Qualified Counterintelligence Threat Analyst (Q|CTA)

Availability: 7 Left at this Price!

A Cyber Counterintelligence Analyst works at all levels of the federal government which includes FBI, NSA, CIA, USS, DOD, and DEA. CTA’s also work at large multi-national corporations as well protecting organizations from theft of proprietary information, trade secrets, assets, merchandise, customer information and more. The CCTA® credential and designation is a game changer for the industry and your career.

Even better yet! This certification program and all the resources are completely online and self-study! No matter when you want it, where you want it or where you are located around the world, it will be available 24/7/365.


This entire program is online and self-study so you can enjoy taking it at your leisure.

  • You earn 40 CPE credits for completing this program
  • This program was developed from the industry's best in law enforcement, counter-intelligence, and prosecution. They are the very people that mentor you along the way.

What you will learn:

  • The Intelligence Cycle and How to Implements it’s use in your environment
  • Defensive & Offensive Counterintelligence (CI) Methodologies
  • 10 Commandments of Cyber-Counterintelligence (CI)
  • Working with law enforcement, loss prevention, fraud, security, and counterintelligence
  • Understand the Role & Value of CI in modern government, business, and organizations
  • Use methods of deception, sock puppets, snuggling, counter-denial, cyber denial, persona development, website creation for cyber information management, perception management and manipulation
  • How to Identify & Investigate I.T Threats
  • The most prolific I.T. Threat for 2014
  • Apply the CI process to mitigate threats of information disclosure for core business processes.
  • How to protect your organization from attacks
  • How to Utilize Cyber-Counterintelligence in Law Enforcement, Private Sector, DOD
  • Non-Traditional and Traditional Threats to the Public & Private Sector
  • A Review of Insider Threats and How to Avoid Them
  • How to Identify and Investigate Cyber-Terrorism & Hackers
  • White-collar Crime & Money Laundering
  • Technical & Tactical Surveillance Methods
  • Counterintelligence and Clandestine Communications
  • Mobile Forensics, Spyware, Mal-ware, and Apps
  • Legal, Ethical and Privacy Issues
  • Apply methodologies of risk and threat analysis from CI collection to provide recommendations to Sr. Leadership of threats to core business operations.
  • Perform and execute a live exercise against a potential adversary following instructions and tools that stay within the bounds of all laws.
  • and a ton more....

    Eligibility Requirements for Board Certification:

    Applicant experience must meet one of the four following criteria listed below:

    • Bachelor’s degree or higher plus three years of experience in investigations, IT, fraud, law enforcement, forensics, criminal justice, law, and/or loss prevention.
    • Associates degree plus four years of experience as stated above.
    • High school diploma or GED plus four years of experience as stated above.
    • Minimum two years experience as a full time faculty member at an accredited educational institution.

    Introduction to Cyber Counterintelligence

    • Welcome to the Cyber Counterintelligence Threat Analysis Program!
    • Group Forum Discussion: Introductions and Passion! Who are you?
    • Group Forum Discussion
    • Code of Ethics (Reading Assignment)
    • Resources

    Intelligence Overview

    • Types of Cyber Crime (Reading Assignment)
    • Intro to Cyber Investigations - Overview
    • How Cyber Criminals Attack
    • Conducting Cyber Investigations
    • Cyber Investigations 101
    • How to Investigate Email Headers
    • Conclusion & Recap
    • Intro to Cyber Investigations Conclusion

    Applying Intelligence Methodologies

    • Intelligence Methodologies
    • Group Forum Discussion

    Cyber Terrorism & Hackers

    • Cyber Terrorism in the News
    • Counter Terrorism

    Cyber Threats & Concerns

    • Cyber Threat Concerns

    Email Headers and Digital Forensics

    • Cyber Forensics (Reading Assignment)
    • Investigating Email Crimes: The Who, What, When, and Where!
    • What do we do with our findings?
    • Email Header Information
    • Mobile Forensics Part 1
    • Mobile Forensics Part 2
    • Quiz: Digital and Mobile Forensics

    Setting up an investigators computer

    • Setting up an investigators computer (Reading Assignment)
    • Quiz: Setting up the Investigators Computer

    Understanding The Perpetrator

    • Understanding the Perpetrator (Reading Assignment)
    • Quiz: Understanding the Perpetrator

    Understanding Deception

    • Understanding Deception (Reading Assignment)
    • Quiz: Deception

    Advanced Social Media Investigations

    • Resources
    • An overview of Advanced Social Media Investigations
    • Defining Open Source Intelligence
    • A World of Sock Puppets
    • Domain Names
    • Username Workflow
    • Search Engines
    • Facebook
    • Twitter
    • Instagram
    • YouTube
    • Hootsuite and SproutSocial
    • Quiz: Advanced Social Media Investigations

    Chatting Up Your Person of Interest

    • Introduction to Video Chat Platforms
    • Skype Sign Up
    • Web Platform and Features
    • Skype App and Searching
    • Google Hangouts Intro
    • Google Plus
    • Hangouts Tutorial
    • Google Hangouts Mobile
    • Oovoo
    • Oovoo Chat Window
    • Facetime
    • Tango
    • Quiz: Chatting Up Your Person of Interest

    What Do We Do With Dating Sites

    • Dating Site Introduction
    • Doing a Basic Search on Plenty of Fish
    • Plenty of Fish Advanced Search
    • Searching for a Username on Plenty of Fish
    • Searching the Forums in Plenty of Fish
    • Match.com Login and Overview
    • Match.com Search Functions
    • What about Google Site Search
    • Quiz: Dating Sites

    Classified Investigation Methodologies

    • Classified Investigations - Introduction
    • Where is eCrime Most Prevalent
    • Fencing Vs. eFencing
    • eCommerce Challenges to Investigating Fraudsters
    • Prosecution Challenges
    • Prosecution Requirements
    • Science Meets eCrime
    • Craigslist Overview
    • Craigslist Listings
    • Craigslist Investigations
    • Google Boolean Searches (Site Search)
    • Quiz: Classified Investigations Quiz

    Documenting Social Media Evidence

    • Documenting Social Media Evidence (Reading Assignment)
    • Quiz: Documenting Social Media Evidence

    eCrime Investigation Methodologies

    • eCrime Investigations - Introduction
    • Where is eCrime Most Prevalent
    • Fencing Vs. eFencing
    • eCommerce Challenges to Investigating Fraudsters
    • Prosecution Challenges
    • Prosecution Requirements
    • Science Meets eCrime
    • Ebay The World's Largest Auction Platform
    • Boosters Selling on Ebay
    • Ebay Fraudsters - Let's Find Them
    • Ebay Listing Overview
    • Advanced Search Overview
    • Search Results Overview
    • Auction Listing Details
    • Feedback Profile Overview
    • Auction Analysis for Fraud
    • Feedback Systems and How Fraudsters Use Them
    • Ebay Feedback Review - First 30 Days
    • Craigslist Overview
    • Craigslist Listings
    • Craigslist Investigations
    • Google Boolean Searches - Site Search
    • Group Forum Discussion: eBay Investigation
    • Group Forum Discussion: Craigslist Investigation
    • Quiz: eCrime Investigations Quiz

    Advanced eCrime Investigation Methodologies

    • Introduction to Advanced eCommerce Fraud
    • The Demographics of Online Fraudsters
    • Trends and Patterns of Online Fraudsters
    • The Profile of an Online Fraudster
    • Types of Auction Fraud
    • Patterns in Fraudulent Behavior
    • Research Results and Types of Auction Fraud
    • Analyze Fraudulent Behavior
    • eBay Investigations
    • eBay Auction Search Kit
    • eBay and Terapeak
    • Hot Topic Research on Terapeak
    • eBay Investigative Tips
    • Craigslist Investigation
    • Craigslist Investigation Tips
    • Facebook Marketplace (Oodle) Introduction
    • Facebook Marketplace - Searching Individuals
    • Facebook Marketplace Investigative Tips
    • Google Advanced Operators
    • Google Site Search: eforcity
    • Google Site Search
    • Email Header Information
    • Meta Data
    • Quiz: Advanced eCrime Investigation Methodologies

    Exploring the Deep Web

    • The Deep Web!
    • What the @#$% is a Bitcoin anyway?
    • Getting Started with TOR (Step by Step)
    • Introducing the TOR Project
    • The Secrets Behind the TOR Browser
    • Tor Wiki (Resource)
    • The Deep Web (Overview)
    • Exploration of the Deep Web
    • Quiz: Deep Web

    Open Source Intelligence

    • Open Source Intelligence (Reading Assignment)
    • Open Source Intelligence Gathering Methodologies (OSINT)
    • Quiz: Open Source Intelligence

    Law Enforcement Efforts

    • Law Enforcement Efforts (Reading Assignment)
    • Quiz: Law Enforcement Efforts

    Advanced Searching

    • Advanced Searching (Reading Assignment)
    • Quiz: Advanced Searching

    Final Exam

    • Board Exam Purchase

    What our Students have to Say


    Never Pay for Upgrades

    Lifetime access to the course, materials, and learning updates!

    3 Day Money Back Guarantee

    We want you to be happy..

    If you dont like it, simply email us and let us know. No Questions Asked. *See Terms

    Globally Recognized Credentials

    Advance Your Professional Career

    Document your new skill sets with recognized CPE Credits and a Professional Certificate or Board Certification today!


    At NO Additional Cost

    Jump on chat with one of our industry experts to help you with any questions you have about your program.