eDIGITAL RESOURCES

Cyber and Physical Security Consulting ® Do YOU Teach cybersecurity at a college or university? If so, exclusive instructor discounts are available to you YEAR ROUD. Phase2 Advantage Textbooks are Available on VitalSource’s eDigital Academic Platform. Phase2 Advantage has partnered with VitalSource’s digital content publishing platform to offer cybersecurity textbooks and immersive labs to students…

Intelligence Analysis Cyber Threat Modeling

Intelligence Analysis and Cyber Threat Modeling Watch this short video to find out more about our intelligence analysis certification. https://www.youtube.com/watch?v=G3cdX2CxVnw Course Chapter Outline 01: The Purpose and Value of Intelligence02: The Intelligence Process and Life Cycle03: Adversaries in the Modern Threat Landscape04: Enhancing Analytical and Logical Reasoning Skills05: Managing the Information Collection Process06: Determining the…

Cybersecurity Defense and Operations

Cybersecurity Defense and Operations Course Watch this short video to learn more about this comprehensive course. https://www.youtube.com/watch?v=1dxEc31XIpM Course Chapter Outline 01: The NICE Cybersecurity Workforce Framework02: Principles of Identity and Access Management03: Biometric Identification and Security Systems04: Securing Systems and Data Using Cryptography05: Principles of Secure Network Architecture06: Identifying Network Baselines and Anomalies07: Incident Response…

Cyber Incident Response

Cyber Incident Response and Remediation Strategies Watch this short video on our self-study Incident Response cyberecurity course. https://www.youtube.com/watch?v=ZXpLHTi8t-s Course Chapter Outline 01: The Incident Response and Attack Life Cycles02: Understanding the Modern Threat Landscape03: Creating an Effective Incident Response Capability04: Investigative Preparation and Implementation05: Vulnerability Assessment and Management06: Identifying Network and System Baselines07: Indicators of…

Network Cyber Defense

Network Cyber Defense and Investigations Course Watch this short video describing this course in our self-study program. https://www.youtube.com/watch?v=fjI9ExZ22jQ Course Chapter Outline 01: The Risks and Threats Posed to Modern Networks02: Fundamentals of Secure Network Architecture03: The Functionality and Value of Network Devices04: Overview of Enterprise Network Services05: Principles of Identity and Access Management06: Securing Systems…

Cyber Risk Management

Cyber Risk Management and Recovery Planning Certification Watch this short video for details on this Phase2 Advantage self-study certification. https://www.youtube.com/watch?v=HJCm42L4zRU Course Chapter Outline 01: Introduction to Disaster Response and Recovery02: Conducting a Business Impact Analysis03: Selection of Risk Management Frameworks04: Qualitative and Quantitative Analysis Measurements05: Creating an Emergency Operations Plan06: Recovery Site Management and Workflows07:…

Certification Exam

Cybersecurity Certification Exams At the conclusion of each Phase2 Advantage cybersecurity course, students will be prepared to sit for the certification exam. The online examination will consist of 100 True/False, Multiple Choice, and Fill in the Blank questions. The exam may be taken at any time within 3 months of completing the certification course. Students…

Learning Management System

Navigating the Learning Management System The Learning Management System (LMS) is hosted and maintained by the Technical College System of Georgia (TCSG) and used to conduct all cybersecurity certification courses taught by Phase2 Advantage.  This overview of the portal was created to make the initial user experience easier for new students and to highlight the…

Incident Investigations and Response

Cyber Incident Response As organizations continue to rely on expanding infrastructure in an increasingly hostile threat landscape, the escalation of incidents involving malicious actors poses critical risks to information systems and networks. The ability to identify threats, respond to incidents, restore systems, and enhance security postures is vital to the survival of the operation. The…

Cybersecurity Defense and Operations

Cybersecurity Defense and Operations Organizations face ongoing threats to their information technology infrastructure on a daily basis. These security struggles need to be approached with modern techniques, a holistic view of security, and a diverse body of knowledge. With the proper tools and training, specialists in the Information Security and Cybersecurity fields will be much…