• Think, Analyze, Maintain
    Effective Solutions
  • Succeed with us!
    The World can be yours
  • Let us coperate!
    Advance your business!


This course/certification has been validated by the NSA for: CNSSI-4014, Information Assurance Training Standard for Information Systems Security Officers.

This training is designed for the manager who wants to get up to speed fast. You will be able to put what you learn into practice the day you get back into the office. The hard working, attentive manager will acquire the essential skills required to oversee the security component of any information technology project. Students who attend mile2’s Certified Security Leadership Officer training are able to master the essential knowledge relating to current security issues, best practices, and technology.

This training was also created for senior and advancing managers interested in quickly learning the latest in regards to information security issues and terminology. The hard working, attentive manager will acquire the essential skills required to oversee the security component of any information technology project.

Essentials topics covered in this management track include:

Network Fundamentals and Applications, Hardware Architecture, Information Assurance Foundations, Computer Security Policies, Contingency and Continuity Planning, Business Impact Analysis, Incident Handling, Architectural Approaches to Defense in Depth, Cyber Attacks, Vulnerability Assessment and Management, Security Policies, Web Security, Offensive and Defensive Information Warfare, culminating with Management Practicum

Who Should Attend:

This course is designed and taught for mid to C level managers as well as any engineers who seek to increase their knowledge in the security arena. The C)SLO will give you the ability to better manage IT projects in a secure manner.

Attendees who should also attend include individuals with managerial or supervisory responsibility for information security staff. The diligent manager will learn the essential, up-to-date knowledge and skills required to supervise the security component of any information technology project.

jAll newly appointed information security officers

jTechnically skilled administrators that have recently been given leadership responsibilities

jSeasoned managers that want to understand what your technical people are telling you


]Module 1: 802.11

]Module 2: Access Control

]Module 3: Computer Forensics and Legalities

]Module 4: Cryptography Applications

]Module 5: Cryptography Algorithms and Concepts

]Module 6: Key Management

]Module 7: Cryptosystems

]Module 8: Digital Acquisition

]Module 9: DNS

]Module 10: Disaster Recovery and Business Continuity Planning

]Module 11: Endpoint Security

]Module 12: Honeypots, Honeynets, Honeytokens, Tarpits, oh my

]Module 13: IP Terms and Concepts

]Module 14: Logging

]Module 15: Malicious Software

]Module 16: Managing Security Policy

]Module 17: Methods of Attack

]Module 18: Mitnick-Shimomura

]Module 19: Physical Security

]Module 20: Risk Management & Security Frameworks

]Module 21: Security and Organizational Structure

]Module 22: Security Awareness

]Module 23: Steganography

]Module 24: The Intelligent Network - Unified Threat Management (UTM)

]Module 25: Network Infrastructure

]Module 26: Vulnerability Assessment – Outside View

]Module 27: Vulnerability Management – inside view

]Module 28: Vulnerability Management- User View

]Module 29: Web Communications

]Module 30: Wireless Advantages and Bluetooth

@ Register Now