The Cyber Shield 2021 Course was originally designed for the Ohio National Guard. It is a vendor neutral cyber security course focusing on the acquisition and collection of evidence, forensic analysis, malware analysis and report writing.
The Cyber Shield 2021 course training entails hands on labs in mile2’s proprietary cyber range. Each lab designated teaches the methodology for conducting a computer forensic examination, an incident/event and general network forensic scenarios. Students will learn to use industry acceptable and forensically sound investigative techniques in order to, evaluate the scene, collect and document all relevant information, interview appropriate personnel, maintain chain-of-custody, and write a findings/executive report.
This specialized course covers topics from Mile2’s C)DFE, C)NFE, and C)CSA courses which are all a part of our Master Forensic Investigator line of study.
Live Class Duration: 3 Days
* Live Virtual Training
* 12 months in Internet Technology
* 12 months in Information Security
Module 1: Forensics Process/Threat Management
Module 2: Digital Acquisition.
Module 3: General Artifact Analysis
Module 4: Malware Analysis
Module 5: Digital Forensics Reporting
Lab 1: Chain of Custody
Lab 2: Identify Seized Evidences
Lab 3: Assessing Current Defense State
Lab 4: Upgrading Detection Capabilities
Lab 5: Devices Acquisition
Lab 6: Digital Forensics
Lab 7: Traffic Analysis
Lab 8: Prepare the Case Evidence (1st Evidence)
Lab 9: Investigate Acquired Evidence
Lab 10: Prepare Case Evidence (2nd Evidence)
Lab 11: Finding Clues
Lab 12: Malware Analysis
Lab 13: Stuxnet Trogen
Lab 14: Incident Response
Mile2’s Cyber Range is a hands-on environment hosted on the exclusive Mile2 Ghost Pentesting Environment. No simulations are used. Instead, participants face real-world challenges in order to develop practical skills.
Upon completion, Certified Information Systems Security Officer students will not only be able to establish industry acceptable Cyber Security & IS management standards with current best practices but also be prepared to competently take the CISSO exam.
Upon completion of the course the participant will receive a course completion certificate that will be delivered to their mile2.com account and can be printed for verification purposes.
This course does not map to a specific exam. However, with the broad range of topics covered, a student could consider sitting for the C)DFE, C)NFE, or C)CSA certification exams. Carefully review the course and exam outlines to determine if you would need additional education in order to successfully pass the exam.
NO. You do not have to purchase a course to purchase a certification exam.
All of our courses can be taken independently. In order to help guide our students on their cybersecurity career journey we have developed the Mile2 Certification Roadmap.
This helpful resource maps specific courses to Role-based career tracks.
Mile2 Cybersecurity Certifications is a world-leader in providing accredited education, training, and certifications for INFOSEC professionals. We strive to deliver the best course ware, the strongest Cyber Range, and the most user-friendly exam system in the market.
Our training courses follow our role-based Certification Roadmap. Plus, many of our classes include hands-on skill development in our Cyber Range. We train students in penetration testing,disaster recovery, incident handling, and network forensics. Additionally, our Information Assurance training certification meets military, government, private sector and institutional specifications.