ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

2,682 results

Caleb Oni
Why I chose Azure Cloud over AWS and GCP?

Join the Tech Certified Community on Discord - https://discord.gg/Zta7eauxb8 ▷LEARNING RESOURCES: 1. Coursera beginner ...

6:57
Why I chose Azure Cloud over AWS and GCP?

29,820 views

2 years ago

Cyber with Ben
The Best Cloud Certificate for Cyber Security Beginners

Go to my sponsor, https://snhu.edu/bentruong to see the current average annual salary for someone with a Cybersecurity degree ...

7:11
The Best Cloud Certificate for Cyber Security Beginners

7,922 views

1 year ago

Seceon Inc
Customers questions many services like MDR, XDR, SOC, NDR, Cloud Security Posture keeps me secured?

Customers' questions use on many MSSPs services does not help keep them secure against multi-stage threats so what they ...

5:20
Customers questions many services like MDR, XDR, SOC, NDR, Cloud Security Posture keeps me secured?

61 views

2 years ago

CyberGeek Podcast
What Is Cloud Security? | ft. Ashish Rajan @CloudSecurityPodcast

Link for Cloud Security Bootcamp: https://www.cloudsecuritybootcamp.com/ Links for Cloud Security Podcast: ...

29:01
What Is Cloud Security? | ft. Ashish Rajan @CloudSecurityPodcast

56 views

2 years ago

GhostStrats
How Quantum Computing Will Revolutionize Cyber Security ( And Create Quantum Hackers! )

In this video, we explore the fascinating world of quantum computing and how it will change the future of cybersecurity. Learn how ...

5:35
How Quantum Computing Will Revolutionize Cyber Security ( And Create Quantum Hackers! )

4,671 views

10 months ago

Empower Through Knowledge
Exploring Different Areas of Cloud Computing: A short Guide

Cloud Security: Identity and Access Management: Students can learn about user management, role-based access control (RBAC) ...

5:21
Exploring Different Areas of Cloud Computing: A short Guide

105 views

2 years ago

PolarSeven
The Top 5 Cloud Threats & How To Identify Them & PII In Cloud | AWS User Group Sydney

He shared how hundreds of customers have successfully avoided these risks by taking a new approach to cloud security.

55:24
The Top 5 Cloud Threats & How To Identify Them & PII In Cloud | AWS User Group Sydney

86 views

3 years ago

Decimation *
6 Pillars of Effective Cloud Security

In this video, I discuss the 6 pillars of effective cloud security.

7:51
6 Pillars of Effective Cloud Security

19 views

2 years ago

Brian H. Hough | Tech Stack Playbook
AWS re:Inforce 2024 Talk: Developer's Security Survival Guide

LIKE & SUBSCRIBE FOR MORE CONTENT: @BrianHHough Have questions about DevSecOps, cloud security, or becoming a ...

20:25
AWS re:Inforce 2024 Talk: Developer's Security Survival Guide

176 views

1 year ago

5 Minutes Cloud
SSRF to Cloud Takeover | Stealing IAM Role Credentials LIVE

What if a single SSRF vulnerability could give an attacker access to your entire cloud environment? In this hands-on cloud security ...

8:28
SSRF to Cloud Takeover | Stealing IAM Role Credentials LIVE

425 views

12 days ago

Forward Networks
Get Visibility Into the Cloud: Craig and Mike Secure the World, One Cloud at a Time

Mike Lossmann and Craig Johnson discuss enhancing cloud visibility for an upcoming audit, demonstrating how to ensure ...

5:44
Get Visibility Into the Cloud: Craig and Mike Secure the World, One Cloud at a Time

240 views

1 year ago

Menlo Security
Protection from sophisticated ransomware threats with Menlo Security

Prevent one of the most dangerous and prevalent cyberthreats today. With the Menlo approach to ransomware prevention, ...

2:07
Protection from sophisticated ransomware threats with Menlo Security

245 views

1 year ago

CyberSunday
Shadow Security in a World of Shadow IT

We all know about Shadow IT, and we know it is a big issue (bigger these days with the ease of workload deployment in the ...

5:24
Shadow Security in a World of Shadow IT

5 views

2 years ago

TechToby
Day In The Life As A Cloud Engineer

A typical Monday working from home as a Cloud Engineer in Cyber Security Follow me on all my socials below and sign up to my ...

6:55
Day In The Life As A Cloud Engineer

1,178 views

2 years ago

Cloud Native Sri Lanka
Cloud Native Security and Best Practices | By Janaka Wickramasinghe | CNSL May Meetup

We appreciate your support and encourage you to like, comment, and share this video with others who would find it insightful.

20:03
Cloud Native Security and Best Practices | By Janaka Wickramasinghe | CNSL May Meetup

132 views

2 years ago

isabelle moreau
Chapter 9 Intro to Mobile Cloud Computing by Team 8
43:30
Chapter 9 Intro to Mobile Cloud Computing by Team 8

7 views

2 years ago

PolarSeven
Building Cloud Security - From Startups to Enterprises | AWS Meetup

SERVING PIZZA AND BEER: The AWS Meetup LIVE Experience! We are beyond thrilled to announce the return of our 2024 ...

1:05:51
Building Cloud Security - From Startups to Enterprises | AWS Meetup

85 views

1 year ago

Menlo Security
Make zero trust access easy with Menlo Security

Menlo Security enables zero trust access without requiring network rebuilds or a firewall refresh for both browser-based and ...

1:27
Make zero trust access easy with Menlo Security

644 views

1 year ago

CS50
CS50 Cybersecurity - Lecture 1 - Securing Data

This is CS50, Harvard University's introduction to the intellectual enterprises of computer science and the art of programming.

1:55:22
CS50 Cybersecurity - Lecture 1 - Securing Data

248,233 views

2 years ago

Hacker Proof HQ
Meet Hacker Proof HQ: Your Ultimate Guide to Cybersecurity/Tech

Get ready to dive deep into the realm of tech, cybersecurity, DevSecOps, cloud security, and data security. Whether you're just ...

8:32
Meet Hacker Proof HQ: Your Ultimate Guide to Cybersecurity/Tech

1,306 views

2 years ago