Course Includes:
- Individual Course Access
- Course Video
- E-Workbook
- E-Prep & Lab Guide
- Exam
- 2 Week Cyber Range
- 1 Year Exam Voucher
Prerequisites:
- 12 months of IT security experience
- 12 months of Networking Experience
Student Materials:
- Student Workbook
- Student Lab guide
- Exam Prep Guide
- CPEs: 40
Who Should Attend?
- Information System Owners
- Security Officers
- Ethical Hackers
- Information Owners
- Penetration Testers
- System Owner and Managers
- Cybersecurity Engineers
The Certified Professional Ethical Hacker vendor-neutral certification course is the foundational training to Mile2’s line of penetration testing courses.
The CPEH certification training enables students to understand the importance of vulnerability assessments by providing industry knowledge and skills in Vulnerability Assessments. In doing so, the CPEH student is able to understand how malware and destructive viruses function. In addition, the CPEH course helps students learn how to implement counter response and preventative measures when it comes to a network hack.
Course Includes:
- Individual Course Access
- Course Video
- E-Workbook
- E-Prep & Lab Guide
- Exam
- 2 Week Cyber Range
- 1 Year Exam Voucher
Prerequisites:
- A minimum of 12 months’ experience in networking technologies
- Sound knowledge of TCP/IP
- Knowledge of Microsoft packages
- Network+, Microsoft, Security+
- Basic Knowledge of Linux is essential
Student Materials:
- Student Workbook
- Student Prep Guide
- CPEs: 40
Who Should Attend?
- Pen Testers
- Ethical Hackers
- Network Auditors
- Cybersecurity professionals
- Vulnerability Assessors
- Cybersecurity Managers
- IS Managers
The vendor-neutral Certified Penetration Testing Engineer certification course is built firmly upon proven, hands-on, Penetration Testing methodologies utilized by our international group of Penetration Testing Consultants.
The C)PTE presents information based on the 5 Key Elements of Pen Testing; Information Gathering, Scanning, Enumeration, Exploitation, and Reporting. The latest vulnerabilities will be discovered using these tried and true techniques.
This course also enhances the business skills needed to identify protection opportunities, justify testing activities and optimize security controls to reduce risk associated with working with the internet. The student will be using the latest tools, such as Saint, Metasploit through Kali Linux and Microsoft PowerShell. Mile2 goes far beyond simply teaching you to “Hack”. The C)PTE was developed around principles and behaviors used to combat malicious hackers and focuses on professional penetration testing rather than “ethical hacking”. Besides utilizing ethical hacking methodologies, the student should be prepared to learn penetration testing methodologies using advanced persistent threat techniques. In this course, you will go through a complete penetration test from A-Z! You’ll learn to create your own assessment report and apply your knowledge immediately in the workforce. With this in mind, the CPTE certification course is a complete upgrade to the EC-Council CEH! The C)PTE exam is taken anytime/anywhere online through mile2’s MACS system, making the exam experience easy and mobile. The student does not need to take the C)PTE course to attempt the C)PTE exam.
Upon completion, Certified Penetration Testing Engineer students will be able to establish industry acceptable auditing standards with current best practices and policies. Students will also be prepared to competently take the C)PTE exam.
OVERVIEW
Course Includes:
- Individual Course Access
- Course Video
- E-Workbook
- E-Prep & Lab Guide
- Exam
- 2 Week Cyber Range
- 1 Year Exam Voucher
Prerequisites:
• A minimum of 1 year in computers
Student Materials:
- Student Workbook
- Student Lab Guide
- Exam Prep Guide
Who Should Attend?
- Security Officers
- IS Managers
- Agents/Police Officers
- Attorneys
- Data Owners
- IT managers
- IS Manager/Officers
The Certified Digital Forensics Examiner vendor-neutral certification is designed to train Cyber Crime and Fraud Investigators whereby students are taught electronic discovery and advanced investigation techniques. This course is essential to anyone encountering digital evidence while conducting an investigation. Mile2’s Certified Digital Forensics Examiner training teaches the methodology for conducting a computer forensic examination. Students will learn to use forensically sound investigative techniques in order to evaluate the scene, collect and document all relevant information, interview appropriate personnel, maintain chain-of-custody, and write a findings report. The Certified Digital Forensics Examiner course will benefit organizations, individuals, government offices, and law enforcement agencies interested in pursuing litigation, proof of guilt, or corrective action based on digital evidence.
Upon completion, Certified Digital Forensics Examiner students will be able to establish industry acceptable digital forensics standards with current best practices and policies. Students will also be prepared to competently take the C)DFE exam.
OVERVIEW
Course Includes:
- Individual Course Access
- Course Video
- E-Workbook
- E-Prep & Lab Guide
- Exam
- 2 Week Cyber Range
- 1 Year Exam Voucher
Prerequisites:
Abasic understanding of networking and security technologies
Student Materials:
- Student Workbook
- Student Lab Guide
Certification Exams:
Certified Virtualization and Cloud Principles, CompTIA Cloud+
CEUs: 40
Who Should Attend?
- Information assurance managers/auditors
- System implementers/administrators
- Network security engineers
- IT administrators
- Auditors/auditees
- DoD personnel/contractors
- Federal agencies/clients
- Security vendors and consulting groups looking to stay current with frameworks for information assurance
Mile2’s vendor-neutral IS20 Controls certification course covers proven general controls and methodologies that are used to execute and analyze the Top Twenty Most Critical Security Controls. This course allows the security professional to see how to implement controls in their existing network(s) through highly effective and economical automation. For management, this training is the best way to distinguish how you’ll assess whether these security controls are effectively being administered or if they are falling short of industry standards. Nearly all organizations containing sensitive information are adopting and implementing the most critical security controls as the highest priority list. These controls were chosen by leading government and private organizations who are experts on how compromised networks/systems evolve and how to mitigate and prevent them from happening. These leading security experts chose the best of breed controls needed to block known incidents as well as alleviate any damage from successful attacks. Ultimately, the implementation of these Top 20 Controls will ensure best efforts to drastically decrease the overall cost of security while improving both the efficiency and effectiveness of it. The IS20 Security Controls exam is taken online through Mile2’s Assessment and Certification System (“MACS”). The exam will take 2 hours and consists of 100 multiple choice questions.
Among IT professionals, “MCSE Certification” has certainly become a buzzword with a certain ring to it. But what is the MCSE Certification? How do you achieve it, and what are your career options once you are certified? Let us look into that a bit more closely! First of all: What does “MCSE Certification” actually mean? […]
Boot camp certification courses are an efficient and relatively quick way to advance your IT skill set, credentials, and therefore your IT career. When you are already a part of the full-time workforce, it is not easy to find the time for to further your education. This can be a problem, because further education and […]
Are you looking for a job in the field of technology? Do you want to learn more about the qualifications and career options regarding technology jobs? There is a high demand in skilled people to fill IT- and tech-related positions. Considering the constantly evolving technologies, it is unlikely that this demand will change in the […]
If you want to advance your career, you probably know how important constant learning is, beyond college and vocational training. This has resulted in a growing interest in remote and on-demand learning, especially in the area of computer and information technology (IT). In order to stay up-to-date with the newest developments and to gain an […]
On-Demand combines high-quality video, reading and knowledge checks in a self-paced format to help you build skills as your schedule allows all at once or five minutes at a time.
Basic Package |
Standard Package |
Premium Package |
- 1-year access to instructor lecture video (based on availability)
- 1-year access to hands-on exercises, labs, games and practice tests*
- Email Help Desk Support
- *Practice tests and/or labs may not be available for certain courses
- *Includes reading materials and study guides, but official vendor courseware not included
|
- Includes digital license for official vendor courseware
- 1-year access to instructor lecture video (based on availability)
- 1-year access to hands-on exercises, labs, games and practice tests*
- Email Help Desk Support
- *Practice tests and/or labs may not be available for certain courses
|
- Standard Package plus:
- 3 hours of Instructor Time:
- One-on-one live instructor time geared towards your specific needs
- Scheduled in 1-hour increments
|
$595 or 2 SATVs |
$995 or 5 SATVs |
$1595 or 5 SATVs + $595 |
Not all IT certifications are created equal. Anyone who teaches anything can theoretically issue a certificate when their students have successfully attended whichever course had been created. Therefore, the worth of a certificate depends at least partially on the reputation and credentials of the person/organization/entity that has issued it. CompTIA Certifications Can Bring You Further […]