{"id":61,"date":"2016-02-24T10:46:18","date_gmt":"2016-02-24T18:46:18","guid":{"rendered":"http:\/\/iacis.com\/?page_id=61"},"modified":"2025-01-27T20:53:15","modified_gmt":"2025-01-28T01:53:15","slug":"training","status":"publish","type":"page","link":"https:\/\/allprowebworks.dev\/_iacis\/training\/","title":{"rendered":"Training"},"content":{"rendered":"<h2 style=\"text-align: center;\"><span style=\"color: #3366ff;\"><strong>2025 Orlando Training Event Dates<\/strong><\/span><\/h2>\n<h2 style=\"text-align: center;\"><span style=\"color: #3366ff;\"><strong> April 28 &#8211; May 9, 2025<\/strong><\/span><\/h2>\n<p style=\"font-weight: 400;\"><strong>Overview <\/strong><\/p>\n<p style=\"font-weight: 400;\">IACIS has been providing computer Forensic Training for over 30 years. IACIS BCFE instructors and trainers are <a href=\"https:\/\/iacis.com\/certification\/cfce\/\" target=\"_blank\" rel=\"noopener\"><strong>Certified Forensic Computer\u00a0Examiners<\/strong><\/a>\u00a0(CFCE) and are active in the field of computer forensics. All IACIS training material is reviewed and updated each year by our trainers to ensure that IACIS training material is relevant and up to date in order to meet the changing needs of digital forensic examiners<\/p>\n<p style=\"font-weight: 400;\">For more than three decades, IACIS has been one of the premier providers for digital forensic training.\u00a0 Our instructors and trainers possess exceptional skills, with the majority of our team holding one or more IACIS certifications such as Certified Forensic Computer Examiner (CFCE), Certified Advanced Windows Forensic Examiner (CAWFE), or Certified Mobile Device Examiner (ICMDE). They actively participate in the dynamic field of digital forensics, ensuring their expertise remains up to date. We take pride in reviewing and refreshing our training materials annually, in collaboration with our trainers. This commitment guarantees that IACIS training remains pertinent and aligned with the evolving requirements of digital forensic examiners. Currently, we offer the following classes to accomplish this objective.<\/p>\n<p style=\"font-weight: 400;\"><strong>CURRENT IACIS COURSE OFFERINGS<\/strong><\/p>\n<table style=\"font-weight: 400; width: 65.740173%; height: 168px;\">\n<tbody>\n<tr style=\"height: 24px;\">\n<td style=\"height: 24px;\" width=\"287\"><strong>AMDF \u2013 Advanced Mobile Device Forensics\u00a0<\/strong><\/td>\n<td style=\"height: 24px;\" width=\"288\"><strong>ASF \u2013 Applied Scripting Forensic Techniques<\/strong><\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"height: 24px;\" width=\"288\"><strong>BCFE: Basic Computer Forensic Examiner<\/strong><\/td>\n<td style=\"height: 24px;\" width=\"287\"><strong style=\"font-family: inherit; font-size: inherit;\">CADET: Collecting and Admitting Digital Evidence at Trial<\/strong><\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"height: 24px;\" width=\"287\"><strong>CIFR: Cyber Incident Forensic Response<\/strong><\/td>\n<p><!-- \n\n<td style=\"height: 24px;\" width=\"288\"><strong>CFRW:\u00a0 Computer Forensics: Real World<\/strong><\/td>\n\n --> <\/p>\n<td><\/td>\n<\/tr>\n<tr style=\"height: 48px;\">\n<td style=\"height: 48px;\"><strong>E-CIFR: Enterprise Cyber Incident Forensic Response<\/strong><\/td>\n<td style=\"height: 24px;\" width=\"288\"><strong>FLEX:\u00a0Forensic Linux Examination<\/strong><\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"height: 24px;\" width=\"287\"><strong style=\"font-family: inherit; font-size: inherit;\">MDF: Mobile Device Forensics<\/strong><\/td>\n<td style=\"height: 48px;\"><strong>MDFL:\u00a0 Managing a Digital Forensics Lab<\/strong><\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"height: 24px;\" width=\"288\"><strong>OSINT: Open-Source Investigations<\/strong><\/td>\n<td style=\"height: 24px;\" width=\"287\"><strong style=\"font-family: inherit; font-size: inherit;\">PLA: Preparing for Lab Accreditation<\/strong><\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"height: 24px;\" width=\"288\"><strong>RCA:\u00a0 RAM Capture and Analysis<\/strong><\/td>\n<td style=\"height: 24px;\" width=\"287\"><strong>WFE: Windows Forensic <\/strong><strong>Examiner<\/strong><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p style=\"font-weight: 400;\"><strong>IACIS Basic Computer Forensic Examiner (BCFE)<\/strong> &#8211; The goal\u00a0of IACIS BCFE training is for students to learn and to stress that no student is left behind. Classes combine computer forensic theory and hands-on practical exercises and have a 6\/8:1 student to trainer ratio. \u00a0While an instructor teaches a class, the trainers are always present to assist. This allows for trainers to be immediately available to answer questions which arise during instruction.\u00a0 Trainers monitor their student\u2019s progress to ensure each student understands the material being taught and is keeping pace with the class.<\/p>\n<p style=\"font-weight: 400;\">There are no pre-requisites for the\u00a0BCFE training. Any computer knowledge a student brings to class is a benefit and will make the lectures and practical exercises much easier to grasp.\u00a0 The class begins with the basics and quickly moves into highly technical theories, terms, and techniques. The BCFE provides 90% of what the student will need to know to successfully complete the almost seven-month\u00a0CFCE<strong>\u00a0<\/strong>process. The BCFE Course has optional evening computer labs for those requiring additional hands-on time. \u00a0 Students who go on to undertake the CFCE certification process are provided a coach to help them with the peer review problem sets.<\/p>\n<p style=\"font-weight: 400;\"><strong>IACIS Specialized classes<\/strong> \u2013 The IACIS Specialized classes provide a more in-depth study of specific forensic topics with two of the classes being preparation for additional certifications.\u00a0 The IACIS Windows Forensic Examiner and <a href=\"https:\/\/iacis.com\/training\/mobile-device-forensics\/\" target=\"_blank\" rel=\"noopener\">Mobile Device Examiner<\/a> prepare students for <a href=\"https:\/\/iacis.com\/certification\/cawfe\/\" target=\"_blank\" rel=\"noopener\">Certified Advanced Windows Forensic Examiner<\/a>\u00a0(CAWFE) and Certified Mobile Device Examiner\u00a0(ICMDE) certifications with the cost of the certification included in the course fee.<\/p>\n<p style=\"font-weight: 400;\">Please visit our <a href=\"http:\/\/members.iacis.com\/training\" target=\"_blank\" rel=\"noopener\">PRODUCTS PAGE <\/a>to apply or register for training.<\/p>\n<p><strong><u>HOTEL BOOKING:<\/u><\/strong><strong>\u00a0<\/strong><\/p>\n<p>You can find information about hotel booking <a href=\"https:\/\/allprowebworks.dev\/_iacis\/training\/hotel-booking\/\" target=\"_blank\" rel=\"noopener\">HERE<\/a><\/p>\n<p style=\"font-weight: 400;\"><strong><u>CANCELLATION INFO:<\/u><\/strong><\/p>\n<p style=\"font-weight: 400;\">If IACIS is unable to hold their 2025 Orlando training event, all students who have registered and paid will have the option of a full refund or a reserved seat at the 2026 training event. IACIS is not responsible for any outside expenses (e.g., travel and accommodation) in the event of the training event being canceled. Anyone who paid for training will receive complimentary membership through the year that his\/her training takes place.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>2025 Orlando Training Event Dates April 28 &#8211; May 9, 2025 Overview IACIS has been providing computer Forensic Training for over 30 years. IACIS BCFE instructors and trainers are Certified Forensic Computer\u00a0Examiners\u00a0(CFCE) and are active in the field of computer forensics. All IACIS training material is reviewed and updated each [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-right-sidebar.php","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-61","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/allprowebworks.dev\/_iacis\/wp-json\/wp\/v2\/pages\/61","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/allprowebworks.dev\/_iacis\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/allprowebworks.dev\/_iacis\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/allprowebworks.dev\/_iacis\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/allprowebworks.dev\/_iacis\/wp-json\/wp\/v2\/comments?post=61"}],"version-history":[{"count":41,"href":"https:\/\/allprowebworks.dev\/_iacis\/wp-json\/wp\/v2\/pages\/61\/revisions"}],"predecessor-version":[{"id":4577,"href":"https:\/\/allprowebworks.dev\/_iacis\/wp-json\/wp\/v2\/pages\/61\/revisions\/4577"}],"wp:attachment":[{"href":"https:\/\/allprowebworks.dev\/_iacis\/wp-json\/wp\/v2\/media?parent=61"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}