McAfee Institute

Last updated
McAfee Institute LLC
Formation2010;14 years ago (2010)[ citation needed ]
Headquarters Chesterfield, MO
Location
Coordinates 25°49′16″N80°19′36″W / 25.821094°N 80.326615°W / 25.821094; -80.326615
Region served
Global (125 Countries)[ citation needed ]
CEO
Joshua McAfee
Website mcafeeinstitute.com

McAfee Institute is an American professional certification and training organization founded in 2010 by Joshua McAfee. [1] The Institute specializes in providing online education for professionals in the intelligence, investigations, and law enforcement sectors. McAfee Institute offers certifications and training programs in fields such as cyber intelligence, cryptocurrency investigations, open-source intelligence (OSINT), human trafficking investigations, and workplace violence prevention.

Contents

Programs and certifications

McAfee Institute offers a range of certifications and training programs aimed at professionals in law enforcement, the military, intelligence, and corporate sectors. [2] These programs include training in:

The curriculum integrates theoretical knowledge with practical case studies and scenarios to help professionals apply the skills in real-world contexts. [3]

Accreditations and Recognitions

McAfee Institute has been accredited by several government and industry bodies, solidifying its position as a recognized training provider in intelligence and investigations.

McAfee Institute's certifications are further recognized by organizations such as the National Initiative for Cybersecurity Careers and Studies (NICCS) under the Department of Homeland Security and the Society for Human Resource Management (SHRM) for professional development credits.

Partnerships and Recognitions

McAfee Institute has been recognized by several governmental and industry organizations for its contributions to professional education. It is a listed provider of professional certifications by the Department of Homeland Security's National Initiative for Cybersecurity Careers and Studies (NICCS). [6]

In 2021, McAfee Institute was approved by the Society for Human Resource Management (SHRM) to offer professional development credits for its courses. [7] This acknowledgment by SHRM further demonstrates the Institute's commitment to continuous learning and development in the intelligence and investigative sectors.

Additionally, the Institute has formed partnerships with the U.S. Department of Defense (DoD), offering credentialing assistance programs to military personnel through the [8] Army COOL & Credentialing Assistance (CA), [9] Navy COOL, DOD Civilian COOL [10] and Airforce COOL.

Industry Contributions

McAfee Institute has been featured in several industry publications, including Inc. Magazine, where it was highlighted for its contributions to developing skilled professionals in cybersecurity and cybercrime investigations. In 2013, McAfee Institute was recognized in Inc. 500/5000 for its rapid growth, [1] ranking #35 on the list of fastest-growing companies. [11] Insights Success Magazine [12] profiled the Institute, discussing how it develops elite cybercrime fighters. In Social Engineering by unidel.edu, McAfee Institute was identified as a recognizable and trustworthy source for intelligence training, reinforcing its reputation within the field. [13]

Publications and Research

McAfee Institute regularly contributes to research and public awareness in the fields of intelligence and investigations. Notably, the Institute offers specialized training programs addressing the evolving role of technology in human trafficking and sexual exploitation. [1] The Institute aims to equip professionals with skills necessary to combat these growing global issues, leveraging digital forensics, cybersecurity, and OSINT methodologies. [14]

See also

Related Research Articles

<span class="mw-page-title-main">Computer security</span> Protection of computer systems from information disclosure, theft or damage

Computer security is the protection of computer software, systems and networks from threats that can lead to unauthorized information disclosure, theft or damage to hardware, software, or data, as well as from the disruption or misdirection of the services they provide.

<span class="mw-page-title-main">SANS Institute</span> American security company

The SANS Institute is a private U.S. for-profit company founded in 1989 that specializes in information security, cybersecurity training, and selling certificates. Topics available for training include cyber and network defenses, penetration testing, incident response, digital forensics, and auditing. The information security courses are developed through a consensus process involving administrators, security managers, and information security professionals. The courses cover security fundamentals and technical aspects of information security. The institute has been recognized for its training programs and certification programs. Per 2021, SANS is the world’s largest cybersecurity research and training organization. SANS is an acronym for SysAdmin, Audit, Network, and Security.

<span class="mw-page-title-main">Cybercrime</span> Type of crime based in computer networks

Cybercrime encompasses a wide range of criminal activities that are carried out using digital devices and/or networks. These crimes involve the use of technology to commit fraud, identity theft, data breaches, computer viruses, scams, and expanded upon in other malicious acts. Cybercriminals exploit vulnerabilities in computer systems and networks to gain unauthorized access, steal sensitive information, disrupt services, and cause financial or reputational harm to individuals, organizations, and governments.

Open source intelligence (OSINT) is the collection and analysis of data gathered from open sources to produce actionable intelligence. OSINT is primarily used in national security, law enforcement, and business intelligence functions and is of value to analysts who use non-sensitive intelligence in answering classified, unclassified, or proprietary intelligence requirements across the previous intelligence disciplines.

CISSP is an independent information security certification granted by the International Information System Security Certification Consortium, also known as ISC2.

CCNA is an entry-level information technology (IT) certification offered by Cisco Systems. CCNA certification is widely recognized in the IT industry as the foundational step for careers in IT positions and networking roles.

<span class="mw-page-title-main">Golisano College of Computing and Information Sciences</span> Computing school at Rochester Institute of Technology

The B. Thomas Golisano College of Computing and Information Sciences is one of the largest colleges at the Rochester Institute of Technology (RIT), and is home to the institute's computing education and research facilities. Golisano College is home to RIT's computer science, cybersecurity, information sciences and technologies, and software engineering departments, as well as the Ph.D. program in computing and information sciences, and the School of Interactive Games & Media, home to the college's game design and development and interactive development programs. Golisano College is housed in a 125,000 square foot facility, opened in 2003 on RIT's campus in Rochester, New York.

<span class="mw-page-title-main">Internet police</span> Term describing governmental and official involvement in cyber policing

Internet police is a generic term for police and government agencies, departments and other organizations in charge of policing the Internet in a number of countries. The major purposes of Internet police, depending on the state, are fighting cybercrime, as well as censorship and propaganda.

<span class="mw-page-title-main">Department of Defense Cyber Crime Center</span> United States defense organization

The Department of Defense Cyber Crime Center (DC3) is designated as a Federal Cyber Center by National Security Presidential Directive 54/Homeland Security Presidential Directive 23, as a Department of Defense (DoD) Center Of Excellence for Digital and Multimedia (D/MM) forensics by DoD Directive 5505.13E, and serves as the operational focal point for the Defense Industrial Base (DIB) Cybersecurity program. DC3 operates as a Field Operating Agency (FOA) under the Inspector General of the Department of the Air Force.

The Biofeedback Certification International Alliance (BCIA) is an organization that issues certificates for biofeedback, which is "gaining awareness of biological processes".

Control system security, or automation and control system (ACS) cybersecurity, is the prevention of interference with the proper operation of industrial automation and control systems. These control systems manage essential services including electricity, petroleum production, water, transportation, manufacturing, and communications. They rely on computers, networks, operating systems, applications, and programmable controllers, each of which could contain security vulnerabilities. The 2010 discovery of the Stuxnet worm demonstrated the vulnerability of these systems to cyber incidents. The United States and other governments have passed cyber-security regulations requiring enhanced protection for control systems operating critical infrastructure.

ISC2 Non-profit IT cybersecurity organization

The International Information System Security Certification Consortium, or ISC2, is a non-profit organization which specializes in training and certifications for cybersecurity professionals. It has been described as the "world's largest IT security organization". The most widely known certification offered by ISC2 is the Certified Information Systems Security Professional (CISSP) certification.

<span class="mw-page-title-main">Maltego</span> Data mining and link analysis software

Maltego is an all-in-one platform for open-source intelligence (OSINT) and cyber investigations, developed by Maltego Technologies GmbH, a company headquartered in Munich, Germany.

A Master of Science in Cyber Security is a type of postgraduate academic master's degree awarded by universities in many countries. This degree is typically studied for in cyber security. What is offered by many institutions is actually called a Master in Strategic Cyber Operations and Information Management (SCOIM) which is commonly understood to be a Master in Cybersecurity. This degree is offered by at least some universities in their Professional Studies program so that it can be accomplished while students are employed - in other words it allows for "distance learning" or online attendance. Requirements for the Professional Studies program include: 3.0 or better undergrad GPA, professional recommendations letters and an essay.

<span class="mw-page-title-main">Mile2</span>

Mile2 is an information technology security company that develops and provides proprietary accredited cybersecurity certifications. The company's technology security programs are utilized in the private and public sectors, including by Boeing, Canada's Department of National Defense, the National Security Agency, the United States Air Force, the Committee on National Security Systems (CNSS), the U.S. Federal Bureau of Investigation and others.

Phyllis Schneck is an American executive and cybersecurity professional. As of May 2017, she became the managing director at Promontory Financial Group. Schneck served in the Obama administration as Deputy Under Secretary for Cybersecurity and Communications for the National Protection and Programs Directorate (NPPD), at the Department of Homeland Security.

William "Chuck" Easttom II is an American computer scientist specializing in cyber security, cryptography, quantum computing, and systems engineering.

The Cybersecurity Maturity Model Certification (CMMC) is an assessment framework and assessor certification program designed to increase the trust in measures of compliance to a variety of standards published by the National Institute of Standards and Technology.

Cybersex trafficking, live streaming sexual abuse, webcam sex tourism/abuse or ICTs -facilitated sexual exploitation is a cybercrime involving sex trafficking and the live streaming of coerced sexual acts and/or rape on webcam.

References

  1. 1 2 3 "How A Data-Sleuth Helps Battle Human Trafficking". Inc. com. 20 August 2013. Retrieved 7 April 2015.
  2. Institute, McAfee. "Board Certifications". McAfee Institute. Retrieved 2023-07-16.
  3. "McAfee Institute | NICCS". niccs.cisa.gov. Retrieved 2023-07-16.
  4. "Search". scorecard.mo.gov. Retrieved 2024-09-05.
  5. "POST Calendar -Department of Public Safety". dps.mo.gov. Retrieved 2024-09-05.
  6. "NICCS-McAfee Institute" . Retrieved 7 April 2015.
  7. Team, the SHRM Recertification (2021-02-18). "New Companies Become SHRM Recertification Providers". SHRM. Retrieved 2021-04-28.
  8. "DOD COOL". US DOD COOL.
  9. "U.S. Army Credentialing Assistance". Army COOL.
  10. "US DOD" (PDF).
  11. "Awards and Recognition". pages.mcafeeinstitute.com. Retrieved 2023-07-16.
  12. McAfee Institute Develops the Industry’s Most Elite Cyber Crime Fighters." Insights Success Magazine.https://insightssuccess.com/mcafee-institute-develops-the-industrys-most-elite-cyber-crime-fighters/
  13. Erbschloe, Michael (2020). Social Engineering. CRC Press.
  14. Morris, Michael (2017). The Impact of Advancing Technologies Upon Global Human Trafficking and Sexual Exploitation in Society Today (Thesis).[ page needed ]