ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

25,187 results

CS50
CS50 Cybersecurity - Lecture 3 - Securing Software

This is CS50, Harvard University's introduction to the intellectual enterprises of computer science and the art of programming.

1:57:27
CS50 Cybersecurity - Lecture 3 - Securing Software

107,495 views

2 years ago

Cyber Security Rich
Software Engineering Versus Cyber Security in 2025

cybersecurity #CompTIASecurity+ #CertifiedEthicalHacker #CEH #careertransition #CyberSecurityforBeginners Connect with ...

15:47
Software Engineering Versus Cyber Security in 2025

6,569 views

11 months ago

Next-Gen Engineering
How AI-Generated Code Can Put Your Security at Risk

AI coding tools like GitHub Copilot, Cursor, ChatGPT, and other AI-generated code assistants promise faster development, ...

4:02
How AI-Generated Code Can Put Your Security at Risk

432 views

5 months ago

GhostStrats
How Quantum Computing Will Revolutionize Cyber Security ( And Create Quantum Hackers! )

In this video, we explore the fascinating world of quantum computing and how it will change the future of cybersecurity. Learn how ...

5:35
How Quantum Computing Will Revolutionize Cyber Security ( And Create Quantum Hackers! )

5,178 views

1 year ago

Siya | Cybersecurity
How to break into CYBERSECURITY 2026 | Cybersecurity roadmap 2026 South Africa

cybersecurity #cybersecurityroadmap #getintocybersecurity Cybersecurity Roadmap 2026 Join the Hacking Hub: Interested in ...

8:07
How to break into CYBERSECURITY 2026 | Cybersecurity roadmap 2026 South Africa

3,329 views

2 months ago

Andy Howes
Boosting cyber security at KPMG

Learn about my work on SIEM and CTI as an intern at KPMG Australia.

2:26
Boosting cyber security at KPMG

73 views

2 years ago

𝗦𝗢𝗙𝗧𝗜𝗔𝗡𝗦 𝗛𝗨
Software Security || Chapter 11 – Software Security – Part 2

Software Engineering Subjects At Hashemite University (Drive): ...

52:33
Software Security || Chapter 11 – Software Security – Part 2

139 views

2 years ago

Menlo Security
Overcome the disadvantages of VDI with Menlo Security Secure Application Access

VDI is failing the modern workforce. Organizations are spending too much money, dealing with complex infrastructure, and ...

1:46
Overcome the disadvantages of VDI with Menlo Security Secure Application Access

505 views

2 years ago

Nick
Zero Trust Architecture: Common Cybersecurity Interview Questions (INTRO LEVEL + REAL-WORLD EXAMPLE)

Need to know how to practically implement a Zero Trust Architecture or learn about real-world applications of the security ...

11:04
Zero Trust Architecture: Common Cybersecurity Interview Questions (INTRO LEVEL + REAL-WORLD EXAMPLE)

7 views

13 days ago

CONSOLE Project
Plugpoint on security and robustness of the software development process.

Romania-based plugpoint.ro is another pilot for the CONSOLE project. Alexandru Dunca, co-founder, discussed with Ourania ...

4:37
Plugpoint on security and robustness of the software development process.

43 views

3 months ago

Med Tech
How to secure Gmail Account || Recommended actions in Google Account

How to secure Gmail Account || Recommended actions in Google Account.

1:39
How to secure Gmail Account || Recommended actions in Google Account

803,414 views

2 years ago