Securing Private Wireless - From Design to Deployment

Securing Private Wireless - From Design to Deployment

Microsoft Ignite via YouTube Direct link

0:00 - Krishnan’s introduction and focus on network security domains

1 of 9

1 of 9

0:00 - Krishnan’s introduction and focus on network security domains

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Securing Private Wireless - From Design to Deployment

Automatically move to the next video in the Classroom when playback concludes

  1. 1 0:00 - Krishnan’s introduction and focus on network security domains
  2. 2 00:08:00 - Balancing operational efficiency and network security in distributed architectures
  3. 3 00:09:16 - Credential theft and need for stronger authentication
  4. 4 00:13:11 - Azure-based AI platform supporting telecom security operations
  5. 5 00:16:02 - Role of playbooks and use cases in cyber incident management
  6. 6 00:17:53 - Discussion on telecom provider collaboration and identity management
  7. 7 00:25:27 - AI-driven threat hunting using the CIA diamond model and telco-focused intelligence
  8. 8 00:26:56 - Introduction to 5G security orchestration and demo preview
  9. 9 00:35:16 - Closing remarks on telco security operations and audience Q&A

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.