Cyber Security & Ethical Hacking
C)DRE Certified Disaster Recovery Engineer
The vendor-neutral Certified Disaster Recovery Engineer course is the ideal qualification for any current IT professional looking to specialise in disaster recovery and business continuity, because when a business is hit by a disaster, be it natural,...
C)ISSO Certified Information Systems Security Officer
Information and data security are in the news on what seems like a daily basis. Multiple hacks and attacks on some of the world’s biggest organisations and the GDPR law update have seen companies go to more stringent lengths to ensure their data an...
C)PEH Certified Professional Ethical Hacker
This Certified Professional Ethical Hacker (CPEH) vendor-neutral certification course is the foundational training to Mile2’s line of penetration testing courses.
CISSP: Certified Information Systems Security Professional
Master the fundamentals of information systems security and build a career in the burgeoning IT security sector. Overseen by the Information Systems Security Certification Consortium (ISSCC), the Certified Information Systems Security Professional qu...
Computer Hacker Professional Package
Using a blend of instructor-led videos and elearning materials, the Computer Hacker Professional Package is delivered online, so that contents are available anyplace anytime, allowing study to take place whenever most convenient.
Computer Hacking Forensic Investigator
Build upon existing ethical hacking skills with the Computer Hacking Forensic Investigator course.
Cyber Security Forensic Investigator & Ethical Hacker Package
Learn to think like a hacker and apply that knowledge to building security provisions that deter cybercriminals with the Cyber Security Forensic Investigator & Ethical Hacker package.
Ethical Hacking and Countermeasures Version 8
Defend your corporate network against cyber-criminals by learning the tools and techniques they use to bypass security. Students undertaking the Ethical Hacking and Countermeasures course will learn about the ethics involved with ‘white hat’ hack...
ISACA Certified Information Systems Auditor - CISA
Demonstrate excellence in IT systems auditing by completing the ISACA Certified Information Systems Auditor course. Designed according to the rigorous requirements of the ISACA, students can be sure of learning the theories and practical skills requi...
IT Cyber Security
The IT Cyber Security package is tailored towards the evolving needs of businesses who need to protect against attack by hackers and other cybercriminals. By combining three courses into a single package, we have built a comprehensive syllabus to ens...
These days, the internet is a daily fact of life, both at home and in the workplace. While it has opened up a whole new world of possibilities in the modern age, the downside is that it has also made us vulnerable to the actions of individuals who se...