Courses

Cutting-Edge Courses In Digital Forensics

IACIS has been providing digital forensics courses for over 35 years. All IACIS instructors and trainers for our Basic Computer Forensic Examiner (BCFE) course are Certified Forensic Computer Examiner (CFCE) certified and are active in the field of computer forensics. All IACIS course material is reviewed and updated each year by our trainers to ensure that IACIS courses relevant and up to date to meet the evolving needs of digital forensic examiners. Each course is structured to meet real-world digital forensics needs, ensuring you gain practical knowledge and actionable insights.

IACIS 2025 DSC 0073 1920 tiny

Digital Forensics Course Offerings

IACIS offers a diverse selection of digital forensic courses tailored to various professional needs and experience levels. Our courses include:

AdobeStock 930554404
Learn to use various applications and utilities to successfully identify, process, understand and exploit numerous database structures found on iOS, Android, Windows, and Apple systems.
AdobeStock 256835412
The IACIS Advanced Mobile Device Forensics Training Program is a 36-hour course of instruction, offered over five (5) consecutive days.
AdobeStock 1028368720
The IACIS Applied Scripting Forensic course is a 36-hour intermediate-level course that equips you with practical skills and knowledge to exploit data using various scripting languages.
two computer monitors and laptop with information 2025 03 07 15 17 57 utc
The IACIS Advanced Windows Forensic Examiner (“AWFE”) course is a 36-hour course of instruction offered over five (5) consecutive days. It is designed to provide students with a detailed study of the Windows Operating System. Through a variety of lectures and instructor-led and independent hands-on practical exercises, students will study the Windows operating system in far greater detail and with far more specificity regarding critical areas of forensic focus than what can be accomplished in the more generalized perspective of the BCFE Training Program.
IACIS 2025 DSC 0095 1920 tiny
Magnet AXIOM Examinations (AX200) is ideal for those who require intermediate-level training with a digital investigation platform that covers cases involving smartphones, tablets, computers, and cloud data in a single collaborative interface.
DSC 0096
BCFE is a 76-hour course of instruction that is offered over 2 consecutive weeks and is designed to provide students with a foundational knowledge of digital computer forensics to be able to enter into the IACIS Certified Forensic Computer Examiner (CFCE) certification process.
TrainingRoom
This course is intended to introduce computer forensics and related legal issues. No previous knowledge of computer forensics or significant trial experience is expected.
AdobeStock 1046839541
CCO Inseyets is a two (2) day intermediate-level certification course that introduces mobile device unlocking, decrypting, and extraction techniques using Inseyets UFED.
ForensicDesk1
Cellebrite Evidence Repair Technician – Forensic (CERT-F) is a five (5) day expert level course designed to teach investigators how to repair mobile phones to complete data extractions in a forensically sound manner.
AdobeStock 1370812089
The concept of the IACIS intrusion investigation course was born when one of the instructors retired from law enforcement and started working Incident Response consulting.
AdobeStock 1354487945
This certificated training enables investigators to leverage the full power of Detego’s Digital Forensics tools in both lab and field-based environments. Covering the fundamentals of each acquisition and analytical feature, the training details how Detego’s solutions help users to carry out rapid logical and physical data acquisition from range of devices including computers, mobiles, drones and removable devices.
AdobeStock 1083811959 1920 tiny
This Spyder Forensics class delivers unique content that is not offered anywhere else. The course material is supported by real-world examples and incidents.
AdobeStock 357523630
The IACIS Enterprise Cyber Incident Response Forensics (E-CIFR) course is a natural follow-on for the IACIS CIFR course. It is an expansion of skills from analyzing a small number of systems using traditional imaging + manual analysis processes to introducing and building skills that allow the student to analyze systems at scale, building and implementing toolsets to analyze systems spread across the network.
AdobeStock 559211979 1920 tiny
This course is designed to help forensic examiners who lack an understanding of Linux artifacts as well as how to leverage Linux tools for conducting forensic exams. To meet this goal the students will learn Linux operating system fundamentals and gain proficiency with command line and bash shell scripting to accomplish forensic tasks.
man holding phone with fingerprint scanning smartp 2025 03 18 17 43 30 utc
The IACIS Mobile Device Forensics Training Program is a 36-hour course of instruction offered over five (5) consecutive days. This program will expand the students’ existing mobile forensic knowledge and skillset. It is designed to provide students with intermediate to advanced skills needed to detect, decode, decrypt, and analyze evidence recovered from mobile devices during mobile device investigations. Using instructor-led exercises and hands-on practicals, students will learn the necessary skills to go behind the automation processes of popular mobile forensic tools and will have gained the competency to apply these skills during an investigation to reveal the sources of cell phone data used to store evidence.
AdobeStock 1107050446 1920 tiny
The IACIS Managing a Digital Forensics Laboratory (MDFL) Training Program is a 16-hour course designed to teach supervisors, managers, and executives the best practices for operating a digital forensics laboratory.
AdobeStock 258920712
This course is given by SUMURI. The Best Practices in Mac Forensics (MFSC-101) course shows you how and why you are missing evidence using non-native forensic solutions and how to find what is missed by using a Mac to process a Mac. Steve Whalen developed this course to provide vendor-neutral and tool-agnostic training that covers the process of examining a Macintosh computer from the first step to the last step in logical order. MFSC-101 is designed for both the beginner Mac examiner as well as the advanced.
AdobeStock 120298229 1920 tiny
The Advanced Practices in Mac Forensics (MFSC-201) course provides unparalleled vendor-neutral and tool-agnostic instruction in advanced topics relating to the forensic use and analysis of Apple hardware, technologies, and applications. The training is designed for the participant to learn in a teamwork environment and is taught by instructors who maintain a “no one left behind” attitude. In addition, complicated topics are made easy to understand through instructor-led exercises and real-life scenarios— supported by a quality student manual to be utilized as a supplemental resource after the course.
AdobeStock 1083811959 1920 tiny
The IACIS OSINT course offers a thorough introduction to the principles of research, collection, exploitation, and analysis of open-source data. This 40-hour course culminates in a 4-hour capstone project designed to consolidate the skills learned throughout the training. The curriculum is structured to equip forensic investigators, detectives, research analysts, law enforcement officials, cybersecurity professionals, and others with essential OSINT skills.
AdobeStock 307271210 1920 tiny
This course of instruction is designed to provide guidance on how any digital evidence lab can earn accreditation by understanding and implementing the accreditation requirements.  Topics include an overview of the accreditation schema and benefits of achieving accreditation, how to implement a Quality Management System that is in compliance with ISO 17025, developing laboratory SOPs and other related documentation, and understanding Validation\Verification\Performance Checking for equipment, methods, and software as it relates to digital evidence.     
AdobeStock 308339812 1920 tiny
This course is designed for the law enforcement professional who needs to leverage volatile memory to find evidence that does not exist on disk. The class will progress just like an investigation. On Day 1, students will build a device that will be used to access a locked Windows system. Students will learn additional skills to bypass login screens on Windows and Linux systems using older and newer open-source techniques. The course will introduce how the Kernel and address translation works. Additional sources of memory such as page, hibernation, and dump files are discussed. 
AdobeStock 911090617 1920 tiny
This 32-hour advanced-level course will equip you with the practical skills and competencies required to identify and extract various sources of data recoverable from Unmanned Aircraft Systems (UAS), also known as Drones, including their associated control devices in line with approved best practices.

Upcoming Events

Visit our Events Page for updates on international in-person and online events, including schedules and registration details.

IACIS full logo white

Benefits of Taking Our Digital Forensics Courses

Choosing IACIS means gaining unique advantages that set our training apart from other educational groups:

  • Expert Instruction: Learn from leading professionals and certified digital forensics examiners with extensive experience in digital investigations.
  • Flexible Formats: Our courses include online and in-person modalities to accommodate your professional schedule.
  • Career Enhancement: Earning IACIS certifications enhances your professional credentials, increasing your marketability in both law enforcement and private sector roles.
  • Networking Opportunities: Connect and collaborate with fellow professionals in the digital forensics field, expanding your professional network.
  • Ongoing Community and Collaboration: Receive ongoing access to resources, mentorship, and community support, ensuring continual professional development.

Ready to advance your digital forensics career?

IACIS provides authentic training led by passionate and seasoned experts committed to your professional growth. Visit our IACIS Certifications page for more info about how to become certified.

Training FAQ

How do I register for training?

Please visit our PRODUCTS PAGE to register for training.

No, the registration price only includes the cost of the training class. Meals, hotel and other travel expenses are an additional cost to the student.

No personal computing devices other than cell phones are allowed in the classroom for several reasons.

1. Space is very limited.

2. Significant distraction for the student and fellow students.

3. Integrity of student material and copyrights.

Cell phones are permitted as long as they are set to silent or vibrate. IACIS respectfully requests that should you have to take a call during an instructional block that you show common courtesy to others by taking the call outside. Excessive texting to the point of distracting others will not be tolerated.

Students are expected to attend class in casual business attire.

There is a restaurant in the hotel and a few within walking distance; however, transportation will be needed for any weekend activities such as Disney or the other sights. ***Please be aware there is a daily parking fee for students who are not registered guests at the Caribe Royale.***

IACIS training is available to any IACIS member. There are two types of membership – regular and associate. Regular members consist of current or former members of law enforcement, current or former government employees, and current contractors supporting law enforcement or government agencies. Associate membership is designed for aspiring members of the computer/digital forensics community that support the mission and values of IACIS.

IACIS continually updates its cadre of classes.  Some of the more recent classes offered over the past few years include:

  • Basic Computer Forensic Examiner (BCFE)
  • Mobile Device Forensics (MDF)
  • Advanced Mobile Device Forensics (AMDF)
  • Applied Scripting Forensic Techniques (ASF)
  • Cyber Incident Forensic Response (CIFR)
  • Computer Forensics: Real World (CFRW)
  • Enterprise Cyber Incident Forensic Response (E-CIFR)
  • Managing a Digital Forensic Lab (MDFL)
  • Preparing for Lab Accreditation (PLA)
  • Windows Forensic Examiner (WFE)
  • Ram Capture and Analysis (RCA)
  • Forensic Linux Examinations (FLEX)
  • Open-Source Intelligence (OSINT)
  • Collecting and Admitting Digital Evidence at Trial (CADET)

IACIS offers an annual training event in Orlando, Florida the last week of April and the first week of May each year. There are approximately 800-900 students over the Orlando Event’s two-week period.

Occasionally, IACIS will offer specialized courses “on the road” if a volunteer to host the classes can be found and when staff schedules permit. To request a specialized training class, contact our Events Coordinator by emailing: VicePresident@iasis.com.

IACIS trainers are 100% volunteers consisting of federal, state, and municipal law enforcement professionals, along with professional computer forensic practitioners located in more than 70 countries around the world. Our volunteer staff members and trainers are not paid to develop or teach our material. As a result, some IACIS members must take personal leave to attend our training event. This limits the number of times each class can be offered each year. Our staff and trainers have extensive experience in the field of Digital Forensics. All BCFE staff/trainers have earned their CFCE certification and are members in good standing.

IACIS has been teaching computer forensics to law enforcement since 1990. The curriculum is vendor neutral and does not focus on any one forensic tool or suite of tools. IACIS does not endorse any hardware or software vendor and recognizes the need for many tools to successfully process digital evidence. IACIS is a non-profit organization, and our training is the most reasonably priced training in the marketplace. We invite you to compare the price of our training to any other forensic training.

No, we do not offer any discounts on IACIS training as we strive to keep our prices as low as possible. IACIS does have two scholarships that have been generously funded through our IACIS membership, private donation and our vendor sponsors.

Feel free to direct your questions to training@iacis.com.  Please be patient as all IACIS “employees” are volunteers who normally conduct IACIS business during their evening hours from home.