WOULD YOU LIKE TO TAKE YOUR CAREER TO THE NEXT LEVEL? TAKE ADVANTAGE OF THE DIVERSE OPPORTUNITIES THAT AWAIT YOU AS A CYBER-THREAT FORENSIC INVESTIGATOR (Q|CTFI) BOARD CERTIFIED PROFESSIONAL. FIND A FULFILLING CAREER IN THE GROWING FIELD OF CYBER-SECURITY & INVESTIGATIONS!
The Qualified Cyber-Threat Forensic Investigator (Q|CTFI): provides students the essential domain knowledge required to serve in decision-making roles throughout the cyber-security industry. Students will learn how to analyze cyber-security risks, develop appropriate protection & response options, and assess operational requirements for government, military, critical infrastructure, retail and commercial missions. Upon completing the board certification, students will possess advanced knowledge of the strategy, policy, investigation, intelligence, prosecution and analytic aspects of cyber-security, enabling them to fill critical roles in operational cyber-security investigative missions supporting both retail and governmental entities.
“The Q|CTFI is a subject matter expert on cyber threats, investigations, forensic examination & prosecution”
The McAfee Institute has found that cyber-security work involves more than traditional IT skills. Cyber security work also includes the identification, investigation, prosecution, root cause analysis, trends and intelligence / counterintelligence methodologies to understand how perpetrators think, act and carry out their attacks. By becoming a Q|CTFI you will possess a wide array of technical IT skills as well as advanced investigative, intelligence, counterintelligence, prosecution and analytical capabilities.
The Q|CTFI Supports the National Cyber-Security Workforce Framework (Homeland Security)
The goal of the McAfee Institute Q|CTFI Board Certification is to prepare students for a successful career upon graduation. A resource that helps our students prepare for these types of careers is our partnership with the National Cyber-Security Workforce Framework led by Homeland Security.
Our Q|CTFI program adheres to these guidelines and learning to ensure you receive the industries best training available. It plays an important role for future cyber-security professionals by providing information on hands-on learning and internship opportunities, and outlining key cyber-security knowledge and skills.
There are thousands of cyber-security jobs across the country, so opportunity abounds! The field will grow 22% by 2020 and according to the NICCS Cyber-security Professionals Salaries can range between $70,000 -$118,000 and up
100's of Video Based Tutorial and Lectures (40+ Hours of Learning's)
Students will be able to:
Bring Your Team and Save even More! Call us at 888-263-1650 for special pricing.
To Earn your Designation and Credential you will Need to Purchase the Board Exam: Purchase the Bundle Pack to include the Board Exam today and Save Even More vs. buying it separately. Choose the bundle pack on this page.
Eligibility for Board Certification
Welcome to the CTFI Board Certification Program!
Introduction to Cybersecurity
Introduction to Cyber Warfare
Global Cyber Capabilities and Trends
Global Cyber Threats, Attacks, Vehicles, and Mechanisms (Hacking 101)
Cyber Threat Modeling
IT. Security Systems
Intrusions & Attacks: Cyber Attacks on Retailers
Intrusions & Attacks: Personal Information Breaches
Intrusions & Attacks: Cyber Attacks on Government
Intrusions & Attacks: Cyber Attacks on Law Enforcement
Intrusions & Attacks: Memory Scraping - Parsing Malware
Credit Card Fraud: Payment Processing (e-commerce fraud)
Investigative Methods: Digital & Computer Forensics
Investigative Methods: Exploring TOR and the Deep Web
Investigative Methods: Using Open Source Intelligence
Investigative Methods: Background Investigations
Cyber Intelligence & Counterintelligence Operations
Intelligence Methodologies: How to gather intelligence
Intelligence Methodologies: Where cyber criminals sell their data & information
Intelligence Methodologies: How to Gather Intelligence on Social Media Websites
Intelligence Methodologies: How to Gather Intelligence on eCommerce & Auction Websites
Intelligence Methodologies: How to Gather Intelligence on Chat Websites and Applications
Counterintelligence Methodologies: 200+ of the Best Open Source Intelligence Resources
Preparation & Response: Data Breach Preparedness
Preparation & Response: Preparedness Plan Audit
Preparation & Response: Notification and Disclosure
Search and Seizure
Expert Witness Testimony