The Professional Certified Investigator or PCI certification demonstrates expertise and experience in case management, evidence collecting, and report and testimony preparation to validate conclusions. Earning a PCI certification after PCI online training course gives objective evidence of advanced investigative knowledge and abilities, such as certifying your capacity to acquire information through the successful use of surveillance, interviews, and interrogations.
The PCI Certification is relevant to a wide range of specialized investigations, including:
- Child abuse
- Healthcare fraud
- High tech crime
- Insurance fraud
- Loss prevention
- Property and casualty
- Threat assessment
- White collar crime
- Workplace violence
“The Professional Certified Investigator (PCI) certificate gives confirmation of expertise and experience in case management, evidence collecting, and the creation of reports and testimony to corroborate conclusions,” according to the American Society of Industrial Security (ASIS). Earning a PCI demonstrates independent validation of specific capabilities in security investigations, such as case appraisal and examination of case management strategy choices. Those who achieve the PCI are ASIS investigation board certified.”
Choose Your Preferred Learning Mode
Customized schedule Learn at your dedicated hour Instant clarification of doubt Guaranteed to run
Flexibility, Convenience & Time Saving More Effective Learning Cost Savings
Anytime – Across The Globe Hire A Trainer At Your Own Pace Customized Corporate Training
A domain is a large subject that you must grasp in order to pass the CISSP certification test. The following are the most significant CISSP Domains:
Task 1: Examine the argument for ethical conflicts.
- Knowledge of the nature/types/categories of ethical dilemmas associated to instances (fiduciary, conflict of interest, attorney-client)
- The function of laws, rules, regulations, and organizational governance in conducting investigations
Task 2: Analyze and appraise case components, methods, and dangers.
- Case types (computer, white collar, financial, criminal, workplace violence)
- Qualitative and quantitative analytical methodologies and instruments
- Strategic/operational analysis
- Analysis of criminal intelligence
- Risk identification and effect
- ASIS Workplace Violence Standard
Task 3: Determine fact-finding objectives and approach by analyzing procedural options.
- Case flow
- The Negotiation Procedure
- Methods of investigation
- A cost-benefit analysis
Task 4: Identify and manage the fact-finding resources required to complete the case objectives.
- Quality assurance procedure
- Chain-of-custody protocols
- Resource needs and allocation (e.g., personnel, equipment, time, budget)
Task 5: Identify, measure, and execute possibilities for improving fact-finding methods.
- Internal review knowledge (e.g., management, legal, human resources)
- External evaluation (e.g., regulatory bodies, accreditation agency)
- Resources for liaison
Task 1: Conduct a police investigation using physical, behavioral, and electronic evidence to gather important information.
- Different types of surveillance
- Surveillance apparatus
- Routines for pre-surveillance
- Surveillance activity documentation procedures
Task 2: Conduct interviews with people in order to collect relevant data.
- Interview strategies
- Signs of dishonesty (e.g., non-verbal communication)
- Documentation of subject statements
Task 3: Gather and save potential evidential items for evaluation and analysis.
- Forensic opportunities and resources
- Chain of custody requirements
- Techniques/procedures for seizing various forms of evidence
- Procedures/methods for preserving diverse sorts of evidence
- Digital forensics concepts and principles
- Digital equipment retrieval, storage, and documentation
- Computer operations and digital media concepts and ideas
Task 4: Conduct physical and electronic data analysis to get appropriate data.
- Research methods using physical resources
- Research methods that make use of information technology
- Analytical methods for study findings
- Documentation of research
- 5 sources of information (e.g., government, proprietary, open)
- Capabilities in digital media
Task 5: Collaborate with and obtain data from various agencies and groups information that is pertinent
- Sources of external information
- Methods of liaison
- Methods for integrating and synthesizing everlasting data
Task 6: Collect relevant data using specialized fact-finding techniques.
- Polygraph examination concepts and procedures
- Video/audio recording concepts, techniques, and procedures
- Forensic analysis concepts, ideas, and procedures (e.g., writing, documents, fingerprints, DNA, biometrics, chemicals, fluids, etc.)
- Undercover investigation concepts, techniques, and procedures
- Threat assessment concepts, ideas, and methodologies
- Utilization of secret sources
- IT hardware and software tool concepts, ideas, and techniques of application
Task 1: Write a report to back up your fact-finding conclusions.
- Investigative report essential parts and structure
- Investigative jargon
- Information sequencing logically
Task number two is to prepare and provide testimony.
- Different types of testimony
- Testimony preparation
Get In TOUCH
Frequently Asked Questions
Why should you apply for the PCI?
Earning the Professional Certified Investigator (PCIR) certificate validates your specific expertise in security investigations, including case appraisal and examination of case management strategy choices. It certifies your capacity to gather information via the use of effective surveillance, interviews, and interrogations.