Phase2 Advantage Cybersecurity and Certifications
Instructor Michael I. Kaplan

Classroom-Based Courses are Back in Session!

All Phase2 Advantage cybersecurity training courses taught in a classroom format are conducted at the Crossroads Campus of Savannah Technical College in Savannah, Georgia.

A Professional and High-Tech Learning Environment

10 Minutes from the Savannah International Airport

5 Minutes from Major Hotels and Restaurants

Attractions such as Historic Downtown Savannah, River Street, Ghost Tours, Crosswinds Golf Club, The Savannah River Queen, and the beaches of Tybee Island are just a short distance from the Savannah training campus.  To find out more, please read the Visiting Savannah page in our website.

Classroom-Based Cybersecurity Courses

There’s no need to out-fight anyone you can out-think.

Partnership and Affiliation with the Technical College System of Georgia

Phase2 Advantage has partnered with Savannah Technical College and the Technical College System of Georgia to offer several cybersecurity courses for individuals who wish to pursue certification programs and enhance their career opportunities. Formats for training include classroom, instructor-led online, and self-paced training. For more information, please contact Savannah Technical College at (912) 443-3012 or by email at

Certification Track: Cybersecurity Course Progression

The cybersecurity courses offered by Phase2 Advantage have been designed to provide students with a body of knowledge that is cumulative in nature.  Each course in the track will provide the experiential knowledge and skills to successfully complete the next certification in the progression.  Following the certification track is not required but it is strongly encouraged.

NICE Cybersecurity Framework Alignment

NICE Cybersecurity Framework

These Phase2 Advantage courses are a component of the career progression track that supports the required Categories, Specialty Areas and Work Roles as defined by the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework.  It provides a common language to speak about cyber roles and jobs and can be referenced to define professional requirements in cybersecurity.

Certified Disaster Response and Recovery Manager

Instructor-Led Classroom Training

Business Continuity and Disaster Response and Recovery is the development of processes, policies, and procedures that prepare for and react to significant and unplanned operational disruptions. The Disaster Response and Recovery Manager course prepares students to successfully manage Business Continuity Planning and Disaster Recovery missions. Facing daily risks to long-term success from a wide range of threats — cyber-attacks, human error, technical failures, and natural disasters — businesses must create practical plans to sustain their vital operations, security posture, industry reputation, and brand. Students will cover critical topics such as BCP Design, Risk Management, Qualitative and Quantitative Analysis, Asset Inventories, Recovery Site Workflows, Cloud Computing Agreements, and Cloud Security. 

Certified Network Defense and Investigations Manager

Instructor-Led Classroom Training

As digital crime increases exponentially, the need for investigative expertise in both government and civilian sectors has increased proportionally as well. The Network Defense and Investigations Manager course provides students with methods and strategies to mitigate incident damage with efficient and effective response procedures, acquire crucial evidence in a forensically sound manner, identify and analyze the recovered evidence for relevant facts, and document and report details of the investigation. Students are presented with topics such as Enterprise Network Devices and Services, Identity and Access Management, Biometric Security, Evidence Collection and Chain of Custody, Data Analysis, and Reporting and Documentation requirements.

Certified Cybersecurity Defense and Operations Manager

Instructor-Led Classroom Training

Organizations face ongoing threats to their information technology infrastructure on a daily basis. These security struggles need to be approached with modern techniques, a holistic view of security, and a diverse body of knowledge. With the proper tools and training, specialists in the Information Security and Cybersecurity fields will be much more capable of finding success within their roles. Focusing on the Information Security concerns of today, students will cover topics such as Cloud Security, Threat Intelligence Analysis, Vulnerability Management, Biometric Systems, Incident Response, Securing Systems with Cryptography, and the NICE Cybersecurity Workforce Framework. Immersive learning labs utilize a wide variety of critical industry tools and Wireshark network protocol analyzer software.

Certified Incident Investigations and Response Manager

Instructor-Led Classroom Training

As organizations continue to rely on expanding infrastructure in an increasingly hostile threat landscape, the escalation of incidents involving malicious actors poses critical risks to information systems and networks. The ability to identify threats, respond to incidents, restore systems, and enhance security postures is vital to the survival of the operation.  With a specific focus on the identification and remediation of incidents involving host and network devices, students will cover topics such as Threat Intelligence Collection, Investigative Techniques, Malware Triage, and Remediation Strategies. Immersive learning labs utilize a wide variety of critical industry tools and Wireshark network protocol analyzer software.

Certified Cybercrime Investigation Specialist

Instructor-Led Classroom Training

Cybercrime investigators are a critical resource for any organization faced with criminal activities in their sphere of operation. The ability to identify and investigate malicious actors in both physical and digital environments requires unique training and knowledge that provides significant value to the government, law enforcement, and corporate entities which employ such professional investigators. As the volume and variety of cybercrime activity continues to escalate, highly skilled investigators will continue to be viewed as critical assets capable of providing defensive and competitive advantage to any industry in which they serve. Students will be prepared for the threat hunting, target modeling, and threat analysis concepts presented in the next course in the track.

Certified Threat Intelligence Analysis Manager

Instructor-Led Classroom Training

Threat Intelligence Analysis allows analysts to gain tactical, operational, and strategic advantages for customers of their intelligence product. Using highly developed analytical skills, analysts can maximize the benefits and efficiency of their supporting technology and automation, and significantly increase the security posture of their organization. This is a military grade intelligence analysis course providing the same training as that given by military intelligence schools and not formerly available to civilians. This course was created to counterbalance the lack of human training in automated Cyber Threat Intelligence (CTI) and the most valuable component of the intelligence process: the Analyst.

100% Flexible Financing for ALL Phase2 Advantage Courses

Watch this 45-second video and visit the Financing Options page in our website.

Contact Us to Learn More

To find out more about our wide range of group and government discounts,
contact us today via the phone number or email address listed below.

(912) 335-2217