Cyber Security


Certified Information Systems Auditor (CISA)
Hours: 15
Lectures: 720

The Certified Information Systems Auditor (CISA) course covers all the six domains of the CISA exam offered by the Information Systems Audit and Control Association (ISACA). CISA exam has become the industry standard for the IT auditing, control and security. The course helps the students to gain relevant, up-to-date and concise knowledge along with hands-on practice exams to prepare for the CISA certification exam.

CISA is one of the most popular and high-demand IT certifications available in the market, approximately, more than 60,000 professionals hold CISA certification. The CISA certification is also consistently named one of the best professional certifications to have by the leading analysts around the world. The course offers the students to gain comprehensive knowledge and concepts that are required to pass the CISA certification exam.

Certification Course
$299
CompTIA Advanced Security Practitioner (CAS-002)
Hours: 8
Lectures: 192

CompTIA Advanced Security Practitioner (CAS-002) is the course that teaches the students on securing complex enterprise environments. In this course, the students will expand their knowledge of IT security and learn about the more advanced tools and techniques to keep any organization safe and secure.

The CompTIA Advanced Security Practitioner (CAS-002) course will enable the students to meet the growing demands of today’s IT environment. The course helps the students to develop their skills and perform their jobs as an advanced security professional in their organizations. The course is designed for IT security professionals who want to acquire the technical knowledge and skills needed to conceptualize, engineer, integrate, and implement secure solutions across complex enterprise environments.

Certification Course
$199
CompTIA Security+ SY0-501
Hours: 14
Lectures:570

The CompTIA Security+ covers the latest SY0-501 version of the CompTIA Security+ certification exam. The course enables the students to gain the basic knowledge needed to plan, implement, and maintain information security in a vendor-neutral format. The course includes topics such as risk management, host and network security, authentication and access control systems, cryptography, and organizational security. The course contents are based on the CompTIA Security+ (SY0-501) certification exam and completely covers all the exam topics through theoretical and scenario-based learning examples.

The CompTIA Security+ is the premier vendor-neutral security certification. This preparatory course for the CompTIA Security+ certification exam assures that the students completely learn and understand the exam topics of the latest SY0-501 exam version. The students will be able to demonstrate their knowledge of security concepts, tools, and procedures. It also confirms their ability to react to security incidents, and validates their skills in anticipating security risks and guarding against them.

Certification Course
$199
EC Council Certified Ethical Hacker v.9 Certification

This course is for beginners and IT pros looking to get certified and land an entry level Cyber Security position paying upwards of six figures! There are currently over a million Cyber Security job openings global and demand is greatly outpacing supply which means more opportunity, job security and higher pay for you!

Exam Preparation and Learning Order of Courses

(The ideal flow of the courses in the bundle is as below but you can take the courses as per your knowledge and convenience)

1. Cyber Anonymity
2. Recon and Footprinting
3. Wireless Hacking Ninja
4. Pen Testing the Right Way
5. Cryptography for Hackers
6. Malware Development
7. Honeypots, IDS and Firewalls
8. Hacking Databases
9. Hacking Applications

10. Social Engineering

10 Course Bundle
$299
Certified Vulnerability Assessor
Hours: 3
Lectures: 14

The Certified Vulnerability Assessor (CVA) course is a vendor neutral certification preparatory course with the objective to deliver the importance of vulnerability assessments by providing intricate knowledge and skills in the Vulnerability Assessment arena. The CVA course provides foundational knowledge of general VA tools as well as popular exploits an IT engineer should be familiar with.

The Certified Vulnerability Assessor is a fundamental cyber security course that focuses on vulnerability assessments. The CVA course focuses on the basic knowledge of conducting a vulnerability assessment and analyze the outcomes to prevent break-ins to the network infrastructure of an organization. The course teaches the candidates to identify the basic malware and virus patterns and the tools and techniques required to prevent the infiltration of the malware and virus into the network. The graduating students will be able to effectively perform a security vulnerability assessment on a network and secure the organization’s IT infrastructure.

Exam Information

The Certified Vulnerability Assessor exam is taken online through Mile2’s Assessment and Certification System (“MACS”), which is accessible on your mile2.com account. The exam will take 2 hours and consist of 100 multiple choice questions.

Mile2 is:

  • ACCREDITED by the NSA CNSS 4011-4016
  • MAPPED to NIST / Homeland Security NICCS's Cyber Security Workforce Framework
  • APPROVED on the FBI Cyber Security Certification Requirement list (Tier 1-3)
Certification Course
$299
Certified Digital Forensics Examiner
Hours: 8
Lectures: 35

The CDFE*Certified Digital Forensics Examiner is a vendor neutral certification offered by Mile2 for the aspiring cyber-crime fraud investigators. The course is based on the recommended curriculum for the same certification. The course enables the students to investigate, pursue litigation, provide proof of guilt, or take corrective measures based on the evidence collected through digital media.

The Certified Digital Forensic Examiner course is a comprehensive training course based on the official Mile2 certification exam curriculum. The course teaches the advanced concepts such as investigation of digital forensic incidents, usual ways to identify and discover anomalies in the stored data, data acquisition, forensic examination methods and smart devices investigation techniques. The course is ideal for the candidates willing to appear for the CDFE certification exam.

Exam Information

Upon completion, Certified Digital Forensics Examiner students will be able to establish industry acceptable digital forensics standards with current best practices and policies. Students will also be prepared to competently take the C)DFE exam.

Mile2 is:

  • ACCREDITED by the NSA CNSS 4011-4016
  • MAPPED to NIST / Homeland Security NICCS's Cyber Security Workforce Framework
  • APPROVED on the FBI Cyber Security Certification Requirement list (Tier 1-3)
Certification Course
$299
Certified Wireless Network Administrator
Hours: 11
Lectures: 425

The Certified Wireless Network Administrator (CWNA) course is a foundation level course covering the fundamentals of enterprise Wi-Fi network administration. The course is based on the curriculum for the CWNA certification by CWNP. The course helps the students to achieve the most sought after Wi-Fi skills and knowledge which help the students to grow their careers in the field of wireless networking.

The ultimate goal of the Certified Wireless Network Administrator (CWNA) course is to enable the candidates to gain the Wi-Fi expertise required to effectively administer an enterprise Wi-Fi network. The course also covers all of the exam topics of the CWNA-107 exam required to achieve the CWNA certification. The course includes hands-on and real-world case studies to help the students implement the learnt concepts in their daily jobs. More advanced topics such as Wi-Fi design, security and troubleshooting are also an integral part of the course.


Certification Course
$299
Information Systems Certification and Accreditation Professional
Hours: 3.5
Lectures: 16
The ISCAP*Information Systems Certification and Accreditation Professional training course is based on the concepts around certifying, reviewing and accrediting an information system. This vendor-neutral certification course is designed to provide in-depth guide to establishing a certifiable and accredited information system in any organization. The course is based on the official certification exam contents and enables the students to appear in the exam. The course covers all the standards to implement the processes used to evaluate risk and institute security baselines and requirements.

The Information Systems Certification and Accreditation Professional (ISCAP*) course covers everything you need to know about becoming an Information Systems Certification and Accreditation Professional. Students are able to learn about the risk management framework, software development life cycle, categorizing information systems, selecting security controls, implementing security controls, assessing security controls, authorizing information systems, and monitoring security controls.

Exam Information

The Information Systems Certification and Accreditation Professional exam is taken online through Mile2’s Assessment and Certification System (“MACS”), which is accessible on your mile2.com account. The exam will take 2 hours and consist of 100 multiple choice questions.

Mile2 is:

  • ACCREDITED by the NSA CNSS 4011-4016
  • MAPPED to NIST / Homeland Security NICCS's Cyber Security Workforce Framework
  • APPROVED on the FBI Cyber Security Certification Requirement list (Tier 1-3)
Certification Course
$299
Certified Ethical Hacker (CEH)
Certification Prep with Practice Exam

The Certified Ethical Hacker (CEH) training course is a generalized training course for the information security professionals. This training course provides the students with an overview of the tools, techniques and skills required to become a successful and effective ethical hacker. The goal of this course is to help the candidates master an ethical hacking methodology that can be used in a penetration testing or ethical hacking situation.

This course covers all the tools and techniques in an encyclopedic approach that are fundamental to understand the domain of ethical hacking and implement the knowledge gained to secure the IT infrastructure and conduct effective penetration testing.

Exam Information

The Certified Ethical Hacker (CEH) exam is taken online through Mile2’s Assessment and Certification System (“MACS”), which is accessible on your mile2.com account. The exam will take 2 hours and consist of 100 multiple choice questions.

Mile2 is:

  • ACCREDITED by the NSA CNSS 4011-4016
  • MAPPED to NIST / Homeland Security NICCS's Cyber Security Workforce Framework
  • APPROVED on the FBI Cyber Security Certification Requirement list (Tier 1-3)
Certification Course
$299
IS20 Security Controls
Hours: 3
Lectures: 20

The IS20 Security Controls training course is based on the official Mile2’s vendor neutral IS20 Controls certification objectives and covers the proven general controls and methodologies that are used to execute and analyze the twenty most critical security controls. This course enables the IT security professionals to implement controls in their existing network(s) through highly effective and economical automation. The course is equally helpful for the enterprise management staff to effectively gauge the effectiveness of security controls implemented in their organizations.

This training course is a comprehensive and essential course for security professionals working with sensitive information and are responsible to ensure its security. The course focuses on the twenty most critical controls suggested by the leading government and private organizations. The implementation of these Top 20 Controls will ensure best efforts to drastically decrease the overall cost of security while improving both the efficiency and effectiveness of it.

Exam Information

The exam is taken online through Mile2’s Assessment and Certification System (“MACS”), which is accessible on your mile2.com account. The exam will take 2 hours and consists of 100 multiple choice questions.

Mile2 is:

  • ACCREDITED by the NSA CNSS 4011-4016
  • MAPPED to NIST / Homeland Security NICCS's Cyber Security Workforce Framework
  • APPROVED on the FBI Cyber Security Certification Requirement list (Tier 1-3)
Certification Course
$299
CyberSec First Responder: Threat Detection and Response
Certification Prep with Practice Exam ( CFR210 )

The CyberSec First Responder: Threat Detection and Response course prepares the candidates to protect the IT infrastructure of their organizations against cyber-attacks. The course also teaches the candidates to execute a properly planned response to such incidents. The tools and techniques taught in this course are independent of the size and scope of the organization as the course is based on the common threats, risks and their mitigation techniques which are applicable universally.

The candidates are advised to have some knowledge of basic networking technologies such as TCP/IP, routing protocols, network security and VPNs. In addition to this, the candidates are also supposed to have at least two years of professional experience in network administration or a similar field.

Certification Course
$299
Certified Secure Web Application Engineer (CSWAE)
Certification Prep with Practice Exam
Hours: 6.5
Lectures: 37

The Certified Secure Web Application Engineer (CSWAE) preparatory course is a comprehensive course covering all of the exam topics of the CSWAE certification offered by Mile2. The course helps the students to understand the technologies that are being used under the hood so that they are able to make informed decisions when choosing a cloud vendor. The course also covers the different types of cloud products, their working, their benefits and the migration process to the cloud.

The Certified Secure Web Application Engineer (CSWAE) course enables the students to establish industry acceptable auditing standards with current best practices and policies specifically for the web applications and cloud environment. The students are able to learn, implement and test the concepts taught in this course in real-world scenarios. The course is also very helpful for students who are looking forward to appear in and clear the CSWAE certification exam by Mile2.

Exam Information

The Certified Secure Web Application Engineer exam is taken online through Mile2’s Assessment and Certification System (“MACS”), which is accessible on your mile2.com account. The exam will take 2 hours and consist of 100 multiple choice questions.

Mile2 is:

  • ACCREDITED by the NSA CNSS 4011-4016
  • MAPPED to NIST / Homeland Security NICCS's Cyber Security Workforce Framework
  • APPROVED on the FBI Cyber Security Certification Requirement list (Tier 1-3)
Certification Course
$299
Certified Penetration Testing Engineer (CPTE)
Hours: 7.5
Lectures: 28

The Certified Penetration Testing Engineer (CPTE) is a vendor-neutral certification offered by Mile2 for aspiring penetration testing engineers who are looking to enhance their hands-on experience regarding the penetration testing methodologies used by the industry professionals. The course also covers the five key elements of penetration testing, namely; information gathering, scanning, enumeration, exploitation and reporting. These five key elements form a basis of discovering the vulnerabilities in a given system.

The Certified Penetration Testing Engineer (CPTE) course enhances the business skills needed to identify protection opportunities, justify testing activities and optimize security controls to reduce risk associated with working with the internet. The course utilizes the latest tools, such as Saint, Metasploit through Kali Linux and Microsoft PowerShell.

Exam Information

The Certified Penetration Testing Engineer exam is taken online through Mile2’s Assessment and Certification System (“MACS”), which is accessible on your mile2.com account. The exam will take 2 hours and consist of 100 multiple choice questions. The cost is $400 USD and must be purchased from Mile2.com.

Mile2 is:

  • ACCREDITED by the NSA CNSS 4011-4016
  • MAPPED to NIST / Homeland Security NICCS's Cyber Security Workforce Framework
  • APPROVED on the FBI Cyber Security Certification Requirement list (Tier 1-3)
Certification Course
$299
Certified Information Security Manager (CISM)

The Certified Information Security Manager (CISM) course helps the candidates to achieve the CISM certification. The certification is offered by the Information Systems Audit and Control Association (ISACA) to validate the expertise and knowledge of the candidates regarding the relationship between an information security program and the broader business targets. The certification also validates that the candidate has the hands-on knowledge of developing, managing and implementing an information security program for an organization.

CISM certification is a certification by ISACA for experienced Information security management professionals with work experience in developing and managing information security programs. The CISM course covers the four domains of the CISM certification exam. The course is an ideal preparatory course for the students seeking to gain CISM certification as well as the IT security and information security professionals looking to build on their practical experience.

Certification Course
$299
Certified Professional Ethical Hacker (CPEH)
Hours: 7.5
Lectures: 28

The CPEH*Certified Professional Ethical Hacker is a vendor-neutral certification offered by Mile2 for the students willing to learn the importance of vulnerability assessments by gaining industry knowledge and skills in vulnerability assessments. In doing so, the CPEH students are able to understand how malware and destructive viruses function. In addition to this, the CPEH course helps students learn how to implement counter response and take preventive measures in case of an attack on the network.

This preparatory course for the Certified Professional Ethical Hacker (CPEH*) certification covers the complete curriculum required to clear the certification exam. The topics covered in this course are security fundamentals, access controls, protocols, cryptography, vulnerability assessments, vulnerability tools of the trade, output analysis and reports, reconnaissance, enumeration and scanning, gaining access, maintaining access, covering tracks, malware, buffer overflows, and password cracking.

Exam Information

The CPEH course provides in-depth labs that focus on both open source and commercial based tools with industry best practices. These hands-on labs emulate real-world hacking scenarios and equip the candidate to assess your company’s security posture, help implement controls to better secure your company’s network infrastructure and how to combat against hackers and/or viruses, etc. Upon completion, the Certified Professional Ethical Hacker candidate will be able to competently take the CPEH exam.

Mile2 is:

  • ACCREDITED by the NSA CNSS 4011-4016
  • MAPPED to NIST / Homeland Security NICCS's Cyber Security Workforce Framework
  • APPROVED on the FBI Cyber Security Certification Requirement list (Tier 1-3)
Certification Course
$299
Certified Incident Handling Engineer
Hours: 7
Lectures: 22

The CIHE* Certified Incident Handling Engineer course is designed to enable the candidates to efficiently and effectively handle incidents which arise during their jobs as system administrators, system security engineers and network and cloud security experts. The course helps the candidates to plan, create and utilize their resources properly for the prevention, detection and mitigation of attacks on the data or infrastructure.

The Certified Incident Handling Engineer (CIHE*) is a certification exam offered by Mile2. The course is covers the entire curriculum of the said certification and prepares the candidates to appear in the certification exam. Mile2 certifications are vendor neutral and are designed to be applied at real-world scenarios. The course also approaches the concepts in the same manner enabling the students of this course to comprehend, plan, create and implement effective responses to attacks on data and infrastructure. Additionally, the course also teaches about the common exploits and techniques used by hackers globally so that the students of this course are aware and could prevent most of the attacks on their IT infrastructure.

Exam Information

The Certified Incident Handling Engineer exam is taken online through Mile2’s Assessment and Certification System (“MACS”), which is accessible on your mile2.com account. The exam will take 2 hours and consist of 100 multiple-choice questions.

Mile2 is:

  • ACCREDITED by the NSA CNSS 4011-4016
  • MAPPED to NIST / Homeland Security NICCS's Cyber Security Workforce Framework
  • APPROVED on the FBI Cyber Security Certification Requirement list (Tier 1-3)
Certification Course
$299
Certified Healthcare Information Systems Security Practitioner
Hours: 8
Lectures: 24

The CHISSP*Certified Healthcare Information System Security Practitioner is a vendor-neutral certification offered by Mile2. The course covers the contents of the certification in detail to enable the students to undertake the exam. The course enhances the candidates’ skills and knowledge to implement the best IT Healthcare Practices, as well as, regulatory compliance and standards in the healthcare industry. The growing requirements of privacy and data security in the healthcare industry, the Certified Healthcare Information Systems Security Practitioners offers great value for the certified professionals.

The Certified Healthcare Information Systems Security Practitioner (CHISSP*) course prepares the students to become a vital part of their organization to manage and protect healthcare data and to protect patient information by implementing, managing, and assessing proper IT controls for patient health information integrity.

Exam Information

The Certified Healthcare Information System Security Practitioner exam is taken online through Mile2’s Assessment and Certification System (“MACS”), which is accessible on your mile2.com account. The exam will take 2 hours and consist of 100 multiple choice questions.

Mile2 is:

  • ACCREDITED by the NSA CNSS 4011-4016
  • MAPPED to NIST / Homeland Security NICCS's Cyber Security Workforce Framework
  • APPROVED on the FBI Cyber Security Certification Requirement list (Tier 1-3)
Certification Course
$299
Certified Security Leadership Officer
Hours: 5.5
Lectures: 20

The Certified Security Leadership Officer (CSLO) is a vendor-neutral certification designed for mid and upper-level managers as well as any professionals who are seeking to increase their knowledge in the IT security field. This certification is offered by Mile2 and the course is based on the recommended curriculum. The course is designed in way that enables the students to gain an essential understanding of current security issues, best practices, and technology. A CSLO certified professional can be seen as the bridge between the cyber-security team and operations as well as business management. The course covers the fundamental topics such as networking, applications management, hardware architecture, information assurance, security policies, contingency planning and business continuity.

The Certified Security Leadership Officer (CSLO) course is a preparatory course for the official CSLO certification offered by Mile2. The course teaches the students about the security management, risk management, encryption, information security - access control concepts, incident handling and evidence, operations security, and network security.

Exam Information

The Certified Security Leadership Officer exam is taken online through Mile2’s Assessment and Certification System (“MACS”), which is accessible on your mile2 account. The exam will take 2 hours and consist of 100 multiple choice questions.

Mile2 is:

  • ACCREDITED by the NSA CNSS 4011-4016
  • MAPPED to NIST / Homeland Security NICCS's Cyber Security Workforce Framework
  • APPROVED on the FBI Cyber Security Certification Requirement list (Tier 1-3)
Certification Course
$299
Certified Wireless Security Professional (CWSP)

The Certified Wireless Security Professional (CWSP) course is designed on the CWSP certification exam curriculum recommended by CWNP. The course teaches the latest enterprise wireless LAN security and auditing techniques to the students. The course also covers the most up-to-date WLAN intrusion and DoS tools and techniques. The students are enabled on the functionality of the 802.11i amendment to the 802.11 standard, the inner-workings of each authentication method used with wireless LANs, and every class and type of WLAN security solution available. This includes a detailed coverage of the wireless intrusion prevention systems and wireless network management systems.

The Certified Wireless Security Professional (CWSP) course will help the students to acquire the necessary skills for implementing and managing wireless security in the enterprise by creating layer2 and layer3 hardware and software solutions with tools from the industry’s leading manufacturers. The course also serves as an excellent preparatory course for the CWSP certification offered by CWNP.

Certification Course
$299
Certified Disaster Recovery Engineer (CDRE*)
Hours: 2.5
Lectures: 13

The CDRE*: Certified Disaster Recovery Engineer course is based on the curriculum recommended by Mile2 for the CDRE* certification. CDRE* is a vendor-neutral certification that enables the candidates to learn and implement ways to respond in a disaster situation. This includes threats such as cyber-crime, information leakage, natural calamity and power shut-down etc. The course also enables the students to establish business continuity and disaster recovery plans based on the industry best-practices.

The goal of Certified Disaster Recovery Engineer (CDRE*) course is to enable the candidates to keep the critical business functions of any organization operational during the time of crisis or disaster. The main component of any organization that is most critical for its survival is information technology. All of the systems in a modern enterprise depend on the IT infrastructure. Hence, the need to have a comprehensive DR & BCP plan is very essential for any organization.

Exam Information

The CDRE*: Certified Disaster Recovery Engineer exam is taken online through Mile2’s Assessment and Certification System (“MACS”), which is accessible on your Mile2.com account. The exam will take 2 hours and consist of 100 multiple choice questions.

Mile2 is:

  • ACCREDITED by the NSA CNSS 4011-4016
  • MAPPED to NIST / Homeland Security NICCS's Cyber Security Workforce Framework
  • APPROVED on the FBI Cyber Security Certification Requirement list (Tier 1-3)
Certification Course
$299
Certified Security Sentinel
Certification Prep with Practice Exam

The Certified Security Sentinel (CSS) by Mile2 is a vendor neutral beginner level certification that teaches the students who use a computer on the internet. The students are made aware of the cyber-attacks and the countermeasures to mitigate or minimize the effects of these attacks. The course is based on the official curriculum of the CSS certification exam.

The Certified Security Sentinel (CSS) course will enable the students to fully understand the security threats that attack daily and countermeasures associated with these attacks. Additionally, the students learn how attacks are performed, how to identify an attack, and how to secure information. The course also teaches the students about the valuable skill sets of on security.

Exam Information

The Certified Security Sentinel exam is taken online through Mile2’s Assessment and Certification System (“MACS”), which is accessible on your mile2.com account. The exam will take 2 hours and consist of 100 multiple choice questions.

Mile2 is:

  • ACCREDITED by the NSA CNSS 4011-4016
  • MAPPED to NIST / Homeland Security NICCS's Cyber Security Workforce Framework
  • APPROVED on the FBI Cyber Security Certification Requirement list (Tier 1-3)
Certification Course
$299
Certified Penetration Testing Consultant (CPTC)
Hours: 6.5
Lectures: 25

The Certified Penetration Testing Consultant (CPTC) course teaches the IT security professionals and IT network administrators about the penetration tests to check the security of large and complex network infrastructures. The course is based on the real world scenarios similar to large corporate networks, services provider networks and telecommunication networks. The course focuses on the attacks on the underlying network infrastructure and protocol loopholes rather than the L4-L7 attacks.

The CPTC training course starts from basic techniques such as packet capturing and continues to the more sophisticated and advanced techniques of conducting a penetration test on any kind of network infrastructure. The course includes practice labs as well to provide hands-on experience to the students and apply the learnt knowledge to real-world scenarios. The course is an essential part of the preparation for CPTC certification by Mile2.

Exam Information

The Certified Penetration Testing Consultant exam consists of two parts. Part 1 is taken online through Mile2’s Assessment and Certification System (“MACS”), which is accessible on your mile2.com account. The exam will take 2 hours and consist of 100 multiple choice questions. Part 2 is a multi-hour practical exam in which students are expected to penetrate between 3 - 5 targets (2 buffer overflows (ASLR and DEP enabled for one), 1 Linux local exploit + priv esc and 1 web exploit) and then create and provide a detailed penetration testing report to mile2.

Mile2 is:

  • ACCREDITED by the NSA CNSS 4011-4016
  • MAPPED to NIST / Homeland Security NICCS's Cyber Security Workforce Framework
  • APPROVED on the FBI Cyber Security Certification Requirement list (Tier 1-3)
Certification Course
$299
Digital Security Awareness Training
Hours: 6
Lectures: 155

The Digital Security Awareness Training for Business and Home Users is a fundamental course on the cyber security awareness that is required to protect the personal data from being exposed to hackers in this age of excessive digitization. The course is designed to give all home users and business professionals the knowledge and tools to protect themselves and their sensitive information from security attacks. It covers many simple ways to prevent security breaches and protect valuable data.

This course is a very useful course for those individuals who are involved more-and-more in the technology-driven internet-of-things applications and devices. The one aspect that needs to be taken care of while using the digital applications and gadgets is the data security. The course addresses this aspect to cover all the necessary details that enable the business professionals and individuals to protect their sensitive information from unauthorized access and hacking.


Skills Course
$199
Certified Information Systems Security Professional (CISSP)
Hours: 8
Lectures: 145

The CISSP Certified Information Systems Security Professional Certification certification training package covers topics such as Access Control Systems, Cryptography, and Security Management Practices, teaching students the eight domains of information system security knowledge.

The new eight domains are:

  1. Security and Risk Management
  2. Asset Security
  3. Security Engineering
  4. Communications and Network Security
  5. Identity and Access Management
  6. Security Assessment and Testing
  7. Security Operations
  8. Software Development Security

The CISSP Certification is administered by the International Information Systems Security Certification Consortium or (ISC)². (ISC)² promotes the CISSP exam as an aid to evaluating personnel performing information security functions. Candidates for this exam are typically network security professionals and system administrators with at least four years of direct work experience in two or more of the ten test domains. As the first ANSI ISO accredited credential in the field of information security, the Certified Information Systems Security Professional (CISSP) certification provides information security professionals with not only an objective measure of competence, but a globally recognized standard of achievement.

Certification Course
$299
Certified Information Systems Security Officer (CISSO)
Hours: 20.5
Lectures: 74

Upon completion, CISSO*Certified Information Systems Security Officer students will not only be able to establish industry acceptable Cyber Security & IS management standards with current best practices but also be prepared to competently take the CISSO exam.

The Certified Information Systems Security Officer certification training was a direct initiative of the DND – Department of National Defence of Canada in cooperation with the DOD – Department of Defense of the United States; defined in the dual initiative titled CANUS CDISM MOU - ID#: 1974100118.

In the CANUS CDISM MOU, it stated the following: I. The CDRSN National Information System Security Officer (ISSO) is the focal point for all security issues pertaining to this network. II. The Director Information Management Security (DIMSECUR) is the DND authority for security assessment of the CDRSN, including the approval of Interim Authority to Process (IAP) and Authority to Communicate. With these initiatives in mind, Mile2 created the Certified ISSO. The CISSO addresses the broad range of industry best practices, knowledge and skills expected of a security manager/officer. The candidate will learn in-depth theory pertaining to the practical implementation of core security concepts, practices, monitoring and compliance in the full panorama of IS management.

Through the use of a risk-based approach, the CISSO is able to implement and maintain cost-effective security controls that are closely aligned with both business and industry standards. Whether you’re responsible for the management of a Cyber Security team, a Security Officer, an IT auditor or a Business Analyst, the C)ISSO certification course is an ideal way to increase your knowledge, expertise, and skill.

Exam Information

The Certified Information Systems Security Officer exam is taken online through Mile2’s Assessment and Certification System (“MACS”), which is accessible on your mile2.com account. The exam will take 2 hours and consist of 100 multiple choice questions. The cost is $400 USD and must be purchased from Mile2.com.

Mile2 is:

  • ACCREDITED by the NSA CNSS 4011-4016
  • MAPPED to NIST / Homeland Security NICCS's Cyber Security Workforce Framework
  • APPROVED on the FBI Cyber Security Certification Requirement list (Tier 1-3)
Certification Course
$299
Intro to EC-Council Certified Ethical Hacker - CEHv9
Hours: 1
Lectures: 7

This course covers basic information related to Certified Ethical Hacker certification.

This course includes lessons where you will learn what Ethical Hacking is, what the Certified Ethical Hacking Certification is and how to use these skills to become a paid security professional. This course is a starting point for you to chart your course to a well paying and satisfying Cyber Security career. This course will get you on the fast track to certification, and ultimately, relentlessly pursued by recruiters.

The demand for Certified Ethical Hackers, Cyber Security Engineers, Administrators, Consultants, Architects, Business Analysts, Project Managers, etc. is immense. The Certified Ethical Hacker certification is an attainable path to helping business protect their digital assets in the cloud and on-premise. You can do it!

Taking this course will help you to

• Learn the basics of Ethical Hacking

• Introduction to Certified Ethical Hacker subject matter

• Learn hacking techniques through multiple hands-on examples in this course

Skills Course
$29
Digital Forensics for Cyber Professionals
Hours: 2
Lectures: 13

In this course you will learn how to use open source tools to collect digital forensic information from Linux and Windows systems. You will learn how to conduct static malware analysis of live 'Ransomware' using forensics tools and techniques.

This course focuses on screencast demonstrations of how to use these tools in a step-by-step manner so you can start doing forensics work immediately on your own.

  • Digital Forensics Overview
  • Recovery and Reconstruction
  • Reversing and Malware Analysis
  • Windows and Linux Live Response
  • Incident Response Techniques
  • Red and Blue Team Tools
  • Conduct Forensic Analysis of Hacker Activities
  • CAINE
  • Forensics Tools and Storage

Learn to use open source tools such as CAINE to do forensic analysis on live systems.

Learn about basic and advanced techniques you will need to gain a grasp on GIAC and other Computer Forensic certifications. The Cyber Forensics field is red hot. Stake your claim now!

Skills Course
$49
Wireless Hacking for Cyber Professionals
Hours: 1.5
Lectures: 8

This course covers tools and techniques related to hacking, auditing and pen testing wireless network protocols.

You will learn wireless hacking terminology and how to use these skills to become a paid security professional.

The demand for Certified Ethical Hackers, Cyber Security Engineers, Administrators, Consultants, Architects, Business Analysts, Project Managers, etc. is immense. The Certified Ethical Hacker certification is an attainable path to helping business protect their digital assets in the cloud and on-premise. You can do it!

  • Crack WEP communications
  • Crack WPS (Wi-Fi protected setup) codes
  • Learn how to crack and intercept WPA protected networks
  • Hack bluetooth communications
  • Eavesdrop on wireless communications utilizing 'Software Defined Radio'
  • Learn to use tools such as Aircrack, Reaver, Wireshark, Snort and more in this course.
Skills Course
$49
Incident Response for Cyber Professionals
Hours: 3.5
Lectures: 16

In this course you will learn how to use open source tools for incident response purposes. This course utilizes first hand explanations and screencast demonstrations of how to use these tools in a step-by-step manner so you can start incident response work immediately on your own. This course is for you if you have desire to learn more about defending networks and systems against hackers.

Skills Course
$99
Database Security for Cyber Professionals
Hours: 3.5
Lectures: 13

In this course you will learn how to secure open source and commercial database platforms against modern threats and attack vectors. This course includes a mix of conceptual lectures and detailed screencasts outlining all the steps involved with conducting test attacks and subsequently securing your database platforms.

This course is for you ,if you are interested in learning how to hack and protect database environments and want to know how hackers breach commercial and open source databases.

Skills Course
$99
Ethical Hacking: Social Engineering
Hours: 1
Lectures: 6

This course is for beginners and IT pros looking to get certified and land an entry level Cyber Security position paying upwards of six figures! There are currently over a million Cyber Security job openings global and demand is greatly outpacing supply which means more opportunity, job security and higher pay for you! Each chapter closes with exercises putting your new learned skills into practical use immediately. You will start by understand network anonymity by using tools such as Rubber Ducky, Beef and the Social Engineering Toolkit.

This course is for beginners and IT pros looking to get certified and land an entry level Cyber Security position paying upwards of six figures! There are currently over a million Cyber Security job openings global and demand is greatly outpacing supply which means more opportunity, job security and higher pay for you! Each chapter closes with exercises putting your new learned skills into practical use immediately. You will start by understand social engineering by using tools such as Rubber Ducky, Beef and the Social Engineering Toolkit.

Skills Course
$49
Ethical Hacking: Hacking Databases
Hours: 2
Lectures: 9

This course is for beginners and IT pros looking to get certified and land an entry level Cyber Security position paying upwards of six figures! Each chapter closes with exercises putting your new learned skills into practical use immediately. You will start by understand network anonymity by using tools such as Tor, Tortilla and Proxy Chains.

This course is for beginners and IT pros looking to get certified and land an entry level Cyber Security position paying upwards of six figures! There are currently over a million Cyber Security job openings global and demand is greatly outpacing supply which means more opportunity, job security and higher pay for you! Each chapter closes with exercises putting your new learned skills into practical use immediately. You will start by understand and hack databases such as Microsoft SQL, MySQL and Oracle RDBMS.

Skills Course
$49
Ethical Hacking: Hacking Applications
Hours: 1.5
Lectures: 9

This course is for beginners and IT pros looking to get certified and land an entry level Cyber Security position paying upwards of six figures! Each chapter closes with exercises putting your new learned skills into practical use immediately. You will start by understand network anonymity by using tools such as the Zed Attack Proxy, Hamster and Ferret. Next you will learn how to conduct XSS attacks, buffer overflows and then learn how to hack AJAX.

This course is for beginners and IT pros looking to get certified and land an entry level Cyber Security position paying upwards of six figures! There are currently over a million Cyber Security job openings global and demand is greatly outpacing supply which means more opportunity, job security and higher pay for you! Each chapter closes with exercises putting your new learned skills into practical use immediately.

Skills Course
$49
Ethical Hacking: Honeypots, IDS and FW's
Hours: 1.5
Lectures: 11

This course is for beginners and IT pros looking to get certified and land an entry level Cyber Security position paying upwards of six figures! Each chapter closes with exercises putting your new learned skills into practical use immediately.

This course is for beginners and IT pros looking to get certified and land an entry level Cyber Security position paying upwards of six figures! There are currently over a million Cyber Security job openings global and demand is greatly outpacing supply which means more opportunity, job security and higher pay for you! Each chapter closes with exercises putting your new learned skills into practical use immediately.

Skills Course
$49
Ethical Hacking: Cryptography for Hackers
Hours: 1.5
Lectures:10

This course is for beginners and IT pros looking to get certified and land an entry level Cyber Security position paying upwards of six figures! Each chapter closes with exercises putting your new learned skills into practical use immediately. This course is for beginners and IT pros looking to get certified and land an entry level Cyber Security position paying upwards of six figures! There are currently over a million Cyber Security job openings global and demand is greatly outpacing supply which means more opportunity, job security and higher pay for you! Each chapter closes with exercises putting your new learned skills into practical use immediately.

Skills Course
$49
Ethical Hacking: Recon and Footprinting
Hours: 1
Lectures: 11

This course is for beginners and IT pros looking to get certified and land an entry level Cyber Security position paying upwards of six figures! Each chapter closes with exercises putting your new learned skills into practical use immediately.

This course is for beginners and IT pros looking to get certified and land an entry level Cyber Security position paying upwards of six figures! There are currently over a million Cyber Security job openings global and demand is greatly outpacing supply which means more opportunity, job security and higher pay for you! Each chapter closes with exercises putting your new learned skills into practical use immediately.

Skills Course
$49