Page Loader Logo

The International Association of Computer Investigative Specialists

2026 Orlando Training Conference

Registration is Closed

Event Details

[Details and associated courses for the 2026 Orlando event coming soon.  Please check back mid-September for updates.]

Each year, professionals from around the world gather in Orlando for IACIS’s flagship training event — a comprehensive, immersive experience designed to sharpen your skills, expand your knowledge, and deepen your professional network. At the heart of the event is the internationally respected Basic Computer Forensic Examiner (BCFE) course, a rigorous, hands-on training program that lays the foundation for excellence in digital forensics. Whether you’re new to the field or advancing your expertise, this course equips you with real-world skills and prepares you to earn IACIS Certified Forensic Computer Examiner (CFCE) certification — a mark of distinction recognized globally.

In addition to the BCFE, the Orlando event also features IACIS Specialized Courses — advanced training programs designed for professionals ready to go deeper into focused areas of digital forensics. Courses like Advanced Windows Forensic Examiner and Mobile Device Forensics are not only technically intensive, but also prepare students for certification as a Certified Advanced Windows Forensic Examiner (CAWFE) or IACIS Certified Mobile Device Examiner (ICMDE) — with the certification cost included in the course fee. These specialized tracks offer a powerful way to expand expertise, elevate professional credentials, and stay on the cutting edge of the field.

IACIS instructors bring real-world experience to every course. Each trainer is actively engaged in the field of digital forensics and holds one or more advanced IACIS certifications, including the above-mentioned CFCE, CAWFE, and ICMDE. Their hands-on expertise ensures that every lesson is practical, relevant, and immediately applicable to the challenges examiners face today.

Our commitment to excellence doesn’t stop at instruction. IACIS training materials are reviewed and updated annually to reflect the latest tools, techniques, and legal considerations in digital forensics. This dedication keeps our courses at the forefront of the profession — so you leave Orlando equipped with knowledge that’s not only current, but trusted across the globe.

Beyond the classroom, the Orlando event offers something just as valuable: connection. Attendees gain access to leading instructors, seasoned forensic practitioners, and peers from law enforcement, government, and private sectors — all committed to advancing the profession. Set in a vibrant and convenient location, the 2026 event combines top-tier instruction with the opportunity to build lasting relationships, discover new tools and techniques, and be part of a trusted global community. Don’t miss your chance to invest in your future and accelerate your digital forensics career.

More Details

Hotel info

The course will be taught at the Caribe Royale Orlando8101 World Center Drive, Orlando, Florida 32821 (USA).  This hotel is 16 miles from the Orlando International Airport, it has a large pool, spacious workout facility and is close to Disney World and Universal Studios.

 

Cancellation info

coming soon

Quick Details

WhenApril 27 - May 8, 2026

WhereCaribe Royale Orlando, 8101 World Center Drive, Orlando, Florida 32821 (USA)

Certifications

CFCE IACIS Certification

CFCE

Certified Forensic Computer Examiner Program

CAWFE IACIS Certification

ICMDE

IACIS Certified Mobile Device Examiner

CMDE IACIS Certification

CAWFE

Certified Advanced Windows Forensic Examiner

Courses Offered at This Event

Taught by experienced professionals, these hands-on sessions cover everything from foundational skills to advanced investigative methods. Whether you’re new to the field or a seasoned expert, you’ll gain practical knowledge that directly applies to your work. Explore the course lineup and build your expertise today.

The IACIS Advanced Mobile Device Forensics Training Program is a 36-hour course of instruction, offered over five (5) consecutive days.
The IACIS Applied Scripting Forensic course is a 36-hour intermediate-level course that equips you with practical skills and knowledge to exploit data using various scripting languages.
The IACIS Advanced Windows Forensic Examiner (“AWFE”) course is a 36-hour course of instruction offered over five (5) consecutive days. It is designed to provide students with a detailed study of the Windows Operating System. Through a variety of lectures and instructor-led and independent hands-on practical exercises, students will study the Windows operating system in far greater detail and with far more specificity regarding critical areas of forensic focus than what can be accomplished in the more generalized perspective of the BCFE Training Program.
BCFE is a 76-hour course of instruction that is offered over 2 consecutive weeks and is designed to provide students with a foundational knowledge of digital computer forensics to be able to enter into the IACIS Certified Forensic Computer Examiner (CFCE) certification process.
This course is intended to introduce computer forensics and related legal issues. No previous knowledge of computer forensics or significant trial experience is expected.
The concept of the IACIS intrusion investigation course was born when one of the instructors retired from law enforcement and started working Incident Response consulting.
The IACIS Enterprise Cyber Incident Response Forensics (E-CIFR) course is a natural follow-on for the IACIS CIFR course. It is an expansion of skills from analyzing a small number of systems using traditional imaging + manual analysis processes to introducing and building skills that allow the student to analyze systems at scale, building and implementing toolsets to analyze systems spread across the network.
This course is designed to help forensic examiners who lack an understanding of Linux artifacts as well as how to leverage Linux tools for conducting forensic exams. To meet this goal the students will learn Linux operating system fundamentals and gain proficiency with command line and bash shell scripting to accomplish forensic tasks.
The IACIS Mobile Device Forensics Training Program is a 36-hour course of instruction offered over five (5) consecutive days. This program will expand the students’ existing mobile forensic knowledge and skillset. It is designed to provide students with intermediate to advanced skills needed to detect, decode, decrypt, and analyze evidence recovered from mobile devices during mobile device investigations. Using instructor-led exercises and hands-on practicals, students will learn the necessary skills to go behind the automation processes of popular mobile forensic tools and will have gained the competency to apply these skills during an investigation to reveal the sources of cell phone data used to store evidence.
The IACIS Managing a Digital Forensics Laboratory (MDFL) Training Program is a 16-hour course designed to teach supervisors, managers, and executives the best practices for operating a digital forensics laboratory.
Join our staff of forensic investigators from around the globe and get insights into what mobile phone data reports have to offer. Learn what the data means while comparing a variety of analytical suites to contrast how they present it.
The IACIS OSINT course offers a thorough introduction to the principles of research, collection, exploitation, and analysis of open-source data. This 40-hour course culminates in a 4-hour capstone project designed to consolidate the skills learned throughout the training. The curriculum is structured to equip forensic investigators, detectives, research analysts, law enforcement officials, cybersecurity professionals, and others with essential OSINT skills.
This course of instruction is designed to provide guidance on how any digital evidence lab can earn accreditation by understanding and implementing the accreditation requirements.  Topics include an overview of the accreditation schema and benefits of achieving accreditation, how to implement a Quality Management System that is in compliance with ISO 17025, developing laboratory SOPs and other related documentation, and understanding Validation\Verification\Performance Checking for equipment, methods, and software as it relates to digital evidence.     
This course is designed for the law enforcement professional who needs to leverage volatile memory to find evidence that does not exist on disk. The class will progress just like an investigation. On Day 1, students will build a device that will be used to access a locked Windows system. Students will learn additional skills to bypass login screens on Windows and Linux systems using older and newer open-source techniques. The course will introduce how the Kernel and address translation works. Additional sources of memory such as page, hibernation, and dump files are discussed. 
In this course, taught by Spyder Forensics, you will learn to use various applications and utilities to successfully identify, process, understand and exploit numerous database structures found on iOS, Android, Windows, and Apple systems.
This 32-hour advanced-level course, taught by Spyder Forensics, will equip you with the practical skills and competencies required to identify and extract various sources of data recoverable from Unmanned Aircraft Systems (UAS), also known as Drones, including their associated control devices in line with approved best practices.
The Best Practices in Mac Forensics (MFSC-101) course, taught by SUMURI, shows you how and why you are missing evidence using non-native forensic solutions and how to find what is missed by using a Mac to process a Mac. Steve Whalen developed this course to provide vendor-neutral and tool-agnostic training that covers the process of examining a Macintosh computer from the first step to the last step in logical order. MFSC-101 is designed for both the beginner Mac examiner as well as the advanced.
The Advanced Practices in Mac Forensics (MFSC-201) course, taught by SUMURI, provides unparalleled vendor-neutral and tool-agnostic instruction in advanced topics relating to the forensic use and analysis of Apple hardware, technologies, and applications. The training is designed for the participant to learn in a teamwork environment and is taught by instructors who maintain a “no one left behind” attitude. In addition, complicated topics are made easy to understand through instructor-led exercises and real-life scenarios— supported by a quality student manual to be utilized as a supplemental resource after the course.
Skip to content