Types Explained in Malayalam - Part 2 Introduction Types of Network by Jithin Sam JohnAegistime Solutions Pvt Ltd315 views·1 year ago
12:14Kali Linux Nmap Script Level Scanning Penetration Testing Part-3 – Deep Dive into NSEAegistime Solutions Pvt Ltd128 views·1 year ago
1:18Ransomware Protect Your Files Easily Add Protected Folders in Windows DefenderAegistime Solutions Pvt Ltd69 views·1 year ago
15:29Cisco HSRP for Gateway Redundancy Hot Standby Router Protocol Step-by-Step GuideAegistime Solutions Pvt Ltd280 views·1 year ago
13:11Kali Linux Metasploit Framework Penetration Testing Part-2Aegistime Solutions Pvt Ltd156 views·1 year ago
17:54Networking Concepts Explained in Malayalam - Part 1 Introduction to Networking by Jithin Sam JohnAegistime Solutions Pvt Ltd263 views·1 year ago
17:01Kali Linux Penetration Testing Part-1 Nmap, Dirb, Enum4Linux & MetasploitableAegistime Solutions Pvt Ltd413 views·1 year ago
6:06Cisco Switch LACP Configuration Step-by-Step Link Aggregation Protocol GuideAegistime Solutions Pvt Ltd2.5K views·1 year ago
3:04Fortigate Secure SD-WAN Application Steering Microsoft 365 TrafficAegistime Solutions Pvt Ltd877 views·1 year ago
8:35Kali Linux How Easily Weak Passwords Can Be Hacked Hydra Password Attack Demo on Kali LinuxAegistime Solutions Pvt Ltd679 views·1 year ago
2:16FortiGate User Authentication Setup Secure Your Network in 5 Easy Steps!Aegistime Solutions Pvt Ltd996 views·1 year ago
1:59FortiGate botnet blocking tutorial 🔒 – protect your network from attacks now! 🚫🛡️Aegistime Solutions Pvt Ltd1.7K views·1 year ago
8:27Kali Linux & FortiGate Firewall Protecting a Web Server with FortiGate IPSAegistime Solutions Pvt Ltd2.2K views·1 year ago
2:15How to enable file filtering in FortiGate step-by-step guide 👀Aegistime Solutions Pvt Ltd828 views·1 year ago
3:21🚨 FortiGate Admin Fail Login Alerts Setup Email Notifications in Minutes! 📧Aegistime Solutions Pvt Ltd1.3K views·1 year ago
2:04🔒 How to Set Up Check Point Content Filtering Block Social Media, Games, & More 🚫Aegistime Solutions Pvt Ltd260 views·1 year ago
3:09FortiGate Traffic Shaping Mastery Limit Update Traffic to 1 Mbps and Optimize Your Bandwidth!Aegistime Solutions Pvt Ltd1.6K views·1 year ago
1:17Real-Time Internet Bandwidth Monitoring in FortiGate Setup in 1 Minute! ⏱️📊Aegistime Solutions Pvt Ltd7.6K views·1 year ago
9:59Stay Safe from Spam Phishing Emails Awareness & Protection TipsAegistime Solutions Pvt Ltd160 views·1 year ago
3:09FortiGate Tutorial Configuring External Threat Feeds to Block Malicious IPsAegistime Solutions Pvt Ltd4.9K views·1 year ago
1:16Discover Aegistime Solutions Expert IT & Network Services for Every NeedAegistime Solutions Pvt Ltd348 views·1 year ago