• Think, Analyze, Maintain
    Effective Solutions
  • Succeed with us!
    The World can be yours
  • Let us coperate!
    Advance your business!



This course/certification has been validated by the NSA for: CNSSI-4014, Information Assurance Training Standard for Information Systems Security Officers.

The Mile2 Certified Security Sentinel training is intended for anyone that uses a computer on the internet. Attendees will fully understand the security threats that attack daily and they will also understand the countermeasures associated with these attacks. Students will learn that the weakest link in any security program is a poorly trained employee. Once a student understands what can happen, they will know what to look for and with these common sense tactics, be able to keep their computer as safe as possible.

The Social Engineering portion of the class is not specifically targeted to IT or security personnel alone but rather is designed to teach the participants the skills used by Social Engineers to facilitate the extraction of information from an organization using technical and non-technical methods.

Computer fraud, black-hat hacking, cyber-terrorists; these phrases describe an innovative generation of criminals that use over-the-wire technology to attack us, steal from us and terrorize us. However the best tool in their arsenal is not new. It is only used by the most experienced, the most dangerous, boldest hackers.

Does it work? Can seemingly smart people be easily deceived? Kevin Mitnick, who served five years in prison for repeated hacking said in testimony before Congress on the subject of Social Engineering, “I was so successful with that attack that I rarely had to resort to a technical attack.”

The Mile2 Certified Security Sentinel program is innovative and trains students on how attacks are performed, the skills necessary to perform an attack, how to train people to identify an attack but most importantly: How to train internal targets so that the training is effective and lasts.


]Module 1: Basic Security: How to secure a computer for personal internet use

]Module 2: User Awareness

]Module 3: Implementing Countermeasures

]Module 4: Essential Security Awareness for Everyone

]Module 5: Using the Internet at Work

]Module 6: Accessing the Company's Network Through Your Assigned Computer

]Module 7: Accessing the Corporate Network Remotely

]Module 8: Social Engineering

]Module 9: Understanding and Manipulating our Target

]Module 10: Researching Our Target

]Module 11: Methods of Deception

@ Register Now