ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

177,824 results

Microsoft Azure
Authentication fundamentals: The basics | Microsoft Entra ID

In this video, Microsoft Entra ID Program Manager Stuart Kwan explains the basic concepts and fundamental workings of ...

4:33
Authentication fundamentals: The basics | Microsoft Entra ID

274,714 views

6 years ago

Practical Networking
MAC / HMAC - Message Authentication Code / Hash Bashed Message Authentication Codes

In this video we explore the concepts of MACs. We first explore why Hashing alone is not enough, which leads us into the ...

6:52
MAC / HMAC - Message Authentication Code / Hash Bashed Message Authentication Codes

39,046 views

1 year ago

Practical Networking
Data Integrity - How Hashing is used to ensure data isn't modified - HMAC - Cryptography

Data Integrity seeks to assure that data has not been modified in transit between a sender and receiver. This assurance is ...

7:24
Data Integrity - How Hashing is used to ensure data isn't modified - HMAC - Cryptography

82,012 views

4 years ago

SoftsWeb
API Authentication EXPLAINED! 🔐 OAuth vs JWT vs API Keys 🚀

Confused about API authentication? In this video, we break down OAuth, JWT, and API Keys, explaining when and why to use ...

9:42
API Authentication EXPLAINED! 🔐 OAuth vs JWT vs API Keys 🚀

388,674 views

1 year ago

JayPMedia
HMAC & Message Authentication Codes (MACs) - Why Hashing alone is NOT ENOUGH for data integrity

This is one of the many videos in the mini-series of HTTPS ...

6:09
HMAC & Message Authentication Codes (MACs) - Why Hashing alone is NOT ENOUGH for data integrity

10,354 views

2 years ago

ByteMonk
API Authentication: JWT, OAuth2, and More

In this video, we dive into API Authentication, covering why it's essential, how it secures API access, and four common methods: ...

6:12
API Authentication: JWT, OAuth2, and More

330,857 views

1 year ago

Computerphile
Securing Stream Ciphers (HMAC) - Computerphile

Bit flipping a stream cipher could help you hit the Jackpot! But not with HMAC. Dr Mike Pound explains. Correction : "pseudo" is ...

9:24
Securing Stream Ciphers (HMAC) - Computerphile

332,354 views

8 years ago

Epic Networks Lab
Securing 5G: Authentication & Key Exchange in Cellular | Computer Networks Ep. 8.8.2 | Kurose & Ross

Answering the question: "How does cell phone encryption work?" This video covers security in wireless and mobile networks, ...

5:54
Securing 5G: Authentication & Key Exchange in Cellular | Computer Networks Ep. 8.8.2 | Kurose & Ross

3,765 views

4 years ago

Trouble- Free
#33 Message Authentication & Authentication Functions in Cryptography |CNS|

Abroad Education Channel : https://www.youtube.com/channel/UC9sgREj-cfZipx65BLiHGmw Company Specific HR Mock ...

6:12
#33 Message Authentication & Authentication Functions in Cryptography |CNS|

211,440 views

4 years ago

IEEE SecDev
For developing Physical Unclonable Functions for Device Authentication

Award acceptance speech by Srinivas Devadas (MIT).

15:19
For developing Physical Unclonable Functions for Device Authentication

870 views

4 years ago

Adam Marczak - Azure for Everyone
AZ-900 Episode 25 | Azure Identity Services | Authentication, Authorization & Active Directory (AD)

Identity and Access Management is one of the most important topics for anyone working with Azure. Today we will discuss the ...

11:41
AZ-900 Episode 25 | Azure Identity Services | Authentication, Authorization & Active Directory (AD)

251,789 views

5 years ago

Abhishek Sharma
Authentication functions and 3 ways to produce authentication | Message authentication

Hello friends! Welcome to my channel. My name is Abhishek Sharma. #abhics789 If you learned something new do like and share ...

11:49
Authentication functions and 3 ways to produce authentication | Message authentication

276,804 views

6 years ago

Jan Goebel
HMAC explained | keyed hash message authentication code

More exclusive content: https://productioncoder.com/you-decide-what-we-build-next Twitter: https://twitter.com/_jgoebel Blog: ...

6:33
HMAC explained | keyed hash message authentication code

88,449 views

4 years ago

ComTech Network Solutions
Multi-Factor Authentication (MFA): Why You Need It & How to Use It

Ethan from ComTech explains the best practices for setting up Multi-Factor Authentication (MFA) to secure your accounts.

6:18
Multi-Factor Authentication (MFA): Why You Need It & How to Use It

724 views

1 year ago

Web Dev Simplified
Build Node.js User Authentication - Password Login

In this video we are going to build a secure Node.js user authentication system. I will be covering all of the security concerns that ...

13:31
Build Node.js User Authentication - Password Login

573,089 views

6 years ago

Cyber Experts Academy
What is AAA (Authentication, Authorisation, & Accounting) & IAM? - Beginner's Cyber Security Series

This video consists of easy to understand introductions to IAM (Identity and Access Management) and AAA (Authentication, ...

4:34
What is AAA (Authentication, Authorisation, & Accounting) & IAM? - Beginner's Cyber Security Series

11,846 views

3 years ago

Jeff Brown Tech
Securing Azure Functions with Keys, Key Vaults, Identity, and Networking

Secrets, keys, and identity—oh my! Learn how to lock down your Azure Function App with Key Vault secrets, identity-based ...

16:22
Securing Azure Functions with Keys, Key Vaults, Identity, and Networking

2,254 views

10 months ago

leerob
Next.js App Router Authentication (Sessions, Cookies, JWTs)

Learn the foundations of session based authentication through cookies in the Next.js App Router, and how community libraries ...

11:31
Next.js App Router Authentication (Sessions, Cookies, JWTs)

344,356 views

2 years ago

dotnet
Authentication for Serverless apps

Security can be tricky, especially when comes to serverless. Azure App Service Auth (also referred to as “Easy Auth”) does ...

17:01
Authentication for Serverless apps

7,954 views

4 years ago

Coding Droplets
Blazor Authentication Tutorial - How to Authorize in Blazor [Blazor Tutorial]

Get Source Code by Supporting on Patreon: https://patreon.com/CodingDroplets Blazor Tutorial Series Playlist link: ...

14:25
Blazor Authentication Tutorial - How to Authorize in Blazor [Blazor Tutorial]

84,326 views

2 years ago