Courses

Cutting-Edge Courses In Digital Forensics

IACIS has been providing digital forensics courses for over 30 years. All IACIS instructors and trainers for our Basic Computer Forensic Examiner (BCFE) course are Certified Forensic Computer Examiner (CFCE) certified and are active in the field of computer forensics. All IACIS course material is reviewed and updated each year by our trainers to ensure that IACIS courses relevant and up to date to meet the evolving needs of digital forensic examiners. Each course is structured to meet real-world digital forensics needs, ensuring you gain practical knowledge and actionable insights.

IACIS 2025 DSC 0073 1920 tiny

Digital Forensics Course Offerings

IACIS offers a diverse selection of digital forensic courses tailored to various professional needs and experience levels. Our courses include:

AdobeStock 930554404
Learn to use various applications and utilities to successfully identify, process, understand and exploit numerous database structures found on iOS, Android, Windows, and Apple systems.
AdobeStock 256835412
The IACIS Advanced Mobile Device Forensics Training Program is a 36-hour course of instruction, offered over five (5) consecutive days.
AdobeStock 1028368720
The IACIS Applied Scripting Forensic course is a 36-hour intermediate-level course that equips you with practical skills and knowledge to exploit data using various scripting languages.
two computer monitors and laptop with information 2025 03 07 15 17 57 utc
The IACIS Windows Forensic Examiner (“WFE”) course is a 36-hour course of instruction offered over five (5) consecutive days. It is designed to provide students with a detailed study of the Windows Operating System. Through a variety of lectures and instructor-led and independent hands-on practical exercises, students will study the Windows operating system in far greater detail and with far more specificity regarding critical areas of forensic focus than what can be accomplished in the more generalized perspective of the BCFE Training Program.
IACIS 2025 DSC 0095 1920 tiny
Magnet AXIOM Examinations (AX200) is ideal for those who require intermediate-level training with a digital investigation platform that covers cases involving smartphones, tablets, computers, and cloud data in a single collaborative interface.
DSC 0096
BCFE is a 76-hour course of instruction that is offered over 2 consecutive weeks and is designed to provide students with a foundational knowledge of digital computer forensics to be able to enter into the IACIS Certified Forensic Computer Examiner (CFCE) certification process.
TrainingRoom
This course is intended to introduce computer forensics and related legal issues. No previous knowledge of computer forensics or significant trial experience is expected.
AdobeStock 1046839541
CCO Inseyets is a two (2) day intermediate-level certification course that introduces mobile device unlocking, decrypting, and extraction techniques using Inseyets UFED.
ForensicDesk1
Cellebrite Evidence Repair Technician – Forensic (CERT-F) is a five (5) day expert level course designed to teach investigators how to repair mobile phones to complete data extractions in a forensically sound manner.
AdobeStock 1370812089
The concept of the IACIS intrusion investigation course was born when one of the instructors retired from law enforcement and started working Incident Response consulting.
AdobeStock 357523630
The IACIS Enterprise Cyber Incident Response Forensics (E-CIFR) course is a natural follow-on for the IACIS CIFR course. It is an expansion of skills from analyzing a small number of systems using traditional imaging + manual analysis processes to introducing and building skills that allow the student to analyze systems at scale, building and implementing toolsets to analyze systems spread across the network.
AdobeStock 559211979 1920 tiny
This course is designed to help forensic examiners who lack an understanding of Linux artifacts as well as how to leverage Linux tools for conducting forensic exams. To meet this goal the students will learn Linux operating system fundamentals and gain proficiency with command line and bash shell scripting to accomplish forensic tasks.
AdobeStock 1107050446 1920 tiny
The IACIS Managing a Digital Forensics Laboratory (MDFL) Training Program is a 16-hour course designed to teach supervisors, managers, and executives the best practices for operating a digital forensics laboratory.
man holding phone with fingerprint scanning smartp 2025 03 18 17 43 30 utc
The IACIS Mobile Device Forensics Training Program is a 36-hour course of instruction offered over five (5) consecutive days. This program will expand the students’ existing mobile forensic knowledge and skillset. It is designed to provide students with intermediate to advanced skills needed to detect, decode, decrypt, and analyze evidence recovered from mobile devices during mobile device investigations. Using instructor-led exercises and hands-on practicals, students will learn the necessary skills to go behind the automation processes of popular mobile forensic tools and will have gained the competency to apply these skills during an investigation to reveal the sources of cell phone data used to store evidence.
AdobeStock 258920712
This course is given by SUMURI. The Best Practices in Mac Forensics (MFSC-101) course shows you how and why you are missing evidence using non-native forensic solutions and how to find what is missed by using a Mac to process a Mac. Steve Whalen developed this course to provide vendor-neutral and tool-agnostic training that covers the process of examining a Macintosh computer from the first step to the last step in logical order. MFSC-101 is designed for both the beginner Mac examiner as well as the advanced.
AdobeStock 120298229 1920 tiny
The Advanced Practices in Mac Forensics (MFSC-201) course provides unparalleled vendor-neutral and tool-agnostic instruction in advanced topics relating to the forensic use and analysis of Apple hardware, technologies, and applications. The training is designed for the participant to learn in a teamwork environment and is taught by instructors who maintain a “no one left behind” attitude. In addition, complicated topics are made easy to understand through instructor-led exercises and real-life scenarios— supported by a quality student manual to be utilized as a supplemental resource after the course.
AdobeStock 1083811959 1920 tiny
The IACIS OSINT course offers a thorough introduction to the principles of research, collection, exploitation, and analysis of open-source data. This 40-hour course culminates in a 4-hour capstone project designed to consolidate the skills learned throughout the training. The curriculum is structured to equip forensic investigators, detectives, research analysts, law enforcement officials, cybersecurity professionals, and others with essential OSINT skills.
AdobeStock 307271210 1920 tiny
This course of instruction is designed to provide guidance on how any digital evidence lab can earn accreditation by understanding and implementing the accreditation requirements.  Topics include an overview of the accreditation schema and benefits of achieving accreditation, how to implement a Quality Management System that is in compliance with ISO 17025, developing laboratory SOPs and other related documentation, and understanding Validation\Verification\Performance Checking for equipment, methods, and software as it relates to digital evidence.     
AdobeStock 308339812 1920 tiny
This course is designed for the law enforcement professional who needs to leverage volatile memory to find evidence that does not exist on disk. The class will progress just like an investigation. On Day 1, students will build a device that will be used to access a locked Windows system. Students will learn additional skills to bypass login screens on Windows and Linux systems using older and newer open-source techniques. The course will introduce how the Kernel and address translation works. Additional sources of memory such as page, hibernation, and dump files are discussed. 
AdobeStock 911090617 1920 tiny
This 32-hour advanced-level course will equip you with the practical skills and competencies required to identify and extract various sources of data recoverable from Unmanned Aircraft Systems (UAS), also known as Drones, including their associated control devices in line with approved best practices.

Upcoming Events

Visit our Events Page for updates on international in-person and online events, including schedules and registration details.

IACIS full logo white

Benefits of Taking Our Digital Forensics Courses

Choosing IACIS means gaining unique advantages that set our training apart from other educational groups:

  • Expert Instruction: Learn from leading professionals and certified digital forensics examiners with extensive experience in digital investigations.
  • Flexible Formats: Our courses include online and in-person modalities to accommodate your professional schedule.
  • Career Enhancement: Earning IACIS certifications enhances your professional credentials, increasing your marketability in both law enforcement and private sector roles.
  • Networking Opportunities: Connect and collaborate with fellow professionals in the digital forensics field, expanding your professional network.
  • Ongoing Community and Collaboration: Receive ongoing access to resources, mentorship, and community support, ensuring continual professional development.

Ready to advance your digital forensics career?

IACIS provides authentic training led by passionate and seasoned experts committed to your professional growth. Visit our IACIS Certifications page for more info about how to become certified.