|
Please note that this page does not hosts or makes available any of the listed filenames. You
cannot download any of those files from here.
|
| 1 -About course.en_US.vtt |
3.80KB |
| 1 -About course.mp4 |
34.57MB |
| 1 -Advanced security reporting with GenAI.pdf |
903.83KB |
| 1 -AI-Enhanced Incident Detection.en_US.vtt |
2.82KB |
| 1 -AI-Enhanced Incident Detection.mp4 |
16.77MB |
| 1 -Architecture & Components.en_US.vtt |
1.93KB |
| 1 -Architecture & Components.mp4 |
23.72MB |
| 1 -Automating Security Operations with GenAI.pdf |
1.03MB |
| 1 -Building an AI-Powered security strategy.pdf |
194.71KB |
| 1 -Course conclusion.pdf |
866.42KB |
| 1 -Creating Executive-Level Reports.en_US.vtt |
3.03KB |
| 1 -Creating Executive-Level Reports.mp4 |
18.30MB |
| 1 -Enhancing SOC Operations with GenAI.en_US.vtt |
2.98KB |
| 1 -Enhancing SOC Operations with GenAI.mp4 |
15.24MB |
| 1 -Fundamentals of Threat Hunting with AI.en_US.vtt |
3.24KB |
| 1 -Fundamentals of Threat Hunting with AI.mp4 |
17.21MB |
| 1 -Future-Ready AI-Driven SOC Vision.en_US.vtt |
2.74KB |
| 1 -Future-Ready AI-Driven SOC Vision.mp4 |
20.55MB |
| 1 -GenAI for proative Threat Hunting.pdf |
1.29MB |
| 1 -GenAI for Threat Detection and Analyis.pdf |
878.29KB |
| 1 -Introduction1.pdf |
498.95KB |
| 1 -Introduction to GenAI in Cybersecurity.pdf |
1.26MB |
| 1 -Key Learnings and Takeaways.en_US.vtt |
2.31KB |
| 1 -Key Learnings and Takeaways.mp4 |
14.06MB |
| 1 -Role specific use cases.pdf |
814.24KB |
| 1 -Understanding Microsoft Security Copilot.pdf |
606.88KB |
| 1 -Use Cases for Security Analysts.en_US.vtt |
2.90KB |
| 1 -Use Cases for Security Analysts.mp4 |
14.56MB |
| 1 -What is Generative AI.en_US.vtt |
2.38KB |
| 1 -What is Generative AI.mp4 |
14.08MB |
| 2 -Automating Compliance Documentation.en_US.vtt |
3.69KB |
| 2 -Automating Compliance Documentation.mp4 |
16.81MB |
| 2 -Automating Security Workflows.en_US.vtt |
3.64KB |
| 2 -Automating Security Workflows.mp4 |
16.58MB |
| 2 -Automating Threat Intelligence with GenAI.en_US.vtt |
3.48KB |
| 2 -Automating Threat Intelligence with GenAI.mp4 |
17.52MB |
| 2 -Continued Learning Resources.en_US.vtt |
2.33KB |
| 2 -Continued Learning Resources.mp4 |
15.74MB |
| 2 -Creating Hunting Queries Using Natural Language.en_US.vtt |
3.73KB |
| 2 -Creating Hunting Queries Using Natural Language.mp4 |
21.19MB |
| 2 -Enhancing Existing Tools with Copilot.en_US.vtt |
3.38KB |
| 2 -Enhancing Existing Tools with Copilot.mp4 |
17.27MB |
| 2 -Evolution of AI in Cybersecurity.en_US.vtt |
2.56KB |
| 2 -Evolution of AI in Cybersecurity.mp4 |
20.44MB |
| 2 -How Security Copilot works.en_US.vtt |
3.84KB |
| 2 -How Security Copilot works.mp4 |
39.46MB |
| 2 -Use Cases for Incident Responders.en_US.vtt |
2.67KB |
| 2 -Use Cases for Incident Responders.mp4 |
14.83MB |
| 2 -Who am I.en_US.vtt |
1.38KB |
| 2 -Who am I.mp4 |
10.51MB |
| 3 -Additional courses that can help you.en_US.vtt |
3.24KB |
| 3 -Additional courses that can help you.mp4 |
21.76MB |
| 3 -Case study Automated Incident Reporting.en_US.vtt |
3.41KB |
| 3 -Case study Automated Incident Reporting.mp4 |
20.05MB |
| 3 -Certification and Career Guidance.en_US.vtt |
3.00KB |
| 3 -Certification and Career Guidance.mp4 |
18.19MB |
| 3 -Core features & functionalities.en_US.vtt |
3.21KB |
| 3 -Core features & functionalities.mp4 |
14.47MB |
| 3 -Effective Communication of Security Posture.en_US.vtt |
3.24KB |
| 3 -Effective Communication of Security Posture.mp4 |
19.53MB |
| 3 -Integrating Threat Hunting with Microsoft Sentinel.en_US.vtt |
3.72KB |
| 3 -Integrating Threat Hunting with Microsoft Sentinel.mp4 |
18.53MB |
| 3 -Key differences between traditional AI and GenAI.en_US.vtt |
6.93KB |
| 3 -Key differences between traditional AI and GenAI.mp4 |
61.11MB |
| 3 -Trends and Innovations in AI Security.en_US.vtt |
3.76KB |
| 3 -Trends and Innovations in AI Security.mp4 |
19.34MB |
| 3 -Use Cases for Threat Hunters.en_US.vtt |
2.58KB |
| 3 -Use Cases for Threat Hunters.mp4 |
13.86MB |
| 3 -Using Natural Language for Log Analysis.en_US.vtt |
3.06KB |
| 3 -Using Natural Language for Log Analysis.mp4 |
16.12MB |
| 4 -Balancing Automation and Human Oversight.en_US.vtt |
2.97KB |
| 4 -Balancing Automation and Human Oversight.mp4 |
14.71MB |
| 4 -Case study The Scenario Suspicious Sign-ins from a Privileged Account.en_US.vtt |
3.35KB |
| 4 -Case study The Scenario Suspicious Sign-ins from a Privileged Account.mp4 |
17.13MB |
| 4 -Course Feedback and Closing Remarks.en_US.vtt |
2.14KB |
| 4 -Course Feedback and Closing Remarks.mp4 |
16.43MB |
| 4 -Integration with Microsoft Defender XDR & Sentinel.en_US.vtt |
3.10KB |
| 4 -Integration with Microsoft Defender XDR & Sentinel.mp4 |
27.34MB |
| 4 -Introducing Microsoft Security Copilot.en_US.vtt |
3.01KB |
| 4 -Introducing Microsoft Security Copilot.mp4 |
18.92MB |
| 4 -Pre-requisites for this course.en_US.vtt |
2.01KB |
| 4 -Pre-requisites for this course.mp4 |
9.19MB |
| 4 -Use Cases for Security Executives.en_US.vtt |
2.87KB |
| 4 -Use Cases for Security Executives.mp4 |
15.71MB |
| 5 -Ethical considerations and Responsible AI Usage.en_US.vtt |
2.87KB |
| 5 -Ethical considerations and Responsible AI Usage.mp4 |
16.77MB |
| 5 -Important Note and considerations.en_US.vtt |
2.17KB |
| 5 -Important Note and considerations.mp4 |
17.77MB |
| 6 -Demo - Option 1 - Configure Microsoft Security Copilot.en_US.vtt |
3.76KB |
| 6 -Demo - Option 1 - Configure Microsoft Security Copilot.mp4 |
14.20MB |
| 7 -Demo - Option 2 - Configure Microsoft Security Copilot.en_US.vtt |
6.65KB |
| 7 -Demo - Option 2 - Configure Microsoft Security Copilot.mp4 |
28.23MB |
| 8 -Demo - Integrate Defender XDR and Sentinel.en_US.vtt |
1.57KB |
| 8 -Demo - Integrate Defender XDR and Sentinel.mp4 |
9.35MB |
| Bonus Resources.txt |
70B |
| Get Bonus Downloads Here.url |
183B |