Your Cart is Empty

Only 2 Seat/s Left, Enroll Now..
Over $7891 in extra bonuses if you enroll today!

Have questions? Chat with us now.

Why you should learn with us


The Cyber-Threat Forensic Investigator (CTFI): provides students the essential domain knowledge required to serve in decision-making roles throughout the cyber-security industry. Students will learn how to analyze cyber-security risks, develop appropriate protection & response options, and assess operational requirements for government, military, critical infrastructure, retail and commercial missions. Upon completing the board certification, students will possess advanced knowledge of the strategy, policy, investigation, intelligence, prosecution and analytic aspects of cyber-security, enabling them to fill critical roles in operational cyber-security investigative missions supporting both retail and governmental entities.

“The CTFI is a subject matter expert on cyber threats, investigations, forensic examination & prosecution”

The McAfee Institute has found that cyber-security work involves more than traditional IT skills. Cyber security work also includes the identification, investigation, prosecution, root cause analysis, trends and intelligence / counterintelligence methodologies to understand how perpetrators think, act and carry out their attacks. By becoming a CTFI you will possess a wide array of technical IT skills as well as advanced investigative, intelligence, counterintelligence, prosecution and analytical capabilities.

There are thousands of cyber-security jobs across the country, so opportunity abounds! The field will grow 22% by 2020 and according to the NICCS Cybersecurity Professionals Salaries can range between $70,000 -$118,000 and up!

Students will be able to:

  • Discuss in depth the origins, nature, and current issues in cyber-security and its related activities using precise terminology
  • Apply a range of cyber intelligence and investigative concepts to mitigate risks in cyber-security operations and prosecute instances of attacks
  • Develop and apply decision frameworks using the guidelines of cyber-security, investigations ethics, law, and strategy
  • Design strategies for development of an effective cyber-security, intelligence, and investigation workforce
  • Analyze technical and operational requirements for future cyber-security & investigation systems
  • Compare and contrast international cyber-security and investigation policies, strategies, and capabilities
  • Identify the missions, authorities, and responsibilities of key cyber-security organizations within the international community
  • Apply the theory of cyber deterrence in developing future cyber-security strategies and policies
  • Analyze and apply lessons from prominent international cyber-security case studies, investigations and prosecutions

The CTFI Supports the National Cyber-Security Workforce Framework (Homeland Security)

The goal of the McAfee Institute CTFI Board Certification is to prepare students for a successful career upon graduation. A resource that helps our students prepare for these types of careers is our partnership with the National Cyber-Security Workforce Framework led by Homeland Security.

Our CTFI program adheres to these guidelines and learning to ensure you receive the industries best training available. It plays an important role for future cyber-security professionals by providing information on hands-on learning, internship opportunities, and outlining key cyber-security knowledge and skills.

Course Benefits:

  • Official CTFI e-Courseware: ($1797 Value)
  • Official CTFI Online Exam License: ($997 Value)
  • Official CTFI Prep Review Quizzes: ($450 Value)
  • Official CTFI Digital Study Guide: ($350 Value)
  • Credential Earned: Board Certification
  • Availability: Desktop, Mobile, Tablet
  • Nationally Recognized Credential: NASBA, NICE & More
  • Live Mentors: Available 9-6PM CST via Chat

Bonus Items for Enrolling Today:

  • Exam Guarantee: Pass it or try again on us! Conditions Apply (Value $997)
  • KeepSake: Diploma, Padded Cover, Transcripts (Value $300)
  • Unlimited Access to our New Career Center: (Value$1200) 
  • Unlimited Coaching and Mentoring: (Value $2400)

Maintaining the Credential:

You have to renew the board certification every two years, once you are certified. The cost is $125 for an additional two years. CPE requirements are listed here.

Eligibility requirements:

  • Bachelor's degree and 3 years of experience in investigations, computers, loss prevention, fraud, law enforcement, I.T Security or
  • Associates degree and 5 years of experience or
  • High School Diploma and 7 years of experience.

In addition, a person convicted of a felony, any crime of moral turpitude or misdemeanor relating to honesty, theft, embezzlement, fraud or the like shall be ineligible to become a CTFI®. Applicant must provide a copy of certified transcript of education ONLY if using college degree rather than experience to qualify.

Applicant must successfully pass the prescribed background check, which may include a criminal background check and examination process.

Falsification or omission of information on the application form will be reason enough to disqualify an applicant from becoming or remaining a CTFI.

Course Curriculum:

Welcome to the CTFI Board Certification Program!

  • Introduction to the CTFI
  • Group Forum Discussion: Introduce Yourself!
  • Code of Ethics (Reading Assignment)
  • Course Resources

Introduction to Cybersecurity

  • Intro to Cyber Investigations
  • How Cyber Criminals Attack
  • Conducting Cyber Investigations
  • Cyber Investigations 101
  • How to Investigate Email Headers
  • Conclusion / Recap
  • Introduction to Cyber Security Quiz

Introduction to Cyber Warfare

  • Introduction to Cyber Warfare
  • Cyber Warfare (Reading Assignment)
  • Cyber Warfare Quiz

Global Cyber Capabilities and Trends

  • Global Cyber Capabilities and Trends
  • Discussion Assignment: Global Cyber Capabilities and Trends

Global Cyber Threats, Attacks, Vehicles, and Mechanisms (Hacking 101)

  • Cyber Threats - Attacks - Vehicles
  • Reading assignment
  • Global Threats - Prep Review Quiz

Cyber Threat Modeling

  • Threat Modeling Overview
  • Definitions and Motivations
  • Organizational Pre-requisites
  • Scoping the Effort and Kicking Off the Process
  • Identifying External Dependencies and Specifying Use Cases
  • Threat Generation, Threat Analysis, and Threat Response
  • Reporting
  • Microsoft's Threat Modeling: Reading Assignment
  • Additional Resources: External Links
  • Cyber Threat Modeling Prep Review Quiz

IT. Security Systems

  • Introduction to I.T Security
  • Information Security Awareness
  • Top Hackers Show us How it's done!
  • 7 Things Every CEO Should Know About Information Security
  • Discussion

Intrusions & Attacks: Cyber Attacks on Retailers

  • Attacks on Retailers: Target Breach
  • Inside a Target Breach
  • Point of Sale System Breaches
  • Discussion-Cyber Attacks on Retailers

Intrusions & Attacks: Personal Information Breaches

  • Intrusion Attacks on Personal Information (Reading Assignment)
  • Top 9 Web Hacking Techniques
  • 5 Most Dangerous New Hacking Techniques
  • Drinkman Indictment
  • Discussion-Drinkman

Intrusions & Attacks: Cyber Attacks on Government

  • Cyber Attacks on Government (Reading Assignment)
  • Cyber Attacks on Government Prep Review Quiz

Intrusions & Attacks: Cyber Attacks on Law Enforcement

  • Discussion

Intrusions & Attacks: Memory Scraping - Parsing Malware

  • Memory & Malware (Reading Assignment)
  • Debugging Software Memory (Reading Assignment)
  • Discussion

Credit Card Fraud: Payment Processing (e-commerce fraud)

  • eCommerce Fraud & Credit Card Processing
  • Case Study: Home Depot Breach
  • Case Study 2: Update Home Depot Breach
  • Financial Investigations Cheat Sheet
  • eCommerce Fraud: Prep Review Quiz

Investigative Methods: Digital & Computer Forensics

  • Definitive Guide to Digital Forensics
  • Investigating Email Crimes
  • Examining Email Messages
  • Viewing Email Headers
  • Mobile Forensics
  • Forensic Examination of Mobile Devices
  • Digital Forensics: Prep Review Quiz

Investigative Methods: Exploring TOR and the Deep Web

  • The Deep Web!
  • Getting Started with TOR
  • Introducing the TOR Project
  • The Secrets Behind the TOR Browser
  • The Deep Web (Fun Overview)
  • Exploration 1
  • Deep Web: Prep Review Quiz

Investigative Methods: Using Open Source Intelligence

  • Open Source Intelligence (Reading Assignment)
  • Exploring Open Source Intelligence
  • Prep Review Quiz: OSINT

Investigative Methods: Background Investigations

  • Discussion-Background Investigations

Cyber Intelligence & Counterintelligence Operations

  • Counter-Intelligence Methodologies
  • Cyber Terrorism in the News
  • Cyber Counter-Terrorism
  • Cyber Threat Concerns
  • Discussion

Intelligence Methodologies: How to gather intelligence

  • Intelligence Methodologies (Reading Assignment)
  • How to Gather Intelligence - Introduction
  • How to Gather Intelligence - Basic Concepts
  • How To Gather Intelligence - Intel as a Continuous Cycle
  • How to Gather Intelligence - Intel Disciplines
  • How to Gather Intelligence - Threat Intel Landscape
  • How to Gather Intelligence - The Threat Intelligence Journey
  • How to Gather Intelligence - Special Considerations
  • Prep Review Quiz: Intelligence Methodologies

Intelligence Methodologies: Where cyber criminals sell their data & information

  • Gathering Intelligence on Carding Forums
  • Discussion

Intelligence Methodologies: How to Gather Intelligence on Social Media Websites

  • An Overview of Social Media Investigations
  • Social Media Demographics
  • Criminals on Facebook
  • How to be Successful in Social Media Investigations
  • How to Locate Accomplices & Co-conspirators (Belief Propagation)
  • Live Tutorial: Profile Information
  • Facebook Intelligence: The Friends List
  • Facebook Intelligence: The Conversation Wall
  • Facebook Information Tab
  • Live Tutorial: Facebook Wall
  • Facebook Timeline
  • How to Gather Intelligence in Facebook Groups
  • How Fraudsters Create Phishing Schemes
  • How to Avoid the Pitfalls of Private Profiles
  • Subpoenas & Search Warrants
  • How to Locate People on MySpace
  • MySpace Intelligence: Gather Information on the Profile Wall
  • MySpace Intelligence: Details in the Friends List
  • How to Find People on Bebo
  • How to Gather Intelligence from the Bebo Profile
  • Bebo: An Overview Into the Friends List
  • Bebo: A Look Into the Details in Groups
  • LinkedIn: Gathering Intelligence from the Profile
  • Using the Power of Google on LinkedIn
  • How to Use Google's Site Search Effectively for Cyber Investigations
  • How to Utilize Google's Double Quotes
  • What are the Ethical Considerations When doing Social Media Investigations
  • Tools and Resources Available for Social Media Investigations
  • In Conclusion
  • Final Quiz - Basic Social Media Investigations

Intelligence Methodologies: How to Gather Intelligence on eCommerce & Auction Websites

  • eCommerce Fraud Investigations (Reading Assignment)
  • eCrime Investigations - Introduction
  • Where is eCrime Most Prevalent
  • Fencing Vs. eFencing
  • eCommerce Challenges to Investigating Fraudsters
  • Prosecution Challenges
  • Prosecution Requirements
  • Science Meets eCrime
  • eBay The World's Largest Auction Platform
  • Boosters Selling on eBay
  • eBay Fraudsters - Let's Find Them
  • eBay Listing Overview
  • Advanced Search Overview
  • Search Results Overview
  • Auction Listing Details
  • Feedback Systems and How Fraudsters Use Them
  • Ebay Feedback Review - First 30 Days
  • Craigslist Overview
  • Craigslist Listings
  • Craigslist Investigations
  • Google Boolean Searches - Site Search
  • Discussion-eBay Investigation
  • Discussion-Craigslist Investigation:
  • Quiz: eCrime Investigations Quiz

Intelligence Methodologies: How to Gather Intelligence on Chat Websites and Applications

  • Introduction to Gathering Intelligence on Mobile Apps
  • Skype Sign Up
  • Web Platform and Features
  • Skype App and Searching
  • Google Hangouts Intro
  • Google Plus
  • Hangouts Tutorial
  • Google Hangouts Mobile
  • Oovoo
  • Oovoo Chat Window
  • Gathering Intel on Facetime
  • Gathering Intel on Tango
  • Quiz: Chatting Up Your Person of Interest

Counterintelligence Methodologies: 200+ of the Best Open Source Intelligence Resources

  • The Ultimate Guide to OSINT (Reading Assignment)

Preparation & Response: Data Breach Preparedness

  • How to Prepare for Data Breaches
  • Data Breach Preparedness (Reading Assignment)
  • Prep Review Quiz

Preparation & Response: Preparedness Plan Audit

  • Preparedness Plan Audit Overview
  • Preparedness Plan Audit (Reading Assignment)
  • Discussion-Audit
  • Preparation & Response: Data Breach Incident responses
  • Incident Response (Reading Assignment)
  • Prep Review Quiz

Preparation & Response: Notification and Disclosure

  • Data Breach Notifications and Disclosure
  • Data Breach Notification and Protection Act
  • Data Breach Charts
  • Discussion

Legal Considerations

  • Introduction to Legal Fundamentals
  • Understanding Your Role as an Investigator
  • Understanding Your Employees Rights
  • The Electronic Communications Privacy Act
  • Understanding Law Enforcement Concerns
  • An Agent of the Law
  • Federal Laws to Prosecute CyberCrimes
  • Legal Considerations Quiz

Search and Seizure

  • Search and Seizure Intro
  • Search and Siezure (Reading Assignment)

Expert Witness Testimony

  • Becoming an Expert Witness
  • Dauberts Standards, What is it?
  • Common Task of an Expert Witness
  • Preparing to Become an Expert Witness
  • Your Role as a Consultant
  • How to Prepare Your Testimony for Court
  • Preparing Forensic and Computer Evidence
  • Summary

Final Exam

  • Final Exam Preparation
  • Exam Application
  • Final Exam: CTFI

What our Students have to Say

Customer Reviews

Based on 8 reviews
5 Star
4 Star
3 Star
2 Star
1 Star
Write a Review Ask a Question
  • Reviews (8)
  • Questions (0)

Thank you for submitting a review!

Your input is very much appreciated. Share it with your friends so they can enjoy it too!
Carmen T.
United States

A great plan

I enjoy the self paced steps and fascinating details into the cyber world. I believe it will enhance my ability to be an asset where've I go. A very well thought out class with experienced instructors


Excellent Course!

The course is well-structured and self-paced. The concepts on cyber-attacks/exploitation, threat modeling, forensic and investigative approach (OSINT/SOCINT) are informative and explained well. Overall, a good course for learn more about cyber threats approach and forensic work.

Lanny M.
United States

CTFI Course Feedback

Outstanding course, covers all the basics necessary to have a comprehensive "big picture" perspective on cyberthreats, yet allows motivated students to dive deeper into each topic via reading, resources, and a chat room where professionals can discuss materials and issues. Very professionally done, intuitive online class format, and great technical support. Will be taking other McAfee training courses in the future.

Adonis Sawan

Commment about this course

The course was nice, it is a collection of many important topics

Derick Mostert

Certified Cyber Threat Forensic Investigator (CTFI) online course

I have completed the Certified Cyber Threat Forensic Investigator (CTFI) course in 2015. I have experienced it as a good generic overview of types of cyber-crimes and how to combat them.