Certified Cyber Intelligence Investigator (CCII)

Over the last 15 years, the world has experienced a need for competent professionals who can effectively manage complex cyber issues that threaten the assets and people of corporations, public and private institutions and government.

To meet this need the McAfee Institute administers the Certified Cyber Intelligence Investigator (CCII). This remarkable group of professionals has demonstrated their competency in the areas of cyber intelligence, investigations, leadership and industry best practices through an intensive qualification and testing program. As a result, each of them is awarded the coveted designation of CCII and is recognized as leaders in their profession.

The CCII is the leading industry certification for law enforcement, loss prevention, private investigators, and fraud professionals.The skills that you will learn by studying for the CCII will help you conduct cyber investigations and critical intelligence gathering missions quicker than ever before, with more accuracy. You will learn how to identify your person of interest, conduct timely cyber investigations, and methodologies to prosecute cyber criminals regardless of their location.

You will learn topics such cyber investigations, mobile & digital forensics, e-commerce fraud, auction fraud, hacking, intelligence gathering, social media investigation methodologies, legal fundamentals and more!

Even better yet! This certification program and all the resources are completely online and self-study! No matter when you want it, where you want it, or where you are located around the world, it will be available 24/7/365.

The CCII Supports the National Cyber-Security Workforce Framework (Homeland Security)

  • The National Cybersecurity Workforce Framework supports the nation’s cybersecurity workforce development efforts.
  • The National Cybersecurity Workforce Framework provides a simple, standardized way to define cybersecurity work across multiple sectors
  • The National Cybersecurity Workforce Framework provides detailed descriptions of types of cybersecurity work, the knowledge, skills, and abilities required for each area, and descriptions of common specialties.
  • Students will graduate with the knowledge and skills that employers need
  • Colleges can create programs that are aligned to jobs,
  • Employees will have a better-defined career path and opportunities, and
  • Policy makers can set standards to promote workforce professionalization.

Now is the Time.. Join the Ranks of the Industries most Elite Cyber Investigators!

I can't urge you enough to invest in yourself and your future while learning some really neat stuff along the way. Earning the industry's top certification is rigorous, challenging, and extremely fun!

Trust me when I tell you that we are going to blow your mind and teach you things that you never thought possible! It starts with the impossible and ends with the remarkable!

Course Benefits:

  • Access: 24/7/365 Online Unlimited Access
  • Credential Earned: Board Certification
  • Availability: Desktop, Mobile, Tablet
  • Online Exam: 1 Year License Included ($350 Value)
  • Prep Review Materials: Prep Review Quizzes ($450 Value)
  • Digital Manual: Included ($299 Value)
  • CPE Credits: Included
  • Nationally Recognized Credential: NASBA, NICE & More
  • Live Mentors: Available 9-6PM CST via Chat

Bonus Items for Enrolling:

  • Exam Guarantee: Pass it or try again on us! (Value $350)
  • Keep Sake: Diploma, Padded Cover, Transcripts (Value $300)
  • Unlimited Access to our New Career Center (Value $1200): Search 1000's of Hot New Careers, Upgrade your Resume, Seek Advice and More!
  • Unlimited Coaching and Mentoring (Value $2400): Ask Advice, Questions, and More!

Eligibility requirements:

  • Bachelor’s degree or higher plus one year of experience in e-commerce, fraud, investigations, IT, law enforcement, forensics, criminal justice, law, and/or loss prevention or other similar field or
  • Associates degree plus two years of experience or
  • High school diploma or GED plus three years of experienc

Course Curriculum:

Welcome to the Certified Cyber Intelligence Investigator (C.C.I.I.)!
  • Welcome to the C.C.I.I.
  • Group Forum Discussion: Introduce Yourself!
  • Introduction (Reading Assignment)
  • Code of Ethics (Reading Assignment)
  • Resources
History and Background
  • History and Background (Reading Assignment)
  • Module 2 Quiz: History and Background
Cyber Intelligence (Overview)
  • Cyber Intelligence (Reading Assignment)
  • Module 3 Quiz: Cyber Intelligence
eCrime Investigation Methodologies
  • eCrime Methodologies (Reading Assignment
  • eCrime Investigations - Introduction
  • Where is eCrime Most Prevalent
  • Fencing Vs. eFencing
  • eCommerce Challenges to Investigating Fraudsters
  • Prosecution Challenges
  • Prosecution Requirements
  • Science Meets eCrime
  • Ebay The World's Largest Auction Platform
  • Boosters Selling on Ebay
  • Ebay Fraudsters - Let's Find Them
  • Search Results Overview
  • Ebay Listing Overview
  • Advanced eBay Search Overview
  • Auction Listing Details
  • Feedback Profile Overview
  • Auction Analysis for Fraud
  • Feedback Systems and How Fraudsters Use Them
  • Ebay Feedback Review - First 30 Days
  • Craigslist Overview
  • Craigslist Listings
  • Craigslist Investigations
  • Google Boolean Searches - Site Search
  • eCrime Tip Sheet
  • Quick Reference Guide
  • Group Forum Discussion: eBay Investigation
  • Group Forum Discussion: Craigslist Investigation
  • Module 4 Quiz: eCrime Investigations Quiz
Advanced eCrime Investigation Methodologies
  • Introduction to Advanced eCommerce Fraud
  • The Demographics of Online Fraudsters
  • Trends and Patterns of Online Fraudsters
  • The Profile of an Online Fraudster
  • Types of Auction Fraud
  • Patterns in Fraudulent Behavior
  • Research Results and Types of Auction Fraud
  • Analyze Fraudulent Behavior
  • eBay Investigations
  • eBay Auction Search Kit
  • eBay and Terapeak
  • Hot Topic Research on Terapeak
  • eBay Investigative Tips
  • Craigslist Investigation
  • Craigslist Investigation Tips
  • Facebook Marketplace (Oodle) Introduction
  • Facebook Marketplace - Searching Individuals
  • Facebook Marketplace Investigative Tips
  • Google Advanced Operators
  • Google Site Search: eforcity
  • Google Site Search
  • Email Header Information
  • Meta Data
  • eCommerce Laboratory
  • Conclusion
  • Module 5 Quiz: Advanced eCrime Investigation Methodologies
Introduction to Cyber Investigations
  • Types of Cyber Crime (Reading Assignment)
  • Intro to Cyber Investigations - Overview
  • Definitive Guide to Cyber Forensics
  • How Cyber Criminals Attack
  • Sample Preservation Letter
  • Conducting Cyber Investigations
  • Cyber Investigations 101
  • How to Investigate Email Headers
  • Conclusion & Recap
  • Module 6 Quiz: Introduction to Cyber Investigations
Interpretation of Behaviors
  • Interpretation of Behaviors (Reading Assignment)
  • Module 7 Quiz: Interpretation of Behaviors
Cyber Investigations 101
  • Cyber Investigations (Reading Assignment)
  • Module 8 Quiz: Cyber Investigations 101
Understanding the Perpetrator
  • Understanding the Perpetrator (Reading Assignment)
  • Module 9 Quiz: Understanding the Perpetrator
Email Headers and Digital Forensics
  • Cyber Forensics (Reading Assignment)
  • Investigating Email Crimes: The Who, What, When, and Where! (07:11)
  • What do we do?
  • Email Header Information
  • Email Header Extractions
  • Email Header Terms
  • Mobile Forensics Part 1
  • Mobile Forensics Part 2
  • Module 10 Quiz: Digital and Mobile Forensics
Open Source Intelligence
  • Open Source Intelligence (Reading Assignment)
  • Module 11 Quiz: Open Source Intelligence
  • Privacy (Reading Assignment)
  • Module 12 Quiz: Privacy
Basic Social Media Investigations
  • Social Media Landscape (Reading Assignment)
  • Basic Social Media Intro
  • Facebook Search
  • Locating People on Facebook
  • Facebook Profile
  • Facebook Search Tool
  • Facebook Private Profile Information
  • Twitter
  • Twitter Search
  • Twitter Mobile App
  • YouTube
  • YouTube Search
  • Google+
  • Google+ Search
  • Ethical Considerations
  • Module 13 Quiz: Basic Social Media Investigations
Advanced Social Media Investigations
  • Resources
  • An Overview of Advanced Social Media Investigations
  • Defining Open Source Intelligence
  • A World of Sock Puppets
  • Domain Names
  • Username Workflow
  • Search Engines
  • Facebook
  • Twitter
  • Instagram
  • YouTube
  • HootSuite and SproutSocial
  • Module 14 Quiz: Advanced Social Media Investigations
Exploring the Deep Web
  • DarkWeb (Reading Assignment)
  • The Deep Web!
  • Getting Started with TOR (Step by Step)
  • Introducing the TOR Project
  • The Deep Web (Overview)
  • An Exploration 1
  • VPN Services
  • Steps to buy and set up a VPN service to remain anonymous
  • Hidden Wiki 2017
  • Black Market Links 2017
  • Deep Web Drug Markets 2017
  • Hitman and Escrow Dark Web Links 2017
  • Directories and Lists 2017
  • The Secrets Behind the TOR Browser
  • TOR Wiki (Resource)
  • What the @#$% is a Bitcoin anyway?
  • Module 15 Quiz: Deep Web
Documenting Social Media Evidence
  • Documenting Social Media Evidence (Reading Assignment)\
  • Module 16 Quiz: Documenting Social Media Evidence
Law Enforcement Efforts
  • Law Enforcement Efforts (Reading Assignment)
  • Module 17 Quiz: Law Enforcement Efforts
Legal Fundamentals of Cyber Investigations
  • Legal Fundamentals (Reading Assignment)
  • Introduction to Legal Fundamentals
  • Understanding Your Role as a Corporate Investigator
  • Understanding Your Employees Rights
  • The Electronic Communications Privacy Act
  • Understanding Law Enforcement Concerns
  • An Agent of the Law
  • Federal Laws to Prosecute CyberCrimes
  • Becoming an Expert Witness
  • Dauberts Standards, What is it?
  • Common Task of an Expert Witness
  • Preparing to Become an Expert Witness
  • Your Role as a Consultant
  • How to Prepare Your Testimony for Court
  • Preparing Forensic and Computer Evidence
  • Legal Fundamentals of Cyber Investigations Summary
  • Module 18 Quiz: Legal Fundamentals of Cyber Investigations
Digital Evidence
  • Social Media Evidence (Reading Assignment)
  • Module 19 Quiz: Digital Evidence
Setting up an Investigators Computer
  • Setting up an Investigators Computer (Reading Assignment)
  • Module 20 Quiz: Setting up the Investigators Computer
Ethical Considerations
  • Ethical Considerations (Reading Assignment)
  • Module 21 Quiz: Ethical Considerations
Advanced Searching
  • Advanced Searching (Reading Assignment)
  • Module 22 Quiz: Advanced Searching
Understanding Deception
  • Understanding Deception (Reading Assignment)
  • Module 23 Quiz: Understanding Deception
CCII Appendix
  • CCII Appendix
CCII Final Exam
  • Preparing for the Exam
  • Exam Application
  • Final Exam: CCII

You May Also Like:

Industry Recognized

What our Students have to Say

Customer Reviews

Based on 20 reviews
5 Star
4 Star
3 Star
2 Star
1 Star
Write a Review Ask a Question
  • Reviews (20)
  • Questions (0)

Thank you for submitting a review!

Your input is very much appreciated. Share it with your friends so they can enjoy it too!
Eric G. Frank

Excellent Course

I enjoyed taking this course for a number of reasons; getting started was very simple, the curriculum was very easy to digest and expanded on a few throngs that I thought I knew well but didn't. The videos are segmented so it helps retain the info and allows you to reference things later on much easier. The staff at McAfee are very friendly and extremely helpful to your learning experience. I will be taking many more classes with them.

Ismail Orhan
Ankara, Turkey


A very Good and thorough course. If I had to do it over again, I would.

Cheyne C.


Overall the experience was great l! A lot of useful information that I can apply even in the world of Courier and Small Package logistics! I would recommend to anyone looking to stay relevant in this cyber world we now work and live in! Thank you team McAfee! Now onwards to earning my CORCI designation!

Mohamed Salih

Great course

Great experience. I would highly recommend it.

Greg G.
United States

Cyber Investigator Expert

I Have been in Law Enforcement for 31 years. Am I familiar with some of the information; yes but there was a lot of great information that I was not aware of. I would highly recommend these courses! Greg L. Goodman