Image Event Event Date Event End Date Location
 Digital Evidence Investigator Certified Operator Digital Evidence Investigator Certified Operator OnDemand OnDemand Online (OnDemand)
[Workshop] Investigating Data Exfiltration [Workshop] Investigating Data Exfiltration OnDemand OnDemand Online (OnDemand)
[Workshop] Investigating Ransomware [Workshop] Investigating Ransomware OnDemand OnDemand Online (OnDemand)
Advanced Smartphone Forensics (W15) Advanced Smartphone Forensics (W15) OnDemand OnDemand Online (OnDemand)
AIM Online Training AIM Online Training OnDemand OnDemand Online (OnDemand)
Analyzing malicious documents (W32) Analyzing malicious documents (W32) OnDemand OnDemand Online (OnDemand)
Android Forensics with Belkasoft Android Forensics with Belkasoft OnDemand OnDemand Online (OnDemand)
Android Malware Analysis (W24) Android Malware Analysis (W24) OnDemand OnDemand Online (OnDemand)
Android Mobile Forensics (W46) Android Mobile Forensics (W46) OnDemand OnDemand Online (OnDemand)
Autopsy Basics and Hands On (8-Hours) Autopsy Basics and Hands On (8-Hours) OnDemand OnDemand Online (OnDemand)
AX100 Forensic Fundamentals Online Self Paced AX100 Forensic Fundamentals Online Self Paced OnDemand OnDemand Online (OnDemand)
AX200 Magnet AXIOM Examination AX200 Magnet AXIOM Examination 12-31-2030 12-31-2030 Online (OnDemand)
AX200 Magnet AXIOM Examination Microlearning AX200 Magnet AXIOM Examination Microlearning OnDemand OnDemand Online (OnDemand)
AX250 Magnet AXIOM Advanced Computer Forensics Online Self Paced AX250 Magnet AXIOM Advanced Computer Forensics Online Self Paced OnDemand OnDemand Online (OnDemand)
Browser Forensics (W57) Browser Forensics (W57) OnDemand OnDemand Online (OnDemand)
Build Your Own Pen Test Lab (W17) Build Your Own Pen Test Lab (W17) OnDemand OnDemand Online (OnDemand)
CCFP Training (W13) CCFP Training (W13) OnDemand OnDemand Online (OnDemand)
Certified CyberDefender Blue Team Training & Certification for SOC Analysts Certified CyberDefender Blue Team Training & Certification for SOC Analysts OnDemand OnDemand Online (OnDemand)
CFIP MasterClass - FORENSIC INVESTIGATION STEPS AND METHODOLOGY (W12) CFIP MasterClass - FORENSIC INVESTIGATION STEPS AND METHODOLOGY (W12) OnDemand OnDemand Online (OnDemand)
Cloud Forensics (W56) Cloud Forensics (W56) OnDemand OnDemand Online (OnDemand)
Computer Forensics In Practice Complete Course (W04) Computer Forensics In Practice Complete Course (W04) OnDemand OnDemand Online (OnDemand)
Corporate Investigations with Belkasoft Corporate Investigations with Belkasoft OnDemand OnDemand Online (OnDemand)
Create a report - Forensics Imaging Self-Paced Online Training (W10) Create a report - Forensics Imaging Self-Paced Online Training (W10) OnDemand OnDemand Online (OnDemand)
Cyber Warfare and Terrorism OnDemand OnDemand Online (OnDemand)
Data Integrity And Evidence Handling in Digital Forensics - Course Online (W60) Data Integrity And Evidence Handling in Digital Forensics - Course Online (W60) OnDemand OnDemand Online (OnDemand)
Deepfake Audio: A Comprehensive Study in Digital Forensics Course Online (W62) Deepfake Audio: A Comprehensive Study in Digital Forensics Course Online (W62) OnDemand OnDemand Online (OnDemand)
Digital Evidence Investigator (DEI) Certified User Digital Evidence Investigator (DEI) Certified User OnDemand OnDemand Online (OnDemand)
Digital Evidence Investigator PRO (DEI PRO) Certified User Digital Evidence Investigator PRO (DEI PRO) Certified User OnDemand OnDemand Online (OnDemand)
Digital Forensic Imaging - Tools & Methods (W47) Digital Forensic Imaging - Tools & Methods (W47) OnDemand OnDemand Online (OnDemand)
Digital forensic review procedures in the cloud (W20) Digital forensic review procedures in the cloud (W20) OnDemand OnDemand Online (OnDemand)
Digital Forensics OnDemand OnDemand Online (OnDemand)
Digital forensics OnDemand OnDemand Online (OnDemand)
Digital Forensics Lab OnDemand OnDemand
Digital Image Forensics: Lessons in Tampering and Fake Image Detection (W51) Digital Image Forensics: Lessons in Tampering and Fake Image Detection (W51) OnDemand OnDemand Online (OnDemand)
Digital Video Forensics (W28) Digital Video Forensics (W28) OnDemand OnDemand Online (OnDemand)
Digital Visual Media Anti–Forensics and Counter Anti–Forensics (W34) Digital Visual Media Anti–Forensics and Counter Anti–Forensics (W34) OnDemand OnDemand Online (OnDemand)
DNS Malware Analysis: A Forensic Approach (W39) DNS Malware Analysis: A Forensic Approach (W39) OnDemand OnDemand Online (OnDemand)
Drone Forensics (W44) Drone Forensics (W44) OnDemand OnDemand Online (OnDemand)
eForensics Course for eWarfare: Investigations, Threat Detection and Reconnaissance in the Electromagnetic Spectrum (W59) eForensics Course for eWarfare: Investigations, Threat Detection and Reconnaissance in the Electromagnetic Spectrum (W59) OnDemand OnDemand Online (OnDemand)
Exploitation with Armitage (W21) Exploitation with Armitage (W21) OnDemand OnDemand Online (OnDemand)
Forensic analysis for system boundary identification and security (W27) Forensic analysis for system boundary identification and security (W27) OnDemand OnDemand Online (OnDemand)
Fourth Extended File System (EXT4) Forensics (W36) Fourth Extended File System (EXT4) Forensics (W36) OnDemand OnDemand Online (OnDemand)
How to Be Ready for Forensic Investigations (W33) How to Be Ready for Forensic Investigations (W33) OnDemand OnDemand Online (OnDemand)
Incident Investigations with Belkasoft Incident Investigations with Belkasoft OnDemand OnDemand Online (OnDemand)
Incident Management: A Ransomware Walkthrough OnDemand OnDemand Online (OnDemand)
Intro to DFIR: The Divide & Conquer process Intro to DFIR: The Divide & Conquer process OnDemand OnDemand Online (OnDemand)
Introduction to eDiscovery (W23) Introduction to eDiscovery (W23) OnDemand OnDemand Online (OnDemand)
Introduction to Fusion–Based Digital Visual Media Forensics (W35) Introduction to Fusion–Based Digital Visual Media Forensics (W35) OnDemand OnDemand Online (OnDemand)
Introduction to Network Forensics OnDemand OnDemand Online (OnDemand)
Investigate Cyber Fraud - Real-Life Cases (W43) Investigate Cyber Fraud - Real-Life Cases (W43) OnDemand OnDemand Online (OnDemand)
iOS Forensics with Belkasoft iOS Forensics with Belkasoft OnDemand OnDemand Online (OnDemand)
iOS Social Media Forensics (W50) iOS Social Media Forensics (W50) OnDemand OnDemand Online (OnDemand)
IoT Forensics - DVID Challenge (W53) IoT Forensics - DVID Challenge (W53) OnDemand OnDemand Online (OnDemand)
Linux Forensics OnDemand OnDemand Online (OnDemand)
Linux Kernel Security (W45) Linux Kernel Security (W45) OnDemand OnDemand Online (OnDemand)
Live Analysis with Rekall (W25) Live Analysis with Rekall (W25) OnDemand OnDemand Online (OnDemand)
Log files: Attacks & Defenses (W38) Log files: Attacks & Defenses (W38) OnDemand OnDemand Online (OnDemand)
MacOS Anti-Forensics (W37) MacOS Anti-Forensics (W37) OnDemand OnDemand Online (OnDemand)
Magnet Certified Cloud Examiner Magnet Certified Cloud Examiner OnDemand OnDemand Online (OnDemand)
Magnet Certified Forensics Examiner - AXIOM Magnet Certified Forensics Examiner - AXIOM OnDemand OnDemand Online (OnDemand)
Magnet Certified Forensics Examiner Recertification - AXIOM Magnet Certified Forensics Examiner Recertification - AXIOM OnDemand OnDemand Online (OnDemand)
Magnet Certified macOS Examiner Magnet Certified macOS Examiner OnDemand OnDemand Online (OnDemand)
Magnet Certified Video Examiner Magnet Certified Video Examiner OnDemand OnDemand Online (OnDemand)
Malware Analysis and Memory Forensics OnDemand OnDemand Online (OnDemand)
Malware Analysis StarterKit (W02) Malware Analysis StarterKit (W02) OnDemand OnDemand Online (OnDemand)
Master Your CSA Star (W03) Master Your CSA Star (W03) OnDemand OnDemand Online (OnDemand)
Maximizing DFIR Results with YARA, Sigma, and Belkasoft X Maximizing DFIR Results with YARA, Sigma, and Belkasoft X OnDemand OnDemand Online (OnDemand)
Micro-drone Warfare: Cybersecurity Implications and Countermeasures (W61) Micro-drone Warfare: Cybersecurity Implications and Countermeasures (W61) OnDemand OnDemand Online (OnDemand)
Mobile Device Investigator (MDI) Certified User Mobile Device Investigator (MDI) Certified User OnDemand OnDemand Online (OnDemand)
Mobile Forensics with Belkasoft X Mobile Forensics with Belkasoft X OnDemand OnDemand Online (OnDemand)
Mobile Threats and Incident Handling OnDemand OnDemand Online (OnDemand)
Natural Language Processing for OSINT & Threat Analysis (W54) Natural Language Processing for OSINT & Threat Analysis (W54) OnDemand OnDemand Online (OnDemand)
Network Monitoring with Security Onion (W48) Network Monitoring with Security Onion (W48) OnDemand OnDemand Online (OnDemand)
New Technology File System (NTFS) Forensics (W40) New Technology File System (NTFS) Forensics (W40) OnDemand OnDemand Online (OnDemand)
Open Source Intelligence (OSINT) Fundamentals OnDemand OnDemand Online (OnDemand)
Open Source Intelligence for Forensics (W41) Open Source Intelligence for Forensics (W41) OnDemand OnDemand Online (OnDemand)
Packet Analysis with Wireshark and PCAP analysis tools (W01) Packet Analysis with Wireshark and PCAP analysis tools (W01) OnDemand OnDemand Online (OnDemand)
PowerShell in Digital Forensics (W52) PowerShell in Digital Forensics (W52) OnDemand OnDemand Online (OnDemand)
Practical Social Engineering (W16) Practical Social Engineering (W16) OnDemand OnDemand Online (OnDemand)
Ransomware Forensics (W30) Ransomware Forensics (W30) OnDemand OnDemand Online (OnDemand)
Recovering virtual machines from lost VMFS partitions (W29) Recovering virtual machines from lost VMFS partitions (W29) OnDemand OnDemand Online (OnDemand)
Remote Acquisition with Belkasoft Remote Acquisition with Belkasoft OnDemand OnDemand Online (OnDemand)
SDF: Windows Prefetch Forensics OnDemand OnDemand Online (OnDemand)
Shodan, OSINT & IoT Devices (W49) Shodan, OSINT & IoT Devices (W49) OnDemand OnDemand Online (OnDemand)
Software Reverse Engineering Techniques - Level 1 (W19) Software Reverse Engineering Techniques - Level 1 (W19) OnDemand OnDemand Online (OnDemand)
Specialized DFIR: Windows Registry Forensics OnDemand Online (OnDemand)
SQLite Forensics with Belkasoft SQLite Forensics with Belkasoft OnDemand OnDemand Online (OnDemand)
The Cuckoo’s Egg Decompiled Course OnDemand OnDemand Online (OnDemand)
The Internet of Things OnDemand 03-12-2028 Online (OnDemand)
The Ultimate CISSP Study Guide (W22) The Ultimate CISSP Study Guide (W22) OnDemand OnDemand Online (OnDemand)
Triage-G2 Certified User Triage-G2 Certified User OnDemand OnDemand Online (OnDemand)
Triage-G2 PRO Certified User Triage-G2 PRO Certified User OnDemand OnDemand Online (OnDemand)
Triage-Investigator Certified User Triage-Investigator Certified User OnDemand OnDemand Online (OnDemand)
Triage-Investigator PRO Certified User Triage-Investigator PRO Certified User OnDemand OnDemand Online (OnDemand)
Ubuntu Forensics (W42) Ubuntu Forensics (W42) OnDemand OnDemand Online (OnDemand)
Windows 10 Live Analysis Using Sysinternals (W26) Windows 10 Live Analysis Using Sysinternals (W26) OnDemand OnDemand Online (OnDemand)
Windows Forensic Environment (WinFE) Certification Windows Forensic Environment (WinFE) Certification OnDemand OnDemand Online (OnDemand)
Windows Forensics (W55) Windows Forensics (W55) OnDemand OnDemand Online (OnDemand)
Windows Forensics 1 OnDemand OnDemand Online (OnDemand)
WINDOWS FORENSICS ANALYSIS Self-Paced Mentored Online Training (W14) WINDOWS FORENSICS ANALYSIS Self-Paced Mentored Online Training (W14) OnDemand OnDemand Online (OnDemand)
Windows Registry and Log Analysis (W31) Windows Registry and Log Analysis (W31) OnDemand OnDemand Online (OnDemand)
Windows Registry Forensics OnDemand Online (OnDemand)
Windows Registry Forensics OnDemand Online (OnDemand)
Wireless Security Attacks (W18) Wireless Security Attacks (W18) OnDemand OnDemand Online (OnDemand)
X-Ways Forensics Practitioner's Guide Course X-Ways Forensics Practitioner's Guide Course OnDemand OnDemand Online (OnDemand)