About the Certifying Organization

Mile2 is a developer of proprietary vendor neutral cyber security certifications which are accredited by NSA’s CNSS 4011-4016. Mile2’s courses are approved on Homeland’s Security NICCS training schedule and is on the FBI’s preferred cyber security certification requirements. 

Mile2 courseware has been approved by the Committee on National Security Systems (CNSS) National Training Standards. The Information Assurance Courseware Evaluation (IACE) Program provides consistency in technology training and education for the information assurance industry. 

Mile2 is a globally respected Cyber Security Organization that focuses on cyber security training for governmental and corporate entities who understand the value of “knowing your enemy.” By training businesses and organizations to think like an attacker, their intellectual property and data remains secure.

About the Instructor

Michael I. Kaplan, CISSP
Michael I. Kaplan is a Certified Mile2 Cyber-Security Instructor (Lic: #743500), Certified Exam Proctor (Lic: #743400), and an Authorized Training Center for Mile2 Cyber-Security Certifications.  He possesses a high degree of subject matter expertise regarding conformance to Cyber Security Frameworks (CSF) including HIPAA Compliance (HITECH, GAPP), NIST SP 800 Series, ISO 27000 Series, PCI-DSS, SSAE 16 (SOC1, SOC2), and FedRAMP (moderate, high).

Michael is authorized to instruct the following Mile2 certifications anywhere in the USA, and in Trinidad & Tobago. To contact Michael, click HERE.

Click the Course Title for a Full Description
(You will be redirected to the Mile2 website)

Certified Information Security Management Systems - Lead Implementer
Duration: 3 Days
The Certified Information Security Management Systems—Lead Implementer certification course prepares students to help any organization through the process of implementing an information security management system (“ISMS”) that is compliant with ISO/IEC 27001 standard. ISO/IEC 27001 was developed to set a higher standard for information security because of increased cyber security risk. Students will not only implement the ISO/IEC 27001 standard but also help organizations set up controls, processes, and procedures for using a ISMS that will facilitate enhanced information security.

Certified Information Security Management Systems – Lead Auditor
Duration: 3 Days
The Certified Information Security Management Systems—Lead Auditor certification course prepares students to competently lead audits of information security management systems (“ISMS”) to ensure that they meet ISO/IEC 27001 standards in any organization. Mile2’s ISMS ISO/IEC 27001 Audit Methodology: Planning, Control Evaluation, Substantive Testing, and Completion. Upon completion of this course, students will have learned the ISMS audit principles, procedures, and techniques; acquired the necessary knowledge to manage an ISMS audit; and, be ready to perform an ISO/IEC 27001 audit.

Certified Healthcare Information Systems Security Practitioner
Duration: 4 Days
The Certified Healthcare Information Systems Security Practitioner certification was developed by Mile2 because of growing industry regulations and privacy requirements in the healthcare industry. The CHISSP’s have become vital in managing and protecting healthcare data and tasked to protect patient information by implementing, managing, and assessing proper IT controls for patient health information integrity. This certification course covers the skills and knowledge to implement the best IT Healthcare Practices, as well as regulatory compliance and standards in the healthcare industry.

Certified Information Systems Security Officer (CISSP Equivalent)
Duration: 5 Days
The Certified Information Systems Security Officer certification course addresses the broad range of industry best practices, knowledge, and the skills expected of a security manager/officer. The student will learn in-depth theory of the practical implementation of core security concepts, practices, monitoring, and compliance in the full panorama of IS management.   Using a risk-based approach, the CISSO can implement and maintain cost-effective security controls that are closely aligned with both business and industry standards.
NOTE:  The CISSO certification has been validated by the NSA CNSSI-4012, National Information Assurance as well as the Training Standard for Senior System Managers and NSTISSI - 4011, National Training Standard for Information Systems Security (INFOSEC).

Certified Information Systems Security Manager
Duration: 4 Days
The Certified Information Systems Security Manager covers the skills and knowledge to assess and analyze threats and risks posed to modern information systems. Topics covered in this course will include Risk and Incident Management, security programs and CISO roles, Information Systems security strategy and frameworks, Audit and Risk Management policy development, compliance and awareness. Students will also be prepared to address development, deployment, and maintenance of comprehensive Disaster Recovery and Business Continuity Planning.

Certified Information Systems Security Auditor
Duration: 4 Days
The knowledge and course content provided in the vendor neutral Certified Information Systems Security Auditor will not only cover ISACA®’s exam but will provide a measurable certification that demonstrates proficiency in the IS Auditing Field.  This course covers the skills and knowledge to assess vulnerabilities, report on compliance and implement controls for private and public enterprises. Students will receive in-depth knowledge in topics that pertain to the following: IS audit, control, assurance, and security professionals, including IT consultants, auditors, managers, security policy writers, privacy officers, information security officers, network administrators, security device administrators, and security engineers.

Certified Information Systems Risk Manager
Duration: 3 Days
The vendor neutral Certified Information Systems Risk Manager certification is designed for IT and IS professionals involved with risk identification, assessment and evaluation, risk response, risk monitoring, IS control design and implementation as well as IS control monitoring and maintenance. This training will enable professionals to elevate their understanding in identifying and evaluating entity-specific risk but also aid them in assessing risks associated to enterprise business objectives by equipping the practitioner to design, implement, monitor and maintain risk-based, efficient and effective IS controls. Students will receive comprehensive training built around five core competencies: Risk Identification Assessment and Evaluation, Risk Response, Risk Monitoring, IS Control Design and Implementation, and IS Control Monitoring / Maintenance.

Certified Secure Web Application Engineer
Duration: 4 Days
The vendor neutral Certified Secure Web Application Engineer certification provides the developer with a thorough and broad understanding of secure application concepts, principles and standards. The student will be able to design, develop and test web applications that will provide reliable web services that meet functional business requirements and satisfy compliance and assurance needs. The Secure Web programmer knows how to identify, mitigate and defend against all attacks through designing and building systems that are resistant to failure. The secure web application developer knows how to develop web applications that aren’t subject to common vulnerabilities, and how to test and validate that their applications are secure, reliable and resistant to attack.

Certified Security Awareness Principles
Duration: 2 Days
The Mile2 vendor neutral Certified Security Awareness Principles certification course is intended for anyone that uses a computer on the internet. Attendees will understand the security threats as well as the countermeasures associated with these attacks. Employees will learn that the weakest link in any security program is a poorly trained department. This course teaches general security awareness as well as how to develop a strong security culture within your company’s community. The Social Engineering component of the class is designed to teach the participants the skills used by Social Engineers to facilitate the extraction of information from an organization using technical and non-technical methods.

Certified Penetration Testing Engineer
Duration: 5 Days
The vendor neutral Certified Penetration Testing Engineer certification course is built firmly upon proven, hands-on, Penetration Testing methodologies utilized by our international group of Penetration Testing consultants. This course presents information based on the 5 Key Elements of Pen Testing: Information Gathering, Scanning, Enumeration, Exploitation, and Reporting.  This course also enhances the business skills needed to identify protection opportunities, justify testing activities and optimize security controls to reduce risk associated to working with the internet.

Certified Disaster Recovery Engineer
Duration: 4 Days
Disaster recovery and business continuity planning is the process of having a professional work with a business to prepare processes, policies, and procedures to follow in the event of a disruption. The goal is to keep a business’ critical operations running, which today relies heavily on its IT infrastructure. The comprehensive Certified Disaster Recovery Engineer course goes beyond traditional BCP training -preparing students for industry certification in Business Continuity planning and presenting the latest methodologies and best practices for real-world systems recovery. Students will receive a solid foundation of instruction that will enable them to create meaningful business continuity plans.

Certified Incident Handling Engineer
Duration: 5 Days
The Certified Incident Handling Engineer vendor neutral certification is designed to help Incident Handlers, System Administrators, and any General Security Engineers understand how to plan, create and utilize their systems in order to prevent, detect and respond to attacks.  In this in-depth training, students will learn step-by-step approaches used by hackers globally, the latest attack vectors and how to safeguard against them, Incident Handling procedures (including developing the process from start to finish and establishing your Incident Handling team), strategies for each type of attack, recovering from attacks, and much more.

Certified Security Leadership Officer
Duration: 5 Days
The vendor neutral Certified Security Leadership Officer certification course is designed for mid- and upper-level managers, as well as technical engineers, who seek to increase their knowledge in the security arena and gain an essential understanding of current security issues, best practices, and technology. Essential topics covered in this management track are extremely detailed and include the following: Network Fundamentals and Applications, Hardware Architecture, Information Assurance Foundations, Computer Security Policies, Contingency and Continuity Planning, Business Impact Analysis, Incident Handling, Architect Approaches to Defense in Depth, Cyber Attacks, Vulnerability Assessment and Management, Security Policies, Web Security, and Offensive / Defensive Information Warfare.

Certified Vulnerability Assessor
Duration: 3 Days
The Certified Vulnerability Assessor course provides foundational knowledge of general VA tools as well as popular exploits with which an IT engineer should be familiar. This course is a fundamental cyber security certification course that focuses on vulnerability assessments.  The student will be versed with basic malware and viruses and how they can infiltrate an organizations network. The student will also learn how to assess a company’s security posture and perform a basic vulnerability test to help secure the organization’s networking infrastructure.

IS20 Security Controls
Duration: 3 Days
Mile2’s vendor neutral IS20 Security Controls certification course covers proven general controls and methodologies that are used to execute and analyze the Top Twenty Most Critical Security Controls. This course allows the security professional to see how to implement controls in their existing network(s) through highly effective and economical automation. For management, this training is the best way to distinguish how to assess whether these security controls are administered effectively, or if they are falling short of industry standards.

Contact Michael for YOUR Mile2 Cyber-Security Training Needs!

PHONE: (912) 244-0394   |   EMAIL: