McAfee Institute

Last updated
McAfee Institute LLC
Formation2010;14 years ago (2010)[ citation needed ]
Headquarters Chesterfield, MO
Location
Coordinates 25°49′16″N80°19′36″W / 25.821094°N 80.326615°W / 25.821094; -80.326615
Region served
Global (125 Countries)[ citation needed ]
CEO
Joshua McAfee
Website mcafeeinstitute.com

The McAfee Institute is an American professional certification and training organization specializing in intelligence and investigations studies. Founded in 2010 by Joshua McAfee, [1] the Institute is known for providing comprehensive online instruction across a variety of subjects within intelligence and investigations. Its training modules cover a wide array of areas, from cyber intelligence, cryptocurrency investigations, OSINT, criminal investigations, artificial intelligence and digital forensics to human trafficking, incident response, and leadership.

Contents

Programs and certifications

The Institute’s extensive curriculum [2] includes numerous subjects of contemporary relevance. These topics include:

These courses [3] are designed to provide a broad understanding of each topic, combining theoretical knowledge with practical case studies.

Partnerships and recognitions

The McAfee Institute has established significant partnerships and has been recognized by leading organizations. It is listed as a provider of professional certifications by the Department of Homeland Security's National Initiative for Cybersecurity Careers and Studies. [4]

In 2021, the Institute achieved another notable recognition when it was approved by the Society for Human Resource Management [5] (SHRM) to offer professional development credits. This acknowledgment by SHRM further demonstrates the Institute's commitment to continuous learning and development in the intelligence and investigative sectors.

McAfee Institute partnered with the DOD in 2021 to offer credentialing assistance for the military to attend their programs; this partnership included DOD, [6] Army, [7] Navy, and Airforce.

Accolades

The McAfee Institute has been recognized for its contributions to the industry and its rapid growth. Insights Success Magazine [8] profiled the Institute, discussing how it develops elite cybercrime fighters. Further testament to its growth and success, [1] the Institute was featured in the Inc 500/5000 [9] list, ranking as one of the fastest-growing companies in the world at #35.

The role of technology in human trafficking and sexual exploitation

The advent of the internet and advancements in technology over the past few decades have significantly impacted various aspects of human life, including illicit activities like human trafficking and sexual exploitation. In his 2017 dissertation, Michael Morris notes how these technologies are being used for sinister intentions, with young women and children often becoming targets[1]. The rise of messaging applications and social media platforms has made it easier for predators to locate and groom potential victims. According to Morris, human trafficking has rapidly become one of the top three most profitable criminal enterprises and is likely to continue flourishing as long as there are individuals willing to exploit others sexually. [10]

In response to such challenges, the McAfee Institute offers specialized training programs aimed at understanding and combating these evolving threats. The Institute's programs cover a broad array of relevant topics, including cybersecurity, digital forensics, and cryptocurrency investigations. By equipping professionals with the necessary skills and knowledge, the Institute contributes to global efforts against human trafficking and sexual exploitation. [11]

See also

Related Research Articles

<span class="mw-page-title-main">SANS Institute</span> American security company

The SANS Institute is a private U.S. for-profit company founded in 1989 that specializes in information security, cybersecurity training, and selling certificates. Topics available for training include cyber and network defenses, penetration testing, incident response, digital forensics, and auditing. The information security courses are developed through a consensus process involving administrators, security managers, and information security professionals. The courses cover security fundamentals and technical aspects of information security. The institute has been recognized for its training programs and certification programs. Per 2021, SANS is the world’s largest cybersecurity research and training organization. SANS is an acronym for SysAdmin, Audit, Network, and Security.

<span class="mw-page-title-main">Cybercrime</span> Type of crime based in computer networks

Cybercrime encompasses a wide range of criminal activities that are carried out using digital devices and/or networks. These crimes involve the use of technology to commit fraud, identity theft, data breaches, computer viruses, scams, and expanded upon in other malicious acts. Cybercriminals exploit vulnerabilities in computer systems and networks to gain unauthorized access, steal sensitive information, disrupt services, and cause financial or reputational harm to individuals, organizations, and governments.

<span class="mw-page-title-main">Computer forensics</span> Branch of digital forensic science

Computer forensics is a branch of digital forensic science pertaining to evidence found in computers and digital storage media. The goal of computer forensics is to examine digital media in a forensically sound manner with the aim of identifying, preserving, recovering, analyzing and presenting facts and opinions about the digital information.

<span class="mw-page-title-main">Air Force Office of Special Investigations</span> United States federal law enforcement agency

The Air Force Office of Special Investigations is a U.S. federal law enforcement agency that reports directly to the Secretary of the Air Force. OSI is also a U.S. Air Force field operating agency under the administrative guidance and oversight of the Inspector General of the Department of the Air Force. By federal statute, OSI provides independent criminal investigative, counterintelligence and protective service operations worldwide and outside of the traditional military chain of command. Proactively, OSI identifies, investigates, and neutralizes serious criminal, terrorist, and espionage threats to personnel and resources of the Air Force, Space Force, and the U.S. Department of Defense, thereby protecting the national security of the United States.

The National Center for Missing & Exploited Children (NCMEC) is a private, nonprofit organization established in 1984 by the United States Congress. In September 2013, the United States House of Representatives, United States Senate, and the President of the United States reauthorized the allocation of $40 million in funding for the organization as part of Missing Children's Assistance Reauthorization Act of 2013. The current chair of the organization is Jon Grosso of Kohl's. NCMEC handles cases of missing minors from infancy to young adults through age 20.

The Australian Intelligence Community (AIC) and the National Intelligence Community (NIC) or National Security Community of the Australian Government are the collectives of statutory intelligence agencies, policy departments, and other government agencies concerned with protecting and advancing the national security and national interests of the Commonwealth of Australia. The intelligence and security agencies of the Australian Government have evolved since the Second World War and the Cold War and saw transformation and expansion during the Global War on Terrorism with military deployments in Afghanistan, Iraq and against ISIS in Syria. Key international and national security issues for the Australian Intelligence Community include terrorism and violent extremism, cybersecurity, transnational crime, the rise of China, and Pacific regional security.

<span class="mw-page-title-main">Howard Schmidt</span> American computer security expert

Howard Anthony Schmidt was a partner with Tom Ridge in Ridge Schmidt Cyber LLC, a consultancy company in the field of cybersecurity. He was the Cyber-Security Coordinator of the Obama Administration, operating in the Executive Office of the President of the United States. He announced his retirement from that position on May 17, 2012, effective at the end of the month.

<span class="mw-page-title-main">Human trafficking in Cambodia</span>

Cambodia is a source, transit, and destination country for human trafficking. The traffickers are reportedly organized crime syndicates, parents, relatives, friends, intimate partners, and neighbors. Despite human trafficking being a crime in Cambodia, the country has a significant child sex tourism problem; some children are sold by their parents, while others are lured by what they think are legitimate job offers like waitressing, but then are forced into prostitution. Children are often held captive, beaten, and starved to force them into prostitution.

Trellix is a privately held cybersecurity company that was founded in 2022. It has been involved in the detection and prevention of major cybersecurity attacks. It provides hardware, software, and services to investigate cybersecurity attacks, protect against malicious software, and analyze IT security risks.

<span class="mw-page-title-main">Department of Defense Cyber Crime Center</span> United States defense organization

The Department of Defense Cyber Crime Center (DC3) is designated as a Federal Cyber Center by National Security Presidential Directive 54/Homeland Security Presidential Directive 23, as a Department of Defense (DoD) Center Of Excellence for Digital and Multimedia (D/MM) forensics by DoD Directive 5505.13E, and serves as the operational focal point for the Defense Industrial Base (DIB) Cybersecurity program. DC3 operates as a Field Operating Agency (FOA) under the Inspector General of the Department of the Air Force.

<span class="mw-page-title-main">Federal Investigation Agency</span> Pakistani Federal Law Enforcement Agency

The Federal Investigation Agency is a border control, criminal investigation, counter-intelligence and security agency under the control of the Interior Secretary of Pakistan, tasked with investigative jurisdiction on undertaking operations against terrorism, espionage, federal crimes, smuggling as well as infringement and other specific crimes.

<span class="mw-page-title-main">United States Army Counterintelligence</span> Component of United States Army which conducts counterintelligence activities

United States Army Counterintelligence (ACI) is the component of United States Army Military Intelligence which conducts counterintelligence activities to detect, identify, assess, counter, exploit and/or neutralize adversarial, foreign intelligence services, international terrorist organizations, and insider threats to the United States Army and U.S. Department of Defense (DoD).

<span class="mw-page-title-main">Palo Alto Networks</span> American technology company

Palo Alto Networks, Inc. is an American multinational cybersecurity company with headquarters in Santa Clara, California. The core product is a platform that includes advanced firewalls and cloud-based offerings that extend those firewalls to cover other aspects of security. The company serves over 70,000 organizations in over 150 countries, including 85 of the Fortune 100. It is home to the Unit 42 threat research team and hosts the Ignite cybersecurity conference. It is a partner organization of the World Economic Forum.

The following outline is provided as an overview of and topical guide to computer security:

<span class="mw-page-title-main">Mile2</span>

Mile2 is an information technology security company that develops and provides proprietary accredited cybersecurity certifications. The company's technology security programs are utilized in the private and public sectors, including by Boeing, Canada's Department of National Defense, the National Security Agency, the United States Air Force, the Committee on National Security Systems (CNSS), the U.S. Federal Bureau of Investigation and others.

William "Chuck" Easttom II is an American computer scientist specializing in cyber security, cryptography, quantum computing, and systems engineering.

This is a list of cybersecurity information technology. Cybersecurity is security as it is applied to information technology. This includes all technology that stores, manipulates, or moves data, such as computers, data networks, and all devices connected to or included in networks, such as routers and switches. All information technology devices and facilities need to be secured against intrusion, unauthorized use, and vandalism. Additionally, the users of information technology should be protected from theft of assets, extortion, identity theft, loss of privacy and confidentiality of personal information, malicious mischief, damage to equipment, business process compromise, and the general activity of cybercriminals. The public should be protected against acts of cyberterrorism, such as the compromise or loss of the electric power grid.

Cybersex trafficking, live streaming sexual abuse, webcam sex tourism/abuse or ICTs -facilitated sexual exploitation is a cybercrime involving sex trafficking and the live streaming of coerced sexual acts and/or rape on webcam or having victims use a digital program with varying kinds of data to output to customers.

Ali Dehghantanha is an academic-entrepreneur in cybersecurity and cyber threat intelligence. He is a Professor of Cybersecurity and a Canada Research Chair in Cybersecurity and Threat Intelligence.

References

  1. 1 2 "How A Data-Sleuth Helps Battle Human Trafficking". Inc. com. 20 August 2013. Retrieved 7 April 2015.
  2. Institute, McAfee. "Board Certifications". McAfee Institute. Retrieved 2023-07-16.
  3. "McAfee Institute | NICCS". niccs.cisa.gov. Retrieved 2023-07-16.
  4. "NICCS-McAfee Institute" . Retrieved 7 April 2015.
  5. Team, the SHRM Recertification (2021-02-18). "New Companies Become SHRM Recertification Providers". SHRM. Retrieved 2021-04-28.
  6. "DOD COOL". US DOD COOL.
  7. "U.S. Army Credentialing Assistance". Army COOL.
  8. McAfee Institute Develops the Industry’s Most Elite Cyber Crime Fighters." Insights Success Magazine.https://insightssuccess.com/mcafee-institute-develops-the-industrys-most-elite-cyber-crime-fighters/
  9. "Awards and Recognition". pages.mcafeeinstitute.com. Retrieved 2023-07-16.
  10. Morris, Michael (2017). The Impact of Advancing Technologies Upon Global Human Trafficking and Sexual Exploitation in Society Today (Thesis).[ page needed ]
  11. "Programs and Certifications." McAfee Institute. https://www.mcafeeinstitute.com/collections/board-certifications