ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

4,560 results

The Security Coach Academy
Global Security Operations Center | GSOC | Technology | Intelligence Gathering

The Security Coach App teaches you how to create your own Global Security Operations Center that will give you information on ...

7:34
Global Security Operations Center | GSOC | Technology | Intelligence Gathering

3,306 views

2 years ago

ANDRADETV
Niamey Attack Foiled: Niger Security Forces Apprehend Terrorist Cell

This video details how joint security operations not only repelled the attack but also led to the swift arrest of the terrorist operatives ...

24:47
Niamey Attack Foiled: Niger Security Forces Apprehend Terrorist Cell

651 views

1 hour ago

Cyber with Ben
I Passed the Security Blue Team Level 1 Exam

Check out the BTL1 here https://www.securityblue.team/why-btl1/ In this video, I share my honest review on the Security Blue ...

9:31
I Passed the Security Blue Team Level 1 Exam

36,089 views

1 year ago

Jhon Martinez
From Welder to Cybersecurity: What is a SOC Analyst and Why I Want to Become One

In this video, I'll explain in simple terms what a Security Operations Center (SOC) is, what a SOC Analyst does day to day, and ...

3:15
From Welder to Cybersecurity: What is a SOC Analyst and Why I Want to Become One

171 views

4 months ago

PushToProd
day in the life | Jr. Cybersecurity Engineer

Hey Guys! Hope you enjoy this day in the life/vlog as a Cybersecurity Engineer video. I'll give you a little glimpse into my world, ...

11:12
day in the life | Jr. Cybersecurity Engineer

185,807 views

2 years ago

Tomi Tech
DAY IN THE LIFE - Entry Cyber security roles explained. How can you get started?

Join me for a day in my life as I prep for a new job. I'll share the hidden truths about starting a career in cybersecurity. From the ...

8:08
DAY IN THE LIFE - Entry Cyber security roles explained. How can you get started?

18,835 views

1 year ago

Namaste California
Investigating Vulnerabilities in Network Security Infrastructure | Vulnerability Management

... something we deal in a day-to-day operations and that's why every organization have a security operation function uh assisting ...

13:24
Investigating Vulnerabilities in Network Security Infrastructure | Vulnerability Management

84 views

1 year ago

CyberBudo
Making heaps of money as a cyber security professional!
9:50
Making heaps of money as a cyber security professional!

28 views

10 months ago

Cyber with Ben
Why Cyber Security Is Not For You

In this video I walk you through the top 3 insights that I've discovered since beginning my first role in cyber security. GIVEAWAY ...

6:22
Why Cyber Security Is Not For You

6,980 views

1 year ago

CyberBudo
No skills and no background?  This is how to get into the field of cyber security.

cybersecurity.

10:18
No skills and no background? This is how to get into the field of cyber security.

187 views

1 year ago

RISKMAN
7 Key Tips for Evaluating a SOC 2 Type 2 Report!

In this video you will learn the fundamentals of a SOC 2 Type 2 certification, as well as what key items you should look for when ...

9:23
7 Key Tips for Evaluating a SOC 2 Type 2 Report!

24 views

1 year ago

ForeverAnonymous
How Hackers Actually Break Into Companies (Explained in 60 Seconds) #fypシ゚viral #viral

Most people think hackers need crazy tools or advanced coding skills. The truth? Most hacks start with one email and one click.

0:58
How Hackers Actually Break Into Companies (Explained in 60 Seconds) #fypシ゚viral #viral

3,356 views

7 months ago

ITGains
My Cybersecurity Journey So Far

cybersecurity #informationtechnology #informationsecurity #socanalyst.

6:22
My Cybersecurity Journey So Far

148 views

5 months ago

CTRL+ALT+DEFEND
🔥 What If You Became A SOC Analyst Tomorrow 🔥

... a person who works in Security Operations Center in cybersecurity department which is like heart of cyber defense operations.

0:23
🔥 What If You Became A SOC Analyst Tomorrow 🔥

637 views

11 months ago

Security Warden
How Attackers Bypass EDR in 2025 (Real Techniques + How to Stop Them)

Cyber attackers can now buy EDR bypass kits on the dark web. Modern Endpoint Detection & Response tools are powerful with ...

7:33
How Attackers Bypass EDR in 2025 (Real Techniques + How to Stop Them)

306 views

2 months ago

Tebs Tech
Get a job in cybersecurity with hands on labs

Learn how to get a job in cybersecurity with hands-on labs. This video will cover the essential skills and knowledge you need to ...

5:57
Get a job in cybersecurity with hands on labs

365 views

1 year ago

ALTAS IT
GENETEC OPERATIONS CENTER: every security team needs it

genetec #security.

3:13
GENETEC OPERATIONS CENTER: every security team needs it

526 views

1 year ago

SOCSoter
Control the Chaos Pt. 5

WARNING⚠️ There are monsters on your devices Happy #Halloween from your favorite chaotic character! As we come to our ...

1:23
Control the Chaos Pt. 5

43 views

2 years ago

GhostStrats
How Quantum Computing Will Revolutionize Cyber Security ( And Create Quantum Hackers! )

In this video, we explore the fascinating world of quantum computing and how it will change the future of cybersecurity. Learn how ...

5:35
How Quantum Computing Will Revolutionize Cyber Security ( And Create Quantum Hackers! )

4,828 views

10 months ago

SOCSoter
Control the Chaos Pt. 3

It's time for your business to start winning! We continue our #cyberawareness chaotic journey by diving into the importance of ...

1:22
Control the Chaos Pt. 3

30 views

2 years ago