Skip to content

Edgoad.com

  • Linux
  • Microsoft
  • Networking
  • DIY

Networking

Networking 

Palo Alto Zones, Interfaces, and Routers – Overview

October 10, 2019October 10, 2019 Ed Goad 0 Comments networking, Palo Alto

Palo Alto firewalls can be very simple to use and implement, or they can be very difficult. Because there are

Read more
Networking 

Setting up firewall rules for Microsoft Exchange

September 26, 2019September 26, 2019 Ed Goad 0 Comments Network

In this scenario we will be setting up a simple Microsoft Exchange mail server to be accessed by the internet.

Read more
Networking 

Standard Access Lists

September 19, 2019September 19, 2019 Ed Goad 0 Comments firewall, networking

In these standard access list activities we walk through how firewalls evaluate traffic and the 5 tuples used to permit

Read more
Palo Alto Initial Configuration
Networking 

Palo Alto Initial Configuration

September 3, 2019September 4, 2019 Ed Goad 0 Comments networking, Palo Alto

In this video we walk through the initial power on and configuration of a Palo Alto firewall. We configure the

Read more
Networking 

Introduction to Firewalls

September 3, 2019September 4, 2019 Ed Goad 0 Comments networking

An introduction to firewalls, what they are for, and how they work. We include an overview of the 5-Tuples used

Read more
  • ← Previous

Recent Videos

  • Authenticating to APIs part 2

    Authenticating to APIs part 2

    Continuing our discussion of authenticating to APIs to better keep our authentication tokens safe. Using the Python ConfigParser module to store passwords and tokens in a separate file, and then accessing them programmatically.

    For more information about Python and Cybersecurity, check out my book! https://www.pythonforcybersec.com/
  • Authenticating to APIs part 1

    Authenticating to APIs part 1

    Introduction to using APIs that require authentication. Walking through the GitHub API documentation, creating a Personal Access Token for GitHub, and authenticating against their API.

    For more information about Python and Cybersecurity, check out my book! https://www.pythonforcybersec.com/
  • HaveIBeenPwned API part 2

    HaveIBeenPwned API part 2

    Continuing our use of the HaveIBeenPwned API and using this in a more dynamic Python script. This allows us to automatically look for a specific password and return its status to the user.

    For more information about Python and Cybersecurity, check out my book! https://www.pythonforcybersec.com/
  • HaveIBeenPwned API part 1

    HaveIBeenPwned API part 1

    Using the HaveIBeenPwned public API to test passwords for security. Validating if passwords have been found in online security breaches before.

    For more information about Python and Cybersecurity, check out my book! https://www.pythonforcybersec.com/
  • JSON and APIs

    JSON and APIs

    An introduction to working with JSON data returned from APIs. Specifically, creating a script to find out how many people are in space at this moment, and then parsing the JSON data to make it readable and accessible

    For more information about Python and Cybersecurity, check out my book! https://www.pythonforcybersec.com/
  • Introduction to APIs

    Introduction to APIs

    A brief introduction to working with online APIs and the tools to access them

    For more information about Python and Cybersecurity, check out my book! https://www.pythonforcybersec.com/
Load more

Copyright © 2022 Edgoad.com. All rights reserved.
Theme: ColorMag by ThemeGrill. Powered by WordPress.