Cybersecurity
Showing 937–948 of 1317 results
Prompt Engineering: Ethical Hacking & Generative AI Fusion
Dive into ethical hacking and generative AI. Learn to leverage AI for cybersecurity and understand the dynamics of security and innovation.
Prompt Engineering: GenAI’s Impact on Network & Perimeter Ethical Hacking
Understand network and perimeter hacking, AI's impact on security, and AI-driven defenses. Explore real-world examples and fortify network defenses.
Prompt Engineering: Generative AI for Malware & Social Engineering
Explore ethical hacking techniques to fight malware and social engineering. Learn how generative AI enhances threat detection and prevention.
Prompt Engineering: Generative AI for Reconnaissance
Leverage generative AI and reconnaissance for advanced cybersecurity defense. Learn how ethical hackers utilize these techniques.
Prompt Engineering: Generative AI for Scanning & Enumeration
Explore the convergence of ethical hacking and AI. Learn how generative AI strengthens network scanning and enumeration in cybersecurity.
Prompt Engineering: Generative AI for System Hacking
Discover how generative AI enhances ethical hacking techniques and detects system vulnerabilities. Learn best practices for preventing system hacking and conducting AI-driven penetration tests.
Prompt Engineering: Mobile Platform Security in the GenAI Era
Fortify mobile platform security using generative AI. Learn AI-driven attack methods, fix app vulnerabilities, and understand AI's role in mobile hacking.
Prompt Engineering: Web Application & Database Hacking in the Age of GenAI
Explore ethical hacking with AI for web application and database security. Learn to mitigate AI-assisted attacks, secure databases, and patch vulnerabilities effectively.
Protect Windows Devices with Microsoft Intune
Endpoint devices are a primary attack surface for cyberthreats. This course will teach you how to protect Windows devices with Microsoft Intune using capabilities available right out of the box.
Protecting Against XML External Entity and Deserialization Attacks in ASP.NET and ASP.NET Core
We think of XML, JSON and binary serialized data as a way to exchange data between applications, but these data formats can also be used by hackers to attack your applications. This course will teach you how you can prevent them.
Protecting and Monitoring Azure Media Services
This course will help you to learn about how you can protect and monitor video content/assets using the content protection DRM features available in Azure Media Services.
Protecting Sensitive Data From Exposure in ASP.NET 3 and ASP.NET Core 3 Applications
Keeping personal, financial, or other sensitive data secure from theft or exposure takes active management. This course will teach you how to identify sensitive data in your applications and the protection measures that can be used to keep it secure.