GLOBALLY RECOGNIZED & ACCREDITED

OVER THE LAST 15 YEARS, THE WORLD HAS EXPERIENCED A NEED FOR COMPETENT PROFESSIONALS WHO CAN EFFECTIVELY MANAGE COMPLEX CYBER ISSUES THAT THREATEN THE ASSETS, INFORMATION, AND PEOPLE OF OUR ORGANIZATIONS, POLICE DEPARTMENTS, GOVERNMENT AGENCIES AND ALIKE.

To meet this need, the McAfee Institute administers the Qualified Cyber Intelligence Investigator (Q|CIP). This remarkable group of professionals has demonstrated their competency in the areas of cyber intelligence, investigations, prosecution, management, leadership and industry best practice’s through an intensive qualification and testing program.

As a result, each of them is awarded the coveted designation of Q|CIP and is recognized as leaders in their respective professions.

The Q|CIP is the leading industry certification for law enforcement, loss prevention, private investigators, and fraud professionals. The skills that you will learn by studying for the Q|CIP will help you conduct and manage cyber investigations and critical intelligence-gathering missions quicker than ever before, with more accuracy.

You will learn how to identify your person of interest, conduct timely cyber investigations, and methodologies to prosecute cyber criminals regardless of their location. Most importantly you will learn how to design, implement and manage a cyber program and team within your organization, agency or department as well.

You will learn topics such as cyber investigations, mobile & digital forensics, e-commerce fraud, auction fraud, hacking, intelligence gathering, social media investigative methodologies, legal fundamentals and more!

The Q|CIP was Developed in Conjunction with the Dept of Homeland Security's National Cyber-Security Workforce Framework.

  • The National Cybersecurity Workforce Framework supports the nation’s cybersecurity workforce development efforts.
  • The National Cybersecurity Workforce Framework provides a simple, standardized way to define cybersecurity work across multiple sectors
  • The National Cybersecurity Workforce Framework provides detailed descriptions of types of cybersecurity work, the knowledge, skills, and abilities required for each area, and descriptions of common specialties.
  • Students will graduate with the knowledge and skills that employers need
  • Colleges can create programs that are aligned to jobs,
  • Employees will have a better-defined career path and opportunities, and
  • Policymakers can set standards to promote workforce professionalization.

Now is the Time... Join the Ranks of the Industry's most Elite Cyber Professionals!

I can't urge you enough to invest in yourself and your future while learning some amazing stuff along the way. Earning the industry's top certification is rigorous, challenging, and incredibly fun!

Trust me when I tell you that we are going to blow your mind and teach you things that you never thought possible! It starts with the impossible and ends with the remarkable!

Course curriculum

  • 1

    Welcome to the Certified Cyber Intelligence Professional (C.C.I.P.)

  • 2

    The History and Background of Cyber Crimes

    • Prep Review Quiz: Understanding the Manual
    • Understanding the Manual (Reading Assignment)
  • 3

    Cyber Intelligence (Overview)

    • Prep Review Quiz: Cyber Intelligence (Overview)
    • Cyber Intelligence (Reading Assignment)
  • 4

    Introduction to Cyber Investigations

    • Types of Cyber Crime (Reading Assignment)
    • Intro to Cyber Investigations - Overview
    • How Cyber Criminals Attack
    • Conducting Cyber Investigations
    • Cyber Investigations 101
    • How to Investigate Email Headers
    • Conclusion & Recap
    • Prep Review Quiz: Introduction to Cyber Investigations
  • 5

    Setting Up An Investigators Computer

    • Prep Review Quiz: Setting Up an Investigator's Computer
    • Setting Up An Investigators Computer (Reading Assignment)
  • 6

    Social Media Investigations

    • Social Media Landscape (Reading Assignment)
    • Basic Social Media Intro
    • Facebook Search
    • Locating People on Facebook
    • Facebook profile
    • Facebook Search Tool
    • Facebook Private Profile Information
    • Twitter
    • Twitter Search
    • Twitter Mobile App
    • YouTube
    • YouTube Search
    • Prep Review Quiz: Social Media Investigations
  • 7

    Advanced Social Media Investigations

    • Resources
    • An overview of Advanced Social Media Investigations
    • Defining Open Source Intelligence
    • Anatomy of Social Media
    • Domain Names
    • Username Workflow
    • Search Engines
    • Facebook
    • Twitter
    • Instagram
    • YouTube
    • Hootsuite and SproutSocial
    • Prep Review Quiz: Advanced Social Media Investigations
  • 8

    Documenting Social Media Evidence

    • Module 17 Quiz: Documenting Social Media Evidence
    • Social Media Evidence (Reading Assignment)
  • 9

    Cell Phone & Mobile Device Forensics

    • Intro to Mobile Forensics
    • Mobile Forensics Acquisition
    • Mobile Forensics Examination & Analysis
    • Procedures and Principles
    • Mobile Phone Acquisition/Examination/Reporting (Reading Assignment)
  • 10

    Cell Phone & Mobile Device Forensics Advanced

    • Social Media Apps
    • Facebook Forensics on Mobile Devices
    • Twitter Forensics on Mobile Devices
    • Instagram Forensics on Mobile Devices
    • Kik Forensics on Mobile Devices
    • Mobile Phone File System (Reading Assignment)
  • 11

    Auction Fraud Investigation Methodologies

    • Auction Fraud Methodologies (Reading Assignments)
    • Auction Fraud Investigations - Introduction
    • Where is Auction Fraud Most Prevalent
    • Fencing Vs. eFencing
    • eCommerce Challenges to Investigating Fraudsters
    • Prosecution Challenges
    • Prosecution Requirements
    • Science Meets eCrime
    • Ebay The World's Largest Auction Platform
    • Boosters Selling on Ebay
    • Ebay Fraudsters - Let's Find Them
    • Ebay Listing Overview
    • Advanced Search Overview
    • Search Results Overview
    • Auction Listing Details
    • Feedback Profile Overview
    • Auction Analysis for Fraud
    • Feedback Systems and How Fraudsters Use Them
    • Ebay Feedback Review - First 30 Days
    • Craigslist Overview
    • Craigslist Listings
    • Craigslist Investigations
    • Google Boolean Searches - Site Search
    • Group Forum Discussion: eBay Investigation
    • Group Forum Discussion: Craigslist Investigation
    • Prep Review Quiz: Auction Fraud Investigations
  • 12

    Advanced eCrime Investigation Methodologies

    • Introduction to Advanced eCommerce Fraud
    • The Demographics of Online Fraudsters
    • Trends and Patterns of Online Fraudsters
    • The Profile of an Online Fraudster
    • Types of Auction Fraud
    • Patterns in Fraudulent Behavior
    • Research Results and Types of Auction Fraud
    • Analyze Fraudulent Behavior
    • eBay Investigations
    • eBay Auction Search Kit
    • eBay and Terapeak
    • Hot Topic Research on Terapeak
    • eBay Investigative Tips
    • Craigslist Investigation
    • Craigslist Investigation Tips
    • Facebook Marketplace (Oodle) Introduction
    • Facebook Marketplace - Searching Individuals
    • Facebook Marketplace Investigative Tips
    • Google Advanced Operators
    • Google Site Search: eforcity
    • Google Site Search
    • Email Header Information
    • Meta Data
    • eCommerce Laboratory
    • Conclusion
    • Prep Review Quiz: Advanced eCrime Investigation Methodologies
  • 13

    Classified Investigation Methodologies

    • Classified Investigations - Introduction
    • Where is eCrime Most Prevalent
    • Fencing Vs. eFencing
    • eCommerce Challenges to Investigating Fraudsters
    • Prosecution Challenges
    • Prosecution Requirements
    • Science Meets eCrime
    • Craigslist Overview
    • Craigslist Listings
    • Craigslist Investigations
    • Google Boolean Searches (Site Search)
    • Prep Review Quiz: Classified Investigations
  • 14

    Interpretation of Cyber Criminal Behaviors

    • Prep Review Quiz: Interpretation of Behaviors
    • Interpretation of Behaviors (Reading Assignment)
  • 15

    Cyber Investigations 101

    • Cyber Investigations (Reading Assignment)
    • Prep Review Quiz: Cyber Investigations 101
  • 16

    Exploring the Deep Web

    • DarkWeb (Reading Assignment)
    • The Deep Web!
    • Getting Started with TOR (Step by Step)
    • Introducing the TOR Project
    • The Secrets Behind the TOR Browser
    • The Deep Web (Overview)
    • Exploration 1
    • VPN Services
    • Steps to buy and set up a VPN service to remain anonymous
    • Hidden Wiki
    • Black Market Links
    • Deep Web Drug Markets
    • Hitman and Escrow Dark Web Links
    • Directories and Lists
    • What the @#$% is a Bitcoin anyway?
    • Prep Review Quiz: Deep Web
  • 17

    Open Source Intelligence Methodologies

    • Prep Review Quiz: Open Source Intelligence
    • Open Source Intelligence (Reading Assignment)
  • 18

    Understanding The Perpetrator

    • Prep Review Quiz: Understanding the Perpetrator
    • Understanding the Perpetrator (Reading Assignment)
  • 19

    Legal Fundamentals of Cyber Investigations

    • Legal Fundamentals (Reading Assignment)
    • Introduction to Legal Fundamentals
    • Understanding Your Role as a Corporate Investigator
    • Understanding Your Employees Rights
    • The Electronic Communications Privacy Act
    • Understanding Law Enforcement Concerns
    • An Agent of the Law
    • Federal Laws to Prosecute CyberCrimes
    • Becoming an Expert Witness
    • Dauberts Standards, What is it?
    • Common Task of an Expert Witness
    • Preparing to Become an Expert Witness
    • Your Role as a Consultant
    • How to Prepare Your Testimony for Court
    • Preparing Forensic and Computer Evidence
    • Summary
    • Prep Review Quiz: Legal Fundamentals of Cyber Investigations
  • 20

    Privacy Concerns

    • Prep Review Quiz: Privacy
    • Privacy (Reading Assignment)
  • 21

    Advanced Searching

    • Prep Review Quiz: Advanced Searching
    • Advanced Searching (Reading Assignment)
  • 22

    Understanding Deception

    • Prep Review Quiz: Deception
    • Understanding Deception (Reading Assignment)
  • 23

    Chatting Up Your Person of Interest

    • Introduction to Video Chat Platforms
    • Skype Sign Up
    • Web Platform and Features
    • Skype App and Searching
    • Google Hangouts Intro
    • Google Plus
    • Hangouts Tutorial
    • Google Hangouts Mobile
    • Oovoo
    • Oovoo Chat Window
    • Facetime
    • Tango
    • Prep Review Quiz: Chatting Up Your Person of Interest
  • 24

    How to Conduct Investigations on Dating Websites

    • Dating Site Introduction
    • Doing a Basic Search on Plenty of Fish
    • Plenty of Fish Advanced Search
    • Searching for a Username on Plenty of Fish
    • Searching the Forums in Plenty of Fish
    • Match.com Login and Overview
    • Match.com Search Functions
    • What about Google Site Search
    • Prep Review Quiz: Dating Sites
  • 25

    How to Utilize Informants

    • Introduction to Informants
    • Informants Pt. 2: Suitability
    • Informants Pt. 3: Trust and Confidentiality
    • Informants Pt. 4: Safe Handling of Informants
    • Informants Pt 5: Legal Liabilities
    • Prep Review Quiz: Informants
  • 26

    Digital Evidence

    • Prep Review Quiz: Digital Evidence
    • Digital Evidence (Reading Assignment)
  • 27

    Program Design and Development

    • Prep Review Quiz: Program Development
    • Program Design and Development (Reading Assignment)
  • 28

    Law Enforcement Partnerships

    • Module 20 Quiz: Law Enforcement Efforts
    • Law Enforcement Efforts (Reading Assignment)
  • 29

    Ethical Considerations

    • Prep Review Quiz: Ethical Considerations
    • Ethical Considerations (Reading Assignment)
  • 30

    CCIP Final Exam

    • Preparing for the Exam
    • Board Exam Purchase

WHERE OUR CERTIFIED PROFESSIONALS
WORK AROUND THE WORLD

Eligibility Requirements

Learn if you are eligible to take one of our programs

> You must have a high school diploma or a GED equivalent.
> You must be free from pending felony charges or convictions (or military equivalent of court martial charges and/or convictions).
> You must be free from pending misdemeanor charges or convictions involving moral turpitude ("moral turpitude" means an offense that calls into question the integrity or judgment of the offender, such as fraud, bribery, corruption, theft, embezzlement, solicitation, etc.).

However, If you wish to sit for the board exam upon completion of the qualified program you would need to meet the following eligibility criteria below:

Bachelor’s degree or higher plus three years of experience in investigations, IT, fraud, law enforcement, forensics, criminal justice, law, and loss prevention, or

Associates degree plus four years of experience as stated above, or

High school diploma or equivalency plus four years of experience as stated above.

Also, a person convicted of a felony, any crime of moral turpitude or misdemeanor relating to honesty, theft, embezzlement, fraud or the like shall be ineligible to become a CCIP. Applicant must successfully pass the prescribed background check, which may include a criminal background check and examination process. Falsification or omission of information on the application form will be reason enough to disqualify an applicant from becoming or remaining a CCIP.