The Mile2 Certified Security Sentinel training is intended for anyone that uses a computer on the internet. Attendees will fully understand the security threats that attack daily and they will also understand the countermeasures associated with these attacks. Students will learn that the weakest link in any security program is a poorly trained employee. Once a student understands what can happen, they will know what to look for and with these common sense tactics and be able to keep their computer as safe as possible. The Social Engineering portion of the class is not specifically targeted to IT or security personnel alone but rather is designed to teach the participants the skills used by Social Engineers to facilitate the extraction of information from an organization using technical and non-technical methods.
Computer fraud, black-hat hacking, cyber-terrorists; these phrases describe an innovative generation of criminals that use over-the-wire technology to attack us, steal from us and terrorize us. However the best tool in their arsenal is not new. It is only used by the most experienced, the most dangerous, boldest hackers.
Does it work? Can seemingly smart people be easily deceived? Kevin Mitnick, who served five years in prison for repeated hacking said in testimony before Congress on the subject of Social Engineering, 'I was so successful with that attack that I rarely had to resort to a technical attack.'
The Mile2 Certified Security Sentinel program is innovative and trains students on how attacks are performed, the skills necessary to perform an attack, how to train people to identify an attack but most importantly: How to train internal targets so that the training is effective and lasts.
This 1-day course retails for $750 and is delivered via: classroom or live online.
Module 1 - Basic Security: How to secure a computer for personal internet use
Module 2 - User Awareness
Module 3 - Implementing Countermeasures
Module 4 - Essential Security Awareness for Everyone
Module 5 - Using the Internet at Work
Module 6 - Accessing the Company's Network Through Your Assigned Computer
Module 7 - Accessing the Corporate Network Remotely