0

Your Cart is Empty

This Class is Almost Full, Only 1 Seat/s Left!

Program Duration: 100 Hours
Credits Awarded: 100 CPE
Language: English
Skill Level: Expert
Credential: Board Certification
Delivery Method: Live Instructor-Led Training
Exam Method: Online Proctored
Accreditation: NASBA
Industry Recognized: View Organizations

Included in this Program:

Live Instructor-Led Program: ($1997 Value)
Official Exam License: ($997 Value)
Official Exam Prep Review Quizzes: ($497 Value)
Official Study Guide: ($350 Value)
Exam Guarantee: ($997 Value)
KeepSake: Graduation Packet: ($350 Value)
Bonus #1: Career Center Access: ($1200 Value)
Bonus #2: Live Instructor Support: ($2400 Value)



Industry Recognized


McAfee-Institute-Partner-Banner

One Of The MOST Comprehensive, engaging, and realistic cyber investigation training the industry has seen. EVER. We prepare you for real-life scenarios and success!

Certified Expert in Cyber Investigations (CECI's) are the industry’s Most Elite Cyber Investigators that are trained in advanced and state of the art methodologies to identify, investigate and resolve the most complex cybercrimes known to man. They are Simply the Best of the Best! Let me tell you about the program and how to earn your credentials and board certification!

This is an exciting Professional Board Certification focused on enhancing your skill sets as an "Expert in Cyber Investigations."

We are taking over 25 years of hands-on experience of conducting cyber-investigations from the private, public, and government sectors around the world and sharing with you, our insights into what contributes to success and failures.

It does not matter if you are Law Enforcement, Loss Prevention, Fraud, Intelligence, Cyber Security, I.T Security or Private Investigation you will learn a ton of new concepts and investigative methodologies that you can apply immediately to your role and come out on top.

The CECI Board Certification Program combines the curriculum from the following 6 Board Certifications. Upon completion, you will earn the CECI Board Certification and Credential.

  1. Certified Cyber Intelligence Professional (CCIP): Value $1797
  2. Certified Counterintelligence Threat Analyst (CCTA): Value $1797
  3. Certified Organized Retail Crime Investigator (CORCI): Value $1497
  4. Certified Social Media Intelligence Analyst (SMIA): Value $1497
  5. Certified eCommerce Fraud Investigator (CEFI): Value $1497
  6. Certified Forensic HiTech Investigator (CFHI): Value $1797

You will only take one board exam at the end of the program as well. It is one incredible experience and insane value. Note: This program does not include all separate certifications as listed above.

The Top Reasons To Get Certified

Career Advancement 
Surveys consistently suggest that McAfee Institute (M.I.) Board certified professionals earn higher salaries (up to a 30% increase) and gain more opportunities for career advancement.

Professional Opportunities 
Certification proves to prospective employers that your expertise is confirmed by McAfee Institute, the leader in intelligence and investigative professional development.

Proven Professional Achievement 
Documented evidence of your professional achievement leads to recognition and respect for your abilities as an intelligence and investigative professional.

Greater Adaptability 
McAfee Institute Certified professionals demonstrate that they are committed to continuing education, allowing them to adapt more effectively to a rapidly changing technology environment.

Increased Credibility 
McAfee Institute Certification credentials increase your standing in the community by attesting to the integrity of your knowledge and skills and the reliability with which you can apply them.

Employer Confidence 
McAfee Institute Certifications help employers match skills to job requirements and provides confidence that employees have the right skills for the job.

Industry Recognition 
The high-integrity examination and certification process ensures that McAfee Institute credentials are the standard for the intelligence and investigative sectors.

Continued Professional Growth 
Recertification requirements, combined with a variety of learning resources, ensure that your knowledge keeps pace with a rapidly changing field.

Who should attend?

  • Intel
  • Military
  • CounterIntelligence
  • Special Operations
  • Loss Prevention
  • Fraud Investigators
  • Law Enforcement

      Eligibility

      • Bachelor’s degree or higher plus four years of experience in e-commerce, fraud, investigations, IT, law enforcement, forensics, criminal justice, law, and loss prevention or
      • Associates degree plus six years of experience or
      • High school diploma or equivalency plus seven years of experience

      Also, a person convicted of a felony, any crime of moral turpitude or misdemeanor relating to honesty, theft, embezzlement, fraud or the like shall be ineligible to become a CECI®.  Falsification or omission of information on the application form will be reason enough to disqualify an applicant from becoming or remaining a Certified Expert in Cyber Investigations.

      Syllabus

      Download the complete syllabus below

      Renewal

      You have to renew the board certification every two years, once you are certified. The cost is $125 for an additional two years. CPE requirements are listed here.

      Curriculum

      Welcome to the Certified Expert in Cyber Investigations

      • Welcome to the CECI
      • Group Forum Discussion: Introduce Yourself!
      • Introduction (Reading Assignment)
      • Code of Ethics (Reading Assignment)
      • Course Materials / Downloads

      History and Background

      • CECI History & Background Manual
      • Quiz: History and Background

      Cyber Intelligence (Overview)

      • Cyber Intelligence (Reading Assignment)
      • Quiz: Cyber Intelligence

      Auction Fraud Investigation Methodologies

      • Auction Fraud Investigation Methodologies (Reading Assignment)
      • Auction Fraud Investigations - Introduction
      • Where is eCrime Most Prevalent
      • Fencing Vs. eFencing
      • eCommerce Challenges to Investigating Fraudsters
      • Prosecution Challenges
      • Prosecution Requirements
      • Science Meets eCrime
      • Ebay The World's Largest Auction Platform
      • Boosters Selling on Ebay
      • Ebay Fraudsters - Let's Find Them
      • Ebay Listing Overview
      • Advanced eBay Search Overview
      • eBay Search Results Overview
      • Auction Listing Details
      • Feedback Profile Overview
      • Auction Analysis for Fraud
      • Feedback Systems and How Fraudsters Use Them
      • eBay Feedback Review - First 30 Days
      • Craigslist Overview
      • Craigslist Listings
      • Craigslist Investigations
      • Google Boolean Searches - Site Search
      • Group Forum Discussion: eBay Investigation
      • Group Forum Discussion: Craigslist Investigation
      • Quiz: eCrime Investigations Quiz

      Advanced Auction Fraud Investigation Methodologies

      • Introduction to Advanced eCommerce Fraud
      • The Demographics of Online Fraudsters
      • Trends and Patterns of Online Fraudsters
      • The Profile of an Online Fraudster
      • Types of Auction Fraud
      • Patterns in Fraudulent Behavior
      • Research Results and Types of Auction Fraud
      • Analyze Fraudulent Behavior
      • eBay Investigations
      • eBay Auction Search Kit
      • eBay and Terapeak
      • Hot Topic Research on Terapeak
      • eBay Investigative Tips
      • Craigslist Investigations
      • Craigslist Investigation Tips
      • Facebook Marketplace (Oodle) Introduction
      • Facebook Marketplace - Searching Individuals
      • Facebook Marketplace Investigative Tips
      • Google Advanced Operators
      • Google Site Search: eforcity
      • Google Site Search
      • Email Header Information
      • Meta Data
      • eCommerce Laboratory
      • Advanced eCrime Investigation Conclusion
      • Quiz: Advanced eCrime Investigation Methodologies

        Introduction to Cyber Investigations

        • Types of Cyber Crime (Reading Assignment)
        • Intro to Cyber Investigations - Overview
        • How Cyber Criminals Attack
        • Conducting Cyber Investigations
        • Cyber Investigations 101
        • How to Investigate Email Headers
        • Conclusion & Recap
        • Quiz: Introduction to Cyber Investigations

        Exploring the Deep Web

        • DarkWeb (Reading Assignment)
        • The Deep Web!
        • Getting Started with TOR (Step by Step)
        • Introducing the TOR Project
        • The Deep Web (Overview)
        • An Exploration 1
        • VPN Services
        • Steps to buy and set up a VPN service to remain anonymous
        • Hidden Wiki 2017
        • Black Market Links 2017
        • Deep Web Drug Markets 2017
        • Hitman and Escrow Dark Web Links 2017
        • Directories and Lists 2017
        • The Secrets Behind the TOR Browser
        • TOR Wiki (Resource)
        • What the @#$% is a Bitcoin anyway?
        • Quiz: Deep Web

        Interpretation of Behaviors

        • Interpretation of Behaviors (Reading Assignment)
        • Quiz: Interpretation of Behaviors

        Cyber Investigations 101

        • Cyber Investigations (Reading Assignment)
        • Quiz: Cyber Investigations 101

        Understanding the Perpetrator

        • Understanding the Perpetrator (Reading Assignment)
        • Quiz: Understanding the Perpetrator

        Email Headers and Digital Forensics

        • Cyber Forensics (Reading Assignment)
        • Investigating Email Crimes: The Who, What, When, and Where!
        • What do we do?
        • Email Header Information
        • Mobile Forensics Part 1
        • Mobile Forensics Part 2
        • Quiz: Digital and Mobile Forensics

        Open Source Intelligence

        • Open Source Intelligence (Reading Assignment)
        • Quiz: Open Source Intelligence

        Privacy

        • Privacy (Reading Assignment)
        • Quiz: Privacy

        Basic Social Media Investigations

        • Social Media Landscape (Reading Assignment)
        • Basic Social Media Intro
        • Facebook Search
        • Locating People on Facebook
        • Facebook Profile
        • Facebook Search Tool
        • Facebook Private Profile Information
        • Twitter
        • Twitter Search
        • Twitter Mobile App
        • YouTube
        • YouTube Search
        • Google+
        • Google+ Search
        • Ethical Considerations
        • Quiz: Basic Social Media Investigations

        Advanced Social Media Investigations

        • Resources
        • An overview of Advanced Social Media Investigations
        • Defining Open Source Intelligence
        • A World of Sock Puppets
        • Domain Names
        • Username Workflow
        • Search Engines
        • Facebook
        • Twitter
        • Instagram
        • YouTube
        • HootSuite and SproutSocial
        • Quiz: Advanced Social Media Investigations

        Legal Fundamentals of Cyber Investigations

        • Legal Fundamentals (Reading Assignment)
        • Introduction to Legal Fundamentals
        • Understanding Your Role as a Corporate Investigator
        • Understanding Your Employees Rights
        • The Electronic Communications Privacy Act
        • Understanding Law Enforcement Concerns
        • An Agent of the Law
        • Federal Laws to Prosecute CyberCrimes
        • Becoming an Expert Witness
        • Daubert's Standards, What is it?
        • Common Task of an Expert Witness
        • Preparing to Become an Expert Witness
        • Your Role as a Consultant
        • How to Prepare Your Testimony for Court
        • Preparing Forensic and Computer Evidence
        • Legal Fundamentals of Cyber Investigations Summary
        • Quiz: Legal Fundamentals of Cyber Investigations

        Documenting Social Media Evidence

        • Documenting Social Media Evidence (Reading Assignment)
        • Quiz: Documenting Social Media Evidence

        Chatting Up Your Person of Interest

        • Introduction to Video Chat Platforms
        • Skype Sign Up
        • Web Platform and Features
        • Skype App and Searching
        • Google Hangouts Intro
        • Google Plus
        • Hangouts Tutorial
        • Google Hangouts Mobile
        • Oovoo
        • Oovoo Chat Window
        • Facetime
        • Tango
        • Quiz: Chatting Up Your Person of Interest

        What Do We Do With Dating Sites

        • Dating Site Introduction
        • Doing a Basic Search on Plenty of Fish
        • Plenty of Fish Advanced Search
        • Searching for a Username on Plenty of Fish
        • Searching the Forums in Plenty of Fish
        • Match.com Login and Overview
        • Match.com Search Functions
        • What about Google Site Search
        • Quiz: Dating Sites

        How to Utilize Informants

        • Introduction to Informants
        • Informants Pt. 2: Suitability
        • Informants Pt. 3: Trust and Confidentiality
        • Informants Pt. 4: Safe Handling of Informants
        • Informants Pt 5: Legal Liabilities
        • Quiz: Informants

        Law Enforcement Efforts

        • Law Enforcement Efforts (Reading Assignment)
        • Quiz: Law Enforcement Efforts

        Digital Evidence

        • Digital Evidence (Reading Assignment)
        • Quiz: Digital Evidence

        Setting up an investigators computer

        • Setting up an investigators computer (Reading Assignment)
        • Quiz: Setting up the Investigators Computer

        Ethical Considerations

        • Ethical Considerations (Reading Assignment)
        • Quiz: Ethical Considerations

        Advanced Searching

        • Advanced Searching (Reading Assignment)
        • Quiz: Advanced Searching

        Deception

        • Understanding Deception (Reading Assignment)
        • Quiz: Deception

        Program Design and Development

        • Program Design and Development (Reading Assignment)
        • Quiz: Program Development

        Introduction to ORC Investigations

        • Welcome to Organized Retail Crime
        • Introduction to ORC (Reading Assignment)
        • How we Create Influential Leaders!
        • What is the Journey Going to be Like?
        • Are You a Super Guru in the Making?

        Organized Retail Crime Overview

        • ORC Overview (Reading Assignment)
        • What is the Definition of ORC?
        • What is Our Idea of ORC?
        • ORC: How Do They Do It?
        • Quiz: ORC Overview

        Organized Retail Crime Fraud Schemes

        • ORC Fraud Schemes (Reading Assignment)
        • What Industries Does ORC Impact?
        • What are The Top Cities and Products for ORC?
        • Quiz: ORC Fraud Schemes

        Booster Operations

        • Booster Operations (Reading Assignment)
        • What Is a Booster and What Do They Do?
        • What Tools Does a Booster Use?
        • What are The Different Levels of a Booster?
        • Quiz: Booster Operations

        Fencing Operations

        • Fencing Operations (Reading Assignments)
        • What is a Fence?
        • How Do We Stop ORC?
        • The Struggles: Don't Give Up!
        • Quiz: Fencing Operations

        Organized Retail Crime Investigations

        • Introduction to ORC Investigations
        • What will we learn today?
        • How to Investigate Organized Retail Crime
        • How to Educate and Train...
        • What Kind of Visual Deterrents to Use to Stop ORC!
        • What Kind of Physical Deterrents Can You Use to Stop ORC!
        • How to Decide Correct Camera Placement!
        • What to Know about Merchandise Tagging!
        • Make Sure You Know the Reporting Methods!
        • How Are You Doing the Investigation?
        • The ORC Theory and Research Facts!
        • Look at Your Options!
        • Can You Identify an Investigation Route?
        • Know the Case Enhancement!
        • What is Needed for the Investigation
        • How is Shoplifting Successful and How We Stop It?
        • How to Investigate Check Fraud?
        • Is Your Credit Card Safe?
        • Investigating Gift Card Deception!
        • Is That a Legitimate Refund?
        • Did You Make Your Coupon?
        • Walking Through a Practical Investigation!

        Organized Retail Crime Investigations Part 2

        • Are You Articulating Your Documentation?
        • Do You Have Evidence of a Fence?
        • What about Overseas Sales?
        • Introduction and What You Will Learn!
        • Taking Down the Crew!
        • Do You Have the Correct Information?
        • Taking the Right Photographs
        • Interview and Interrogation (Reading Assignment)
        • Completing the Interview and Interrogation
        • Make Sure You Obtain a Written Statement!
        • How do They Establish a Fencing Operation?
        • What are the Different Levels of a Fence?
        • What do Fence Locations Look Like?
        • What is E-fencing?
        • Using Surveillance to Track Your Suspect!
        • Use Cellphone Records to Tie Your Suspect to the Case
        • Do You Use Merchandise Tracking?
        • Do You Know How to Develop Your Informant?
        • Conducting Buys and Sales!
        • Investigation of a Fence!
        • Types of Gateway Crimes?
        • Here is a Practical Exercise!
        • Here are the Subpoenas and Search and Seizures!

        Surveillance Methods

        • Surveillance Methods (Preliminary)
        • Mobile Surveillance & Prep

        Legal Fundamentals of Organized Retail Crime

        • ORC Legal Aspects (Reading Assignment)
        • Intro to Legal Fundamentals of Organized Retail Crime and What You Will Learn!
        • What Types of Crimes Occur?
        • What are the Different Types of Courts?
        • What Bills and Acts Help Fight ORC?
        • Prosecuting the Criminal!
        • What about Court Orders?
        • Computer Forensic Types of Evidence!
        • Collecting Photographic Evidence for Your Case!
        • What Evidence do You Have of a Fence?
        • What is the Charging Process?
        • Learn How to be an Expert Witness!
        • How to Prepare for the Verdict!
        • Make Sure You Review Your Case!
        • Quiz: ORC Legal

        ORC Prevention and Deterrence

        • ORC Prevention(Reading Assignment)
        • ORC Appendix
        • ORC Appendix and References

        Introduction to Cyber Counterintelligence

        • Welcome to the Cyber Counterintelligence Threat Analysis Program!
        • Group Forum Discussion: Research

        Intelligence Overview

        • Types of Cyber Crime (Reading Assignment)
        • Intro to Cyber Investigations - Overview
        • How Cyber Criminals Attack
        • Conducting Cyber Investigations
        • Cyber Investigations 101
        • How to Investigate Email Headers
        • Intro to Cyber Investigations Conclusion
        • Quiz: Introduction to Cyber Investigations

        Applying Intelligence Methodologies

        • Applying Intelligence Methodologies
        • Assignment: Applying Intelligence

        Cyber Terrorism & Hackers

        • Cyber Terrorism in the News
        • Counter-Terrorism

        Cyber Threats & Concerns

        • Cyber Threat Concerns

        Trends in CyberCrime

        • HiTech Investigations: (Reading Assignment)
        • Crime Scene Investigations Involving Computers
        • Digital Evidence Collection for First Responders
        • Reading Assignment
        • Group Forum Discussion: Compliance Laws
        • Quiz: Trends in Cybercrime

        Electronic Discovery

        • Setting Up Computer Forensics Lab
        • Understanding File Systems
        • Windows Registry Forensics
        • Hard Drive Recovery
        • Mobile Forensics
        • Group Forum Discussion: Security Standards
        • About the Registry - Microsoft
        • Validation of Forensic Tools and Software: A Quick Guide for the Forensic Examiner
        • Reading Assignment
        • Quiz: Electronic Discovery

        Computer Forensics

        • Picture and Video File Review
        • Internet History Reconstruction
        • Digital Evidence/Legal Procedures & Practices
        • Covert and Remote Collections
        • Cell Phone Forensics
        • Wireless Networks and Wireless Network Attacks
        • Reading Assignment
        • Group Forum Discussion: Steganography Tools
        • Quiz: Computer Forensics

        Computer Forensics Advanced

        • Social Engineering
        • Email Analysis
        • Expert Witness Services
        • Reading Assignment
        • Group Forum Discussion: Social Engineering
        • Quiz: Computer Forensics

        Hi-Tech Investigations

        • Trade Secrets/IP Theft
        • Breach of Privacy
        • Workplace Misconduct
        • Quiz: HiTech Investigations

        Hi-Tech Investigations Advanced

        • Cyberstalking
        • Inappropriate Material
        • Embezzlement and Fraud
        • Cyberstalking/Piracy/Embezzlement
        • Quiz: HiTech Investigations Advanced

        Cell Phone & Mobile Device Forensics

        • Intro to Mobile Forensics
        • Mobile Forensics Acquisition
        • Mobile Forensics Examination & Analysis
        • Procedures and Principles
        • Mobile Phone Acquisition/Examination/Reporting
        • Quiz: Cell Phone Forensics

        Cell Phone & Mobile Device Forensics Advanced

        • Social Media Apps
        • Facebook Forensics on Mobile Devices
        • Twitter Forensics on Mobile Devices
        • Instagram Forensics on Mobile Devices
        • Kik Forensics on Mobile Devices
        • Mobile Phone File Systems Reading Assignment

        Private and Domestic Investigations

        • Cheating Partner Investigations
        • Hidden Assets
        • Cyber Bullying

        CECI Appendix

        • CECI Appendix

        Final Exam

        • Preparing for the Exam
        • Exam Application
        • Final Exam: CECI

        Our students come from some of the MOST AMAZING organizations and agencies around the world and you can be apart of it!