Register to attend pre/post programming, training labs, and events held by our sponsors.
Pre/Post Conference Programs
Enhance Your Conference Experience
Cellebrite
Cellebrite Certified Physical Analyst (CCPA)
May 31 – June 4 (Pre-Conference)
This course is a five-day advanced level certification program designed for technically aware investigators, digital evidence analysts and forensic practitioners. CCPA focuses on post-extraction analysis and advanced search techniques using Physical Analyzer and does not involve the extraction of data from devices.
Magnet Forensics
AX200 Magnet AXIOM Examination
June 1-4 (Pre-Conference)
This course is ideal for those who require intermediate-level training with a digital investigation platform that covers cases involving smartphones, tablets, computers, and cloud data in a single collaborative interface. Students will gain a deep understanding of the benefits Magnet AXIOM’s “artifact first” approach in optimizing investigative efficiency. This course is the perfect entry point for examiners who are new to AXIOM.
AX301 MAGaK (Magnet AXIOM & GrayKey) Advanced iOS Examinations
June 1-4 (Pre-Conference)
This course is an expert-level four-day training course, designed for participants who are familiar with the principles of digital forensics and who are seeking to leverage Magnet AXIOM and Magnet ACQUIRE to improve their mobile device investigations.
Spyder Forensics
SQLite Forensic Analysis
June 1-2 (Pre-Conference)
This two-day intermediate forensic course gives examiners a deeper understanding of how SQLite works under the hood. By the end of the course, participants will have a firm grasp of the inner workings of SQLite databases and will have the knowledge they need to competently deal with this popular database format.
Dark Web and Cryptocurrency Investigations Training
June 3-4 (Pre-Conference)
This two-day course, designed for investigators, exposes participants to both the Dark Web and Cryptocurrency. At the end of the course, Cryptocurrency and the Dark web will be tied together to show how cryptocurrency is used in conjunction with the Dark Web to facilitate criminal activity.