Channel Avatar

Technically U @UCrIwf0spcIP4hU54KGrzu6g@youtube.com

544 subscribers - no pronouns :c

Technically U, The Place for Future Technologist, covers leg


02:54
Cloud Computing
03:36
IT Transformation
05:49
Industrial Control System Security (ICS Security)
06:39
Business Email Compromise (BEC)
04:24
Network Segmentation
04:40
Cloud Native Application Protection Platform (CNAPP)
06:39
Software Defined Perimeter (SDP)
04:25
Transport Layer Security - TLS
03:36
Cloud Workload Protection Platform - CWPP
04:48
What is Vulnerability Scanning
04:52
Secure Email Gateway - SEG
03:34
Virtual Network Function - VNF
06:44
Network Functions Virtualization - NFV
04:39
What is Big Data
04:44
DMARC - Domain-based Message Authentication Reporting & Conformance
03:54
What is Patch Management
04:16
Robotic Process Automation - RPA
04:39
Resource Public Key Infrastructure - RPKI
03:34
Extended Detection and Response - XDR
01:57
Welcome to Technically U - "The place for future technologist"
03:28
Common Telephony Terms - Vol Seven - Series Final
03:55
Common Telephony Terms - Vol Six - R to S
04:18
Common Telephony Terms - Vol Five (M to P)
04:06
Common Telephony Terms - Vol Four (L and M)
03:07
Common Telephony Terms - Vol Three - (I to J)
04:05
Common Telephony Terms - Vol Two (D to G)
04:00
Common Telephony Terms - Vol One
04:06
Cloud Security Posture Management - CSPM
02:34
What is DevSecOps
04:42
What is Shadow IT
03:33
Watering Hole Attacks
04:54
Customer Relationship Management (CRM)
03:27
Common Cybersecurity Terms
03:42
What is Spear Phishing
03:32
What is Multicast Routing Protocol
03:01
What is Remote Code Execution (RCE)
04:13
What is Fileless Malware
03:36
What is Network Detection & Response (NDR)
04:22
What is QR Code Abuse (Qshing)
04:13
What is SOAR - Security Orchestration, Automation, & Response
02:42
What are SPY Pixels (Email Tracking Beacons)
03:05
What is Endpoint Detection and Response (Part Two)
03:16
What is Endpoint Detection and Response (Part One)
03:55
What is Business Continuity Planning (BCP)
04:51
What is Hosted VoIP
03:35
What is Advanced Persistent Threat (APT)
03:58
What is XGS PON 10G Broadband
04:59
What is a TDoS Attack
04:21
What is Toll Fraud (IRSF)
03:06
What are Brute Force Attacks - Part Two
04:16
What are Brute Force Attacks - Part One
04:35
What is a Man In the Middle Attack
04:19
What is Micro Segmentation
03:54
What is GETS - Government Emergency Telecommunications
04:05
What is DHCP - Dynamic Host Configuration Protocol
03:20
What is a Service Mesh
04:19
What is Apple's IDFA (Identifier for Advertisers) - Release 14.5
04:26
What is a REST API
04:09
What is Unified Threat Management (UTM) Part Two
04:20
What is Unified Threat Management (UTM) - Part One