All
Search
Images
Videos
Maps
News
More
Shopping
Flights
Travel
Notebook
Report an inappropriate content
Please select one of the options below.
Not Relevant
Offensive
Adult
Child Sexual Abuse
Length
All
Short (less than 5 minutes)
Medium (5-20 minutes)
Long (more than 20 minutes)
Date
All
Past 24 hours
Past week
Past month
Past year
Resolution
All
Lower than 360p
360p or higher
480p or higher
720p or higher
1080p or higher
Source
All
Dailymotion
Vimeo
Metacafe
Hulu
VEVO
Myspace
MTV
CBS
Fox
CNN
MSN
Price
All
Free
Paid
Clear filters
SafeSearch:
Moderate
Strict
Moderate (default)
Off
Filter
0:48
YouTube
Cloud Champ
Authentication vs Authorization Explained in 1 min! #devops #software
Authentication Explained | Authentication vs Authorization | Authn Authz oauth In this video we discuss what is Authentication and what is authorization. Comparing Authentication with authorization. You will understand what is authentication and why companies use it and authorization explained with examples. What is Authentication ...
11.2K views
3 months ago
Biometric Authentication
0:39
How Biometric Security Works: Fingerprints, Facial Recognition, and More Explained
YouTube
QuickWisdomTube
2.7K views
Sep 2, 2024
1:00
How to Enable or Disable Windows Biometric Service in Windows 11 / 10
YouTube
Tips Howto
26.6K views
Apr 14, 2023
0:21
Link Smart Vitron – Next-Gen Biometric WiFi Door Lock for Ultimate Home Security | Black.
YouTube
Link
1K views
1 month ago
Top videos
2:55
🔑 OAuth 2.0 Authorization Flow Explained | API Security
YouTube
Learn with Tochii
227 views
4 weeks ago
0:12
Zscaler + LDAP Authentication Explained | Cloud Security Simplified
YouTube
GuiNet
2.4K views
2 months ago
0:49
Building a Scalable AuthN/AuthZ Software System using Supertokens
YouTube
ByteMonk
9K views
2 months ago
Password Security Tips
4:31
14 best practices for creating stronger passwords and securing it.
YouTube
CyberSafetySimplified
2.4K views
Aug 20, 2023
4:51
19 How to Create Strong & Secure Passwords: A Simple Guide
YouTube
Quackademy
26 views
7 months ago
8:51
How to Create a Strong Password | Tips to Create Strong Passwords | Cyber Security | Simplilearn
YouTube
Simplilearn
12.3K views
Mar 3, 2022
2:55
🔑 OAuth 2.0 Authorization Flow Explained | API Security
227 views
4 weeks ago
YouTube
Learn with Tochii
0:12
Zscaler + LDAP Authentication Explained | Cloud Security Simplif
…
2.4K views
2 months ago
YouTube
GuiNet
0:49
Building a Scalable AuthN/AuthZ Software System using Supertokens
9K views
2 months ago
YouTube
ByteMonk
2:25
Simplified Mobile App Authentication using Apple Sign I
…
1.2K views
2 months ago
YouTube
This Dot Media
0:38
Agent Authentication: Secure AI Access with OATH Protocol #shorts
944 views
1 month ago
YouTube
So What About AI Agents by Docsie
0:30
UAN Allocation, Activation and Authentication using UMANG App
5.5K views
2 months ago
YouTube
OFFICIAL EPFO
0:28
🔓 How to Turn Off 2-Factor Authentication in Facebook App (
…
6.2K views
3 weeks ago
YouTube
CygnaTech
2:58
UAN Generation and activation using face authentication technol
…
40.9K views
3 months ago
YouTube
SHIV CONSULTANCY SERVICES
0:06
Goodbye Face ID? Apple Brings Optic ID for Ultimate Security
14.5K views
1 month ago
YouTube
Infinkey Infopedia
0:59
What is a threat model?
2.2K views
1 month ago
YouTube
Microsoft Developer
0:54
Delhi Police Constable 2025: 2 Apps You Must Have for Live Face Auth
…
850 views
1 month ago
YouTube
DIA गुरुकुल
2:59
AWW | How to register for PMMVY scheme through Face Authenticati
…
29.4K views
3 months ago
YouTube
Ministry of Women & Child Development Govt o…
0:35
Strengthen your identity security. #MicrosoftEntra #IdentitySecurity
…
1.5K views
3 weeks ago
YouTube
Microsoft Mechanics
1:00
What are Refresh Tokens | OAuth 2.0 | Spring Security #springplatfo
…
3.4K views
3 months ago
YouTube
EmbarkX | Learn Programming
0:37
PostgreSQL pg_hba.conf Explained | Authentication Methods in Postg
…
1.8K views
1 month ago
YouTube
Learnomate Technologies
1:52
The TRUTH About Password Security
1.8K views
1 month ago
YouTube
InfoSec Pat
1:04
Email Deliverability: SPF, DKIM, and DMARC
65 views
1 week ago
YouTube
Benchmark
0:20
Phishing-Resistant MFA Explained | What Every IT Auditor Must Chec
…
344 views
2 weeks ago
YouTube
Aaditya's CISA-This-Much
0:59
Exploring API Authentication Methods: From HTTP Basic to OA
…
5.4K views
May 10, 2023
YouTube
MIGOROTEK
See more videos
More like this
Feedback