Close

ROLE-BASED CERTIFICATION ROADMAP

Printable Certification Roadmap

Foundational - 100 Level Courses

Master these before choosing your Role-based career path below.

Certified Security 

Awareness 1

Ready to take your first steps into Cybersecurity?  This course will teach you how to protect yourself and your organization from data theft.

Certified Security 

Awareness 2

In this course attendees learn how company culture influences the occurances of data theft.

If you manage people who have access to computers, you need to take this course.  

Certified Hardware Technician logo
Certified
Hardware Technician

This course will kick start your career in the IT field by providing the foundational knowledge needed to install, configure, and support computer hardware systems.  

progression arrow-72dpi-01
cost-01
plus sign-green-01

Certified Operating

Systems Technician

The Certified Operating Systems Technician course will kick start your career in the IT field by providing the foundational knowledge to install, configure, and support computer operating systems.

Certified Network Principles logo

Certified Network

Principles

Learn concepts and skills needed to plan, install, maintain, and troubleshoot today’s networks, including wireless, virtual, and software defined networks!

progression arrow-72dpi-01
Certified Security Principles
progression arrow-72dpi-01

Passing the C)SP is a good indicator that you are ready to move on to our
Role-Based Certification Progression Model.

Certified Security

Principles

This course is going to prepare you for security across the entire environment including understanding risk management, identity and access control, network and data security.

cyber range minimalpng-01

Includes Cyber Range Lab

Together, the C)OST and the C)HST is the equivalent of Comptia’s® A+ course.

Management

Management

IS Management & Leadership

Intermediate -
200 Level Courses

C)ISSM

The Certified Information Systems Security Manager covers the skills and knowledge to assess threat analysis and risks, incident management, security programs and CISM roles.

Specialization -
300 Level Courses

C)ISSO

If you are look for the “gotta have it” cybersecurity course, then the Certified Information Systems Security Officer is for you.  The C)ISSO will prepare you with a broad range of knowledge and skills required of a security officer.

Advanced -
400 Level Courses

ISCAP

What does it take to have a certified and accredited information system in accordance with  DIACAP Instruction 8510.01? Mile2’s Information Systems Certification and Accreditation Professional training teaches the process of certifying, reviewing and accrediting an information system(IS).

IS20

This 4 day training course covers proven tools and methodologies needed to execute and analyze the Top Twenty Most Critical Security Controls. Nearly all organizations that maintain sensitive information are adopting these Security Controls.

C)SLO

Mile2’s Certified Security Leadership Officer  course is designed for mid and upper-level managers.  Engineers who are seeking to increase their knowledge in the security arena will benefit from this course as well.

Management

Healthcare Systems 

Intermediate -
200 Level Courses

C)ISSM

The Certified Information Systems Security Manager covers the skills and knowledge to assess threat analysis and risks, incident management, security programs and CISM roles.

Specialization -
300 Level Courses

C)ISSO

If you are look for the “gotta have it” cybersecurity course, then the Certified Information Systems Security Officer is for you.  The C)ISSO will prepare you with a broad range of knowledge and skills required of a security officer.

Advanced -
400 Level Courses

C)HISSP

The Certified Healthcare Information Systems Security Practitioner certification course covers the skills and knowledge to implement the best IT healthcare practices, as well as, regulatory compliance and standards in the healthcare industry.

Security

Security

Penetration Testing & Ethical Hacking

Intermediate -
200 Level Courses

C)PEH

To protect an information system you need to be able to see that system through the eyes of the attacker. The Certified Professional Ethical Hacker certification course is the foundational training to Mile2’s line of penetration testing courses because it teaches you to think like a hacker.
cyber range minimalpng-01

Specialization -
300 Level Courses

C)PTE

A Certified Penetration Testing Engineer imagines all of the ways that a hacker can penetrate a data system. You have to go beyond what you learned as an Ethical Hacker because pen testing explores technical and non-technical ways of breaching security to gain access to a system.
cyber range minimalpng-01

Advanced -
400 Level Courses

C)PTC

This course will teach you the necessary skills to work as a penetration testing team, the exploitation process, how to create a buffer overflow against programs running on Windows and Linux while subverting features such as DEP and ASLR.
cyber range minimalpng-01

C)PSH

We spend 4 days learning how to hack like the pros using nothing but what is already available to us in Windows or now in open source code on Mac and Linux! The course is based on real world implementations of a windows infrastructure along with real world penetration testing techniques.

cyber range minimalpng-01

Security

Application & Secure Coding

Intermediate -
200 Level Courses

C)PEH

To protect an information system you need to be able to see that system through the eyes of the attacker. The Certified Professional Ethical Hacker certification course is the foundational training to Mile2’s line of penetration testing courses because it teaches you to think like a hacker.
cyber range minimalpng-01

Specialization -
300 Level Courses

C)PTE

A Certified Penetration Testing Engineer imagines all of the ways that a hacker can penetrate a data system. You have to go beyond what you learned as an Ethical Hacker because pen testing explores technical and non-technical ways of breaching security to gain access to a system.
cyber range minimalpng-01

Advanced -
400 Level Courses

C)SWAE

The Secure Web programmer knows how to identify, mitigate and defend against all attacks through designing and building systems that are resistant to failure. With this course you will learn how to develop web applications that aren’t subject to common vulnerabilities, and how to test and validate that their applications are secure, reliable and resistant to attack. 

cyber range minimalpng-01

Security

Virtualization and Cloud Security

Intermediate -
200 Level Courses

C)VE

This fast-paced, high energy, hands-on course provides not only the foundation needed for a top performing software-defined data center, it also provides the latest in virtualization and cloud technologies which gives the engineer or administrator the knowledge and skills needed to design and manage the data center for tomorrow’s needs.
cyber range minimalpng-01

Specialization -
300 Level Courses

C)VSE

This fast paced, deep dive, hands-on course provides not only the foundation needed for highly secure deployment of VMware VSphere, it also provides a complete understanding of the CIA triad as it relates to virtualization.
cyber range minimalpng-01

Advanced -
400 Level Courses

C)CSO

Mile2’s Cloud Security Officer course (C)CSO) will provide you something you will not find in other class! The C)CSO looks to fill the gap in cloud security education and give you the skills you need to develop strong cloud security.
cyber range minimalpng-01
cyber range minimalpng-01


* Includes Cyber Range Labs

Response and Recovery

Response & Recovery

Disaster Recovery

Intermediate -
200 Level Courses

C)ISSM

The Certified Information Systems Security Manager covers the skills and knowledge to assess threat analysis and risks, incident management, security programs and CISM roles.

Specialization -
300 Level Courses

C)ISSO

If you are look for the “gotta have it” cybersecurity course, then the Certified Information Systems Security Officer is for you.  The C)ISSO will prepare you with a broad range of knowledge and skills required of a security officer.

Advanced -
400 Level Courses

C)DRE

The Certified Digital Forensics Examiner course is designed to train Cyber Crime and Fraud Investigator. Students are taught electronic discovery and advanced investigation techniques.
cyber range minimalpng-01

Response & Recovery

Forensics & Investigations

Intermediate -
200 Level Courses

C)DFE

The Certified Digital Forensics Examiner course is designed to train Cyber Crime and Fraud Investigator. Students are taught electronic discovery and advanced investigation techniques.
cyber range minimalpng-01

Specialization -
300 Level Courses

C)NFE

The Certified Network Forensics Examiner certification was developed for a U.S. classified government agency. It’s purpose is to push students with a digital and network forensic skill set to the next level.
cyber range minimalpng-01

C)CSA

Our Certified Cyber Security Analyst course helps you prepare an organization to create a complete end to end solution for proactively monitoring, preventing, detecting, and mitigating threats as they arise in real time.

Advanced -
400 Level Courses

C)VFE

The Virtualization Forensics Examiner course tackles two challenging areas facing IT security professionals today: incident response and virtualization. Forensics is at the heart of incident response, and therefore this training will focus on how to gather evidence relating to an incident – the what, when, where, who and why of an incident.
cyber range minimalpng-01

Response & Recovery

Incident Handling

Intermediate -
200 Level Courses

C)ISSM

The Certified Information Systems Security Manager covers the skills and knowledge to assess threat analysis and risks, incident management, security programs and CISM roles.

Specialization -
300 Level Courses

C)ISSO

If you are look for the “gotta have it” cybersecurity course, then the Certified Information Systems Security Officer is for you.  The C)ISSO will prepare you with a broad range of knowledge and skills required of a security officer.

Advanced -
400 Level Courses

C)IHE

The Certified Incident Handling Engineer course is designed to help Incident Handlers, System Administrators, and Security Engineers understand how to plan, create and utilize their systems. Prevent, detect and respond to attacks through the use of hands-on labs in our exclusive Cyber Range.
cyber range minimalpng-01
cyber range minimalpng-01


* Includes Cyber Range Labs

Auditing

Auditing

Auditing

Intermediate -
200 Level Courses

C)ISSM

The Certified Information Systems Security Manager covers the skills and knowledge to assess threat analysis and risks, incident management, security programs and CISM roles.

Specialization -
300 Level Courses

C)ISSO

If you are look for the “gotta have it” cybersecurity course, then the Certified Information Systems Security Officer is for you.  The C)ISSO will prepare you with a broad range of knowledge and skills required of a security officer.

Advanced -
400 Level Courses

C)ISSA

The Certified Information Systems Security Auditor course covers the skills and knowledge to assess vulnerabilities, report on compliance and implement controls for private and public enterprises. Many organizations require an Information System Auditor’s expert knowledge when it comes to identifying critical issues and providing effective auditing solutions.

Hands-On Labs and Electives

redblue

CYBER WARFARE

Red v Blue

ELECTIVES

C)ISRM

Mile2’s Certified Information Systems Risk Manager course is designed for IT and IS professionals who are involved with all aspects of risk management. First, you will learn to assess a system, then implement risk controls.

C)VA

Mile2’s Vulnerability Assessor course provides foundational knowledge of the tools an IT engineer needs to review an Information System. In this course, you will learn the importance of vulnerability assessments and how they are used to prevent serious cyber break-ins.
error: Content is protected!