ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

34 results

cloudlem
What is CI/CD? | Complete Beginner Guide for DevOps (Part 5)

Welcome back to the DevOps Learning Series In this video, we explain CI/CD (Continuous Integration and Continuous ...

8:00
What is CI/CD? | Complete Beginner Guide for DevOps (Part 5)

27 views

12 hours ago

kk funda
DevOps Training: Batch Repetition వల్ల Use ఉందా? | Why I Provide Lifetime Access?

DevOpsTelugu #KKFunda #DevOps2026 KK DevOps – Upcoming Batch Details Important Dates: Demo Session: ...

2:01
DevOps Training: Batch Repetition వల్ల Use ఉందా? | Why I Provide Lifetime Access?

353 views

18 hours ago

Tech Tutorials with Piyush
23/30 - Setup End-to-End Observability in AWS Using Terraform (Real-Time Project)

Welcome back to Day 23 of the 30-Day DevOps Challenge! In this video, I'll walk you through setting up a robust, end-to-end ...

51:44
23/30 - Setup End-to-End Observability in AWS Using Terraform (Real-Time Project)

359 views

21 hours ago

VLR Training
In the example, Sarah used a Badge, Retina Scan, and PIN  This is?#IAM

IAM #CyberSecurity #InfoSec #TechQuiz #CloudSecurity #Authentication #Authorization #Okta #MicrosoftEntra #ITCertification ...

0:21
In the example, Sarah used a Badge, Retina Scan, and PIN This is?#IAM

0 views

22 hours ago

VLR Training
Which item represents a Possession factor Something You Have?#IAM

IAM #CyberSecurity #InfoSec #TechQuiz #CloudSecurity #Authentication #Authorization #Okta #MicrosoftEntra #ITCertification ...

0:21
Which item represents a Possession factor Something You Have?#IAM

0 views

1 day ago

CodeLucky
DevOps Consultant: Career Guide, Skills, Salary & How to Get Started in DevOps Consulting

DevOps Consultant Career Guide - Everything You Need to Know! Discover the exciting career path of a DevOps Consultant!

7:31
DevOps Consultant: Career Guide, Skills, Salary & How to Get Started in DevOps Consulting

0 views

14 hours ago

VLR Training
Which of the following is considered a Secondary Authentication factor?#IAM

IAM #CyberSecurity #InfoSec #TechQuiz #CloudSecurity #Authentication #Authorization #Okta #MicrosoftEntra #ITCertification ...

0:21
Which of the following is considered a Secondary Authentication factor?#IAM

0 views

1 day ago

VLR Training
What are the three main factors of authentication?#IAM

IAM #CyberSecurity #InfoSec #TechQuiz #CloudSecurity #Authentication #Authorization #Okta #MicrosoftEntra #ITCertification ...

0:21
What are the three main factors of authentication?#IAM

0 views

23 hours ago

Uplatz
Neural Network Activation Functions & the Dying ReLU Problem | Uplatz

In this Uplatz Explainer, we break down neural network activation functions and take a deep look at the Dying ReLU problem—a ...

6:46
Neural Network Activation Functions & the Dying ReLU Problem | Uplatz

8 views

14 hours ago

VLR Training
Which of these is an example of the Something You Know factor?#IAM

IAM #CyberSecurity #InfoSec #TechQuiz #CloudSecurity #Authentication #Authorization #Okta #MicrosoftEntra #ITCertification ...

0:21
Which of these is an example of the Something You Know factor?#IAM

0 views

1 day ago

VLR Training
What does the Inherence factor rely on for verification?#IAM

IAM #CyberSecurity #InfoSec #TechQuiz #CloudSecurity #Authentication #Authorization #Okta #MicrosoftEntra #ITCertification ...

0:21
What does the Inherence factor rely on for verification?#IAM

0 views

1 day ago

VLR Training
What happens during a Low Risk login scenario?#IAM

IAM #CyberSecurity #InfoSec #TechQuiz #CloudSecurity #Authentication #Authorization #Okta #MicrosoftEntra #ITCertification ...

0:21
What happens during a Low Risk login scenario?#IAM

0 views

20 hours ago

VLR Training
What is the specific requirement for Two Factor Authentication 2FA?#IAM

IAM #CyberSecurity #InfoSec #TechQuiz #CloudSecurity #Authentication #Authorization #Okta #MicrosoftEntra #ITCertification ...

0:21
What is the specific requirement for Two Factor Authentication 2FA?#IAM

0 views

22 hours ago

VLR Training
What security method requires two different types of factors?#IAM

IAM #CyberSecurity #InfoSec #TechQuiz #CloudSecurity #Authentication #Authorization #Okta #MicrosoftEntra #ITCertification ...

0:21
What security method requires two different types of factors?#IAM

0 views

23 hours ago

VLR Training
Which item is an example of Something you HAVE?#IAM

IAM #CyberSecurity #InfoSec #TechQuiz #CloudSecurity #Authentication #Authorization #Okta #MicrosoftEntra #ITCertification ...

0:21
Which item is an example of Something you HAVE?#IAM

0 views

22 hours ago

VLR Training
What is the main benefit of Dynamic MFA for users?#IAM

IAM #CyberSecurity #InfoSec #TechQuiz #CloudSecurity #Authentication #Authorization #Okta #MicrosoftEntra #ITCertification ...

0:21
What is the main benefit of Dynamic MFA for users?#IAM

33 views

19 hours ago

VLR Training
What is another name for Dynamic MFA?#IAM

IAM #CyberSecurity #InfoSec #TechQuiz #CloudSecurity #Authentication #Authorization #Okta #MicrosoftEntra #ITCertification ...

0:21
What is another name for Dynamic MFA?#IAM

0 views

20 hours ago

EkasCloud Online Courses
1-Year PG Program = Long-Term Career Growth  | Ekascloud

Reach us https://ekascloud.com/ekaspromo/cloud-training +919345171232 +447405103328 +91 8148032252 Get Discount ...

0:39
1-Year PG Program = Long-Term Career Growth | Ekascloud

0 views

1 hour ago

EkasCloud Online Courses
Public Subnet and Private Subnet  by Dr. Savitha #Studentmade | Ekascloud

Reach us https://ekascloud.com/ekaspromo/cloud-training +919345171232 +447405103328 +91 8148032252 Get Discount ...

15:25
Public Subnet and Private Subnet by Dr. Savitha #Studentmade | Ekascloud

0 views

21 hours ago

VLR Training
Why do IAM systems implement MFA?#IAM

IAM #CyberSecurity #InfoSec #TechQuiz #CloudSecurity #Authentication #Authorization #Okta #MicrosoftEntra #ITCertification ...

0:21
Why do IAM systems implement MFA?#IAM

0 views

21 hours ago