Nasir Tech Talks
Want to become a DevOps or Cloud Engineer?
You’re in the right place! I’ll guide you through real-world, hands-on tutorials covering everything from Linux fundamentals to advanced DevOps tools like Docker, Kubernetes, AWS, Terraform, CI/CD pipelines, and Cloud Security.
My goal is to help you build a strong DevOps foundation, gain industry-level practical experience, and get ready for real-world projects and interviews.
All videos are completely free, and I also make custom tutorials based on your learning requests.
🎯 Learn. Build. Deploy. Grow with real DevOps practices!
📢 Subscribe now and start your journey toward becoming a Pro DevOps & Cloud Engineer.
🚀 #DevOps #AWS #Kubernetes #Docker #Linux #Terraform #CloudEngineer #CICD
Create an EC2 Instance in AWS | Step-by-Step Tutorial for Beginners Bangla
Kubernetes Deployment Explained and Hands-on | Bangla
Kubernetes ReplicaSet & Service Explained | Manage Pods & Expose Applications
Kubernetes Pods Explained in Bangla | Run Your First Pod Easily!
Kubernetes Namespace Explained in Bangla
AWS VPC Tutorial Bangla | Setup Public & Private Subnets, NAT Gateway & IGW Step by Step
Kubernetes Kubeadm Cluster | Class 2 | Step-by-Step Guide | Bangla
CCNA 200-301 | CCNA Bangla Tutorial | Compare Traditional Networks with Controller Based Networking
CCNA 200-301 | CCNA Bangla Tutorial | Compare Traditional Networks With Controller Based Networking
How to Install ASDM On Cisco ASA in EVE-NG | Initial Configuration of Cisco ASA for Web-based Access
CCNA 200-301 | CCNA Bangla Network Automation | Explain How Automation Impacts Network Management
CCNA 200 301 | CCNA Bangla | Differentiate Authentication Authorization & Accounting (AAA) Concepts
CCNA 200-301 | How to Configure Port Security In CISCO L2 Switch | L2 Switch Port Security Configure
CCNA 200 301 | How to Configure Dynamic ARP Inspection | Configure Layer 2 Security Features DIA
CCNA 200-301 | How to Configure DHCP Snooping Features | Configure Layer 2 Security Features
CCNA 200-301 | How to Configure Extended Access Control Lists (ACL) | ACL Part 3 | CCNA Bangla
CCNA 200-301 | How to Configure and Verify Standard Access Control Lists (ACL) | Part 2
CCNA 200-301 | Configure and Verify Access Control List (ACL) Theory | Part 1 | CCNA Bangla Tutorial
CCNA 200-301 | How to Configuring Site to Site IPSec VPN Tunnel Between Two Cisco Routers with NAT
CCNA 200-301 | Describe Remote Access and Site to Site VPNs | CCNA Bangla Tutorials
CCNA 200-301 | How to Configure TACACS+ Server on Cisco Packet Tracer | CCNA Bangla Tutorial
CCNA 200-301 | How to Reset or Recover Cisco Router Password Step by Step Bangla
CCNA 200-301 | Describe Security Password Policies Elements | Password Complexity | Minimum Length
CCNA 200-301 | How to Configure Device Access Control Using Local Passwords | CCNA Bangla Tutorial
CCNA 200-301 | Describe Security Program Elements User Awareness, Training & Physical Access Control
CCNA 200-301 | Define key Security concepts Threats Vulnerabilities Exploits & Mitigation Technique
CCNA 200-301 | How to Backup Cisco Router Configuration File & Flash File to TFTP Server
CCNA 200-301 | How to Configure SSH on Cisco Router | Enable AAA Authentication for SSH Sessions
CCNA 200-301 | Explain the Forwarding PHB for QoS | Classification | Marking | Shaping | Policing
CCNA 200-301 | What is DHCP Snooping Attack | How to Protect DHCP Snooping Attacks | CCNA Bangla