All
Search
Images
Videos
Maps
News
More
Shopping
Flights
Travel
Notebook
Report an inappropriate content
Please select one of the options below.
Not Relevant
Offensive
Adult
Child Sexual Abuse
Length
All
Short (less than 5 minutes)
Medium (5-20 minutes)
Long (more than 20 minutes)
Date
All
Past 24 hours
Past week
Past month
Past year
Resolution
All
Lower than 360p
360p or higher
480p or higher
720p or higher
1080p or higher
Source
All
Dailymotion
Vimeo
Metacafe
Hulu
VEVO
Myspace
MTV
CBS
Fox
CNN
MSN
Price
All
Free
Paid
Clear filters
SafeSearch:
Moderate
Strict
Moderate (default)
Off
Filter
0:48
Authentication vs Authorization Explained in 1 min! #devops #soft
…
11.2K views
3 months ago
YouTube
Cloud Champ
2:55
🔑 OAuth 2.0 Authorization Flow Explained | API Security
227 views
4 weeks ago
YouTube
Learn with Tochii
0:12
Zscaler + LDAP Authentication Explained | Cloud Security Simplif
…
2.4K views
2 months ago
YouTube
GuiNet
0:49
Building a Scalable AuthN/AuthZ Software System using Supertokens
9K views
2 months ago
YouTube
ByteMonk
2:25
Simplified Mobile App Authentication using Apple Sign I
…
1.2K views
2 months ago
YouTube
This Dot Media
0:38
Agent Authentication: Secure AI Access with OATH Protocol #shorts
944 views
1 month ago
YouTube
So What About AI Agents by Docsie
0:30
UAN Allocation, Activation and Authentication using UMANG App
5.5K views
2 months ago
YouTube
OFFICIAL EPFO
0:28
🔓 How to Turn Off 2-Factor Authentication in Facebook App (
…
6.2K views
3 weeks ago
YouTube
CygnaTech
2:58
UAN Generation and activation using face authentication technol
…
40.9K views
2 months ago
YouTube
SHIV CONSULTANCY SERVICES
0:06
Goodbye Face ID? Apple Brings Optic ID for Ultimate Security
14.5K views
1 month ago
YouTube
Infinkey Infopedia
0:59
What is a threat model?
2.2K views
1 month ago
YouTube
Microsoft Developer
0:54
Delhi Police Constable 2025: 2 Apps You Must Have for Live Face Auth
…
850 views
1 month ago
YouTube
DIA गुरुकुल
2:59
AWW | How to register for PMMVY scheme through Face Authenticati
…
29.4K views
3 months ago
YouTube
Ministry of Women & Child Development Govt o…
0:35
Strengthen your identity security. #MicrosoftEntra #IdentitySecurity
…
1.5K views
3 weeks ago
YouTube
Microsoft Mechanics
1:00
What are Refresh Tokens | OAuth 2.0 | Spring Security #springplatfo
…
3.4K views
3 months ago
YouTube
EmbarkX | Learn Programming
0:37
PostgreSQL pg_hba.conf Explained | Authentication Methods in Postg
…
1.8K views
1 month ago
YouTube
Learnomate Technologies
1:52
The TRUTH About Password Security
1.8K views
1 month ago
YouTube
InfoSec Pat
1:04
Email Deliverability: SPF, DKIM, and DMARC
65 views
1 week ago
YouTube
Benchmark
0:20
Phishing-Resistant MFA Explained | What Every IT Auditor Must Chec
…
344 views
2 weeks ago
YouTube
Aaditya's CISA-This-Much
0:59
Exploring API Authentication Methods: From HTTP Basic to OA
…
5.4K views
May 10, 2023
YouTube
MIGOROTEK
See more videos
More like this
Feedback