A Cyber Counterintelligence Analyst works at all levels of the federal government which includes FBI, NSA, CIA, USS, DOD, and DEA. CTA’s also work at large multi-national corporations as well protecting organizations from theft of proprietary information, trade secrets, assets, merchandise, customer information and more. The CCTA® credential and designation is a game changer for the industry and your career.

Even better yet! This certification program and all the resources are completely online and self-study! No matter when you want it, where you want it or where you are located around the world, it will be available 24/7/365.


This entire program is online and self-study so you can enjoy taking it at your leisure.

  • You earn 40 CPE credits for completing this program
  • This program was developed from the industry's best in law enforcement, counter-intelligence, and prosecution. They are the very people that mentor you along the way.

What you will learn:

  • The Intelligence Cycle and How to Implements it’s use in your environment
  • Defensive & Offensive Counterintelligence (CI) Methodologies
  • 10 Commandments of Cyber-Counterintelligence (CI)
  • Working with law enforcement, loss prevention, fraud, security, and counterintelligence
  • Understand the Role & Value of CI in modern government, business, and organizations
  • Use methods of deception, sock puppets, snuggling, counter-denial, cyber denial, persona development, website creation for cyber information management, perception management and manipulation
  • How to Identify & Investigate I.T Threats
  • The most prolific I.T. Threat for 2014
  • Apply the CI process to mitigate threats of information disclosure for core business processes.
  • How to protect your organization from attacks
  • How to Utilize Cyber-Counterintelligence in Law Enforcement, Private Sector, DOD
  • Non-Traditional and Traditional Threats to the Public & Private Sector
  • A Review of Insider Threats and How to Avoid Them
  • How to Identify and Investigate Cyber-Terrorism & Hackers
  • White-collar Crime & Money Laundering
  • Technical & Tactical Surveillance Methods
  • Counterintelligence and Clandestine Communications
  • Mobile Forensics, Spyware, Mal-ware, and Apps
  • Legal, Ethical and Privacy Issues
  • Apply methodologies of risk and threat analysis from CI collection to provide recommendations to Sr. Leadership of threats to core business operations.
  • Perform and execute a live exercise against a potential adversary following instructions and tools that stay within the bounds of all laws.
  • and a ton more....

Eligibility Requirements for Board Certification:

Applicant experience must meet one of the four following criteria listed below:

  • Bachelor’s degree or higher plus three years of experience in investigations, IT, fraud, law enforcement, forensics, criminal justice, law, and/or loss prevention.
  • Associates degree plus four years of experience as stated above.
  • High school diploma or GED plus four years of experience as stated above.
  • Minimum two years experience as a full time faculty member at an accredited educational institution.


Introduction to Cyber Counterintelligence

  • Welcome to the Cyber Counterintelligence Threat Analysis Program!
  • Group Forum Discussion: Introductions and Passion! Who are you?
  • Group Forum Discussion
  • Code of Ethics (Reading Assignment)
  • Resources

Intelligence Overview

  • Types of Cyber Crime (Reading Assignment)
  • Intro to Cyber Investigations - Overview
  • How Cyber Criminals Attack
  • Conducting Cyber Investigations
  • Cyber Investigations 101
  • How to Investigate Email Headers
  • Conclusion & Recap
  • Intro to Cyber Investigations Conclusion

Applying Intelligence Methodologies

  • Intelligence Methodologies
  • Group Forum Discussion

Cyber Terrorism & Hackers

  • Cyber Terrorism in the News
  • Counter Terrorism

Cyber Threats & Concerns

  • Cyber Threat Concerns

Email Headers and Digital Forensics

  • Cyber Forensics (Reading Assignment)
  • Investigating Email Crimes: The Who, What, When, and Where!
  • What do we do with our findings?
  • Email Header Information
  • Mobile Forensics Part 1
  • Mobile Forensics Part 2
  • Quiz: Digital and Mobile Forensics

Setting up an investigator's computer

  • Setting up an investigator's computer (Reading Assignment)
  • Quiz: Setting up the Investigators Computer

Understanding The Perpetrator

  • Understanding the Perpetrator (Reading Assignment)
  • Quiz: Understanding the Perpetrator

Understanding Deception

  • Understanding Deception (Reading Assignment)
  • Quiz: Deception

Advanced Social Media Investigations

  • Resources
  • An overview of Advanced Social Media Investigations
  • Defining Open Source Intelligence
  • A World of Sock Puppets
  • Domain Names
  • Username Workflow
  • Search Engines
  • Facebook
  • Twitter
  • Instagram
  • YouTube
  • Hootsuite and SproutSocial
  • Quiz: Advanced Social Media Investigations

Chatting Up Your Person of Interest

  • Introduction to Video Chat Platforms
  • Skype Sign Up
  • Web Platform and Features
  • Skype App and Searching
  • Google Hangouts Intro
  • Google Plus
  • Hangouts Tutorial
  • Google Hangouts Mobile
  • Oovoo
  • Oovoo Chat Window
  • Facetime
  • Tango
  • Quiz: Chatting Up Your Person of Interest

What Do We Do With Dating Sites

  • Dating Site Introduction
  • Doing a Basic Search on Plenty of Fish
  • Plenty of Fish Advanced Search
  • Searching for a Username on Plenty of Fish
  • Searching the Forums in Plenty of Fish
  • Match.com Login and Overview
  • Match.com Search Functions
  • What about Google Site Search
  • Quiz: Dating Sites

Classified Investigation Methodologies

  • Classified Investigations - Introduction
  • Where is eCrime Most Prevalent
  • Fencing Vs. eFencing
  • eCommerce Challenges to Investigating Fraudsters
  • Prosecution Challenges
  • Prosecution Requirements
  • Science Meets eCrime
  • Craigslist Overview
  • Craigslist Listings
  • Craigslist Investigations
  • Google Boolean Searches (Site Search)
  • Quiz: Classified Investigations Quiz

Documenting Social Media Evidence

  • Documenting Social Media Evidence (Reading Assignment)
  • Quiz: Documenting Social Media Evidence

eCrime Investigation Methodologies

  • eCrime Investigations - Introduction
  • Where is eCrime Most Prevalent
  • Fencing Vs. eFencing
  • eCommerce Challenges to Investigating Fraudsters
  • Prosecution Challenges
  • Prosecution Requirements
  • Science Meets eCrime
  • Ebay The World's Largest Auction Platform
  • Boosters Selling on Ebay
  • Ebay Fraudsters - Let's Find Them
  • Ebay Listing Overview
  • Advanced Search Overview
  • Search Results Overview
  • Auction Listing Details
  • Feedback Profile Overview
  • Auction Analysis for Fraud
  • Feedback Systems and How Fraudsters Use Them
  • Ebay Feedback Review - First 30 Days
  • Craigslist Overview
  • Craigslist Listings
  • Craigslist Investigations
  • Google Boolean Searches - Site Search
  • Group Forum Discussion: eBay Investigation
  • Group Forum Discussion: Craigslist Investigation
  • Quiz: eCrime Investigations Quiz

Advanced eCrime Investigation Methodologies

  • Introduction to Advanced eCommerce Fraud
  • The Demographics of Online Fraudsters
  • Trends and Patterns of Online Fraudsters
  • The Profile of an Online Fraudster
  • Types of Auction Fraud
  • Patterns in Fraudulent Behavior
  • Research Results and Types of Auction Fraud
  • Analyze Fraudulent Behavior
  • eBay Investigations
  • eBay Auction Search Kit
  • eBay and Terapeak
  • Hot Topic Research on Terapeak
  • eBay Investigative Tips
  • Craigslist Investigation
  • Craigslist Investigation Tips
  • Facebook Marketplace (Oodle) Introduction
  • Facebook Marketplace - Searching Individuals
  • Facebook Marketplace Investigative Tips
  • Google Advanced Operators
  • Google Site Search: eforcity
  • Google Site Search
  • Email Header Information
  • Meta Data
  • Quiz: Advanced eCrime Investigation Methodologies

Exploring the Deep Web

  • The Deep Web!
  • What the @#$% is a Bitcoin anyway?
  • Getting Started with TOR (Step by Step)
  • Introducing the TOR Project
  • The Secrets Behind the TOR Browser
  • Tor Wiki (Resource)
  • The Deep Web (Overview)
  • Exploration of the Deep Web
  • Quiz: Deep Web

Open Source Intelligence

  • Open Source Intelligence (Reading Assignment)
  • Open Source Intelligence Gathering Methodologies (OSINT)
  • Quiz: Open Source Intelligence

Law Enforcement Efforts

  • Law Enforcement Efforts (Reading Assignment)
  • Quiz: Law Enforcement Efforts

Advanced Searching

  • Advanced Searching (Reading Assignment)
  • Quiz: Advanced Searching

Final Exam

  • Board Exam Purchase


    Globally Recognized As Seen on

    What our Students have to Say