ULTIMATE SELF-STUDY COMBOS
ALL THE CYBERSECURITY TRAINING YOU NEED TO EARN A
MILE2 CYBERSECURITY CERTIFICATION
Each cybersecurity training course from Mile2 is designed to equip the student/candidate with the knowledge needed to pass the associated Mile2 cybersecurity certification exam.
When you purchase an ULTIMATE SELF-STUDY COMBO you get 12 months of access to all of the learning materials available for your course. Including videos covering each chapter of the electronic workbook, unlimited practice certification exams and 2 chances to pass the certification exam itself. Additionally, there are some materials that vary by course like an exam prep guide, lab guides and access to the Cyber Range for hands-on lab experience.
Get Certified
ANYTIME
ANYWHERE
- COURSE VIDEO
- E-BOOK
- E-PREP GUIDE
- E-LAB GUIDE
- EXAM SIMULATOR
- 1-WEEK CYBER RANGE
- 1-YEAR COURSEWARE ACCESS
- 1-YEAR EXAM VOUCHER
What Type of Training are You Looking For?
For Beginners
For Hackers
For Managers
For Investigators
For Auditors
For Cloud Specialists
Cybersecurity is one of the fastest growing job areas in the world
With a skills gap in the 3-4 million range around the world and increased occurrences of high-profile breaches in both the public and private sectors, there is no faster growing area of demand in internet technology than Information Security (INFOSEC).
Many people are looking for IT training online in order to advance their careers and secure their future. Mile2 has answered the call for comprehensive and flexible online security training by developing over 30 Cybersecurity Certifications and their corresponding education and training.
Even if you’ve had little to no cybersecurity or IT training, we can set you on a path to toward a career that needs dedicated and adaptive people like you. Our courses are assigned numeric values like any university with 100, 200, 300, and 400 level difficulties. Plus, we’ve developed a role-based roadmap to help you select the courses that match your career goals.
2021 Role-Based Course Progression Roadmap
NEW to CYBERSECURITY?
100 Level Foundational Courses and Certifications
C)SA1
Security
Awareness 1
Ready to take your first steps into Cybersecurity? This course will teach you how to protect yourself and your organization from data theft.
C)SA2
Security
Awareness 2
In this course attendees learn how company culture influences the occurrences of data theft and we get deeper into laws, regulations, and best practices for Security Awareness in a corporate environment.
If you manage people who have access to computers, you need to take this course.
C)HT+
C)OST
Hardware &
Operating
Systems
Two certifications. One low cost course.
C)HT provides the foundational knowledge needed to install, configure, and support computer hardware systems.
C)OST provides the foundational knowledge to install, configure, and support computer operating systems.
Together, you will be ready to install and configure computer devices across multiple platforms.
C)NP
Network
Principles
Learn concepts and skills needed to plan, install, maintain, and troubleshoot today’s networks, including wireless, virtual, and software defined networks!
Management Career Paths
Information Systems Security Manager/Officer
Level 200 - C)SP
Level 300 - C)ISSO
Level 350 - C)ISSM
Level 400 - IS20 Controls
Healthcare Info Systems Security Practitioners
Level 200 - C)SP
Level 300 - C)ISSO
Level 350 - C)ISSM
Level 400 - C)HISSP
Information Systems
Risk Manager
Level 200 - C)SP
Level 300 - C)ISSO
Level 350 - C)ISSM
Level 400 - C)ISRM
Response and Recovery
Incident Handler
Level 200 - C)SP
Level 300 - C)ISSO
Level 350 - C)IHE
Level 400 - C)CSA
Forensic Investigator
Level 200 - C)SP
Level 300 - C)DFE
Level 350 - C)NFE
Level 400 - C)CSA
Disaster Recovery Specialist
Level 200 - C)SP
Level 300 - C)ISSO
Level 350 - C)ISSM
Level 400 - C)DRE
Penetration Testing and Breech Prevention
Professional Ethical Hacker
Level 200 - C)VA
Level 300 - C)PEH
Level 350 - C)PTE
Level 400 - C)PTC
Cyber Threat Analyst
Level 200 - C)VA
Level 300 - C)PEH
Level 350 - C)TIA
Level 400 - C)CSA
Application Security Engineer
Level 200 - C)VA
Level 300 - C)PEH
Level 350 - C)PTE
Level 400 - C)CSWAE
Cloud Security Officer
Level 200 - C)VA
Level 300 - C)ISSO
Level 350 - C)VE
Level 400 - C)CCSO
Auditing
Information Systems Security Auditor
Level 200 - C)SP
Level 300 - C)PEH
Level 350 - C)PTE
Level 400 - C)PTC
Electives
300 Level
ISCAP
What does it take to have a certified and accredited information system in accordance with DIACAP Instruction 8510.01? Mile2’s Information Systems Certification and Accreditation Professional training teaches the process of certifying, reviewing and accrediting an information system(IS).
Certification and Accreditation Professional
400 Level
C)SLO
This course is going to prepare you for security across the entire environment including understanding risk management, identity and access control, network and data security.
Security Leadership Officer
400 Level
C)PSH
Did you know that a large percentage of hacks over the last year included PowerShell based attacks? Which is why we spend 4 days learning how to hack like the pros using nothing but what is already available to us in Windows or now in open source code on Mac and Linux!
Powershell
Hacker
400 Level
C)VFE
The Virtualization Forensics Examiner course tackles two challenging areas facing IT security professionals today: incident response and virtualization. Forensics is at the heart of incident response, and therefore this training will focus on how to gather evidence relating to an incident – the what, when, where, who and why of an incident.
Virtualization Forensics Examiner
400 Level
C)ISSM-LA/LI
The C)ISMS-LA is perfect for those looking to perform an internal or external ISMS ISO/IEC 27001 audit or to certify their ISO/IEC 27001 expertise.
The C)ISMS-LI certification course prepares students to help any organization through the process of implementing an information security management systems (“ISMS”) that is compliant with ISO/IEC 27001:2013 standard. ISO/IEC 27001 was developed to set a higher standard for information security as a result of increased cyber security risk. Students will not only implement the ISO/IEC 27001 standard but also help organizations set up controls, processes, and procedures for using a ISMS that will facilitate enhanced information security.
Lead Auditor/ Implementer
