House Of Secure Network
House Of Secure Network
  • Видео 21
  • Просмотров 65 288
What is Web Content Filtering? Why use a Web Content Filter?
In this video, you will learn:
1) What is Web Content Filtering?
2) What is a Web Content Filter or a proxy?
3) How to use a Web Content Filter?
4) Benefits of a Web Content Filter
Web content filtering is a technique that blocks and scans access to inappropriate or unsafe web content. It is essentially used to restrict prohibited websites in an organisation and also protect minors from accessing adult content.
Просмотров: 2 531

Видео

Web Application Firewall (WAF) vs Network Firewall
Просмотров 23 тыс.3 года назад
What is a Web Application Firewall? A WAF is a layer 7 (application layer)firewall that protects web based attacks like cross site scripting, XML attacks and all the OWASP top 10 vulnerabilities. The WAF is used to protect web applications that ideally run HTTP and HTTPS traffic. What is a Network Firewall? A network firewall is layer 3 firewall that protects non-web based traffic. All traffic ...
How to design and setup a Zero-Trust Cloud Security Architecture?
Просмотров 1,5 тыс.3 года назад
How to design and setup a Zero-Trust Cloud Security Architecture? There is a thin line between how zero-trust model works on an on-premise datacenter setup and how it works on a cloud or hybrid cloud datacenter setup. This video explains what exactly is needed to achieve a zero-trust state of infrastructure on cloud or hybrid cloud datacenter setup. Zero Trust is a security concept that require...
Web Application Security - Best Practices
Просмотров 7 тыс.4 года назад
In this video, you will learn what is Web Application Security and why is it necessary in today's world. Web application security is a central component of any web-based business. The global nature of the Internet exposes web properties to attack from different locations and various levels of scale and complexity. Web application security deals specifically with the security surrounding website...
What is MITRE ATT&CK Framework?
Просмотров 5 тыс.4 года назад
In this video, you will learn what is MITRE ATT&CK and how is it useful for organizations around the globe to safeguard their environment. MITRE ATT&CK Framework is specifically designed for effective cybersecurity and develop a safer world. It is a non for profit organization fully funded by the US Govt to be globally accessible by anyone in the world. Checkout the below link for more details ...
How to create an IAM user in AWS?
Просмотров 2,7 тыс.4 года назад
In this video, you will learn how to create an Identity & Access Management User in AWS. You can create one or more IAM users in your AWS account. You might create an IAM user when someone joins your team, or when you create a new application that needs to make API calls to AWS. You can use the AWS Management Console to create IAM users. To create one or more IAM users (console) 1) Sign in to t...
How to create a Virtual Network in Azure
Просмотров 454 года назад
In this video, you will learn how to create a virtual network in Azure. Topics covered in this video are: 1) Create a resource group in Azure 2) Create a virtual network in Azure I will take you through the Azure portal and explain you step by step the process to create a simple virtual network. Every virtual network will reside on a resource group. Hence, I will also explain how to create the ...
Top 10 In-Demand Cyber Security Certifications in 2020
Просмотров 1234 года назад
In this video, you'll learn which are the most demanding Cyber Security Certifications in 2020. These are based on my industry experience and market research. 10) Cisco Certified Network Professional - Security www.cisco.com/c/en/us/training-events/training-certifications/certifications/professional/ccnp-security-v2.html 9) CompTIA Security www.comptia.org/certifications/security 8) Offensive S...
Azure Security Best Practices
Просмотров 2824 года назад
In this video, you will learn Azure Security Best Practices. 1) Security Center 2) Key Vault 3) Web Application Firewall 4) Multi-Factor Authentication 5) Encryption 6) Virtual Network Visit House Of Secure Network to learn more about Cloud Security and Cyber Security technologies and solutions - ruclips.net/channel/UCAuX95C67J5xx8s0bADQh6A?view_as=subscriber
How to create a VPC in AWS
Просмотров 1814 года назад
In this video, you will learn How to Create New VPC from scratch in two different ways. 1) With 2 private subnets and a NAT gateway 2) With 2 public subnets and associate them with an Elastic IP address Watch our previous videos: AWS VPC Security Best Practices - ruclips.net/video/OrGKdAOyYp4/видео.html AWS Security Services - Overview - ruclips.net/video/Ui9pv-QMkYU/видео.html Subscribe to Hou...
AWS VPC Security Best Practices
Просмотров 5414 года назад
Here's a quick view of what are the Security Best Practices for your AWS VPC. 1) Use Multiple Availability Zones 2) Use Security Groups 3) Use NACLs 4) Use IAM Policies 5) Use CloudWatch 6) Use Flow logs In my next video, I will show you how to actually implement these best practices. Keep watching House Of Secure Network!
House Of Secure Network - Teaser!
Просмотров 1994 года назад
If you want to learn Cybersecurity & Cloud Security or would like to know about the latest solutions subscribe to: House Of Secure Network Right Now !!!!
AWS Security Services - Overview
Просмотров 17 тыс.4 года назад
This video will give you a detailed introduction of all AWS Security Services. Each of these services are classified as: 1) Identity & Access Management Amazon Cognito AWS Single-Sign On AWS Directory Service AWS Resource Access Manager 2) Infrastructure Protection AWS Shield AWS Firewall Manager AWS Web Application Firewall 3) Detective Controls AWS security Hub Amazon GuardDuty Amazon Inspect...
Threats & Threat Detection Solutions
Просмотров 3074 года назад
In this video, learn about the latest threats in 2020 with an in detail analysis of each of these threats by its nature. All threats come with different set of behavior. Find out the nature of each of these threats in this video with graphical examples. Gartner EndPoint Protection Solutions www.gartner.com/en/documents/3956420 Magic Quadrant www.microsoft.com/security/blog/2019/08/23/gartner-na...
Top 10 In-Demand Cybersecurity Jobs in 2020
Просмотров 1604 года назад
Top 10 In-Demand Cybersecurity Jobs in 2020. Top 10 In-Demand Cybersecurity Jobs Roles in 2020. Top 10 Highest Paying Cybersecurity Jobs in 2020. 10. Technical Support 9. Network Architect 8. InfoSec Analyst 7. Cybersecurity Analyst 6. Cloud Engineer 5. Migration Expert 4. Cloud Security Expert 3. Ethical Hacker 2. Azure Security Architect 1. AWS Security Architect
Cloud Data Protection Tutorial | Data Protection Tutorial - Part 2
Просмотров 1734 года назад
Cloud Data Protection Tutorial | Data Protection Tutorial - Part 2
Cloud Data Protection Tutorial | Data Protection Tutorial - Part 1
Просмотров 4704 года назад
Cloud Data Protection Tutorial | Data Protection Tutorial - Part 1
Data Protection Tutorial and Solutions - Sneak Peek 🎬🔥
Просмотров 664 года назад
Data Protection Tutorial and Solutions - Sneak Peek 🎬🔥
Introduction to Cloud Security | Cloud Security Fundamentals | Cloud Computing Tutorial
Просмотров 3,1 тыс.4 года назад
Introduction to Cloud Security | Cloud Security Fundamentals | Cloud Computing Tutorial
Stop using Zoom & avoid Zoom Bombing ! 5 Best Web Conferencing tools over Zoom!!!
Просмотров 2064 года назад
Stop using Zoom & avoid Zoom Bombing ! 5 Best Web Conferencing tools over Zoom!!!
How to secure your VPN ? 5 Best VPN Solutions !!!
Просмотров 864 года назад
How to secure your VPN ? 5 Best VPN Solutions !!!

Комментарии

  • @gauravparakh1917
    @gauravparakh1917 14 дней назад

    Guardduty and detective?

  • @joeyjeo
    @joeyjeo 5 месяцев назад

    J'utilise le pare-feu d'application web de Hedgus, et il est très efficace pour sécuriser mes applications web. Ça vaut le coup d'essayer si vous cherchez une protection fiable

  • @mikebrown5142
    @mikebrown5142 8 месяцев назад

    Very good video, thank you very much! God bless you - Matthew 11:28

  • @PrachiKhadke
    @PrachiKhadke 8 месяцев назад

    logically, I get what you mean.... i'm just wondering about differences in the traffic that gets blocked at WAF vs network layer firewall.... can you give some examples?

  • @HavingFunWithAvyan
    @HavingFunWithAvyan 10 месяцев назад

    would Macie comes under Detective control rather than Data Protection

  • @mikulasriecky9612
    @mikulasriecky9612 Год назад

    Hi, shouldn't WAF be behind the perimeter FW? Thanks

  • @ahmedu7605
    @ahmedu7605 Год назад

    Hey, Your videos are awesome. Please delete the music behind the videos. It annoys lot when trying to concentrate what you are explaining. I couldn't higher the volume due to the music and I couldn't lower the volume because I can't get what you are saying.

  • @sadaf243
    @sadaf243 Год назад

    these are good videos, you should have uploaded more

  • @TomKuhl
    @TomKuhl Год назад

    Thanks for the video and greets from Germany

  • @mysocial
    @mysocial 2 года назад

    The WAF come usually after the NWF. Never saw WAF coming first ! From there, I won't trust personally this channel. Sounds a beginner summarizing his current skills

    • @houseofsecurenetwork6597
      @houseofsecurenetwork6597 2 года назад

      Thanks for letting me know. There are multiple ways to design a network architecture. I hope you’re experienced enough to know that!

    • @dmezzio
      @dmezzio Год назад

      well, I do not agree with this flow. To me, it does not make any sense at all if we have to waste more resource to protect layer 7 and then to lower level. Security has to start from the lowest level, where the resource consumption and process can be performed faster and more efficiently. So to me, the traffic has to hit network firewall first and then WAF.

    • @imhotep1613
      @imhotep1613 Год назад

      ​@dmezzio Thank you for your comment. In other words, the network won't be secured if we place WAF before traditional or network FW ? The I understand your approach is like saying both all network based traffic and web applications traffic will go thru NWF ( network Firewall ) First the both network traffic and applications traffic go through WAF in order to reach the server ? I think this channel explanation is simple . It's like his network architecture is designed in such a way that web applications user traffic go straight to waf first then that traffic goes to network firewall which in my opinion I don't see any security issues here unless you have one to share with us . Thanks

  • @Reallywowentertainment
    @Reallywowentertainment 2 года назад

    Nice to meet you.. I want to talk you and hope for your reply

  • @Reallywowentertainment
    @Reallywowentertainment 2 года назад

    Hey.

  • @martinh9099
    @martinh9099 2 года назад

    Shouldn't the WAF be behind the network firewall rather than in front of it?

    • @houseofsecurenetwork6597
      @houseofsecurenetwork6597 2 года назад

      The WAF works on layer 7 and a network firewall on layer 3,4.

    • @kenrow3604
      @kenrow3604 2 года назад

      I am also of the opinion that the WAF should be behind the Network Firewall. Unless the App is on some third-party server like AWS... If it is on-site, it will be behind the Network Firewall.

  • @spangley2817
    @spangley2817 2 года назад

    If my server is compromised /cyber targeted and imposter created alias though reported to AWS through server and email the use of malicious cert on comcast router UI redirects to AWS imposter/false tech support - I can't report the continued hack!

  • @tripjet
    @tripjet 2 года назад

    what are the most affordable WAF's over there ?

    • @houseofsecurenetwork6597
      @houseofsecurenetwork6597 2 года назад

      It all depends on what features do you need in a WAF and your budget.

    • @tripjet
      @tripjet 2 года назад

      @@houseofsecurenetwork6597 need to scan the web site and remove all spam.

  • @pradeepp2474
    @pradeepp2474 2 года назад

    Very simple and awesome explanation

  • @gyangaha109
    @gyangaha109 2 года назад

    Thank you

  • @dhananjaypatil2278
    @dhananjaypatil2278 2 года назад

    Good video.

  • @sanooosai
    @sanooosai 2 года назад

    thank you for briefing security services

  • @MrEmityushkin
    @MrEmityushkin 3 года назад

    +

  • @dhanushkohlinagaraj
    @dhanushkohlinagaraj 3 года назад

  • @Jambajakumba
    @Jambajakumba 3 года назад

    Definitely waiting on more Cloud content from you, Thanks mate keep it going👏🏼👏🏼

  • @ramanagudluru
    @ramanagudluru 3 года назад

    Thanks 4 ur video ur voice is so clear i can understand each and every word .thanks

  • @yahyasarifudin2679
    @yahyasarifudin2679 3 года назад

    Hey nice presentation! - hey can u give review bout waf hardware.. thxs best regards

  • @darshanbaing6365
    @darshanbaing6365 4 года назад

    Pls upload your video on all above mentioned fractures...

    • @houseofsecurenetwork6597
      @houseofsecurenetwork6597 4 года назад

      Sure, they're coming soon!

    • @archerjesiah6539
      @archerjesiah6539 3 года назад

      i realize it is kind of off topic but does anybody know of a good place to stream new tv shows online?

    • @adanjayce8971
      @adanjayce8971 3 года назад

      @Archer Jesiah Lately I have been using Flixzone. Just google for it :)

    • @merrickscott6175
      @merrickscott6175 3 года назад

      @Archer Jesiah I watch on flixzone. Just search on google for it :)

  • @sairajstalwart
    @sairajstalwart 4 года назад

    Well said about Vpc 👍

  • @mayankbajaj277
    @mayankbajaj277 4 года назад

    When is it coming

  • @sairajstalwart
    @sairajstalwart 4 года назад

    Got some new info .. thanks 😊👍

  • @sairajstalwart
    @sairajstalwart 4 года назад

    Video is easy to understand and well designed .... curious to know on cloud security further !!

  • @sairajstalwart
    @sairajstalwart 4 года назад

    Good work Nikesh...Keep going ... All the best