Qualified Counterintelligence Threat Analyst (Q|CTA)

Availability: 7 Left at this Price!
$999.00
QTY:

A Cyber Counterintelligence Analyst works at all levels of the federal government which includes FBI, NSA, CIA, USS, DOD, and DEA. CTA’s also work at large multi-national corporations as well protecting organizations from theft of proprietary information, trade secrets, assets, merchandise, customer information and more. The CCTA® credential and designation is a game changer for the industry and your career.

Even better yet! This certification program and all the resources are completely online and self-study! No matter when you want it, where you want it or where you are located around the world, it will be available 24/7/365.

Learning’s

This entire program is online and self-study so you can enjoy taking it at your leisure.

  • You earn 40 CPE credits for completing this program
  • This program was developed from the industry's best in law enforcement, counter-intelligence, and prosecution. They are the very people that mentor you along the way.

What you will learn:

  • The Intelligence Cycle and How to Implements it’s use in your environment
  • Defensive & Offensive Counterintelligence (CI) Methodologies
  • 10 Commandments of Cyber-Counterintelligence (CI)
  • Working with law enforcement, loss prevention, fraud, security, and counterintelligence
  • Understand the Role & Value of CI in modern government, business, and organizations
  • Use methods of deception, sock puppets, snuggling, counter-denial, cyber denial, persona development, website creation for cyber information management, perception management and manipulation
  • How to Identify & Investigate I.T Threats
  • The most prolific I.T. Threat for 2014
  • Apply the CI process to mitigate threats of information disclosure for core business processes.
  • How to protect your organization from attacks
  • How to Utilize Cyber-Counterintelligence in Law Enforcement, Private Sector, DOD
  • Non-Traditional and Traditional Threats to the Public & Private Sector
  • A Review of Insider Threats and How to Avoid Them
  • How to Identify and Investigate Cyber-Terrorism & Hackers
  • White-collar Crime & Money Laundering
  • Technical & Tactical Surveillance Methods
  • Counterintelligence and Clandestine Communications
  • Mobile Forensics, Spyware, Mal-ware, and Apps
  • Legal, Ethical and Privacy Issues
  • Apply methodologies of risk and threat analysis from CI collection to provide recommendations to Sr. Leadership of threats to core business operations.
  • Perform and execute a live exercise against a potential adversary following instructions and tools that stay within the bounds of all laws.
  • and a ton more....

    Eligibility Requirements for Board Certification:

    Applicant experience must meet one of the four following criteria listed below:

    • Bachelor’s degree or higher plus three years of experience in investigations, IT, fraud, law enforcement, forensics, criminal justice, law, and/or loss prevention.
    • Associates degree plus four years of experience as stated above.
    • High school diploma or GED plus four years of experience as stated above.
    • Minimum two years experience as a full time faculty member at an accredited educational institution.

    Introduction to Cyber Counterintelligence

    • Welcome to the Cyber Counterintelligence Threat Analysis Program!
    • Group Forum Discussion: Introductions and Passion! Who are you?
    • Group Forum Discussion
    • Code of Ethics (Reading Assignment)
    • Resources

    Intelligence Overview

    • Types of Cyber Crime (Reading Assignment)
    • Intro to Cyber Investigations - Overview
    • How Cyber Criminals Attack
    • Conducting Cyber Investigations
    • Cyber Investigations 101
    • How to Investigate Email Headers
    • Conclusion & Recap
    • Intro to Cyber Investigations Conclusion

    Applying Intelligence Methodologies

    • Intelligence Methodologies
    • Group Forum Discussion

    Cyber Terrorism & Hackers

    • Cyber Terrorism in the News
    • Counter Terrorism

    Cyber Threats & Concerns

    • Cyber Threat Concerns

    Email Headers and Digital Forensics

    • Cyber Forensics (Reading Assignment)
    • Investigating Email Crimes: The Who, What, When, and Where!
    • What do we do with our findings?
    • Email Header Information
    • Mobile Forensics Part 1
    • Mobile Forensics Part 2
    • Quiz: Digital and Mobile Forensics

    Setting up an investigators computer

    • Setting up an investigators computer (Reading Assignment)
    • Quiz: Setting up the Investigators Computer

    Understanding The Perpetrator

    • Understanding the Perpetrator (Reading Assignment)
    • Quiz: Understanding the Perpetrator

    Understanding Deception

    • Understanding Deception (Reading Assignment)
    • Quiz: Deception

    Advanced Social Media Investigations

    • Resources
    • An overview of Advanced Social Media Investigations
    • Defining Open Source Intelligence
    • A World of Sock Puppets
    • Domain Names
    • Username Workflow
    • Search Engines
    • Facebook
    • Twitter
    • Instagram
    • YouTube
    • Hootsuite and SproutSocial
    • Quiz: Advanced Social Media Investigations

    Chatting Up Your Person of Interest

    • Introduction to Video Chat Platforms
    • Skype Sign Up
    • Web Platform and Features
    • Skype App and Searching
    • Google Hangouts Intro
    • Google Plus
    • Hangouts Tutorial
    • Google Hangouts Mobile
    • Oovoo
    • Oovoo Chat Window
    • Facetime
    • Tango
    • Quiz: Chatting Up Your Person of Interest

    What Do We Do With Dating Sites

    • Dating Site Introduction
    • Doing a Basic Search on Plenty of Fish
    • Plenty of Fish Advanced Search
    • Searching for a Username on Plenty of Fish
    • Searching the Forums in Plenty of Fish
    • Match.com Login and Overview
    • Match.com Search Functions
    • What about Google Site Search
    • Quiz: Dating Sites

    Classified Investigation Methodologies

    • Classified Investigations - Introduction
    • Where is eCrime Most Prevalent
    • Fencing Vs. eFencing
    • eCommerce Challenges to Investigating Fraudsters
    • Prosecution Challenges
    • Prosecution Requirements
    • Science Meets eCrime
    • Craigslist Overview
    • Craigslist Listings
    • Craigslist Investigations
    • Google Boolean Searches (Site Search)
    • Quiz: Classified Investigations Quiz

    Documenting Social Media Evidence

    • Documenting Social Media Evidence (Reading Assignment)
    • Quiz: Documenting Social Media Evidence

    eCrime Investigation Methodologies

    • eCrime Investigations - Introduction
    • Where is eCrime Most Prevalent
    • Fencing Vs. eFencing
    • eCommerce Challenges to Investigating Fraudsters
    • Prosecution Challenges
    • Prosecution Requirements
    • Science Meets eCrime
    • Ebay The World's Largest Auction Platform
    • Boosters Selling on Ebay
    • Ebay Fraudsters - Let's Find Them
    • Ebay Listing Overview
    • Advanced Search Overview
    • Search Results Overview
    • Auction Listing Details
    • Feedback Profile Overview
    • Auction Analysis for Fraud
    • Feedback Systems and How Fraudsters Use Them
    • Ebay Feedback Review - First 30 Days
    • Craigslist Overview
    • Craigslist Listings
    • Craigslist Investigations
    • Google Boolean Searches - Site Search
    • Group Forum Discussion: eBay Investigation
    • Group Forum Discussion: Craigslist Investigation
    • Quiz: eCrime Investigations Quiz

    Advanced eCrime Investigation Methodologies

    • Introduction to Advanced eCommerce Fraud
    • The Demographics of Online Fraudsters
    • Trends and Patterns of Online Fraudsters
    • The Profile of an Online Fraudster
    • Types of Auction Fraud
    • Patterns in Fraudulent Behavior
    • Research Results and Types of Auction Fraud
    • Analyze Fraudulent Behavior
    • eBay Investigations
    • eBay Auction Search Kit
    • eBay and Terapeak
    • Hot Topic Research on Terapeak
    • eBay Investigative Tips
    • Craigslist Investigation
    • Craigslist Investigation Tips
    • Facebook Marketplace (Oodle) Introduction
    • Facebook Marketplace - Searching Individuals
    • Facebook Marketplace Investigative Tips
    • Google Advanced Operators
    • Google Site Search: eforcity
    • Google Site Search
    • Email Header Information
    • Meta Data
    • Quiz: Advanced eCrime Investigation Methodologies

    Exploring the Deep Web

    • The Deep Web!
    • What the @#$% is a Bitcoin anyway?
    • Getting Started with TOR (Step by Step)
    • Introducing the TOR Project
    • The Secrets Behind the TOR Browser
    • Tor Wiki (Resource)
    • The Deep Web (Overview)
    • Exploration of the Deep Web
    • Quiz: Deep Web

    Open Source Intelligence

    • Open Source Intelligence (Reading Assignment)
    • Open Source Intelligence Gathering Methodologies (OSINT)
    • Quiz: Open Source Intelligence

    Law Enforcement Efforts

    • Law Enforcement Efforts (Reading Assignment)
    • Quiz: Law Enforcement Efforts

    Advanced Searching

    • Advanced Searching (Reading Assignment)
    • Quiz: Advanced Searching

    Final Exam

    • Board Exam Purchase

    What our Students have to Say

    LIFETIME ACCESS

    Never Pay for Upgrades

    Lifetime access to the course, materials, and learning updates!

    3 Day Money Back Guarantee

    We want you to be happy..

    If you dont like it, simply email us and let us know. No Questions Asked. *See Terms

    Globally Recognized Credentials

    Advance Your Professional Career

    Document your new skill sets with recognized CPE Credits and a Professional Certificate or Board Certification today!

    LIVE INSTRUCTOR HELP & Coaching

    At NO Additional Cost

    Jump on chat with one of our industry experts to help you with any questions you have about your program.

    YOU MAY ALSO BE INTERESTED IN