Over the last 15 years, the world has experienced a need for competent professionals who can effectively manage complex cyber issues that threaten the assets and people of corporations, public and private institutions, and government.

To meet this need, the McAfee Institute administers the Qualified Cyber Intelligence Investigator (Q|CII). This remarkable group of professionals has demonstrated their competency in the areas of cyber intelligence, investigations, leadership, and industry best practices through an intensive qualification and testing program. As a result, each of them is awarded the coveted designation of QCII and is recognized as leaders in their profession.

The QCII is the leading industry training program for cyber investigators in law enforcement, intelligence, loss prevention, private investigation, and fraud. The skills that you will learn by studying for the QCII will help you conduct cyber investigations and critical intelligence-gathering missions quicker than ever before, with more accuracy. You will learn how to identify your person of interest, conduct timely cyber investigations, and prosecute cybercriminals regardless of their location.

You will learn topics such as cyber investigations, mobile & digital forensics, e-commerce fraud, auction fraud, hacking, intelligence gathering, social media investigation methodologies, legal fundamentals and more!

Even better yet! This program and all the resources are completely online and self-study! No matter when you want it, where you want it, or where you are located around the world, it will be available 24/7/365.

The QCII Supports the National Cyber-Security Workforce Framework (Homeland Security)

  • The National Cybersecurity Workforce Framework supports the nation’s cybersecurity workforce development efforts.
  • The National Cybersecurity Workforce Framework provides a simple, standardized way to define cybersecurity work across multiple sectors
  • The National Cybersecurity Workforce Framework provides detailed descriptions of types of cybersecurity work, the knowledge, skills, and abilities required for each area, and descriptions of common specialties.
  • Students will graduate with the knowledge and skills that employers need
  • Colleges can create programs that are aligned with jobs,
  • Employees will have a better-defined career path and opportunities, and
  • Policymakers can set standards to promote workforce professionalization.


I can't urge you enough to invest in yourself and your future while learning some really neat stuff along the way. 

Trust me when I tell you that we are going to blow your mind and teach you things that you never thought possible! It starts with the impossible and ends with the remarkable!

Course curriculum

  • 1

    Welcome to the Certified Cyber Intelligence Investigator (C.C.I.I.)!

    • Welcome to the C.C.I.I.
    • Course Guide
    • Group Forum Discussion: Introduce Yourself!
    • Resources
    • CCII Study Manual
  • 2

    Understanding the Manual

    • Prep Review Quiz: History and Background
    • Understanding the Manual (Reading Assignment)
  • 3

    Cyber Intelligence (Overview)

    • Cyber Intelligence (Reading Assignment)
    • Prep Review Quiz: Cyber Intelligence
  • 4

    Introduction to Cyber Investigations

    • Cyber Investigations (Reading Assignment)
    • Intro to Cyber Investigations - Overview
    • Definitive Guide to Cyber Forensics
    • How Cyber Criminals Attack
    • Sample Preservation Letter
    • Conducting Cyber Investigations
    • Cyber Investigations 101
    • How to Investigate Email Headers
    • Conclusion & Recap
    • Prep Review Quiz: Introduction to Cyber Investigations
  • 5

    Cyber Investigations 101

    • Prep Review Quiz: Cyber Investigations 101
    • Cyber Investigations (Reading Assignment)
  • 6

    Setting up an Investigators Computer

    • Setting up an Investigators Computer (Reading Assignment)
    • Prep Review Quiz: Setting up the Investigators Computer
  • 7

    Social Media Investigations

    • Social Media Landscape (Reading Assignment)
    • Basic Social Media Intro
    • Facebook Search
    • Locating People on Facebook
    • Facebook Profile
    • Facebook Search Tool
    • Facebook Private Profile Information
    • Twitter
    • Twitter Search
    • Twitter Mobile App
    • YouTube
    • YouTube Search
    • Prep Review Quiz: Basic Social Media Investigations
  • 8

    Advanced Social Media Investigations

    • Resources
    • An Overview of Advanced Social Media Investigations
    • Defining Open Source Intelligence
    • Anatomy of Social Media
    • Domain Names
    • Username Workflow
    • Search Engines
    • Facebook
    • Twitter
    • Instagram
    • YouTube
    • Hootsuite and SproutSocial
    • Prep Review Quiz: Advanced Social Media Investigations
  • 9

    Cell Phone & Mobile Device Forensics

    • Intro to Mobile Forensics
    • Mobile Forensics Acquisition
    • Mobile Forensics Examination & Analysis
    • Procedures and Principles
    • Mobile Phone Acquisition/Examination/Reporting (Reading Assignment)
  • 10

    Cell Phone & Mobile Device Forensics Advanced

    • Social Media Apps
    • Facebook Forensics on Mobile Devices
    • Twitter Forensics on Mobile Devices
    • Instagram Forensics on Mobile Devices
    • Kik Forensics on Mobile Devices
    • Mobile Phone File System (Reading Assignment)
  • 11

    Documenting Social Media Evidence

    • Prep Review Quiz: Documenting Social Media Evidence
    • Documenting Social Media Evidence (Reading Assignment)
  • 12

    Understanding Deception

    • Prep Review Quiz: Understanding Deception
    • Understanding Deception (Reading Assignment)
  • 13

    Auction Fraud Investigation Methodologies

    • Auction Fraud Investigation Methodologies (Reading Assignment)
    • Auction Fraud Investigations - Introduction
    • Where is Auction Fraud Most Prevalent
    • Fencing Vs. eFencing
    • eCommerce Challenges to Investigating Fraudsters
    • Prosecution Challenges
    • Prosecution Requirements
    • Science Meets eCrime
    • Ebay The World's Largest Auction Platform
    • Boosters Selling on Ebay
    • Ebay Fraudsters - Let's Find Them
    • Search Results Overview
    • Ebay Listing Overview
    • Advanced Search Overview
    • Auction Listing Details
    • Feedback Profile Overview
    • Auction Analysis for Fraud
    • Feedback Systems and How Fraudsters Use Them
    • Ebay Feedback Review - First 30 Days
    • Craigslist Overview
    • Craigslist Listings
    • Craigslist Investigations
    • Google Boolean Searches - Site Search
    • eCrime Tip Sheet
    • Quick Reference Guide
    • Group Forum Discussion: eBay Investigation
    • Group Forum Discussion: Craigslist Investigation
    • Prep Review Quiz: Auction Fraud Investigations
  • 14

    Advanced Auction Fraud Investigation Methodologies

    • Introduction to Advanced Auction Fraud
    • The Demographics of Online Fraudsters
    • Trends and Patterns of Online Fraudsters
    • The Profile of an Online Fraudster
    • Types of Auction Fraud
    • Patterns in Fraudulent Behavior
    • Research Results and Types of Auction Fraud
    • Analyze Fraudulent Behavior
    • eBay Investigations
    • eBay Auction Search Kit
    • eBay and Terapeak
    • Hot Topic Research on Terapeak
    • eBay Investigative Tips
    • Craigslist Investigation
    • Craigslist Investigation Tips
    • Facebook Marketplace (Oodle) Introduction
    • Facebook Marketplace - Searching Individuals
    • Facebook Marketplace Investigative Tips
    • Google Advanced Operators
    • Google Site Search: eforcity
    • Google Site Search
    • Email Header Information
    • Meta Data
    • eCommerce Laboratory
    • Conclusion
    • Prep Review Quiz: Advanced eCrime Investigation Methodologies
  • 15

    Interpretation of Behaviors

    • Prep Review Quiz: Interpretation of Behaviors
    • Interpretation of Behaviors (Reading Assignment)
  • 16

    Understanding the Perpetrator

    • Module 9 Quiz: Understanding the Perpetrator
    • Understanding the Perpetrator (Reading Assignment)
  • 17

    Dark Web Intelligence & Investigations

    • Understanding the Perpetrator (Reading Assignment)
    • Introducing the TOR Project
    • Getting Started with TOR (Step by Step)​
    • The Deep Web!
    • The Deep Web (Overview)
    • Exploration 1
    • VPN Services
    • Steps to buy and set up a VPN service to remain anonymous
    • Hidden Wiki 2017
    • Black Market Links 2017
    • Deep Web Drug Markets 2017
    • Hitman and Escrow Dark Web Links 2017
    • Directories and Lists 2017
    • Tor Wiki (Resource)
    • What the @#$% is a Bitcoin anyway?
    • Prep Review Quiz: Deep Web
  • 18

    Open Source Intelligence

    • Prep Review Quiz: Open Source Intelligence
    • Open Source Intelligence (Reading Assignment)
  • 19

    Digital Evidence

    • Prep Review Quiz: Digital Evidence
    • Digital Evidence (Reading Assignment)
  • 20

    Legal Fundamentals of Cyber Investigations

    • Legal Fundamentals (Reading Assignment)
    • Introduction to Legal Fundamentals
    • Understanding Your Role as a Corporate Investigator
    • Understanding Your Employees Rights
    • The Electronic Communications Privacy Act
    • Understanding Law Enforcement Concerns
    • An Agent of the Law
    • Federal Laws to Prosecute CyberCrimes
    • Becoming an Expert Witness
    • Dauberts Standards, What is it?
    • Common Task of an Expert Witness
    • Preparing to Become an Expert Witness
    • Your Role as a Consultant
    • How to Prepare Your Testimony for Court
    • Preparing Forensic and Computer Evidence
    • Legal Fundamentals of Cyber Investigations Summary
    • Prep Review Quiz: Legal Fundamentals of Cyber Investigations
  • 21

    Privacy Concerns

    • Prep Review Quiz: Privacy
    • Privacy (Reading Assignment)
  • 22

    Advanced Searching

    • Prep Review Quiz: Advanced Searching
    • Advanced Searching (Reading Assignment)
  • 23

    Ethical Considerations

    • Prep Review Quiz: Ethical Considerations
    • Ethical Considerations (Reading Assignment)
  • 24

    Law Enforcement Partnerships

    • Prep Review Quiz: Law Enforcement Efforts
    • Law Enforcement Efforts (Reading Assignment)
  • 25

    CCII Final Exam

    • Preparing for the Exam
    • Board Exam Purchase


Eligibility Requirements

Learn if you are eligible to take one of our programs

> You must have a high school diploma or a GED equivalent.
> You must be free from pending felony charges or convictions (or military equivalent of court martial charges and/or convictions).
> You must be free from pending misdemeanor charges or convictions involving moral turpitude ("moral turpitude" means an offense that calls into question the integrity or judgment of the offender, such as fraud, bribery, corruption, theft, embezzlement, solicitation, etc.).

However, If you wish to sit for the board exam upon completion of the qualified program you would need to meet the following eligibility criteria below:

Bachelor’s degree or higher plus one year of experience in e-commerce, fraud, investigations, IT, law enforcement, forensics, criminal justice, law, and/or loss prevention or other similar field or

Associates degree plus two years of experience or

High school diploma or equivalency plus three years of experience.

Also, a person convicted of a felony, any crime of moral turpitude or misdemeanor relating to honesty, theft, embezzlement, fraud or the like shall be ineligible to become a CCII®. Applicant must successfully pass the prescribed background check, which may include a criminal background check and examination process. Falsification or omission of information on the application form will be reason enough to disqualify an applicant from becoming or remaining a Certified Cyber Intelligence Investigator (CCII)