Certified Cyber Intelligence Investigator (CCII)

Over the last 15 years, the world has experienced a need for competent professionals who can effectively manage complex cyber issues that threaten the assets and people of corporations, public and private institutions and government.

To meet this need the McAfee Institute administers the Certified Cyber Intelligence Investigator (CCII). This remarkable group of professionals has demonstrated their competency in the areas of cyber intelligence, investigations, leadership and industry best practices through an intensive qualification and testing program. As a result, each of them is awarded the coveted designation of CCII and is recognized as leaders in their profession.

The CCII is the leading industry certification for law enforcement, loss prevention, private investigators, and fraud professionals.The skills that you will learn by studying for the CCII will help you conduct cyber investigations and critical intelligence gathering missions quicker than ever before, with more accuracy. You will learn how to identify your person of interest, conduct timely cyber investigations, and methodologies to prosecute cyber criminals regardless of their location.

You will learn topics such cyber investigations, mobile & digital forensics, e-commerce fraud, auction fraud, hacking, intelligence gathering, social media investigation methodologies, legal fundamentals and more!

Even better yet! This certification program and all the resources are completely online and self-study! No matter when you want it, where you want it, or where you are located around the world, it will be available 24/7/365.

The CCII Supports the National Cyber-Security Workforce Framework (Homeland Security)

  • The National Cybersecurity Workforce Framework supports the nation’s cybersecurity workforce development efforts.
  • The National Cybersecurity Workforce Framework provides a simple, standardized way to define cybersecurity work across multiple sectors
  • The National Cybersecurity Workforce Framework provides detailed descriptions of types of cybersecurity work, the knowledge, skills, and abilities required for each area, and descriptions of common specialties.
  • Students will graduate with the knowledge and skills that employers need
  • Colleges can create programs that are aligned to jobs,
  • Employees will have a better-defined career path and opportunities, and
  • Policy makers can set standards to promote workforce professionalization.

Now is the Time.. Join the Ranks of the Industries most Elite Cyber Investigators!

I can't urge you enough to invest in yourself and your future while learning some really neat stuff along the way. Earning the industry's top certification is rigorous, challenging, and extremely fun!

Trust me when I tell you that we are going to blow your mind and teach you things that you never thought possible! It starts with the impossible and ends with the remarkable!


Course Benefits:

  • Access: 24/7/365 Online Unlimited Access
  • Credential Earned: Board Certification
  • Availability: Desktop, Mobile, Tablet
  • Online Exam: 1 Year License Included ($350 Value)
  • Prep Review Materials: Prep Review Quizzes ($450 Value)
  • Digital Manual: Included ($299 Value)
  • CPE Credits: Included
  • Nationally Recognized Credential: NASBA, NICE & More
  • Live Mentors: Available 9-6PM CST via Chat

Bonus Items for Enrolling:

  • Exam Guarantee: Pass it or try again on us! (Value $350)
  • Keep Sake: Diploma, Padded Cover, Transcripts (Value $300)
  • Unlimited Access to our New Career Center (Value $1200): Search 1000's of Hot New Careers, Upgrade your Resume, Seek Advice and More!
  • Unlimited Coaching and Mentoring (Value $2400): Ask Advice, Questions, and More!

 Eligibility requirements:

  • Bachelor’s degree or higher plus one year of experience in e-commerce, fraud, investigations, IT, law enforcement, forensics, criminal justice, law, and/or loss prevention or other similar field or
  • Associates degree plus two years of experience or
  • High school diploma or GED plus three years of experience


Course Curriculum:

Welcome to the Certified Cyber Intelligence Investigator (C.C.I.I.)!
  • Welcome to the C.C.I.I.
  • Group Forum Discussion: Introduce Yourself!
  • Introduction (Reading Assignment)
  • Code of Ethics (Reading Assignment)
  • Resources
History and Background
  • History and Background (Reading Assignment)
  • Module 2 Quiz: History and Background
Cyber Intelligence (Overview)
  • Cyber Intelligence (Reading Assignment)
  • Module 3 Quiz: Cyber Intelligence
eCrime Investigation Methodologies
  • eCrime Methodologies (Reading Assignment
  • eCrime Investigations - Introduction
  • Where is eCrime Most Prevalent
  • Fencing Vs. eFencing
  • eCommerce Challenges to Investigating Fraudsters
  • Prosecution Challenges
  • Prosecution Requirements
  • Science Meets eCrime
  • Ebay The World's Largest Auction Platform
  • Boosters Selling on Ebay
  • Ebay Fraudsters - Let's Find Them
  • Search Results Overview
  • Ebay Listing Overview
  • Advanced eBay Search Overview
  • Auction Listing Details
  • Feedback Profile Overview
  • Auction Analysis for Fraud
  • Feedback Systems and How Fraudsters Use Them
  • Ebay Feedback Review - First 30 Days
  • Craigslist Overview
  • Craigslist Listings
  • Craigslist Investigations
  • Google Boolean Searches - Site Search
  • eCrime Tip Sheet
  • Quick Reference Guide
  • Group Forum Discussion: eBay Investigation
  • Group Forum Discussion: Craigslist Investigation
  • Module 4 Quiz: eCrime Investigations Quiz
Advanced eCrime Investigation Methodologies
  • Introduction to Advanced eCommerce Fraud
  • The Demographics of Online Fraudsters
  • Trends and Patterns of Online Fraudsters
  • The Profile of an Online Fraudster
  • Types of Auction Fraud
  • Patterns in Fraudulent Behavior
  • Research Results and Types of Auction Fraud
  • Analyze Fraudulent Behavior
  • eBay Investigations
  • eBay Auction Search Kit
  • eBay and Terapeak
  • Hot Topic Research on Terapeak
  • eBay Investigative Tips
  • Craigslist Investigation
  • Craigslist Investigation Tips
  • Facebook Marketplace (Oodle) Introduction
  • Facebook Marketplace - Searching Individuals
  • Facebook Marketplace Investigative Tips
  • Google Advanced Operators
  • Google Site Search: eforcity
  • Google Site Search
  • Email Header Information
  • Meta Data
  • eCommerce Laboratory
  • Conclusion
  • Module 5 Quiz: Advanced eCrime Investigation Methodologies
Introduction to Cyber Investigations
  • Types of Cyber Crime (Reading Assignment)
  • Intro to Cyber Investigations - Overview
  • Definitive Guide to Cyber Forensics
  • How Cyber Criminals Attack
  • Sample Preservation Letter
  • Conducting Cyber Investigations
  • Cyber Investigations 101
  • How to Investigate Email Headers
  • Conclusion & Recap
  • Module 6 Quiz: Introduction to Cyber Investigations
Interpretation of Behaviors
  • Interpretation of Behaviors (Reading Assignment)
  • Module 7 Quiz: Interpretation of Behaviors
Cyber Investigations 101
  • Cyber Investigations (Reading Assignment)
  • Module 8 Quiz: Cyber Investigations 101
Understanding the Perpetrator
  • Understanding the Perpetrator (Reading Assignment)
  • Module 9 Quiz: Understanding the Perpetrator
Email Headers and Digital Forensics
  • Cyber Forensics (Reading Assignment)
  • Investigating Email Crimes: The Who, What, When, and Where! (07:11)
  • What do we do?
  • Email Header Information
  • Email Header Extractions
  • Email Header Terms
  • Mobile Forensics Part 1
  • Mobile Forensics Part 2
  • Module 10 Quiz: Digital and Mobile Forensics
Open Source Intelligence
  • Open Source Intelligence (Reading Assignment)
  • Module 11 Quiz: Open Source Intelligence
  • Privacy (Reading Assignment)
  • Module 12 Quiz: Privacy
Basic Social Media Investigations
  • Social Media Landscape (Reading Assignment)
  • Basic Social Media Intro
  • Facebook Search
  • Locating People on Facebook
  • Facebook Profile
  • Facebook Search Tool
  • Facebook Private Profile Information
  • Twitter
  • Twitter Search
  • Twitter Mobile App
  • YouTube
  • YouTube Search
  • Google+
  • Google+ Search
  • Ethical Considerations
  • Module 13 Quiz: Basic Social Media Investigations
Advanced Social Media Investigations
  • Resources
  • An Overview of Advanced Social Media Investigations
  • Defining Open Source Intelligence
  • A World of Sock Puppets
  • Domain Names
  • Username Workflow
  • Search Engines
  • Facebook
  • Twitter
  • Instagram
  • YouTube
  • Hootsuite and SproutSocial
  • Module 14 Quiz: Advanced Social Media Investigations
Exploring the Deep Web
  • DarkWeb (Reading Assignment)
  • The Deep Web!
  • Getting Started with TOR (Step by Step)
  • Introducing the TOR Project
  • The Deep Web (Overview)
  • An Exploration 1
  • VPN Services
  • Steps to buy and set up a VPN service to remain anonymous
  • Hidden Wiki 2017
  • Black Market Links 2017
  • Deep Web Drug Markets 2017
  • Hitman and Escrow Dark Web Links 2017
  • Directories and Lists 2017
  • The Secrets Behind the TOR Browser
  • TOR Wiki (Resource)
  • What the @#$% is a Bitcoin anyway?
  • Module 15 Quiz: Deep Web
Documenting Social Media Evidence
  • Documenting Social Media Evidence (Reading Assignment)\
  • Module 16 Quiz: Documenting Social Media Evidence
Law Enforcement Efforts
  • Law Enforcement Efforts (Reading Assignment)
  • Module 17 Quiz: Law Enforcement Efforts
Legal Fundamentals of Cyber Investigations
  • Legal Fundamentals (Reading Assignment)
  • Introduction to Legal Fundamentals
  • Understanding Your Role as a Corporate Investigator
  • Understanding Your Employees Rights
  • The Electronic Communications Privacy Act
  • Understanding Law Enforcement Concerns
  • An Agent of the Law
  • Federal Laws to Prosecute CyberCrimes
  • Becoming an Expert Witness
  • Dauberts Standards, What is it?
  • Common Task of an Expert Witness
  • Preparing to Become an Expert Witness
  • Your Role as a Consultant
  • How to Prepare Your Testimony for Court
  • Preparing Forensic and Computer Evidence
  • Legal Fundamentals of Cyber Investigations Summary
  • Module 18 Quiz: Legal Fundamentals of Cyber Investigations
Digital Evidence
  • Social Media Evidence (Reading Assignment)
  • Module 19 Quiz: Digital Evidence
Setting up an Investigators Computer
  • Setting up an Investigators Computer (Reading Assignment)
  • Module 20 Quiz: Setting up the Investigators Computer
Ethical Considerations
  • Ethical Considerations (Reading Assignment)
  • Module 21 Quiz: Ethical Considerations
Advanced Searching
  • Advanced Searching (Reading Assignment)
  • Module 22 Quiz: Advanced Searching
Understanding Deception
  • Understanding Deception (Reading Assignment)
  • Module 23 Quiz: Understanding Deception
CCII Appendix
  • CCII Appendix
CCII Final Exam
  • Preparing for the Exam
  • Exam Application
  • Final Exam: CCII

      What our Students have to Say

      Customer Reviews

      Based on 17 reviews
      5 Star
      4 Star
      3 Star
      2 Star
      1 Star
      Write a Review Ask a Question
      • Reviews (17)
      • Questions (0)

      Thank you for submitting a review!

      Your input is very much appreciated. Share them with your friends so they can enjoy it too!
      Mohamed Salih

      Great course

      Great experience. I would highly recommend it.

      Greg G.
      United States

      Cyber Investigator Expert

      I Have been in Law Enforcement for 31 years. Am I familiar with some of the information; yes but there was a lot of great information that I was not aware of. I would highly recommend these courses! Greg L. Goodman

      Greg O.
      United States

      This course couldn't be more in demand and worth the price!

      First, this course is constructed like you are actually the investigator charged with discovering evidence of a crime using the same tools the criminals use when setting up their operation. Having assisted the US Secret Service in a hacker case in 1991, this course would have been invaluable had it been in existence back then. It covers many aspects of the internet and how using search engines and databases to follow trails left by criminals can result in arrests and/or convictions when the rules of evidence are followed. I would recommend this course highly if the student is planning on accelerating their career as the internet is fast becoming the go-to for criminals and scammers.

      Jeff H.
      United States


      Amazing in-depth course

      Alfred D.
      United States


      Great course and of great take away material