Discover Cutting-Edge Cyber Counter-Intelligence Techniques and Position Yourself as an Industry Recognized Cyber Counterintelligence Expert with This Industry Renowned Board Certification.

  • Learn how to identify and investigate cyber criminals trying to target your organization or agency.
  • Learn how to conduct cyber counterintelligence missions and provide actionable intelligence to mitigate the threat.
  • Gain the credibility, knowledge, and expertise you need to propel yourself ahead of the competition and become well-known as a thought leader in the investigative and intelligence industry...
  • Enjoy 24/7 online access to the latest tutorials and live instructor support in a self-paced course you can take from the comfort of your home...

A Cyber Counterintelligence Analyst works at all levels of the federal government which 
include FBI, NSA, CIA, USS, DOD, and DEA. CCTA’s also work at large multi-national corporations as well protecting organizations from the theft of proprietary information, trade secrets, assets, merchandise, customer information and more. The CCTA® credential and designation is a game changer for the industry and your career!

Even better yet! This certification program and all the resources are entirely online and self-study! No matter when you want it, where you want it or where you are located around the world, it will be available 24/7/365.

    The need has never been higher as hackers, terrorist and cyber criminals continue to target our businesses, government, personal information and way of life, having certified professionals capable of identifying investigating and prosecuting these individuals is a must.

    What if instead you could access engaging video tutorials at your pace, ONLINE, 24/7 that showed you exactly how to conduct online cyber counterintelligence investigations more quickly and easily than you ever dreamed possible? How about learning real-world applications and techniques through hands-on analytic cyber intelligence, counterintelligence, and investigative exercises?

    And what if you could tap into the unmatched knowledge and expertise of some of the world's foremost experts and practitioners to understand how to maximize counterintelligence methodologies that stand to be gained from the cyber landscape.

    • You'd feel confident and self-assured as an investigator, knowing that you have the knowledge and skills to quickly conduct online effective investigations that keep your business, agency, government, and nation safe.
    • You'd feel optimistic, knowing that our advanced counterintelligence methodologies have opened up a new world of intelligence... and you know exactly how to use it to drive investigative strategies and ensure you're targeting the most dangerous threats.
    • You'd feel relieved, knowing that you don't have to waste hours upon hours or spend tens of thousands of dollars trying to figure how to effectively navigate social media and utilize it as an investigative professional.
    • You'd enjoy more time and less stress, speeding up the investigative process by effortlessly conducting cyber counterintelligence operations.
    • You'd feel proud, knowing you're the go-to expert in your niche that your peers, employer, and others turn to when it comes to conducting effective cyber counterintelligence investigations that get results and deliver actionable intelligence.

    What would that do for your career?

    Those who earn the nationally accredited credential you're about to discover go on to experience some of the world's most prestigious and exciting intelligence and investigative careers in both the public and private sectors.

    With this board certification, you'll not only have the skills, knowledge, and expertise you need to track down cyber criminals and glean intelligence from the cyber landscape... but you'll also become known as an industry expert in conducting quick and effective cyber counterintelligence investigations.

    But Isn't Getting a Nationally Recognized Board Certification Time Consuming and Expensive?

    There's a huge myth among investigative professionals that goes something like this...

    "No matter how you do it, getting nationally recognized credentials as an investigative professional takes a long time and is horribly expensive!"

    But we're here to tell you that this is entirely UNTRUE.

    Here's why:

    As the #1 ranked education company in the world on the Inc 500/5000, McAfee Institute is dedicated to helping as many people as possible access the knowledge and expertise they need to position themselves as thought leaders in their market.

    With the help of our national award-winning Founder and CEO, Josh McAfee, who is one of the most recognized and most in demand authorities in the industry, we've created one of the most exciting and in-demand programs ever to hit the intelligence/investigative industry!

    We combined the insight and expertise of hundreds of the industry's top leaders, from federal, local, and state law enforcement, intelligence, loss prevention, investigations, fraud, and more to bring you the most up-to-date and effective training possible in cyber and social media investigations.

    You Can Enroll RISK-FREE
    Thanks to Our 100% Money Back Guarantee!

    You have 3 days from the time you enroll to explore the program and if you don't like it we will gladly give you your money back.

    At McAfee, we don't just want our students to have to settle for "satisfactory" results or instruction. Let's save mediocrity for the criminals who give themselves away on online. What we're doing here is giving you the training, knowledge, and real-world experience to turn yourself into a confident and credible online investigator who skillfully gleans powerful intelligence from the cyber landscape at will.

    We're helping you achieve the credibility and expert authority that will skyrocket your career and propel you miles ahead of the competition.

    "Just satisfied" won't do it.

    We want you to be absolutely thrilled.

    That's why we're making this incredible offer even sweeter...

    In the very unlikely event that you aren't completely thrilled with the training you receive in the new Certified Counter-Intelligence Threat Analyst (CCTA) program... just let us know and we'll give you back every penny you invested in this game-changing certification!

    No hassle. No questions. It is really is that simple.

    So what are you waiting for?

    The Time to Invest in Your Future Success Is NOW..

    Enroll Risk-Free Today... and Become the Leading Investigative Expert

    You've Always Dreamed of Being!

     

    Course Benefits:

    • Access: 24/7/365 Online Unlimited Access
    • Credential Earned: Board Certification
    • Availability: Desktop, Mobile, Tablet
    • Online Exam: 1 Year License Included ($350 Value)
    • Prep Review Materials: Prep Review Quizzes ($450 Value)
    • Digital Manual: Included ($299 Value)
    • CPE Credits: Included
    • Nationally Recognized Credential: NASBA, NICE & More
    • Live Mentors: Available 9-6PM CST via Chat

    Bonus Items for Enrolling Today:

    • Exam Guarantee: Pass it or try again on us! (Value $350)
    • Keep Sake: Diploma, Padded Cover, Transcripts (Value $300)

     

    Eligibility Requirements:

    Applicant experience must meet one of the four following criteria listed below:

    • Bachelor’s degree or higher plus three years of experience in investigations, IT, fraud, law enforcement, forensics, criminal justice, law, and/or loss prevention or
    • Associates degree plus four years of experience as stated above or
    • High school diploma or GED plus four years of experience as stated above.

    Also, a person convicted of a felony, any crime of moral turpitude or misdemeanor relating to honesty, theft, embezzlement, fraud or the like shall be ineligible to become a CCTA™. Applicant must successfully pass the prescribed background check, which may include a criminal background check and examination process. Falsification or omission of information on the application form will be reason enough to disqualify an applicant from becoming or remaining a Certified Counterintelligence Threat Analyst (CCTA).

    Course Curriculum:

    Introduction to Cyber Counterintelligence
    • Welcome to the Cyber Counterintelligence Threat Analysis Program
    • Group Forum Discussion: Introduce Yourself!
    • Group Forum Discussion
    • Code of Ethics (Reading Assignment)
    • Resources
    Intelligence Overview
    • Types of Cyber Crime (Reading Assignment)
    • Intro to Cyber Investigations - Overview
    • How Cyber Criminals Attack
    • Conducting Cyber Investigations
    • Cyber Investigations 101
    • How to Investigate Email Headers
    • Conclusion & Recap
    Applying Intelligence Methodologies
    • Intelligence Methodologies
    • Group Forum Discussion
    • Cyber Terrorism & Hackers
    • Cyber Terrorism in the News
    • Counter Terrorism
    • Cyber Threats & Concerns
    • Cyber Threat Concerns
    Email Headers and Digital Forensics
    • Cyber Forensics (Reading Assignment)
    • Investigating Email Crimes: The Who, What, When, and Where!
    • What do we do with our findings?
    • Email Header Information
    • Mobile Forensics Part 1
    • Mobile Forensics Part 2
    • Quiz: Digital and Mobile Forensics
    • Setting up an investigator's computer
    • Setting up an investigator's computer (Reading Assignment)
    • Quiz: Setting up the Investigators Compute
    Understanding The Perpetrator
    • Understanding the Perpetrator (Reading Assignment)
    • Quiz: Understanding the Perpetrator
    • Understanding Deception
    • Understanding Deception (Reading Assignment)
    • Quiz: Deception
    Basic Social Media Investigations
    • Intro to Basic Social Media
    • Facebook Search
    • Locating People on Facebook
    • Facebook Profile
    • Facebook Search Tool
    • Facebook Private Profile Information
    • Twitter
    • Twitter Search
    • Twitter Mobile App
    • YouTube
    • YouTube Search
    • Google+
    • Google+ Search
    • Ethical Considerations
    • Quiz: Basic Social Media Investigations
    Advanced Social Media Investigations
    • Course Resources
    • An overview of Advanced Social Media Investigations
    • Defining Open Source Intelligence
    • A World of Sock Puppets
    • Domain Names
    • Username Workflow
    • Search Engines
    • Facebook
    • Twitter
    • Instagram
    • YouTube
    • Hootsuite and SproutSocial
    • Quiz: Advanced Social Media Investigations
    Chatting Up Your Person of Interest
    • Introduction to Video Chat Platforms
    • Skype Sign Up
    • Web Platform and Features
    • Skype App and Searching
    • Google Hangouts Intro
    • Google Plus
    • Hangouts Tutorial
    • Google Hangouts Mobile
    • Oovoo
    • Oovoo Chat Window
    • Facetime
    • Tango
    • Quiz: Chatting Up Your Person of Interest
    What Do We Do With Dating Sites
    • Dating Site Introduction
    • Doing a Basic Search on Plenty of Fish
    • Plenty of Fish Advanced Search
    • Searching for a Username on Plenty of Fish
    • Searching the Forums in Plenty of Fish
    • Match.com Login and Overview
    • Match.com Search Functions
    • What about Google Site Search
    • Quiz: Dating Sites
    Classified Investigation Methodologies
    • Classified Investigations - Introduction
    • Where is eCrime Most Prevalent
    • Fencing Vs. eFencing
    • eCommerce Challenges to Investigating Fraudsters
    • Prosecution Challenges
    • Prosecution Requirements
    • Science Meets eCrime
    • Craigslist Overview
    • Craigslist Listings
    • Craigslist Investigations
    • Google Boolean Searches (Site Search)
    • Quiz: Classified Investigations Quiz
    Documenting Social Media Evidence
    • Documenting Social Media Evidence (Reading Assignment)
    • Quiz: Documenting Social Media Evidence
    eCrime Investigation Methodologies
    • eCrime Investigations - Introduction
    • Where is eCrime Most Prevalent
    • Fencing Vs. eFencing
    • eCommerce Challenges to Investigating Fraudsters
    • Prosecution Challenges
    • Prosecution Requirements
    • Science Meets eCrime
    • Ebay The World's Largest Auction Platform
    • Boosters Selling on Ebay
    • Ebay Fraudsters - Let's Find Them
    • Ebay Listing Overview
    • Advanced Search Overview
    • Search Results Overview
    • Auction Listing Details
    • Feedback Profile Overview
    • Auction Analysis for Fraud
    • Feedback Systems and How Fraudsters Use Them
    • Ebay Feedback Review - First 30 Days
    • Craigslist Overview
    • Craigslist Listings
    • Craigslist Investigations
    • Google Boolean Searches - Site Search
    • Group Forum Discussion: eBay Investigation
    • Group Forum Discussion: Craigslist Investigation
    • Quiz: eCrime Investigations Quiz
    Advanced eCrime Investigation Methodologies
    • Introduction to Advanced eCommerce Fraud
    • The Demographics of Online Fraudsters
    • Trends and Patterns of Online Fraudsters
    • The Profile of an Online Fraudster
    • Types of Auction Fraud
    • Patterns in Fraudulent Behavior
    • Research Results and Types of Auction Fraud
    • Analyze Fraudulent Behavior
    • eBay Investigations
    • eBay Auction Search Kit
    • eBay and Terapeak
    • Hot Topic Research on Terapeak
    • eBay Investigative Tips
    • Craigslist Investigation
    • Craigslist Investigation Tips
    • Facebook Marketplace (Oodle) Introduction
    • Facebook Marketplace - Searching Individuals
    • Facebook Marketplace Investigative Tips
    • Google Advanced Operators
    • Google Site Search: eforcity
    • Google Site Search
    • Email Header Information
    • Meta Data
    • eCommerce Laboratory
    • Conclusion
    • Quiz: Advanced eCrime Investigation Methodologies
    Exploring the Deep Web
    • DarkWeb (Reading Assignment)
    • The Deep Web!
    • Getting Started with TOR (Step by Step)
    • Introducing the TOR Project
    • The Deep Web (Overview)
    • An Exploration 1
    • VPN Services
    • Steps to buy and set up a VPN service to remain anonymous
    • Hidden Wiki 2017
    • Black Market Links 2017
    • Deep Web Drug Markets 2017
    • Hitman and Escrow Dark Web Links 2017
    • Directories and Lists 2017
    • The Secrets Behind the TOR Browser
    • TOR Wiki (Resource)
    • What the @#$% is a Bitcoin anyway?
    • Deep Web Quiz
    Open Source Intelligence
    • Open Source Intelligence (Reading Assignment)
    • Open Source Intelligence Gathering Methodologies (OSINT)
    • Quiz: Open Source Intelligence
    • Law Enforcement Efforts
    • Law Enforcement Efforts (Reading Assignment)
    • Quiz: Law Enforcement Efforts
    • Advanced Searching
    • Advanced Searching (Reading Assignment)
    • Quiz: Advanced Searching
    CCTA Exam
    • Exam Application
    • Final Exam: CCTA

    Globally Recognized As Seen on



    What our Students have to Say

    Customer Reviews

    Based on 7 reviews
    5 Star
    86% 
    6
    4 Star
    0% 
    0
    3 Star
    14% 
    1
    2 Star
    0% 
    0
    1 Star
    0% 
    0
    Write a Review Ask a Question
    • Reviews (7)
    • Questions (0)

    Thank you for submitting a review!

    Your input is very much appreciated. Share it with your friends so they can enjoy it too!
    GS
    04/26/2017
    Gjorgji S.
    Canada

    Good course

    Good course, interesting material.

    CT
    02/12/2017
    Charles T.
    United States

    Certified Counterintelligence Threat Analyst

    Great course. I would recommend this for those who lack the knowledge for investigations using open source intelligence. The structure and progression of this course was very good.

    KM
    08/09/2016
    Kenneth Mackiewicz

    McAfee Institute CCTA

    Outstanding program! I highly suggest any information security professional to sign up! The customer support was top notch as well!

    SM
    07/14/2016
    Silvere Megelas

    Good introduction

    Interesting course for forensic certification: video and pdf explained concept very clearly. Recommended!

    AC
    04/13/2016
    Adam Carl

    A+

    Great informative course, kept me current on new investigation methods and best practices. A++