• This Official Mile2® cyber security certification training series covers everything you need to know about becoming a certified digital forensics examiner. Students will learn about computer forensic incidents, the investigation process, disk storage concepts, digital acquisition & analysis, forensic examination protocols, digital evidence protocols, CFI theory, digital evidence presentation, computer forensic laboratory protocols, computer forensic processing, digital forensics reporting, specialized artifact recovery, e-Discovery and ESI, cell phone forensics, USB forensics, incident handling, PDA forensics, and investigating harassment. As a Certified Digital Forensics Examiner you will have learned electronic discovery and advanced investigation techniques, and hold computer forensic knowledge that will help organizations recognize, seize, preserve and present digital evidence. You will be certified in using forensically sound investigative techniques in order to evaluate the scene, collect and document all relevant information, interview appropriate personnel, maintain chain-of custody, and write a findings report. View Course
  • This Official Mile2® cyber security certification training series covers everything you need to know about becoming a certified disaster recovery engineer. Students will learn about business impact analysis, risk analysis, BDP strategies, IT recovery strategies, implementation phase, testing and exercise, maintenance and updating, execution phase, cyber attacks, and pandemics. Being a Certified Disaster Recovery Engineer (CDRE) validates that you are prepared to work with businesses to create and implement disaster recovery and business continuity plans. Those who are certified will be working, as a professional, with a business to prepare processes, policies and procedures to follow in the event of a disruption. You are important to keep a businesses’ critical operations running, which today heavily relies on its IT infrastructure. View Course
  • The Certified Healthcare Information Systems Security Practitioner certification course covers the skills and knowledge needed to implement the best IT Healthcare Practices, as well as regulatory compliance and standards in the healthcare industry. The Certified Healthcare Information Systems Security Practitioner was developed because of growing industry regulations and privacy requirements in the healthcare industry. CHISSPs are vital in managing and protecting healthcare data and are tasked with protecting patient information by implementing, managing, and assessing proper IT controls for patient health information integrity. View Course
  • This Official Mile2® cyber security certification training series covers everything you need to know about becoming a Certified Incident Handling Engineer. Students will learn about threats, vulnerabilities and exploits, IH preparation, request trackers for incident handling, preliminary responses, identification and initial responses, sysinternals, containment, eradication, follow-up, recovery, virtualization security, and malware incident handling. As a Certified Incident Handler, you are prepared to effectively help incident handlers, system administrators, and general security engineers understand how to plan, create, and utilize their systems in order to prevent, detect, and respond to security breaches. Every business connected to the internet is getting probed by hackers trying to gain access, making it a necessity to have someone that knows how to detect and resolve security breaches. This certification is ideal for those who lead incident handling teams or are part of an incident handling team. View Course
  • The CISM certification program is developed specifically for experienced information security managers and those who have information security management responsibilities. CISM is globally recognized as the leading credential for information security managers. Our CISM Certified Information Security Manager course provides the student with the knowledge and proficiency to prepare for the globally recognized CISM certification exam. The CISM certification combines the achievement of passing a comprehensive exam with recognition of work, management and educational experience, providing you with greater credibility in the marketplace. This course will immerse the student into the subject, with in-depth coverage of the information covering the four domains that make up the “Body of Knowledge” for the CISM exam and will provide the student the tools to build their technical skills to manage, design, oversee and assess an enterprise’s information security. Sought after by experienced information security managers, the CISM certification is a groundbreaking credential earned by more than 23,000 professionals since it was established in 2002. The management-focused CISM is the globally accepted achievement for individuals who develop, build and manage enterprise information security programs. CISM retention is more than 95 percent. View Course
  • Our CISA Certified Information Systems Auditor Series provides the student with the knowledge and proficiency to prepare for the globally recognized CISA certification exam. The CISA certification has become very popular since it originated in 1978, and is a benchmark for IS audit, security, control, and assurance personnel to validate their skill set. This course will immerse the student into the subject, with in-depth coverage of the information covering the five domains that make up the “Body of Knowledge” for the CISA exam and will provide the student the tools to build their technical skills to develop, manage, and perform IT security audits. The CISA designation is a globally recognized certification for IS audit control, assurance and security professionals. Being CISA-certified showcases your audit experience, skills and knowledge, and demonstrates you are capable to assess vulnerabilities, report on compliance and institute controls within the enterprise. The CISA certification is sought by those who audit, control, monitor and assess an enterprise’s information technology and business systems. CISAs are recognized internationally as professionals with the assurance, knowledge, skills, experience and credibility to leverage standards, manage vulnerabilities, ensure compliance, offer solutions, institute controls and deliver value to the enterprise. View Course
  • This Official Mile2® cyber security certification training series covers everything you need to know about becoming a Certified Information Systems Security Officer. Students will learn about risk management, security management, authentication, access control, security models, operations security, symmetric cryptography and hashing, asymmetric cryptography and PKI, network connections, network protocols and devices, telephony, VPNs and wireless, security architecture, software development security, database security and system development, business continuity, disaster recovery, incident management, law, and ethics, and physical security. Being a Certified Information Systems Security Officer will provide you with the advanced skillset necessary to manage and consult businesses on information security. You will possess the knowledge and skills expected of a security leader. Through the use of a risk- based approach, a C)ISSO is able to implement and maintain cost-effective security controls that are aligned with business requirements. Becoming a C)ISSO is the ideal way to increase your knowledge, expertise, skill, and credibility. View Course
  • This cyber security certification training series covers everything you need to know about becoming a Certified Information Systems Security Professional. Students will learn about security and risk management, asset management, security architecture and engineering, communication and network security, identity and access management, security assessment and testing, security operations, and software development security. The Certified Information Systems Security Professional (CISSP) demonstrates a globally recognized standard of competence which covers critical topics in security today, including cloud computing, mobile security, application development security, risk management and more. The CISSP draws from a comprehensive, up-to-date, global common body of knowledge that ensures security leaders have a deep knowledge and understanding of new threats, technologies, regulations, standards, and practices. View Course
  • This Official Mile2® cyber security certification training series covers everything you need to know about becoming a Certified Penetration Testing Consultant. Students will learn about packet capturing, Layer 2 attacks, Layer 3 attacks on Cisco-based infrastructures, pivoting and relays, IPv6 attacks , VPN attacks, defeating SSL, and IDS/IPS evasion. By becoming a Certified Penetration Testing Consultant, you are becoming a cyber security professional with the ability to plan, manage and perform a penetration test. The designation “Consultant” is related to the depth and breadth of understanding required to manage a project involving multiple team members, manage the client’s expectations and deliver an audit of security controls that is thorough, well documented and ethically sound. The certification is designed for cyber security professionals and IT network administrators who are interested in conducting Penetration tests against large network infrastructures, such as large corporate networks. View Course
  • This Official Mile2® cyber security certification training series covers everything you need to know about becoming a Certified Penetration Testing Engineer. Students will learn about logistics of pen testing, Linux fundamentals, information gathering, detecting live systems, enumeration, vulnerability assessments, malware going undercover, Windows hacking, hacking UNIX/Linux, advanced exploitation techniques, pen testing wireless networks, networks, sniffing and IDS, injecting the database, attacking web technologies, and project documentation. Becoming a Certified Penetration Testing Engineer lets you use the key elements of penetration testing to keep businesses safe. Ethical hacking is the art of using these penetration testing techniques to identify and repair the latest vulnerabilities in a system to make sure it is secure. This will protect businesses and individuals from malicious hackers. Once inside, hackers can access private information, such as usernames, passwords, credit card numbers, and social security numbers of clients and employees. Certified Penetration Testing Engineers are the solution to prevent hackers from exploiting the businesses they serve. View Course
  • This Official Mile2® cyber security certification training series covers everything you need to know about becoming a certified professional ethical hacker. Students will learn about security fundamentals, access controls, protocols, cryptography, vulnerability assessments, vulnerability tools of the trade, output analysis and reports, reconnaisance, enumeration and scanning, gaining access, maintaining access, covering tracks, malware, buffer overflows, and password cracking. The Professional Ethical Hacker certification is the beginning of penetration testing. It shows that you hold a valuable skill-set in penetration testing by understanding the importance of vulnerability assessments and how it can help you prevent serious break-ins to your organization. View Course
  • This Official Mile2® cyber security certification training series covers everything you need to know about becoming a Certified Secure Web Application Engineer. Students will learn about web application security, secure SDLC, OWASP TOP 10, risk management, threat modeling, authentication and authorization attacks, session management, security architecture, input validation and data sanitization, AJAX security, insecurity code discovery and mitigation, application mapping, cryptography, and testing methodologies View Course

Go to Top