Global Cybersecurity Conference 2024
Focused View
22:20:45
0 View
001. Opening Keynote - Emerging Cyber Risks Where Should We Focus.mp4
36:40
002. Opening Keynote - Emerging Cyber Risks Where Should We Focus.mp4
36:40
003. Power Talk Cloud Security Primer Core Capabilities and Practical Implementations.mp4
35:06
004. Power Talk Transforming Cybersecurity with Generative AI.mp4
36:47
005. Power Talk Architecting Zero Trust in Hybrid Environments.mp4
31:22
006. Roundtable The Role of AI in Cybersecurity&039;s Future.mp4
36:15
007. Power Talk Achieving Cyber Resilience Eliminating Exploitable Weak Spots.mp4
37:42
008. Power Talk Decoding Penetration Testing Insights for IT Practitioners.mp4
47:38
009. Power Talk What Can We Learn from TLS for the 21st Century Cryptography.mp4
01:26:55
010. Power Talk Decoding Gartner&039;s Top Strategic Security Trends of 2023 Implications for Organizations, Security Teams, and Le.mp4
29:53
011. Power Talk Why Should You Log with the Cloud vs. On-Prem.mp4
39:42
012. Power Talk Decoding the Web KillChain A Comprehensive Analysis of Web Attacks.mp4
48:36
001. Opening Keynote Securing the Cloud Navigating the Fundamentals of Cloud Security.mp4
35:20
002. Tech Session Planning and Implementing a Cloud Native Protection Platform.mp4
01:01:57
003. Tech Session Zero Trust Playbook Agile and Effective Security.mp4
55:12
004. Tech Session Securing Your Multi-Cloud World with Microsoft Defender for Cloud.mp4
01:04:00
005. Tech Session How Do You Log with the Cloud.mp4
58:36
006. Tech Session Harnessing AI and ML for Effective Cloud Security Operations.mp4
54:28
007. Tech Session Stop Giving Your Admin Credentials to the Bad Guys!!.mp4
01:03:57
008. Tech Session How Secure Is Your Azure Software Supply Chain.mp4
52:16
001. Opening Keynote Resilient Cybersecurity Reconstructing Your Defense Strategy.mp4
43:32
002. Tech Session Corporate Security 101 Understanding and Combatting Phishing.mp4
53:58
003. FBI&039;s Cyber Resilience Roadmap Strategies, Tactics, and Takeaways.mp4
23:07
004. Tech Session Practical Workshop for Integrating Generative AI into Cyber Defense.mp4
01:06:29
005. Tech Session Threat Program Effective Penetration Testing with Kali Linux.mp4
01:06:44
006. Tech Session Unmasking Digital Threats A Deep Dive into Malware Analysis via PE Files and PDF Documents.mp4
01:31:59
007. Tech Session First Steps into Threat Hunting.mp4
45:54
More details
User Reviews
Rating
average 0
Focused display
Category

Udemy
View courses UdemyStudents take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
- language english
- Training sessions 27
- duration 22:20:45
- Release Date 2024/11/03