Your Cart is Empty

We currently have 2 seats left for this cohort. Hurry!

This Program Includes:
Official e-Courseware: ($1797 Value)
Official One-Year Online Exam License: ($997 Value)
Official Prep Review Quizzes: ($497 Value)
Official Digital Study Guide: ($350 Value)
Exam Guarantee: Pass it or try again: (Value $997)
KeepSake: Graduation Packet: ($350 Value)
Bonus #1: Career Center Access: (Value $1200)
Bonus #2: Live Instructor Support: (Value $2400)

Over the last 15 years, the world has experienced a need for competent professionals who can effectively manage complex cyber issues that threaten the assets, information, and people of our organizations, police departments, government agencies and alike.

To meet this need, the McAfee Institute administers the Certified Cyber Intelligence Investigator (CCIP). This remarkable group of professionals has demonstrated their competency in the areas of cyber intelligence, investigations, prosecution, management, leadership and industry best practice’s through an intensive qualification and testing program.

As a result, each of them is awarded the coveted designation of CCIP and is recognized as leaders in their respective professions.

The CCIP is the leading industry certification for law enforcement, loss prevention, private investigators, and fraud professionals. The skills that you will learn by studying for the CCIP will help you conduct and manage cyber investigations and critical intelligence gathering missions quicker than ever before, with more accuracy.

You will learn how to identify your person of interest, conduct timely cyber investigations, and methodologies to prosecute cyber criminals regardless of their location. Most importantly you will learn how to design, implement and manage a cyber program and team within your organization, agency or department as well.

You will learn topics such cyber investigations, mobile & digital forensics, e-commerce fraud, auction fraud, hacking, intelligence gathering, social media investigative methodologies, legal fundamentals and more!

The CCIP was Developed in Conjunction with the Dept of Homeland Security's National Cyber-Security Workforce Framework.

  • The National Cybersecurity Workforce Framework supports the nation’s cybersecurity workforce development efforts.
  • The National Cybersecurity Workforce Framework provides a simple, standardized way to define cybersecurity work across multiple sectors
  • The National Cybersecurity Workforce Framework provides detailed descriptions of types of cybersecurity work, the knowledge, skills, and abilities required for each area, and descriptions of common specialties.
  • Students will graduate with the knowledge and skills that employers need
  • Colleges can create programs that are aligned to jobs,
  • Employees will have a better-defined career path and opportunities, and
  • Policy makers can set standards to promote workforce professionalization.

Now is the Time.. Join the Ranks of the Industry's most Elite Cyber Professionals!

I can't urge you enough to invest in yourself and your future while learning some amazing stuff along the way. Earning the industry's top certification is rigorous, challenging, and incredibly fun!

Trust me when I tell you that we are going to blow your mind and teach you things that you never thought possible! It starts with the impossible and ends with the remarkable!

    The Top Reasons To Get Certified

    Career Advancement 
    Surveys consistently suggest that McAfee Institute (M.I.) Board certified professionals earn higher salaries (up to a 30% increase) and gain more opportunities for career advancement.

    Professional Opportunities 
    Certification proves to prospective employers that your expertise is confirmed by McAfee Institute, the leader in intelligence and investigative professional development.

    Proven Professional Achievement 
    Documented evidence of your professional achievement leads to recognition and respect for your abilities as an intelligence and investigative professional.

    Greater Adaptability 
    McAfee Institute Certified professionals demonstrate that they are committed to continuing education, allowing them to adapt more effectively to a rapidly changing technology environment.

    Increased Credibility 
    McAfee Institute Certification credentials increase your standing in the community by attesting to the integrity of your knowledge and skills and the reliability with which you can apply them.

    Employer Confidence 
    McAfee Institute Certifications help employers match skills to job requirements and provides confidence that employees have the right skills for the job.

    Industry Recognition 
    The high-integrity examination and certification process ensures that McAfee Institute credentials are the standard for the intelligence and investigative sectors.

    Continued Professional Growth 
    Recertification requirements, combined with a variety of learning resources, ensure that your knowledge keeps pace with a rapidly changing field.

    Who attends?

    • Intel
    • Military
    • CounterIntelligence
    • Special Operations
    • Loss Prevention
    • Fraud Investigators
    • Law Enforcement


      • Bachelor’s degree or higher plus three years of experience in investigations, IT, fraud, law enforcement, forensics, criminal justice, law, and loss prevention. OR
      • Associates degree plus four years of experience as stated above. OR
      • High school diploma or equivalency plus four years of experience as stated above.

      Also, a person convicted of a felony, any crime of moral turpitude or misdemeanor relating to honesty, theft, embezzlement, fraud or the like shall be ineligible to become a CCIP. Applicant must successfully pass the prescribed background check, which may include a criminal background check and examination process. Falsification or omission of information on the application form will be reason enough to disqualify an applicant from becoming or remaining a CCIP.


      Download the complete syllabus below.


      You have to renew the board certification every two years, once you are certified. The cost is $125 for an additional two years. CPE requirements are listed here.


      Welcome to the Certified Cyber Intelligence Professional (C.C.I.P.)!

      • Welcome to the CCIP
      • Group Forum Discussion: Introduce Yourself!
      • Introduction (Reading Assignment)
      • Code of Ethics (Reading Assignment)
      • Resources

      The History and Background of Cyber Crimes

      • History and Background (Reading Assignment)
      • Module 2 Quiz: History and Background

      Cyber Intelligence (Overview)

      • Cyber Intelligence (Reading Assignment)
      • Module 3 Quiz: Cyber Intelligence (Overview)

      Auction Fraud Investigation Methodologies

      • Auction Fraud Methodologies (Reading Assignments)
      • Auction Fraud Investigations - Introduction
      • Where is Auction Fraud Most Prevalent
      • Fencing Vs. eFencing
      • eCommerce Challenges to Investigating Fraudsters
      • Prosecution Challenges
      • Prosecution Requirements
      • Science Meets eCrime
      • Ebay The World's Largest Auction Platform
      • Boosters Selling on Ebay
      • Ebay Fraudsters - Let's Find Them
      • Ebay Listing Overview
      • Advanced Search Overview
      • Search Results Overview
      • Auction Listing Details
      • Feedback Profile Overview
      • Auction Analysis for Fraud
      • Feedback Systems and How Fraudsters Use Them
      • Ebay Feedback Review - First 30 Days
      • Craigslist Overview
      • Craigslist Listings
      • Craigslist Investigations
      • Google Boolean Searches - Site Search
      • Group Forum Discussion: eBay Investigation
      • Group Forum Discussion: Craigslist Investigation
      • Module 4 Quiz: eCrime Investigations Quiz

      Advanced eCrime Investigation Methodologies

      • Introduction to Advanced eCommerce Fraud
      • The Demographics of Online Fraudsters
      • Trends and Patterns of Online Fraudsters
      • The Profile of an Online Fraudster
      • Types of Auction Fraud
      • Patterns in Fraudulent Behavior
      • Research Results and Types of Auction Fraud
      • Analyze Fraudulent Behavior
      • eBay Investigations
      • eBay Auction Search Kit
      • eBay and Terapeak
      • Hot Topic Research on Terapeak
      • eBay Investigative Tips
      • Craigslist Investigation
      • Craigslist Investigation Tips
      • Facebook Marketplace (Oodle) Introduction
      • Facebook Marketplace - Searching Individuals
      • Facebook Marketplace Investigative Tips
      • Google Advanced Operators
      • Google Site Search: eforcity
      • Google Site Search
      • Email Header Information
      • Meta Data
      • eCommerce Laboratory
      • Conclusion
      • Module 5 Quiz: Advanced eCrime Investigation Methodologies

      Classified Investigation Methodologies

      • Classified Investigations - Introduction
      • Where is eCrime Most Prevalent
      • Fencing Vs. eFencing
      • eCommerce Challenges to Investigating Fraudsters
      • Prosecution Challenges
      • Prosecution Requirements
      • Science Meets eCrime
      • Craigslist Overview
      • Craigslist Listings
      • Craigslist Investigations
      • Google Boolean Searches (Site Search)
      • Module 6 Quiz: Classified Investigations

      Introduction to Cyber Investigations

      • Types of Cyber Crime (Reading Assignment)
      • Intro to Cyber Investigations - Overview
      • How Cyber Criminals Attack
      • Conducting Cyber Investigations
      • Cyber Investigations 101
      • How to Investigate Email Headers
      • Conclusion & Recap
      • Module 7 Quiz: Introduction to Cyber Investigations

      Exploring the Deep Web

      • DarkWeb (Reading Assignment)
      • The Deep Web!
      • Getting Started with TOR (Step by Step)
      • Introducing the TOR Project
      • The Deep Web (Overview)
      • An Exploration 1
      • VPN Services
      • Steps to buy and set up a VPN service to remain anonymous
      • Hidden Wiki 2017
      • Black Market Links 2017
      • Deep Web Drug Markets 2017
      • Hitman and Escrow Dark Web Links 2017
      • Directories and Lists 2017
      • The Secrets Behind the TOR Browser
      • TOR Wiki (Resource)
      • What the @#$% is a Bitcoin anyway?
      • Module 8 Quiz: Deep Web

      Interpretation of Cyber Criminal Behaviors

      • Interpretation of Behaviors (Reading Assignment)
      • Module 9 Quiz: Interpretation of Behaviors

      Cyber Investigations 101

      • Cyber Investigations (Reading Assignment)
      • Module 10 Quiz: Cyber Investigations 101

      Understanding The Cyber Criminal

      • Understanding the Perpetrator (Reading Assignment)
      • Module 11 Quiz: Understanding the Perpetrator

      An Exploration into Email Headers and Digital Forensics

      • Cyber Forensics (Reading Assignment)
      • Investigating Email Crimes: The Who, What, When, and Where!
      • What do we do?
      • Email Header Information
      • Mobile Forensics Part 1
      • Mobile Forensics Part 2
      • Module 12 Quiz: Digital and Mobile Forensics

      Open Source Intelligence Methodologies

      • Open Source Intelligence (Reading Assignment)
      • Module 13 Quiz: Open Source Intelligence

      Privacy Concerns

      • Privacy (Reading Assignment)
      • Module 14 Quiz: Privacy

      Basic Social Media Investigations

      • Social Media Landscape (Reading Assignment)
      • Basic Social Media Intro
      • Facebook Search
      • Locating People on Facebook
      • Facebook Profile
      • Facebook Search Tool
      • Facebook Private Profile Information
      • Twitter
      • Twitter Search
      • Twitter Mobile App
      • YouTube
      • YouTube Search
      • Google+
      • Google+ Search
      • Ethical Considerations
      • Module 15 Quiz: Basic Social Media Investigations

      Advanced Social Media Investigations

      • Resources
      • An overview of Advanced Social Media Investigations
      • Defining Open Source Intelligence
      • A World of Sock Puppets
      • Domain Names
      • Username Workflow
      • Search Engines
      • Facebook
      • Twitter
      • Instagram
      • YouTube
      • Hootsuite and SproutSocial
      • Module 16 Quiz: Advanced Social Media Investigations

      Documenting Social Media Evidence

      • Social Media Evidence (Reading Assignment)
      • Module 17 Quiz: Documenting Social Media Evidence

      Chatting Up Your Person of Interest

      • Introduction to Video Chat Platforms
      • Skype Sign Up
      • Web Platform and Features
      • Skype App and Searching
      • Google Hangouts Intro
      • Google Plus
      • Hangouts Tutorial
      • Google Hangouts Mobile
      • Oovoo
      • Oovoo Chat Window
      • Facetime
      • Tango
      • Module 18 Quiz: Chatting Up Your Person of Interest

      How to Conduct Investigations on Dating Websites

      • Dating Site Introduction
      • Doing a Basic Search on Plenty of Fish
      • Plenty of Fish Advanced Search
      • Searching for a Username on Plenty of Fish
      • Searching the Forums in Plenty of Fish
      • Match.com Login and Overview
      • Match.com Search Functions
      • What about Google Site Search
      • Module 19 Quiz: Dating Sites

      Law Enforcement Efforts

      • Law Enforcement Efforts (Reading Assignment)
      • Module 20 Quiz: Law Enforcement Efforts

      Legal Fundamentals of Cyber Investigations

      • Legal Fundamentals (Reading Assignment)
      • Introduction to Legal Fundamentals
      • Understanding Your Role as a Corporate Investigator
      • Understanding Your Employees Rights
      • The Electronic Communications Privacy Act
      • Understanding Law Enforcement Concerns
      • An Agent of the Law
      • Federal Laws to Prosecute CyberCrimes
      • Becoming an Expert Witness
      • Dauberts Standards, What is it?
      • Common Task of an Expert Witness
      • Preparing to Become an Expert Witness
      • Your Role as a Consultant
      • How to Prepare Your Testimony for Court
      • Preparing Forensic and Computer Evidence
      • Summary
      • Module 21 Quiz: Legal Fundamentals of Cyber Investigations

      How to Utilize Informants

      • Introduction to Informants
      • Informants Pt. 2: Suitability
      • Informants Pt. 3: Trust and Confidentiality
      • Informants Pt. 4: Safe Handling of Informants
      • Informants Pt 5: Legal Liabilities
      • Module 22 Quiz: Informants
      • How to Preserve and Secure Digital Evidence
      • Digital Evidence (Reading Assignment)
      • Module 23 Quiz: Digital Evidence

      Setting Up An Investigators Computer

      • Setting Up An Investigators Computer (Reading Assignment)
      • Module 24 Quiz: Setting Up an Investigator's Computer

      Ethical Considerations for Cyber Investigators

      • Ethical Considerations (Reading Assignment)
      • Module 25 Quiz: Ethical Considerations

      Advanced Searching Methodologies to Locate Hidden Information

      • Advanced Searching (Reading Assignment)
      • Module 26 Quiz: Advanced Searching

      Understanding Deception

      • Understanding Deception (Reading Assignment)
      • Module 27 Quiz: Deception

      Program Design and Development

      • Program Design and Development (Reading Assignment)
      • Module 28 Quiz: Program Development

      CCIP Appendix

      • CCIP Appendix

      CCIP Final Exam

      • Preparing for the Exam
      • Exam Application
      • Final Exam: CCIP

      Industry Recognized