Become a certified security expert with Mile2's Certified Security Principles Plus course, designed for IT professionals seeking to master system security, access control, network infrastructure, and cryptography to protect their organization's data.
Design robust security protocols across various vendor products.
Implement effective access control and network infrastructure techniques.
Assess and audit systems to identify vulnerabilities.
Understand cryptography and its organizational applications.
Mile2’s Certified Security Principles+ course provides the skills necessary to apply and implement technical knowledge of security concepts in today’s security environment. Students will gain an in‐depth knowledge of systems security, access control, network infrastructure, assessments and audits, cryptography and organizational security across all vendor products. These skills have become increasingly important, as additional safeguards such as intrusion detection systems, physical access control, and multi‐factor authentication become standard methods of protection. Students are given real-world scenarios to reinforce the material covered and will learn how to apply the concepts to their daily operations.
The Certified Security Principles+ exam is taken online through Mile2’s Assessment and Certification System (“MACS”), which is accessible on your mile2.com account. The exam will take 2 hours and consist of 100 multiple-choice questions.No upcoming dates. Please check back later.
Introduction to IT Security
Understanding Security
Responsibilities
Building a Security Program
CIA Triad
Governance, Risk, Compliance
State of Security Today
Risk Management
Risk Assessment
Types of Risk, Threats and Vulnerabilities
Mitigating Attacks
Discovering Vulnerabilities and Threats
Responding to Risk
Understanding of Cryptography
Symmetric Encryption
Asymmetric Encryption
Hashing
PKI
Cryptography in Use
Understanding Identity and Access Management
Identity Management
Authentication Techniques
Single Sign-on
Access Control Monitoring
Managing Data Security
Virtualization Principles
Key Components Mapped to Cloud Layer
Key Security Concerns
Other Technologies Used in the Cloud
The Layers
Relevant CCM Controls
Data Security
Different Types of Storage
Encryption Options
Data Management
Managing Server/Host Security
The Operating Systems
Hardening the OS
Physical security
Virtualization and Cloud Technologies
Application Security for Non-Developers
Application Security Principle
Software Development Life Cycle
OWASP Top 10
Hardening Web Applications
Patch/Update/Configuration Management
Understanding Mobile Device Security (IoT)
What Devices are we talking about?
What is the risk?
Hardening Mobile/IoT Devices
Corporate Management
Managing Day to Day Security
Company Responsibilities
Product Management
Business Continuity Basics
Incident Response
Why Train?
Understanding Compliance and Auditing
Benefits of Compliance
Assurance
Frameworks
What is Auditing
Your team deserves training as unique as they are.
Let us tailor the course to your needs at no extra cost.
Trusted by Engineers at:
and more...
Aaron Steele
Casey Pense
Chris Tsantiris
Javier Martin
Justin Gilley
Kathy Le
Kelson Smith
Oussama Azzam
Pascal Rodmacq
Randall Granier
Aaron Steele
Casey Pense
Chris Tsantiris
Javier Martin
Justin Gilley
Kathy Le
Kelson Smith
Oussama Azzam
Pascal Rodmacq
Randall Granier