Your Cart is Empty

We currently have 2 seats left for this cohort. Hurry!

This Program Includes:
Official e-Courseware: ($1797 Value)
Official One-Year Online Exam License: ($997 Value)
Official Prep Review Quizzes: ($497 Value)
Official Digital Study Guide: ($350 Value)
Exam Guarantee: Pass it or try again! ($997 Value)
KeepSake: Graduation Packet: (Value $300)
Bonus #1: Career Center Access: (Value $1200)
Bonus #2: Live Instructor Support: (Value $2400)

Discover Cutting-Edge Cyber Counterintelligence Techniques and Position Yourself as an Industry Recognized Cyber Counterintelligence Expert with This Industry Renowned Board Certification.

  • Learn how to identify and investigate cyber criminals trying to target your organization or agency.
  • Learn how to conduct cyber counterintelligence missions and provide actionable intelligence to mitigate the threat.
  • Gain the credibility, knowledge, and expertise you need to propel yourself ahead of the competition and become well-known as a thought leader in the investigative and intelligence industry...
  • Enjoy 24/7 online access to the latest tutorials and live instructor support in a self-paced course you can take from the comfort of your home...

    A Cyber Counterintelligence Analyst works at all levels of the federal government which include FBI, NSA, CIA, USS, DOD, and DEA. CCTA’s also work at large multi-national corporations as well protecting organizations from the theft of proprietary information, trade secrets, assets, merchandise, customer information and more. The CCTA® credential and designation is a game changer for the industry and your career!

    Even better yet! This certification program and all the resources are entirely online and self-study! No matter when you want it, where you want it or where you are located around the world, it will be available 24/7/365. The need has never been higher as hackers, terrorist and cybercriminals continue to target our businesses, government, personal information, and way of life, having certified professionals capable of identifying investigating and prosecuting these individuals is a must.

    What if instead, you could access engaging video tutorials at your pace, ONLINE, 24/7 that showed you exactly how to conduct online cyber counterintelligence investigations more quickly and easily than you ever dreamed possible? How about learning real-world applications and techniques through hands-on analytic cyber intelligence, counterintelligence, and investigative exercises?

    And what if you could tap into the unmatched knowledge and expertise of some of the world's foremost experts and practitioners to understand how to maximize counterintelligence methodologies that stand to be gained from the cyber landscape.

    • You'd feel confident and self-assured as an investigator, knowing that you have the knowledge and skills to quickly conduct online effective investigations that keep your business, agency, government, and nation safe.
    • You'd feel optimistic, knowing that our advanced counterintelligence methodologies have opened up a new world of intelligence... and you know exactly how to use it to drive investigative strategies and ensure you're targeting the most dangerous threats.
    • You'd feel relieved, knowing that you don't have to waste hours upon hours or spend tens of thousands of dollars trying to figure how to effectively navigate social media and utilize it as an investigative professional.
    • You'd enjoy more time and less stress, speeding up the investigative process by effortlessly conducting cyber counterintelligence operations.
    • You'd feel proud, knowing you're the go-to expert in your niche that your peers, employer, and others turn to when it comes to conducting effective cyber counterintelligence investigations that get results and deliver actionable intelligence.

    What would that do for your career?

    Those who earn the nationally accredited credential you're about to discover go on to experience some of the world's most prestigious and exciting intelligence and investigative careers in both the public and private sectors.

    With this board certification, you'll not only have the skills, knowledge, and expertise you need to track down cyber criminals and glean intelligence from the cyber landscape... but you'll also become known as an industry expert in conducting quick and effective cyber counterintelligence investigations.

    But Isn't Getting a Nationally Recognized Board Certification Time Consuming and Expensive?

    There's a huge myth among investigative professionals that goes something like this...

    "No matter how you do it, getting nationally recognized credentials as an investigative professional takes a long time and is horribly expensive!"

    But we're here to tell you that this is entirely UNTRUE.

    Here's why:

    As the #1 ranked education company in the world on the Inc 500/5000, McAfee Institute is dedicated to helping as many people as possible access the knowledge and expertise they need to position themselves as thought leaders in their market.

    With the help of our national award-winning Founder and CEO, Josh McAfee, who is one of the most recognized and most in-demand authorities in the industry, we've created one of the most exciting and in-demand programs ever to hit the intelligence/investigative industry!

    We combined the insight and expertise of hundreds of the industry's top leaders, from federal, local, and state law enforcement, intelligence, loss prevention, investigations, fraud, and more to bring you the most up-to-date and effective training possible in cyber and social media investigations.

    You Can Enroll RISK-FREE

    Thanks to Our 100% Money Back Guarantee!

    You have 3 days from the time you enroll to explore the program and if you don't like it we will gladly give you your money back.

    At McAfee, we don't just want our students to have to settle for "satisfactory" results or instruction. Let's save mediocrity for the criminals who give themselves away on online. What we're doing here is giving you the training, knowledge, and real-world experience to turn yourself into a confident and credible online investigator who skillfully gleans powerful intelligence from the cyber landscape at will.

    We're helping you achieve the credibility and expert authority that will skyrocket your career and propel you miles ahead of the competition.

    "Just satisfied" won't do it.

    We want you to be absolutely thrilled.

    That's why we're making this incredible offer even sweeter...

    In the very unlikely event that you aren't completely thrilled with the training you receive in the new Certified Counter-Intelligence Threat Analyst (CCTA) program... just let us know and we'll give you back every penny you invested in this game-changing certification!

    No hassle. No questions. It is really is that simple.

    So what are you waiting for?

    The Time to Invest in Your Future Success Is NOW...

    Enroll Risk-Free Today... and Become the Leading Investigative Expert, You've Always Dreamed of Being!  

    The Top Reasons To Get Certified

    Career Advancement 
    Surveys consistently suggest that McAfee Institute (M.I.) Board certified professionals earn higher salaries (up to a 30% increase) and gain more opportunities for career advancement.

    Professional Opportunities 
    Certification proves to prospective employers that your expertise is confirmed by McAfee Institute, the leader in intelligence and investigative professional development.

    Proven Professional Achievement 
    Documented evidence of your professional achievement leads to recognition and respect for your abilities as an intelligence and investigative professional.

    Greater Adaptability 
    McAfee Institute Certified professionals demonstrate that they are committed to continuing education, allowing them to adapt more effectively to a rapidly changing technology environment.

    Increased Credibility 
    McAfee Institute Certification credentials increase your standing in the community by attesting to the integrity of your knowledge and skills and the reliability with which you can apply them.

    Employer Confidence 
    McAfee Institute Certifications help employers match skills to job requirements and provides confidence that employees have the right skills for the job.

    Industry Recognition 
    The high-integrity examination and certification process ensures that McAfee Institute credentials are the standard for the intelligence and investigative sectors.

    Continued Professional Growth 
    Recertification requirements, combined with a variety of learning resources, ensure that your knowledge keeps pace with a rapidly changing field.

    Who should attend?

    • Intel
    • Military
    • CounterIntelligence
    • Special Operations
    • Loss Prevention
    • Fraud Investigators
    • Law Enforcement


    Access: Lifetime Access
    Credential: Board Certification
    Delivery Method: Online, Self-Study
    Exam Method: Online
    Accreditation: NASBA 
    Industry Recognized: View Organizations


    Applicant experience must meet one of the four following criteria listed below:

    • Bachelor’s degree or higher plus three years of experience in investigations, IT, fraud, law enforcement, forensics, criminal justice, law, and/or loss prevention or
    • Associates degree plus four years of experience as stated above or
    • High school diploma or equivalency plus four years of experience as stated above.

    Also, a person convicted of a felony, any crime of moral turpitude or misdemeanor relating to honesty, theft, embezzlement, fraud or the like shall be ineligible to become a CCTA™. Applicant must successfully pass the prescribed background check, which may include a criminal background check and examination process. Falsification or omission of information on the application form will be reason enough to disqualify an applicant from becoming or remaining a Certified Counterintelligence Threat Analyst (CCTA).


    You have to renew the board certification every two years, once you are certified. The cost is $125 for an additional two years. CPE requirements are listed here.


    Download the Syllabus below


    Introduction to Cyber Counterintelligence

    • Welcome to the Cyber Counterintelligence Threat Analysis Program
    • Group Forum Discussion: Introduce Yourself!
    • Group Forum Discussion
    • Code of Ethics (Reading Assignment)
    • Resources

    Intelligence Overview

    • Types of Cyber Crime (Reading Assignment)
    • Intro to Cyber Investigations - Overview
    • How Cyber Criminals Attack
    • Conducting Cyber Investigations
    • Cyber Investigations 101
    • How to Investigate Email Headers
    • Conclusion & Recap

    Applying Intelligence Methodologies

    • Intelligence Methodologies
    • Group Forum Discussion
    • Cyber Terrorism & Hackers
    • Cyber Terrorism in the News
    • Counter-Terrorism
    • Cyber Threats & Concerns
    • Cyber Threat Concerns

    Email Headers and Digital Forensics

    • Cyber Forensics (Reading Assignment)
    • Investigating Email Crimes: The Who, What, When, and Where!
    • What do we do with our findings?
    • Email Header Information
    • Mobile Forensics Part 1
    • Mobile Forensics Part 2
    • Quiz: Digital and Mobile Forensics
    • Setting up an investigator's computer
    • Setting up an investigator's computer (Reading Assignment)
    • Quiz: Setting up the Investigators Compute

    Understanding The Perpetrator

    • Understanding the Perpetrator (Reading Assignment)
    • Quiz: Understanding the Perpetrator
    • Understanding Deception
    • Understanding Deception (Reading Assignment)
    • Quiz: Deception

    Basic Social Media Investigations

    • Intro to Basic Social Media
    • Facebook Search
    • Locating People on Facebook
    • Facebook Profile
    • Facebook Search Tool
    • Facebook Private Profile Information
    • Twitter
    • Twitter Search
    • Twitter Mobile App
    • YouTube
    • YouTube Search
    • Google+
    • Google+ Search
    • Ethical Considerations
    • Quiz: Basic Social Media Investigations

    Advanced Social Media Investigations

    • Course Resources
    • An overview of Advanced Social Media Investigations
    • Defining Open Source Intelligence
    • A World of Sock Puppets
    • Domain Names
    • Username Workflow
    • Search Engines
    • Facebook
    • Twitter
    • Instagram
    • YouTube
    • Hootsuite and SproutSocial
    • Quiz: Advanced Social Media Investigations

    Chatting Up Your Person of Interest

    • Introduction to Video Chat Platforms
    • Skype Sign Up
    • Web Platform and Features
    • Skype App and Searching
    • Google Hangouts Intro
    • Google Plus
    • Hangouts Tutorial
    • Google Hangouts Mobile
    • Oovoo
    • Oovoo Chat Window
    • Facetime
    • Tango
    • Quiz: Chatting Up Your Person of Interest

    What Do We Do With Dating Sites

    • Dating Site Introduction
    • Doing a Basic Search on Plenty of Fish
    • Plenty of Fish Advanced Search
    • Searching for a Username on Plenty of Fish
    • Searching the Forums in Plenty of Fish
    • Match.com Login and Overview
    • Match.com Search Functions
    • What about Google Site Search
    • Quiz: Dating Sites

    Classified Investigation Methodologies

    • Classified Investigations - Introduction
    • Where is eCrime Most Prevalent
    • Fencing Vs. eFencing
    • eCommerce Challenges to Investigating Fraudsters
    • Prosecution Challenges
    • Prosecution Requirements
    • Science Meets eCrime
    • Craigslist Overview
    • Craigslist Listings
    • Craigslist Investigations
    • Google Boolean Searches (Site Search)
    • Quiz: Classified Investigations Quiz

    Documenting Social Media Evidence

    • Documenting Social Media Evidence (Reading Assignment)
    • Quiz: Documenting Social Media Evidence

    eCrime Investigation Methodologies

    • eCrime Investigations - Introduction
    • Where is eCrime Most Prevalent
    • Fencing Vs. eFencing
    • eCommerce Challenges to Investigating Fraudsters
    • Prosecution Challenges
    • Prosecution Requirements
    • Science Meets eCrime
    • Ebay The World's Largest Auction Platform
    • Boosters Selling on Ebay
    • Ebay Fraudsters - Let's Find Them
    • Ebay Listing Overview
    • Advanced Search Overview
    • Search Results Overview
    • Auction Listing Details
    • Feedback Profile Overview
    • Auction Analysis for Fraud
    • Feedback Systems and How Fraudsters Use Them
    • Ebay Feedback Review - First 30 Days
    • Craigslist Overview
    • Craigslist Listings
    • Craigslist Investigations
    • Google Boolean Searches - Site Search
    • Group Forum Discussion: eBay Investigation
    • Group Forum Discussion: Craigslist Investigation
    • Quiz: eCrime Investigations Quiz

    Advanced eCrime Investigation Methodologies

    • Introduction to Advanced eCommerce Fraud
    • The Demographics of Online Fraudsters
    • Trends and Patterns of Online Fraudsters
    • The Profile of an Online Fraudster
    • Types of Auction Fraud
    • Patterns in Fraudulent Behavior
    • Research Results and Types of Auction Fraud
    • Analyze Fraudulent Behavior
    • eBay Investigations
    • eBay Auction Search Kit
    • eBay and Terapeak
    • Hot Topic Research on Terapeak
    • eBay Investigative Tips
    • Craigslist Investigation
    • Craigslist Investigation Tips
    • Facebook Marketplace (Oodle) Introduction
    • Facebook Marketplace - Searching Individuals
    • Facebook Marketplace Investigative Tips
    • Google Advanced Operators
    • Google Site Search: eforcity
    • Google Site Search
    • Email Header Information
    • Meta Data
    • eCommerce Laboratory
    • Conclusion
    • Quiz: Advanced eCrime Investigation Methodologies

    Exploring the Deep Web

    • DarkWeb (Reading Assignment)
    • The Deep Web!
    • Getting Started with TOR (Step by Step)
    • Introducing the TOR Project
    • The Deep Web (Overview)
    • An Exploration 1
    • VPN Services
    • Steps to buy and set up a VPN service to remain anonymous
    • Hidden Wiki 2017
    • Black Market Links 2017
    • Deep Web Drug Markets 2017
    • Hitman and Escrow Dark Web Links 2017
    • Directories and Lists 2017
    • The Secrets Behind the TOR Browser
    • TOR Wiki (Resource)
    • What the @#$% is a Bitcoin anyway?
    • Deep Web Quiz

    Open Source Intelligence

    • Open Source Intelligence (Reading Assignment)
    • Open Source Intelligence Gathering Methodologies (OSINT)
    • Quiz: Open Source Intelligence
    • Law Enforcement Efforts
    • Law Enforcement Efforts (Reading Assignment)
    • Quiz: Law Enforcement Efforts
    • Advanced Searching
    • Advanced Searching (Reading Assignment)
    • Quiz: Advanced Searching

    CCTA Exam

      • Exam Application
      • Final Exam: CCTA

    Industry Recognized