Certified Cyber Intelligence Professional (CCIP)

Over the last 15 years, the world has experienced a need for competent professionals who can effectively manage complex cyber issues that threaten the assets, information, and people of our organizations, police departments, government agencies and alike.

To meet this need, the McAfee Institute administers the Certified Cyber Intelligence Investigator (CCIP). This remarkable group of professionals has demonstrated their competency in the areas of cyber intelligence, investigations, prosecution, management, leadership and industry best practice’s through an intensive qualification and testing program.

As a result, each of them is awarded the coveted designation of CCIP and is recognized as leaders in their respective professions.

The CCIP is the leading industry certification for law enforcement, loss prevention, private investigators, and fraud professionals. The skills that you will learn by studying for the CCIP will help you conduct and manage cyber investigations and critical intelligence gathering missions quicker than ever before, with more accuracy.

You will learn how to identify your person of interest, conduct timely cyber investigations, and methodologies to prosecute cyber criminals regardless of their location. Most importantly you will learn how to design, implement and manage a cyber program and team within your organization, agency or department as well.

You will learn topics such cyber investigations, mobile & digital forensics, e-commerce fraud, auction fraud, hacking, intelligence gathering, social media investigative methodologies, legal fundamentals and more!

Even better yet!

This certification program and all the resources is entirely online and self-study! No matter when you want it, where you want it, or where you are located around the world, it will be available 24/7/365.

The CCIP was Developed in Conjunction with the Dept of Homeland Security's National Cyber-Security Workforce Framework.

  • The National Cybersecurity Workforce Framework supports the nation’s cybersecurity workforce development efforts.
  • The National Cybersecurity Workforce Framework provides a simple, standardized way to define cybersecurity work across multiple sectors
  • The National Cybersecurity Workforce Framework provides detailed descriptions of types of cybersecurity work, the knowledge, skills, and abilities required for each area, and descriptions of common specialties.
  • Students will graduate with the knowledge and skills that employers need
  • Colleges can create programs that are aligned to jobs,
  • Employees will have a better-defined career path and opportunities, and
  • Policy makers can set standards to promote workforce professionalization.

Now is the Time.. Join the Ranks of the Industry's most Elite Cyber Professionals!

I can't urge you enough to invest in yourself and your future while learning some amazing stuff along the way. Earning the industry's top certification is rigorous, challenging, and incredibly fun!

Trust me when I tell you that we are going to blow your mind and teach you things that you never thought possible! It starts with the impossible and ends with the remarkable!

    Who Should Attend?

    • Loss Prevention Professionals
    • Law Enforcement
    • Private Investigators
    • Human Resources Professionals
    • Intelligence Professionals
    • Fraud Investigators

     

    Course Benefits:

    • Access: 24/7/365 Online Unlimited Access
    • Credential Earned: Board Certification
    • Availability: Desktop, Mobile, Tablet
    • Online Exam: 1 Year License Included ($350 Value)
    • Prep Review Materials: Prep Review Quizzes ($500 Value)
    • Digital Manual: Included ($350 Value)
    • CPE Credits: 40 CPE Included (What are CPE Credits?)
    • Nationally Recognized Credential: NASBA, NICE & More
    • Live Mentors: Available 9-6PM CST via Chat

    Bonus Items for Enrolling Today:

    • Unlimited Access to our New Career Center ($1200 value): Search 1000's of Hot New Careers, Upgrade your Resume, Seek Advice and More.
    • Unlimited Coaching and Mentoring ($2400 value): Ask Advice, Questions, and More...
    • Exam Guarantee: Pass it or try again on us! (Value $450)
    • Keep Sake: Diploma, Padded Cover, Transcripts (Value $300)

    Eligibility Requirements:

    • Bachelor’s degree or higher plus three years of experience in investigations, IT, fraud, law enforcement, forensics, criminal justice, law, and loss prevention. OR
    • Associates degree plus four years of experience as stated above. OR
    • High school diploma or GED plus four years of experience as stated above.

    Also, a person convicted of a felony, any crime of moral turpitude or misdemeanor relating to honesty, theft, embezzlement, fraud or the like shall be ineligible to become a CCIP. Applicant must successfully pass the prescribed background check, which may include a criminal background check and examination process. Falsification or omission of information on the application form will be reason enough to disqualify an applicant from becoming or remaining a CCIP.

     

    Course Curriculum:

    Welcome to the Certified Cyber Intelligence Professional (C.C.I.P.)!
    • Welcome to the CCIP
    • Group Forum Discussion: Introduce Yourself!
    • Introduction (Reading Assignment)
    • Code of Ethics (Reading Assignment)
    • Resources
    The History and Background of Cyber Crimes
    • History and Background (Reading Assignment)
    • Module 2 Quiz: History and Background
    Cyber Intelligence (Overview)
    • Cyber Intelligence (Reading Assignment)
    • Module 3 Quiz: Cyber Intelligence (Overview)
    eCrime Investigation Methodologies
    • eCrime Methodologies (Reading Assignments)
    • eCrime Investigations - Introduction
    • Where is eCrime Most Prevalent
    • Fencing Vs. eFencing
    • eCommerce Challenges to Investigating Fraudsters
    • Prosecution Challenges
    • Prosecution Requirements
    • Science Meets eCrime
    • Ebay The World's Largest Auction Platform
    • Boosters Selling on Ebay
    • Ebay Fraudsters - Let's Find Them
    • Ebay Listing Overview
    • Advanced Search Overview
    • Search Results Overview
    • Auction Listing Details
    • Feedback Profile Overview
    • Auction Analysis for Fraud
    • Feedback Systems and How Fraudsters Use Them
    • Ebay Feedback Review - First 30 Days
    • Craigslist Overview
    • Craigslist Listings
    • Craigslist Investigations
    • Google Boolean Searches - Site Search
    • Group Forum Discussion: eBay Investigation
    • Group Forum Discussion: Craigslist Investigation
    • Module 4 Quiz: eCrime Investigations Quiz
    Advanced eCrime Investigation Methodologies
    • Introduction to Advanced eCommerce Fraud
    • The Demographics of Online Fraudsters
    • Trends and Patterns of Online Fraudsters
    • The Profile of an Online Fraudster
    • Types of Auction Fraud
    • Patterns in Fraudulent Behavior
    • Research Results and Types of Auction Fraud
    • Analyze Fraudulent Behavior
    • eBay Investigations
    • eBay Auction Search Kit
    • eBay and Terapeak
    • Hot Topic Research on Terapeak
    • eBay Investigative Tips
    • Craigslist Investigation
    • Craigslist Investigation Tips
    • Facebook Marketplace (Oodle) Introduction
    • Facebook Marketplace - Searching Individuals
    • Facebook Marketplace Investigative Tips
    • Google Advanced Operators
    • Google Site Search: eforcity
    • Google Site Search
    • Email Header Information
    • Meta Data
    • eCommerce Laboratory
    • Conclusion
    • Module 5 Quiz: Advanced eCrime Investigation Methodologies
    Classified Investigation Methodologies
    • Classified Investigations - Introduction
    • Where is eCrime Most Prevalent
    • Fencing Vs. eFencing
    • eCommerce Challenges to Investigating Fraudsters
    • Prosecution Challenges
    • Prosecution Requirements
    • Science Meets eCrime
    • Craigslist Overview
    • Craigslist Listings
    • Craigslist Investigations
    • Google Boolean Searches (Site Search)
    • Module 6 Quiz: Classified Investigations
    Introduction to Cyber Investigations
    • Types of Cyber Crime (Reading Assignment)
    • Intro to Cyber Investigations - Overview
    • How Cyber Criminals Attack
    • Conducting Cyber Investigations
    • Cyber Investigations 101
    • How to Investigate Email Headers
    • Conclusion & Recap
    • Module 7 Quiz: Introduction to Cyber Investigations
    Exploring the Deep Web
    • DarkWeb (Reading Assignment)
    • The Deep Web!
    • Getting Started with TOR (Step by Step)
    • Introducing the TOR Project
    • The Deep Web (Overview)
    • An Exploration 1
    • VPN Services
    • Steps to buy and set up a VPN service to remain anonymous
    • Hidden Wiki 2017
    • Black Market Links 2017
    • Deep Web Drug Markets 2017
    • Hitman and Escrow Dark Web Links 2017
    • Directories and Lists 2017
    • The Secrets Behind the TOR Browser
    • TOR Wiki (Resource)
    • What the @#$% is a Bitcoin anyway?
    • Module 8 Quiz: Deep Web
    Interpretation of Cyber Criminal Behaviors
    • Interpretation of Behaviors (Reading Assignment)
    • Module 9 Quiz: Interpretation of Behaviors
    Cyber Investigations 101
    • Cyber Investigations (Reading Assignment)
    • Module 10 Quiz: Cyber Investigations 101
    Understanding The Cyber Criminal
    • Understanding the Perpetrator (Reading Assignment)
    • Module 11 Quiz: Understanding the Perpetrator
    An Exploration into Email Headers and Digital Forensics
    • Cyber Forensics (Reading Assignment)
    • Investigating Email Crimes: The Who, What, When, and Where!
    • What do we do?
    • Email Header Information
    • Mobile Forensics Part 1
    • Mobile Forensics Part 2
    • Module 12 Quiz: Digital and Mobile Forensics
    Open Source Intelligence Methodologies
    • Open Source Intelligence (Reading Assignment)
    • Module 13 Quiz: Open Source Intelligence
    Privacy Concerns
    • Privacy (Reading Assignment)
    • Module 14 Quiz: Privacy
    Basic Social Media Investigations
    • Social Media Landscape (Reading Assignment)
    • Basic Social Media Intro
    • Facebook Search
    • Locating People on Facebook
    • Facebook Profile
    • Facebook Search Tool
    • Facebook Private Profile Information
    • Twitter
    • Twitter Search
    • Twitter Mobile App
    • YouTube
    • YouTube Search
    • Google+
    • Google+ Search
    • Ethical Considerations
    • Module 15 Quiz: Basic Social Media Investigations
    Advanced Social Media Investigations
    • Resources
    • An overview of Advanced Social Media Investigations
    • Defining Open Source Intelligence
    • A World of Sock Puppets
    • Domain Names
    • Username Workflow
    • Search Engines
    • Facebook
    • Twitter
    • Instagram
    • YouTube
    • Hootsuite and SproutSocial
    • Module 16 Quiz: Advanced Social Media Investigations
    Documenting Social Media Evidence
    • Social Media Evidence (Reading Assignment)
    • Module 17 Quiz: Documenting Social Media Evidence
    Chatting Up Your Person of Interest
    • Introduction to Video Chat Platforms
    • Skype Sign Up
    • Web Platform and Features
    • Skype App and Searching
    • Google Hangouts Intro
    • Google Plus
    • Hangouts Tutorial
    • Google Hangouts Mobile
    • Oovoo
    • Oovoo Chat Window
    • Facetime
    • Tango
    • Module 18 Quiz: Chatting Up Your Person of Interest
    How to Conduct Investigations on Dating Websites
    • Dating Site Introduction
    • Doing a Basic Search on Plenty of Fish
    • Plenty of Fish Advanced Search
    • Searching for a Username on Plenty of Fish
    • Searching the Forums in Plenty of Fish
    • Match.com Login and Overview
    • Match.com Search Functions
    • What about Google Site Search
    • Module 19 Quiz: Dating Sites
    Law Enforcement Efforts
    • Law Enforcement Efforts (Reading Assignment)
    • Module 20 Quiz: Law Enforcement Efforts
    Legal Fundamentals of Cyber Investigations
    • Legal Fundamentals (Reading Assignment)
    • Introduction to Legal Fundamentals
    • Understanding Your Role as a Corporate Investigator
    • Understanding Your Employees Rights
    • The Electronic Communications Privacy Act
    • Understanding Law Enforcement Concerns
    • An Agent of the Law
    • Federal Laws to Prosecute CyberCrimes
    • Becoming an Expert Witness
    • Dauberts Standards, What is it?
    • Common Task of an Expert Witness
    • Preparing to Become an Expert Witness
    • Your Role as a Consultant
    • How to Prepare Your Testimony for Court
    • Preparing Forensic and Computer Evidence
    • Summary
    • Module 21 Quiz: Legal Fundamentals of Cyber Investigations
    How to Utilize Informants
    • Introduction to Informants
    • Informants Pt. 2: Suitability
    • Informants Pt. 3: Trust and Confidentiality
    • Informants Pt. 4: Safe Handling of Informants
    • Informants Pt 5: Legal Liabilities
    • Module 22 Quiz: Informants
    • How to Preserve and Secure Digital Evidence
    • Digital Evidence (Reading Assignment)
    • Module 23 Quiz: Digital Evidence
    Setting Up An Investigators Computer
    • Setting Up An Investigators Computer (Reading Assignment)
    • Module 24 Quiz: Setting Up an Investigator's Computer
    Ethical Considerations for Cyber Investigators
    • Ethical Considerations (Reading Assignment)
    • Module 25 Quiz: Ethical Considerations
    Advanced Searching Methodologies to Locate Hidden Information
    • Advanced Searching (Reading Assignment)
    • Module 26 Quiz: Advanced Searching
    Understanding Deception
    • Understanding Deception (Reading Assignment)
    • Module 27 Quiz: Deception
    Program Design and Development
    • Program Design and Development (Reading Assignment)
    • Module 28 Quiz: Program Development
    CCIP Appendix
    • CCIP Appendix
    CCIP Final Exam
    • Preparing for the Exam
    • Exam Application
    Final Exam: CCIP 


    Industry Recognized



    What our Students have to Say

    Customer Reviews

    Based on 18 reviews
    5 Star
    72% 
    13
    4 Star
    22% 
    4
    3 Star
    6% 
    1
    2 Star
    0% 
    0
    1 Star
    0% 
    0
    Write a Review Ask a Question
    • Reviews (18)
    • Questions (0)

    Thank you for submitting a review!

    Your input is very much appreciated. Share it with your friends so they can enjoy it too!
    HZ
    08/19/2017
    Herro Z.
    Netherlands

    Overall good + some room for higher score

    Overall good course! Good material and videos appart from some double content. Some room for improvement to bring it to 5 star level: 1) add other industries next to the retail examples, (e.g. finance and government) and 2) add more cyber threat intelligence. Currently the "intelligence" has more the character of "investigation".

    JS
    08/03/2017
    Jean S.

    CCIP Course

    Great course but not up to date 2017 as Social Media has grown bigger and some websites link / companies are not up to date. Also, teaching us on how to open a social media account is irrelevant,

    AR
    06/09/2017
    Andrew R.

    Great course

    This has been an outstanding course. I've learned a great deal and highly recommend it

    JC
    03/21/2017
    Jen C.
    United States

    Excellent Course

    I learned so much and enjoyed everything

    VA
    12/30/2016
    Vladimir A.
    United States

    Excellent

    Excellent course. Great mix of self-paced activities.