" data-placement="top" data-content="The vendor-neutral Certified Penetration Testing Consultant course is designed for IT Security Professionals and IT Network Administrators who are interested in taking an in-depth look into specific Penetration tests and techniques against operating systems. This course will teach you the necessary skills to work as a penetration testing team, the exploitation process, how to create a buffer overflow against programs running on Windows and Linux while subverting features such as DEP and ASLR." data-original-title="Certified Penetration Testing Consultant [Contains Labs]"> cptclab

" data-placement="top" data-content="This course is an intense few days covering the keys to hacking with PowerShell. We know that most companies have an Active Directory infrastructure that manages authentication and authorization to most devices and objects within the organization." data-original-title="Certified PowerShell Hacker [Contains Labs]"> cpshlab

Incident Handling

" data-placement="top" data-content="mile2®’s Certified Security Principles course provides the skills necessary to apply and implement technical knowledge of security concepts in today’s security environment. Students will gain an in‐depth knowledge of systems security, access control, network infrastructure, assessments and audits, cryptography and organizational security across all vendor products." data-original-title="Certified Security Principles [Contains Labs]"> csplab

" data-placement="top" data-content="The CISSO addresses the broad range of industry best practices, knowledge and skills expected of a security manager/officer. " data-original-title="Certified Information Systems Security Officer"> Certified Information Systems Security Officer

" data-placement="top" data-content="The Certified Incident Handling Engineer vendor-neutral certification is designed to help Incident Handlers, System Administrators, and any General Security Engineers understand how to plan, create and utilize their systems in order to prevent, detect and respond to attacks." data-original-title="Certified Incident Handling Engineer [Contains Labs]"> cihelab

Forensics

" data-placement="top" data-content="mile2®’s Certified Security Principles course provides the skills necessary to apply and implement technical knowledge of security concepts in today’s security environment. Students will gain an in‐depth knowledge of systems security, access control, network infrastructure, assessments and audits, cryptography and organizational security across all vendor products." data-original-title="Certified Security Principles [Contains Labs]"> csplab

" data-placement="top" data-content="The Certified Digital Forensics Examiner vendor-neutral certification is designed to train Cyber Crime and Fraud Investigators whereby students are taught electronic discovery and advanced investigation techniques." data-original-title="Certified Digital Forensics Examiner [Contains Labs]"> cdfelab

" data-placement="top" data-content="This course takes two enormously challenging areas facing IT security professionals today: incidence response and virtualization and attempts to meld these together." data-original-title="Certified Virtualization Forensics Examiner [Contains Labs]"> cvfelab

" data-placement="top" data-content="The Certified Network Forensics Examiner vendor-neutral certification was developed for a U.S. classified government agency. The C)NFE takes a digital and network forensic skill set to the next level by navigating through over twenty modules of network forensic topics." data-original-title="Certified Network Forensics Engineer [Contains Labs]"> cnfelab

Disaster Recovery

" data-placement="top" data-content="mile2®’s Certified Security Principles course provides the skills necessary to apply and implement technical knowledge of security concepts in today’s security environment. Students will gain an in‐depth knowledge of systems security, access control, network infrastructure, assessments and audits, cryptography and organizational security across all vendor products." data-original-title="Certified Security Principles [Contains Labs]"> csplab

" data-placement="top" data-content="The CISSO addresses the broad range of industry best practices, knowledge and skills expected of a security manager/officer. " data-original-title="Certified Information Systems Security Officer"> Certified Information Systems Security Officer

" data-placement="top" data-content="The comprehensive Certified Disaster Recovery Engineer course goes beyond traditional BCP training – preparing students for industry certification in Business Continuity planning, and presenting the latest methodologies and best practices for real-world systems recovery. Students will receive a solid foundation of instruction that will enable them to create meaningful business continuity plans." data-original-title="Certified Disaster Recovery Engineer [Contains Labs]"> cdrelab

Healthcare

" data-placement="top" data-content="mile2®’s Certified Security Principles course provides the skills necessary to apply and implement technical knowledge of security concepts in today’s security environment. Students will gain an in‐depth knowledge of systems security, access control, network infrastructure, assessments and audits, cryptography and organizational security across all vendor products." data-original-title="Certified Security Principles [Contains Labs]"> csplab

" data-placement="top" data-content="The CISSO addresses the broad range of industry best practices, knowledge and skills expected of a security manager/officer. " data-original-title="Certified Information Systems Security Officer"> Certified Information Systems Security Officer

" data-placement="top" data-content="The vendor-neutral Certified Healthcare Information Systems Security Practitioner certification course covers the skills and knowledge to implement the best IT Healthcare Practices, as well as, regulatory compliance and standards in the healthcare industry." data-original-title="Certified Healthcare Information Systems Security Professional"> CHISSP - Certified Healthcare Information Systems Security Professional

Auditing

" data-placement="top" data-content="mile2®’s Certified Security Principles course provides the skills necessary to apply and implement technical knowledge of security concepts in today’s security environment. Students will gain an in‐depth knowledge of systems security, access control, network infrastructure, assessments and audits, cryptography and organizational security across all vendor products." data-original-title="Certified Security Principles [Contains Labs]"> csplab

" data-placement="top" data-content="The CISSO addresses the broad range of industry best practices, knowledge and skills expected of a security manager/officer. " data-original-title="Certified Information Systems Security Officer"> Certified Information Systems Security Officer

" data-placement="top" data-content="The Certified Information Security Management Systems—Lead Auditor certification course prepares students to competently lead audits of information security management systems (“ISMS”) to ensure that they meet ISO/IEC 27001 standards in any organization." data-original-title="Certified Information Security Management Systems Lead Auditor"> Certified Information Security Management Systems Lead Auditor

" data-placement="top" data-content="The Certified Information Security Management Systems—Lead Implementer certification course prepares students to help any organization through the process of implementing an information security management systems (“ISMS”) that is compliant with ISO/IEC 27001:2013 standard." data-original-title="Certified Information Security Management Systems Lead Implementer"> ertified Information Security Management Systems Lead Implementer

" data-placement="top" data-content="Many organizations require an Information System Auditor’s expert knowledge when it comes to identifying critical issues and providing effective auditing solutions. The knowledge and course content provided in the vendor-neutral Certified Information Systems Security Auditor – C)ISSA will not only cover ISACA®’s exam but will provide a measurable certification that demonstrates proficiency in the IS Auditing Field." data-original-title="Certified Information Security Systems Auditor"> CISSA

Application & Secure Code

" data-placement="top" data-content="mile2®’s Certified Security Principles course provides the skills necessary to apply and implement technical knowledge of security concepts in today’s security environment. Students will gain an in‐depth knowledge of systems security, access control, network infrastructure, assessments and audits, cryptography and organizational security across all vendor products." data-original-title="Certified Security Principles [Contains Labs]"> csplab

" data-placement="top" data-content="The CISSO addresses the broad range of industry best practices, knowledge and skills expected of a security manager/officer. " data-original-title="Certified Information Systems Security Officer"> Certified Information Systems Security Officer

" data-placement="top" data-content="The vendor-neutral Certified Secure Web Application Engineer certification provides the developer with a thorough and broad understanding of secure application concepts, principles, and standards. The student will be able to design, develop and test web applications that will provide reliable web services that meet functional business requirements and satisfy compliance and assurance needs." data-original-title="Certified Secure Web Application Engineer [Contains Labs]"> cswaelab

Cloud Security

" data-placement="top" data-content="This is a well-rounded course that will meet the needs of any individual or organization that is considering a move to the cloud or has been there and is not sure why." data-original-title="Certified Information Virtualization & Cloud Principles [Contains Labs]"> cvcplab

" data-placement="top" data-content="This fast-paced, high energy, hands-on course provides not only the foundation needed for a top performing software-defined datacenter, it also provides the latest in virtualization and cloud technologies which gives the engineer or administrator the knowledge and skills needed to design and manage the datacenter for tomorrow’s needs." data-original-title="Certified Virtualization Engineer [Contains Labs]"> cvelabs

" data-placement="top" data-content="This course introduces many technologies used in the cloud from implementing a private cloud architecture to using a new key management solution from various vendors." data-original-title="Certified Cloud Security Officer [Contains Labs]"> ccsolab

Virtualization

" data-placement="top" data-content="This is a well-rounded course that will meet the needs of any individual or organization that is considering a move to the cloud or has been there and is not sure why." data-original-title="Certified Information Virtualization & Cloud Principles [Contains Labs]">cvcplab

" data-placement="top" data-content="This fast-paced, high energy, hands-on course provides not only the foundation needed for a top performing software-defined datacenter, it also provides the latest in virtualization and cloud technologies which gives the engineer or administrator the knowledge and skills needed to design and manage the datacenter for tomorrow’s needs." data-original-title="Certified Virtualization Engineer [Contains Labs]"> cvelabs

" data-placement="top" data-content="This fast-paced, deep dive, hands-on course provides not only the foundation needed for highly secure deployment of VMware vSphere, it also provides a complete understanding of the CIA triad as it relates to virtualization." data-original-title="Certified Virtualization Systems Engineer [Contains Labs]"> cvselab

IS Management Electives

" data-placement="top" data-content="Today, when it comes to identifying critical issues and providing effective IS management solutions, companies are leaning on IS managers to create solutions for tomorrow’s problems. The knowledge and course content provided in the Certified Information Systems Security Manager – C)ISSM will not only cover ISACA®’s CISM exam but will provide a measurable certification that demonstrates proficiency in the IS Management Field." data-original-title="Certified Information Systems Security Manager"> CISSM - Certified Information Systems Security Manager

" data-placement="top" data-content="The vendor-neutral Certified Information Systems Risk Manager certification is designed for IT and IS professionals who are involved with risk identification, assessment & evaluation, risk response, risk monitoring, IS control design & implementation as well as IS control monitoring & maintenance." data-original-title="Certified Information Systems Risk Manager"> CISRM - Certified Information Systems Risk Manager

" data-placement="top" data-content="Mile2®’s vendor-neutral Information Systems Certification and Accreditation Professional certification training quantify the process of certifying, reviewing and accrediting an information system by IT professionals." data-original-title="Information Systems Certification & Accreditation Proffesional"> ISCAP - Information Systems Certification & Accreditation Proffessional

" data-placement="top" data-content="Are you ready for the coming storm? According to our team of security experts, the implementation of IPv6 will likely produce another Wild, Wild West across the internet! The ease at which a hacker can steal your data in an IPv6 environment is, well just scary. Internet protocols are not written with security in mind, they focus on functionality and if we are not aware of the pitfalls of IPv6 we will see the financial loss due to hacking skyrocket, just like the old days before we properly secured IPv4!" data-original-title="Certified IPv6 Security Specialist [Contains Labs]"> CISS - Certified IPv6 Security Specialist

Cyber Warfare

" data-placement="top" data-content="The Red Team vs Blue Team is a scenario-based, hands-on lab experience. The goal is to put together items learned during Mile2 courses and apply them in this environment. It consists of two days (four scenarios) ranging from easy to intermediate to advanced problem sets." data-original-title="Red Team vs Blue Team 1"> Red Team Blue Team 1

" data-placement="top" data-content="The Red Team vs Blue Team is a scenario-based, hands-on lab experience. The goal is to put together items learned during Mile2 courses and apply them in this environment. It consists of two days (four scenarios) ranging from easy to intermediate to advanced problem sets." data-original-title="Red Team vs Blue Team 2"> Red Team Blue Team 2

Asset 114   Classes Contain Labs


Accreditations & Acknowledgements