All
Search
Images
Videos
Shorts
Maps
News
Copilot
More
Shopping
Flights
Travel
Notebook
Report an inappropriate content
Please select one of the options below.
Not Relevant
Offensive
Adult
Child Sexual Abuse
Design
Education
Design
Choice
Graphic
Design
Design
for Assembly
Design
Leadership
Design
Methods
Design
Brief
Interaction
Design
Design
Management
Design
Language
Design
Firm
Research
Design
Product
Design
Design
Rationale
Elements and Principles of
Design
Design
for Six Sigma
Defensive
Architecture
Defensive
Driver Training
Patriarcal
Deck
Designs
CPTED
Online Defensive
Driving Training
Nouvel Ordre
Robust Software
Clash of Clans
Design
Defensive
Tackle Drills
Defensive
Driving Class
Gnolam
Master of Orion 2
Dagz
Length
All
Short (less than 5 minutes)
Medium (5-20 minutes)
Long (more than 20 minutes)
Date
All
Past 24 hours
Past week
Past month
Past year
Resolution
All
Lower than 360p
360p or higher
480p or higher
720p or higher
1080p or higher
Source
All
Dailymotion
Vimeo
Metacafe
Hulu
VEVO
Myspace
MTV
CBS
Fox
CNN
MSN
Price
All
Free
Paid
Clear filters
SafeSearch:
Moderate
Strict
Moderate (default)
Off
Filter
Design
Education
Design
Choice
Graphic
Design
Design
for Assembly
Design
Leadership
Design
Methods
Design
Brief
Interaction
Design
Design
Management
Design
Language
Design
Firm
Research
Design
Product
Design
Design
Rationale
Elements and Principles of
Design
Design
for Six Sigma
Defensive
Architecture
Defensive
Driver Training
Patriarcal
Deck
Designs
CPTED
Online Defensive
Driving Training
Nouvel Ordre
Robust Software
Clash of Clans
Design
Defensive
Tackle Drills
Defensive
Driving Class
Gnolam
Master of Orion 2
Dagz
James Roberts Highlights
Micropython
Defensive
Driving Safety
Machinery of War
Free Defensive
Driving
Design
Jade
Defensive
Playstyle
Bard Craft
Designs
Building
Design
Basketball Defensive
Drills
Defensive
End Drills
Home Plans Architectural
Design
Cloud Defensive
Rein
Defensive
Line Practice Drills
1:16
Defensive Design | 3.1 | OCR GCSE Computer Science | J277
2.1K views
Apr 30, 2025
YouTube
CSNewbs
4:49
Find in video from 03:28
Authentication
75. OCR GCSE (J277) 2.3 Defensive design considerations 2
46.8K views
Jan 6, 2020
YouTube
Craig'n'Dave
4:05
Find in video from 00:21
Thought Authentication
2.3.1 Defensive Design - Revise GCSE Computer Science
3.2K views
Oct 14, 2021
YouTube
Revise Computer Science
37:25
Find in video from 02:44
Understanding Authentication Attacks
Wireless Deauthentication Attacks - Full Course
8.5K views
Jun 26, 2021
YouTube
Cybr
3:23
74. OCR GCSE (J277) 2.3 Defensive design considerations 1
63.3K views
Jan 6, 2020
YouTube
Craig'n'Dave
6:25
OCR Computer Science 2.3.1 Defensive design
35 views
7 months ago
YouTube
Computer Science Revision Hub
9:14
Defensive Design Considerations
702 views
Apr 6, 2025
YouTube
MrBrownCS
2:00
Defensive Design: Protecting Users in the AI Era
141 views
5 months ago
YouTube
Commit & Push
25:19
2.3 Defensive Design, Logic Gates & Truth Tables
44 views
1 month ago
YouTube
Wright Robinson Computing & Business
23:43
Design Authentication and Authorization Solutions: Part 1 | AZ-3
…
134 views
1 month ago
YouTube
Microsoft Learn
0:30
Brute-force attempts against PINs are a real physical risk — and awareness
…
44.7K views
6 months ago
Facebook
Cybersecurity by CyberKid
8:08
I Built a Defense System That Stops Hackers in Real-Time
19 views
1 month ago
YouTube
webprojectchannel
1:20
Authentication Explained ⚡ | System Design #shorts
151 views
7 months ago
YouTube
TechByAni
38:25
Defense in Depth Explained: How to Build Security That Actually Scales
64 views
1 month ago
YouTube
Build for Scale Podcast by Loveth
0:15
Zero Trust Architecture (ZTA) - Activate the Second Lock
126 views
5 months ago
YouTube
Almond Consulting
17:14
Episode 37: Secure Design Principles: Defense in Depth, Least Privilege
3 months ago
YouTube
Bare Metal Cyber
6:45
Cyber Defense Strategies: Protect Your Digital Life | Bluehat Cybersec A
…
7 views
1 month ago
YouTube
BlueHat CyberSec Academy: Start to Pro Level
9:02
Lec#04 Secure Design Principles | Least Privilege, Defense in Depth & F
…
8 views
4 months ago
YouTube
Study Buddy AI
19:25
NDSS 2026 - Analysis of the Security Design, Engineering, and Implementa
…
9 views
1 month ago
YouTube
NDSS Symposium
6:18
Episode 7 – A07 Authentication Failures Explained (OWASP Top 10
…
81 views
5 months ago
YouTube
SOCDemystified
5:09
How Brute-Force Attacks Target Instagram — Lab Demo & Protection (
…
1.3K views
6 months ago
YouTube
𝐂𝐲𝐛𝐞𝐫 𝐆𝐮𝐫𝐮 𝐍𝐆!
7:09
Defensive Refusal Bias: When AI Blocks Cyber Defenders (ICLR Works
…
77 views
2 months ago
YouTube
David Campbell
6:03
🚀 Digital Self-Defense: A Guide to Everyday Cybersecurity - Explained S
…
13 views
4 months ago
YouTube
DashtheExplainer
2:43
Securing OpenID Connect: Common Attacks & Defense Strategies | API S
…
124 views
Jan 27, 2025
YouTube
Practical DevSecOps
6:04
Authentication Explained: When to Use Basic, Bearer, OAuth2, JWT & SSO
389.4K views
10 months ago
YouTube
Hayk Simonyan
2:08
How Hackers Bypass Admin Login — Ethical Demo & Defense
326 views
7 months ago
YouTube
Xploit Boy
1:24:11
🚀 Day 22/100 – .NET Deep Dive | CoreStack Academy
3 views
1 week ago
YouTube
CoreStackAcademy
3:46
Strong Passwords & MFA: Your First Line of Cyber Defense | Cybersecurit
…
401 views
8 months ago
YouTube
Cybersecurity Tutorials
11:10
Defense in Depth in Cybersecurity. Information Systems and Controls IS
…
379 views
Mar 28, 2024
YouTube
Farhat Lectures. The # 1 CPA & Accounting Cou…
24:21
OWASP TOP 10 A4 Insecure Design (Campfire Security)
275 views
Mar 25, 2025
YouTube
Security in mind
See more videos
More like this
Feedback