:Search:

Udemy Cybersecurity defenses with GenAI

Torrent:
Info Hash: 2F6E9B925CB28706A37728570E8AE5D6BF18C6FF
Similar Posts:
Uploader: freecoursewb
Source: 1 Logo 1337x
Downloads: 26
Type: Tutorials
Language: English
Category: Other
Size: 816.5 MB
Added: May 1, 2025, 5:01 a.m.
Peers: Seeders: 5, Leechers: 16 (Last updated: 11 months, 1 week ago)
Tracker Data:
Tracker Seeders Leechers Completed
udp://open.stealth.si:80/announce 1 3 5
udp://exodus.desync.com:6969/announce 0 2 0
udp://tracker.cyberia.is:6969/announce (Failed to scrape UDP tracker) 0 0 0
udp://tracker.opentrackr.org:1337/announce 2 4 12
udp://tracker.torrent.eu.org:451/announce 1 2 5
udp://explodie.org:6969/announce 1 1 0
udp://tracker.birkenwald.de:6969/announce 0 1 0
udp://tracker.moeking.me:6969/announce (Failed to scrape UDP tracker) 0 0 0
udp://ipv4.tracker.harry.lu:80/announce (Failed to scrape UDP tracker) 0 0 0
udp://tracker.tiny-vps.com:6969/announce 0 2 4
udp://tracker.rarbg.torrentbay.st:6969/announce 0 1 0
Files:
  1. Get Bonus Downloads Here.url 183 bytes
  2. 1 -About course.en_US.vtt 3.8 KB
  3. 1 -About course.mp4 34.6 MB
  4. 1 -Introduction1.pdf 499.0 KB
  5. 2 -Who am I.en_US.vtt 1.4 KB
  6. 2 -Who am I.mp4 10.5 MB
  7. 3 -Additional courses that can help you.en_US.vtt 3.2 KB
  8. 3 -Additional courses that can help you.mp4 21.8 MB
  9. 4 -Pre-requisites for this course.en_US.vtt 2.0 KB
  10. 4 -Pre-requisites for this course.mp4 9.2 MB
  11. 5 -Important Note and considerations.en_US.vtt 2.2 KB
  12. 5 -Important Note and considerations.mp4 17.8 MB
  13. 1 -Course conclusion.pdf 866.4 KB
  14. 1 -Key Learnings and Takeaways.en_US.vtt 2.3 KB
  15. 1 -Key Learnings and Takeaways.mp4 14.1 MB
  16. 2 -Continued Learning Resources.en_US.vtt 2.3 KB
  17. 2 -Continued Learning Resources.mp4 15.7 MB
  18. 3 -Certification and Career Guidance.en_US.vtt 3.0 KB
  19. 3 -Certification and Career Guidance.mp4 18.2 MB
  20. 4 -Course Feedback and Closing Remarks.en_US.vtt 2.1 KB
  21. 4 -Course Feedback and Closing Remarks.mp4 16.4 MB
  22. 1 -Introduction to GenAI in Cybersecurity.pdf 1.3 MB
  23. 1 -What is Generative AI.en_US.vtt 2.4 KB
  24. 1 -What is Generative AI.mp4 14.1 MB
  25. 2 -Evolution of AI in Cybersecurity.en_US.vtt 2.6 KB
  26. 2 -Evolution of AI in Cybersecurity.mp4 20.4 MB
  27. 3 -Key differences between traditional AI and GenAI.en_US.vtt 6.9 KB
  28. 3 -Key differences between traditional AI and GenAI.mp4 61.1 MB
  29. 4 -Introducing Microsoft Security Copilot.en_US.vtt 3.0 KB
  30. 4 -Introducing Microsoft Security Copilot.mp4 18.9 MB
  31. 1 -Architecture & Components.en_US.vtt 1.9 KB
  32. 1 -Architecture & Components.mp4 23.7 MB
  33. 1 -Understanding Microsoft Security Copilot.pdf 606.9 KB
  34. 2 -How Security Copilot works.en_US.vtt 3.8 KB
  35. 2 -How Security Copilot works.mp4 39.5 MB
  36. 3 -Core features & functionalities.en_US.vtt 3.2 KB
  37. 3 -Core features & functionalities.mp4 14.5 MB
  38. 4 -Integration with Microsoft Defender XDR & Sentinel.en_US.vtt 3.1 KB
  39. 4 -Integration with Microsoft Defender XDR & Sentinel.mp4 27.3 MB
  40. 5 -Ethical considerations and Responsible AI Usage.en_US.vtt 2.9 KB
  41. 5 -Ethical considerations and Responsible AI Usage.mp4 16.8 MB
  42. 6 -Demo - Option 1 - Configure Microsoft Security Copilot.en_US.vtt 3.8 KB
  43. 6 -Demo - Option 1 - Configure Microsoft Security Copilot.mp4 14.2 MB
  44. 7 -Demo - Option 2 - Configure Microsoft Security Copilot.en_US.vtt 6.7 KB
  45. 7 -Demo - Option 2 - Configure Microsoft Security Copilot.mp4 28.2 MB
  46. 8 -Demo - Integrate Defender XDR and Sentinel.en_US.vtt 1.6 KB
  47. 8 -Demo - Integrate Defender XDR and Sentinel.mp4 9.4 MB
  48. 1 -AI-Enhanced Incident Detection.en_US.vtt 2.8 KB
  49. 1 -AI-Enhanced Incident Detection.mp4 16.8 MB
  50. 1 -GenAI for Threat Detection and Analyis.pdf 878.3 KB
  51. 2 -Automating Threat Intelligence with GenAI.en_US.vtt 3.5 KB
  52. 2 -Automating Threat Intelligence with GenAI.mp4 17.5 MB
  53. 3 -Using Natural Language for Log Analysis.en_US.vtt 3.1 KB
  54. 3 -Using Natural Language for Log Analysis.mp4 16.1 MB
  55. 1 -Automating Security Operations with GenAI.pdf 1.0 MB
  56. 1 -Enhancing SOC Operations with GenAI.en_US.vtt 3.0 KB
  57. 1 -Enhancing SOC Operations with GenAI.mp4 15.2 MB
  58. 2 -Automating Security Workflows.en_US.vtt 3.6 KB
  59. 2 -Automating Security Workflows.mp4 16.6 MB
  60. 3 -Case study Automated Incident Reporting.en_US.vtt 3.4 KB
  61. 3 -Case study Automated Incident Reporting.mp4 20.0 MB
  62. 4 -Balancing Automation and Human Oversight.en_US.vtt 3.0 KB
  63. 4 -Balancing Automation and Human Oversight.mp4 14.7 MB
  64. 1 -Fundamentals of Threat Hunting with AI.en_US.vtt 3.2 KB
  65. 1 -Fundamentals of Threat Hunting with AI.mp4 17.2 MB
  66. 1 -GenAI for proative Threat Hunting.pdf 1.3 MB
  67. 2 -Creating Hunting Queries Using Natural Language.en_US.vtt 3.7 KB
  68. 2 -Creating Hunting Queries Using Natural Language.mp4 21.2 MB
  69. 3 -Integrating Threat Hunting with Microsoft Sentinel.en_US.vtt 3.7 KB
  70. 3 -Integrating Threat Hunting with Microsoft Sentinel.mp4 18.5 MB
  71. 4 -Case study The Scenario Suspicious Sign-ins from a Privileged Account.en_US.vtt 3.3 KB
  72. 4 -Case study The Scenario Suspicious Sign-ins from a Privileged Account.mp4 17.1 MB
  73. 1 -Advanced security reporting with GenAI.pdf 903.8 KB
  74. 1 -Creating Executive-Level Reports.en_US.vtt 3.0 KB
  75. 1 -Creating Executive-Level Reports.mp4 18.3 MB
  76. 2 -Automating Compliance Documentation.en_US.vtt 3.7 KB
  77. 2 -Automating Compliance Documentation.mp4 16.8 MB
  78. 3 -Effective Communication of Security Posture.en_US.vtt 3.2 KB
  79. 3 -Effective Communication of Security Posture.mp4 19.5 MB
  80. 1 -Role specific use cases.pdf 814.2 KB
  81. 1 -Use Cases for Security Analysts.en_US.vtt 2.9 KB
  82. 1 -Use Cases for Security Analysts.mp4 14.6 MB
  83. 2 -Use Cases for Incident Responders.en_US.vtt 2.7 KB
  84. 2 -Use Cases for Incident Responders.mp4 14.8 MB
  85. 3 -Use Cases for Threat Hunters.en_US.vtt 2.6 KB
  86. 3 -Use Cases for Threat Hunters.mp4 13.9 MB
  87. 4 -Use Cases for Security Executives.en_US.vtt 2.9 KB
  88. 4 -Use Cases for Security Executives.mp4 15.7 MB
  89. 1 -Building an AI-Powered security strategy.pdf 194.7 KB
  90. 1 -Future-Ready AI-Driven SOC Vision.en_US.vtt 2.7 KB
  91. 1 -Future-Ready AI-Driven SOC Vision.mp4 20.5 MB
  92. 2 -Enhancing Existing Tools with Copilot.en_US.vtt 3.4 KB
  93. 2 -Enhancing Existing Tools with Copilot.mp4 17.3 MB
  94. 3 -Trends and Innovations in AI Security.en_US.vtt 3.8 KB
  95. 3 -Trends and Innovations in AI Security.mp4 19.3 MB
  96. Bonus Resources.txt 70 bytes

Discussion