View these course listings listing on

Cyber Security Course Descriptions

The cyber security certification courses listed below can be delivered in a classroom format, online Webex training, or remote training at the client location.  To read detailed information regarding the course outline and objectives, course materials, and intended audiences, please click the “Full Description” button below each course listing. 

Certified Network Forensic Analysis Manager

Certified Network Forensic Analysis Manager

The Certified Network Forensic Analysis Manager certification course was originally developed for the U.S. government, and has now been made available to city, county, and state law enforcement agencies. Civilian personnel outside the law enforcement community are also authorized to attend on a case-by-case basis.

This comprehensive course brings incident response and network forensic core competencies to advanced levels by presenting students with 16 detailed learning objectives. Students will be provided with both experiential knowledge and practical skills that simulate real-world scenarios, investigations, and recovery of evidentiary data in systems and networks. With a specific focus on the centralizing and investigating of logging systems and network devices, students will cover topics such as: Incident Response Management; Live Data Collection; Analysis Methodology; Investigating Windows Systems; Investigating Applications; and, Malware Triage.

Certified Disaster Response and Recovery Manager

Certified Disaster Response and Recovery Manager

Business Continuity and Disaster Response / Recovery is the process of preparing processes, policies, and procedures that follow in the event of a significant and unplanned operational disruption. The Certified Disaster Response and Recovery Manager training course prepares students for industry certification in Business Continuity planning and Disaster Recovery missions.

As businesses face a wide range of daily risks – including cyber-attacks, human error, technical failures, and natural disasters – it’s vital they create practical plans to sustain their security posture, financial health, and industry / brand reputation to maintain long-term success. Students will cover topics such as: BCP Design and Development Strategies, Selection of Risk Management Frameworks, Qualitative and Quantitative Analysis Strategies, Creating Asset Inventories and Resource Profiles, Recovery Site Management and Workflows, Reviewing Cloud Computing Service Agreements, Cloud Data Security Strategies, and the Impact of Legal Requirements on Cloud Storage Solutions.

Certified Digital Forensic Examiner

Phase2 Advantage: Certified Digital Forensic Examiner

The Certified Digital Forensics Examiner certification course is designed to train Cyber Crime and Fraud Investigation students in the use of electronic discovery and advanced investigation techniques. This course is essential to anyone encountering, collecting, handling, or analyzing digital evidence during the course of an investigation.

Students will learn methodologies to implement forensically sound investigative techniques and industry best practices that withstand legal challenges in a court of law.  Topics include evaluation and preservation of crime scenes, collection and documentation of relevant evidence, professional interview and corroboration techniques, maintaining a secure chain-of-custody, and writing a concluding report.

This certification will benefit organizations, individuals, government offices, and law enforcement agencies interested in pursuing litigation, proof of guilt, or corrective action based on digital evidence.

Certified Incident Handling Engineer

Phase2 Advantage: Certified Incident Handling Engineer

The Certified Incident Handling Engineer certification course is designed to help Incident Handlers, System Administrators, and Information Security professionals understand how to plan, create, and utilize their Incident Detection and Response systems to quickly and efficiently respond to potential threats.  In the realm of information security incidents, it’s not a matter of “if,” but “when.”  Preparation and preemptive training can make the difference between experiencing a security incident, and being subjected to a disastrous event.

Students will receive in-depth training to learn methodologies and exploits utilized by malicious actors, the latest attack vectors, and industry best practices for developing procedures and teams to safeguard against them. This course also provides numerous hands-on laboratory exercises that focus on topics such as reconnaissance, vulnerability assessments using Nessus, network sniffing, web application manipulation, malware identification and isolation, and scenarios for both Windows and Linux systems.

Certified Information Systems Security Manager

Phase2 Advantage: Certified Information Systems Security Manager

The Certified Information Systems Security Manager certification course provides students with the knowledge and industry best practices required to identify and analyze potential threats and risks posed to modern information systems.  Given the wide range of technology-enabled components comprising modern security programs, the Information Security professional must be able to practically apply these skills within Administrative, Technological, and Operational contexts.

The course content is divided into five primary categories with which anyone in a security leadership position should have significant competency: Policy Development and Governance, Risk Management and Regulatory Compliance, Information Security Program Development and Management, Network Security Controls and Architecture, and Incident Handling and Response.  Topics within these five categories will include 20 critical learning objectives.  In addition, students will also be presented with information regarding Business Continuity and Disaster Response / Recovery.

Certified Information Systems Security Officer

Phase2 Advantage: Certified Information Systems Security Officer

The Certified Information Systems Security Officer certification course addresses a wide variety and range of industry best practices, experiential knowledge, and core information security competencies expected of every CISO or Security Manager. In this comprehensive course covering 20 distinct and well-established domains, students will be presented with in-depth theories regarding the practical implementation of foundational Information Security concepts.

Using a risk-based approach, the student will have the capability to implement and maintain cost-effective security management programs directly aligned with both the business process and industry best practices.  Examples of some of the topics covered in this challenging but rewarding course include: Identification, Authentication, and Access Control; Network Protocols, Devices, and Security Architecture; Cryptography, VPN, and Wireless Technology; Database and Software Development Security; and, Security Models and Evaluation Criteria.

Certified Vulnerability Assessor

Phase2 Advantage: Certified Vulnerability Assessor

The Certified Vulnerability Assessor certification course provides foundational knowledge of industry vulnerability assessment tools, industry best practices, and popular exploits with which an Information Security professional should be familiar. This fundamental cyber security certification course provides students with the knowledge required to attend more advanced courses such as Certified Incident Handling Engineer, Certified Digital Forensic Examiner, and Certified Penetration Testing Engineer.

Students will be presented with topics such as basic malware identification and detection, and how malicious code can infiltrate an organizations’ systems and networks. The student will also learn how to assess a company’s information security posture by performing basic vulnerability tests to secure the organization’s networking infrastructure.  Examples of topics covered in this course are: Assessing Web Servers and Applications; Host Discovery Controls and Techniques; Port Scanning Techniques and Algorithms; and, Scanning IoT, SCADA, and ICS Systems.

Contact Us for The Ultimate Training Experience

Contact Us

(912) 244-0394

Contact Us

Contact US

previous arrow
next arrow