Breadcrumb
  1. Training
  2. Education & Training Catalog
  3. McAfee Institute
  4. Certified Counterintelligence Threat Analyst (CCTA)

Certified Counterintelligence Threat Analyst (CCTA)

The most comprehensive, engaging, and realistic Cybercrime Investigation training the industry has ever seen. We prepare you for real-life scenarios and success!

Certified Counterintelligence Threat Analyst's (CCTAs) are the industry's Most Elite Counterintelligence Threat Analyst that are trained in advanced and state of the art methodologies to identify, investigate and resolve the most complex cybercrimes and threats known to man. They are Simply the Best of the Best! Let me tell you about the program and how to earn your credential and board certification!

The CCTA Certification program contains over 250 lectures which are consistent with the competencies needed to pass the CCTA exam. You earn 40 CPE credits for completing this program as well as the credential and designation of CCTA to add to your resume and professional CV. Over 250 Lectures and 40 Hours of Content, Tutorials, Videos, Resources and More!

What is Included?

  • CCTA Digital Study Guides
  • CCTA Online Training Course
  • 40 CPE Credits

Bonus Items!

  • CCTA Online Prep Review Course
  • CCTA Exam Fee
  • Networking & Collaboration

Course Overview

Overall Proficiency Level
2 - Intermediate
Course Catalog Number
CTA2016
Course Prerequisites

Eligibility Requirements: Bachelor's Degree or higher plus three years of experience in e-commerce, fraud, investigations, intelligence, military, cybersecurity, law enforcement, forensics, computer/digital forensics, criminal justice or law -or- Associates degree plus four years of experience -or- High School diploma or equivalency plus four years of experience.

Training Purpose
Skill Development
Specific Audience
All
Delivery Method
Online, Self-Paced
  • Online, Self-Paced

Learning Objectives

  • Introduction to Cyber Counterintelligence
  • Intelligence Overview
  • Applying Intelligence Methodologies
  • Counterintelligence Methodologies
  • Cyber Terrorism & Hackers
  • Cyber Threats & Concerns
  • Email Headers and Digital Forensics
  • Setting up an investigators computer
  • Understanding The Perpetrator
  • Understanding Deception
  • Basic Social Media Investigations
  • Advanced Social Media Investigations
  • Chatting Up Your Person of Interest
  • What Do We Do With Dating Sites
  • Classified Investigation Methodologies
  • Documenting Social Media Evidence
  • eCrime Investigation Methodologies
  • Advanced eCrime Investigation Methodologies
  • Exploring the Deep Web
  • Open Source Intelligence
  • Law Enforcement Efforts
  • Advanced Searching
  • Technical and Tactical Surveillance Methods
  • Legal, Ethical and Privacy Issues
  • Live Exercises
  • CTA Exam

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Work Roles

Feedback

If you would like to provide feedback on this course, please e-mail the NICCS team at NICCS@mail.cisa.dhs.gov. Please keep in mind that NICCS does not own this course or accept payment for course entry. If you have questions related to the details of this course, such as cost, prerequisites, how to register, etc., please contact the course training provider directly. You can find course training provider contact information by following the link that says “Visit course page for more information...” on this page.

Last Published Date: