RAG for Cybersecurity: Use Cases and Implementation
Released: 4/7/2025
Duration: 1h 10m | .MP4 1280x720, 30 fps(r) | AAC, 48000 Hz, 2ch | 160 MB
Genre: eLearning | Language: English
Released: 4/7/2025
Duration: 1h 10m | .MP4 1280x720, 30 fps(r) | AAC, 48000 Hz, 2ch | 160 MB
Genre: eLearning | Language: English
This course provides an in-depth exploration of how retrieval-augmented generation (RAG) technology enhances cybersecurity. Gain a thorough understanding of RAG’s core components, including how it integrates with large language models to enhance data retrieval and analysis. The course focuses on practical use cases such as mapping cyber security logs and alerts to MITRE ATT&CK techniques, performing real-time gap analysis for governance, risk, and compliance (GRC) Join instructor Brennan Lodge to gain the knowledge and tools to implement RAG solutions, improving both proactive defense strategies and compliance processes in their organizations. This course is ideal for cybersecurity professionals, GRC experts, and data scientists seeking to leverage AI-driven solutions for enhanced security operations.
More Info