View these course listings listing on
NICCS.US-CERT.GOV

Cyber Security Course Descriptions

The cyber security certification courses listed below can be delivered in a classroom format, online Webex training, or remote training at the client location.  To read detailed information regarding the course outline and objectives, course materials, and intended audiences, please click the “Full Description” button below each course listing. 

Certified Digital Forensic Examiner

Phase2 Advantage: Certified Digital Forensic Examiner

The Certified Digital Forensics Examiner certification course is designed to train Cyber Crime and Fraud Investigation students in the use of electronic discovery and advanced investigation techniques. This course is essential to anyone encountering, collecting, handling, or analyzing digital evidence during the course of an investigation.

Students will learn methodologies to implement forensically sound investigative techniques and industry best practices that withstand legal challenges in a court of law.  Topics include evaluation and preservation of crime scenes, collection and documentation of relevant evidence, professional interview and corroboration techniques, maintaining a secure chain-of-custody, and writing a concluding report.

This certification will benefit organizations, individuals, government offices, and law enforcement agencies interested in pursuing litigation, proof of guilt, or corrective action based on digital evidence.

Certified Disaster Recovery Engineer

Phase2 Advantage: Certified Disaster Recovery Engineer

Business Continuity and Disaster Response / Recovery is the process of preparing processes, policies, and procedures that follow in the event of a significant and unplanned operational disruption. The Certified Disaster Recovery Engineer training course prepares students for industry certification in Business Continuity planning and Disaster Recovery missions.

As businesses face a wide range of daily risks – including cyber-attacks, human error, technical failures, and natural disasters – it’s vital they create practical plans to sustain their security posture, financial health, and industry / brand reputation to maintain long-term success.  Information Security personnel with proper training and practical knowledge in Disaster Response and Recovery planning can prove to be valuable assets to any organization with these goals.  This course will provide students with 20 learning objectives supporting a knowledge base of industry best practices, and practical field training components to equip them to apply this knowledge in their own environment.

Certified Incident Handling Engineer

Phase2 Advantage: Certified Incident Handling Engineer

The Certified Incident Handling Engineer certification course is designed to help Incident Handlers, System Administrators, and Information Security professionals understand how to plan, create, and utilize their Incident Detection and Response systems to quickly and efficiently respond to potential threats.  In the realm of information security incidents, it’s not a matter of “if,” but “when.”  Preparation and preemptive training can make the difference between experiencing a security incident, and being subjected to a disastrous event.

Students will receive in-depth training to learn methodologies and exploits utilized by malicious actors, the latest attack vectors, and industry best practices for developing procedures and teams to safeguard against them. This course also provides numerous hands-on laboratory exercises that focus on topics such as reconnaissance, vulnerability assessments using Nessus, network sniffing, web application manipulation, malware identification and isolation, and scenarios for both Windows and Linux systems.

Certified Information Systems Security Manager

Phase2 Advantage: Certified Information Systems Security Manager

The Certified Information Systems Security Manager certification course provides students with the knowledge and industry best practices required to identify and analyze potential threats and risks posed to modern information systems.  Given the wide range of technology-enabled components comprising modern security programs, the Information Security professional must be able to practically apply these skills within Administrative, Technological, and Operational contexts.

The course content is divided into five primary categories with which anyone in a security leadership position should have significant competency: Policy Development and Governance, Risk Management and Regulatory Compliance, Information Security Program Development and Management, Network Security Controls and Architecture, and Incident Handling and Response.  Topics within these five categories will include 20 critical learning objectives.  In addition, students will also be presented with information regarding Business Continuity and Disaster Response / Recovery.

Certified Information Systems Security Officer

Phase2 Advantage: Certified Information Systems Security Officer

The Certified Information Systems Security Officer certification course addresses a wide variety and range of industry best practices, experiential knowledge, and core information security competencies expected of every CISO or Security Manager. In this comprehensive course covering 20 distinct and well-established domains, students will be presented with in-depth theories regarding the practical implementation of foundational Information Security concepts.

Using a risk-based approach, the student will have the capability to implement and maintain cost-effective security management programs directly aligned with both the business process and industry best practices.  Examples of some of the topics covered in this challenging but rewarding course include: Identification, Authentication, and Access Control; Network Protocols, Devices, and Security Architecture; Cryptography, VPN, and Wireless Technology; Database and Software Development Security; and, Security Models and Evaluation Criteria.

Certified Network Forensic Examiner

Phase2 Advantage: Certified Network Forensic Examiner

The Certified Network Forensic Examiner certification course was originally developed for the U.S. government, and has now been made available to city, county, and state law enforcement agencies.  Civilian personnel outside the law enforcement community are also authorized to attend on a case-by-case basis.

This comprehensive course brings digital and network forensic core competencies to advanced levels by presenting students with 20 detailed learning objectives and a series of practical lab exercises. Students will be provided with both experiential knowledge and practical skills that simulate real-world scenarios, investigations, and recovery of evidentiary data in systems and networks. With a specific focus on the centralizing and investigating of logging systems and network devices, students will cover topics such as: Network-Based Evidence and Investigative Methodologies; Wireless Traffic Capture and Analysis; NIDS and NIPS Evidence Acquisition; and, Web Proxies and Encryption.

Certified Vulnerability Assessor

Phase2 Advantage: Certified Vulnerability Assessor

The Certified Vulnerability Assessor certification course provides foundational knowledge of industry vulnerability assessment tools, industry best practices, and popular exploits with which an Information Security professional should be familiar. This fundamental cyber security certification course provides students with the knowledge required to attend more advanced courses such as Certified Incident Handling Engineer, Certified Digital Forensic Examiner, and Certified Penetration Testing Engineer.

Students will be presented with topics such as basic malware identification and detection, and how malicious code can infiltrate an organizations’ systems and networks. The student will also learn how to assess a company’s information security posture by performing basic vulnerability tests to secure the organization’s networking infrastructure.  Examples of topics covered in this course are: Assessing Web Servers and Applications; Host Discovery Controls and Techniques; Port Scanning Techniques and Algorithms; and, Scanning IoT, SCADA, and ICS Systems.

Contact Us for The Ultimate Training Experience

Contact Us

(912) 244-0394

Contact Us

Info@Phase2Advantage.com

Contact US

Phase2Advantage.com/Contact

previous arrow
next arrow
Slider