Похожие видео
array(10) {
[0]=>
object(stdClass)#5014 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "l0BCfS4cQiY"
["related_video_title"]=>
string(62) ""Shift Left" - Secure DevOps Pipelines and Application Secrets"
["posted_time"]=>
string(21) "4 года назад"
["channelName"]=>
string(8) "CyberArk"
}
[1]=>
object(stdClass)#4987 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "YezrQahDnv8"
["related_video_title"]=>
string(74) "Best Practices for Privileged Access & Secrets Management in the Cloud"
["posted_time"]=>
string(19) "5 лет назад"
["channelName"]=>
string(22) "BC Aware Video Content"
}
[2]=>
object(stdClass)#5012 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "PQ3b9s_tHwo"
["related_video_title"]=>
string(74) "CyberArk Training for Beginners | Introduction to PAM & Vault Concepts"
["posted_time"]=>
string(25) "2 месяца назад"
["channelName"]=>
string(22) "Space Skill Technology"
}
[3]=>
object(stdClass)#5019 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "2ZYSzOYtvEo"
["related_video_title"]=>
string(48) "CyberArk Webinar - Endpoint Privilege Management"
["posted_time"]=>
string(21) "4 года назад"
["channelName"]=>
string(31) "Set Solutions, a Trace3 Company"
}
[4]=>
object(stdClass)#4998 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "Aj9o8xSs6_0"
["related_video_title"]=>
string(93) "CyberArk Tutorial | Explore CyberArk In An Hour [CyberArk Tutorial For Beginners] - Mindmajix"
["posted_time"]=>
string(21) "4 года назад"
["channelName"]=>
string(9) "MindMajix"
}
[5]=>
object(stdClass)#5016 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "PpbxSBgkEYk"
["related_video_title"]=>
string(76) "How to Use REST APIs for CyberArk CorePAS | E3: Ask CyberArk 🎙️ Podcast"
["posted_time"]=>
string(21) "4 года назад"
["channelName"]=>
string(8) "CyberArk"
}
[6]=>
object(stdClass)#5011 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "9HmuCskJKY8"
["related_video_title"]=>
string(44) "FortiPAM Demo | Privileged Access Management"
["posted_time"]=>
string(19) "1 год назад"
["channelName"]=>
string(8) "Fortinet"
}
[7]=>
object(stdClass)#5021 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "iZQQvj7yt_o"
["related_video_title"]=>
string(102) "Как начать работать с Obsidian ПРАВИЛЬНО (Гайд для новичков)"
["posted_time"]=>
string(27) "9 месяцев назад"
["channelName"]=>
string(47) "Владилен Минин | Result University"
}
[8]=>
object(stdClass)#4997 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "5uNifnVlBy4"
["related_video_title"]=>
string(71) "Cybersecurity Architecture: Who Are You? Identity and Access Management"
["posted_time"]=>
string(21) "2 года назад"
["channelName"]=>
string(14) "IBM Technology"
}
[9]=>
object(stdClass)#5015 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "56Ihv5MF4_U"
["related_video_title"]=>
string(34) "Microsoft Intune From Zero to Hero"
["posted_time"]=>
string(19) "1 год назад"
["channelName"]=>
string(15) "Andy Malone MVP"
}
}
"Shift Left" - Secure DevOps Pipelines and Application Secrets
Best Practices for Privileged Access & Secrets Management in the Cloud
CyberArk Training for Beginners | Introduction to PAM & Vault Concepts
CyberArk Webinar - Endpoint Privilege Management
CyberArk Tutorial | Explore CyberArk In An Hour [CyberArk Tutorial For Beginners] - Mindmajix
How to Use REST APIs for CyberArk CorePAS | E3: Ask CyberArk 🎙️ Podcast
FortiPAM Demo | Privileged Access Management
Как начать работать с Obsidian ПРАВИЛЬНО (Гайд для новичков)
Cybersecurity Architecture: Who Are You? Identity and Access Management
Microsoft Intune From Zero to Hero