Most popular
PECB Certified ISO/IEC 27001 Lead Auditor eLearning Training Course
23 Lessons
Intermediate
What you'll learn
Understand the operations of an Information Security Management System based on ISO/IEC 27001
Acknowledge the correlation between ISO/IEC 27001, ISO/IEC 27002, and other standards and regulatory frameworks
Understand an auditor’s role to plan, lead, and follow-up on a management system audit in accordance with ISO 19011
Learn how to lead an audit and audit team
Learn how to interpret the requirements of ISO/IEC 27001 in the context of an ISMS audit
Acquire the competencies of an auditor to plan an audit, lead an audit, draft reports, and follow-up on an audit in compliance with ISO 19011
C)SP – Certified Security Principles eLearning
11 Lessons
40 hours
Intermediate
PECB Certified ISO 37001 Lead Implementer eLearning Training Course
Intermediate
What you'll learn
Understand the concepts, approaches, methods, and techniques used for the implementation and effective management of an ABMS.
Learn how to interpret and implement the requirements of ISO 37001 in the specific context of an organization
Understand the operation of the anti-bribery management system and its processes based on ISO 37001
Learn how to interpret and implement the requirements of ISO 37001 in the specific context of an organization.
C)NFE – Certified Network Forensic Examiner eLearning
20 Lessons
40 hours
Intermediate
What you'll learn
Upon completion, Certified Network Forensics Examiner students will have knowledge to perform network forensic examinations.
Be able to accurately report on their findings, and be ready to sit for the C)NFE exam.
PECB Certified ISO 22301 Lead Auditor eLearning Training Course
23 Lessons
Intermediate
What you'll learn
Explain the fundamental concepts and principles of a Business Continuity Management System (BCMS) based on ISO 22301
Interpret the ISO 22301 requirements for a BCMS from the perspective of an auditor
Evaluate the BCMS conformity to ISO 22301 requirements, in accordance with the fundamental audit concepts and principles
Plan, conduct, and close an ISO 22301 compliance audit, in accordance with ISO/IEC 17021-1 requirements, ISO 19011guidelines, and other best practices of auditing
Manage an ISO 22301 audit program
PECB Certified ISO/IEC 27001 Lead Implementer eLearning Training Course
27 Lessons
Intermediate
What you'll learn
Gain a comprehensive understanding of the concepts, approaches, methods, and techniques used for the implementation and effective management of an ISMS
Acknowledge the correlation between ISO/IEC 27001, ISO/IEC 27002, and other standards and regulatory frameworks
Understand the operation of an information security management system and its processes based on ISO/IEC 27001
Learn how to interpret and implement the requirements of ISO/ IEC 27001 in the specific context of an organization
Acquire the necessary knowledge to support an organization in effectively planning, implementing, managing, monitoring, and maintaining an ISMS
PECB Certified ISO 37001 Lead Auditor eLearning Training Course
Intermediate
What you'll learn
Explain the fundamental concepts and principles of an antibribery management system (ABMS) based on ISO 37001
Interpret the ISO 37001 requirements for an ABMS from the perspective of an auditor
Evaluate the ABMS conformity to ISO 37001 requirements, in accordance with the fundamental audit concepts and principles
Plan, conduct, and close an ISO 37001 compliance audit, in accordance with ISO/IEC 17021-1 requirements, ISO 19011 guidelines, and other best practices of auditing
Plan, conduct, and close an ISO 37001 compliance audit, in accordance with ISO/IEC 17021-1 requirements, ISO 19011 guidelines, and other best practices of auditing
C)SLO – Certified Security Leadership Officer eLearning
7 Lessons
40 hours
Intermediate
What you'll learn
Upon completion, the Certified Security Leadership Officer candidate be able to competently take the C)SLO exam.
You will be versed in implementing strong security controls and managing an organization with an industry acceptable security posture.
Computer Hacking Forensic Investigator | CHFI eLearning
16 Lessons
24 hours
All Levels
What you'll learn
Establish threat intelligence and key learning points to support pro-active profiling and scenario modeling
Perform anti-forensic methods detection
Perform post-intrusion analysis of electronic and digital media to determine the who, where, what, when, and how the intrusion occurred
Extract and analyze of logs from various devices like proxy, firewall, IPS, IDS, Desktop, laptop, servers, SIM tool, router, firewall, switches AD server, DHCP logs, Access Control Logs & conclude as part of investigation process.
Identify & check the possible source / incident origin.
Recover deleted files and partitions in Windows, Mac OS X, and Linux
Conduct reverse engineering for known and suspected malware files
Collect data using forensic technology methods in accordance with evidence handling procedures, including collection of hard copy and electronic documents
C)ISSO – Certified Information Systems Security Officer eLearning
13 Lessons
40 hours
Intermediate
What you'll learn
If you are looking for the “gotta have it” cybersecurity course, then the Certified Information Systems Security Officer is for you. The C)ISSO will prepare you for multiple managerial roles inside the INFOSEC community by covering a broad range of topics. You will learn theories in security concepts, practices, monitoring and compliance in IS management.
An Information Systems Security Officer is able to implement and maintain cost-effective security controls that are closely aligned with business and industry standards. The C)ISSO certification course is an ideal way to increase knowledge, expertise, and skill for managers, auditors, and INFOSEC professionals. At Mile2 we consider the C)ISSO to be one of our flagship courses. The things you learn in this course can be applied to management, prevention teams, and recovery professionals.
Material learned in the Live Class or Self-Study options will apply directly to the certification exam.
Trending
C)IHE – Certified Incident Handling Engineer eLearning
26 Lessons
40 hours
Intermediate
CISM eLearning
17 Lessons
Intermediate
What you'll learn
Establish and/or maintain an information security governance framework and supporting processes to ensure that the information security strategy is aligned with organizational goals and objectives.
Manage information risk to an acceptable level based on risk appetite to meet organizational goals and objectives.
Develop and maintain an information security program that identifies, manages and protects the organization’s assets while aligning to information security strategy and business goals, thereby supporting an effective security posture.
Plan, establish and manage the capability to detect, investigate, respond to and recover from information security incidents to minimize business impact.
Certified Ethical Hacker | CEH eLearning
20 Lessons
16 hours
All Levels
What you'll learn
Information security controls, laws, and standards.
Various types of footprinting, footprinting tools, and countermeasures.
Network scanning techniques and scanning countermeasures
Enumeration techniques and enumeration countermeasures
Vulnerability analysis to identify security loopholes in the target organization’s network, communication infrastructure, and end systems.
System hacking methodology, steganography, steganalysis attacks, and covering tracks to discover system and network vulnerabilities.
Different types of malware (Trojan, Virus, worms, etc.), system auditing for malware attacks, malware analysis, and countermeasures.
Packet sniffing techniques to discover network vulnerabilities and countermeasures to defend against sniffing.
Social engineering techniques and how to identify theft attacks to audit human-level vulnerabilities and social engineering countermeasures.
DoS/DDoS attack techniques and tools to audit a target and DoS/DDoS countermeasures.
Session hijacking techniques to discover network-level session management, authentication/authorization, and cryptographic weaknesses and countermeasures.
Webserver attacks and a comprehensive attack methodology to audit vulnerabilities in webserver infrastructure, and countermeasures.
Web application attacks, comprehensive web application hacking methodology to audit vulnerabilities in web applications, and countermeasures.
SQL injection attack techniques, injection detection tools to detect SQL injection attempts, and countermeasures.
Wireless encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools.
Mobile platform attack vector, android vulnerability exploitations, and mobile security guidelines and tools.
Firewall, IDS and honeypot evasion techniques, evasion tools and techniques to audit a network perimeter for weaknesses, and countermeasures.
Cloud computing concepts (Container technology, serverless computing), the working of various threats and attacks, and security techniques and tools.
Penetration testing, security audit, vulnerability assessment, and penetration testing roadmap.
Threats to IoT and OT platforms and defending IoT and OT devices.
Cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools.
C)PEH – Certified Professional Ethical Hacker eLearning
17 Lessons
40 hours
Intermediate
What you'll learn
Upon completion, the Certified Professional Ethical Hacker candidate will be able to competently take the C)PEH exam.
C)DRE – Certified Disaster Recovery Engineer eLearning
10 Lessons
32 hours
Intermediate
What you'll learn
Upon completion, Certified Disaster Recovery Engineer students will be able to establish industry acceptable DR & BCP standards with current best practices and policies.
Students will also be prepared to competently take the C)DRE exam.
CISSP (Certified Information Systems Security Professional) Exam Prep
Intermediate
What you'll learn
Understand and apply fundamental concepts and methods related to the fields of information technology and security.
Align overall organizational operational goals with security functions and implementations.
Understand how to protect assets of the organization as they go through their lifecycle.
Understand the concepts, principles, structures, and standards used to design, implement, monitor, and secure operating systems, equipment, networks, applications, and those controls used to enforce various levels of confidentiality, integrity, and availability.
Implement system security through the application of security design principals and the application of appropriate security control mitigations for vulnerabilities present in common information system types and architectures.
Understand the importance of cryptography and the security services it can provide in today’s digital and information age.
Understand the impact of physical security elements on information system security and apply secure design principals to evaluate or recommend appropriate physical security protections.
Understand the elements that comprise communication and network security coupled with a thorough description of how the communication and network systems function.
List the concepts and architecture that define the associated technology and implementation systems and protocols at Open Systems Interconnection (OSI) model layers 1–7.
Identify standard terms for applying physical and logical access controls to environments related to their security practice.
Appraise various access control models to meet business security requirements.
Name primary methods for designing and validating test and audit strategies that support business requirements.
Enhance and optimize an organization’s operational function and capacity by applying and utilizing appropriate security controls and countermeasures.
Recognize risks to an organization’s operational endeavors, and assess specific threats, vulnerabilities, and controls.
Understand the System Lifecycle (SLC) and the Software Development Lifecycle (SDLC) and how to apply security to it, and identify which security control(s) are appropriate for the development environment, and assess the effectiveness of software security.
C)PTE – Certified Penetration Testing Engineer eLearning
28 Lessons
40 hours
Intermediate
C)SWAE – Certified Secure Web Applications Engineer eLearning
13 Lessons
40 hours
Intermediate
What you'll learn
Upon completion, Certified Secure Web Application Engineer students will be able to establish industry acceptable auditing standards with current best practices and policies.
Students will also be prepared to competently take the C)SWAE exam.
All Cybersecurity Courses
Cybersecurity Online Training Courses - E-Learning
Filter by Vendor
We found 5 courses available for you
CC (Certified in Cybersecurity) Exam Prep | eLearning Bundle
14 hours
Beginner
Course Description Through self-paced learning content this course will cover …
$349.00
CompTIA Server+ eLearning Bundle
52 Lessons
Expert
CertMaster Learn+Labs Details What is CertMaster Learn integrated with CertMaster …
$1,349.00
CompTIA CASP+ eLearning Bundle
40 Lessons
Expert
CertMaster Learn+Labs Details What is CertMaster Learn integrated with CertMaster …
$1,749.00
CompTIA PenTest+ eLearning Bundle
42 Lessons
Expert
CertMaster Learn+Labs Details What is CertMaster Learn integrated with CertMaster …
$1,299.00
CompTIA Security+ eLearning Bundle
59 Lessons
Beginner
CertMaster Learn Details What is CertMaster Learn? CertMaster Learn is …
$1,299.00