This Terms of Use Agreement is between you and ISFCE LLC. (International Society of Forensic Computer Examiners), (“ISFCE”), and governs your access to the ISFCE website at www.isfce.com. By using or accessing this website (the “site”), you agree to be bound by these Terms and to use this site only in accordance with these Terms, our Privacy Policy (available via the “Policies” link on the ISFCE site), and any additional terms and conditions that may apply to specific sections of the site or to products and services that may be made available to you through the use of the site. If you do not agree with these Terms, do not access the site or otherwise use our services.
We reserve the right to change these Terms of Use or to impose new conditions on the use of this site from time to time. We will post the revised Terms of Use on this site and update the “Last Updated” date to reflect the date of the changes. By continuing to use the site after we post any such changes, you accept the Terms of Use as modified.
ISFCE is not responsible for the conduct, whether online or offline, of any user of the site or any other person. This site may display content provided by third parties, or links to other sites maintained by third parties. We do not operate or control any information, products, or services that third parties may provide on or through the site or on websites linked to this site. Further, such links do not imply an endorsement or sponsorship of such sites, or the information, products, or services offered on or through the sites, or on websites linked to this site.
DISCLAIMER OF WARRANTIES: ALL INFORMATION ON THIS SITE IS PROVIDED “AS IS” WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. WE DO NOT WARRANT THAT THIS SITE OR ANY OF THE FEATURES OR FUNCTIONS WITHIN THE SITE WILL BE UNINTERRUPTED OR ERROR-FREE, THAT DEFECTS WILL BE CORRECTED, OR THAT THIS SITE OR ANY COMPONENT OF THE SITE WILL BE AVAILABLE, FREE OF VIRUSES OR OTHER HARMFUL COMPONENTS. WE DO NOT WARRANT OR MAKE ANY REPRESENTATION REGARDING THE USE OF MATERIALS ON THIS SITE OR THIRD-PARTY SITES IN TERMS OF ACCURACY, TIMELINESS, CORRECTNESS, RELIABILITY, OR OTHERWISE.
PAYMENT DISCLAIMER: ISFCE uses third-party payment processors for all transactions. While we take steps to ensure secure transactions, ISFCE is not responsible for unauthorized transactions processed by the payment processor. Please review the payment processor’s Privacy Policy for information on the use, storage, and protection of your payment information.
This site is protected by copyright as a collective work or compilation under the copyright laws of the United States of America. All individual articles, content, and other elements (“Materials”) are also copyrighted works. You must abide by all additional copyright notices or restrictions contained herein.
Title to copyright in the Materials will at all times remain with the ISFCE and its third-party licensors. You may use, download, or copy the Materials contained on this site in accordance with these Terms and Conditions. Any permitted copies of the Materials must retain any copyright notice. Unless otherwise provided in the Terms of Use, you may not transmit, republish, distribute, or modify the Materials without the express, prior written consent of ISFCE. Additionally, you may not use any content contained in the Materials in any manner that may give a false or misleading impression or statement as to ISFCE or any third party referenced in the Materials. ISFCE MAY REVOKE ANY OF THE FOREGOING RIGHTS, AS WELL AS ANY ACCESS AND USE AUTHORIZATIONS GRANTED TO USERS OF THIS SITE AT ANY TIME.
ISFCE respects the rights of all copyright holders and, in this regard, has implemented a policy that provides for the termination, in appropriate circumstances, of users who infringe the rights of copyright holders. If you believe that your work has been copied in a way that constitutes copyright infringement, please provide ISFCE with the following information required by the Online Copyright Infringement Liability Limitation Act of the Digital Millennium Copyright Act, 17 US Code 512:
A physical or electronic signature of a person authorized to act on behalf of the owner of an exclusive right that is allegedly infringed. b. Identification of the copyrighted work claimed to have been infringed, or, if multiple copyrighted works at a single online site are covered by a single notification, a representative list of such works at that site. c. Identification of the material that is claimed to be infringing or to be the subject of infringing activity and that is to be removed or access to which is to be disabled, and information reasonably sufficient to permit us to locate the material. d. Information reasonably sufficient to permit us to contact the complaining party. e. A statement that the complaining party has a good-faith belief that the use of the material in the manner complained of is not authorized by the copyright owner, its agent, or the law. f. A statement that the information in the notification is accurate, and under penalty of perjury, that the complaining party is authorized to act on behalf of the owner of an exclusive right that is allegedly infringed.
For notice of claims of copyright infringement on or regarding this site, ISFCE’s copyright agent can be reached as follows:
This agreement is governed by and construed in accordance with the laws of the State of New Jersey, USA, without regard to its conflict of laws principles. Any disputes arising from or related to this agreement shall be brought exclusively in the state or federal courts located in New Jersey, and you consent to the jurisdiction of such courts.
You agree that regardless of any statute or law to the contrary, any claim or cause of action that you may have arisen out of or related to the use of this site or these Terms must be filed by you within one year after such claim or cause of action arose, or be forever barred.
Samuel Amoah is a Certified Computer Examiner with License number 276, since 2005. He was part of the problem development committee in 2006, which created a new practical problem for the final CCE certification exams. He developed a course in Computer Forensics and Project management, diploma level, approved by the Ontario Ministry of Training, Colleges and Universities for Canadian Institute of Learning now known as Wilfred Institute. The Brampton Guardian later reported it as Canada’s first Computer Forensics Course at a private career college. Samuel became one of the twelve Certified instructors of the International Society of Forensic Computer Examiners, and his college received Authorized training centre status in Canada. Samuel sprang into action and started digital forensics training for Professionals from within Canada and outside Canada,
including:
1. The Independent Corrupt Practices and other offenses Commission of Nigeria,
2. Nigeria Customs Service,
3. Bridge street Financial-UK,
4. Canadian Border Services and other similar agencies.
5. Economic and Organized Crime Office, Ghana.
Samuel Amoah, using a blend of Digital Forensics and other IT related experience, successfully conducted local and cross border investigations.
Samuel Amoah CCE is the concept creator for the Bank of Ghana Financial Industry Command Security Operations Center (FICSOC) and served as a consultant to the successfully executed FICSOC project, which comprised of a Security Operations Center and a state-of-the-art Digital forensics lab, also conceptualized by him.
Samuel Amoah has presented at the following conferences.
not limited to:
1. Cyber Crime Conference in Ghana in 2009 on ways to combat Cybercrime
2. Key speaker at the first Data Protection Conference in Ghana on ‘Memoirs of an Ethical Hacker and other two topics. (2015)
3. Presented at a Nigerian Law Enforcement conference held across three separate venues.
Lagos, Kaduna and Calabar, with the topic “Combating Kidnapping with Technology.”
4. Ghana Banker’s Association Conference 2013 on “E-banking Security”
5. ‘’Challenges of Cloud Computing to Forensic Examiners” (2011) to members of the
High Technology Crime Investigation Association. Ontario Chapter.
Samuel Amoah has penned over five thought provoking articles on the internet. One
such is the adoption of the “Financial Blackbox Concept” (Blackbox for financial
investigations).
In Investigations, Samuel Amoah single handed created a cyber investigation method which he used to find a missing person in Canada. The task took under two hours.
He worked on a World Bank project to Train and equip the Forensic Lab of the Economic and Organized crime office (EOCO Ghana. He also setup the digital Forensics Lab for Nigerian Customs and trained their Staff and was also involved in the Training of the Independent Corrupt Practises and other related offences office (ICPC) staff in Digital Forensics in Nigeria. Mr. Amoah also oversaw the building of the state-of-the-art digital forensics’ lab for the Bank of Ghana FICSOC in Ghana.
Mr. Amoah is currently conducting immediate research on combating fraud within the financial sector of Ghana.
He is a Licensed Private Investigator in the Province of Ontario, Canada.
He is a member of the High Technology Crime Investigation association (HTCIA) Ontario
Chapter, and a Member of the International Society of Forensics Computer Examiners (ISFCE).
Husam Shbib is a professional cybersecurity consultant, adept in penetration testing, digital forensics, malware analysis, programming, and OSINT. Throughout his career, he has exhibited an unwavering commitment to overcoming challenges, considering them stepping-stones to success.
He is the founder of the MemoryForensic website, a valuable resource for learning about digital forensics, especially memory forensics.
He holds multiple well-regarded cybersecurity certifications, including ICMDE, CCE, CCD, CCDFA, 13Cubed IWM, 3CE, 3CI, eCDFP, MCFE, etc. These certifications underscore his commitment to maintaining a high level of expertise and staying current with industry’s best practices.
He is also a speaker at well-known conferences and events such as BlackHat MEA, ASFSFM, IBA Karachi University, 3D Forensics, etc.
He is an advocate for fostering awareness in cybersecurity communities. So, he is committed to sharing cybersecurity knowledge, both through online platforms such as LinkedIn and YouTube, as well as online & in-person mentoring.
Q: Who qualifies for the Military and Government Discount?
A: This discount (up to 25%) is available to active-duty military personnel, veterans, and employees of government agencies involved in digital forensics or related fields.
Q: What is the Corporate Group Discount?
A: Organizations registering two or more participants for the CCE Online Training Program may qualify for group pricing.
Q: How do Regional Discounts work?
A: We offer discounted pricing to applicants from specific regions where affordability is a concern. Eligibility is based on your country of residence, and approval is required.
Q: How do I apply for a discount?
A: Please complete our Discount Request Form. After review, we’ll email you a unique coupon code if you’re approved.
Q: Can I combine multiple discounts?
A: Unfortunately, discounts cannot be combined. If you qualify for more than one, we’ll apply the highest eligible discount.
Q: How long is my discount code valid?
A: Discount codes are typically valid for 14 days from the date of issue, unless stated otherwise in your approval email.
Shawn Loutsch is a seasoned digital forensics and incident response expert with over 15 years of experience, specializing in investigations involving ransomware, malware, phishing, corporate litigation, and incident response. He excels in managing security incidents, performing root cause analysis, and providing detailed reporting to executive, legal, and compliance teams. Shawn has led global incident response teams, built relationships across cybersecurity departments to enhance security posture, and contributed to regulatory and compliance goals. With a strong focus on ensuring forensic accuracy and timely project execution, he is known for delivering in high-stakes environments.
Currently serving as Senior Manager at TransUnion, Shawn leads security incident investigations and develops incident response capabilities across platforms such as M365, AWS, and on-premise resources. He manages forensic tools, conducts tabletop exercises, and mentors junior analysts. In his previous roles at Stroz Friedberg, he led forensic investigations and large-scale digital forensics and eDiscovery projects for both civil and criminal matters. Shawn holds several prestigious certifications, including multiple SANS GIAC credentials and Certified Computer Examiner (CCE). His technical proficiency spans tools such as EnCase, FTK, Cellebrite, Splunk, and numerous forensic and security platforms.
Michael Chaves is an experienced Detective and Digital Forensics Examiner with nearly 20 years of investigative experience at the Monroe CT Police Department. Specializing in complex digital forensic examinations, Chaves has played a critical role in high-profile cases involving POS malware, financial crimes, narcotics, and murder. He has served as a Task Force Officer with the US Secret Service and DEA, conducting investigations into financial crimes and narcotics operations. Chaves is a recognized Subject Matter Expert, having conducted hundreds of digital forensic examinations and testified as an expert witness in federal and state courts.
In addition to his law enforcement duties, Chaves is an Adjunct Professor at Sacred Heart University, where he teaches graduate courses on computer and cell phone forensics. He holds numerous certifications, including Cellebrite Certified Physical Analyst (CCPA), Certified Computer Examiner (CCE), and Certified Cryptocurrency Investigator (CCI). As the Vice President of the Connecticut Chapter of the International Association of Financial Crimes Investigators (IAFCI), Chaves continues to be a leader in the field of digital forensics and cybersecurity.
John W. Akerman, Esq., is a seasoned Computer Forensics Examiner and Electronic Discovery Consultant at Rosen Litigation Technology Consulting, Inc., based in Charleston, SC. With over 15 years of experience, he holds multiple certifications, including Certified Computer Examiner (CCE) and AccessData Certified Examiner (ACE). John has provided expert analysis and testimony in numerous high-profile cases across state and federal courts. His deep expertise in digital forensics, mobile device analysis, and e-discovery has made him a trusted advisor in complex legal matters involving digital evidence.
John’s educational background includes a Bachelor of Science in Finance from Auburn University and a Juris Doctor from Charleston School of Law. In addition to his legal practice, he is an active member of the American Bar Association and the International Society of Forensic Computer Examiners. John frequently presents at conferences and seminars, sharing his insights on emerging trends in digital forensics and e-discovery, and is committed to staying at the forefront of advancements in forensic technology.
Jason L. Berryhill currently serves as the Assistant Special Agent in Charge at the Department of the Interior, Office of Inspector General, overseeing the Computer Crimes Unit. With over two decades of expertise in digital forensics, he has held positions at the U.S. Secret Service, where he coordinated the Electronic Crimes Task Force in Las Vegas, and as an officer in the U.S. Army. Jason is highly certified, holding credentials such as Certified Information Systems Security Professional (CISSP), EnCase Certified Examiner (EnCE), and Magnet Certified Forensic Examiner (MCFE), among others. His extensive experience includes handling complex cybercrimes, fraud, and digital forensic investigations.
Jason’s education includes a BBA in Logistics Management from Kent State University and an MS in Information Technology from Everglades University. He has undergone extensive digital forensics and IT security training from leading institutions and is a frequent speaker at law enforcement and cybersecurity conferences. He also serves as an Adjunct Associate Professor at the University of Maryland Global Campus, bringing his wealth of knowledge to the next generation of forensic professionals.
Dr. Eric Eppley is an accomplished Cybersecurity Director with over 30 years of experience leading technical and managerial teams. Specializing in Security Architecture, Risk Assessment, and Network/System Design, Dr. Eppley has successfully overseen complex cybersecurity initiatives for high-profile government agencies, including the Department of Defense, Homeland Security, and Health and Human Services. His extensive technical expertise is backed by a Doctor of Information Technology from Capella University, along with multiple industry certifications such as CISSP, CCSP, and CCE. Dr. Eppley currently serves as Chief Information Security Officer (CISO) for the ICON Program at ManTech, where he manages multi-disciplined teams focused on implementing cybersecurity solutions within the Risk Management Framework (RMF).
In addition to his leadership roles, Dr. Eppley is a seasoned educator with over nine years of teaching experience at institutions such as Southern New Hampshire University and the University of Maryland Global Campus. He has instructed courses on Cybersecurity, Network Forensics, and Digital Forensics, providing hands-on learning and practical guidance to students. His vast skill set, from incident response and forensic analysis to cloud security and compliance with standards like NIST 800 and HIPAA, makes him a leading expert in the cybersecurity field.
David Sun is a highly experienced cybersecurity expert with over 25 years of expertise in IT management, data breach response, and forensic investigations. As a Principal at CohnReznick, he leads the firm’s security incident response and recovery services, along with its computer forensic and litigation support offerings. His work spans across a variety of domains, including cloud security, digital forensics, eDiscovery, and privacy compliance, allowing him to provide comprehensive solutions to public and private sector clients. David has extensive experience responding to cyber-attacks, investigating data breaches, and managing post-breach remediation efforts. He also specializes in handling complex cases of internal employee malfeasance, theft of sensitive information, and high-profile federal investigations.
David’s expertise has led him to serve as a court-appointed expert and testifying witness in hundreds of litigation matters, including significant cases involving government agencies and major corporations. He has contributed to high-stakes investigations, including a national federal investigation into the handling of classified information and advising on data privacy violations for state attorneys general. Prior to joining CohnReznick, David founded SunBlock Systems, a global litigation advisory firm specializing in electronic evidence. He holds numerous certifications, including Certified Computer Examiner (CCE), Certified Information Systems Security Professional (CISSP), and EnCase Certified Examiner (EnCE), and is a recognized thought leader in cybersecurity, regularly speaking at industry conferences and contributing to various publications.
Jason L. Berryhill currently serves as the Assistant Special Agent in Charge at the Department of the Interior, Office of Inspector General, overseeing the Computer Crimes Unit. With over two decades of expertise in digital forensics, he has held positions at the U.S. Secret Service, where he coordinated the Electronic Crimes Task Force in Las Vegas, and as an officer in the U.S. Army. Jason is highly certified, holding credentials such as Certified Information Systems Security Professional (CISSP), EnCase Certified Examiner (EnCE), and Magnet Certified Forensic Examiner (MCFE), among others. His extensive experience includes handling complex cybercrimes, fraud, and digital forensic investigations.
Jason’s education includes a BBA in Logistics Management from Kent State University and an MS in Information Technology from Everglades University. He has undergone extensive digital forensics and IT security training from leading institutions and is a frequent speaker at law enforcement and cybersecurity conferences. He also serves as an Adjunct Associate Professor at the University of Maryland Global Campus, bringing his wealth of knowledge to the next generation of forensic professionals.
Tino Kyprianou is a seasoned expert in digital forensics and the President and CEO of the International Society of Forensic Computer Examiners (ISFCE), which he took over after its divestiture from Raytheon. He also leads Axiana Digital Forensics, a New Jersey-based firm specializing in computer forensics, cybersecurity, and fraud detection.
With over two decades of experience, Tino is a Certified Computer Examiner (CCE) and Certified Fraud Examiner (CFE), having worked on complex litigation cases involving trade secrets, employee terminations, financial fraud, and criminal defense. He has provided expert testimony in both State and Federal Courts and authored various policy and training manuals on computer forensics. Tino remains dedicated to expanding ISFCE’s reach by enhancing membership benefits, refining training programs, and strengthening the organization’s certification offerings. His vision is to position ISFCE as the global leader in digital forensics education and expertise, ensuring that its certifications set the standard for excellence in the field.
