Browse
Recent Presentations
Recent Stories
Content Topics
Updated Contents
Featured Contents
PowerPoint Templates
Create
Presentation
Article
Survey
Quiz
Lead-form
E-Book
Presentation Creator
Create stunning presentation online in just 3 steps.
Pro
Get powerful tools for managing your contents.
Login
Upload
Centex tech
's Uploads
116 Uploads
Threat Modeling and Risk Assessment
4 views
How To Stay Prepared for Faster Incident Recovery
11 views
Elements of Privacy First Design
13 views
Privacy Enhancing Technologies (PETs)
21 views
Network Load Balancing and Traffic Distribution Techniques
20 views
Next-Generation Firewalls (NGFW)
465 views
Content Discovery & Enterprise Data Protection
24 views
Indicators of Compromise (IoCs)
35 views
CI/CD Pipelines In Software Development
36 views
Upgrading or Migrating Enterprise Networks
22 views
10 Essentials Of Effective Cyber Security Strategy
85 views
Impacts of Data Breach on Businesses
13 views
Top-AI-Powered-Cyber-Threats
13 views
Top AI-Powered Cyber Threats
8 views
Top AI-Powered Cyber Threats
69 views
What is Context Aware Security?
10 views
Technological Advancements in Cyber Security
14 views
What is Endpoint Protection?
34 views
What is Selective Data Backup?
12 views
Principles of Data Protection
19 views
Steps to Formulate Secure Remote Work Strategy
48 views
6 Steps of Incident Response Plan
37 views
Benefits of VPN For Businesses
15 views
What is Conformance Testing Of An Application?
14 views
Role of Information Security Manager
26 views
Top Ecommerce Security Threats
32 views
Tips On Managing Information Security Risks For Removable Devices Media
25 views
Key Elements Of IT Security Audit
13 views
How To Protect Mobile Apps and APIs from Attackers
9 views
Business IT Alignment
23 views
Best Practices For Protection Against Ransomware
12 views
DevSecOps Everything You Need To Know
42 views
IoT Device Security Tips
3 views
Understanding GHOST Vulnerability
14 views
Understanding Prototype Pollution
59 views
Why Companies Need Thick Data?
2 views
What Is Zero Trust ?
11 views
Types Of Computer Security Attacks
115 views
Everything You Need To Know About IT Service Management
32 views
Role Of Technology Integration In Business
38 views
Previous
1
2
3
Next