0

Your Cart is Empty


Why you should learn with us

Over the last 15 years, the world has experienced a need for competent professionals who can effectively manage complex cyber issues that threaten the assets and people of corporations, public and private institutions and government.

To meet this need, the McAfee Institute administers the Certified Cyber Intelligence Investigator (CCII). This remarkable group of professionals has demonstrated their competency in the areas of cyber intelligence, investigations, leadership and industry best practices through an intensive qualification and testing program. As a result, each of them is awarded the coveted designation of CCII and is recognized as leaders in their profession.

The CCII is the leading industry certification for law enforcement, loss prevention, private investigators, and fraud professionals. The skills that you will learn by studying for the CCII will help you conduct cyber investigations and critical intelligence gathering missions quicker than ever before, with more accuracy. You will learn how to identify your person of interest, conduct timely cyber investigations, and methodologies to prosecute cyber criminals regardless of their location.

You will learn topics such cyber investigations, mobile & digital forensics, e-commerce fraud, auction fraud, hacking, intelligence gathering, social media investigation methodologies, legal fundamentals and more!

Even better yet!This certification program and all the resources are completely online and self-study! No matter when you want it, where you want it, or where you are located around the world, it will be available 24/7/365.

The CCII Supports the National Cyber-Security Workforce Framework (Homeland Security)

  • The National Cybersecurity Workforce Framework supports the nation’s cybersecurity workforce development efforts.
  • The National Cybersecurity Workforce Framework provides a simple, standardized way to define cybersecurity work across multiple sectors
  • The National Cybersecurity Workforce Framework provides detailed descriptions of types of cybersecurity work, the knowledge, skills, and abilities required for each area, and descriptions of common specialties.
  • Students will graduate with the knowledge and skills that employers need
  • Colleges can create programs that are aligned with jobs,
  • Employees will have a better-defined career path and opportunities, and
  • Policymakers can set standards to promote workforce professionalization.

Now is the Time... Join the Ranks of the Industries most Elite Cyber Investigators!

I can't urge you enough to invest in yourself and your future while learning some really neat stuff along the way. Earning the industry's top certification is rigorous, challenging, and extremely fun!

Trust me when I tell you that we are going to blow your mind and teach you things that you never thought possible! It starts with the impossible and ends with the remarkable!

Whats Included:

  • Official CCII e-Courseware: ($1497 Value)
  • Official CCII Online Exam License: ($997 Value)
  • Official CCII Prep Review Quizzes: ($497 Value)
  • Official CCII Digital Study Guide: ($350 Value)
  • Exam Guarantee: Pass it or try again on us! Conditions Apply (Value $997)
  • Keepsake: Diploma, Padded Cover, Transcripts (Value $300)
  • Unlimited Access to our New Career Center (Value $1200)
  • Unlimited Coaching and Mentoring (Value $2400)

Program Benefits

  • Credential Earned: Board Certification 
  • Availability: Desktop, Mobile, Tablet
  • Nationally Recognized Credential: NASBA, NICE & More
  • Live Mentors: Available 9-6PM CST via Chat

Maintaining the Credential:

You have to renew the board certification every two years, once you are certified. The cost is $125 for an additional two years. CPE requirements are listed here.

Eligibility requirements:

  • Bachelor’s degree or higher plus one year of experience in e-commerce, fraud, investigations, IT, law enforcement, forensics, criminal justice, law, and/or loss prevention or other similar field or
  • Associates degree plus two years of experience or
  • High school diploma or GED plus three years of experience

Course Curriculum:

Welcome to the Certified Cyber Intelligence Investigator (C.C.I.I.)!

  • Welcome to the C.C.I.I.
  • Group Forum Discussion: Introduce Yourself!
  • Introduction (Reading Assignment)
  • Code of Ethics (Reading Assignment)
  • Resources

History and Background

  • History and Background (Reading Assignment)
  • Module 2 Quiz: History and Background

Cyber Intelligence (Overview)

  • Cyber Intelligence (Reading Assignment)
  • Module 3 Quiz: Cyber Intelligence

eCrime Investigation Methodologies

  • eCrime Methodologies (Reading Assignment
  • eCrime Investigations - Introduction
  • Where is eCrime Most Prevalent
  • Fencing Vs. eFencing
  • eCommerce Challenges to Investigating Fraudsters
  • Prosecution Challenges
  • Prosecution Requirements
  • Science Meets eCrime
  • Ebay The World's Largest Auction Platform
  • Boosters Selling on Ebay
  • Ebay Fraudsters - Let's Find Them
  • Search Results Overview
  • Ebay Listing Overview
  • Advanced eBay Search Overview
  • Auction Listing Details
  • Feedback Profile Overview
  • Auction Analysis for Fraud
  • Feedback Systems and How Fraudsters Use Them
  • Ebay Feedback Review - First 30 Days
  • Craigslist Overview
  • Craigslist Listings
  • Craigslist Investigations
  • Google Boolean Searches - Site Search
  • eCrime Tip Sheet
  • Quick Reference Guide
  • Group Forum Discussion: eBay Investigation
  • Group Forum Discussion: Craigslist Investigation
  • Module 4 Quiz: eCrime Investigations Quiz

Advanced eCrime Investigation Methodologies

  • Introduction to Advanced eCommerce Fraud
  • The Demographics of Online Fraudsters
  • Trends and Patterns of Online Fraudsters
  • The Profile of an Online Fraudster
  • Types of Auction Fraud
  • Patterns in Fraudulent Behavior
  • Research Results and Types of Auction Fraud
  • Analyze Fraudulent Behavior
  • eBay Investigations
  • eBay Auction Search Kit
  • eBay and Terapeak
  • Hot Topic Research on Terapeak
  • eBay Investigative Tips
  • Craigslist Investigation
  • Craigslist Investigation Tips
  • Facebook Marketplace (Oodle) Introduction
  • Facebook Marketplace - Searching Individuals
  • Facebook Marketplace Investigative Tips
  • Google Advanced Operators
  • Google Site Search: eforcity
  • Google Site Search
  • Email Header Information
  • Meta Data
  • eCommerce Laboratory
  • Conclusion
  • Module 5 Quiz: Advanced eCrime Investigation Methodologies

Introduction to Cyber Investigations

  • Types of Cyber Crime (Reading Assignment)
  • Intro to Cyber Investigations - Overview
  • Definitive Guide to Cyber Forensics
  • How Cyber Criminals Attack
  • Sample Preservation Letter
  • Conducting Cyber Investigations
  • Cyber Investigations 101
  • How to Investigate Email Headers
  • Conclusion & Recap
  • Module 6 Quiz: Introduction to Cyber Investigations

Interpretation of Behaviors

  • Interpretation of Behaviors (Reading Assignment)
  • Module 7 Quiz: Interpretation of Behaviors

Cyber Investigations 101

  • Cyber Investigations (Reading Assignment)
  • Module 8 Quiz: Cyber Investigations 101

Understanding the Perpetrator

  • Understanding the Perpetrator (Reading Assignment)
  • Module 9 Quiz: Understanding the Perpetrator

Email Headers and Digital Forensics

  • Cyber Forensics (Reading Assignment)
  • Investigating Email Crimes: The Who, What, When, and Where! (07:11)
  • What do we do?
  • Email Header Information
  • Email Header Extractions
  • Email Header Terms
  • Mobile Forensics Part 1
  • Mobile Forensics Part 2
  • Module 10 Quiz: Digital and Mobile Forensics

Open Source Intelligence

  • Open Source Intelligence (Reading Assignment)
  • Module 11 Quiz: Open Source Intelligence

Privacy

  • Privacy (Reading Assignment)
  • Module 12 Quiz: Privacy

Basic Social Media Investigations

  • Social Media Landscape (Reading Assignment)
  • Basic Social Media Intro
  • Facebook Search
  • Locating People on Facebook
  • Facebook Profile
  • Facebook Search Tool
  • Facebook Private Profile Information
  • Twitter
  • Twitter Search
  • Twitter Mobile App
  • YouTube
  • YouTube Search
  • Google+
  • Google+ Search
  • Ethical Considerations
  • Module 13 Quiz: Basic Social Media Investigations

Advanced Social Media Investigations

  • Resources
  • An Overview of Advanced Social Media Investigations
  • Defining Open Source Intelligence
  • A World of Sock Puppets
  • Domain Names
  • Username Workflow
  • Search Engines
  • Facebook
  • Twitter
  • Instagram
  • YouTube
  • HootSuite and SproutSocial
  • Module 14 Quiz: Advanced Social Media Investigations

Exploring the Deep Web

  • DarkWeb (Reading Assignment)
  • The Deep Web!
  • Getting Started with TOR (Step by Step)
  • Introducing the TOR Project
  • The Deep Web (Overview)
  • An Exploration 1
  • VPN Services
  • Steps to buy and set up a VPN service to remain anonymous
  • Hidden Wiki 2017
  • Black Market Links 2017
  • Deep Web Drug Markets 2017
  • Hitman and Escrow Dark Web Links 2017
  • Directories and Lists 2017
  • The Secrets Behind the TOR Browser
  • TOR Wiki (Resource)
  • What the @#$% is a Bitcoin anyway?
  • Module 15 Quiz: Deep Web

Documenting Social Media Evidence

  • Documenting Social Media Evidence (Reading Assignment)\
  • Module 16 Quiz: Documenting Social Media Evidence

Law Enforcement Efforts

  • Law Enforcement Efforts (Reading Assignment)
  • Module 17 Quiz: Law Enforcement Efforts

Legal Fundamentals of Cyber Investigations

  • Legal Fundamentals (Reading Assignment)
  • Introduction to Legal Fundamentals
  • Understanding Your Role as a Corporate Investigator
  • Understanding Your Employees Rights
  • The Electronic Communications Privacy Act
  • Understanding Law Enforcement Concerns
  • An Agent of the Law
  • Federal Laws to Prosecute CyberCrimes
  • Becoming an Expert Witness
  • Dauberts Standards, What is it?
  • Common Task of an Expert Witness
  • Preparing to Become an Expert Witness
  • Your Role as a Consultant
  • How to Prepare Your Testimony for Court
  • Preparing Forensic and Computer Evidence
  • Legal Fundamentals of Cyber Investigations Summary
  • Module 18 Quiz: Legal Fundamentals of Cyber Investigations

Digital Evidence

  • Social Media Evidence (Reading Assignment)
  • Module 19 Quiz: Digital Evidence

Setting up an Investigators Computer

  • Setting up an Investigators Computer (Reading Assignment)
  • Module 20 Quiz: Setting up the Investigators Computer

Ethical Considerations

  • Ethical Considerations (Reading Assignment)
  • Module 21 Quiz: Ethical Considerations

Advanced Searching

  • Advanced Searching (Reading Assignment)
  • Module 22 Quiz: Advanced Searching

Understanding Deception

  • Understanding Deception (Reading Assignment)
  • Module 23 Quiz: Understanding Deception

CCII Appendix

  • CCII Appendix

CCII Final Exam

  • Preparing for the Exam
  • Exam Application
  • Final Exam: CCII

What our Students have to Say

Customer Reviews

Based on 23 reviews
5 Star
78% 
18
4 Star
22% 
5
3 Star
0% 
0
2 Star
0% 
0
1 Star
0% 
0
Write a Review Ask a Question
  • Reviews (23)
  • Questions (0)

Thank you for submitting a review!

Your input is very much appreciated. Share it with your friends so they can enjoy it too!
SL
11/09/2017
Sabrina L.
Canada

Great for Beginners!

I'm from Canada and I was a bit worried if it would be relevant to me or if I would be able to keep up. After a bit of information and encouragement from Michael, I decided to go through with it. I managed to complete the course in a week, and I learned so much. From fraud indicators and finding people on social media, to metadata and email headers. The reading assignments were not too difficult to understand, and the video lessons were interesting and fun. I would certainly recommend this course to anyone who wants a quick intro into the field, or simply want to learn more about searching on the internet and the deep web. The staff is quick to reply to inquiries, and you'll have access forever, so why not!

SM
11/07/2017
Steven McNeill
Texas

Professional Development

The overall course material was presented in a way that made it clear and concise, even for a person having limited experience with cyber security. Methods for forensic and criminal investigations embarked on cutting edge practices, relevant to the ever-changing modern era of technology. User-friendly online courses are the current trend in continuing education and collegiate studies. Without question, the caliber of this program pleasantly exceeded my expectations.

EG
09/23/2017
Eric G. Frank
USA

Excellent Course

I enjoyed taking this course for a number of reasons; getting started was very simple, the curriculum was very easy to digest and expanded on a few throngs that I thought I knew well but didn't. The videos are segmented so it helps retain the info and allows you to reference things later on much easier. The staff at McAfee are very friendly and extremely helpful to your learning experience. I will be taking many more classes with them.

IO
07/26/2017
Ismail Orhan
Ankara, Turkey

Good!

A very Good and thorough course. If I had to do it over again, I would.

CC
07/25/2017
Cheyne C.
Canada

CCII

Overall the experience was great l! A lot of useful information that I can apply even in the world of Courier and Small Package logistics! I would recommend to anyone looking to stay relevant in this cyber world we now work and live in! Thank you team McAfee! Now onwards to earning my CORCI designation!