Torrent details for "Udemy Cybersecurity defenses with GenAI" Log in to bookmark
Controls:
×
Report Torrent
Please select a reason for reporting this torrent:
Your report will be reviewed by our moderation team.
×
Report Information
Loading report information...
This torrent has been reported 0 times.
Report Summary:
| User | Reason | Date |
|---|
Failed to load report information.
×
Success
Your report has been submitted successfully.
Checked by:
Category:
Language:
English
Total Size:
816.5 MB
Info Hash:
2F6E9B925CB28706A37728570E8AE5D6BF18C6FF
Added By:
Added:
May 1, 2025, 5:01 a.m.
Stats:
|
(Last updated: May 1, 2025, 5:02 a.m.)
| File | Size |
|---|---|
| Get Bonus Downloads Here.url | 183 bytes |
| 1 -About course.en_US.vtt | 3.8 KB |
| 1 -About course.mp4 | 34.6 MB |
| 1 -Introduction1.pdf | 499.0 KB |
| 2 -Who am I.en_US.vtt | 1.4 KB |
| 2 -Who am I.mp4 | 10.5 MB |
| 3 -Additional courses that can help you.en_US.vtt | 3.2 KB |
| 3 -Additional courses that can help you.mp4 | 21.8 MB |
| 4 -Pre-requisites for this course.en_US.vtt | 2.0 KB |
| 4 -Pre-requisites for this course.mp4 | 9.2 MB |
| 5 -Important Note and considerations.en_US.vtt | 2.2 KB |
| 5 -Important Note and considerations.mp4 | 17.8 MB |
| 1 -Course conclusion.pdf | 866.4 KB |
| 1 -Key Learnings and Takeaways.en_US.vtt | 2.3 KB |
| 1 -Key Learnings and Takeaways.mp4 | 14.1 MB |
| 2 -Continued Learning Resources.en_US.vtt | 2.3 KB |
| 2 -Continued Learning Resources.mp4 | 15.7 MB |
| 3 -Certification and Career Guidance.en_US.vtt | 3.0 KB |
| 3 -Certification and Career Guidance.mp4 | 18.2 MB |
| 4 -Course Feedback and Closing Remarks.en_US.vtt | 2.1 KB |
| 4 -Course Feedback and Closing Remarks.mp4 | 16.4 MB |
| 1 -Introduction to GenAI in Cybersecurity.pdf | 1.3 MB |
| 1 -What is Generative AI.en_US.vtt | 2.4 KB |
| 1 -What is Generative AI.mp4 | 14.1 MB |
| 2 -Evolution of AI in Cybersecurity.en_US.vtt | 2.6 KB |
| 2 -Evolution of AI in Cybersecurity.mp4 | 20.4 MB |
| 3 -Key differences between traditional AI and GenAI.en_US.vtt | 6.9 KB |
| 3 -Key differences between traditional AI and GenAI.mp4 | 61.1 MB |
| 4 -Introducing Microsoft Security Copilot.en_US.vtt | 3.0 KB |
| 4 -Introducing Microsoft Security Copilot.mp4 | 18.9 MB |
| 1 -Architecture & Components.en_US.vtt | 1.9 KB |
| 1 -Architecture & Components.mp4 | 23.7 MB |
| 1 -Understanding Microsoft Security Copilot.pdf | 606.9 KB |
| 2 -How Security Copilot works.en_US.vtt | 3.8 KB |
| 2 -How Security Copilot works.mp4 | 39.5 MB |
| 3 -Core features & functionalities.en_US.vtt | 3.2 KB |
| 3 -Core features & functionalities.mp4 | 14.5 MB |
| 4 -Integration with Microsoft Defender XDR & Sentinel.en_US.vtt | 3.1 KB |
| 4 -Integration with Microsoft Defender XDR & Sentinel.mp4 | 27.3 MB |
| 5 -Ethical considerations and Responsible AI Usage.en_US.vtt | 2.9 KB |
| 5 -Ethical considerations and Responsible AI Usage.mp4 | 16.8 MB |
| 6 -Demo - Option 1 - Configure Microsoft Security Copilot.en_US.vtt | 3.8 KB |
| 6 -Demo - Option 1 - Configure Microsoft Security Copilot.mp4 | 14.2 MB |
| 7 -Demo - Option 2 - Configure Microsoft Security Copilot.en_US.vtt | 6.7 KB |
| 7 -Demo - Option 2 - Configure Microsoft Security Copilot.mp4 | 28.2 MB |
| 8 -Demo - Integrate Defender XDR and Sentinel.en_US.vtt | 1.6 KB |
| 8 -Demo - Integrate Defender XDR and Sentinel.mp4 | 9.4 MB |
| 1 -AI-Enhanced Incident Detection.en_US.vtt | 2.8 KB |
| 1 -AI-Enhanced Incident Detection.mp4 | 16.8 MB |
| 1 -GenAI for Threat Detection and Analyis.pdf | 878.3 KB |
| 2 -Automating Threat Intelligence with GenAI.en_US.vtt | 3.5 KB |
| 2 -Automating Threat Intelligence with GenAI.mp4 | 17.5 MB |
| 3 -Using Natural Language for Log Analysis.en_US.vtt | 3.1 KB |
| 3 -Using Natural Language for Log Analysis.mp4 | 16.1 MB |
| 1 -Automating Security Operations with GenAI.pdf | 1.0 MB |
| 1 -Enhancing SOC Operations with GenAI.en_US.vtt | 3.0 KB |
| 1 -Enhancing SOC Operations with GenAI.mp4 | 15.2 MB |
| 2 -Automating Security Workflows.en_US.vtt | 3.6 KB |
| 2 -Automating Security Workflows.mp4 | 16.6 MB |
| 3 -Case study Automated Incident Reporting.en_US.vtt | 3.4 KB |
| 3 -Case study Automated Incident Reporting.mp4 | 20.0 MB |
| 4 -Balancing Automation and Human Oversight.en_US.vtt | 3.0 KB |
| 4 -Balancing Automation and Human Oversight.mp4 | 14.7 MB |
| 1 -Fundamentals of Threat Hunting with AI.en_US.vtt | 3.2 KB |
| 1 -Fundamentals of Threat Hunting with AI.mp4 | 17.2 MB |
| 1 -GenAI for proative Threat Hunting.pdf | 1.3 MB |
| 2 -Creating Hunting Queries Using Natural Language.en_US.vtt | 3.7 KB |
| 2 -Creating Hunting Queries Using Natural Language.mp4 | 21.2 MB |
| 3 -Integrating Threat Hunting with Microsoft Sentinel.en_US.vtt | 3.7 KB |
| 3 -Integrating Threat Hunting with Microsoft Sentinel.mp4 | 18.5 MB |
| 4 -Case study The Scenario Suspicious Sign-ins from a Privileged Account.en_US.vtt | 3.3 KB |
| 4 -Case study The Scenario Suspicious Sign-ins from a Privileged Account.mp4 | 17.1 MB |
| 1 -Advanced security reporting with GenAI.pdf | 903.8 KB |
| 1 -Creating Executive-Level Reports.en_US.vtt | 3.0 KB |
| 1 -Creating Executive-Level Reports.mp4 | 18.3 MB |
| 2 -Automating Compliance Documentation.en_US.vtt | 3.7 KB |
| 2 -Automating Compliance Documentation.mp4 | 16.8 MB |
| 3 -Effective Communication of Security Posture.en_US.vtt | 3.2 KB |
| 3 -Effective Communication of Security Posture.mp4 | 19.5 MB |
| 1 -Role specific use cases.pdf | 814.2 KB |
| 1 -Use Cases for Security Analysts.en_US.vtt | 2.9 KB |
| 1 -Use Cases for Security Analysts.mp4 | 14.6 MB |
| 2 -Use Cases for Incident Responders.en_US.vtt | 2.7 KB |
| 2 -Use Cases for Incident Responders.mp4 | 14.8 MB |
| 3 -Use Cases for Threat Hunters.en_US.vtt | 2.6 KB |
| 3 -Use Cases for Threat Hunters.mp4 | 13.9 MB |
| 4 -Use Cases for Security Executives.en_US.vtt | 2.9 KB |
| 4 -Use Cases for Security Executives.mp4 | 15.7 MB |
| 1 -Building an AI-Powered security strategy.pdf | 194.7 KB |
| 1 -Future-Ready AI-Driven SOC Vision.en_US.vtt | 2.7 KB |
| 1 -Future-Ready AI-Driven SOC Vision.mp4 | 20.5 MB |
| 2 -Enhancing Existing Tools with Copilot.en_US.vtt | 3.4 KB |
| 2 -Enhancing Existing Tools with Copilot.mp4 | 17.3 MB |
| 3 -Trends and Innovations in AI Security.en_US.vtt | 3.8 KB |
| 3 -Trends and Innovations in AI Security.mp4 | 19.3 MB |
| Bonus Resources.txt | 70 bytes |
Name
DL
Uploader
Size
S/L
Added
-
786.5 MB
[1
/
1]
2023-07-01
| Uploaded by FreeCourseWeb | Size 786.5 MB | Health [ 1 /1 ] | Added 2023-07-01 |
-
935.1 MB
[15
/
2]
2023-06-01
| Uploaded by freecoursewb | Size 935.1 MB | Health [ 15 /2 ] | Added 2023-06-01 |
-
859.2 MB
[1
/
3]
2023-06-01
| Uploaded by freecoursewb | Size 859.2 MB | Health [ 1 /3 ] | Added 2023-06-01 |
-
986.1 MB
[3
/
7]
2023-06-01
| Uploaded by freecoursewb | Size 986.1 MB | Health [ 3 /7 ] | Added 2023-06-01 |
-
989.9 MB
[0
/
2]
2023-06-01
| Uploaded by freecoursewb | Size 989.9 MB | Health [ 0 /2 ] | Added 2023-06-01 |
-
816.5 MB
[5
/
16]
2025-05-01
| Uploaded by freecoursewb | Size 816.5 MB | Health [ 5 /16 ] | Added 2025-05-01 |
NOTE
SOURCE: Udemy Cybersecurity defenses with GenAI
-----------------------------------------------------------------------------------
COVER

-----------------------------------------------------------------------------------
MEDIAINFO
None
×


