Qualified Cyber Intelligence Professional (Q|CIP)

Availability: 5 Left at this Price!

Over the last 10 years, the world has experienced a need for competent professionals who can effectively manage complex cyber issues that threaten the assets and people of corporations, public and private institutions and government. To meet this need the McAfee Institute administers the Qualified Cyber Intelligence Professional (QCIP). This remarkable group of professionals has demonstrated their competency in the areas of cyber intelligence, leadership and industry best practice’s through an intensive qualification and testing program. As a result, each of them is awarded the coveted designation of QCIP and is recognized as leaders in their profession.

Even better yet! This certification program and all the resources are completely online and self-study! No matter when you want it, where you want it or where you are located around the world, it will be available 24/7/365. If this interests you, I have a great promotion going on and I would love to tell you a bit more about what it includes!


Over 240 Video-Based Tutorial and Lectures (50 Hours of Learning's)

  • You earn 35 CPE credits for completing this program
  • View the Complete Curriculum here
  • The modules are self-study and available at your own pace and schedule.

    To Earn your Designation and Credential you will Need to Purchase the Board Exam: Purchase the Bundle Pack to include the Board Exam today and Save Even More vs. buying it separately. Choose the bundle pack on this page.

    Who Should Attend?

    • Loss Prevention Professionals
    • Law Enforcement
    • Private Investigators
    • Human Resources Professionals
    • Intelligence Professionals
    • Fraud Investigators

      Course Benefits

      • Lifetime Access. No Limits!
      • Tablet Accessibility
      • 35 CPE Credits & Board Certificate
      • Nationally Accredited through NASBA
      • This program was developed from the industry's best in intelligence, investigations, and prosecution of cyber criminals and they are the very people that mentor you along the way.

      Eligibility Requirements for Board Certification

      • Bachelor’s degree or higher plus three years of experience in investigations, IT, fraud, law enforcement, forensics, criminal justice, law, and/or loss prevention. OR
      • Associates degree plus four years of experience as stated above. OR
      • High school diploma or GED plus four years of experience as stated above. OR
      • Minimum two years experience as a full time faculty member at an accredited educational institution.

      Welcome to the CCIP!

      • Welcome to the CCIP
      • Introduce yourself
      • Introduction (Reading Assignment)
      • Code of Ethics (Reading Assignment)
      • Resources

      The History and Background of Cyber Crimes

      • History and Background (Reading Assignment)
      • Module 2 Quiz: History and Background

      Cyber Intelligence (Overview)

      • Cyber Intelligence (Reading Assignment)
      • Module 3 Quiz: Cyber Intelligence (Overview)

      eCrime Investigation Methodologies

      • eCrime Methodologies (Reading Assignments)
      • eCrime Investigations - Introduction
      • Where is eCrime Most Prevalent
      • Fencing Vs. eFencing
      • eCommerce Challenges to Investigating Fraudsters
      • Prosecution Challenges
      • Prosecution Requirements
      • Science Meets eCrime
      • Ebay The World's Largest Auction Platform
      • Boosters Selling on Ebay
      • Ebay Fraudsters - Let's Find Them
      • Ebay Listing Overview
      • Advanced Search Overview
      • Search Results Overview
      • Auction Listing Details
      • Feedback Profile Overview
      • Auction Analysis for Fraud
      • Feedback Systems and How Fraudsters Use Them
      • Ebay Feedback Review - First 30 Days
      • Craigslist Overview
      • Craigslist Listings
      • Craigslist Investigations
      • Google Boolean Searches - Site Search
      • Group Forum Discussion: eBay Investigation
      • Group Forum Discussion: Craigslist Investigation
      • Module 4 Quiz: eCrime Investigations Quiz

      Advanced eCrime Investigation Methodologies

      • Introduction to Advanced eCommerce Fraud
      • The Demographics of Online Fraudsters
      • Trends and Patterns of Online Fraudsters
      • The Profile of an Online Fraudster
      • Types of Auction Fraud
      • Patterns in Fraudulent Behavior
      • Research Results and Types of Auction Fraud
      • Analyze Fraudulent Behavior
      • eBay Investigations
      • eBay Auction Search Kit
      • eBay and Terapeak
      • Hot Topic Research on Terapeak
      • eBay Investigative Tips
      • Craigslist Investigation
      • Craigslist Investigation Tips
      • Facebook Marketplace (Oodle) Introduction
      • Facebook Marketplace - Searching Individuals
      • Facebook Marketplace Investigative Tips
      • Google Advanced Operators
      • Google Site Search: eforcity
      • Google Site Search
      • Email Header Information
      • Meta Data
      • eCommerce Laboratory
      • Conclusion
      • Module 5 Quiz: Advanced eCrime Investigation Methodologies

      Classified Investigation Methodologies

      • Classified Investigations - Introduction
      • Where is eCrime Most Prevalent
      • Fencing Vs. eFencing
      • eCommerce Challenges to Investigating Fraudsters
      • Prosecution Challenges
      • Prosecution Requirements
      • Science Meets eCrime
      • Craigslist Overview
      • Craigslist Listings
      • Craigslist Investigations
      • Google Boolean Searches (Site Search)
      • Module 6 Quiz: Classified Investigations

      Introduction to Cyber Investigations

      • Types of Cyber Crime (Reading Assignment)
      • Intro to Cyber Investigations - Overview
      • How Cyber Criminals Attack
      • Conducting Cyber Investigations
      • Cyber Investigations 101
      • How to Investigate Email Headers
      • Conclusion & Recap
      • Module 7 Quiz: Introduction to Cyber Investigations

      Exploring the Deep Web & TOR

      • The Deep Web!
      • What the @#$% is a Bitcoin anyway?
      • Getting Started with TOR (Step by Step)
      • Introducing the TOR Project
      • The Secrets Behind the TOR Browser
      • The Deep Web (Overview)
      • Exploration of the Deep Web
      • Module 8 Quiz: Deep Web

      Interpretation of Cyber Criminal Behaviors

      • Interpretation of Behaviors (Reading Assignment)
      • Module 9 Quiz: Interpretation of Behaviors

      Cyber Investigations 101

      • Cyber Investigations (Reading Assignment)
      • Module 10 Quiz: Cyber Investigations 101

      Understanding The Cyber Criminal

      • Understanding the Perpetrator (Reading Assignment)
      • Module 11 Quiz: Understanding the Perpetrator

      An Exploration into Email Headers and Digital Forensics

      • Cyber Forensics (Reading Assignment)
      • Investigating Email Crimes: The Who, What, When, and Where!
      • What do we do?
      • Email Header Information
      • Mobile Forensics Part 1
      • Mobile Forensics Part 2
      • Module 12 Quiz: Digital and Mobile Forensics

      Open Source Intelligence Methodologies

      • Open Source Intelligence (Reading Assignment)
      • Module 13 Quiz: Open Source Intelligence

      Privacy Concerns

      • Privacy (Reading Assignment)
      • Module 14 Quiz: Privacy

      Basic Social Media Investigations

      • Social Media Landscape (Reading Assignment)
      • Basic Social Media Intro
      • Facebook Search
      • Locating People on Facebook
      • Facebook profile
      • Facebook Search Tool
      • Facebook Private Profile Information
      • Twitter
      • Twitter Search
      • Twitter Mobile App
      • YouTube
      • YouTube Search
      • Google+
      • Google+ Search
      • Ethical Considerations
      • Module 15 Quiz: Basic Social Media Investigations

      Advanced Social Media Investigations

      • Resources
      • An overview of Advanced Social Media Investigations
      • Defining Open Source Intelligence
      • A World of Sock Puppets
      • Domain Names
      • Username Workflow
      • Search Engines
      • Facebook
      • Twitter
      • Instagram
      • YouTube
      • Hootsuite and SproutSocial
      • Module 16 Quiz: Advanced Social Media Investigations

      Documenting Social Media Evidence

      • Social Media Evidence (Reading Assignment)
      • Module 17 Quiz: Documenting Social Media Evidence

      Chatting Up Your Person of Interest

      • Introduction to Video Chat Platforms
      • Skype Sign Up
      • Web Platform and Features
      • Skype App and Searching
      • Google Hangouts Intro
      • Google Plus
      • Hangouts Tutorial
      • Google Hangouts Mobile
      • Oovoo
      • Oovoo Chat Window
      • Facetime
      • Tango
      • Module 18 Quiz: Chatting Up Your Person of Interest

      How to Conduct Investigations on Dating Websites

      • Dating Site Introduction
      • Doing a Basic Search on Plenty of Fish
      • Plenty of Fish Advanced Search
      • Searching for a Username on Plenty of Fish
      • Searching the Forums in Plenty of Fish
      • Match.com Login and Overview
      • Match.com Search Functions
      • What about Google Site Search
      • Module 19 Quiz: Dating Sites

      Law Enforcement Efforts

      • Law Enforcement Efforts (Reading Assignment)
      • Module 20 Quiz: Law Enforcement Efforts

      Legal Fundamentals of Cyber Investigations

      • Legal Fundamentals (Reading Assignment)
      • Introduction to Legal Fundamentals
      • Understanding Your Role as a Corporate Investigator
      • Understanding Your Employees Rights
      • The Electronic Communications Privacy Act
      • Understanding Law Enforcement Concerns
      • An Agent of the Law
      • Federal Laws to Prosecute CyberCrimes
      • Becoming an Expert Witness
      • Dauberts Standards, What is it?
      • Common Task of an Expert Witness
      • Preparing to Become an Expert Witness
      • Your Role as a Consultant
      • How to Prepare Your Testimony for Court
      • Preparing Forensic and Computer Evidence
      • Summary
      • Module 21 Quiz: Legal Fundamentals of Cyber Investigations

      How to Utilize Informants

      • Introduction to Informants
      • Informants Pt. 2: Suitability
      • Informants Pt. 3: Trust and Confidentiality
      • Informants Pt. 4: Safe Handling of Informants
      • Informants Pt 5: Legal Liabilities
      • Module 22 Quiz: Informants

      How to Preserve and Secure Digital Evidence

      • Digital Evidence (Reading Assignment)
      • Module 23 Quiz: Digital Evidence

      Setting Up An Investigators Computer

      • Setting Up An Investigators Computer (Reading Assignment)
      • Module 24 Quiz: Setting Up an Investigator's Computer

      Ethical Considerations for Cyber Investigators

      • Ethical Considerations (Reading Assignment)
      • Module 25 Quiz: Ethical Considerations

      Advanced Searching Methodologies to Locate Hidden Information

      • Advanced Searching (Reading Assignment)
      • Module 26 Quiz: Advanced Searching

      Understanding Deception

      • Understanding Deception (Reading Assignment)
      • Module 27 Quiz: Deception

      Program Design and Development

      • Program Design and Development (Reading Assignment)
      • Module 28 Quiz: Program Development

      CCIP Appendix

      • CCIP Appendix

      CCIP Final Exam

      • Preparing for the Exam
      • Board Exam Purchase

      What our Students have to Say


      Never Pay for Upgrades

      Lifetime access to the course, materials, and learning updates!

      3 Day Money Back Guarantee

      We want you to be happy..

      If you dont like it, simply email us and let us know. No Questions Asked. *See Terms

      Globally Recognized Credentials

      Advance Your Professional Career

      Document your new skill sets with recognized CPE Credits and a Professional Certificate or Board Certification today!


      At NO Additional Cost

      Jump on chat with one of our industry experts to help you with any questions you have about your program.