All
Search
Images
Videos
Shorts
Maps
News
More
Shopping
Flights
Travel
Notebook
Report an inappropriate content
Please select one of the options below.
Not Relevant
Offensive
Adult
Child Sexual Abuse
IPX 811
CIA Triad
Defensive Design
OCR GCSE Mr. Brown
Valheim Base Defense
Defensive
Programming Avademic Paper
Valheim Sandbox Mode
Computing Paper Two
Defensive Design
Defensive
Programming
XSS Attacks
Valheim Dev Commands List
Zero Trust
Defensive
Programming in 12 Minutes
Unique Design
Real Ancient Weapons
GCSE Computer Science Tutor
Mod Secure by
Design
Derketo Conan Exiles Location
Zero Trust Architecture
Defensive Design
Anticipating Misuse
Defensive Design
GCSE Computer Science
Ztna Cisco
Kong Gateway
Cross Site Request Forgery
Valheim Defenses Gap
Length
All
Short (less than 5 minutes)
Medium (5-20 minutes)
Long (more than 20 minutes)
Date
All
Past 24 hours
Past week
Past month
Past year
Resolution
All
Lower than 360p
360p or higher
480p or higher
720p or higher
1080p or higher
Source
All
Dailymotion
Vimeo
Metacafe
Hulu
VEVO
Myspace
MTV
CBS
Fox
CNN
MSN
Price
All
Free
Paid
Clear filters
SafeSearch:
Moderate
Strict
Moderate (default)
Off
Filter
IPX 811
CIA Triad
Defensive Design
OCR GCSE Mr. Brown
Valheim Base Defense
Defensive
Programming Avademic Paper
Valheim Sandbox Mode
Computing Paper Two
Defensive Design
Defensive
Programming
XSS Attacks
Valheim Dev Commands List
Zero Trust
Defensive
Programming in 12 Minutes
Unique Design
Real Ancient Weapons
GCSE Computer Science Tutor
Mod Secure by
Design
Derketo Conan Exiles Location
Zero Trust Architecture
Defensive Design
Anticipating Misuse
Defensive Design
GCSE Computer Science
Ztna Cisco
Kong Gateway
Cross Site Request Forgery
Valheim Defenses Gap
6:25
YouTube
Computer Science Revision Hub
OCR Computer Science 2.3.1 Defensive design
🛡️ OCR GCSE Computer Science (J277) – Defensive Design In this video, we explore 2.3.1 Defensive Design from the OCR GCSE Computer Science specification. You’ll learn how programmers create robust and secure software through techniques such as input validation, authentication, and maintainable code design. We also look at the ...
35 views
7 months ago
Defensive Communication Skills
Soccer Drills To Improve Communication | 6 Amazing Drills
soccersourcecoaching.com
Oct 4, 2021
0:35
Master the Art of Effective Communication: Break Free from Defensive Patterns
YouTube
Sandall Mahapatra
564 views
1 month ago
6:31
Festival Week | Coaching session on defending skills
YouTube
England Football Learning
1.4K views
1 month ago
Top videos
4:05
2.3.1 Defensive Design - Revise GCSE Computer Science
YouTube
Revise Computer Science
3.2K views
Oct 14, 2021
17:52
Defensive Design & Input Validation | OCR GCSE Computer Science (J277)
YouTube
Mr Rahman
3 views
2 weeks ago
1:16
Defensive Design | 3.1 | OCR GCSE Computer Science | J277
YouTube
CSNewbs
2.1K views
Apr 30, 2025
Effective Defensive Strategies
0:54
How layered defenses stopped powerful offensives in WWII. #worldwar2 #militarystrategy
YouTube
Global War Insights
391 views
2 months ago
9:53
This Is How To Play Elite Man Coverage in Madden 26!
YouTube
TheDammKingGaming
9 views
2 weeks ago
2:40
Get Low to Play Better Defense | Pickleball Tips with a Pro
YouTube
Hawaii Pickleball Magazine
356 views
4 months ago
4:05
2.3.1 Defensive Design - Revise GCSE Computer Science
3.2K views
Oct 14, 2021
YouTube
Revise Computer Science
17:52
Defensive Design & Input Validation | OCR GCSE Computer Science (J
…
3 views
2 weeks ago
YouTube
Mr Rahman
1:16
Defensive Design | 3.1 | OCR GCSE Computer Science | J277
2.1K views
Apr 30, 2025
YouTube
CSNewbs
9:14
Defensive Design Considerations
702 views
Apr 6, 2025
YouTube
MrBrownCS
37:25
Wireless Deauthentication Attacks - Full Course
8.5K views
Jun 26, 2021
YouTube
Cybr
3:23
74. OCR GCSE (J277) 2.3 Defensive design considerations 1
63.3K views
Jan 6, 2020
YouTube
Craig'n'Dave
4:49
75. OCR GCSE (J277) 2.3 Defensive design considerations 2
46.8K views
Jan 6, 2020
YouTube
Craig'n'Dave
23:43
Design Authentication and Authorization Solutions: Part 1 | A
…
134 views
1 month ago
YouTube
Microsoft Learn
2:31
Use these 6 user authentication types to secure networks | TechTa
…
Dec 22, 2020
techtarget.com
18:31
Cybersecurity Architecture based on a Defense-in-Depth Design.
12.1K views
Dec 6, 2020
YouTube
Bernard Institute for Cybersecurity
2:00
Defensive Design: Protecting Users in the AI Era
141 views
5 months ago
YouTube
Commit & Push
9:12
How to Design an Authentication Protocol: Basics
4.2K views
Jan 16, 2019
YouTube
Anand Seetharam
12:27
Authentication vs. authorization
7 months ago
Microsoft
cilwerner
9:02
Lec#04 Secure Design Principles | Least Privilege, Defense in Depth
…
8 views
4 months ago
YouTube
Study Buddy AI
17:14
Episode 37: Secure Design Principles: Defense in Depth, Leas
…
3 months ago
YouTube
Bare Metal Cyber
8:04
4. DDD Tactical Design in 14 minutes Part #1
74.1K views
Dec 17, 2017
YouTube
Alpha Code
56:17
Detection Deep Dive with Defender for Identity Engineering - Microsof
…
1.6K views
Jun 1, 2021
YouTube
Microsoft Security Community
10:25
Defense in Depth: 5 Essential Cybersecurity Principles for Stron
…
55 views
Nov 3, 2024
YouTube
IT & AI Insights
12:20
Defensive Design & Security By Design in Software Development:
…
356 views
May 10, 2024
YouTube
Rakia Ben Sassi | EngForge
7:09
Defensive Refusal Bias: When AI Blocks Cyber Defenders (ICLR Wo
…
77 views
2 months ago
YouTube
David Campbell
1:20
Authentication Explained ⚡ | System Design #shorts
151 views
7 months ago
YouTube
TechByAni
2:43
Securing OpenID Connect: Common Attacks & Defense Strategies | AP
…
124 views
Jan 27, 2025
YouTube
Practical DevSecOps
17:22
Design a Simple Authentication System | System Design Interview
…
216.4K views
Apr 29, 2023
YouTube
Interview Pen
0:49
Protecting Your Router: Understanding Deauthentication A
…
47K views
Sep 19, 2022
TikTok
pentestingguru
1:29:38
Week 14 Defensive Security Lab: System Hardening, Log Analysis,
…
26 views
1 month ago
YouTube
Practical Academy
19:03
Enable authentication in your own web API by using Azure AD B2C
May 1, 2025
Microsoft
kengaderdus
16:08
Cyber Security Identity & Endpoint Architecture | Detection & Respon
…
31 views
2 months ago
YouTube
Skillweed
11:48
Defense in Depth | A Layered Security Strategy You NEED to Kn
…
339 views
Apr 20, 2025
YouTube
Cyber Education World
17:28
10 Principles for Secure by Design: Baking Security into Your Systems
55.7K views
Sep 3, 2024
YouTube
IBM Technology
See more videos
More like this
Feedback