A Certified Cyber Crime Consultant is an expert in consulting, advising and investigating not just companies that have been hacked but professional athletes, entertainers, politicians, corporate executives, small businesses, parents, attorneys, private investigators or anyone that has a unique problem to solve, and nowhere else to turn. 

What makes this course different from other cyber security courses is that Certified Cyber Crime Consultant, teaches the business side, and the technical side of security. Most security certifications and degree programs only teach the technical side, leaving the student unaware of all they can do with their new certification or degree. They neglect to teach the student how to start their own cyber security business or how to pitch their services to companies. 

This course will educate and prepare students for a lucrative and prosperous career in the field of cyber security. Its professors have long histories in the cyber security field and have taught students from various backgrounds including cyber security professionals in local, state, and federal law enforcement. The course prepares not only college students but high school students, as well.  

Certified Cyber Crime Consultants Are Experts In:

  • Hacked Network

    As A Certified Cyber Crime Consultant, You Will Learn How To Investigate Computers, Websites And Networks That Have Been Hacked.

  • Cyber Extortion & Blackmail

    Learn How Consumers, Business People, Entertainers, Athletes, Public Figures Are Being Blackmailed Or Extorted.

  • How To Consultant

    How To Consultant With Other IT Managers, Law Enforcement, CEO's, Small Business Owners, Athletes, Entertainers and Other Organizations.

  • Social Media Investigations

    Learn Different Techniques You Can Use To Locate A Person, Find Their Locations, Track Their Activities, Locate Their Friends And Family, Plus A Lot More.

  • Identity Theft

    Learn How Individuals As Well As Companies Have Their Identities Stolen. Then Learn What The Bad Guys Do Once They Have The Identities.

  • Scams

    Learn About The Different Scams And Schemes Crooks Use To Steal Information. This Includes Email Scams, Telephone Scams And More.

  • According to the Verizon Data Breach Investigation Report: 61% of breaches occurred in smaller business last year.
  • According to UPS Capital: Breaches cost small business between $84,000 and $148,000 33% of firms required 3+ days to recover.
  • According to the FBI 84% of computer attacks are a inside job.


As a Certified Cyber Crime Consultant (C4), you qualify as a lifetime "National Cyber Security Affiliate." 

This includes weekly training, receiving free sales leads, learning how to create your own company, and taking the course "Learn How to Make Money in Cyber Crime Industry" for free.


This course is taught as a self-paced online course and in a classroom setting.

  • Instruction by an expert facilitator

  • Online assistance

  • Specialized online manual and course materials

  • Personalized certificate as a Certified Cyber Crime Consultant

Cyber Crime Consultant &
Certified White Hat Hacker

Our Courses Provide You With A 3rd Path That's Faster, And You Do Not Need To Be A Convicted Felon.

Course Objectives

  • Effectively protect websites from being hacked. 
  • Demonstrate an understanding of professional, ethical and legal issues as it relates to cyber crime. 
  • Effectively investigate cyber extortion and cyber blackmail cases. 
  • Articulate oral and written skills necessary to develop company security policies. 
  • Effectively assess employee risks. 
  • Demonstrate an ability to perform penetration tests. 
  • Demonstrate an understanding of how internet scams are committed and how to investigate them. 
  • Demonstrate an ability to assess any business, or government agency on their physical and network vulnerabilities. 
  • Utilize techniques to effectively profile a cyber criminal. 
  • Demonstrate an ability to perform basic cell phone and tablet computer forensics. 
  • Understand how to teach parents about Online Child Safety.
  • Social Media investigation.
  • How to install and remove malware and viruses.
  • How to consult with entertainers, athletes, celebrities, small businesses, corporations and governments agencies.
  • How to start your own cyber security company.
  • How to market your skill sets.
  • How to build your own "Hacker For Hire" service legally. 
  • How to remove links from Google.

Course Curriculum

  • 1

    Getting Started

    • Support Chat/Forum

    • Download Security Definitions

    • What Every Cyber Security Consultant Should Have

    • Hacking Software

    • How Hard Is This Course

  • 2

    Ethics And Leadership

    • Understanding Your Role as a Certified Cyber Crime Consultant

    • Ethics In Cyber/Computer Security

    • 10 Leadership Qualities

    • Agent of the Government

    • Proof That Hacking Is Bigger Than All Drug Trafficking In The World!

    • Ethics and Leadership

  • 3

    Making A Great Cyber Security Consultant

    • Overview

    • What About The Geek Squad?

    • IT Manager, Computer Security Expert or Hacker

    • Having a Career In IT and/or Cyber Security

    • Basic Computer Problem

    • Jack Of All Trades

    • Don't Be Shy

    • Become A Teacher

    • Speak Less

    • The Basic Networking

    • System Admin Basics

    • Can You Trace A Network

    • Latency And Bandwidth

    • Do You Understand Script Writing

    • Backups Then Backup Again

    • Storing Your Password

    • Hard Work

    • Become A Project Manager

    • Understanding The Business Side

    • Don't Be Afraid To Debate

    • Always Have A Solutions

    • Ask Questions

  • 4

    Security and Employee Policies

    • Understanding Employees Rights

    • Understanding Law Enforcement Concerns

    • Case Study - "Don't Believe What You See In The News"

    • The Difference Between The Internet And The Dark Web

    • Quiz 1 - Getting Started

  • 5

    Cyber Insurance

    • Overview Of Cyber Insurance

    • Ten Things You Need To Know About Cyber Security Insurance

    • The Different Types Of Cyber Insurance

  • 6

    Information Security Policies

    • Learning The Policies

    • Information Custodians - Personal Data

    • Information Custodians - No Personal Data

    • Data Classifications

    • Purpose

    • Understanding Employee Risk

    • Description of the Information Security Sub-Policies

    • Policy on Employing Staff

    • Controls and Processes

    • Disciplinary Process

    • Policy on Departing Staff

    • Physical Security Overview

    • Physical Security Guidelines and Requirements

    • Physical Security Control

    • Internal Security Control

    • Security Incidents And Reporting

    • Remote Access

    • Third Party Access Control to the Network

    • Maintenance Contracts

    • Wireless Network

    • External Network Connections

    • Risk Assessment and Audit

    • Access Control to the Network

    • Data and Software Exchange

    • Malicious Software

    • Unauthorized Software

    • Secure Disposal or Re-use of Equipment

    • Security Monitoring

    • Training and Awareness

    • Reporting Data Security Breaches and Weaknesses

    • System Configuration Management

    • Disaster Recovery Plans

    • Unattended Equipment and Clear Screen

    • IT Department Responsibilities

    • Backup and Recovery Policy

    • 12 Security Best Practices for USB Drives

    • Contractors and Visitors

    • Information Security Policies For Employees

  • 7

    5 Stages Of Computer Hacker

    • Why Cyber Crime Pays

    • Only The Rich Can Attain Cyber Crime Justice

    • Example Of Cyber Justice

    • The Weakest Link

    • The Top 5 Places That People Think Will Never Be Hacked

    • The 5 Stages Of Computer Hacking

    • The 5 Stages Of Computer Hacking Part 2

    • Peeping Tom – Protecting Pictures on Computers and Cell Phones

    • Should A CEO Trust a Hacker Over His IT Department

  • 8

    Personal Computer Security

    • 12 Signs A Personal Computer Has Been Hacked

    • Principles of Cybersecurity

    • Microsoft Windows Security

    • How To Secure Windows 10

    • How To Security Mac OS

    • Don’t Trust Your Neighbors Wi-Fi

    • Internet Security

  • 9

    Corporate Networks

    • How to Assess an IT Department

    • Physical Security Breach

    • How To Find The Weakest Link....

    • Rogue IT Manager

    • What You Need to Know About Firewalls

    • Example Of A Firewall

    • Software Firewall vs. Hardware Firewall Solutions

    • Intrusion Detection & Prevention

    • Example of Intrusion Prevention System

    • The Difference Between a Server And a PC. Part 1.

    • The Difference Between a Server and a PC. Part 2.

    • Securing Corpate Sensitive Data

    • How Do You Stay Safe?

    • Protecting Your Wi-Fi

    • WIFI PANEAPPLE - The Easiest Way To Hack Phones, Computers And Networks

    • Example Of Pineapple

    • How To Stay Safe? (Wifi)

    • Wifi Hacking In Airports

    • Hacking In The Entertainment Industry

    • Preventing Malware

    • How To Trace An IP Address

    • What Is a Proxy Server

    • Lan Turtle - Stealth Remote Access, Network intelligence Gathering

    • Lan Turtle - How it works

    • Understanding Phishishing Scams And Social Engineering

    • How to Disable USB Ports On Windows Machines

    • Edit Article How to Disable USB Ports - Mac OS

  • 10


    • What Is Malware?

    • How To Remove Ransomware

  • 11

    Pros and Cons Of Web Browsers

    • Web Browsers History, Bookmark and Cache Files

    • Which Web Browser Is Best For Security

    • Important Browsers Files

    • How can I protect my browser files

    • How To View Passwords In A Browser

  • 12

    The Dark Web

    • Inside The Dark Web

    • Who Created the Dark Web?

    • How To Access The Dark Web

    • Is It Really Anonymous?

  • 13

    Password Security

    • Choosing The Right Password

    • Lie, Lie & Lie – Never Tell the Truth When Answering Security Questions

    • Passwords And Hashes

    • Force Password Changes

    • Can Changing Your Passwords Often May Be a Waste of Time

    • Resetting Your Password

    • Two-Factor Authentication

    • Example of 2 Key Authentication using gmail.com

    • USB Rubber Ducky - Take Social Engineering to the Next Level

    • Example Of USB Rubber Ducky

    • Using More Than One Email Account

    • Securing Your Online Password

  • 14

    Identity Theft

    • Case Study - Personal Security (Identity Theft)

    • Case Study - Medical Identity Theft

    • Identity Theft - Personal Security

    • Identity Theft - Medical Identity Theft

    • Identity Theft - Stats

    • Case Study - Credit Card Skimming

    • Case Study - Criminal Identity Theft

    • Case Study - Credit Freeze

    • Case Study - ID Theft Recovery

    • Identity Theft - Do It Yourself Identity Theft Recovery

    • Identity Theft - Tips for Avoiding Online Credit Card Fraud

    • Identity Theft - Criminal Identity Theft

    • Identity Theft - 5 Types of Credit Card Fraud

    • Identity Theft - Internet Security

    • Identity Theft - Credit Freeze / Security Freeze

    • Identity Theft - How Theives Can Steal Your Identity

    • Identity Theft - Credit Reports

    • Robo-Call Fraud

    • Phishing Scams

  • 15

    Scams & Schemes

    • Examples of the Top 10 Internet Scams

    • Case Study - Credit Report

    • Don’t Open That Email – Spear Phishing

    • Phishing Email Scam

    • Example - How To Perform A Phishing Attack

    • Internet Crime Reports

    • Internet Crime Prevention Tips

    • Switch-A-Roo

    • Watch What You’re Buying

    • What Can Go Wrong – Craigslist

    • Ebay - Hijacked Accounts

    • Hi-Tech Hustling On eBay

    • Second Chance Offers

    • Partial Refund

    • Paid Too Much for an Item

    • No item

    • Shill Bidding

    • Fakes

    • Hidden Shipping and Handling

    • Fake Money Orders and Bad Checks

  • 16

    Cell Phone Security

    • Cell Phone Security Overview

    • Apple OS vs. Google Android

    • Jailbreaking an iPhone

    • Password Protect Your Phone

    • Having Two Numbers Is Better Than One!

    • Did You Download An App With Spyware On Your Android?

    • How Do You Protect Yourself From NFC?

    • Don’t Trust Your Cell Phone With a Stranger

    • Don’t Trust Your Cell Phone With a Stranger

    • Bump & Hack - NFC Hacking

    • Protecting Your Android Phone & Tablet

    • Cell Phone Hacking

    • Voicemail Security

  • 17

    Cyber Bullying

    • Fighting Cyber Bullying

    • Cyber Bullying - Resources

    • Cyber Bullying - Social Media Stats

    • Cyber Bullying - Traditional Bullying

    • Cyber Bullying - Discrimination Stats

    • Case Study - Sexting And Cyber Bullying

    • Cyber Stalking - Stalking Using Technology

    • Case Study - Cyber Bullying

    • Cyber Stalking - Stats

    • Cyber Bullying - Workplace Bullying

    • Cyber Bullying - Things a School Can Do to Fight Cyber Bullying

    • Bullies vs. Cyber Bullies

    • Be Strong

    • Facts & Myths About Bullies and Cyber Bullies

    • Case Study - Cyber Bullying Tips | Owning Your Own Name

  • 18

    Social Media Investigation

    • Social Media Investigations - What You Need To Know Before Getting Started

    • How to Create A Sock Puppets - Part 1

    • How To Create A Sock Puppets - Part 2

    • Social Media Investigation - Quick Tools & Websites For Investigations

    • Social Media Attacks & Hacks

    • Social Media Investigation - Facebook Reference Links

    • Social Media Investigation - Tracking A Target On Facebook

    • Getting Started With The Dark Web - Part 1

    • Getting Started With The Dark Web - Part 2

    • The Do's and Don'ts of The Dark Web

    • What You Need To Know

  • 19

    Child Saftey And Security

    • Child Safety Stats

    • Protecting Our Children

    • Case Study - How and Why You Should Install Spyware On Your Kids Computers

  • 20

    The Business Side Of Cyber Security

    • What You Must Do to Be Successful in the World of Business.

    • Common Ethical Concerns that Arise in the Business World.

    • How to Start a Corporation

    • Standing Out in the Cyber Security Industry

    • How to Market in the Cyber Security Industry

    • How to Get Setup with Credit Cards

    • How to Sell Your Services Around the World

All Students Will Receive A Certificate As A
"Certified Cyber Crime Consultant"

This course is recognized by government and corporation around the world.
Click Here More Information!

Learn How To Become A Spy

Learn how to install surveillance software (spyware) on your clients computers, to find employees who maybe stealing company intellectual property.

Learn Counter Surveillance

As Certified Cyber Crime Counsultant, you will learn counter surveillance which includes sweeping homes, offices and cars.

Included In This Course


The WiFi Pineapple lets pentesters perform targeted man-in-the-middle attacks, advanced reconnaissance, credential harvesting, open source intelligence gathering and more – all from a clean, intuitive web interface.

Included In This Course


Imagine you could walk up to a computer, plug in a seemingly innocent USB drive, and have it install a backdoor, exfiltrate documents, steal passwords or any number of pentest tasks.

Pricing options

Download The National Cyber Security University App For Discount Codes.