Browse
Recent Presentations
Recent Stories
Content Topics
Updated Contents
Featured Contents
PowerPoint Templates
Create
Presentation
Article
Survey
Quiz
Lead-form
E-Book
Presentation Creator
Create stunning presentation online in just 3 steps.
Pro
Get powerful tools for managing your contents.
Login
Upload
Centex tech
's Uploads
116 Uploads
Threat Modeling and Risk Assessment
1 views
How To Stay Prepared for Faster Incident Recovery
10 views
Elements of Privacy First Design
11 views
Privacy Enhancing Technologies (PETs)
19 views
Network Load Balancing and Traffic Distribution Techniques
16 views
Next-Generation Firewalls (NGFW)
373 views
Content Discovery & Enterprise Data Protection
21 views
Indicators of Compromise (IoCs)
30 views
CI/CD Pipelines In Software Development
30 views
Upgrading or Migrating Enterprise Networks
19 views
10 Essentials Of Effective Cyber Security Strategy
80 views
Impacts of Data Breach on Businesses
10 views
Top-AI-Powered-Cyber-Threats
9 views
Top AI-Powered Cyber Threats
6 views
Top AI-Powered Cyber Threats
36 views
What is Context Aware Security?
8 views
Technological Advancements in Cyber Security
12 views
What is Endpoint Protection?
32 views
What is Selective Data Backup?
10 views
Principles of Data Protection
18 views
Steps to Formulate Secure Remote Work Strategy
42 views
6 Steps of Incident Response Plan
34 views
Benefits of VPN For Businesses
14 views
What is Conformance Testing Of An Application?
11 views
Role of Information Security Manager
23 views
Top Ecommerce Security Threats
30 views
Tips On Managing Information Security Risks For Removable Devices Media
23 views
Key Elements Of IT Security Audit
12 views
How To Protect Mobile Apps and APIs from Attackers
7 views
Business IT Alignment
20 views
Best Practices For Protection Against Ransomware
9 views
DevSecOps Everything You Need To Know
40 views
IoT Device Security Tips
0 views
Understanding GHOST Vulnerability
10 views
Understanding Prototype Pollution
56 views
Why Companies Need Thick Data?
0 views
What Is Zero Trust ?
10 views
Types Of Computer Security Attacks
109 views
Everything You Need To Know About IT Service Management
30 views
Role Of Technology Integration In Business
34 views
Previous
1
2
3
Next