8. Miscellaneous Topics In this lecture, we’ll talk about some miscellaneous topics in Power Automate flows. So, first, we can install the Power Automate app on our mobile device and begin performing various actions. Some of the tasks you can complete with the mobile app include turning off and on the flows. See when the […]
1. Welcome Congratulations on completing the Powernap’s section of the course! Now you have completed database security and Power Apps. And now we’ll move on to the power automation section. Thank you. 2. Flows & BPF (Business Process Flow) This lecture is an introduction to Power Automate Flows and includes some information about Business Process […]
3. Portal Security In this lecture, we’ll talk about portal security. So, this is related to the objective of configuring portal security, including web roles and page access. So, this is the first slab we’ll do. These are the steps. We’ll add a web page with a list component that shows account entities. So we’ll […]
1. Welcome So congratulations on completing the Power Beam section of the course! We are almost done with the course. You have looked at database security, power apps, power automate, power virtual agents, and power VI. Now we’ll talk about the AI and ML parts of the course. And then we’ll have a few lectures […]
4. 10.4 Configuration GlobalProtect gateway In this video, we are covering PCNSA 210, which is our chapter ten global Protect remote access VPN. Now this is the fifth video of chapter ten which is 10.5 configuration of global protect agents. Now after all our configuration that we did on the previous lessons we did global […]
1. 10.1 Global Protect overview In this video, we are covering PCNSA 210, which is our chapter ten on Global Protect remote access VPN. Now, this is the second video of chapter ten, which is 10.2. Preparing the firewall for Global protect. Now, to prepare the firewall for Global Protect, we need to configure four […]
1. 9.1 User-ID overview In this video, we are covering PCNSA 210, and this is our chapter nine user ID. Now this is the first video of chapter nine, which is nine plus one user ID. Overview user ID Purpose now dynamic nature of users and applications means that IP addresses alone are less effective […]
1. 8.1 Wildfire concepts In this video, we are covering PCNSAn210, lwhichclouda 2ChapterhEight our chapter eigAnalysis. re Virus Analysis. Now this is chapter eighteen of chapter eight, which is 8.1. Wildfire threat Threat Intelligence Cloud Now, malware has become more powerful. It has also become more targeted and customized for a particular network. This customization […]
1. 7.1 Decryption concepts In this video, we are covering Pcnsato 10, and this is our chapter on decryption and certificate management. Now this is the first video of Chapter Seven, which is 7.1 Decryption Concepts. Now why decrypt network traffic? Each year, more and more web traffic is encrypted. It’s really hard to actually […]
2. 6.2 Configuring and managing URL Filtering In this video, we are covering PCNSA 210, and this is our chapter on URL filtering. Now this is the second video of chapter six, which is 6.2 Configuring and Managing URL Filtering. Now this is the lab that we’ll be using to demonstrate for you how to […]