All
Search
Images
Videos
Maps
News
More
Shopping
Flights
Travel
Notebook
Report an inappropriate content
Please select one of the options below.
Not Relevant
Offensive
Adult
Child Sexual Abuse
Length
All
Short (less than 5 minutes)
Medium (5-20 minutes)
Long (more than 20 minutes)
Date
All
Past 24 hours
Past week
Past month
Past year
Resolution
All
Lower than 360p
360p or higher
480p or higher
720p or higher
1080p or higher
Source
All
Dailymotion
Vimeo
Metacafe
Hulu
VEVO
Myspace
MTV
CBS
Fox
CNN
MSN
Price
All
Free
Paid
Clear filters
SafeSearch:
Moderate
Strict
Moderate (default)
Off
Filter
13:32
Common and systematic naming: iso-, sec-, and tert- prefixes
Feb 20, 2011
Khan Academy
Sal Khan
File Naming Conventions: How to Optimize Document Management
…
Apr 14, 2021
process.st
What is Logical Access Control in Computer Security?
Sep 13, 2021
cybersecurity-automation.com
Cybersecurity and privacy
Jun 30, 2016
nist.gov
A guide to common variable naming conventions | TheServerSide
Apr 27, 2021
theserverside.com
CIS Controls
Mar 21, 2024
cisecurity.org
3:32
What are Security Controls: Types & Implementation
2K views
Jun 24, 2021
thecyphere.com
0:38
What is a Control Library
799 views
2 weeks ago
YouTube
Better Cyber Career
0:57
Ashokkumar Perumal on Instagram: "FREE AI-Powered Full Stack We
…
9.2K views
1 week ago
Instagram
tech_devil_ak
13:34
Cryptography
464.3K views
Apr 17, 2021
YouTube
Neso Academy
22:23
Re-Using Reference Controls
19.1K views
Nov 18, 2019
YouTube
Cytek Biosciences
9:39
Cryptography – Key Terms
194.2K views
Apr 22, 2021
YouTube
Neso Academy
7:20
Addressable vs Conventional Alarm Systems
63.7K views
Mar 30, 2021
YouTube
GPSTC Productions
7:28
Understanding Logic Gates
1.1M views
Jun 15, 2020
YouTube
Spanning Tree
3:42
DIGSI 5 Tutorial – Chapter 8: The logic editor
27.7K views
Oct 20, 2017
YouTube
Siemens Knowledge Hub
3:10
Discretionary Access Control List (DACL) - Network Encyclopedia
5.6K views
Nov 22, 2020
YouTube
Network Encyclopedia
13:00
Logic Gate Expressions
260.7K views
Aug 10, 2017
YouTube
Computer Science Lessons
14:35
Security Architecture Design Principles - CISSP
38.7K views
May 31, 2021
YouTube
Tom Olzak
6:07
Data Management: File Naming Conventions
16.9K views
Feb 19, 2015
YouTube
University of Wisconsin Data Services
11:12
Cahn-Ingold-Prelog Convention (Determining R/S)
429.6K views
Jan 5, 2015
YouTube
Professor Dave Explains
41:20
CISSP DOMAIN 3 CRYPTOGRAPHY Simple
24.6K views
Nov 7, 2020
YouTube
Prabh Nair
1:01:24
Principles of Classification
23.6K views
Nov 16, 2012
YouTube
alctsce
5:21
Boolean Searching Basics
199.4K views
Jul 7, 2011
YouTube
KateTheLibrarian
11:02
Symmetric Key Cryptography: Cryptographic Techniques
4.4K views
Mar 9, 2019
YouTube
Computer Science Lessons
0:59
Entering Variable Names In a NX Safety Program Using Sysmac Stu
…
2.7K views
Feb 27, 2015
YouTube
Omron Automation Americas
2:21
Library of Congress Classification
40.4K views
Aug 13, 2015
YouTube
WKCTC-Matheson Library
25:50
Marking Controlled Unclassified Information (CUI) - Microsoft Infor
…
3.7K views
Feb 8, 2021
YouTube
Agile IT
26:48
The NIST Cybersecurity Framework 4 Step Guide
24K views
Jul 26, 2019
YouTube
Kyber Security
4:38
Ethernet CIP Data Table Read MSG from Compact Logix to Control Lo
…
21.8K views
Aug 20, 2020
YouTube
Short PLC videos
59:32
Virtual Session: NIST Cybersecurity Framework Explained
147.8K views
Nov 30, 2018
YouTube
RSA Conference
See more videos
More like this
Feedback