The MOST Comprehensive, engaging, and realistic cyber investigation training the industry has seen. EVER. We prepare you for real-life scenarios and success!

Certified Cyber Investigative Expert (CCIE)

Certified Cyber Investigations Expert's (CCIE's) are the industry’s Most Elite Cyber Investigators that are trained in advanced and state of the art methodologies to identify, investigate and resolve the most complex cyber crimes known to man. They are Simply the Best of the Best! Let me tell you about the program and how to earn your credential and board certification!

This is an exciting online Professional Board Certification focused on enhancing your skill sets as a "Cyber Investigations Expert" which takes a blended learning approach of self-study, live interactions, and instructor lead investigative exercises that will help you to learn how to conduct successful cyber investigations with effective new concepts to prosecute the guilty.

We are taking over 25 years of hands-on experience of conducting cyber-investigations from the private, public, and government sectors around the world and sharing with you, our insights into what contributes to success and failures.

This program contains hundreds of hours of online video based training; online prep review quizzes to prepare you for the final exam, and, of course, the necessary study manuals as well to help you along the way.

It does not matter if you are Law Enforcement, Loss Prevention, Fraud, Intelligence, Cyber Security, I.T Security or Private Investigation you will learn a ton of new concepts and investigative methodologies that you can apply immediately to your role and come out on top.

The CCIE Board Certification Program combines the following 5 Board Certifications which you will take along the journey of learning this expert level certification:

  1. Certified Cyber Intelligence Professional (CCIP)
  2. Certified Counterintelligence Threat Analyst (CCTA)
  3. Certified Organized Retail Crime Investigator (CORCI)
  4. Certified Social Media Intelligence Analyst (SMIA)
  5. Certified eCommerce Fraud Investigator (CEFI)

 

Course Benefits:

  • Access: 24/7/365 Online Unlimited Access
  • Time to Complete Program: You have 1 year to complete the program
  • Credential Earned: Board Certification
  • Availability: Desktop, Mobile, Tablet
  • Prep Review Quizzes:($500 Value)
  • CPE Credits: Included
  • Nationally Recognized Credential: NASBA, NICE & More
  • Live Mentors: Available 9-6PM CST via Chat

Bonus Items for Enrolling Today:

  • Bonus 1: CCIE - Diploma, M.I. Padded Cover, & Transcripts (Value $300)
  • Bonus 2: Exam Guarantee - Pass it or try again on us! (Value $450)
  • Bonus 3: CCIE - Digital Study Manual (Value $299)
  • Bonus 4: eBook - Ultimate Guide to Open Source Intelligence (Value $299)

 

Eligibility requirements:

  • Bachelor’s degree or higher plus four years of experience in e-commerce, fraud, investigations, IT, law enforcement, forensics, criminal justice, law, and loss prevention or
  • Associates degree plus six years of experience or
  • High school diploma or GED plus seven years of experience

Also, a person convicted of a felony, any crime of moral turpitude or misdemeanor relating to honesty, theft, embezzlement, fraud or the like shall be ineligible to become a CCIE®. Applicant must provide a copy of certified transcript of education ONLY if using college degree rather than experience to qualify. Applicant must successfully pass the prescribed background check, which may include a criminal background check and examination process. Falsification or omission of information on the application form will be reason enough to disqualify an applicant from becoming or remaining a Certified Cyber Investigations Expert.

 

Course Curriculum:

Welcome to the Certified Cyber Investigations Expert
  • Welcome to the CCIE
  • Group Forum Discussion: Introduce Yourself!
  • Introduction (Reading Assignment)
  • Code of Ethics (Reading Assignment)
  • Course Materials / Downloads
History and Background
  • CCIE History & Background Manual
  • Module 2 Quiz: History and Background
Cyber Intelligence (Overview)
  • Cyber Intelligence (Reading Assignment)
  • Module 3 Quiz: Cyber Intelligence
eCrime Investigation Methodologies
  • eCommerce Investigation Methodologies (Reading Assignment)
  • eCrime Investigations - Introduction
  • Where is eCrime Most Prevalent
  • Fencing Vs. eFencing
  • eCommerce Challenges to Investigating Fraudsters
  • Prosecution Challenges
  • Prosecution Requirements
  • Science Meets eCrime
  • Ebay The World's Largest Auction Platform
  • Boosters Selling on Ebay
  • Ebay Fraudsters - Let's Find Them
  • Ebay Listing Overview
  • Advanced eBay Search Overview
  • eBay Search Results Overview
  • Auction Listing Details
  • Feedback Profile Overview
  • Auction Analysis for Fraud
  • Feedback Systems and How Fraudsters Use Them
  • eBay Feedback Review - First 30 Days
  • Craigslist Overview
  • Craigslist Listings
  • Craigslist Investigations
  • Google Boolean Searches - Site Search
  • Group Forum Discussion: eBay Investigation
  • Group Forum Discussion: Craigslist Investigation
  • Module 4 Quiz: eCrime Investigations Quiz
Advanced eCrime Investigation Methodologies
  • Introduction to Advanced eCommerce Fraud
  • The Demographics of Online Fraudsters
  • Trends and Patterns of Online Fraudsters
  • The Profile of an Online Fraudster
  • Types of Auction Fraud
  • Patterns in Fraudulent Behavior
  • Research Results and Types of Auction Fraud
  • Analyze Fraudulent Behavior
  • eBay Investigations
  • eBay Auction Search Kit
  • eBay and Terapeak
  • Hot Topic Research on Terapeak
  • eBay Investigative Tips
  • Craigslist Investigations
  • Craigslist Investigation Tips
  • Facebook Marketplace (Oodle) Introduction
  • Facebook Marketplace - Searching Individuals
  • Facebook Marketplace Investigative Tips
  • Google Advanced Operators
  • Google Site Search: eforcity
  • Google Site Search
  • Email Header Information
  • Meta Data
  • eCommerce Laboratory
  • Advanced eCrime Investigation Conclusion
  • Module 5 Quiz: Advanced eCrime Investigation Methodologies
Classified Investigation Methodologies
  • Classified Investigations - Introduction
  • Where is eCrime Most Prevalent
  • Fencing Vs. eFencing
  • eCommerce Challenges to Investigating Fraudsters
  • Prosecution Challenges
  • Science Meets eCrime
  • Craigslist Overview
  • Craigslist Listings
  • Craigslist Investigations
  • Google Boolean Searches (Site Search)
  • Module 6 Quiz: Classified Investigations Quiz
Introduction to Cyber Investigations
  • Types of Cyber Crime (Reading Assignment)
  • Intro to Cyber Investigations - Overview
  • How Cyber Criminals Attack
  • Conducting Cyber Investigations
  • Cyber Investigations 101
  • How to Investigate Email Headers
  • Conclusion & Recap
  • Module 7 Quiz: Introduction to Cyber Investigations
Exploring the Deep Web
  • DarkWeb (Reading Assignment)
  • The Deep Web!
  • Getting Started with TOR (Step by Step)
  • Introducing the TOR Project
  • The Deep Web (Overview)
  • An Exploration 1
  • VPN Services
  • Steps to buy and set up a VPN service to remain anonymous
  • Hidden Wiki 2017
  • Black Market Links 2017
  • Deep Web Drug Markets 2017
  • Hitman and Escrow Dark Web Links 2017
  • Directories and Lists 2017
  • The Secrets Behind the TOR Browser
  • TOR Wiki (Resource)
  • What the @#$% is a Bitcoin anyway?
  • Module 8 Quiz: Deep Web
Interpretation of Behaviors
  • Interpretation of Behaviors (Reading Assignment)
  • Module 9 Quiz: Interpretation of Behaviors
Cyber Investigations 101
  • Cyber Investigations (Reading Assignment)
  • Module 10 Quiz: Cyber Investigations 101
Understanding the Perpetrator
  • Understanding the Perpetrator (Reading Assignment)
  • Module 11 Quiz: Understanding the Perpetrator
Email Headers and Digital Forensics
  • Cyber Forensics (Reading Assignment)
  • Investigating Email Crimes: The Who, What, When, and Where!
  • What do we do?
  • Email Header Information
  • Mobile Forensics Part 1
  • Mobile Forensics Part 2
  • Module 12 Quiz: Digital and Mobile Forensics
Open Source Intelligence
  • Open Source Intelligence (Reading Assignment)
  • Module 13 Quiz: Open Source Intelligence
Privacy
  • Privacy (Reading Assignment)
  • Module 14 Quiz: Privacy
Basic Social Media Investigations
  • Social Media Landscape (Reading Assignment)
  • Basic Social Media Intro
  • Facebook Search
  • Locating People on Facebook
  • Facebook Profile
  • Facebook Search Tool
  • Facebook Private Profile Information
  • Twitter
  • Twitter Search
  • Twitter Mobile App
  • YouTube
  • YouTube Search
  • Google+
  • Google+ Search
  • Ethical Considerations
  • Module 15 Quiz: Basic Social Media Investigations
Advanced Social Media Investigations
  • Resources
  • An overview of Advanced Social Media Investigations
  • Defining Open Source Intelligence
  • A World of Sock Puppets
  • Domain Names
  • Username Workflow
  • Search Engines
  • Facebook
  • Twitter
  • Instagram
  • YouTube
  • Hootsuite and SproutSocial
  • Module 16 Quiz: Advanced Social Media Investigations
Legal Fundamentals of Cyber Investigations
  • Legal Fundamentals (Reading Assignment)
  • Introduction to Legal Fundamentals
  • Understanding Your Role as a Corporate Investigator
  • Understanding Your Employees Rights
  • The Electronic Communications Privacy Act
  • Understanding Law Enforcement Concerns
  • An Agent of the Law
  • Federal Laws to Prosecute CyberCrimes
  • Becoming an Expert Witness
  • Daubert's Standards, What is it?
  • Common Task of an Expert Witness
  • Preparing to Become an Expert Witness
  • Your Role as a Consultant
  • How to Prepare Your Testimony for Court
  • Preparing Forensic and Computer Evidence
  • Legal Fundamentals of Cyber Investigations Summary
  • Module 17 Quiz: Legal Fundamentals of Cyber Investigations
Documenting Social Media Evidence
  • Documenting Social Media Evidence (Reading Assignment)
  • Module 18 Quiz: Documenting Social Media Evidence
Chatting Up Your Person of Interest
  • Introduction to Video Chat Platforms
  • Skype Sign Up
  • Web Platform and Features
  • Skype App and Searching
  • Google Hangouts Intro
  • Google Plus
  • Hangouts Tutorial
  • Google Hangouts Mobile
  • Oovoo
  • Oovoo Chat Window
  • Facetime
  • Tango
  • Module 19 Quiz: Chatting Up Your Person of Interest
What Do We Do With Dating Sites
  • Dating Site Introduction
  • Doing a Basic Search on Plenty of Fish
  • Plenty of Fish Advanced Search
  • Searching for a Username on Plenty of Fish
  • Searching the Forums in Plenty of Fish
  • Match.com Login and Overview
  • Match.com Search Functions
  • What about Google Site Search
  • Module 20 Quiz: Dating Sites
How to Utilize Informants
  • Introduction to Informants
  • Informants Pt. 2: Suitability
  • Informants Pt. 3: Trust and Confidentiality
  • Informants Pt. 4: Safe Handling of Informants
  • Informants Pt 5: Legal Liabilities
  • Module 21 Quiz: Informants
Law Enforcement Efforts
  • Law Enforcement Efforts (Reading Assignment)
  • Module 22 Quiz: Law Enforcement Efforts
Digital Evidence
  • Digital Evidence (Reading Assignment)
  • Module 23 Quiz: Digital Evidence
Setting up an investigators computer
  • Setting up an investigators computer (Reading Assignment)
  • Module 24 Quiz: Setting up the Investigators Computer
Ethical Considerations
  • Ethical Considerations (Reading Assignment)
  • Module 25 Quiz: Ethical Considerations
Advanced Searching
  • Advanced Searching (Reading Assignment)
  • Module 26 Quiz: Advance Searching
Deception
  • Understanding Deception (Reading Assignment)
  • Module 27 Quiz: Deception
Program Design and Development
  • Program Design and Development (Reading Assignment)
  • Module 28 Quiz: Program Development
Introduction to ORC Investigations
  • Welcome to Organized Retail Crime
  • Introduction to ORC (Reading Assignment)
  • How we Create Influential Leaders!
  • What is the Journey Going to be Like?
  • Are You a Super Guru in the Making?
Organized Retail Crime Overview
  • ORC Overview (Reading Assignment)
  • What is the Definition of ORC?
  • What is Our Idea of ORC?
  • ORC: How Do They Do It?
  • Module 30 Quiz: ORC Overview
Organized Retail Crime Fraud Schemes
  • ORC Fraud Schemes (Reading Assignment)
  • What Industries Does ORC Impact?
  • What are The Top Cities and Products for ORC?
  • Module 31 Quiz: ORC Fraud Schemes
Booster Operations
  • Booster Operations (Reading Assignment)
  • What Is a Booster and What Do They Do?
  • What Tools Does a Booster Use?
  • What are The Different Levels of a Booster?
  • Module 32 Quiz: Booster Operations
Fencing Operations
  • Fencing Operations (Reading Assignments)
  • What is a Fence?
  • How Do We Stop ORC?
  • The Struggles: Don't Give Up!
  • Module 33 Quiz: Fencing Operations
Organized Retail Crime Investigations
  • Introduction to ORC Investigations
  • What will we learn today?
  • How to Investigate Organized Retail Crime
  • How to Educate and Train...
  • What Kind of Visual Deterrents to Use to Stop ORC!
  • What Kind of Physical Deterrents Can You Use to Stop ORC!
  • How to Decide Correct Camera Placement!
  • What to Know about Merchandise Tagging!
  • Make Sure You Know the Reporting Methods!
  • How Are You Doing the Investigation?
  • The ORC Theory and Research Facts!
  • Look at Your Options!
  • Can You Identify an Investigation Route?
  • Know the Case Enhancement!
  • What is Needed for the Investigation
  • How is Shoplifting Successful and How We Stop It?
  • How to Investigate Check Fraud?
  • Is Your Credit Card Safe?
  • Investigating Gift Card Deception!
  • Is That a Legitimate Refund?
  • Did You Make Your Coupon?
  • Walking Through a Practical Investigation!
Organized Retail Crime Investigations Part 2
  • Are You Articulating Your Documentation?
  • Do You Have Evidence of a Fence?
  • What about Overseas Sales?
  • Introduction and What You Will Learn!
  • Taking Down the Crew!
  • Do You Have the Correct Information?
  • Taking the Right Photographs
  • Interview and Interrogation (Reading Assignment)
  • Completing the Interview and Interrogation
  • Make Sure You Obtain a Written Statement!
  • How do They Establish a Fencing Operation?
  • What are the Different Levels of a Fence?
  • What do Fence Locations Look Like?
  • What is E-fencing?
  • Using Surveillance to Track Your Suspect!
  • Use Cellphone Records to Tie Your Suspect to the Case
  • Do You Use Merchandise Tracking?
  • Do You Know How to Develop Your Informant?
  • Conducting Buys and Sales!
  • Investigation of a Fence!
  • Types of Gateway Crimes?
  • Here is a Practical Exercise!
  • Here are the Subpoenas and Search and Seizures!
Surveillance Methods
  • Surveillance Methods (Preliminary)
  • Mobile Surveillance & Prep
Legal Fundamentals of Organized Retail Crime
  • ORC Legal Aspects (Reading Assignment)
  • Intro to Legal Fundamentals of Organized Retail Crime and What You Will Learn!
  • What Types of Crimes Occur?
  • What are the Different Types of Courts?
  • What Bills and Acts Help Fight ORC?
  • Prosecuting the Criminal!
  • What about Court Orders?
  • Computer Forensic Types of Evidence!
  • Collecting Photographic Evidence for Your Case!
  • What Evidence do You Have of a Fence?
  • What is the Charging Process?
  • Learn How to be an Expert Witness!
  • How to Prepare for the Verdict!
  • Make Sure You Review Your Case!
  • Module 37 Quiz: ORC Legal
ORC Prevention and Deterrence
  • ORC Prevention(Reading Assignment)
  • ORC Appendix
  • ORC Appendix and References
Introduction to Cyber Counterintelligence
  • Welcome to the Cyber Counterintelligence Threat Analysis Program!
  • Group Forum Discussion: Research
Intelligence Overview
  • Types of Cyber Crime (Reading Assignment)
  • Intro to Cyber Investigations - Overview
  • How Cyber Criminals Attack
  • Conducting Cyber Investigations
  • Cyber Investigations 101
  • How to Investigate Email Headers
  • Intro to Cyber Investigations Conclusion
  • Quiz: Introduction to Cyber Investigations
Applying Intelligence Methodologies
  • Applying Intelligence Methodologies
  • Assignment: Applying Intelligence
Cyber Terrorism & Hackers
  • Cyber Terrorism in the News
  • Counter Terrorism
Cyber Threats & Concerns
  • Cyber Threat Concerns
CCIE Appendix
  • CCIE Appendix
Final Exam
  • Preparing for the Exam
  • Exam Application
  • Final Exam: CCIE

      Globally Recognized As Seen on



      What our Students have to Say

      Customer Reviews

      Based on 15 reviews
      5 Star
      67% 
      10
      4 Star
      33% 
      5
      3 Star
      0% 
      0
      2 Star
      0% 
      0
      1 Star
      0% 
      0
      Write a Review Ask a Question
      • Reviews (15)
      • Questions (0)

      Thank you for submitting a review!

      Your input is very much appreciated. Share it with your friends so they can enjoy it too!
      ML
      06/08/2017
      Michael L.
      United States

      Awesome Training

      This is a great course, and the content was extremely relevant to current industry fraud issues. I learned an incredible amount, and immediately started implementing some of my learnings to current investigations, and routines.

      VJ
      05/26/2017
      venetcia j.
      United States

      CCIE Course

      I thoroughly enjoyed the CCIE course! I learned many new concepts and techniques that are transferable to my day to day work responsibilities. I would definitely tell all of my friends/colleagues about McAfee.

      HN
      05/15/2017
      Harry N.

      CCIE

      Just started on this course but very impressed with the amount of useful and varied information… Looking forward to progressing the course and improving my knowledge.

      SL
      01/26/2017
      Stephen L.
      United Kingdom

      CCIE review - Langley

      Well even with all of my experience and expertise it was great participating in this course to enhance my knowledge through a multitude of dicisplines. More importantly I have a great understanding of conducting and working with this environment especially within a global prespective.

      M
      01/04/2017
      Mani
      India

      Fees

      Very expensive