Certified Cyber Threat Forensic Investigator (CTFI)

The Cyber-Threat Forensic Investigator (CTFI): provides students the essential domain knowledge required to serve in decision-making roles throughout the cyber-security industry. Students will learn how to analyze cyber-security risks, develop appropriate protection & response options, and assess operational requirements for government, military, critical infrastructure, retail and commercial missions. Upon completing the board certification, students will possess advanced knowledge of the strategy, policy, investigation, intelligence, prosecution and analytic aspects of cyber-security, enabling them to fill critical roles in operational cyber-security investigative missions supporting both retail and governmental entities.
“The CTFI is a subject matter expert on cyber threats, investigations, forensic examination & prosecution”

The McAfee Institute has found that cyber-security work involves more than traditional IT skills. Cyber security work also includes the identification, investigation, prosecution, root cause analysis, trends and intelligence / counterintelligence methodologies to understand how perpetrators think, act and carry out their attacks. By becoming a CTFI you will possess a wide array of technical IT skills as well as advanced investigative, intelligence, counterintelligence, prosecution and analytical capabilities.

There are thousands of cyber-security jobs across the country, so opportunity abounds! The field will grow 22% by 2020 and according to the NICCS Cybersecurity Professionals Salaries can range between $70,000 -$118,000 and up!

Students will be able to:

  • Discuss in depth the origins, nature, and current issues in cyber-security and its related activities using precise terminology
  • Apply a range of cyber intelligence and investigative concepts to mitigate risks in cyber-security operations and prosecute instances of attacks
  • Develop and apply decision frameworks using the guidelines of cyber-security, investigations ethics, law, and strategy
  • Design strategies for development of an effective cyber-security, intelligence, and investigation workforce
  • Analyze technical and operational requirements for future cyber-security & investigation systems
  • Compare and contrast international cyber-security and investigation policies, strategies, and capabilities
  • Identify the missions, authorities, and responsibilities of key cyber-security organizations within the international community
  • Apply the theory of cyber deterrence in developing future cyber-security strategies and policies
  • Analyze and apply lessons from prominent international cyber-security case studies, investigations and prosecutions

The CTFI Supports the National Cyber-Security Workforce Framework (Homeland Security)

The goal of the McAfee Institute CTFI Board Certification is to prepare students for a successful career upon graduation. A resource that helps our students prepare for these types of careers is our partnership with the National Cyber-Security Workforce Framework led by Homeland Security.

Our CTFI program adheres to these guidelines and learning to ensure you receive the industries best training available. It plays an important role for future cyber-security professionals by providing information on hands-on learning, internship opportunities, and outlining key cyber-security knowledge and skills.


Course Benefits:

  • Access: 24/7/365 Online Unlimited Access
  • Credential Earned: Board Certification
  • Availability: Desktop, Mobile, Tablet
  • Online Exam: 1 Year License Included ($350 Value)
  • Prep Review Materials: Prep Review Quizzes ($450 Value)
  • Digital Manual: Included ($299 Value)
  • CPE Credits: Included
  • Nationally Recognized Credential: NASBA, NICE & More
  • Live Mentors: Available 9-6PM CST via Chat

Bonus Items for Enrolling Today:

  • Exam Guarantee: Pass it or try again on us! (Value $350)
  • Keep Sake: Diploma, Padded Cover, Transcripts (Value $300)


Eligibility requirements:

  • Bachelor's degree and 3 years of experience in investigations, computers, loss prevention, fraud, law enforcement, I.T Security or
  • Associates degree and 5 years of experience or
  • High School Diploma and 7 years of experience.

In addition, a person convicted of a felony, any crime of moral turpitude or misdemeanor relating to honesty, theft, embezzlement, fraud or the like shall be ineligible to become a CTFI®. Applicant must provide a copy of certified transcript of education ONLY if using college degree rather than experience to qualify.

Applicant must successfully pass the prescribed background check, which may include a criminal background check and examination process.

Falsification or omission of information on the application form will be reason enough to disqualify an applicant from becoming or remaining a CTFI.


Course Curriculum:

Welcome to the CTFI Board Certification Program!
  • Introduction to the CTFI
  • Group Forum Discussion: Introduce Yourself!
  • Code of Ethics (Reading Assignment)
  • Course Resources
Introduction to Cybersecurity
  • Intro to Cyber Investigations
  • How Cyber Criminals Attack
  • Conducting Cyber Investigations
  • Cyber Investigations 101
  • How to Investigate Email Headers
  • Conclusion / Recap
  • Introduction to Cyber Security Quiz
Introduction to Cyber Warfare
  • Introduction to Cyber Warfare
  • Cyber Warfare (Reading Assignment)
  • Cyber Warfare Quiz
Global Cyber Capabilities and Trends
  • Global Cyber Capabilities and Trends
  • Discussion Assignment: Global Cyber Capabilities and Trends
Global Cyber Threats, Attacks, Vehicles, and Mechanisms (Hacking 101)
  • Cyber Threats - Attacks - Vehicles
  • Reading assignment
  • Global Threats - Prep Review Quiz
Cyber Threat Modeling
  • Threat Modeling Overview
  • Definitions and Motivations
  • Organizational Pre-requisites
  • Scoping the Effort and Kicking Off the Process
  • Identifying External Dependencies and Specifying Use Cases
  • Threat Generation, Threat Analysis, and Threat Response
  • Reporting
  • Microsoft's Threat Modeling: Reading Assignment
  • Additional Resources: External Links
  • Cyber Threat Modeling Prep Review Quiz
IT. Security Systems
  • Introduction to I.T Security
  • Information Security Awareness
  • Top Hackers Show us How it's done!
  • 7 Things Every CEO Should Know About Information Security
  • Discussion
Intrusions & Attacks: Cyber Attacks on Retailers
  • Attacks on Retailers: Target Breach
  • Inside a Target Breach
  • Point of Sale System Breaches
  • Discussion-Cyber Attacks on Retailers
Intrusions & Attacks: Personal Information Breaches
  • Intrusion Attacks on Personal Information (Reading Assignment)
  • Top 9 Web Hacking Techniques
  • 5 Most Dangerous New Hacking Techniques
  • Drinkman Indictment
  • Discussion-Drinkman
Intrusions & Attacks: Cyber Attacks on Government
  • Cyber Attacks on Government (Reading Assignment)
  • Cyber Attacks on Government Prep Review Quiz
Intrusions & Attacks: Cyber Attacks on Law Enforcement
  • Discussion
Intrusions & Attacks: Memory Scraping - Parsing Malware
  • Memory & Malware (Reading Assignment)
  • Debugging Software Memory (Reading Assignment)
  • Discussion
Credit Card Fraud: Payment Processing (e-commerce fraud)
  • eCommerce Fraud & Credit Card Processing
  • Case Study: Home Depot Breach
  • Case Study 2: Update Home Depot Breach
  • Financial Investigations Cheat Sheet
  • eCommerce Fraud: Prep Review Quiz
Investigative Methods: Digital & Computer Forensics
  • Definitive Guide to Digital Forensics
  • Investigating Email Crimes
  • Examining Email Messages
  • Viewing Email Headers
  • Mobile Forensics
  • Forensic Examination of Mobile Devices
  • Digital Forensics: Prep Review Quiz
Investigative Methods: Exploring TOR and the Deep Web
  • The Deep Web!
  • Getting Started with TOR
  • Introducing the TOR Project
  • The Secrets Behind the TOR Browser
  • The Deep Web (Fun Overview)
  • Exploration 1
  • Deep Web: Prep Review Quiz
Investigative Methods: Using Open Source Intelligence
  • Open Source Intelligence (Reading Assignment)
  • Exploring Open Source Intelligence
  • Prep Review Quiz: OSINT
Investigative Methods: Background Investigations
  • Discussion-Background Investigations
Cyber Intelligence & Counterintelligence Operations
  • Counter-Intelligence Methodologies
  • Cyber Terrorism in the News
  • Cyber Counter-Terrorism
  • Cyber Threat Concerns
  • Discussion
Intelligence Methodologies: How to gather intelligence
  • Intelligence Methodologies (Reading Assignment)
  • How to Gather Intelligence - Introduction
  • How to Gather Intelligence - Basic Concepts
  • How To Gather Intelligence - Intel as a Continuous Cycle
  • How to Gather Intelligence - Intel Disciplines
  • How to Gather Intelligence - Threat Intel Landscape
  • How to Gather Intelligence - The Threat Intelligence Journey
  • How to Gather Intelligence - Special Considerations
  • Prep Review Quiz: Intelligence Methodologies
Intelligence Methodologies: Where cyber criminals sell their data & information
  • Gathering Intelligence on Carding Forums
  • Discussion
Intelligence Methodologies: How to Gather Intelligence on Social Media Websites
  • An Overview of Social Media Investigations
  • Social Media Demographics
  • Criminals on Facebook
  • How to be Successful in Social Media Investigations
  • How to Locate Accomplices & Co-conspirators (Belief Propagation)
  • Live Tutorial: Profile Information
  • Facebook Intelligence: The Friends List
  • Facebook Intelligence: The Conversation Wall
  • Facebook Information Tab
  • Live Tutorial: Facebook Wall
  • Facebook Timeline
  • How to Gather Intelligence in Facebook Groups
  • How Fraudsters Create Phishing Schemes
  • How to Avoid the Pitfalls of Private Profiles
  • Subpoenas & Search Warrants
  • How to Locate People on MySpace
  • MySpace Intelligence: Gather Information on the Profile Wall
  • MySpace Intelligence: Details in the Friends List
  • How to Find People on Bebo
  • How to Gather Intelligence from the Bebo Profile
  • Bebo: An Overview Into the Friends List
  • Bebo: A Look Into the Details in Groups
  • LinkedIn: Gathering Intelligence from the Profile
  • Using the Power of Google on LinkedIn
  • How to Use Google's Site Search Effectively for Cyber Investigations
  • How to Utilize Google's Double Quotes
  • What are the Ethical Considerations When doing Social Media Investigations
  • Tools and Resources Available for Social Media Investigations
  • In Conclusion
  • Final Quiz - Basic Social Media Investigations
Intelligence Methodologies: How to Gather Intelligence on eCommerce & Auction Websites
  • eCommerce Fraud Investigations (Reading Assignment)
  • eCrime Investigations - Introduction
  • Where is eCrime Most Prevalent
  • Fencing Vs. eFencing
  • eCommerce Challenges to Investigating Fraudsters
  • Prosecution Challenges
  • Prosecution Requirements
  • Science Meets eCrime
  • eBay The World's Largest Auction Platform
  • Boosters Selling on eBay
  • eBay Fraudsters - Let's Find Them
  • eBay Listing Overview
  • Advanced Search Overview
  • Search Results Overview
  • Auction Listing Details
  • Feedback Systems and How Fraudsters Use Them
  • Ebay Feedback Review - First 30 Days
  • Craigslist Overview
  • Craigslist Listings
  • Craigslist Investigations
  • Google Boolean Searches - Site Search
  • Discussion-eBay Investigation
  • Discussion-Craigslist Investigation:
  • Quiz: eCrime Investigations Quiz
Intelligence Methodologies: How to Gather Intelligence on Chat Websites and Applications
  • Introduction to Gathering Intelligence on Mobile Apps
  • Skype Sign Up
  • Web Platform and Features
  • Skype App and Searching
  • Google Hangouts Intro
  • Google Plus
  • Hangouts Tutorial
  • Google Hangouts Mobile
  • Oovoo
  • Oovoo Chat Window
  • Gathering Intel on Facetime
  • Gathering Intel on Tango
  • Quiz: Chatting Up Your Person of Interest
Counterintelligence Methodologies: 200+ of the Best Open Source Intelligence Resources
  • The Ultimate Guide to OSINT (Reading Assignment)
Preparation & Response: Data Breach Preparedness
  • How to Prepare for Data Breaches
  • Data Breach Preparedness (Reading Assignment)
  • Prep Review Quiz
Preparation & Response: Preparedness Plan Audit
  • Preparedness Plan Audit Overview
  • Preparedness Plan Audit (Reading Assignment)
  • Discussion-Audit
  • Preparation & Response: Data Breach Incident responses
  • Incident Response (Reading Assignment)
  • Prep Review Quiz
Preparation & Response: Notification and Disclosure
  • Data Breach Notifications and Disclosure
  • Data Breach Notification and Protection Act
  • Data Breach Charts
  • Discussion
Legal Considerations
  • Introduction to Legal Fundamentals
  • Understanding Your Role as an Investigator
  • Understanding Your Employees Rights
  • The Electronic Communications Privacy Act
  • Understanding Law Enforcement Concerns
  • An Agent of the Law
  • Federal Laws to Prosecute CyberCrimes
  • Legal Considerations Quiz
Search and Seizure
  • Search and Seizure Intro
  • Search and Siezure (Reading Assignment)
Expert Witness Testimony
  • Becoming an Expert Witness
  • Dauberts Standards, What is it?
  • Common Task of an Expert Witness
  • Preparing to Become an Expert Witness
  • Your Role as a Consultant
  • How to Prepare Your Testimony for Court
  • Preparing Forensic and Computer Evidence
  • Summary
Final Exam
  • Final Exam Preparation
  • Exam Application
  • Final Exam: CTFI

What our Students have to Say

Customer Reviews

Based on 5 reviews
5 Star
4 Star
3 Star
2 Star
1 Star
Write a Review Ask a Question
  • Reviews (5)
  • Questions (0)

Thank you for submitting a review!

Your input is very much appreciated. Share them with your friends so they can enjoy it too!
Adonis Sawan

Commment about this course

The course was nice, it is a collection of many important topics

Derick Mostert

Certified Cyber Threat Forensic Investigator (CTFI) online course

I have completed the Certified Cyber Threat Forensic Investigator (CTFI) course in 2015. I have experienced it as a good generic overview of types of cyber-crimes and how to combat them.

Marc-Roger Gagn_


Strategic investment in your career, great resources, service and extensive curriculum.

Robert Fink

Great Program!

I came into this program with beginner to intermediate level knowledge & experience (depending on the topic). This course definitely took my knowledge base to the next level. This program provided me with relevant and useful skills & tools to take back to my organization. A couple of the lessons on social media was very basic and slow though. I felt that anyone taking this program should have a basic knowledge of what Google Hangouts or Skype is (for example).

David Haley

CTFI course review

This course was designed well and flowed very nicely. Although my work load got in my way sometimes the course design allowed me to easily catch up a complete the course. Highly recommend this course.