Over the last 10 years, the world has experienced a need for competent professionals who can effectively manage complex cyber issues that threaten the assets and people of corporations, public and private institutions and government. To meet this need the McAfee Institute administers the Qualified Cyber Intelligence Professional (QCIP). This remarkable group of professionals has demonstrated their competency in the areas of cyber intelligence, leadership and industry best practice’s through an intensive qualification and testing program. As a result, each of them is awarded the coveted designation of QCIP and is recognized as leaders in their profession.

Even better yet! This certification program and all the resources are completely online and self-study! No matter when you want it, where you want it or where you are located around the world, it will be available 24/7/365. If this interests you, I have a great promotion going on and I would love to tell you a bit more about what it includes!

Learning’s

Over 240 Video-Based Tutorial and Lectures (50 Hours of Learning's)

  • You earn 35 CPE credits for completing this program
  • View the Complete Curriculum here
  • The modules are self-study and available at your own pace and schedule.

    To Earn your Designation and Credential you will Need to Purchase the Board Exam: Purchase the Bundle Pack to include the Board Exam today and Save Even More vs. buying it separately. Choose the bundle pack on this page.

    Who Should Attend?

    • Loss Prevention Professionals
    • Law Enforcement
    • Private Investigators
    • Human Resources Professionals
    • Intelligence Professionals
    • Fraud Investigators

     

    Course Benefits

    • Lifetime Access. No Limits!
    • Tablet Accessibility
    • 35 CPE Credits & Board Certificate
    • Nationally Accredited through NASBA
    • This program was developed from the industry's best in intelligence, investigations, and prosecution of cyber criminals and they are the very people that mentor you along the way.

    Eligibility Requirements for Board Certification

    • Bachelor’s degree or higher plus three years of experience in investigations, IT, fraud, law enforcement, forensics, criminal justice, law, and/or loss prevention. OR
    • Associates degree plus four years of experience as stated above. OR
    • High school diploma or GED plus four years of experience as stated above. OR
    • Minimum two years experience as a full time faculty member at an accredited educational institution.

     

    Curriculum

    Welcome to the CCIP!

    • Welcome to the CCIP
    • Introduce yourself
    • Introduction (Reading Assignment)
    • Code of Ethics (Reading Assignment)
    • Resources

    The History and Background of Cyber Crimes

    • History and Background (Reading Assignment)
    • Module 2 Quiz: History and Background

    Cyber Intelligence (Overview)

    • Cyber Intelligence (Reading Assignment)
    • Module 3 Quiz: Cyber Intelligence (Overview)

    eCrime Investigation Methodologies

    • eCrime Methodologies (Reading Assignments)
    • eCrime Investigations - Introduction
    • Where is eCrime Most Prevalent
    • Fencing Vs. eFencing
    • eCommerce Challenges to Investigating Fraudsters
    • Prosecution Challenges
    • Prosecution Requirements
    • Science Meets eCrime
    • Ebay The World's Largest Auction Platform
    • Boosters Selling on Ebay
    • Ebay Fraudsters - Let's Find Them
    • Ebay Listing Overview
    • Advanced Search Overview
    • Search Results Overview
    • Auction Listing Details
    • Feedback Profile Overview
    • Auction Analysis for Fraud
    • Feedback Systems and How Fraudsters Use Them
    • Ebay Feedback Review - First 30 Days
    • Craigslist Overview
    • Craigslist Listings
    • Craigslist Investigations
    • Google Boolean Searches - Site Search
    • Group Forum Discussion: eBay Investigation
    • Group Forum Discussion: Craigslist Investigation
    • Module 4 Quiz: eCrime Investigations Quiz

    Advanced eCrime Investigation Methodologies

    • Introduction to Advanced eCommerce Fraud
    • The Demographics of Online Fraudsters
    • Trends and Patterns of Online Fraudsters
    • The Profile of an Online Fraudster
    • Types of Auction Fraud
    • Patterns in Fraudulent Behavior
    • Research Results and Types of Auction Fraud
    • Analyze Fraudulent Behavior
    • eBay Investigations
    • eBay Auction Search Kit
    • eBay and Terapeak
    • Hot Topic Research on Terapeak
    • eBay Investigative Tips
    • Craigslist Investigation
    • Craigslist Investigation Tips
    • Facebook Marketplace (Oodle) Introduction
    • Facebook Marketplace - Searching Individuals
    • Facebook Marketplace Investigative Tips
    • Google Advanced Operators
    • Google Site Search: eforcity
    • Google Site Search
    • Email Header Information
    • Meta Data
    • eCommerce Laboratory
    • Conclusion
    • Module 5 Quiz: Advanced eCrime Investigation Methodologies

    Classified Investigation Methodologies

    • Classified Investigations - Introduction
    • Where is eCrime Most Prevalent
    • Fencing Vs. eFencing
    • eCommerce Challenges to Investigating Fraudsters
    • Prosecution Challenges
    • Prosecution Requirements
    • Science Meets eCrime
    • Craigslist Overview
    • Craigslist Listings
    • Craigslist Investigations
    • Google Boolean Searches (Site Search)
    • Module 6 Quiz: Classified Investigations

    Introduction to Cyber Investigations

    • Types of Cyber Crime (Reading Assignment)
    • Intro to Cyber Investigations - Overview
    • How Cyber Criminals Attack
    • Conducting Cyber Investigations
    • Cyber Investigations 101
    • How to Investigate Email Headers
    • Conclusion & Recap
    • Module 7 Quiz: Introduction to Cyber Investigations

    Exploring the Deep Web

    • DarkWeb
    • The Deep Web!
    • Introducing the TOR Project
    • Getting Started with TOR (Step by Step)
    • The Deep Web (Overview)
    • Exploration 1
    • VPN Services
    • Steps to buy and set up a VPN service to remain anonymous
    • Hidden Wiki 2017
    • Black Market Links 2017
    • Deep Web Drug Markets 2017
    • Hitman and Escrow Dark Web Links 2017
    • Directories and Lists 2017
    • TOR Wiki
    • The Secrets Behind the TOR Browser
    • What the @#$% is a Bitcoin anyway?
    • Module 8 Quiz: Deep Web

    Interpretation of Cyber Criminal Behaviors

    • Interpretation of Behaviors (Reading Assignment)
    • Module 9 Quiz: Interpretation of Behaviors

    Cyber Investigations 101

    • Cyber Investigations (Reading Assignment)
    • Module 10 Quiz: Cyber Investigations 101

    Understanding The Cyber Criminal

    • Understanding the Perpetrator (Reading Assignment)
    • Module 11 Quiz: Understanding the Perpetrator

    An Exploration into Email Headers and Digital Forensics

    • Cyber Forensics (Reading Assignment)
    • Investigating Email Crimes: The Who, What, When, and Where!
    • What do we do?
    • Email Header Information
    • Mobile Forensics Part 1
    • Mobile Forensics Part 2
    • Module 12 Quiz: Digital and Mobile Forensics

    Open Source Intelligence Methodologies

    • Open Source Intelligence (Reading Assignment)
    • Module 13 Quiz: Open Source Intelligence

    Privacy Concerns

    • Privacy (Reading Assignment)
    • Module 14 Quiz: Privacy

    Basic Social Media Investigations

    • Social Media Landscape (Reading Assignment)
    • Basic Social Media Intro
    • Facebook Search
    • Locating People on Facebook
    • Facebook profile
    • Facebook Search Tool
    • Facebook Private Profile Information
    • Twitter
    • Twitter Search
    • Twitter Mobile App
    • YouTube
    • YouTube Search
    • Google+
    • Google+ Search
    • Ethical Considerations
    • Module 15 Quiz: Basic Social Media Investigations

    Advanced Social Media Investigations

    • Resources
    • An overview of Advanced Social Media Investigations
    • Defining Open Source Intelligence
    • A World of Sock Puppets
    • Domain Names
    • Username Workflow
    • Search Engines
    • Facebook
    • Twitter
    • Instagram
    • YouTube
    • Hootsuite and SproutSocial
    • Module 16 Quiz: Advanced Social Media Investigations

    Documenting Social Media Evidence

    • Social Media Evidence (Reading Assignment)
    • Module 17 Quiz: Documenting Social Media Evidence

    Chatting Up Your Person of Interest

    • Introduction to Video Chat Platforms
    • Skype Sign Up
    • Web Platform and Features
    • Skype App and Searching
    • Google Hangouts Intro
    • Google Plus
    • Hangouts Tutorial
    • Google Hangouts Mobile
    • Oovoo
    • Oovoo Chat Window
    • Facetime
    • Tango
    • Module 18 Quiz: Chatting Up Your Person of Interest

    How to Conduct Investigations on Dating Websites

    • Dating Site Introduction
    • Doing a Basic Search on Plenty of Fish
    • Plenty of Fish Advanced Search
    • Searching for a Username on Plenty of Fish
    • Searching the Forums in Plenty of Fish
    • Match.com Login and Overview
    • Match.com Search Functions
    • What about Google Site Search
    • Module 19 Quiz: Dating Sites

    Law Enforcement Efforts

    • Law Enforcement Efforts (Reading Assignment)
    • Module 20 Quiz: Law Enforcement Efforts

    Legal Fundamentals of Cyber Investigations

    • Legal Fundamentals (Reading Assignment)
    • Introduction to Legal Fundamentals
    • Understanding Your Role as a Corporate Investigator
    • Understanding Your Employees Rights
    • The Electronic Communications Privacy Act
    • Understanding Law Enforcement Concerns
    • An Agent of the Law
    • Federal Laws to Prosecute CyberCrimes
    • Becoming an Expert Witness
    • Dauberts Standards, What is it?
    • Common Task of an Expert Witness
    • Preparing to Become an Expert Witness
    • Your Role as a Consultant
    • How to Prepare Your Testimony for Court
    • Preparing Forensic and Computer Evidence
    • Summary
    • Module 21 Quiz: Legal Fundamentals of Cyber Investigations

    How to Utilize Informants

    • Introduction to Informants
    • Informants Pt. 2: Suitability
    • Informants Pt. 3: Trust and Confidentiality
    • Informants Pt. 4: Safe Handling of Informants
    • Informants Pt 5: Legal Liabilities
    • Module 22 Quiz: Informants

    How to Preserve and Secure Digital Evidence

    • Digital Evidence (Reading Assignment)
    • Module 23 Quiz: Digital Evidence

    Setting Up An Investigators Computer

    • Setting Up An Investigators Computer (Reading Assignment)
    • Module 24 Quiz: Setting Up an Investigator's Computer

    Ethical Considerations for Cyber Investigators

    • Ethical Considerations (Reading Assignment)
    • Module 25 Quiz: Ethical Considerations

    Advanced Searching Methodologies to Locate Hidden Information

    • Advanced Searching (Reading Assignment)
    • Module 26 Quiz: Advanced Searching

    Understanding Deception

    • Understanding Deception (Reading Assignment)
    • Module 27 Quiz: Deception

    Program Design and Development

    • Program Design and Development (Reading Assignment)
    • Module 28 Quiz: Program Development

    CCIP Appendix

    • CCIP Appendix

    CCIP Final Exam

    • Preparing for the Exam
    • Board Exam Purchase

     

      What our Students have to Say