[ FreeCourseWeb.com ] Udemy - Cybersecurity defenses with GenAI
File List
- ~Get Your Files Here !/2 - Introduction to GenAI in Cybersecurity/3 -Key differences between traditional AI and GenAI.mp4 61.1 MB
- ~Get Your Files Here !/3 - Understanding Microsoft Security Copilot/2 -How Security Copilot works.mp4 39.5 MB
- ~Get Your Files Here !/1 - Introduction/1 -About course.mp4 34.6 MB
- ~Get Your Files Here !/3 - Understanding Microsoft Security Copilot/7 -Demo - Option 2 - Configure Microsoft Security Copilot.mp4 28.2 MB
- ~Get Your Files Here !/3 - Understanding Microsoft Security Copilot/4 -Integration with Microsoft Defender XDR & Sentinel.mp4 27.3 MB
- ~Get Your Files Here !/3 - Understanding Microsoft Security Copilot/1 -Architecture & Components.mp4 23.7 MB
- ~Get Your Files Here !/1 - Introduction/3 -Additional courses that can help you.mp4 21.8 MB
- ~Get Your Files Here !/6 - GenAI for Proactive Threat Hunting/2 -Creating Hunting Queries Using Natural Language.mp4 21.2 MB
- ~Get Your Files Here !/9 - Building an AI-Powered Security Strategy/1 -Future-Ready AI-Driven SOC Vision.mp4 20.5 MB
- ~Get Your Files Here !/2 - Introduction to GenAI in Cybersecurity/2 -Evolution of AI in Cybersecurity.mp4 20.4 MB
- ~Get Your Files Here !/5 - Automating Security Operations with GenAI/3 -Case study Automated Incident Reporting.mp4 20.0 MB
- ~Get Your Files Here !/7 - Advanced Security Reporting with GenAI/3 -Effective Communication of Security Posture.mp4 19.5 MB
- ~Get Your Files Here !/9 - Building an AI-Powered Security Strategy/3 -Trends and Innovations in AI Security.mp4 19.3 MB
- ~Get Your Files Here !/2 - Introduction to GenAI in Cybersecurity/4 -Introducing Microsoft Security Copilot.mp4 18.9 MB
- ~Get Your Files Here !/6 - GenAI for Proactive Threat Hunting/3 -Integrating Threat Hunting with Microsoft Sentinel.mp4 18.5 MB
- ~Get Your Files Here !/7 - Advanced Security Reporting with GenAI/1 -Creating Executive-Level Reports.mp4 18.3 MB
- ~Get Your Files Here !/10 - Course conclusion/3 -Certification and Career Guidance.mp4 18.2 MB
- ~Get Your Files Here !/1 - Introduction/5 -Important Note and considerations.mp4 17.8 MB
- ~Get Your Files Here !/4 - GenAI for Threat Detection and Response/2 -Automating Threat Intelligence with GenAI.mp4 17.5 MB
- ~Get Your Files Here !/9 - Building an AI-Powered Security Strategy/2 -Enhancing Existing Tools with Copilot.mp4 17.3 MB
- ~Get Your Files Here !/6 - GenAI for Proactive Threat Hunting/1 -Fundamentals of Threat Hunting with AI.mp4 17.2 MB
- ~Get Your Files Here !/6 - GenAI for Proactive Threat Hunting/4 -Case study The Scenario Suspicious Sign-ins from a Privileged Account.mp4 17.1 MB
- ~Get Your Files Here !/7 - Advanced Security Reporting with GenAI/2 -Automating Compliance Documentation.mp4 16.8 MB
- ~Get Your Files Here !/4 - GenAI for Threat Detection and Response/1 -AI-Enhanced Incident Detection.mp4 16.8 MB
- ~Get Your Files Here !/3 - Understanding Microsoft Security Copilot/5 -Ethical considerations and Responsible AI Usage.mp4 16.8 MB
- ~Get Your Files Here !/5 - Automating Security Operations with GenAI/2 -Automating Security Workflows.mp4 16.6 MB
- ~Get Your Files Here !/10 - Course conclusion/4 -Course Feedback and Closing Remarks.mp4 16.4 MB
- ~Get Your Files Here !/4 - GenAI for Threat Detection and Response/3 -Using Natural Language for Log Analysis.mp4 16.1 MB
- ~Get Your Files Here !/10 - Course conclusion/2 -Continued Learning Resources.mp4 15.7 MB
- ~Get Your Files Here !/8 - Role-Specific Use Cases/4 -Use Cases for Security Executives.mp4 15.7 MB
- ~Get Your Files Here !/5 - Automating Security Operations with GenAI/1 -Enhancing SOC Operations with GenAI.mp4 15.2 MB
- ~Get Your Files Here !/8 - Role-Specific Use Cases/2 -Use Cases for Incident Responders.mp4 14.8 MB
- ~Get Your Files Here !/5 - Automating Security Operations with GenAI/4 -Balancing Automation and Human Oversight.mp4 14.7 MB
- ~Get Your Files Here !/8 - Role-Specific Use Cases/1 -Use Cases for Security Analysts.mp4 14.6 MB
- ~Get Your Files Here !/3 - Understanding Microsoft Security Copilot/3 -Core features & functionalities.mp4 14.5 MB
- ~Get Your Files Here !/3 - Understanding Microsoft Security Copilot/6 -Demo - Option 1 - Configure Microsoft Security Copilot.mp4 14.2 MB
- ~Get Your Files Here !/2 - Introduction to GenAI in Cybersecurity/1 -What is Generative AI.mp4 14.1 MB
- ~Get Your Files Here !/10 - Course conclusion/1 -Key Learnings and Takeaways.mp4 14.1 MB
- ~Get Your Files Here !/8 - Role-Specific Use Cases/3 -Use Cases for Threat Hunters.mp4 13.9 MB
- ~Get Your Files Here !/1 - Introduction/2 -Who am I.mp4 10.5 MB
- ~Get Your Files Here !/3 - Understanding Microsoft Security Copilot/8 -Demo - Integrate Defender XDR and Sentinel.mp4 9.4 MB
- ~Get Your Files Here !/1 - Introduction/4 -Pre-requisites for this course.mp4 9.2 MB
- ~Get Your Files Here !/6 - GenAI for Proactive Threat Hunting/1 -GenAI for proative Threat Hunting.pdf 1.3 MB
- ~Get Your Files Here !/2 - Introduction to GenAI in Cybersecurity/1 -Introduction to GenAI in Cybersecurity.pdf 1.3 MB
- ~Get Your Files Here !/5 - Automating Security Operations with GenAI/1 -Automating Security Operations with GenAI.pdf 1.0 MB
- ~Get Your Files Here !/7 - Advanced Security Reporting with GenAI/1 -Advanced security reporting with GenAI.pdf 903.8 KB
- ~Get Your Files Here !/4 - GenAI for Threat Detection and Response/1 -GenAI for Threat Detection and Analyis.pdf 878.3 KB
- ~Get Your Files Here !/10 - Course conclusion/1 -Course conclusion.pdf 866.4 KB
- ~Get Your Files Here !/8 - Role-Specific Use Cases/1 -Role specific use cases.pdf 814.2 KB
- ~Get Your Files Here !/3 - Understanding Microsoft Security Copilot/1 -Understanding Microsoft Security Copilot.pdf 606.9 KB
- ~Get Your Files Here !/1 - Introduction/1 -Introduction1.pdf 499.0 KB
- ~Get Your Files Here !/9 - Building an AI-Powered Security Strategy/1 -Building an AI-Powered security strategy.pdf 194.7 KB
- ~Get Your Files Here !/2 - Introduction to GenAI in Cybersecurity/3 -Key differences between traditional AI and GenAI.en_US.vtt 6.9 KB
- ~Get Your Files Here !/3 - Understanding Microsoft Security Copilot/7 -Demo - Option 2 - Configure Microsoft Security Copilot.en_US.vtt 6.7 KB
- ~Get Your Files Here !/3 - Understanding Microsoft Security Copilot/2 -How Security Copilot works.en_US.vtt 3.8 KB
- ~Get Your Files Here !/1 - Introduction/1 -About course.en_US.vtt 3.8 KB
- ~Get Your Files Here !/3 - Understanding Microsoft Security Copilot/6 -Demo - Option 1 - Configure Microsoft Security Copilot.en_US.vtt 3.8 KB
- ~Get Your Files Here !/9 - Building an AI-Powered Security Strategy/3 -Trends and Innovations in AI Security.en_US.vtt 3.8 KB
- ~Get Your Files Here !/6 - GenAI for Proactive Threat Hunting/2 -Creating Hunting Queries Using Natural Language.en_US.vtt 3.7 KB
- ~Get Your Files Here !/6 - GenAI for Proactive Threat Hunting/3 -Integrating Threat Hunting with Microsoft Sentinel.en_US.vtt 3.7 KB
- ~Get Your Files Here !/7 - Advanced Security Reporting with GenAI/2 -Automating Compliance Documentation.en_US.vtt 3.7 KB
- ~Get Your Files Here !/5 - Automating Security Operations with GenAI/2 -Automating Security Workflows.en_US.vtt 3.6 KB
- ~Get Your Files Here !/4 - GenAI for Threat Detection and Response/2 -Automating Threat Intelligence with GenAI.en_US.vtt 3.5 KB
- ~Get Your Files Here !/5 - Automating Security Operations with GenAI/3 -Case study Automated Incident Reporting.en_US.vtt 3.4 KB
- ~Get Your Files Here !/9 - Building an AI-Powered Security Strategy/2 -Enhancing Existing Tools with Copilot.en_US.vtt 3.4 KB
- ~Get Your Files Here !/6 - GenAI for Proactive Threat Hunting/4 -Case study The Scenario Suspicious Sign-ins from a Privileged Account.en_US.vtt 3.3 KB
- ~Get Your Files Here !/1 - Introduction/3 -Additional courses that can help you.en_US.vtt 3.2 KB
- ~Get Your Files Here !/7 - Advanced Security Reporting with GenAI/3 -Effective Communication of Security Posture.en_US.vtt 3.2 KB
- ~Get Your Files Here !/6 - GenAI for Proactive Threat Hunting/1 -Fundamentals of Threat Hunting with AI.en_US.vtt 3.2 KB
- ~Get Your Files Here !/3 - Understanding Microsoft Security Copilot/3 -Core features & functionalities.en_US.vtt 3.2 KB
- ~Get Your Files Here !/3 - Understanding Microsoft Security Copilot/4 -Integration with Microsoft Defender XDR & Sentinel.en_US.vtt 3.1 KB
- ~Get Your Files Here !/4 - GenAI for Threat Detection and Response/3 -Using Natural Language for Log Analysis.en_US.vtt 3.1 KB
- ~Get Your Files Here !/7 - Advanced Security Reporting with GenAI/1 -Creating Executive-Level Reports.en_US.vtt 3.0 KB
- ~Get Your Files Here !/2 - Introduction to GenAI in Cybersecurity/4 -Introducing Microsoft Security Copilot.en_US.vtt 3.0 KB
- ~Get Your Files Here !/10 - Course conclusion/3 -Certification and Career Guidance.en_US.vtt 3.0 KB
- ~Get Your Files Here !/5 - Automating Security Operations with GenAI/1 -Enhancing SOC Operations with GenAI.en_US.vtt 3.0 KB
- ~Get Your Files Here !/5 - Automating Security Operations with GenAI/4 -Balancing Automation and Human Oversight.en_US.vtt 3.0 KB
- ~Get Your Files Here !/8 - Role-Specific Use Cases/1 -Use Cases for Security Analysts.en_US.vtt 2.9 KB
- ~Get Your Files Here !/8 - Role-Specific Use Cases/4 -Use Cases for Security Executives.en_US.vtt 2.9 KB
- ~Get Your Files Here !/3 - Understanding Microsoft Security Copilot/5 -Ethical considerations and Responsible AI Usage.en_US.vtt 2.9 KB
- ~Get Your Files Here !/4 - GenAI for Threat Detection and Response/1 -AI-Enhanced Incident Detection.en_US.vtt 2.8 KB
- ~Get Your Files Here !/9 - Building an AI-Powered Security Strategy/1 -Future-Ready AI-Driven SOC Vision.en_US.vtt 2.7 KB
- ~Get Your Files Here !/8 - Role-Specific Use Cases/2 -Use Cases for Incident Responders.en_US.vtt 2.7 KB
- ~Get Your Files Here !/8 - Role-Specific Use Cases/3 -Use Cases for Threat Hunters.en_US.vtt 2.6 KB
- ~Get Your Files Here !/2 - Introduction to GenAI in Cybersecurity/2 -Evolution of AI in Cybersecurity.en_US.vtt 2.6 KB
- ~Get Your Files Here !/2 - Introduction to GenAI in Cybersecurity/1 -What is Generative AI.en_US.vtt 2.4 KB
- ~Get Your Files Here !/10 - Course conclusion/2 -Continued Learning Resources.en_US.vtt 2.3 KB
- ~Get Your Files Here !/10 - Course conclusion/1 -Key Learnings and Takeaways.en_US.vtt 2.3 KB
- ~Get Your Files Here !/1 - Introduction/5 -Important Note and considerations.en_US.vtt 2.2 KB
- ~Get Your Files Here !/10 - Course conclusion/4 -Course Feedback and Closing Remarks.en_US.vtt 2.1 KB
- ~Get Your Files Here !/1 - Introduction/4 -Pre-requisites for this course.en_US.vtt 2.0 KB
- ~Get Your Files Here !/3 - Understanding Microsoft Security Copilot/1 -Architecture & Components.en_US.vtt 1.9 KB
- ~Get Your Files Here !/3 - Understanding Microsoft Security Copilot/8 -Demo - Integrate Defender XDR and Sentinel.en_US.vtt 1.6 KB
- ~Get Your Files Here !/1 - Introduction/2 -Who am I.en_US.vtt 1.4 KB
- Get Bonus Downloads Here.url 183 bytes
- ~Get Your Files Here !/Bonus Resources.txt 70 bytes
Download Torrent
Related Resources
Copyright Infringement
If the content above is not authorized, please contact us via activebusinesscommunication[AT]gmail.com. Remember to include the full url in your complaint.