كيف تُساهم في مجال الذكاء الاصـطــنـاعـي؟
Fatimah Emad Eldin
كيف تُساهم في مجال الذكاء الاصـطــنـاعـي؟
48:09
Large Language Models: Fundamentals, Memory, and Fine-Tuning
Fatimah Emad Eldin
Large Language Models: Fundamentals, Memory, and Fine-Tuning
7:39
Retrieval Augmented Generation: Concepts and Pipelines
Fatimah Emad Eldin
Retrieval Augmented Generation: Concepts and Pipelines
6:29
AI  Counting Words to Worlds: Language Models and Transformers From Scratch
Fatimah Emad Eldin
AI Counting Words to Worlds: Language Models and Transformers From Scratch
7:01
Emerging Cyber Innovations and Security Technologies
Fatimah Emad Eldin
Emerging Cyber Innovations and Security Technologies
6:57
Cybersecurity Incident Response and Digital Forensics
Fatimah Emad Eldin
Cybersecurity Incident Response and Digital Forensics
9:33
Enterprise Security Management and Core Defense Mechanisms
Fatimah Emad Eldin
Enterprise Security Management and Core Defense Mechanisms
7:38
Cybersecurity Identity and Access Management Fundamentals
Fatimah Emad Eldin
Cybersecurity Identity and Access Management Fundamentals
7:07
Enterprise Threat Mitigation and Cybersecurity Posture
Fatimah Emad Eldin
Enterprise Threat Mitigation and Cybersecurity Posture
8:40
The Cybersecurity Journey: IT Support to GRC
Fatimah Emad Eldin
The Cybersecurity Journey: IT Support to GRC
8:23
Operating Systems, Networking, and Cybersecurity Fundamentals
Fatimah Emad Eldin
Operating Systems, Networking, and Cybersecurity Fundamentals
9:24
Security Concepts: PII, Breaches, Deception, and Ethics
Fatimah Emad Eldin
Security Concepts: PII, Breaches, Deception, and Ethics
7:12
Cybersecurity Threats and Security Controls
Fatimah Emad Eldin
Cybersecurity Threats and Security Controls
6:43
Security Automation and Orchestration: Fundamentals and Practice
Fatimah Emad Eldin
Security Automation and Orchestration: Fundamentals and Practice
8:03
Security Operations: Asset Management and Application Security
Fatimah Emad Eldin
Security Operations: Asset Management and Application Security
6:57
Data Protection, Recovery, and Resilience Strategies
Fatimah Emad Eldin
Data Protection, Recovery, and Resilience Strategies
5:58
Cybersecurity: Data Protection and Recovery Fundamentals
Fatimah Emad Eldin
Cybersecurity: Data Protection and Recovery Fundamentals
7:46
MITRE ATT&CK for Incident Response and Analysis
Fatimah Emad Eldin
MITRE ATT&CK for Incident Response and Analysis
8:02
Cybersecurity Risk Management Fundamentals and Frameworks
Fatimah Emad Eldin
Cybersecurity Risk Management Fundamentals and Frameworks
8:08
Cybersecurity Regulation, Compliance, and Vulnerability Management
Fatimah Emad Eldin
Cybersecurity Regulation, Compliance, and Vulnerability Management
7:10
Cybersecurity: Vulnerabilities, Threats, and Indicators
Fatimah Emad Eldin
Cybersecurity: Vulnerabilities, Threats, and Indicators
7:08
USA Retail Business Exploratory Data Analysis EDA creating Tableau Dashboard
Fatimah Emad Eldin
USA Retail Business Exploratory Data Analysis EDA creating Tableau Dashboard
7:28
تقرير مصور عن برنامج موهبة الإثرائي الصيفي بمكة المكرمة لعام 2019 لوحدة الروبوت EV3
Fatimah Emad Eldin
تقرير مصور عن برنامج موهبة الإثرائي الصيفي بمكة المكرمة لعام 2019 لوحدة الروبوت EV3
2:21