Close

ULTIMATE SELF-STUDY COMBOS

EVERYTHING YOU NEED TO EARN A CYBERSECURITY CERTIFICATION

Ultimate Combo

Ultimate Library

Get Certified

ANYTIME
ANYWHERE

Earn ONE Certificate

1 Certification, Online, Self-paced

Earn 10 Certificates

1O Certificates, Online, Self-paced

What Type of Training are You Looking For?

ROLE-BASED CERTIFICATION ROADMAP

Printable Role-Based Certification Roadmap

Foundational - 100 Level Courses

If you are a Beginner, master these before choosing your Role-based career path below.

Certified Security 

Awareness 1

Ready to take your first steps into Cybersecurity?  This course will teach you how to protect yourself and your organization from data theft.

Certified Security 

Awareness 2

In this course attendees learn how company culture influences the occurances of data theft.

If you manage people who have access to computers, you need to take this course.  

Together, the C)OST and the C)HST is the equivalent of Comptia’s® A+ course.

Management

Management

IS Management & Leadership

Advanced -
400 Level Courses

ISCAP

What does it take to have a certified and accredited information system in accordance with  DIACAP Instruction 8510.01? Mile2’s Information Systems Certification and Accreditation Professional training teaches the process of certifying, reviewing and accrediting an information system(IS).

IS20

This 4 day training course covers proven tools and methodologies needed to execute and analyze the Top Twenty Most Critical Security Controls. Nearly all organizations that maintain sensitive information are adopting these Security Controls.

C)SLO

Mile2’s Certified Security Leadership Officer  course is designed for mid and upper-level managers.  Engineers who are seeking to increase their knowledge in the security arena will benefit from this course as well.

Management

Healthcare Systems 

Advanced -
400 Level Courses

C)HISSP

The Certified Healthcare Information Systems Security Practitioner certification course covers the skills and knowledge to implement the best IT healthcare practices, as well as, regulatory compliance and standards in the healthcare industry.

Ethical Hacking and Pen Testing

Security

Penetration Testing & Ethical Hacking

Advanced -
400 Level Courses

C)PTC

This course will teach you the necessary skills to work as a penetration testing team, the exploitation process, how to create a buffer overflow against programs running on Windows and Linux while subverting features such as DEP and ASLR.
cyber range minimalpng-01

C)PSH

We spend 4 days learning how to hack like the pros using nothing but what is already available to us in Windows or now in open source code on Mac and Linux! The course is based on real world implementations of a windows infrastructure along with real world penetration testing techniques.

cyber range minimalpng-01

Security

Application & Secure Coding

Security

Virtualization and Cloud Security

cyber range minimalpng-01


* Includes Cyber Range Labs

Response and Recovery

Response & Recovery

Disaster Recovery

Response & Recovery

Forensics & Investigations

Response & Recovery

Incident Handling

cyber range minimalpng-01


* Includes Cyber Range Labs

Auditing

Auditing

Auditing

Advanced -
400 Level Courses

C)ISSA

The Certified Information Systems Security Auditor course covers the skills and knowledge to assess vulnerabilities, report on compliance and implement controls for private and public enterprises. Many organizations require an Information System Auditor’s expert knowledge when it comes to identifying critical issues and providing effective auditing solutions.

Hands-On Labs and Electives

redblue

CYBER WARFARE

Red v Blue

ELECTIVES

C)ISRM

Mile2’s Certified Information Systems Risk Manager course is designed for IT and IS professionals who are involved with all aspects of risk management. First, you will learn to assess a system, then implement risk controls.

C)VA

Mile2’s Vulnerability Assessor course provides foundational knowledge of the tools an IT engineer needs to review an Information System. In this course, you will learn the importance of vulnerability assessments and how they are used to prevent serious cyber break-ins.
error: Content is protected!