ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

283 results

infosec-tools
Network Segmentation Checklist | VLAN Separation & Firewall Rules

Network segmentation is a foundational security control. This video explains a practical network segmentation checklist, including: ...

1:09
Network Segmentation Checklist | VLAN Separation & Firewall Rules

0 views

3 days ago

Adewale Ayeni-Bepo
DevOps Interview: Zero Trust & Network Segmentation

This simulated DevOps interview dives into Zero Trust architecture, network segmentation, lateral movement risks, compliance ...

22:04
DevOps Interview: Zero Trust & Network Segmentation

0 views

6 days ago

David Bombal
Firewall Demo of Red Team vs Blue Team: Hacking Finance Apps with AI Chatbots

In this video, we dive into a real-world Red Team vs. Blue Team scenario. We simulate a cyberattack on a Finance Application that ...

28:39
Firewall Demo of Red Team vs Blue Team: Hacking Finance Apps with AI Chatbots

66,405 views

3 days ago

OTbase OT Asset Inventory Software
Network topology maps and incident response

CISA has created an hour long video on network topology maps and how they help in incident response. Even though the video is ...

23:28
Network topology maps and incident response

53 views

Streamed 6 days ago

iTeachCybersecurity Academy
Network Architectures Explained for Beginners | Data Communication & Networking Basics | iTCA

Ever wondered how devices communicate on a network and why architecture matters in cybersecurity and IT?

11:28
Network Architectures Explained for Beginners | Data Communication & Networking Basics | iTCA

32 views

3 days ago

Lsecqt
Building Vulnerable Active Directory – Firewall Setup for Red Team Labs

Building Vulnerable Active Directory From Scratch – Firewall Setup for Red Team Labs Learn how to build a segmented Active ...

31:23
Building Vulnerable Active Directory – Firewall Setup for Red Team Labs

196 views

5 days ago

Centre for Cybersecurity Belgium
Protecting bidirectional dataflows with NDR in secure networks (QCTR 2025/Q4)

... Kris Voorspoels (Director of Products and Solutions at OPSWAT) breaks down the evolution of network segmentation in the face ...

26:46
Protecting bidirectional dataflows with NDR in secure networks (QCTR 2025/Q4)

42 views

5 days ago

Bare Metal Cyber
Episode 10 — Apply Segmentation With Purpose to Reduce Blast Radius and Exposure (Task 4)

This episode explains segmentation as a risk control that must be designed with clear intent, tested with evidence, and maintained ...

15:51
Episode 10 — Apply Segmentation With Purpose to Reduce Blast Radius and Exposure (Task 4)

0 views

7 days ago

ITSkill Forge
5 Key Components of Cyber Security Architecture Explained | Network Security, IAM, SIEM, Zero Trust

Topics Covered: 1️⃣ Network Security Architecture Firewalls IDS/IPS Network Segmentation VPN Security Zero Trust ...

8:23
5 Key Components of Cyber Security Architecture Explained | Network Security, IAM, SIEM, Zero Trust

16 views

7 days ago

Palo Alto Networks
15 Years of Breach Response: These 5 Controls Actually Work

After responding to 750+ breaches, Steve Elovitz knows what actually stops attacks. Most security advice is theoretical. This is ...

2:58
15 Years of Breach Response: These 5 Controls Actually Work

41 views

4 days ago

BlueHat CyberSec Academy: Start to Pro Level
Exploitation Techniques Explained: Web, Network & Human Vulnerabilities in Ethical Hacking

Unlock the secrets of ethical exploitation techniques and learn how hackers turn small weaknesses into real-world risks — safely ...

6:01
Exploitation Techniques Explained: Web, Network & Human Vulnerabilities in Ethical Hacking

3 views

7 days ago

Victor Akinode
LESSON 32:  Network Security Basics: How Data Is Protected in Transit

Welcome to Lesson 32 of the 100 Days of Cybersecurity Challenge by Victor Akinode. In this lesson, you will learn the ...

7:22
LESSON 32: Network Security Basics: How Data Is Protected in Transit

101 views

7 days ago

SudoRobot
Your Home Network Is Designed Wrong (Here’s the Fix)

The blinking lights are not proof of security. Most home networks are built on a single assumption: if it's inside your house, it can ...

5:47
Your Home Network Is Designed Wrong (Here’s the Fix)

13 views

7 days ago

Colloquial Arabic
The Evolution of Trust: From Routing by Rumor to Hybrid Intelligence

Modern Compatibility: Support for CIDR and VLSM, essential for secure network segmentation in contemporary enterprise ...

50:41
The Evolution of Trust: From Routing by Rumor to Hybrid Intelligence

5 views

6 days ago

Soulful Miles
VoIP & IVR Security Explained | Prevent DoS, Toll Fraud & Cyber Attacks (Complete Guide)

Learn how to secure VoIP and IVR systems against modern cyber threats in this complete cybersecurity guide. This presentation ...

6:08
VoIP & IVR Security Explained | Prevent DoS, Toll Fraud & Cyber Attacks (Complete Guide)

96 views

6 days ago

Waterfall Security Solutions
Applying the New NCSC / CISA Guidance

New guidance from the UK NCSC, co-signed by CISA, BSI, Australia's ACSC and others, introduces significant updates for ...

1:16:43
Applying the New NCSC / CISA Guidance

132 views

5 days ago

Trout Software
Zero Trust in Operational Environments

What you'll learn: - Network segmentation - Authentication on the LAN & NAC technologies - Proxy security This session is ...

23:40
Zero Trust in Operational Environments

0 views

5 days ago

The Cyber Safehouse
Introduction To Cybersecurity: Module 4

Module 4: Firewalls, CSIRT & Corporate Defense | Cisco Intro to Cyber Moving from personal security to the enterprise level.

35:20
Introduction To Cybersecurity: Module 4

0 views

3 days ago

Auro ai
Computer Networks core 6

... design systems as if attackers are already inside segment networks to limit damage Continuously monitor and analyze behavior ...

12:56
Computer Networks core 6

0 views

6 days ago

Digital Ops Forge
How Ransomware Spreads Inside Networks | Lateral Movement & Internal Takeover Explained

Most ransomware attacks don't begin with mass encryption. They begin with quiet expansion. After gaining initial access, ...

5:48
How Ransomware Spreads Inside Networks | Lateral Movement & Internal Takeover Explained

0 views

5 days ago