Udemy - Cybersecurity defenses with GenAI
- Category Other
- Type Tutorials
- Language English
- Total size 816.5 MB
- Uploaded By freecoursewb
- Downloads 334
- Last checked 1 day ago
- Date uploaded 8 months ago
- Seeders 10
- Leechers 3
Infohash : 2F6E9B925CB28706A37728570E8AE5D6BF18C6FF
Cybersecurity defenses with GenAI
https://WebToolTip.com
Published 4/2025
Created by Ramesh Waghmare
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Level: All | Genre: eLearning | Language: English + subtitle | Duration: 42 Lectures ( 2h 8m ) | Size: 816 MB
Generative AI Meets Cybersecurity: Unlocking Microsoft Security Copilot's Potential
What you'll learn
What is Generative AI?
Evolution of AI in Cybersecurity
Key differences between traditional AI and GenAI
Introducing Microsoft Security Copilot
Architecture and Components
How Microsoft Security Co-pilot works?
Core Features and Functionalities
Integration with Microsoft Defender and Sentinel
Ethical Considerations and Responsible AI Usage
Pre-requisites and licensing for Microsoft Security Copilot
Configuring Microsoft Copilot
AI-Enhanced Incident Detection
Automating Threat Intelligence with GenAI
Using Natural Language for Log Analysis
Enhancing SOC Operations with GenAI
Automating Security Workflows
Balancing Automation and Human Oversight
Fundamentals of Threat Hunting with AI
Creating Hunting Queries Using Natural Language
Integrating Threat Hunting with Microsoft Sentinel
Use Cases for Security Analysts
Use Cases for Incident Responders
Use Cases for Threat Hunters
Use Cases for Security Executives
Future-Ready AI-Driven SOC Vision
Enhancing Existing Tools with Copilot
Trends and Innovations in AI Security
Requirements
Security fundamentals
Azure Fundamentals
Files:
[ FreeCourseWeb.com ] Udemy - Cybersecurity defenses with GenAI- Get Bonus Downloads Here.url (0.2 KB) ~Get Your Files Here ! 1 - Introduction
- 1 -About course.en_US.vtt (3.8 KB)
- 1 -About course.mp4 (34.6 MB)
- 1 -Introduction1.pdf (499.0 KB)
- 2 -Who am I.en_US.vtt (1.4 KB)
- 2 -Who am I.mp4 (10.5 MB)
- 3 -Additional courses that can help you.en_US.vtt (3.2 KB)
- 3 -Additional courses that can help you.mp4 (21.8 MB)
- 4 -Pre-requisites for this course.en_US.vtt (2.0 KB)
- 4 -Pre-requisites for this course.mp4 (9.2 MB)
- 5 -Important Note and considerations.en_US.vtt (2.2 KB)
- 5 -Important Note and considerations.mp4 (17.8 MB)
- 1 -Course conclusion.pdf (866.4 KB)
- 1 -Key Learnings and Takeaways.en_US.vtt (2.3 KB)
- 1 -Key Learnings and Takeaways.mp4 (14.1 MB)
- 2 -Continued Learning Resources.en_US.vtt (2.3 KB)
- 2 -Continued Learning Resources.mp4 (15.7 MB)
- 3 -Certification and Career Guidance.en_US.vtt (3.0 KB)
- 3 -Certification and Career Guidance.mp4 (18.2 MB)
- 4 -Course Feedback and Closing Remarks.en_US.vtt (2.1 KB)
- 4 -Course Feedback and Closing Remarks.mp4 (16.4 MB)
- 1 -Introduction to GenAI in Cybersecurity.pdf (1.3 MB)
- 1 -What is Generative AI.en_US.vtt (2.4 KB)
- 1 -What is Generative AI.mp4 (14.1 MB)
- 2 -Evolution of AI in Cybersecurity.en_US.vtt (2.6 KB)
- 2 -Evolution of AI in Cybersecurity.mp4 (20.4 MB)
- 3 -Key differences between traditional AI and GenAI.en_US.vtt (6.9 KB)
- 3 -Key differences between traditional AI and GenAI.mp4 (61.1 MB)
- 4 -Introducing Microsoft Security Copilot.en_US.vtt (3.0 KB)
- 4 -Introducing Microsoft Security Copilot.mp4 (18.9 MB)
- 1 -Architecture & Components.en_US.vtt (1.9 KB)
- 1 -Architecture & Components.mp4 (23.7 MB)
- 1 -Understanding Microsoft Security Copilot.pdf (606.9 KB)
- 2 -How Security Copilot works.en_US.vtt (3.8 KB)
- 2 -How Security Copilot works.mp4 (39.5 MB)
- 3 -Core features & functionalities.en_US.vtt (3.2 KB)
- 3 -Core features & functionalities.mp4 (14.5 MB)
- 4 -Integration with Microsoft Defender XDR & Sentinel.en_US.vtt (3.1 KB)
- 4 -Integration with Microsoft Defender XDR & Sentinel.mp4 (27.3 MB)
- 5 -Ethical considerations and Responsible AI Usage.en_US.vtt (2.9 KB)
- 5 -Ethical considerations and Responsible AI Usage.mp4 (16.8 MB)
- 6 -Demo - Option 1 - Configure Microsoft Security Copilot.en_US.vtt (3.8 KB)
- 6 -Demo - Option 1 - Configure Microsoft Security Copilot.mp4 (14.2 MB)
- 7 -Demo - Option 2 - Configure Microsoft Security Copilot.en_US.vtt (6.7 KB)
- 7 -Demo - Option 2 - Configure Microsoft Security Copilot.mp4 (28.2 MB)
- 8 -Demo - Integrate Defender XDR and Sentinel.en_US.vtt (1.6 KB)
- 8 -Demo - Integrate Defender XDR and Sentinel.mp4 (9.4 MB)
- 1 -AI-Enhanced Incident Detection.en_US.vtt (2.8 KB)
- 1 -AI-Enhanced Incident Detection.mp4 (16.8 MB)
- 1 -GenAI for Threat Detection and Analyis.pdf (878.3 KB)
- 2 -Automating Threat Intelligence with GenAI.en_US.vtt (3.5 KB)
- 2 -Automating Threat Intelligence with GenAI.mp4 (17.5 MB)
- 3 -Using Natural Language for Log Analysis.en_US.vtt (3.1 KB)
- 3 -Using Natural Language for Log Analysis.mp4 (16.1 MB)
- 1 -Automating Security Operations with GenAI.pdf (1.0 MB)
- 1 -Enhancing SOC Operations with GenAI.en_US.vtt (3.0 KB)
- 1 -Enhancing SOC Operations with GenAI.mp4 (15.2 MB)
- 2 -Automating Security Workflows.en_US.vtt (3.6 KB)
- 2 -Automating Security Workflows.mp4 (16.6 MB)
- 3 -Case study Automated Incident Reporting.en_US.vtt (3.4 KB)
- 3 -Case study Automated Incident Reporting.mp4 (20.0 MB)
- 4 -Balancing Automation and Human Oversight.en_US.vtt (3.0 KB)
- 4 -Balancing Automation and Human Oversight.mp4 (14.7 MB)
- 1 -Fundamentals of Threat Hunting with AI.en_US.vtt (3.2 KB)
- 1 -Fundamentals of Threat Hunting with AI.mp4 (17.2 MB)
- 1 -GenAI for proative Threat Hunting.pdf (1.3 MB)
- 2 -Creating Hunting Queries Using Natural Language.en_US.vtt (3.7 KB)
- 2 -Creating Hunting Queries Using Natural Language.mp4 (21.2 MB)
- 3 -Integrating Threat Hunting with Microsoft Sentinel.en_US.vtt (3.7 KB)
- 3 -Integrating Threat Hunting with Microsoft Sentinel.mp4 (18.5 MB)
- 4 -Case study The Scenario Suspicious Sign-ins from a Privileged Account.en_US.vtt (3.3 KB)
- 4 -Case study The Scenario Suspicious Sign-ins from a Privileged Account.mp4 (17.1 MB)
- 1 -Advanced security reporting with GenAI.pdf (903.8 KB)
- 1 -Creating Executive-Level Reports.en_US.vtt (3.0 KB)
- 1 -Creating Executive-Level Reports.mp4 (18.3 MB)
- 2 -Automating Compliance Documentation.en_US.vtt (3.7 KB)
- 2 -Automating Compliance Documentation.mp4 (16.8 MB)
- 3 -Effective Communication of Security Posture.en_US.vtt (3.2 KB)
- 3 -Effective Communication of Security Posture.mp4 (19.5 MB)
- 1 -Role specific use cases.pdf (814.2 KB)
- 1 -Use Cases for Security Analysts.en_US.vtt (2.9 KB)
- 1 -Use Cases for Security Analysts.mp4 (14.6 MB)
- 2 -Use Cases for Incident Responders.en_US.vtt (2.7 KB)
- 2 -Use Cases for Incident Responders.mp4 (14.8 MB)
- 3 -Use Cases for Threat Hunters.en_US.vtt (2.6 KB)
- 3 -Use Cases for Threat Hunters.mp4 (13.9 MB)
- 4 -Use Cases for Security Executives.en_US.vtt (2.9 KB)
- 4 -Use Cases for Security Executives.mp4 (15.7 MB)
- 1 -Building an AI-Powered security strategy.pdf (194.7 KB)
- 1 -Future-Ready AI-Driven SOC Vision.en_US.vtt (2.7 KB)
- 1 -Future-Ready AI-Driven SOC Vision.mp4 (20.5 MB)
- 2 -Enhancing Existing Tools with Copilot.en_US.vtt (3.4 KB)
- 2 -Enhancing Existing Tools with Copilot.mp4 (17.3 MB)
- 3 -Trends and Innovations in AI Security.en_US.vtt (3.8 KB)
- 3 -Trends and Innovations in AI Security.mp4 (19.3 MB)
- Bonus Resources.txt (0.1 KB)
There are currently no comments. Feel free to leave one :)
Code:
- udp://tracker.torrent.eu.org:451/announce
- udp://tracker.tiny-vps.com:6969/announce
- http://tracker.foreverpirates.co:80/announce
- udp://tracker.cyberia.is:6969/announce
- udp://exodus.desync.com:6969/announce
- udp://explodie.org:6969/announce
- udp://tracker.opentrackr.org:1337/announce
- udp://9.rarbg.to:2780/announce
- udp://tracker.internetwarriors.net:1337/announce
- udp://ipv4.tracker.harry.lu:80/announce
- udp://open.stealth.si:80/announce
- udp://9.rarbg.to:2900/announce
- udp://9.rarbg.me:2720/announce
- udp://opentor.org:2710/announce