|
Обратите внимание, что наш сайт не размещает какие-либо файлы из списка. Вы не можете скачать
эти файлы или скачать torrent-файл.
|
| 1 -About course.en_US.vtt |
3.80Кб |
| 1 -About course.mp4 |
34.57Мб |
| 1 -Advanced security reporting with GenAI.pdf |
903.83Кб |
| 1 -AI-Enhanced Incident Detection.en_US.vtt |
2.82Кб |
| 1 -AI-Enhanced Incident Detection.mp4 |
16.77Мб |
| 1 -Architecture & Components.en_US.vtt |
1.93Кб |
| 1 -Architecture & Components.mp4 |
23.72Мб |
| 1 -Automating Security Operations with GenAI.pdf |
1.03Мб |
| 1 -Building an AI-Powered security strategy.pdf |
194.71Кб |
| 1 -Course conclusion.pdf |
866.42Кб |
| 1 -Creating Executive-Level Reports.en_US.vtt |
3.03Кб |
| 1 -Creating Executive-Level Reports.mp4 |
18.30Мб |
| 1 -Enhancing SOC Operations with GenAI.en_US.vtt |
2.98Кб |
| 1 -Enhancing SOC Operations with GenAI.mp4 |
15.24Мб |
| 1 -Fundamentals of Threat Hunting with AI.en_US.vtt |
3.24Кб |
| 1 -Fundamentals of Threat Hunting with AI.mp4 |
17.21Мб |
| 1 -Future-Ready AI-Driven SOC Vision.en_US.vtt |
2.74Кб |
| 1 -Future-Ready AI-Driven SOC Vision.mp4 |
20.55Мб |
| 1 -GenAI for proative Threat Hunting.pdf |
1.29Мб |
| 1 -GenAI for Threat Detection and Analyis.pdf |
878.29Кб |
| 1 -Introduction1.pdf |
498.95Кб |
| 1 -Introduction to GenAI in Cybersecurity.pdf |
1.26Мб |
| 1 -Key Learnings and Takeaways.en_US.vtt |
2.31Кб |
| 1 -Key Learnings and Takeaways.mp4 |
14.06Мб |
| 1 -Role specific use cases.pdf |
814.24Кб |
| 1 -Understanding Microsoft Security Copilot.pdf |
606.88Кб |
| 1 -Use Cases for Security Analysts.en_US.vtt |
2.90Кб |
| 1 -Use Cases for Security Analysts.mp4 |
14.56Мб |
| 1 -What is Generative AI.en_US.vtt |
2.38Кб |
| 1 -What is Generative AI.mp4 |
14.08Мб |
| 2 -Automating Compliance Documentation.en_US.vtt |
3.69Кб |
| 2 -Automating Compliance Documentation.mp4 |
16.81Мб |
| 2 -Automating Security Workflows.en_US.vtt |
3.64Кб |
| 2 -Automating Security Workflows.mp4 |
16.58Мб |
| 2 -Automating Threat Intelligence with GenAI.en_US.vtt |
3.48Кб |
| 2 -Automating Threat Intelligence with GenAI.mp4 |
17.52Мб |
| 2 -Continued Learning Resources.en_US.vtt |
2.33Кб |
| 2 -Continued Learning Resources.mp4 |
15.74Мб |
| 2 -Creating Hunting Queries Using Natural Language.en_US.vtt |
3.73Кб |
| 2 -Creating Hunting Queries Using Natural Language.mp4 |
21.19Мб |
| 2 -Enhancing Existing Tools with Copilot.en_US.vtt |
3.38Кб |
| 2 -Enhancing Existing Tools with Copilot.mp4 |
17.27Мб |
| 2 -Evolution of AI in Cybersecurity.en_US.vtt |
2.56Кб |
| 2 -Evolution of AI in Cybersecurity.mp4 |
20.44Мб |
| 2 -How Security Copilot works.en_US.vtt |
3.84Кб |
| 2 -How Security Copilot works.mp4 |
39.46Мб |
| 2 -Use Cases for Incident Responders.en_US.vtt |
2.67Кб |
| 2 -Use Cases for Incident Responders.mp4 |
14.83Мб |
| 2 -Who am I.en_US.vtt |
1.38Кб |
| 2 -Who am I.mp4 |
10.51Мб |
| 3 -Additional courses that can help you.en_US.vtt |
3.24Кб |
| 3 -Additional courses that can help you.mp4 |
21.76Мб |
| 3 -Case study Automated Incident Reporting.en_US.vtt |
3.41Кб |
| 3 -Case study Automated Incident Reporting.mp4 |
20.05Мб |
| 3 -Certification and Career Guidance.en_US.vtt |
3.00Кб |
| 3 -Certification and Career Guidance.mp4 |
18.19Мб |
| 3 -Core features & functionalities.en_US.vtt |
3.21Кб |
| 3 -Core features & functionalities.mp4 |
14.47Мб |
| 3 -Effective Communication of Security Posture.en_US.vtt |
3.24Кб |
| 3 -Effective Communication of Security Posture.mp4 |
19.53Мб |
| 3 -Integrating Threat Hunting with Microsoft Sentinel.en_US.vtt |
3.72Кб |
| 3 -Integrating Threat Hunting with Microsoft Sentinel.mp4 |
18.53Мб |
| 3 -Key differences between traditional AI and GenAI.en_US.vtt |
6.93Кб |
| 3 -Key differences between traditional AI and GenAI.mp4 |
61.11Мб |
| 3 -Trends and Innovations in AI Security.en_US.vtt |
3.76Кб |
| 3 -Trends and Innovations in AI Security.mp4 |
19.34Мб |
| 3 -Use Cases for Threat Hunters.en_US.vtt |
2.58Кб |
| 3 -Use Cases for Threat Hunters.mp4 |
13.86Мб |
| 3 -Using Natural Language for Log Analysis.en_US.vtt |
3.06Кб |
| 3 -Using Natural Language for Log Analysis.mp4 |
16.12Мб |
| 4 -Balancing Automation and Human Oversight.en_US.vtt |
2.97Кб |
| 4 -Balancing Automation and Human Oversight.mp4 |
14.71Мб |
| 4 -Case study The Scenario Suspicious Sign-ins from a Privileged Account.en_US.vtt |
3.35Кб |
| 4 -Case study The Scenario Suspicious Sign-ins from a Privileged Account.mp4 |
17.13Мб |
| 4 -Course Feedback and Closing Remarks.en_US.vtt |
2.14Кб |
| 4 -Course Feedback and Closing Remarks.mp4 |
16.43Мб |
| 4 -Integration with Microsoft Defender XDR & Sentinel.en_US.vtt |
3.10Кб |
| 4 -Integration with Microsoft Defender XDR & Sentinel.mp4 |
27.34Мб |
| 4 -Introducing Microsoft Security Copilot.en_US.vtt |
3.01Кб |
| 4 -Introducing Microsoft Security Copilot.mp4 |
18.92Мб |
| 4 -Pre-requisites for this course.en_US.vtt |
2.01Кб |
| 4 -Pre-requisites for this course.mp4 |
9.19Мб |
| 4 -Use Cases for Security Executives.en_US.vtt |
2.87Кб |
| 4 -Use Cases for Security Executives.mp4 |
15.71Мб |
| 5 -Ethical considerations and Responsible AI Usage.en_US.vtt |
2.87Кб |
| 5 -Ethical considerations and Responsible AI Usage.mp4 |
16.77Мб |
| 5 -Important Note and considerations.en_US.vtt |
2.17Кб |
| 5 -Important Note and considerations.mp4 |
17.77Мб |
| 6 -Demo - Option 1 - Configure Microsoft Security Copilot.en_US.vtt |
3.76Кб |
| 6 -Demo - Option 1 - Configure Microsoft Security Copilot.mp4 |
14.20Мб |
| 7 -Demo - Option 2 - Configure Microsoft Security Copilot.en_US.vtt |
6.65Кб |
| 7 -Demo - Option 2 - Configure Microsoft Security Copilot.mp4 |
28.23Мб |
| 8 -Demo - Integrate Defender XDR and Sentinel.en_US.vtt |
1.57Кб |
| 8 -Demo - Integrate Defender XDR and Sentinel.mp4 |
9.35Мб |
| Bonus Resources.txt |
70б |
| Get Bonus Downloads Here.url |
183б |