Protection of Personal Information Act (POPIA) - Purpose Specification
Governance Intelligence
Protection of Personal Information Act (POPIA) - Purpose Specification
2:30
The Good and Bad of AI in Digital Forensics
Governance Intelligence
The Good and Bad of AI in Digital Forensics
3:42
A Day in the Life of a Cyber Security Expert
Governance Intelligence
A Day in the Life of a Cyber Security Expert
2:24
The role of digital forensics experts
Governance Intelligence
The role of digital forensics experts
2:52
Overview of Cyber Security
Governance Intelligence
Overview of Cyber Security
3:21
Digital Forensics vs Cyber Security
Governance Intelligence
Digital Forensics vs Cyber Security
3:00
5 Compelling Reasons to Pursue a Career in Cyber Security
Governance Intelligence
5 Compelling Reasons to Pursue a Career in Cyber Security
2:42
5 Reasons to Pursue a Career in Digital Forensics
Governance Intelligence
5 Reasons to Pursue a Career in Digital Forensics
3:07
Digital forensics overview
Governance Intelligence
Digital forensics overview
2:46
Malware Analysis : Unraveling the Secrets of Cyber Threats
Governance Intelligence
Malware Analysis : Unraveling the Secrets of Cyber Threats
0:45
The role of multimedia forensics in criminal investigations
Governance Intelligence
The role of multimedia forensics in criminal investigations
1:21
Can Multimedia Forensics Help in Identifying Anonymous Online Threats
Governance Intelligence
Can Multimedia Forensics Help in Identifying Anonymous Online Threats
1:13
Multimedia Forensics - Unraveling the Secrets of Digital Media
Governance Intelligence
Multimedia Forensics - Unraveling the Secrets of Digital Media
1:12
MODULE 4 - File Carving
Governance Intelligence
MODULE 4 - File Carving
3:22
Module 5 - Advanced File Carving
Governance Intelligence
Module 5 - Advanced File Carving
3:42
MODULE 6 -  File Carving for Encrypted and Compressed Files
Governance Intelligence
MODULE 6 - File Carving for Encrypted and Compressed Files
3:15
MODULE 7 - Data Acquisition and Preservation
Governance Intelligence
MODULE 7 - Data Acquisition and Preservation
3:34
MODULE 8 - Forensic Analysis Techniques
Governance Intelligence
MODULE 8 - Forensic Analysis Techniques
3:01
MODULE 9 - Forensic Analysis of files systems and data structures
Governance Intelligence
MODULE 9 - Forensic Analysis of files systems and data structures
3:04
MODULE 13 - Mobile Device Forensics
Governance Intelligence
MODULE 13 - Mobile Device Forensics
4:06
MODULE 14 - Advanced Techniques for Mobile Device Forensics
Governance Intelligence
MODULE 14 - Advanced Techniques for Mobile Device Forensics
3:28
MODULE 10 - Forensic Analysis Techniques
Governance Intelligence
MODULE 10 - Forensic Analysis Techniques
3:09
MODULE 16 - Malware Analysis
Governance Intelligence
MODULE 16 - Malware Analysis
3:52
Module 13 - Mobile Device Forensics
Governance Intelligence
Module 13 - Mobile Device Forensics
4:12
Module 14 - Advanced Techniques for mobile device forensics
Governance Intelligence
Module 14 - Advanced Techniques for mobile device forensics
3:32
Module 15 - Multimedia Forensics
Governance Intelligence
Module 15 - Multimedia Forensics
4:13
Module 18 - Reporting and Expert Testimony
Governance Intelligence
Module 18 - Reporting and Expert Testimony
4:45
Module 10 - Forensic Analysis Techniques
Governance Intelligence
Module 10 - Forensic Analysis Techniques
3:14
Module 9 - Forensic Analysis Techniques of files and data structures
Governance Intelligence
Module 9 - Forensic Analysis Techniques of files and data structures
3:10
Module 8 - Forensic Analysis Techniques
Governance Intelligence
Module 8 - Forensic Analysis Techniques
3:05
Module 6 - File Carving for Encrypted and Compressed Files
Governance Intelligence
Module 6 - File Carving for Encrypted and Compressed Files
3:20
Module 5 - Advanced File Carving
Governance Intelligence
Module 5 - Advanced File Carving
3:47
Module 3 - File Systems and Data Structures
Governance Intelligence
Module 3 - File Systems and Data Structures
3:54
Module 2 - Computer systems and digital devices
Governance Intelligence
Module 2 - Computer systems and digital devices
4:46
MODULE 1 - What is digital forensics?
Governance Intelligence
MODULE 1 - What is digital forensics?
3:01
Unveiling the Crucial Forms in Digital Forensic Investigations: A Comprehensive Guide
Governance Intelligence
Unveiling the Crucial Forms in Digital Forensic Investigations: A Comprehensive Guide
2:02
Must Have Digital Forensic Analysis Tools
Governance Intelligence
Must Have Digital Forensic Analysis Tools
2:17
8 Awesome Digital Forensic Analysis Techniques
Governance Intelligence
8 Awesome Digital Forensic Analysis Techniques
2:20
Continuous Data Analytics: Improving IT Audit Efficiency and Effectiveness
Governance Intelligence
Continuous Data Analytics: Improving IT Audit Efficiency and Effectiveness
0:59
Is digital forensics cybersecurity?
Governance Intelligence
Is digital forensics cybersecurity?
2:04
Digital Forensic First Response: Investigating Cyber Incidents
Governance Intelligence
Digital Forensic First Response: Investigating Cyber Incidents
1:47
Applications Controls Review: Aligning Applications Controls to Business Processes
Governance Intelligence
Applications Controls Review: Aligning Applications Controls to Business Processes
2:05
Data center management: Securing your data
Governance Intelligence
Data center management: Securing your data
1:21
Logical access management : Protecting access to your digital assets
Governance Intelligence
Logical access management : Protecting access to your digital assets
1:28
How to audit an AI platform: Ensuring Ethical Intelligence
Governance Intelligence
How to audit an AI platform: Ensuring Ethical Intelligence
2:28
IT Change Management: Managing the complexities of change in an IT environment
Governance Intelligence
IT Change Management: Managing the complexities of change in an IT environment
3:38
Incident Management:  how to handle IT incidents during a crisis?
Governance Intelligence
Incident Management: how to handle IT incidents during a crisis?
2:41
Backup and Disaster Recovery: Overcoming disasters and maintaining business continuity
Governance Intelligence
Backup and Disaster Recovery: Overcoming disasters and maintaining business continuity
2:09
Cybersecurity Incident Response: How to Respond in a Time of Crisis
Governance Intelligence
Cybersecurity Incident Response: How to Respond in a Time of Crisis
1:44
Introduction to Digital Forensics
Governance Intelligence
Introduction to Digital Forensics
1:55
Ransomware: What it is and How to Protect Yourself?
Governance Intelligence
Ransomware: What it is and How to Protect Yourself?
1:58
Digital Fraud Risk : Don't be exposed!
Governance Intelligence
Digital Fraud Risk : Don't be exposed!
2:00
Don't Get Hooked: How to Avoid Phishing Scams
Governance Intelligence
Don't Get Hooked: How to Avoid Phishing Scams
2:12
Social Engineering: How Cybercriminals Exploit Human Behaviour
Governance Intelligence
Social Engineering: How Cybercriminals Exploit Human Behaviour
2:07
Cybersecurity in the digital age
Governance Intelligence
Cybersecurity in the digital age
1:55