GLOBALLY RECOGNIZED & ACCREDITED

DISCOVER CUTTING-EDGE CYBER COUNTERINTELLIGENCE TECHNIQUES AND POSITION YOURSELF AS AN INDUSTRY RECOGNIZED CYBER COUNTERINTELLIGENCE EXPERT WITH THIS INDUSTRY RENOWNED PROGRAM.

  • Learn how to identify and investigate cyber criminals trying to target your organization or agency.
  • Learn how to conduct cyber counterintelligence missions and provide actionable intelligence to mitigate the threat.
  • Gain the credibility, knowledge, and expertise you need to propel yourself ahead of the competition and become well-known as a thought leader in the investigative and intelligence industry...
  • Enjoy 24/7 online access to the latest tutorials and live instructor support in a self-paced course you can take from the comfort of your home...


A Cyber Counterintelligence Analyst works at all levels of the federal government which include FBI, NSA, CIA, USS, DOD, and DEA. CCTA’s also work at large multi-national corporations as well as protecting organizations from the theft of proprietary information, trade secrets, assets, merchandise, customer information and more. The Q|CTA® credential and designation is a game-changer for the industry and your career! 

Course curriculum

  • 1

    Introduction to Cyber Counterintelligence

  • 2

    Intelligence Overview

    • Intro to Cyber Investigations - Overview
    • How Cyber Criminals Attack
    • Conducting Cyber Investigations
    • Cyber Investigations 101
    • How to Investigate Email Headers
    • Conclusion & Recap
  • 3

    Applying Intelligence Methodologies

  • 4

    Cyber Terrorism & Hackers

  • 5

    Cyber Threats & Concerns

    • Cyber Threat Concerns
  • 6

    Setting up an investigators computer

    • Prep Review Quiz: Setting up the Investigators Computer
    • Setting up an investigators computer (Reading Assignment)
  • 7

    Understanding The Perpetrator

    • Understanding the Perpetrator (Reading Assignment)
    • Prep Review Quiz: Understanding the Perpetrator
  • 8

    Understanding Deception

    • Prep Review Quiz: Deception
    • Understanding Deception (Reading Assignment)
  • 9

    Basic Social Media Investigations

    • Social Media Investigations (Reading Assignment)
    • Intro to Basic Social Media
    • Facebook Search
    • Locating People on Facebook
    • Facebook Profile
    • Facebook Search Tool
    • Facebook Private Profile Information
    • Twitter
    • Twitter Search
    • Twitter Mobile App
    • YouTube
    • YouTube Search
  • 10

    Advanced Social Media Investigations

    • Course Resources
    • An overview of Advanced Social Media Investigations
    • Defining Open Source Intelligence
    • A World of Sock Puppets
    • Domain Names
    • Username Workflow
    • Search Engines
    • Facebook
    • Twitter
    • Instagram
    • YouTube
    • Hootsuite and SproutSocial
    • Quiz: Advanced Social Media Investigations
  • 11

    Documenting Social Media Evidence

    • Prep Review Quiz: Documenting Social Media Evidence
    • Documenting Social Media Evidence (Reading Assignment)
  • 12

    Cell Phone & Mobile Device Forensics

    • Intro to Mobile Forensics
    • Mobile Forensics Acquisition
    • Mobile Forensics Examination & Analysis
    • Procedures and Principles
    • Mobile Phone Acquisition/Examination/Reporting (Reading Assignment)
  • 13

    Cell Phone & Mobile Device Forensics Advanced

    • Social Media Apps
    • Facebook Forensics on Mobile Devices
    • Twitter Forensics on Mobile Devices
    • Instagram Forensics on Mobile Devices
    • Kik Forensics on Mobile Devices
    • Mobile Phone File System (Reading Assignment)
  • 14

    Chatting Up Your Person of Interest

    • Introduction to Video Chat Platforms
    • Skype Sign Up
    • Web Platform and Features
    • Skype App and Searching
    • Google Hangouts Intro
    • Hangouts Tutorial
    • Google Hangouts Mobile
    • Oovoo
    • Oovoo Chat Window
    • Facetime
    • Tango
    • Prep Review Quiz: Chatting Up Your Person of Interest
  • 15

    What Do We Do With Dating Sites

    • Dating Site Introduction
    • Doing a Basic Search on Plenty of Fish
    • Plenty of Fish Advanced Search
    • Searching for a Username on Plenty of Fish
    • Searching the Forums in Plenty of Fish
    • Match.com Login and Overview
    • Match.com Search Functions
    • What about Google Site Search
    • Prep Review Quiz: Dating Sites
  • 16

    Classified Investigation Methodologies

    • Classified Investigations - Introduction
    • Where is eCrime Most Prevalent
    • Fencing Vs. eFencing
    • eCommerce Challenges to Investigating Fraudsters
    • Prosecution Challenges
    • Prosecution Requirements
    • Science Meets eCrime
    • Craigslist Overview
    • Craigslist Listings
    • Craigslist Investigations
    • Google Boolean Searches (Site Search)
    • Prep Review Quiz: Classified Investigations Quiz
  • 17

    Auction Fraud Investigation Methodologies

    • Auction Fraud Investigations (Reading Assignment)
    • Auction Fraud Investigations - Introduction
    • Where is eCrime Most Prevalent
    • Fencing Vs. eFencing
    • eCommerce Challenges to Investigating Fraudsters
    • Prosecution Challenges
    • Prosecution Requirements
    • Science Meets eCrime
    • Ebay The World's Largest Auction Platform
    • Boosters Selling on Ebay
    • Ebay Fraudsters - Let's Find Them
    • Ebay Listing Overview
    • Advanced Search Overview
    • Search Results Overview
    • Auction Listing Details
    • Feedback Profile Overview
    • Auction Analysis for Fraud
    • Feedback Systems and How Fraudsters Use Them
    • Ebay Feedback Review - First 30 Days
    • Craigslist Overview
    • Craigslist Listings
    • Craigslist Investigations
    • Google Boolean Searches - Site Search
    • Group Forum Discussion: eBay Investigation
    • Group Forum Discussion: Craigslist Investigation
    • Prep Review Quiz: eCrime Investigations Quiz
  • 18

    Advanced Auction Fraud Investigation Methodologies

    • Introduction to Advanced eCommerce Fraud
    • The Demographics of Online Fraudsters
    • Trends and Patterns of Online Fraudsters
    • The Profile of an Online Fraudster
    • Types of Auction Fraud
    • Patterns in Fraudulent Behavior
    • Research Results and Types of Auction Fraud
    • Analyze Fraudulent Behavior
    • eBay Investigations
    • eBay Auction Search Kit
    • eBay and Terapeak
    • Hot Topic Research on Terapeak
    • eBay Investigative Tips
    • Craigslist Investigation
    • Craigslist Investigation Tips
    • Facebook Marketplace (Oodle) Introduction
    • Facebook Marketplace - Searching Individuals
    • Facebook Marketplace Investigative Tips
    • Google Advanced Operators
    • Google Site Search: eforcity
    • Google Site Search
    • Email Header Information
    • Meta Data
    • eCommerce Laboratory
    • Prep Review Quiz: Advanced eCrime Investigation Methodologies
  • 19

    Dark Web Intelligence & Investigations

    • DarkWeb (Reading Assignment)
    • The Deep Web!
    • Getting Started with TOR (Step by Step)
    • Introducing the TOR Project
    • The Deep Web (Overview)
    • An Exploration 1
    • VPN Services
    • Steps to buy and set up a VPN service to remain anonymous
    • Hidden Wiki
    • Black Market Links
    • Deep Web Drug Markets
    • Hitman and Escrow Dark Web Links
    • Directories and Lists
    • What the @#$% is a Bitcoin anyway?
    • Prep Review Quiz: Deep Web
  • 20

    Open Source Intelligence

    • Open Source Intelligence (Reading Assignment)
    • Open Source Intelligence Gathering Methodologies (OSINT)
    • Prep Review Quiz: Open Source Intelligence
  • 21

    Advanced Searching

    • Prep Review Quiz: Advanced Searching
    • Advanced Searching (Reading Assignment)
  • 22

    Law Enforcement Efforts

    • Prep Review Quiz: Law Enforcement Efforts
    • Law Enforcement Efforts (Reading Assignment)
  • 23

    CCTA Exam

    • Board Exam Purchase

WHERE OUR CERTIFIED PROFESSIONALS
WORK AROUND THE WORLD

Eligibility Requirements

Learn if you are eligible to take one of our programs

> You must have a high school diploma or a GED equivalent.
> You must be free from pending felony charges or convictions (or military equivalent of court martial charges and/or convictions).
> You must be free from pending misdemeanor charges or convictions involving moral turpitude ("moral turpitude" means an offense that calls into question the integrity or judgment of the offender, such as fraud, bribery, corruption, theft, embezzlement, solicitation, etc.).

However, If you wish to sit for the board exam upon completion of the qualified program you would need to meet the following eligibility criteria below:

Bachelor’s degree or higher plus three years of experience in investigations, IT, fraud, law enforcement, forensics, criminal justice, law, and loss prevention. OR

Associates degree plus four years of experience as stated above. OR

High school diploma or equivalency plus four years of experience as stated above.

Also, a person convicted of a felony, any crime of moral turpitude or misdemeanor relating to honesty, theft, embezzlement, fraud or the like shall be ineligible to become a CCIP. Applicant must successfully pass the prescribed background check, which may include a criminal background check and examination process. Falsification or omission of information on the application form will be reason enough to disqualify an applicant from becoming or remaining a CCIP.