Certified Expert in Cyber Investigations (CECI)
Official Training Program, Official Digital Study Manual, Official Prep Review Quizzes, Online Proctor License, 1-Year Exam License, Digital Certification & Credential
Board Certification
29,087
100
15
English
Online Self-Study
100 hours
Money Back Guarantee
Money Back Guarantee
We offer a NO-Questions-asked 3 day money-back guarantee from the date you enroll in your program if you are not satisfied with your program for any reason under the below conditions.
To be eligible for a refund under our money-back guarantee you MUST NOT have viewed more than 5% of your program and not have downloaded any of the course content.
Affordable Payment Plans
Affordable Payment Plans
If you are a U.S. or Canadian citizen, we are excited to offer flexible payment plan options through Affirm and Sezzle at checkout.
With Affirm, you can enjoy the convenience of spreading your payments over up to 36 months, subject to approval.
For those who prefer a shorter plan, Sezzle offers an interest-free option, allowing you to make 4 biweekly payments.
Choose the plan that best suits your financial needs and start your journey with us today.
Military CA Request
Military CA Request
McAfee Institute is approved for please follow this link.
Credentialing Assistance (CA) The McAfee Institute has partnered with Credentialing Assistance (CA) to provide funding for training and exams leading to an industry-recognized academic or vocational credential.
Elevate Your Expertise in Cyber Investigations: A Pathway to Professional Mastery
Esteemed Colleagues in Law Enforcement and Intelligence,
We cordially invite you to ascend to the forefront of cybercrime investigation by enrolling in the Certified Experts in Cyber Investigations (CECI) program. This advanced training initiative is meticulously crafted to develop your skills to an elite level, enabling you to navigate and resolve complex cybercrimes with exceptional proficiency.
Elevate to Elite Status: Harness Your Innate Potential
As a CECI graduate, you become a vital contributor to the industry. This program endows you with the latest investigative techniques, positioning you among a distinguished class of professionals adept at identifying, dissecting, and neutralizing sophisticated cyber threats.
Program Highlights: A Fusion of Excellence and Practicality
- Tailored Learning Experience: Engage in a dynamic mix of self-paced learning, live sessions with experts, and hands-on investigative challenges.
- Cutting-Edge Insights: Benefit from over 25 years of accumulated knowledge from global cyber investigations, encompassing various industries.
- Expert-Led Instruction: Gain insights from seasoned professionals who share their expertise, strategies, and experiences.
- Comprehensive Resources: Access a wealth of materials including detailed video tutorials, preparatory quizzes, and extensive study guides.
Versatile Relevance: Empowering Diverse Professional Backgrounds
The CECI program is designed for professionals across multiple sectors including Law Enforcement, Fraud Detection, Intelligence, Cyber Security, IT, and Private Investigation, providing a robust foundation for career advancement.
Holistic Learning Journey: Unparalleled and Comprehensive
The CECI program integrates six specialized certifications into a singular educational trajectory:
- Certified Cyber Intelligence Professional (CCIP)
- Certified Counterintelligence Threat Analyst (CCTA)
- Certified Organized Retail Crime Investigator (CORCI)
- Certified Social Media Intelligence Analyst (SMIA)
- Certified eCommerce Fraud Investigator (CEFI)
- Certified Forensic Hi-tech Investigator (CFHI)
Conclude your learning with a comprehensive board examination that encapsulates your entire educational journey, elevating your professional stature.
Educational Outcomes: Skill Enhancement and Mastery
- Unearth Advanced Investigative Techniques: Acquire specialized skills for conducting flawless cyber investigations.
- Sharpen Intelligence Identification Skills: Enhance your ability to discern critical intelligence, elevating your investigative techniques.
- Establish Cyber Intelligence Authority: Master the development, execution, and management of intelligence initiatives within your organization.
Transition to the Apex of Cybercrime Investigation
Upon completing the CECI program, you will receive more than a certification. You will earn a symbol of expertise, dedication, and unmatched skill in cybercrime investigation.
Embark on the Journey to Cyber Investigation Excellence
Join the CECI Program NOW and secure your place among the industry's elite.
Special Offer: Register today to gain complimentary access to an exclusive CECI expert community, continuous curriculum updates, and unparalleled career support.
Seize this Transformative Opportunity: Embrace this pivotal moment in your career. With CECI, you are not just earning a certification; you are paving the way for a future filled with potential and opportunities.
Begin Your Journey of Excellence Today!
CURRICULUM
-
Welcome to CECIIntroduction to the Certifed Expert in Cyber Investigations (CECI).
-
Understanding the ManualAn overview of the training manual and its structure.
-
Cyber Intelligence (Overview)Introduction to the field of cyber intelligence and its importance in investigations.
-
Intro to Cyber InvestigationsOverview of the fundamentals of cyber investigations, including tools and techniques used.
-
Social Media InvestigationsTechniques for conducting investigations on social media platforms and gathering evidence.
-
Advanced Social Media InvestigationsAdvanced methods and strategies for conducting in-depth social media investigations.
-
Auction Fraud InvestigationsInvestigation techniques specific to fraud cases related to online auctions.
-
Advanced Auction Fraud Investigation MethodologiesAdvanced strategies and methodologies for investigating complex auction fraud cases.
-
Exploring the Deep WebIntroduction to the deep web and its relevance to cyber investigations.
-
Advanced SearchingAdvanced search techniques and strategies for gathering information online.
-
Identification of Deception in Social MediaTechniques for identifying deceptive practices and false information on social media platforms.
-
Open Source IntelligenceGathering intelligence from publicly available sources on the internet.
-
Understanding the PerpetratorUnderstanding the motivations and characteristics of cybercrime perpetrators.
-
Chatting ApplicationsInvestigating conversations and activities on messaging and chatting applications.
-
On-Line Dating ApplicationsInvestigating online dating platforms and related cybercrimes.
-
How to Utilize InformantsStrategies for gathering information and cooperation from informants in cyber investigations.
-
Program Design and DevelopmentPrinciples and techniques for designing and developing cyber investigation programs.
-
Legal Fundamentals of Cyber InvestigationsUnderstanding the legal aspects and considerations in cyber investigations.
-
Introduction to ORC InvestigationsOverview of investigations related to Organized Retail Crime (ORC).
-
Organized Retail Crime OverviewUnderstanding the nature and scope of Organized Retail Crime (ORC).
-
Organized Retail Crime Fraud SchemesInvestigating common fraud schemes associated with Organized Retail Crime (ORC).
-
Booster OperationsUnderstanding and investigating the activities of boosters in Organized Retail Crime (ORC).
-
Fencing OperationsInvestigating the activities of fences involved in Organized Retail Crime (ORC).
-
Organized Retail Crime InvestigationsTechniques and strategies for conducting investigations on Organized Retail Crime (ORC).
-
Organized Retail Crime Investigations Part IIAdvanced techniques and case studies in Organized Retail Crime (ORC) investigations.
-
Surveillance MethodsTechniques for conducting surveillance in the context of cyber investigations.
-
Criminal Prosecution of ORCUnderstanding the legal process and challenges in prosecuting Organized Retail Crime (ORC) cases.
-
Introduction to Cyber CounterintelligenceIntroduction to the field of cyber counterintelligence and its role in investigations.
-
Applying Intelligence MethodologiesApplying intelligence methodologies to cyber investigations for effective analysis and decision-making.
-
Cyber Terrorism & HackersInvestigating cyber terrorism activities and the role of hackers in cybercrimes.
-
Electronic DiscoveryTechniques for discovering and retrieving electronic evidence in cyber investigations.
-
Advanced Electronic DiscoveryAdvanced methods and tools for electronic discovery in complex cyber investigations.
-
Computer ForensicsIntroduction to computer forensics and its application in cyber investigations.
-
Advanced Computer ForensicsAdvanced techniques and methodologies in computer forensics for complex cyber investigations.
-
Hi-Tech InvestigationsInvestigating high-tech crimes and technologies involved in cyber investigations.
-
Advanced Hi Tech InvestigationsAdvanced methods and tools for conducting complex high-tech investigations.
-
Mobile ForensicsTechniques and tools for conducting forensics analysis on mobile devices in cyber investigations.
-
Advanced Mobile Forensics - Autopsy DemoAdvanced demonstration of mobile forensics using the Autopsy tool.
-
Private and Domestic InvestigationsTechniques and legal considerations for conducting private and domestic investigations.
-
Final Board ExamComprehensive exam to assess knowledge and skills acquired throughout the course.
RESEARCH BASED ASSIGNMENTS
Through out this program you will be tasked with completing multiple researched based assignments and discussions that are required to complete the program.
DOWNLOAD THE SYLLABUS BELOW
Want to learn more about the CECI? Within this program, you are going to discover cutting-edge techniques and real-world training in six different certification trainings and position yourself as an industry-recognized expert with this incredible Certification Program. Download the complete syllabus here.
EXAM DETAILS
Exam Details Program - is graded on a pass/fail system by obtaining a 70% or better is considered a passing grade. The exam is taken online at the convenience of your home or office. It is a closed book exam and is 200 questions. The questions are in a true/false, multiple-choice & scenario-based format. It is a timed exam, you get 3 hours to complete the exam and you must do so in one sitting. Once you start the exam you must complete it. You get one attempt to pass the exam. If you fail the exam you must purchase a new exam license to sit for the exam.
You can purchase an exam license here for $450 USD separately to sit for the exam if you don't buy the training bundle.
RENEWALS
The cost is $125 for an additional two years and requires proof of completion of 30 CPE credits.
ELIGIBILITY
Bachelor’s degree or higher plus four years of experience in e-commerce, fraud, investigations, IT, law enforcement, forensics, criminal justice, law, and loss prevention
OR
Associates degree plus six years of experience
OR
High school diploma or equivalency plus seven years of experience.
Also, a person convicted of a felony, any crime of moral turpitude or misdemeanor relating to honesty, theft, embezzlement, fraud, or the like shall be ineligible to become a CECI®. Applicants must successfully pass the prescribed background check, which may include a criminal background check and examination process. Falsification or omission of information on the application form will be reason enough to disqualify an applicant from becoming or remaining a Certified Expert in Cyber Investigations (CECI).
What if I do not meet the eligibility requirements?
If you do not meet the eligibility requirements above that's OK! We offer a qualified program where you can get the same great training and earn a "Qualified" credential. Then when you meet the eligibility all you need to do is return and purchase the Certified Exam License to sit for the exam and earn your "Certified" credential. (Click image below to find out more)
ADDITIONAL OPTIONS
What if I don’t want to attend the training program. Can I just sit for the exam?
You do not need to attend our training programs to sit for the board exam.
If you are interested in sitting for the exam only to become a Certified Expert in Cyber Investigations (CECI), you may obtain an exam license to do so. Exam licenses are valid for one year after purchase.
Click here to purchase just an exam.
If you are interested in the Expert in Cyber Investigations training only, you may do so by enrolling in the Qualified Expert in Cyber Investigations (Q|ECI) program. Upon completion of the Qualified Expert in Cyber Investigations (Q|ECI) training program, you will receive a certificate of completion.
You cannot use a VPN, TVN or Proxy to access our site our course materials due to our security measures. In addition you will need a laptop or desktop computer as well. Review the following requirements for your camera, operating system, upload/download speeds, RAM, ports, microphones, and browsers. Also included is a list of technology not currently supported by ProctorU.
Recomended
Internet Connection
Wifi Connection
Wired Connection
PC Users
Windows 10 (Windows 10 S mode is not supported)
Windows 11
Mac Users
MacOS 10.13 (Oldest Still Maintained Version)
MacOS 10.15
CPU
More than 2 core CPU, less than 85% CPU Usage
More than 4 core CPU, less than 50% CPU Usage
Webcam
640x480 resolution
1280x720 resolution
Internet Download Speed
1 Mbps
12 Mbps
Internet Upload Speed
1 Mbps
3 Mbps
RAM
4 GB, less than 95% Ram Usage
16 GB, less than 90% Usage
Connectivity Ports
1935, 843, 80, 443, 61613, UDP/TCP
1935, 843, 80, 443, 61613, UDP/TCP
Screen Resolution
1366 x 768
1920 x 1080 and above
Additional Requirements:
- A functioning microphone (some web cameras have them built-in); microphone should not be part of headphones
- Headphones are generally not permitted, check with your testing organization to determine if headphones are permitted
- A compatible browser: Google Chrome (preferred) or Mozilla Firefox
Not Supported:
- Microsoft Edge browser
- Google Chromebooks (with Guardian Browser)
- Google Chromebooks for Live+ or Review+
- Tablets (Nexus, iPad, Tab, Note, etc.)
- Smartphones
- Linux operating systems
- Windows 10 in S mode or Surface RT
- Connecting from within a virtual machine. You will be asked to reconnect using your host operating system to take your exam
- Apple Boot Camp
- Remote Access Software
- Inactive Version of Windows and Test Builds/Test Mode
Payment & Security
Payment methods
Your payment information is processed securely. We do not store credit card details nor have access to your credit card information.