https://img100.pixhost.to/images/404/537368816_que-es-udemy-analisis-opiniones.jpg
3.37 GB | 14min 42s | mp4 | 1280X720 | 16:9
Genre: eLearning | Language : English
Files Included :
1 -Introduction.mp4 (18.16 MB)
1 -What is a Vulnerability.mp4 (7.28 MB)
2 -Common Vulnerabilities and Exposures (CVE).mp4 (12.47 MB)
3 -Common Vulnerability Scoring System (CVSS).mp4 (25.79 MB)
4 -Log4Shell.mp4 (19.48 MB)
5 -Demo Analyzing an Exploit - Log4Shell.mp4 (29.32 MB)
6 -Heartbleed.mp4 (16.86 MB)
7 -Demo Analyzing an Exploit - Heartbleed.mp4 (19.16 MB)
8 -EternalBlue.mp4 (18.85 MB)
9 -Demo Analyzing an Exploit - EternalBlue.mp4 (21.84 MB)
1 -Demo SQL Injection.mp4 (37.83 MB)
2 -Demo Cross-Site-Scripting (XSS).mp4 (32.44 MB)
1 -What is Copilot for Security.mp4 (20.13 MB)
10 -Demo Create Compute Capacities.mp4 (18.63 MB)
11 -Demo Setup Copilot for Security.mp4 (86.08 MB)
12 -Creating Effective Prompts.mp4 (70.62 MB)
13 -Demo Prompt Usage Monitoring.mp4 (3.28 MB)
14 -Demo Incident Investigation Promptbook.mp4 (92.28 MB)
15 -Demo Suspicious Script Analysis Promptbook.mp4 (105.05 MB)
16 -Demo Threat Actor Profile Promptbook.mp4 (99.35 MB)
17 -Demo Vulnerability Impact Assessment Promptbook.mp4 (64.13 MB)
18 -Demo CTI Prompts.mp4 (122.37 MB)
19 -Demo Vulnerability Assessment Prompts.mp4 (64.15 MB)
2 -From Prompt to Reponse.mp4 (8.06 MB)
3 -Architecture.mp4 (22.73 MB)
4 -Extending Copilot with Plugins & more.mp4 (13.88 MB)
5 -Privacy Implications.mp4 (7.76 MB)
6 -Authentication & RBAC.mp4 (28.8 MB)
7 -Standalone vs Embedded Experience.mp4 (6.34 MB)
8 -Pricing.mp4 (10.06 MB)
9 -Onboarding Requirements.mp4 (3.72 MB)
1 -What is Penetration Testing.mp4 (8.69 MB)
10 -Exploitation.mp4 (4.16 MB)
11 -Post Exploitation.mp4 (7.63 MB)
12 -Reporting.mp4 (5.3 MB)
13 -Remediation & Lessons Learned.mp4 (6.64 MB)
2 -Penetration Testing in Cyber Security.mp4 (8.21 MB)
3 -Red Teaming vs Penetration Testing.mp4 (18.82 MB)
4 -The Importance of Penetration Testing for GenAI.mp4 (5.31 MB)
5 -Overview.mp4 (3.66 MB)
6 -Planning and Preparation.mp4 (8.17 MB)
7 -Reconnaissance.mp4 (6.78 MB)
8 -Scanning & Enumeration.mp4 (3.43 MB)
9 -Vulnerability Assessment.mp4 (8.02 MB)
1 -What is ATT&CK.mp4 (13.5 MB)
10 -Mitigations.mp4 (13.22 MB)
11 -Groups.mp4 (10.78 MB)
12 -Software.mp4 (6.63 MB)
13 -Campaigns.mp4 (24.66 MB)
14 -Relations.mp4 (6.16 MB)
15 -Demo Enterprise Matrix.mp4 (151.76 MB)
16 -What is MITRE ATLAS.mp4 (3.85 MB)
17 -Mapping ATLAS to the Pyramid of Pain.mp4 (4.08 MB)
18 -Tactics.mp4 (6.92 MB)
19 -Techniques.mp4 (9.48 MB)
2 -Mapping ATT&CK to the Pyramid of Pain.mp4 (10.22 MB)
20 -Subtechniques.mp4 (5.96 MB)
21 -Tactics, Techniques, Subtechniques.mp4 (2.9 MB)
22 -Mitigations.mp4 (10.7 MB)
23 -Case Studies.mp4 (8.84 MB)
24 -Case Study I Microsoft Azure Service Disruption.mp4 (7.47 MB)
25 -Case Study II PoisonGPT.mp4 (7.1 MB)
26 -Case Study III ChatGPT Plugin Privacy Leak.mp4 (7.18 MB)
27 -Demo ATLAS Matrix.mp4 (22.94 MB)
3 -Matrices.mp4 (6.27 MB)
4 -Tactics.mp4 (32.26 MB)
5 -Techniques.mp4 (17.91 MB)
6 -Subtechniques.mp4 (28.16 MB)
7 -Tactics, Techniques & Subtechniques.mp4 (6.05 MB)
8 -Data Sources.mp4 (5.67 MB)
9 -Detections.mp4 (6.41 MB)
1 -What is Corporate Governance.mp4 (7.55 MB)
10 -Enhance Monitoring and Feedback Mechanisms.mp4 (8.46 MB)
11 -Define Data and Identity Governance.mp4 (9.25 MB)
12 -Continuous Improvement and Adaptation.mp4 (6.53 MB)
2 -What is Enterprise Risk Management.mp4 (16.48 MB)
3 -What is Cyber Security Risk Management.mp4 (18.28 MB)
4 -Scenario.mp4 (2.14 MB)
5 -Establish a GenAI Governance Committee.mp4 (7.83 MB)
6 -Develop Comprehensive Governance Policies and Guidelines.mp4 (7.45 MB)
7 -Implement Risk Management Practices.mp4 (9.45 MB)
8 -Training and User Awareness Programs.mp4 (9.08 MB)
9 -Adopt AI Ethics and Standards Frameworks.mp4 (6.65 MB)
1 -Cloud Computing Properties.mp4 (18.12 MB)
10 -What is CSPM.mp4 (6.75 MB)
11 -CSPM Plans.mp4 (11.09 MB)
12 -Demo Enable Defender CSPM.mp4 (27.8 MB)
13 -Defender for Cloud RBAC.mp4 (9.23 MB)
14 -Security Recommendations.mp4 (4.88 MB)
15 -Demo Security Recommendations.mp4 (19.67 MB)
16 -Microsoft Cloud Security Benchmark.mp4 (5.56 MB)
17 -Demo Microsoft Cloud Security Benchmark.mp4 (23.91 MB)
18 -Attack Paths.mp4 (6.35 MB)
19 -Demo Defender CSPM for AI.mp4 (24.06 MB)
2 -Cloud Computing Types.mp4 (11.09 MB)
3 -Azure Global Backbone.mp4 (21.31 MB)
4 -Shared Responsibility Model.mp4 (19.67 MB)
5 -Azure Resource Hierarchy.mp4 (10.28 MB)
6 -Azure Subscription Types.mp4 (10.14 MB)
7 -Entra ID Tenants and Azure Subscriptions.mp4 (7.1 MB)
8 -What is Microsoft Defender for Cloud.mp4 (13.07 MB)
9 -CSPM & CWP.mp4 (10.01 MB)
1 -Bonus.mp4 (19.96 MB)
1 -What is GenAI.mp4 (5.94 MB)
2 -What is a Large Language Model (LLM).mp4 (9.2 MB)
3 -What is a Prompt.mp4 (22.57 MB)
4 -AI Models.mp4 (5.12 MB)
5 -LLM Architecture.mp4 (16.29 MB)
1 -The Importance of Security in GenAI.mp4 (25.65 MB)
2 -Threat Vectors for a GenAI Application.mp4 (15.73 MB)
3 -How Adversaries Leverage AI.mp4 (15.87 MB)
4 -Shared Responsibility in AI.mp4 (21.3 MB)
5 -Microsoft Responsible AI.mp4 (12.22 MB)
1 -Demo Create your OpenAI Account.mp4 (2.4 MB)
2 -Demo Create your Portswigger Account.mp4 (11.04 MB)
3 -Demo Create your Azure Subscription.mp4 (6.52 MB)
1 -What is OWASP.mp4 (5.12 MB)
10 -Countermeasures.mp4 (5.14 MB)
11 -LLM03 Training Data Poisoning.mp4 (13.62 MB)
12 -Countermeasures.mp4 (4.94 MB)
13 -LLM04 Model Denial of Service.mp4 (18.4 MB)
14 -Countermeasures.mp4 (5.04 MB)
15 -LLM05 Supply Chain Vulnerabilities.mp4 (13.67 MB)
16 -Demo LLM05 Supply Chain Vulnerabilities.mp4 (53.55 MB)
17 -Countermeasures.mp4 (8.15 MB)
18 -LLM06 Sensitive Information Disclosure.mp4 (20.23 MB)
19 -Countermeasures.mp4 (2.7 MB)
2 -OWASP Top 10 - Web Application Security Risks.mp4 (20.56 MB)
20 -LLM07 Insecure Plugin Design.mp4 (12.67 MB)
21 -Countermeasures.mp4 (12.27 MB)
22 -LLM08 Excessive Agency.mp4 (11.01 MB)
23 -Demo LLM08 Excessive Agency.mp4 (21.2 MB)
24 -Countermeasures.mp4 (7.51 MB)
25 -LLM09 Overreliance.mp4 (14.29 MB)
26 -Countermeasures.mp4 (4.61 MB)
27 -LLM10 Model Theft.mp4 (8.33 MB)
28 -Countermeasures.mp4 (6.39 MB)
3 -OWASP Top 10 - API Security Risks.mp4 (34.06 MB)
4 -OWASP Top 10 - LLM Security Risks.mp4 (22.55 MB)
5 -LLM01 Prompt Injection.mp4 (15.14 MB)
6 -Demo LLM01 Prompt Injection.mp4 (96.69 MB)
7 -Countermeasures.mp4 (8.25 MB)
8 -LLM02 Insecure Output Handling.mp4 (10.34 MB)
9 -Demo LLM02 Insecure Output Handling.mp4 (83.13 MB)
1 -Inherent LLM Risks.mp4 (16.44 MB)
2 -Transparency & Accountability.mp4 (17.43 MB)
3 -Regulatory Compliance.mp4 (12.61 MB)
4 -Hallucinations.mp4 (10.1 MB)
5 -Bias and Discrimination.mp4 (10.5 MB)
6 -Copyright Infringement and Violation of Intellectual Property.mp4 (12.4 MB)
1 -What is a Threat.mp4 (7.29 MB)
10 -A GenAI Security Architecture.mp4 (11.89 MB)
2 -Threat, Vulnerability & Risk.mp4 (5.58 MB)
3 -What is Threat Modeling.mp4 (6 MB)
4 -Involved Organizations.mp4 (18.24 MB)
5 -Scope Definition.mp4 (6.28 MB)
6 -Threat Identification.mp4 (8.09 MB)
7 -Vulnerability Analysis.mp4 (6.03 MB)
8 -Mitigation Strategy Development.mp4 (5.98 MB)
9 -Documentation and Evolution.mp4 (6.19 MB)
1 -What is a SOC.mp4 (17.89 MB)
10 -Demo Decoding and analyzing base64 reverse shell.mp4 (37.34 MB)
11 -Demo Create an Incident Response Playbook.mp4 (50.06 MB)
2 -SOC Tier Model.mp4 (14.19 MB)
3 -Cyber Security Incident Response Process.mp4 (10.67 MB)
4 -EDR, XDR, SIEM & SOAR.mp4 (22.29 MB)
5 -Demo Data Sources for a SIEM.mp4 (23.27 MB)
6 -Demo Use Cases for a SIEM.mp4 (46.94 MB)
7 -Demo Data Sources for Microsoft Sentinel.mp4 (43.7 MB)
8 -Demo Analytic Rules for Microsoft Sentinel.mp4 (24.36 MB)
9 -Demo Generating YARA Rules.mp4 (39.29 MB)
1 -Intelligence, Threat Intelligence & Cyber Threat Intelligence (CTI).mp4 (9.12 MB)
10 -Demo Assist with IOCs.mp4 (45.3 MB)
11 -Demo Generate Threat Hunting Queries in KQL.mp4 (49.07 MB)
2 -What is CTI.mp4 (10.78 MB)
3 -Threat, Vulnerability & Risk.mp4 (5.58 MB)
4 -Threat-Informed Defense.mp4 (11.61 MB)
5 -Tactics, Techniques & Procedures (TTPs).mp4 (16.51 MB)
6 -IOCs & IOAs.mp4 (14.09 MB)
7 -Pyramid of Pain.mp4 (13.08 MB)
8 -CTI Sources.mp4 (7.66 MB)
9 -Demo Describe CTI.mp4 (40.19 MB)]
Screenshot
https://images2.imgbox.com/1b/b0/dk4mngkI_o.jpg
https://filecrypt.cc/Container/59410AAC25.html
https://fikper.com/xQUKsUOW5M/
https://fikper.com/ZjTEK1jZv6/
https://filecrypt.cc/Container/CBEEB81016.html