0
Shopping cart
There are no products in your cart.
Log in

Register

Your input is important to us. Please provide your valuable feedback. Here are some testimonials from our clients:

Overall, this course - CISSO, has been effective in advancing my learning.
 
Date of Posting: 15 May 2017
Posted By: S.K.
Network Security, Canada
I have really enjoyed participating in the Mile 2 CISSO course. I found the course material very well structured and I have very much appreciated the instructor's examples to the relevant course modules.
 
Date of Posting: 15 May 2017
Posted By: S.E.
Network Defense, USA
Leo was a great instructor. Very knowledgeable and well spoken enough to make some of the driest material palatable. It wasn't until I started asking questions that I realized somehow I knew the answers.
Thank you!
 
Date of Posting: 15 May 2017
Posted By: B.H.
Network Defense, USA
Hi Bill,

I am pleased to announce that I passed the CSWAE exam and now am a certified Application Security Engineer.

Thanks for your support!
 
Date of Posting: 07 April 2017
Posted By: Tayo
Engineer, United Kingdom
Mile2 is excellent. Applicable training with an incredibly responsive staff. Grabbed my C)DRE from these guys after looking at comparable certs and providers. Glad I chose them. Highly recommended.
 
Date of Posting: 14 March 2017
Posted By: JW
Network Defense/Disaster Recovery, United States
Being both an IT guy by trade and a training procurement officer for my organization, I have had the opportunity of working with nearly every IT/IT security training company known man—including Training Camp, Mile2, 3 Soft USA, Global Knowledge, and New Horizons to name a few. For approximately 2 years I dealt with Mile2’s competitors and found them all to be near identical with respect to the quality of their products and services as well as their overall business model, which generally consisted of the sole pursuit of profits regardless of its effect on the customer. That said, my organization and I were very fortunate to find Mile2 when we did. Over the past 5 years of working with them, Mile2 has continuously proven themselves time and time again. Their products and services are far superior to those of their competitors, they hold themselves to a higher standard when it come to customer service, and their overall competitance is something that goes unrivaled within their industry. I look forward to working with Mile2 in the future to grow both the IT and security skills of my organization as well as my own. N.Johnson
 
Date of Posting: 27 September 2016
Posted By: N. Johnson
Project Manager/IT, California
Bill,

Just letting you know - I passed the exam for CPTE. I took some time and really organized my study, used the Cyber Range for its full effect, and when everything aligned - signed in and took the exam.

It went by fast and having the background knowledge in CPEH coupled with CompTIA's A+ and Security+ really brought everything together. Mile2 has an excellent set up.

Now on to Linux+ to match that skill set up with CPTE & CPEH for a well rounded professional. I really appreciate it.

Joe
 
Date of Posting: 11 July 2016
Posted By: JW
Network Security, United States
Bill,

I woke up @ 0230 HRS EST this Saturday and promptly began the Cyber Range labs. After following the video instructions - I logged in via RDP and used the Mile2 VM to allow for an outstanding lab experience. I've taken online/VM labs through a major university during my digital forensics training back in 2014, but I found the Mile 2 Cyber Range to be highly functional, direct, to the point, and expandable if needed to work on a few outside demonstrations of the tools provided. A fully understandable set of labs and the tools needed to accomplish the assigned tasked. Glad Mile2 put together the most popular and powerful tools used in the industry - instead of listing a multitude of them.

Per training personnel in ethical hacking or penetration testing to prep for either certification at Mile2, I highly recommend Cyber Range. It was enjoyable and I never became overwhelmed or bored. I followed the Lab Manual that came with my self-study kit and took accompanying screen shots for my own personal lab report. Mile2 has a done a great service for guys like me transitioning from irregular warfare over to cyber warfare with training modules and kits you guys provide. Having used Kali Linux, Metasploitable 2, Metasploit+Meterpreter before & currently with assigned exploits was another refresh and more practice that never gets old.

Again - many thanks to you and Mile2!!!
 
Date of Posting: 27 June 2016
Posted By: JW
Cyber Analyst, USA
Bill,

Good morning,

I am almost complete with the CISSO course. Pretty much to the point and a great course.


Thanks

WD
 
Date of Posting: 10 June 2016
Posted By: WD
Manager, USA
Learn-Security.net
Certified Incident Handling Engineer Mile2 review

I had the chance to watch all the videos for Certified Incident Handling Engineer Mile2 through Career Academy.



These videos where straight to the point where you can get pretty good knowledge of the whole Incident Handling process.



This is the list of videos:



Course 01 - Course Introduction
Course 02 - Threats, Vulnerabilities and Exploits
Course 03 - IH Preparation
Course 04 - Request Tracker for Incident Handling
Course 05 - Preliminary Response
Course 06 - Identification and Initial Response
Course 07 - Sysinternals
Course 08 - Containment
Course 09 - Eradication
Course 10 - Follow-up
Course 11 - Recovery
Course 12 - Virtualization Security
Course 13 - Malware Incident Handling

In the first two chapters give you an introduction and a lot of information about the threats, vulnerabilities and incidents.



Then IH Preparation chapter talk about what kind of communication we have to have with Management in case something happen, notice this chapter is for preparation. Also mention what to do in some cases like Turn off the server or trying to obtain information of the incident with the server on.



Chapter 04 was new for me, Request Tracker for incidents and explained one software to track the incident



Chapter 06 Identification and Initial Response expressed what to see to identify the incident and some examples and report procedures.



Chapter 07 Sysinternals was very instructive, mention the different tools we can use for an incident.



Chapter 08 is very delighted, Containment. How to stop potential loss, further damage and also identify clearly what computers were engage with the incident. Also enphisy the criteria to determine the right stategy.



Chapter 11 Recovery list in details what to do to recovery a system and how to validate the system before put it in production.



During the training enphasice the lesson learn in the process.



These videos are good, I recommend to watch it, if I put my hands in the printer material I will do a review on it.
 
Date of Posting: 06 April 2016
Posted By: G.H.
Network Security, USA

<< Start Previous 1 2 3 4 5 6 7 8 9 10 Next Last >>

Page 1 of 10