SlideShare a Scribd company logo
1 of 6
Why We Created Mile2?
• Created in the after math of 9/11.
• Known for our robust cyber security certifications for prominent global
organizations world wide including the early development of the Certified
Ethical Hacker in the U.S.A.
• Developer and provider of proprietary vendor neutral professional
certifications for global securities.
Courses specifically designed for elite organizations
C)SWAE
Certified Secure Web
Application Engineer
Boeing Aerospace
C)ISSO
Certified Information Systems
Security Officer
Canadian Department of
National Defense
C)PTE
Certified Penetration
Testing Engineer
United States Air Force
C)NFE
Certified Network Forensics
Examiner
United States
Counterintelligence Agency
What do they say: Testimonies
Staff at a major US Air Force Base. The statement of work included the following quote:
"These courses cannot be substituted with a Certified Ethical Hacker (CEH) curriculum."
US Air Force Statement of Work 05T0273 Published inviting public bids for
Penetration Testing Training. Awarded to Mile2.
One prospective respondent to the solicitation asked the following question:
Q: " Why doesn't Wright-Patterson AFB want a CEH-certified curriculum?"
USAF's response was as follows:
A: "CEH-certified courses tend to focus on teaching the student how to use a
handful of tools that are available on the internet. While this knowledge is
somewhat useful during a penetration test, our goal is to expand on this and
learn how to turn our results into a professional report. Most of our students
know how to use these tools, but need to learn the methodology behind a full
penetration test. This methodology could include identifying protection
opportunities, justifying testing activities and optimizing security controls to
reduce business risk.“
Accreditation
CNSSI: 4016 National Information Assurance Training Standards for Risk Analysis - C)DRE
NSTISSI: 4015 National Training Standard for Systems Certifiers - ISCAP
CNSSI: 4014 Information Assurance Training Standard for Information Systems Security
Officers - C)SLO
CNSSI: 4013 National Information Assurance Training Standard for System Administrators -
C)PTE
CNSSI: 4012 National Information Assurance Training Standard for Senior Systems Managers
- C)ISSO
NSTISSI: 4011 National Training Standard for Information Systems Security (INFOSEC) -
C)ISSO
Mile2 courseware has been approved by NSA’s Committee on National Security Systems
(CNSS) National Training Standards. The Information Assurance Courseware Evaluation
(IACE) Program provides consistency in technology training and education for the
information assurance industry.
www.iatpr.com
#IATPR

More Related Content

What's hot

A Brief Introduction to Penetration Testing
A Brief Introduction to Penetration TestingA Brief Introduction to Penetration Testing
A Brief Introduction to Penetration TestingEC-Council
 
The Security Vulnerability Assessment Process & Best Practices
The Security Vulnerability Assessment Process & Best PracticesThe Security Vulnerability Assessment Process & Best Practices
The Security Vulnerability Assessment Process & Best PracticesKellep Charles
 
IBM Cybersecurity Analyst
IBM Cybersecurity AnalystIBM Cybersecurity Analyst
IBM Cybersecurity AnalystMustafa TOPÇU
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking pptSUPRIYAT9
 
Cybersecurity brochure flyer version-small
Cybersecurity brochure flyer version-smallCybersecurity brochure flyer version-small
Cybersecurity brochure flyer version-smallMeg Weber
 
Exams4sure Juniper JN0-1332 Exam Dumps 2021
Exams4sure Juniper JN0-1332 Exam Dumps 2021Exams4sure Juniper JN0-1332 Exam Dumps 2021
Exams4sure Juniper JN0-1332 Exam Dumps 2021bronxfugly43
 
Explore Security Testing
Explore Security TestingExplore Security Testing
Explore Security Testingshwetaupadhyay
 
Introduction to security testing
Introduction to security testingIntroduction to security testing
Introduction to security testingNagasahas DS
 
Presentation on vulnerability analysis
Presentation on vulnerability analysisPresentation on vulnerability analysis
Presentation on vulnerability analysisAsif Anik
 
Networking and penetration testing
Networking and penetration testingNetworking and penetration testing
Networking and penetration testingMohit Belwal
 
Vulnerability and Exploit Trends: Combining behavioral analysis and OS defens...
Vulnerability and Exploit Trends: Combining behavioral analysis and OS defens...Vulnerability and Exploit Trends: Combining behavioral analysis and OS defens...
Vulnerability and Exploit Trends: Combining behavioral analysis and OS defens...EndgameInc
 
Security Testing
Security TestingSecurity Testing
Security TestingQualitest
 
Introduction to penetration testing
Introduction to penetration testingIntroduction to penetration testing
Introduction to penetration testingAmine SAIGHI
 
Itis pentest slides hyd
Itis pentest slides  hydItis pentest slides  hyd
Itis pentest slides hydRama krishna
 
The difference between Penetration Testing and Red Team
The difference between Penetration Testing and Red TeamThe difference between Penetration Testing and Red Team
The difference between Penetration Testing and Red TeamNimrod Levy
 

What's hot (20)

A Brief Introduction to Penetration Testing
A Brief Introduction to Penetration TestingA Brief Introduction to Penetration Testing
A Brief Introduction to Penetration Testing
 
The Security Vulnerability Assessment Process & Best Practices
The Security Vulnerability Assessment Process & Best PracticesThe Security Vulnerability Assessment Process & Best Practices
The Security Vulnerability Assessment Process & Best Practices
 
IBM Cybersecurity Analyst
IBM Cybersecurity AnalystIBM Cybersecurity Analyst
IBM Cybersecurity Analyst
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
 
Cybersecurity brochure flyer version-small
Cybersecurity brochure flyer version-smallCybersecurity brochure flyer version-small
Cybersecurity brochure flyer version-small
 
Exams4sure Juniper JN0-1332 Exam Dumps 2021
Exams4sure Juniper JN0-1332 Exam Dumps 2021Exams4sure Juniper JN0-1332 Exam Dumps 2021
Exams4sure Juniper JN0-1332 Exam Dumps 2021
 
Explore Security Testing
Explore Security TestingExplore Security Testing
Explore Security Testing
 
03 學校網絡安全與防衛
03 學校網絡安全與防衛03 學校網絡安全與防衛
03 學校網絡安全與防衛
 
Introduction to security testing
Introduction to security testingIntroduction to security testing
Introduction to security testing
 
Security-testing presentation
Security-testing presentationSecurity-testing presentation
Security-testing presentation
 
Presentation on vulnerability analysis
Presentation on vulnerability analysisPresentation on vulnerability analysis
Presentation on vulnerability analysis
 
Networking and penetration testing
Networking and penetration testingNetworking and penetration testing
Networking and penetration testing
 
Vulnerability and Exploit Trends: Combining behavioral analysis and OS defens...
Vulnerability and Exploit Trends: Combining behavioral analysis and OS defens...Vulnerability and Exploit Trends: Combining behavioral analysis and OS defens...
Vulnerability and Exploit Trends: Combining behavioral analysis and OS defens...
 
Secure Coding and Threat Modeling
Secure Coding and Threat ModelingSecure Coding and Threat Modeling
Secure Coding and Threat Modeling
 
Security testing
Security testingSecurity testing
Security testing
 
Security Testing
Security TestingSecurity Testing
Security Testing
 
Introduction to penetration testing
Introduction to penetration testingIntroduction to penetration testing
Introduction to penetration testing
 
Resume - Timothy Lewis 20160313
Resume - Timothy Lewis 20160313Resume - Timothy Lewis 20160313
Resume - Timothy Lewis 20160313
 
Itis pentest slides hyd
Itis pentest slides  hydItis pentest slides  hyd
Itis pentest slides hyd
 
The difference between Penetration Testing and Red Team
The difference between Penetration Testing and Red TeamThe difference between Penetration Testing and Red Team
The difference between Penetration Testing and Red Team
 

Similar to mile2 about us presentation2

Penetration and hacking training brief
Penetration and hacking training briefPenetration and hacking training brief
Penetration and hacking training briefBill Nelson
 
How to prepare for Infosec domain's best certifications?
How to prepare for Infosec domain's best certifications?How to prepare for Infosec domain's best certifications?
How to prepare for Infosec domain's best certifications?InfosecTrain
 
Meeting the Cybersecurity Skills Challenge with CompTIA Security+
Meeting the Cybersecurity Skills Challenge with CompTIA Security+Meeting the Cybersecurity Skills Challenge with CompTIA Security+
Meeting the Cybersecurity Skills Challenge with CompTIA Security+CompTIA
 
CISSP Exam Dumps 2022
CISSP Exam Dumps 2022CISSP Exam Dumps 2022
CISSP Exam Dumps 2022bronxfugly43
 
What Is Dod Directive 8570 And How Does It Benefit Me?
What Is Dod Directive 8570 And How Does It Benefit Me?What Is Dod Directive 8570 And How Does It Benefit Me?
What Is Dod Directive 8570 And How Does It Benefit Me?Jeteye Enterprises Inc.
 
NERC CIP Training - 5 Days Course
NERC CIP Training - 5 Days Course NERC CIP Training - 5 Days Course
NERC CIP Training - 5 Days Course Tonex
 
600-199 Exam Questions - Securing Cisco Networks with Threat Detection and An...
600-199 Exam Questions - Securing Cisco Networks with Threat Detection and An...600-199 Exam Questions - Securing Cisco Networks with Threat Detection and An...
600-199 Exam Questions - Securing Cisco Networks with Threat Detection and An...Susan Hannan
 
Criterios Minimos de Seguridad CTPAT 2019 conference
Criterios Minimos de Seguridad CTPAT 2019 conferenceCriterios Minimos de Seguridad CTPAT 2019 conference
Criterios Minimos de Seguridad CTPAT 2019 conferenceJoe Garza
 
TECHNICAL REPORTCMUSEI-99-TR-017ESC-TR-99-017Operat.docx
TECHNICAL REPORTCMUSEI-99-TR-017ESC-TR-99-017Operat.docxTECHNICAL REPORTCMUSEI-99-TR-017ESC-TR-99-017Operat.docx
TECHNICAL REPORTCMUSEI-99-TR-017ESC-TR-99-017Operat.docxmattinsonjanel
 
SCOR Exam Dumps | 350-701 Guidebook
SCOR Exam Dumps | 350-701 GuidebookSCOR Exam Dumps | 350-701 Guidebook
SCOR Exam Dumps | 350-701 Guidebookbronxfugly43
 
The Ultimate EC Council Certification Handbook
The Ultimate EC Council Certification HandbookThe Ultimate EC Council Certification Handbook
The Ultimate EC Council Certification HandbookCalvin Sam
 
CompTIA CASP+ | Everything you need to know about the new exam
CompTIA CASP+ | Everything you need to know about the new examCompTIA CASP+ | Everything you need to know about the new exam
CompTIA CASP+ | Everything you need to know about the new examInfosec
 
Webinar - Reducing Your Cybersecurity Risk
Webinar - Reducing Your Cybersecurity RiskWebinar - Reducing Your Cybersecurity Risk
Webinar - Reducing Your Cybersecurity RiskWPICPE
 
How to Create Plan-of-Action to Secure Critical Information
How to Create Plan-of-Action to Secure Critical InformationHow to Create Plan-of-Action to Secure Critical Information
How to Create Plan-of-Action to Secure Critical InformationKoenig Solutions Ltd.
 
ByteCode pentest report example
ByteCode pentest report exampleByteCode pentest report example
ByteCode pentest report exampleIhor Uzhvenko
 

Similar to mile2 about us presentation2 (20)

Penetration and hacking training brief
Penetration and hacking training briefPenetration and hacking training brief
Penetration and hacking training brief
 
How to prepare for Infosec domain's best certifications?
How to prepare for Infosec domain's best certifications?How to prepare for Infosec domain's best certifications?
How to prepare for Infosec domain's best certifications?
 
Meeting the Cybersecurity Skills Challenge with CompTIA Security+
Meeting the Cybersecurity Skills Challenge with CompTIA Security+Meeting the Cybersecurity Skills Challenge with CompTIA Security+
Meeting the Cybersecurity Skills Challenge with CompTIA Security+
 
CISSP Exam Dumps 2022
CISSP Exam Dumps 2022CISSP Exam Dumps 2022
CISSP Exam Dumps 2022
 
What Is Dod Directive 8570 And How Does It Benefit Me?
What Is Dod Directive 8570 And How Does It Benefit Me?What Is Dod Directive 8570 And How Does It Benefit Me?
What Is Dod Directive 8570 And How Does It Benefit Me?
 
NERC CIP Training - 5 Days Course
NERC CIP Training - 5 Days Course NERC CIP Training - 5 Days Course
NERC CIP Training - 5 Days Course
 
CompTIA PenTest+ Exam (PT0-001) Exam Review
CompTIA PenTest+ Exam (PT0-001)  Exam ReviewCompTIA PenTest+ Exam (PT0-001)  Exam Review
CompTIA PenTest+ Exam (PT0-001) Exam Review
 
600-199 Exam Questions - Securing Cisco Networks with Threat Detection and An...
600-199 Exam Questions - Securing Cisco Networks with Threat Detection and An...600-199 Exam Questions - Securing Cisco Networks with Threat Detection and An...
600-199 Exam Questions - Securing Cisco Networks with Threat Detection and An...
 
Criterios Minimos de Seguridad CTPAT 2019 conference
Criterios Minimos de Seguridad CTPAT 2019 conferenceCriterios Minimos de Seguridad CTPAT 2019 conference
Criterios Minimos de Seguridad CTPAT 2019 conference
 
TECHNICAL REPORTCMUSEI-99-TR-017ESC-TR-99-017Operat.docx
TECHNICAL REPORTCMUSEI-99-TR-017ESC-TR-99-017Operat.docxTECHNICAL REPORTCMUSEI-99-TR-017ESC-TR-99-017Operat.docx
TECHNICAL REPORTCMUSEI-99-TR-017ESC-TR-99-017Operat.docx
 
CompTIA PenTest+ BETA EXAM CODE PT1-001
CompTIA PenTest+BETA EXAM CODE PT1-001CompTIA PenTest+BETA EXAM CODE PT1-001
CompTIA PenTest+ BETA EXAM CODE PT1-001
 
Ecsa LPT V8 brochure
Ecsa LPT V8 brochureEcsa LPT V8 brochure
Ecsa LPT V8 brochure
 
SCOR Exam Dumps | 350-701 Guidebook
SCOR Exam Dumps | 350-701 GuidebookSCOR Exam Dumps | 350-701 Guidebook
SCOR Exam Dumps | 350-701 Guidebook
 
The Ultimate EC Council Certification Handbook
The Ultimate EC Council Certification HandbookThe Ultimate EC Council Certification Handbook
The Ultimate EC Council Certification Handbook
 
CompTIA CASP+ | Everything you need to know about the new exam
CompTIA CASP+ | Everything you need to know about the new examCompTIA CASP+ | Everything you need to know about the new exam
CompTIA CASP+ | Everything you need to know about the new exam
 
Webinar - Reducing Your Cybersecurity Risk
Webinar - Reducing Your Cybersecurity RiskWebinar - Reducing Your Cybersecurity Risk
Webinar - Reducing Your Cybersecurity Risk
 
CompTIA Cybersecurity Analyst Certification Tips and Tricks
CompTIA Cybersecurity Analyst Certification Tips and TricksCompTIA Cybersecurity Analyst Certification Tips and Tricks
CompTIA Cybersecurity Analyst Certification Tips and Tricks
 
How to Create Plan-of-Action to Secure Critical Information
How to Create Plan-of-Action to Secure Critical InformationHow to Create Plan-of-Action to Secure Critical Information
How to Create Plan-of-Action to Secure Critical Information
 
9891031_certificate
9891031_certificate9891031_certificate
9891031_certificate
 
ByteCode pentest report example
ByteCode pentest report exampleByteCode pentest report example
ByteCode pentest report example
 

mile2 about us presentation2

  • 1.
  • 2. Why We Created Mile2? • Created in the after math of 9/11. • Known for our robust cyber security certifications for prominent global organizations world wide including the early development of the Certified Ethical Hacker in the U.S.A. • Developer and provider of proprietary vendor neutral professional certifications for global securities.
  • 3. Courses specifically designed for elite organizations C)SWAE Certified Secure Web Application Engineer Boeing Aerospace C)ISSO Certified Information Systems Security Officer Canadian Department of National Defense C)PTE Certified Penetration Testing Engineer United States Air Force C)NFE Certified Network Forensics Examiner United States Counterintelligence Agency
  • 4. What do they say: Testimonies Staff at a major US Air Force Base. The statement of work included the following quote: "These courses cannot be substituted with a Certified Ethical Hacker (CEH) curriculum." US Air Force Statement of Work 05T0273 Published inviting public bids for Penetration Testing Training. Awarded to Mile2. One prospective respondent to the solicitation asked the following question: Q: " Why doesn't Wright-Patterson AFB want a CEH-certified curriculum?" USAF's response was as follows: A: "CEH-certified courses tend to focus on teaching the student how to use a handful of tools that are available on the internet. While this knowledge is somewhat useful during a penetration test, our goal is to expand on this and learn how to turn our results into a professional report. Most of our students know how to use these tools, but need to learn the methodology behind a full penetration test. This methodology could include identifying protection opportunities, justifying testing activities and optimizing security controls to reduce business risk.“
  • 5. Accreditation CNSSI: 4016 National Information Assurance Training Standards for Risk Analysis - C)DRE NSTISSI: 4015 National Training Standard for Systems Certifiers - ISCAP CNSSI: 4014 Information Assurance Training Standard for Information Systems Security Officers - C)SLO CNSSI: 4013 National Information Assurance Training Standard for System Administrators - C)PTE CNSSI: 4012 National Information Assurance Training Standard for Senior Systems Managers - C)ISSO NSTISSI: 4011 National Training Standard for Information Systems Security (INFOSEC) - C)ISSO Mile2 courseware has been approved by NSA’s Committee on National Security Systems (CNSS) National Training Standards. The Information Assurance Courseware Evaluation (IACE) Program provides consistency in technology training and education for the information assurance industry.

Editor's Notes

  1. Who is Raymond and why he created Mile2 Many started thinking hacking was the solution after september 11.
  2. Mile2’s course content was designed with an end to a means and a means to an end. Mile2 is known for their robust list of cyber security certifications for prominent global organizations such as: C)ISSO (Certified Information Systems Security Officer for the Canadian Department of National Defense; C)PTE (Certified Penetration Testing Engineer) – for the United States Air Force; C)NFE (Certified Network Forensics Examiner) – for a United States Counterintelligence Agency C)SWAE (Certified Secure Web Application Engineer) for Boeing Aerospace.