All
Search
Images
Videos
Maps
News
More
Shopping
Flights
Travel
Notebook
Report an inappropriate content
Please select one of the options below.
Not Relevant
Offensive
Adult
Child Sexual Abuse
Length
All
Short (less than 5 minutes)
Medium (5-20 minutes)
Long (more than 20 minutes)
Date
All
Past 24 hours
Past week
Past month
Past year
Resolution
All
Lower than 360p
360p or higher
480p or higher
720p or higher
1080p or higher
Source
All
Dailymotion
Vimeo
Metacafe
Hulu
VEVO
Myspace
MTV
CBS
Fox
CNN
MSN
Price
All
Free
Paid
Clear filters
SafeSearch:
Moderate
Strict
Moderate (default)
Off
Filter
Community-Based Protection (CBP) | UNHCR
11 months ago
unhcr.org
How to Build a Successful Data Protection Strategy | IBM
May 28, 2024
ibm.com
0:40
35 reactions · 11 shares | What is the Protection of Civilians (POC)
…
2K views
4 weeks ago
Facebook
United Nations Peacekeeping
3:11
How Do Innovative Approaches Protect Child And Family Rights?
…
10 views
2 months ago
YouTube
Child Welfare Network
3:05
What Strategies Strengthen Family Protective Factors Effectively?
1 month ago
YouTube
Child Welfare Network
3:24
What Strategies Implement Secure Data Protection Systems?
1 month ago
YouTube
Security First Corp
40:46
Debating policy recommendations about inclusive social protection i
…
56 views
3 months ago
YouTube
Institute of Development Studies
0:41
Long Term Care Protect Your Wealth With These Strategies
6 views
1 month ago
YouTube
Philip Gallant
2:58
What Foundational Ideas Guide Non-State Protection?
1 month ago
YouTube
Learn About Libertarianism
2:53
Does Modern Liberalism's Border Approach Protect America's Bord
…
2 months ago
YouTube
America First Democrats
3:17
What Are the Guiding Concepts for Non-Governmental Safety?
1 month ago
YouTube
Learn About Libertarianism
4:41
What Are Standard Threat Analysis Methodologies For Consistency?
…
2 months ago
YouTube
Security First Corp
4:13
How Do Non-Coercive Systems Provide Protection?
1 month ago
YouTube
Learn About Libertarianism
3:45
What Methods Strengthen Data Security Controls?
1 month ago
YouTube
AI and Technology Law
11:59
Security Mechanisms
238K views
Apr 9, 2021
YouTube
Neso Academy
0:19
Phoenix Close Protection Course
108.4K views
May 7, 2019
YouTube
PhoenixGroupTV
0:33
Port Protection | National Geographic
66K views
Jul 16, 2015
YouTube
National Geographic
3:13
Protective relays -- introduction
13.7K views
Feb 24, 2012
YouTube
BTCInstrumentation
18:59
Evidence-Based Practice: Improving Practice, Improving Outcomes (Pa
…
264.1K views
Jun 3, 2014
YouTube
OvidWoltersKluwer
3:53
How to Protect Your Data Online
1.1M views
Sep 15, 2014
YouTube
NOVA PBS Official
8:45
Strength based approach. Care Act 2014
81K views
Jun 1, 2015
YouTube
Social Care Institute for Excellence (SCIE)
1:53
Human rights - based approach
35.8K views
Dec 11, 2018
YouTube
The Danish Institute for Human Rights
3:35
What is Harm Reduction?
35.1K views
Nov 22, 2018
YouTube
AIDS Action Europe
5:13
Principles of Prevention, Module 5
26.4K views
May 29, 2019
YouTube
Centers for Disease Control and Prevention (C…
1:57
7 Steps to Strategic Planning Process
83K views
Sep 1, 2020
YouTube
Crunch TimeZ Fractional CFO
1:14
NATO's close protection agents - the silent professionals
49.7K views
Sep 28, 2018
YouTube
NATO
14:56
An Introduction to Microsoft Azure Information Protection
96K views
Jun 22, 2016
YouTube
Microsoft Mechanics
13:07
Introduction to strengths based practice (2019)
46.1K views
May 20, 2019
YouTube
Graeme Stuart
1:10
How Active & Passive Fire Protection Systems Matters
8.9K views
Jan 19, 2021
YouTube
Zahid FPS&LS
2:12
Health promotion approaches and strategies
38.1K views
Jun 19, 2018
YouTube
pdhpe.net
See more videos
More like this
Feedback