Governance Intelligence
Protection of Personal Information Act (POPIA) - Purpose Specification
2:30
Governance Intelligence
The Good and Bad of AI in Digital Forensics
3:42
Governance Intelligence
A Day in the Life of a Cyber Security Expert
2:24
Governance Intelligence
The role of digital forensics experts
2:52
Governance Intelligence
Overview of Cyber Security
3:21
Governance Intelligence
Digital Forensics vs Cyber Security
3:00
Governance Intelligence
5 Compelling Reasons to Pursue a Career in Cyber Security
2:42
Governance Intelligence
5 Reasons to Pursue a Career in Digital Forensics
3:07
Governance Intelligence
Digital forensics overview
2:46
Governance Intelligence
Malware Analysis : Unraveling the Secrets of Cyber Threats
0:45
Governance Intelligence
The role of multimedia forensics in criminal investigations
1:21
Governance Intelligence
Can Multimedia Forensics Help in Identifying Anonymous Online Threats
1:13
Governance Intelligence
Multimedia Forensics - Unraveling the Secrets of Digital Media
1:12
Governance Intelligence
MODULE 4 - File Carving
3:22
Governance Intelligence
Module 5 - Advanced File Carving
3:42
Governance Intelligence
MODULE 6 - File Carving for Encrypted and Compressed Files
3:15
Governance Intelligence
MODULE 7 - Data Acquisition and Preservation
3:34
Governance Intelligence
MODULE 8 - Forensic Analysis Techniques
3:01
Governance Intelligence
MODULE 9 - Forensic Analysis of files systems and data structures
3:04
Governance Intelligence
MODULE 13 - Mobile Device Forensics
4:06
Governance Intelligence
MODULE 14 - Advanced Techniques for Mobile Device Forensics
3:28
Governance Intelligence
MODULE 10 - Forensic Analysis Techniques
3:09
Governance Intelligence
MODULE 16 - Malware Analysis
3:52
Governance Intelligence
Module 13 - Mobile Device Forensics
4:12
Governance Intelligence
Module 14 - Advanced Techniques for mobile device forensics
3:32
Governance Intelligence
Module 15 - Multimedia Forensics
4:13
Governance Intelligence
Module 18 - Reporting and Expert Testimony
4:45
Governance Intelligence
Module 10 - Forensic Analysis Techniques
3:14
Governance Intelligence
Module 9 - Forensic Analysis Techniques of files and data structures
3:10
Governance Intelligence
Module 8 - Forensic Analysis Techniques
3:05
Governance Intelligence
Module 6 - File Carving for Encrypted and Compressed Files
3:20
Governance Intelligence
Module 5 - Advanced File Carving
3:47
Governance Intelligence
Module 3 - File Systems and Data Structures
3:54
Governance Intelligence
Module 2 - Computer systems and digital devices
4:46
Governance Intelligence
MODULE 1 - What is digital forensics?
3:01
Governance Intelligence
Unveiling the Crucial Forms in Digital Forensic Investigations: A Comprehensive Guide
2:02
Governance Intelligence
Must Have Digital Forensic Analysis Tools
2:17
Governance Intelligence
8 Awesome Digital Forensic Analysis Techniques
2:20
Governance Intelligence
Continuous Data Analytics: Improving IT Audit Efficiency and Effectiveness
0:59
Governance Intelligence
Is digital forensics cybersecurity?
2:04
Governance Intelligence
Digital Forensic First Response: Investigating Cyber Incidents
1:47
Governance Intelligence
Applications Controls Review: Aligning Applications Controls to Business Processes
2:05
Governance Intelligence
Data center management: Securing your data
1:21
Governance Intelligence
Logical access management : Protecting access to your digital assets
1:28
Governance Intelligence
How to audit an AI platform: Ensuring Ethical Intelligence
2:28
Governance Intelligence
IT Change Management: Managing the complexities of change in an IT environment
3:38
Governance Intelligence
Incident Management: how to handle IT incidents during a crisis?
2:41
Governance Intelligence
Backup and Disaster Recovery: Overcoming disasters and maintaining business continuity
2:09
Governance Intelligence
Cybersecurity Incident Response: How to Respond in a Time of Crisis
1:44
Governance Intelligence
Introduction to Digital Forensics
1:55
Governance Intelligence
Ransomware: What it is and How to Protect Yourself?
1:58
Governance Intelligence
Digital Fraud Risk : Don't be exposed!
2:00
Governance Intelligence
Don't Get Hooked: How to Avoid Phishing Scams
2:12
Governance Intelligence
Social Engineering: How Cybercriminals Exploit Human Behaviour
2:07
Governance Intelligence
Cybersecurity in the digital age
1:55