David Bombal

David Bombal

Want to learn about IT? Want to get ahead in your career? Well, this is the right place! On this channel, I discuss Python, Ethical Hacking, Networking, Network Automation, CCNA, Virtualization and other IT related topics. This YouTube channel has new videos every week! Subscribe for technical, detailed, no fluff content. David’s details: Discord: https://discord.com/invite/usKSyzb Twitter: https://www.twitter.com/davidbombal Instagram: https://www.instagram.com/davidbombal LinkedIn: https://www.linkedin.com/in/davidbombal Facebook: https://www.facebook.com/davidbombal.co Website: http://www.davidbombal.com YouTube: https://www.youtube.com/davidbombal All the best! David

  1. #555: VirtualBox VM Escape: Integer Overflow Explained Clearly

    3D AGO

    #555: VirtualBox VM Escape: Integer Overflow Explained Clearly

    In this episode, David Bombal sits down with vulnerability researcher Vladimir Tokarev (with Dawid on the interview) to show what AI-assisted vulnerability research looks like when it actually works. Vladimir walks through two real vulnerability case studies and uses them to explain a practical workflow for finding bugs faster with LLMs, without pretending the AI is “fully autonomous.” Demo 1: Gemini CLI command injection Vladimir demonstrates a command injection issue in Gemini CLI tied to the IDE / VS Code extension install flow. He shows how a malicious VSIX file name or path can be crafted so that when the install command is executed, the system ends up running an attacker-controlled command (the demo uses a harmless calculator launch to prove execution). The conversation then breaks down what a VSIX is, what the realistic attack paths are (user tricked into installing a malicious extension or placing it in the right directory), and why this class of bug matters for endpoints running local AI agents. Demo 2: VirtualBox integer overflow and VM escape class impact Next, Vladimir switches to a VirtualBox vulnerability involving an integer overflow that can lead to out-of-bounds read/write in the host process. Because of architecture constraints, he shows the exploit behavior via a recorded clip, then explains the bug using source code. The key teaching moment is the mismatch between 32-bit arithmetic used in bounds checking and 64-bit pointer arithmetic used during the actual memory move, creating a pathway to bypass checks and copy memory outside the intended buffer. Vladimir also explains why having both read and write primitives is powerful for exploitation, and how modern mitigations make “blind” exploitation unrealistic without memory disclosure. How the bugs were found with AI Vladimir then explains the workflow he uses in real engagements: • Run static analysis to generate leads at scale • Use an LLM to triage and filter out noise • Validate the remaining findings by tracing code paths and checking exploitability • Use AI again to accelerate setup, debugging, reverse engineering, and iteration He shares a key insight: the win is not “AI finds everything for you,” it is that AI helps you spend your time on the hardest parts—validation, exploit logic, and decision-making—instead of drowning in thousands (or millions) of findings. Why there is no fully autonomous vuln-research agent yet Finally, Vladimir lays out four practical blockers: 1. Depth reasoning (long multi-step exploit chains) 2. Context limits (missing system-level constraints and assumptions) 3. Learning from failure (repeating bad leads) 4. Exploration (poor goal-driven search without strong reinforcement learning) // Vladimir Tokarev’s SOCIAL // X: https://x.com/G1ND1L4 LinkedIn: / vladimir-eliezer-tokarev // Dawid van Straaten’s SOCIAL // LinkedIn: / dawid-van-straaten-31a3742b X: https://x.com/nullaxiom?s=21 // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... Disclaimer: This video is for educational purposes only.

    48 min
  2. #554: WHY Your Cheap Chinese IoT Camera Is A Network NIGHTMARE

    3D AGO

    #554: WHY Your Cheap Chinese IoT Camera Is A Network NIGHTMARE

    Are your smart home devices spying on you? In this video, David Bombal interviews cybersecurity researcher and IoT penetration tester, Matt Brown, to reveal how to intercept and decrypt supposedly secure SSL/TLS traffic from IoT devices. Matt demonstrates his open-source tool, "Man in the Middle Router," a specialized Linux-based bash script designed to simplify IoT hardware hacking labs. This tool stitches together essential Linux utilities—including HostAPD (for access points), DNSmasq (for DHCP), and iptables (for traffic routing)—to transform any Linux computer or Raspberry Pi into a transparent intercepting router. In this technical deep-dive, you will learn: How a Man in the Middle (MITM) attack intercepts encrypted TLS (HTTPS) communications. How to set up an IoT penetration testing lab using minimal hardware, such as an Alpha Wi-Fi adapter and an Ethernet dongle. The difference between theoretical attacks and real-world vulnerabilities like the failure of IoT devices to validate server certificates. Transparent proxy setup using tools like mitmproxy to visualize raw API data. Live Hacking Demonstration Matt moves beyond theory to demonstrate a live hack of an Anran Wi-Fi security camera purchased from eBay. He shows the exact process of capturing and decrypting the camera's API traffic (apis.us-west.cloudedge360.com). This demonstration exposes that the device is transmitting sensitive information—including authentication credentials—in cleartext over HTTP inside the broken TLS tunnel. Whether you are a network engineer, network security analyst, or a hardware hacking enthusiast, this video provides a step-by-step framework for auditing the security and privacy of the devices on your network. // Matt Brown’s SOCIAL // X: https://x.com/nmatt0 YouTube: / @mattbrwn LinkedIn: / mattbrwn GitHub: https://github.com/nmatt0 Reddit: https://github.com/nmatt0 Website (with training courses): https://training.brownfinesecurity.com/ // GitHub REFERENCE // mitmrouter: https://github.com/nmatt0/mitmrouter // Camera REFERECE // https://www.amazon.com/ANRAN-Security... // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 0:00 - Coming Up 0:33 - Introduction 02:33 - Matt’s Solution for IoT Devices 05:38 - Getting around SSL Pining / Certificate Validation 08:55 - Demo - The Basics 12:00 - Demo - Man In The Middle Router Tool 15:00 - Demo - Software/Hardware Considerations 20:12 - Demo - MITM Proxy 24:43 - Demo - MITM Router 33:58 - Example Using a Real IoT Device 36:33 - David’s Questions 37:50 - More About Matt Brown 38:41 - Android Vs Apple 40:33 - Outro Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only. #iot #hacking #iothacking

    42 min
  3. #553: AVOID the Grep Trap: Why Splunk is the Future of Networks

    MAR 3

    #553: AVOID the Grep Trap: Why Splunk is the Future of Networks

    Learn Splunk basics with James Hodge in this introductory tutorial. We dive into SPL, analyzing Linux logs, and a powerful AI Canvas demo for network troubleshooting. Big thanks to Cisco for sponsoring this video and sponsoring my trip to Cisco Live Amsterdam 2026. // James Hodge’s SOCIAL // LinkedIn: / jameshodge / David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 0:00 - Coming up 0:47 - James' background 01:36 - Splunk basics // What is Splunk? 04:17 - Splunk demo 07:35 - How Splunk analyses the data 10:13 - Bringing in raw data 12:22 - Splunk demo continued 21:38 - Dark Mode funny story 22:25 - Splunk demo continued 24:12 - The toilet story 27:56 - Modern Splunk dashboard demo 30:45 - AI Canvas demo 34:53 - Conclusion Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only. #splunk #cisco #ciscolive

    35 min
  4. #552: Why The Matrix Was Right: 6 AI Movies Warned Us

    FEB 28

    #552: Why The Matrix Was Right: 6 AI Movies Warned Us

    Big thanks to Brilliant for sponsoring this video. To try everything Brilliant has to offer, visit https://brilliant.org/davidbombal to start your 30-day free trial or scan the QR code onscreen – You’ll also get 20% off an annual premium subscription Join hacker OTW and David Bombal as they rank the top 6 AI movies that predicted the future of cybersecurity. From Ex Machina to The Matrix, discover which films got 2026 right. In this video, OTW breaks down his curated list of the best Artificial Intelligence movies that every tech enthusiast and cybersecurity professional needs to watch. We aren't just reviewing films; we are analyzing how sci-fi predictions from decades ago are becoming reality in 2026. We discuss the dangers of removing AI guardrails as seen in Companion, the terrifying reality of predictive policing and surveillance mirrored in Minority Report, and the ethical dilemmas of AI consciousness explored in Her and Ex Machina. OTW also dives into 2001: A Space Odyssey and The Matrix to discuss Neuralink, data center energy consumption, and the risks of AI self-preservation. Are we heading toward a dystopian future, or can we still implement the right regulations? // Occupy The Web SOCIAL // X: / three_cube Website: https://hackers-arise.net/ // Occupy The Web Books // Linux Basics for Hackers 2nd Ed US: https://amzn.to/3TscpxY UK: https://amzn.to/45XaF7j Linux Basics for Hackers: US: https://amzn.to/3wqukgC UK: https://amzn.to/43PHFev Getting Started Becoming a Master Hacker US: https://amzn.to/4bmGqX2 UK: https://amzn.to/43JG2iA Network Basics for hackers: US: https://amzn.to/3yeYVyb UK: https://amzn.to/4aInbGK // OTW Discount // Use the code BOMBAL to get a 20% discount off anything from OTW's website: https://hackers-arise.net/ // Playlists REFERENCE // Linux Basics for Hackers: • Linux for Hackers Tutorial (And Free Courses) Mr Robot: • Hack like Mr Robot // WiFi, Bluetooth and ... Hackers Arise / Occupy the Web Hacks: • Hacking Tools (with demos) that you need t... / David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 0:00 - Coming up 0:47 - OTW introduction // OTW books 02:02 - Brilliant sponsored segment 04:08 - AI in Hollywood and media 08:06 - Top 6 movies about AI 11:29 - Movie #6 // Guardrails on AI 19:27 - Movie #5 // AI-controlled media 27:35 - Movie #4 // AI crime detection 39:38 - Movie #3 // AI self-preservation 48:55 - Movie #2 // Human & AI relationships 55:23 - Movie #1 // AI Turing test 01:04:57 - Top 6 AI movies summary 01:11:02 - Conclusion Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only. #ai #movies #aimovies

    1h 12m
  5. #551: DNS Command & Control: Detecting Malware Traffic

    FEB 23

    #551: DNS Command & Control: Detecting Malware Traffic

    Big thank you to Infoblox for sponsoring this video. For more information on Infoblox have a look at their website: https://www.infoblox.com/ // Get Wireshark Certified // Check out the official training course 📘 GET TRAINING: https://courses.davidbombal.com/l/pdp... Use code "WiresharkHack" to get a $50 discount 🔗 Learn more: https://wireshark.org/certifications In this deep dive, David Bombal is joined by Wireshark expert Chris Greer to strip down the most critical protocol on the internet: DNS. We move beyond the theory to show you exactly what DNS looks like "on the wire." Chris reveals why a staggering 92% of malware uses DNS for Command and Control (C2) and how you can use packet analysis to detect these breaches before they spread. We also debunk common myths about DNS only using UDP, explore the "Librarian" analogy for Root Servers, and walk through a live capture of a request to a real website. What You Will Learn: •Malware Detection: Why 92% of malware relies on DNS and how to spot C2 traffic. • Packet Anatomy: A line-by-line breakdown of DNS headers, Transaction IDs, and Flags in Wireshark. • The TCP Myth: Why blocking TCP port 53 on your firewall can break yournetwork (and why DNS needs it). • Troubleshooting: How to measure DNS latency (response time) to pinpoint slow network performance. • Recursive Lookups: Understanding the chain from your PC to the Root Servers and back. // Chris Greer’s SOCIAL // YouTube: / chrisgreer Official WCA training: https://courses.davidbombal.com/l/pdp... Use code "WiresharkHack" to get a $50 discount LinkedIn: / cgreer Website: https://packetpioneer.com/ // Download Wireshark pcaps from here // https://github.com/packetpioneer/yout... https://github.com/packetpioneer/yout... https://www.wireshark.org/certificati... https://packetschool.teachable.com/ // WCA Course REFERENCE// Official WCA training: https://courses.davidbombal.com/l/pdp... Use code "WiresharkHack" to get a $50 discount // Chris’ DNS Series on YouTube ‘’ • Your First DNS Lookup—Captured and Explained // Link to YouTube VIDEO: • Video // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 0:00 - Coming up 0:52 - More Wireshark! // It's always DNS 02:45 - Infoblox sponsored segment 03:37 - DNS basics in Wireshark // How DNS works 06:52 - Analysing the DNS packet capture 08:32 - Destination address explained 10:09 - Transaction ID explained 11:13 - Flags explained 13:26 - Questions, Answer RRs & Additional RRs explained 15:39 - Additional records explained 17:07 - Response walkthrough 19:24 - Real DNS packet capture walkthrough 21:17 - Quick Wireshark tip 22:32 - Walkthrough continued 25:55 - Going deeper // How DNS resolver works 32:41 - More on Chris Greer YouTube channel and more to come 35:36 - Conclusion Please note that links listed may be affiliate links and provide me with a small percentage /kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only. #dns #infoblox #wireshark

    37 min
  6. #550: Firewall Demo of Red Team vs Blue Team: Hacking Finance Apps with AI Chatbots

    FEB 22

    #550: Firewall Demo of Red Team vs Blue Team: Hacking Finance Apps with AI Chatbots

    In this video, we dive into a real-world Red Team vs. Blue Team scenario. We simulate a cyberattack on a Finance Application that has integrated a new LLM Chatbot. You’ll see firsthand how attackers use Prompt Injection to bypass standard rules, how they move laterally through Kubernetes clusters, and how they attempt to execute Zero Day exploits. More importantly, we show you how to defend against it. Using Cisco’s Hybrid Mesh Firewall, AI Defense, and Secure Workload, we demonstrate how to: 1. Detect & Block Prompt Injections: safeguarding your LLMs from manipulation. 2. Secure Kubernetes: using micro-segmentation to isolate threats in the cloud. 3. Inspect Encrypted Traffic: utilizing the Encrypted Visibility Engine (EVE) to spot malware in TLS flows without decryption. Whether you are a Network Engineer, Security Analyst, or just interested in how AI is changing the cybersecurity landscape, this demo is packed with practical insights Big thank you to Cisco for sponsoring my trip to Cisco Live Amsterdam. // Ant Ducker SOCIALS // LinkedIn: / ant-ducker-0052801 YouTube channel dCloud: / @ciscodcloud // Website REFERENCE // Cisco Security Cloud control: https://sign-on.security.cisco.com/ Cisco.com: https://www.cisco.com/site/us/en/solu... // YouTube Video REFERENCE // Rick Miles’ video will be linked at a later stage once published. / David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 0:00 - Coming Up 01:29 - Intro 02:20 - Demo Overview 03:57 - Demo Begins 09:35 - Adding Guardrails 11:45 - Secure Workloads 14:30 - Segmentation Workflow 18:33 - Overviewing Finance App 21:02 - Encrypted Visibility Engine 24:34 - Firewall Obversability and Control 25:44 - Ant's Advice For The Youth 26:40 - How to Learn Hybrid Mesh Firewall 28:16 - Conclusion Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only. #cisco #ciscolive #ciscoemea

    29 min
  7. #549: The Apple of Networking? Cisco’s 100T Full Stack (Connects 128,000 GPUs)

    FEB 21

    #549: The Apple of Networking? Cisco’s 100T Full Stack (Connects 128,000 GPUs)

    The bottleneck in AI isn't compute anymore, it's the network. In this video, I sit down with Martin, the architect behind Cisco’s Silicon One, to discuss the massive leap to 100 Terabits per second. We go deep into the silicon level to understand how "intelligent agents" embedded in the hardware are solving the packet loss problem for massive AI training clusters. We cover the new 1.6T Linear Pluggable Optics (LPO), why Cisco is becoming the "Apple of Networking" by building their own full stack, and why they believe Ethernet has officially won the data center war. Topics Covered: • Cisco Silicon One: The architecture behind the 100Tbps & 51.2Tbps chips. • AI Scale: How to interconnect 128,000 GPUs without stalling. • Hardware Agents: Real-time traffic rerouting at the silicon level. • 1.6Tbps Optics: Moving DSPs out of the module to save power (LPO). • Ethernet vs. InfiniBand: Why standard Ethernet is winning in AI. Big thank you to ‪@Cisco‬ for sponsoring my trip to Cisco Live Amsterdam! // Martin Lund SOCIALS // LinkedIn: / martinlundca // Website REFERENCE // https://blogs.cisco.com/sp/cisco-sili... // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 0:00 - Coming Up 01:09 - Intro 01:42 - Cisco's New Announcement (G200 Chip) 02:32 - How Many Companies Are Doing This? 05:02 - Is Cisco The 'Apple' Of Networking? 07:30 - Intelligent Collective Networking 08:09 - Who Designed The Chip? 08:56 - Cisco's New Optical Module 09:59 - Why Do We Need These Speeds? 15:46 - Data Center Scale 16:50 - Cisco Switches 19:16 - Who Is The Target Audience? 20:23 - Linear Pluggable Optics (LPO) 22:04 – Conclusion Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only. #cisco #ciscolive #ciscoemea

    23 min
  8. #548: Stop Troubleshooting Manually. Meet Your Digital TEAMMATE

    FEB 20

    #548: Stop Troubleshooting Manually. Meet Your Digital TEAMMATE

    Big thanks to ‪@Cisco‬ for sponsoring this video and sponsoring my trip to Cisco Live Amsterdam. Will AI replace network engineers in 2026? In this video, I sit down with Joe Vaccaro (VP/GM of Cisco ThousandEyes) to reveal the truth about "Agentic Ops" and how it differs from traditional AIOps. We dive deep into the new "Digital Teammate" concept within ThousandEyes and demo exactly how AI agents can autonomously troubleshoot complex network outages (like DHCP and DNS failures) in seconds. Instead of taking your job, Joe explains how these agents act as a force multiplier for your career—handling the tedious "mean time to innocence" tasks so you can focus on architecture. If you are worried about the future of the CLI or manual troubleshooting, you need to see this demo. Key Topics Covered: • Cisco Agentic Ops Explained: Joe Vaccaro breaks down the shift to autonomous reasoning. • ThousandEyes Demo: Watch an AI agent diagnose a DHCP failure and suggest the exact fix (subnet expansion). • Views Explainability: How to troubleshoot "unknown paths" and ISP outages (like AWS/Azure) automatically. • Career Survival Guide: Why Cisco believes AI will train the next generation of CCIE-level engineers, not replace them. //Joe Vaccaro’s SOCIAL // Cisco Blogs: https://blogs.cisco.com/author/vaccaroj LinkedIn: / joevaccaro X: https://x.com/joevaccaro X: https://x.com/thousandeyes Website: https://www.thousandeyes.com/ // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 0:00 - Coming up 0:42 - Troubleshooting 02:00 - ThousandEyes Updates 03:52 - Demo 1 06:50 - Agentic Steps on a network 07:26 - Demo 2 10:50 - ThousandEyes Outages Page 11:34 - Agents in ThousandEyes 13:49 - New Demands by AI 14:14 - Will AI Replace Network Engineers ? 15:15 - Will The Agents Need a Human in the loop? 16:10 - Will This become More Autonomous ? 16:48 - Conclusion & Outro Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only. #cisco #ciscolive #ciscoemea

    17 min
5
out of 5
25 Ratings

About

Want to learn about IT? Want to get ahead in your career? Well, this is the right place! On this channel, I discuss Python, Ethical Hacking, Networking, Network Automation, CCNA, Virtualization and other IT related topics. This YouTube channel has new videos every week! Subscribe for technical, detailed, no fluff content. David’s details: Discord: https://discord.com/invite/usKSyzb Twitter: https://www.twitter.com/davidbombal Instagram: https://www.instagram.com/davidbombal LinkedIn: https://www.linkedin.com/in/davidbombal Facebook: https://www.facebook.com/davidbombal.co Website: http://www.davidbombal.com YouTube: https://www.youtube.com/davidbombal All the best! David

You Might Also Like