What is the Q|CII all about?

Over the last 15 years the world has experienced a need for competent professionals who can effectively manage complex cyber issues that threaten the assets and people of corporations, public and private institutions and government.

To meet this need the McAfee Institute administers the Qualified Cyber Intelligence Investigator (QCII). This remarkable group of professionals has demonstrated their competency in the areas of cyber intelligence, leadership and industry best practice’s through an intensive qualification and testing program. As a result, each of them is awarded the coveted designation of QCII and is recognized as leaders in their profession.

The QCII is the leading industry certification for law enforcement, loss prevention, private investigators, and fraud professionals.The skills that you will learn by studying for the QCII will help you identify your person of interest, conduct the investigation faster, and help you to prosecute them regardless of their location.

You will learn topics such cyber investigations, mobile & digital forensics, e-commerce fraud, auction fraud, hacking, intelligence gathering, social media investigation methodologies, legal fundamentals and more!

Even better yet! This certification program and all the resources are completely online and self-study! No matter when you want it, where you want it, or where you are located around the world, it will be available 24/7/365.

The Q|CII Supports the National Cyber-Security Workforce Framework (Homeland Security)

  • The National Cybersecurity Workforce Framework supports the nation’s cybersecurity workforce development efforts.
  • The National Cybersecurity Workforce Framework provides a simple, standardized way to define cybersecurity work across multiple sectors
  • The National Cybersecurity Workforce Framework provides detailed descriptions of types of cybersecurity work, the knowledge, skills, and abilities required for each area, and descriptions of common specialties.
  • Students will graduate with the knowledge and skills that employers need
  • Colleges can create programs that are aligned to jobs,
  • Employees will have a better defined career path and opportunities, and
  • Policy makers can set standards to promote workforce professionalization.

Now is the Time.. Join the Ranks of the Industries most Elite Cyber Investigators!

I can't urge you enough to invest in yourself and your future while learning some really neat stuff along the way. Earning the industry's top certification is rigorous, challenging, and extremely fun!

Trust me when I tell you that we are going to blow your mind and teach you things that you never thought possible!

It starts with the impossible and ends with the remarkable!

To Earn your Designation and Credential you will Need to Purchase the Board Exam: Purchase the Bundle Pack to include the Board Exam today and Save Even More vs. buying it separately. Choose the bundle pack on this page.

Eligibility requirements for Board Certification

  • Bachelor’s degree or higher plus one year of experience in eCommerce, fraud, investigations, IT, law enforcement, forensics, criminal justice, law, and/or loss prevention or other similar field or
  • Associates degree plus two years of experience or
  • High school diploma or GED plus three years of experience

 

Curriculum

Welcome to the Qualified Cyber Intelligence Investigator (Q|CII)

  • Welcome to the C.C.I.I.
  • Introduce yourself
  • Introduction (Reading Assignment)
  • Code of Ethics (Reading Assignment)
  • Resources

History and Background

  • History and Background (Reading Assignment)
  • Module 2 Quiz: History and Background

Cyber Intelligence (Overview)

  • Cyber Intelligence (Reading Assignment)
  • Module 3 Quiz: Cyber Intelligence

eCrime Investigation Methodologies

  • eCrime Methodologies (Reading Assignment
  • eCrime Investigations - Introduction
  • Where is eCrime Most Prevalent
  • Fencing Vs. eFencing
  • eCommerce Challenges to Investigating Fraudsters
  • Prosecution Challenges
  • Prosecution Requirements
  • Science Meets eCrime
  • Ebay The World's Largest Auction Platform
  • Boosters Selling on Ebay
  • Ebay Fraudsters - Let's Find Them
  • Ebay Listing Overview
  • Advanced Search Overview
  • Search Results Overview
  • Auction Listing Details
  • Feedback Profile Overview
  • Auction Analysis for Fraud
  • Feedback Systems and How Fraudsters Use Them
  • Ebay Feedback Review - First 30 Days
  • Craigslist Overview
  • Craigslist Listings
  • Craigslist Investigations
  • Google Boolean Searches - Site Search
  • eCrime Tip Sheet
  • Quick Reference Guide
  • Group Forum Discussion: eBay Investigation
  • Group Forum Discussion: Craigslist Investigation
  • Module 4 Quiz: eCrime Investigations Quiz

Advanced eCrime Investigation Methodologies

  • Introduction to Advanced eCommerce Fraud
  • The Demographics of Online Fraudsters
  • Trends and Patterns of Online Fraudsters
  • The Profile of an Online Fraudster
  • Types of Auction Fraud
  • Patterns in Fraudulent Behavior
  • Research Results and Types of Auction Fraud
  • Analyze Fraudulent Behavior
  • eBay Investigations
  • eBay Auction Search Kit
  • eBay and Terapeak
  • Hot Topic Research on Terapeak
  • eBay Investigative Tips
  • Craigslist Investigation
  • Craigslist Investigation Tips
  • Facebook Marketplace (Oodle) Introduction
  • Facebook Marketplace - Searching Individuals
  • Facebook Marketplace Investigative Tips
  • Google Advanced Operators
  • Google Site Search: eforcity
  • Google Site Search
  • Email Header Information
  • Meta Data
  • eCommerce Laboratory
  • Conclusion
  • Module 5 Quiz: Advanced eCrime Investigation Methodologies

Introduction to Cyber Investigations

  • Types of Cyber Crime (Reading Assignment)
  • Intro to Cyber Investigations - Overview
  • Definitive Guide to Cyber Forensics
  • How Cyber Criminals Attack
  • Conducting Cyber Investigations
  • Cyber Investigations 101
  • How to Investigate Email Headers
  • Conclusion & Recap
  • Sample Preservation Letter
  • Module 6 Quiz: Introduction to Cyber Investigations

Interpretation of Behaviors

  • Interpretation of Behaviors (Reading Assignment)
  • Module 7 Quiz: Interpretation of Behaviors

Cyber Investigations 101

  • Cyber Investigations (Reading Assignment)
  • Module 8 Quiz: Cyber Investigations 101

Understanding the Perpetrator

  • Understanding the Perpetrator (Reading Assignment)
  • Module 9 Quiz: Understanding the Perpetrator

Email Headers and Digital Forensics

  • Cyber Forensics (Reading Assignment)
  • Investigating Email Crimes: The Who, What, When, and Where! (07:11)
  • What do we do?
  • Email Header Information
  • Email Header Extractions
  • Email Header Terms
  • Mobile Forensics Part 1
  • Mobile Forensics Part 2
  • Module 10 Quiz: Digital and Mobile Forensics

Open Source Intelligence

  • Open Source Intelligence (Reading Assignment)
  • Module 11 Quiz: Open Source Intelligence

Privacy

  • Privacy (Reading Assignment)
  • Module 12 Quiz: Privacy

Basic Social Media Investigations

  • Social Media Landscape (Reading Assignment)
  • Basic Social Media Intro
  • Facebook Search
  • Locating People on Facebook
  • Facebook Profile
  • Facebook Search Tool
  • Facebook Private Profile Information
  • Twitter
  • Twitter Search
  • Twitter Mobile App
  • YouTube
  • YouTube Search
  • Google+
  • Google+ Search
  • Ethical Considerations
  • Module 13 Quiz: Basic Social Media Investigations

Advanced Social Media Investigations

  • Resources
  • An Overview of Advanced Social Media Investigations
  • Defining Open Source Intelligence
  • A World of Sock Puppets
  • Domain Names
  • Username Workflow
  • Search Engines
  • Facebook
  • Twitter
  • Instagram
  • YouTube
  • Hootsuite and SproutSocial
  • Module 14 Quiz: Advanced Social Media Investigations

Exploring the Deep Web

  • The Deep Web!
  • What the @#$% is a Bitcoin anyway?
  • Getting Started with TOR (Step by Step)
  • Introducing the TOR Project
  • The Secrets Behind the TOR Browser
  • Tor Wiki (Resource)
  • The Deep Web (Overview)
  • Exploration 1
  • Module 15 Quiz: Deep Web

Documenting Social Media Evidence

  • Documenting Social Media Evidence (Reading Assignment)
  • Module 16 Quiz: Documenting Social Media Evidence

Law Enforcement Efforts

  • Law Enforcement Efforts (Reading Assignment)
  • Module 17 Quiz: Law Enforcement Efforts

Legal Fundamentals of Cyber Investigations

  • Legal Fundamentals (Reading Assignment)
  • Introduction to Legal Fundamentals
  • Understanding Your Role as a Corporate Investigator
  • Understanding Your Employees Rights
  • The Electronic Communications Privacy Act
  • Understanding Law Enforcement Concerns
  • An Agent of the Law
  • Federal Laws to Prosecute CyberCrimes
  • Becoming an Expert Witness
  • Dauberts Standards, What is it?
  • Common Task of an Expert Witness
  • Preparing to Become an Expert Witness
  • Your Role as a Consultant
  • How to Prepare Your Testimony for Court
  • Preparing Forensic and Computer Evidence
  • Legal Fundamentals of Cyber Investigations Summary
  • Module 18 Quiz: Legal Fundamentals of Cyber Investigations

Digital Evidence

  • Social Media Evidence (Reading Assignment)
  • Module 19 Quiz: Digital Evidence

Setting up an Investigators Computer

  • Setting up an Investigators Computer (Reading Assignment)
  • Module 20 Quiz: Setting up the Investigators Computer

Ethical Considerations

  • Ethical Considerations (Reading Assignment)
  • Module 21 Quiz: Ethical Considerations

Advanced Searching

  • Advanced Searching (Reading Assignment)
  • Module 22 Quiz: Advanced Searching

Understanding Deception

  • Understanding Deception (Reading Assignment)
  • Module 23 Quiz: Understanding Deception

CCII Appendix

  • CCII Appendix

CCII Final Exam

  • Preparing for the Exam
  • Board Exam Purchase

 

      What our Students have to Say