Your Cart is Empty

Qualified Expert In Cyber Investigations (Q|ECI)


Need a Payment Plan? Chat with us below.
Buying for your team?

The most Comprehensive, engaging, and realistic cyber investigation training the industry has ever seen.. We prepare you for real-life scenarios and success!

Qualified Cyber Investigations Expert's (QCIE's) are the industry’s Most Elite Cyber Investigators that are trained in advanced and state of the art methodologies to identify, investigate and resolve the most complex cybercrimes known to man. They are Simply the Best of the Best! Let me tell you about the program and how to earn your credential and board certification!

This is an exciting 6 month online Professional Board Certification focused on enhancing your skill sets as a "Cyber Investigations Expert" which takes a blended learning approach of self-study, live interactions, and instructor lead investigative exercises that will help you to learn how to conduct successful cyber investigations with effective new concepts to prosecute the guilty. We are taking over 25 years of hands-on experience of conducting cyber-investigations from the private, public, and government sectors around the world and sharing with you, our insights into what contributes to success and failures.

This program contains over 500 video-based lectures resulting in hundreds of hours of online training, online prep review quizzes to prepare you for the final exam, and of course the necessary study manuals as well to help you along the way.

It does not matter if you are from Law Enforcement, Loss Prevention, Fraud, Intelligence, Cyber Security, I.T Security or Private Investigation you will learn a ton of new concepts and investigative methodologies that you can apply immediately to your role and come out on top. We take the best of the best and make them even better!

To Earn your Designation and Credential you will Need to Purchase the Board Exam:Purchase the Bundle Pack to include the Board Exam today and Save Even More vs. buying it separately. Choose the bundle pack on this page.

Benefits of our Programs

  • Lifetime Access. No Limits!
  • Blended Learning - Live Exercises
  • Live Instructors, Real-Life Video-Based Learnings
  • Nationally Accredited through NASBA

What are the requirements?

  • Bachelor’s degree or higher plus four years of experience in eCommerce, fraud, investigations, IT, law enforcement, forensics, criminal justice, law, and/or loss prevention or
  • Associates degree plus six years of experience or
  • High school diploma or GED plus seven years of experience or
  • Minimum two years experience as a full-time faculty member at an accredited educational institution.

In addition, a person convicted of a felony, any crime of moral turpitude or misdemeanor relating to honesty, theft, embezzlement, fraud or the like shall be ineligible to become a CCIE®. Applicant must provide a copy of a certified transcript of education ONLY if using college degree rather than experience to qualify. Applicant must successfully pass the prescribed background check, which may include a criminal background check and examination process. Falsification or omission of information on the application form will be reason enough to disqualify an applicant from becoming or remaining a Certified Cyber Investigations Expert.


Welcome to the CCIE

  • Group Forum Discussion: Introduce Yourself!
  • Introduction (Reading Assignment)
  • Code of Ethics (Reading Assignment)
  • Course Materials / Downloads

History and Background

  • CCIE History & Background Manual
  • Module 2 Quiz: History and Background

Cyber Intelligence (Overview)

  • Cyber Intelligence (Reading Assignment)
  • Module 3 Quiz: Cyber Intelligence

eCrime Investigation Methodologies

  • eCommerce Investigation Methodologies (Reading Assignment)
  • eCrime Investigations - Introduction
  • Where is eCrime Most Prevalent
  • Fencing Vs. eFencing
  • eCommerce Challenges to Investigating Fraudsters
  • Prosecution Challenges
  • Prosecution Requirements
  • Science Meets eCrime
  • Ebay The World's Largest Auction Platform
  • Boosters Selling on Ebay
  • Ebay Fraudsters - Let's Find Them
  • Ebay Listing Overview
  • Advanced eBay Search Overview
  • eBay Search Results Overview
  • Auction Listing Details
  • Feedback Profile Overview
  • Auction Analysis for Fraud
  • Feedback Systems and How Fraudsters Use Them
  • eBay Feedback Review - First 30 Days
  • Craigslist Overview
  • Craigslist Listings
  • Craigslist Investigations
  • Google Boolean Searches - Site Search
  • Group Forum Discussion: eBay Investigation
  • Group Forum Discussion: Craigslist Investigation
  • Module 4 Quiz: eCrime Investigations Quiz

Advanced eCrime Investigation Methodologies

  • Introduction to Advanced eCommerce Fraud
  • The Demographics of Online Fraudsters
  • Trends and Patterns of Online Fraudsters
  • The Profile of an Online Fraudster
  • Types of Auction Fraud
  • Patterns in Fraudulent Behavior
  • Research Results and Types of Auction Fraud
  • Analyze Fraudulent Behavior
  • eBay Investigations
  • eBay Auction Search Kit
  • eBay and Terapeak
  • Hot Topic Research on Terapeak
  • eBay Investigative Tips
  • Craigslist Investigations
  • Craigslist Investigation Tips
  • Facebook Marketplace (Oodle) Introduction
  • Facebook Marketplace - Searching Individuals
  • Facebook Marketplace Investigative Tips
  • Google Advanced Operators
  • Google Site Search: eforcity
  • Google Site Search
  • Email Header Information
  • Meta Data
  • eCommerce Laboratory
  • Advanced eCrime Investigation Conclusion
  • Module 5 Quiz: Advanced eCrime Investigation Methodologies

Classified Investigation Methodologies

  • Classified Investigations - Introduction
  • Where is eCrime Most Prevalent
  • Fencing Vs. eFencing
  • eCommerce Challenges to Investigating Fraudsters
  • Prosecution Challenges
  • Science Meets eCrime
  • Craigslist Overview
  • Craigslist Listings
  • Craigslist Investigations
  • Google Boolean Searches (Site Search)
  • Module 6 Quiz: Classified Investigations Quiz

Introduction to Cyber Investigations

  • Types of Cyber Crime (Reading Assignment)
  • Intro to Cyber Investigations - Overview
  • How Cyber Criminals Attack
  • Conducting Cyber Investigations
  • Cyber Investigations 101
  • How to Investigate Email Headers
  • Conclusion & Recap
  • Module 7 Quiz: Introduction to Cyber Investigations

Exploring the Deep Web

  • DarkWeb
  • The Deep Web!
  • Introducing the TOR Project
  • Getting Started with TOR (Step by Step)
  • The Deep Web (Overview)
  • Exploration 1
  • VPN Services
  • Steps to buy and set up a VPN service to remain anonymous
  • Hidden Wiki 2017
  • Black Market Links 2017
  • Deep Web Drug Markets 2017
  • Hitman and Escrow Dark Web Links 2017
  • Directories and Lists 2017
  • TOR Wiki
  • The Secrets Behind the TOR Browser
  • What the @#$% is a Bitcoin anyway?
  • Module 8 Quiz: Deep Web

Interpretation of Behaviors

  • Interpretation of Behaviors (Reading Assignment)
  • Module 9 Quiz: Interpretation of Behaviors

Cyber Investigations 101

  • Cyber Investigations (Reading Assignment)
  • Module 10 Quiz: Cyber Investigations 101

Understanding the Perpetrator

  • Understanding the Perpetrator (Reading Assignment)
  • Module 11 Quiz: Understanding the Perpetrator

Email Headers and Digital Forensics

  • Cyber Forensics (Reading Assignment)
  • Investigating Email Crimes: The Who, What, When, and Where!
  • What do we do?
  • Email Header Information
  • Mobile Forensics Part 1
  • Mobile Forensics Part 2
  • Module 12 Quiz: Digital and Mobile Forensics

Open Source Intelligence

  • Open Source Intelligence (Reading Assignment)
  • Module 13 Quiz: Open Source Intelligence


  • Privacy (Reading Assignment)
  • Module 14 Quiz: Privacy

Basic Social Media Investigations

  • Social Media Landscape (Reading Assignment)
  • Basic Social Media Intro
  • Facebook Search
  • Locating People on Facebook
  • Facebook Profile
  • Facebook Search Tool
  • Facebook Private Profile Information
  • Twitter
  • Twitter Search
  • Twitter Mobile App
  • YouTube
  • YouTube Search
  • Google+
  • Google+ Search
  • Ethical Considerations
  • Module 15 Quiz: Basic Social Media Investigations

Advanced Social Media Investigations

  • Resources
  • An overview of Advanced Social Media Investigations
  • Defining Open Source Intelligence
  • A World of Sock Puppets
  • Domain Names
  • Username Workflow
  • Search Engines
  • Facebook
  • Twitter
  • Instagram
  • YouTube
  • Hootsuite and SproutSocial
  • Module 16 Quiz: Advanced Social Media Investigations

Legal Fundamentals of Cyber Investigations

  • Legal Fundamentals (Reading Assignment)
  • Introduction to Legal Fundamentals
  • Understanding Your Role as a Corporate Investigator
  • Understanding Your Employees Rights
  • The Electronic Communications Privacy Act
  • Understanding Law Enforcement Concerns
  • An Agent of the Law
  • Federal Laws to Prosecute CyberCrimes
  • Becoming an Expert Witness
  • Dauberts Standards, What is it?
  • Common Task of an Expert Witness
  • Preparing to Become an Expert Witness
  • Your Role as a Consultant
  • How to Prepare Your Testimony for Court
  • Preparing Forensic and Computer Evidence
  • Legal Fundamentals of Cyber Investigations Summary
  • Module 17 Quiz: Legal Fundamentals of Cyber Investigations

Documenting Social Media Evidence

  • Documenting Social Media Evidence (Reading Assignment)
  • Module 18 Quiz: Documenting Social Media Evidence

Chatting Up Your Person of Interest

  • Introduction to Video Chat Platforms
  • Skype Sign Up
  • Web Platform and Features
  • Skype App and Searching
  • Google Hangouts Intro
  • Google Plus
  • Hangouts Tutorial
  • Google Hangouts Mobile
  • Oovoo
  • Oovoo Chat Window
  • Facetime
  • Tango
  • Module 19 Quiz: Chatting Up Your Person of Interest

What Do We Do With Dating Sites

  • Dating Site Introduction
  • Doing a Basic Search on Plenty of Fish
  • Plenty of Fish Advanced Search
  • Searching for a Username on Plenty of Fish
  • Searching the Forums in Plenty of Fish
  • Match.com Login and Overview
  • Match.com Search Functions
  • What about Google Site Search
  • Module 20 Quiz: Dating Sites

How to Utilize Informants

  • Introduction to Informants
  • Informants Pt. 2: Suitability
  • Informants Pt. 3: Trust and Confidentiality
  • Informants Pt. 4: Safe Handling of Informants
  • Informants Pt 5: Legal Liabilities
  • Module 21 Quiz: Informants

Law Enforcement Efforts

  • Law Enforcement Efforts (Reading Assignment)
  • Module 22 Quiz: Law Enforcement Efforts

Digital Evidence

  • Digital Evidence (Reading Assignment)
  • Module 23 Quiz: Digital Evidence

Setting up an investigators computer

  • Setting up an investigators computer (Reading Assignment)
  • Module 24 Quiz: Setting up the Investigators Computer

Ethical Considerations

  • Ethical Considerations (Reading Assignment)
  • Module 25 Quiz: Ethical Considerations

Advanced Searching

  • Advanced Searching (Reading Assignment)
  • Module 26 Quiz: Advance Searching


  • Understanding Deception (Reading Assignment)
  • Module 27 Quiz: Deception

Program Design and Development

  • Program Design and Development (Reading Assignment)
  • Module 28 Quiz: Program Development

Introduction to ORC Investigations

  • Welcome to Organized Retail Crime
  • Introduction to ORC (Reading Assignment)
  • How we Create Influential Leaders!
  • What is the Journey Going to be Like?
  • Are You a Super Guru in the Making?

Organized Retail Crime Overview

  • ORC Overview (Reading Assignment)
  • What is the Definition of ORC?
  • What is Our Idea of ORC?
  • ORC: How Do They Do It?
  • Module 30 Quiz: ORC Overview

Organized Retail Crime Fraud Schemes

  • ORC Fraud Schemes (Reading Assignment)
  • What Industries Does ORC Impact?
  • What are The Top Cities and Products for ORC?
  • Module 31 Quiz: ORC Fraud Schemes

Booster Operations

  • Booster Operations (Reading Assignment)
  • What Is a Booster and What Do They Do?
  • What Tools Does a Booster Use?
  • What are The Different Levels of a Booster?
  • Module 32 Quiz: Booster Operations

Fencing Operations

  • Fencing Operations (Reading Assignments)
  • What is a Fence?
  • How Do We Stop ORC?
  • The Struggles: Don't Give Up!
  • Module 33 Quiz: Fencing Operations

Organized Retail Crime Investigations

  • Introduction to ORC Investigations
  • What will we learn today?
  • How to Investigate Organized Retail Crime
  • How to Educate and Train...
  • What Kind of Visual Deterrents to Use to Stop ORC!
  • What Kind of Physical Deterrents Can You Use to Stop ORC!
  • How to Decide Correct Camera Placement!
  • What to Know about Merchandise Tagging!
  • Make Sure You Know the Reporting Methods!
  • How Are You Doing the Investigation?
  • The ORC Theory and Research Facts!
  • Look at Your Options!
  • Can You Identify an Investigation Route?
  • Know the Case Enhancement!
  • What is Needed for the Investigation
  • How is Shoplifting Successful and How We Stop It?
  • How to Investigate Check Fraud?
  • Is Your Credit Card Safe?
  • Investigating Gift Card Deception!
  • Is That a Legitimate Refund? ?
  • Did You Make Your Coupon?
  • Walking Through a Practical Investigation!

Organized Retail Crime Investigations Part 2

  • Are You Articulating Your Documentation?
  • Do You Have Evidence of a Fence?
  • What about Overseas Sales?
  • Introduction and What You Will Learn!
  • Taking Down the Crew!
  • Do You Have the Correct Information?
  • Taking the Right Photographs
  • Interview and Interrogation (Reading Assignment)
  • Completing the Interview and Interrogation
  • Make Sure You Obtain a Written Statement!
  • How do They Establish a Fencing Operation?
  • What are the Different Levels of a Fence?
  • What do Fence Locations Look Like?
  • What is E-fencing?
  • Using Surveillance to Track Your Suspect!
  • Use Cellphone Records to Tie Your Suspect to the Case
  • Do You Use Merchandise Tracking?
  • Do You Know How to Develop Your Informant?
  • Conducting Buys and Sales!
  • Investigation of a Fence!
  • Types of Gateway Crimes?
  • Here is a Practical Exercise!
  • Here are the Subpoenas and Search and Seizures!

Surveillance Methods

  • Surveillance Methods (Preliminary)
  • Mobile Surveillance & Prep

Legal Fundamentals of Organized Retail Crime

  • ORC Legal Aspects (Reading Assignment)
  • Intro to Legal Fundamentals of Organized Retail Crime and What You Will Learn!
  • What Types of Crimes Occur?
  • What are the Different Types of Courts?
  • What Bills and Acts Help Fight ORC?
  • Prosecuting the Criminal!
  • What about Court Orders?
  • Computer Forensic Types of Evidence!
  • Collecting Photographic Evidence for Your Case!
  • What Evidence do You Have of a Fence?
  • What is the Charging Process?
  • Learn How to be an Expert Witness!
  • How to Prepare for the Verdict!
  • Make Sure You Review Your Case!
  • Module 37 Quiz: ORC Legal

ORC Prevention and Deterrence

  • ORC Prevention(Reading Assignment)
  • ORC Appendix
  • ORC Appendix and References

Introduction to Cyber Counterintelligence

  • Welcome to the Cyber Counterintelligence Threat Analysis Program!
  • Group Forum Discussion: Research

Intelligence Overview

  • Types of Cyber Crime (Reading Assignment)
  • Intro to Cyber Investigations - Overview
  • How Cyber Criminals Attack
  • Conducting Cyber Investigations
  • Cyber Investigations 101
  • How to Investigate Email Headers
  • Intro to Cyber Investigations Conclusion
  • Quiz: Introduction to Cyber Investigations

Applying Intelligence Methodologies

  • Applying Intelligence Methodologies
  • Assignment: Applying Intelligence

Cyber Terrorism & Hackers

  • Cyber Terrorism in the News
  • Counter Terrorism

Cyber Threats & Concerns

  • Cyber Threat Concerns

CCIE Appendix

  • CCIE Appendix

Final Exam

  • Preparing for the Exam
  • Board Exam Purchase

    What our Students have to Say

    Customer Reviews

    Based on 3 reviews
    5 Star
    4 Star
    3 Star
    2 Star
    1 Star
    Write a Review Ask a question
    • Reviews (3)
    • Questions (0)

    Thank you for submitting a review!

    Your input is very much appreciated. Share them with your friends so they can enjoy it too!
    Frank Cutruzzola

      Most Comprehensive

      This is truly one of the most comprehensive and thorough programs you can find today.

      Barry Mince Jr

        Intensive course and content - valuable learning

        This is my second course with McAfee Institute. I found this course to be interesting and full. I did learn new things about the Digital and Cyber investigations side of the world more so than I knew at the time, so I was able to take away new learning and information, and begin applying the concepts personally and professionally. The course is long and challenging at times, and that is a GOOD thing considering the amount of credits it claims for CPE, and also the nature and depth of the cont...

        Erik Stephens

          CCIE Course

          This course Is very informative and helps students of all levels gain information into how conduct Cyber investigations. Whether one has been investigating for a number of years or new to Cyber investigations there is something to take away. The combination of Text, Video and "homework" assignments helps to keep the course engaging.