All
Search
Images
Videos
Maps
News
More
Shopping
Flights
Travel
Notebook
Report an inappropriate content
Please select one of the options below.
Not Relevant
Offensive
Adult
Child Sexual Abuse
Length
All
Short (less than 5 minutes)
Medium (5-20 minutes)
Long (more than 20 minutes)
Date
All
Past 24 hours
Past week
Past month
Past year
Resolution
All
Lower than 360p
360p or higher
480p or higher
720p or higher
1080p or higher
Source
All
Dailymotion
Vimeo
Metacafe
Hulu
VEVO
Myspace
MTV
CBS
Fox
CNN
MSN
Price
All
Free
Paid
Clear filters
SafeSearch:
Moderate
Strict
Moderate (default)
Off
Filter
11:52
Microsoft Graph security API overview
5 months ago
Microsoft
preetikr
2:01
15K views · 466 reactions | What is security & assurance? The nature
…
6.1K views
4 weeks ago
Facebook
Saved by GRACE
0:38
62 reactions | What does “high assurance” really mean in terms o
…
830 views
1 week ago
Facebook
IEEE
10 key cybersecurity metrics and KPIs your board wants tracked | T
…
Apr 17, 2023
techtarget.com
21:29
Data Security Scorecard - How to create a comprehensive cybersec
…
Apr 6, 2022
bscdesigner.com
Writing a Cybersecurity Report Executive Summary (inc. Example
…
27K views
1 month ago
upguard.com
Building a Big Data Architecture for Cyber Attack Graphs - Graph Data
…
Apr 16, 2016
neo4j.com
0:46
Your Security Logs Are a Graph 🔐
1 views
3 months ago
YouTube
PuppyGraph
3:21
What Is Graph Theory's Impact On Cybersecurity? - Next LVL Progra
…
23 views
2 months ago
YouTube
Next LVL Programming
4:32
How Does Graph Theory Improve Cybersecurity Defenses? - Next L
…
5 views
2 months ago
YouTube
Next LVL Programming
0:28
Turning Data Into Defense: The Metrics That Count
298 views
4 months ago
YouTube
Security Weekly - A CRA Resource
3:43
NSA Overview
672.7K views
Jul 26, 2019
YouTube
National Security Agency
16:08
CIA Triad
433.3K views
Mar 29, 2021
YouTube
Neso Academy
Lesson 1: Introduction to Information Security and Assuran
…
16.8K views
Aug 27, 2020
YouTube
Arcadian Domination
Cyber Risk Assessments and Security Level Verification: Securi
…
2.9K views
Dec 13, 2018
YouTube
exida
11:47
Network Security Model
311.6K views
Apr 14, 2021
YouTube
Neso Academy
24:12
Security Control Assessment (SCA) Process Overview
32.4K views
Aug 28, 2021
YouTube
KamilSec
14:35
Security Architecture Design Principles - CISSP
38.8K views
May 31, 2021
YouTube
Tom Olzak
3:44
The Security Market Line
118.2K views
Sep 25, 2018
YouTube
Edspira
1:04:09
Conducting an Information Security Risk Assessment
42.5K views
Jun 29, 2018
YouTube
SecureTheVillage
4:19
Information Assurance and Security
5.5K views
Sep 10, 2020
YouTube
Just Jing
14:02
Quality assurance and control charts
8.5K views
Jan 4, 2019
YouTube
DTaylor Maths
2:06
Security Risk Assessment (Essential Definitions)
18K views
Oct 20, 2017
YouTube
Let's Uncomplicate
4:10
Agreement Types - CompTIA Security+ SY0-501 - 5.1
76.1K views
Jan 10, 2018
YouTube
Professor Messer
52:42
Conducting a cybersecurity risk assessment
93.1K views
Mar 21, 2018
YouTube
IT Governance USA Inc.
0:41
Introduction to Information Assurance and Security
2.4K views
Jan 20, 2017
YouTube
NUC University - División Online
13:36
How to do a Kaplan Meier survival analysis in GraphPad Prism
107K views
Dec 17, 2019
YouTube
Dory Video
30:15
Lecture, Week 1, Intro to Information Assurance and Security
30.3K views
Dec 24, 2012
YouTube
Tom Olzak
26:01
Lecture 21: Quality Assurance | System Analysis and Design
5.8K views
Oct 29, 2020
YouTube
Gursimran Singh Dhillon
10:01
How to Use Power BI with Microsoft Secure Score
5.9K views
May 3, 2018
YouTube
Microsoft Cloud
See more videos
More like this
Feedback