
Oreilly – Global Cybersecurity Conference 2024 2024-7
Published on: 2024-09-10 20:12:19
Categories: 28
Description
Global Cybersecurity Conference 2024. This comprehensive video series is a treasure trove of expert lectures and workshops delivered by the world’s top cybersecurity experts. This collection takes you to the heart of the 2024 Cyber Security Global Event and introduces you to the latest achievements and threats in this field. By watching these videos, you can update your cybersecurity knowledge and learn how to deal with emerging threats. This series is designed for Chief Information Security Officers (CISOs), IT Managers, and anyone interested in cybersecurity.
whatFYou will get:
- Essential, vendor-agnostic security strategies for public clouds: Given the rapid growth of cloud usage, this course provides practical solutions for securing cloud environments.
- The Role of Generative Artificial Intelligence in Training and Threat Simulation: In this section, you will learn how artificial intelligence can be used to improve the training of security experts and simulate cyberattacks.
- Implementing the Zero Trust Model in Hybrid Environments: This course will help you increase the security of hybrid networks using the Zero Trust Model.
- The ethical and practical effects of artificial intelligence on security: In a specialized round table, various aspects of the use of artificial intelligence in cyber security will be discussed.
- Effective penetration testing to identify and mitigate risks: By learning penetration testing techniques, you can identify weaknesses in your systems and fix them.
- Analysis of TLS vulnerabilities and their impact on future cryptographic protocols: In this section, the latest threats related to the TLS protocol and solutions to counter them are discussed.
- Review of Gartner’s most important security trends and their strategic implications: This course will help you familiarize yourself with the latest security trends and adjust your strategies accordingly.
This course is suitable for people who:
- Work in the field of cyber security (such as CIOs, CIOs, and network security specialists).
- Looking to increase their knowledge in the field of cyber security.
- They want to learn about the latest threats and security technologies.
- Interested in improving their organization’s security strategies.
- Looking for a deeper understanding of defense frameworks against cyber threats.
Details of the Global Cybersecurity Conference 2024
- Publisher: Oreilly
- Instructor: Ian Neil, Cynthia Kaiser, Tim Rains, Dr. Paul Duplys, Yuri Diogenes, Tia Hopkins, David Okeyode, Mike Miller, Steve Wilson, Dwayne Natwick CISSP, MVP, Clint Bodungen, Mark Dunkerley, Glen D. Singh, Santiago von Straussburg, Simone Onofri, Debra Baker
- Training level: beginner to advanced
- Training duration: 21 hours and 44 minutes
Course headings
- Chapter 1 : Day 1 – Cybersecurity Frontiers
- Opening Keynote – Emerging Cyber Risks: Where Should We Focus?
- Power Talk: Cloud Security Primer – Core Capabilities and Practical Implementations
- Power Talk: Transforming Cybersecurity with Generative AI
- Power Talk: Architecting Zero Trust in Hybrid Environments
- Roundtable: The Role of AI in Cybersecurity’s Future
- Power Talk: Achieving Cyber Resilience – Eliminating Exploitable Weak Spots
- Power Talk: Decoding Penetration Testing: Insights for IT Practitioners
- Power Talk: What Can We Learn from TLS for the 21st Century Cryptography?
- Power Talk: Decoding Gartner’s Top Strategic Security Trends of 2023 – Implications for Organizations, Security Teams, and Leaders
- Power Talk: Why Should You Log with the Cloud vs. On-Prem?
- Power Talk: Decoding the Web KillChain – A Comprehensive Analysis of Web Attacks
- Chapter 2 : Day 2 – BLUE team day
- Opening Keynote: Securing the Cloud: Navigating the Fundamentals of Cloud Security
- Tech Session: Planning and Implementing a Cloud Native Protection Platform
- Tech Session: Zero Trust Playbook: Agile and Effective Security
- Tech Session: Securing Your Multi-Cloud World with Microsoft Defender for Cloud
- Tech Session: How Do You Log with the Cloud?
- Tech Session: Harnessing AI and ML for Effective Cloud Security Operations
- Tech Session: Stop Giving Your Admin Credentials to the Bad Guys!!
- Tech Session: How Secure Is Your Azure Software Supply Chain?
- Chapter 3 : Day 3 – RED team day
- Opening Keynote: Resilient Cybersecurity – Reconstructing Your Defense Strategy
- Tech Session: Corporate Security 101 – Understanding and Combatting Phishing
- FBI’s Cyber Resilience Roadmap – Strategies, Tactics, and Takeaways
- Tech Session: Practical Workshop for Integrating Generative AI into Cyber Defense
- Tech Session: Threat Program – Effective Penetration Testing with Kali Linux
- Tech Session: Unmasking Digital Threats: A Deep Dive into Malware Analysis via PE Files and PDF Documents
- Tech Session: First Steps into Threat Hunting
Course images

Sample video of the course
Installation guide
After Extract, view with your favorite Player.
Subtitle: None
Quality: 1080p
download link
Download part 1 – 2 GB
Download part 2 – 2 GB
Download part 3 – 2 GB
Download Part 4 – 1.46 GB
File(s) password: www.downloadly.ir
File size
7.46 GB
Leave a Comment (Please sign to comment)