Torrent Info
Title [ FreeCourseWeb.com ] Udemy - Cybersecurity defenses with GenAI
Category
Size 816.46MB

Files List
Please note that this page does not hosts or makes available any of the listed filenames. You cannot download any of those files from here.
1 -About course.en_US.vtt 3.80KB
1 -About course.mp4 34.57MB
1 -Advanced security reporting with GenAI.pdf 903.83KB
1 -AI-Enhanced Incident Detection.en_US.vtt 2.82KB
1 -AI-Enhanced Incident Detection.mp4 16.77MB
1 -Architecture & Components.en_US.vtt 1.93KB
1 -Architecture & Components.mp4 23.72MB
1 -Automating Security Operations with GenAI.pdf 1.03MB
1 -Building an AI-Powered security strategy.pdf 194.71KB
1 -Course conclusion.pdf 866.42KB
1 -Creating Executive-Level Reports.en_US.vtt 3.03KB
1 -Creating Executive-Level Reports.mp4 18.30MB
1 -Enhancing SOC Operations with GenAI.en_US.vtt 2.98KB
1 -Enhancing SOC Operations with GenAI.mp4 15.24MB
1 -Fundamentals of Threat Hunting with AI.en_US.vtt 3.24KB
1 -Fundamentals of Threat Hunting with AI.mp4 17.21MB
1 -Future-Ready AI-Driven SOC Vision.en_US.vtt 2.74KB
1 -Future-Ready AI-Driven SOC Vision.mp4 20.55MB
1 -GenAI for proative Threat Hunting.pdf 1.29MB
1 -GenAI for Threat Detection and Analyis.pdf 878.29KB
1 -Introduction1.pdf 498.95KB
1 -Introduction to GenAI in Cybersecurity.pdf 1.26MB
1 -Key Learnings and Takeaways.en_US.vtt 2.31KB
1 -Key Learnings and Takeaways.mp4 14.06MB
1 -Role specific use cases.pdf 814.24KB
1 -Understanding Microsoft Security Copilot.pdf 606.88KB
1 -Use Cases for Security Analysts.en_US.vtt 2.90KB
1 -Use Cases for Security Analysts.mp4 14.56MB
1 -What is Generative AI.en_US.vtt 2.38KB
1 -What is Generative AI.mp4 14.08MB
2 -Automating Compliance Documentation.en_US.vtt 3.69KB
2 -Automating Compliance Documentation.mp4 16.81MB
2 -Automating Security Workflows.en_US.vtt 3.64KB
2 -Automating Security Workflows.mp4 16.58MB
2 -Automating Threat Intelligence with GenAI.en_US.vtt 3.48KB
2 -Automating Threat Intelligence with GenAI.mp4 17.52MB
2 -Continued Learning Resources.en_US.vtt 2.33KB
2 -Continued Learning Resources.mp4 15.74MB
2 -Creating Hunting Queries Using Natural Language.en_US.vtt 3.73KB
2 -Creating Hunting Queries Using Natural Language.mp4 21.19MB
2 -Enhancing Existing Tools with Copilot.en_US.vtt 3.38KB
2 -Enhancing Existing Tools with Copilot.mp4 17.27MB
2 -Evolution of AI in Cybersecurity.en_US.vtt 2.56KB
2 -Evolution of AI in Cybersecurity.mp4 20.44MB
2 -How Security Copilot works.en_US.vtt 3.84KB
2 -How Security Copilot works.mp4 39.46MB
2 -Use Cases for Incident Responders.en_US.vtt 2.67KB
2 -Use Cases for Incident Responders.mp4 14.83MB
2 -Who am I.en_US.vtt 1.38KB
2 -Who am I.mp4 10.51MB
3 -Additional courses that can help you.en_US.vtt 3.24KB
3 -Additional courses that can help you.mp4 21.76MB
3 -Case study Automated Incident Reporting.en_US.vtt 3.41KB
3 -Case study Automated Incident Reporting.mp4 20.05MB
3 -Certification and Career Guidance.en_US.vtt 3.00KB
3 -Certification and Career Guidance.mp4 18.19MB
3 -Core features & functionalities.en_US.vtt 3.21KB
3 -Core features & functionalities.mp4 14.47MB
3 -Effective Communication of Security Posture.en_US.vtt 3.24KB
3 -Effective Communication of Security Posture.mp4 19.53MB
3 -Integrating Threat Hunting with Microsoft Sentinel.en_US.vtt 3.72KB
3 -Integrating Threat Hunting with Microsoft Sentinel.mp4 18.53MB
3 -Key differences between traditional AI and GenAI.en_US.vtt 6.93KB
3 -Key differences between traditional AI and GenAI.mp4 61.11MB
3 -Trends and Innovations in AI Security.en_US.vtt 3.76KB
3 -Trends and Innovations in AI Security.mp4 19.34MB
3 -Use Cases for Threat Hunters.en_US.vtt 2.58KB
3 -Use Cases for Threat Hunters.mp4 13.86MB
3 -Using Natural Language for Log Analysis.en_US.vtt 3.06KB
3 -Using Natural Language for Log Analysis.mp4 16.12MB
4 -Balancing Automation and Human Oversight.en_US.vtt 2.97KB
4 -Balancing Automation and Human Oversight.mp4 14.71MB
4 -Case study The Scenario Suspicious Sign-ins from a Privileged Account.en_US.vtt 3.35KB
4 -Case study The Scenario Suspicious Sign-ins from a Privileged Account.mp4 17.13MB
4 -Course Feedback and Closing Remarks.en_US.vtt 2.14KB
4 -Course Feedback and Closing Remarks.mp4 16.43MB
4 -Integration with Microsoft Defender XDR & Sentinel.en_US.vtt 3.10KB
4 -Integration with Microsoft Defender XDR & Sentinel.mp4 27.34MB
4 -Introducing Microsoft Security Copilot.en_US.vtt 3.01KB
4 -Introducing Microsoft Security Copilot.mp4 18.92MB
4 -Pre-requisites for this course.en_US.vtt 2.01KB
4 -Pre-requisites for this course.mp4 9.19MB
4 -Use Cases for Security Executives.en_US.vtt 2.87KB
4 -Use Cases for Security Executives.mp4 15.71MB
5 -Ethical considerations and Responsible AI Usage.en_US.vtt 2.87KB
5 -Ethical considerations and Responsible AI Usage.mp4 16.77MB
5 -Important Note and considerations.en_US.vtt 2.17KB
5 -Important Note and considerations.mp4 17.77MB
6 -Demo - Option 1 - Configure Microsoft Security Copilot.en_US.vtt 3.76KB
6 -Demo - Option 1 - Configure Microsoft Security Copilot.mp4 14.20MB
7 -Demo - Option 2 - Configure Microsoft Security Copilot.en_US.vtt 6.65KB
7 -Demo - Option 2 - Configure Microsoft Security Copilot.mp4 28.23MB
8 -Demo - Integrate Defender XDR and Sentinel.en_US.vtt 1.57KB
8 -Demo - Integrate Defender XDR and Sentinel.mp4 9.35MB
Bonus Resources.txt 70B
Get Bonus Downloads Here.url 183B
Distribution statistics by country
Sweden (SE) 1
Spain (ES) 1
Indonesia (ID) 1
Azerbaijan (AZ) 1
Republic of Korea (KR) 1
Russia (RU) 1
Serbia (RS) 1
Canada (CA) 1
Total 8
IP List List of IP addresses which were distributed this torrent