Mile2 Cybersecurity Certifications – Security Training Levels
From certification to career
Mile2 offers a comprehensive portfolio of cybersecurity certifications, structured in levels from 100 to 400. Each certification prepares you for a specific role in the field and builds on the knowledge of the previous level. Whether you are new to cybersecurity or looking to advance your career, the Mile2 certification framework provides a clear and practical learning path. On this page you will find an overview of all Mile2 certifications per level, including what you will learn and which job roles each certification prepares you for.
100 Level: Foundations
The 100 Level courses form the foundation for all higher-level certifications. They are designed for anyone new to IT or cybersecurity and require no prior knowledge. If you already have an IT background, you can consider this knowledge as a given and start directly at 200 Level.
- C)SA 1/2 – Security Awareness (8 hours)
An introduction to safe and conscious use of IT and information. Suitable as a first step for anyone in the organization, regardless of technical background. - C)ITP – Information Technology Principles (40 hours)
The fundamentals of IT: how systems, software and networks work. Provides the foundational knowledge required for all further cybersecurity certifications. - C)HT + C)OST – Hardware and Operating Systems Technician (80 hours)
Hardware components and operating systems. Provides technical insight into the physical and software layers of computer systems. - C)NP – Network Principles (40 hours)
Networking technology from the ground up: protocols, routing, switching and network architecture. Essential knowledge for all cybersecurity career paths.
200 Level: Specialist
At 200 Level, you begin your first real specialization in information security. There are two entry points, depending on the direction you want to take in your cybersecurity career.
- C)SP – Security Principles (40 hours, including Cyber Range Labs)
The central entry-level certification for virtually all management and operational cybersecurity career paths. Covers the core principles of information security. By far the most widely used starting point in the Mile2 roadmap. Suitable job roles: Information Systems Security Officer, Incident Handler, Disaster Recovery Engineer, Information Systems Risk Manager, Information Systems Security Auditor. - C)VA – Vulnerability Assessor (24 hours, including Cyber Range Labs)
The entry point for technical and offensive cybersecurity paths such as ethical hacking and penetration testing. You learn to identify and assess vulnerabilities in systems and networks. Suitable job roles: Intrusion Prevention Specialist, Cyber Threat Analyst, Application Security Coder, Cloud Security Engineer.
300 Level: Professional
At 300 Level, you choose your area of specialization for the first time. Each of the three certifications at this level builds on a 200 Level certification and opens the way to multiple higher-level specializations.
- C)ISSO – Information Systems Security Officer (40 hours)
The management route and the most widely used stepping stone to higher certification levels. You learn to secure information systems at an organizational level and develop security policies. Suitable job roles: Information Systems Security Officer, Incident Handler, Disaster Recovery Engineer, Information Systems Risk Manager, Information Systems Security Auditor, Cloud Security Engineer. - C)DFE – Digital Forensics Examiner (40 hours, including Cyber Range Labs)
The digital forensics route. You learn to collect, analyze and present digital evidence for use in incident investigations and legal proceedings. Suitable job roles: Cyber Forensic Investigator. - C)PEH – Professional Ethical Hacker (40 hours, including Cyber Range Labs)
The offensive and technical route, building on C)VA. You learn to attack systems ethically in order to identify weaknesses and improve defenses. Comparable to EC-Council CEH, but more technically in-depth. Suitable job roles: Intrusion Prevention Specialist, Cyber Threat Analyst, Application Security Coder.
350 Level: Advanced Specialist
At 350 Level, you deepen your specialization further. You combine broad foundational knowledge with advanced technical or managerial skills in a specific cybersecurity domain. All certifications at this level include Cyber Range Labs.
- C)CSSM – Cybersecurity Systems Manager (32 hours)
Senior management level. You manage cybersecurity at both an organizational and technical level. Comparable to ISACA CISM. Suitable job roles: Information Systems Security Officer, Information Systems Risk Manager, Disaster Recovery Engineer, Information Systems Security Auditor, Cloud Security Engineer. - C)IHE – Incident Handling Engineer (40 hours, including Cyber Range Labs)
You learn to respond effectively to security incidents: detection, analysis, containment and recovery. Suitable job roles: Incident Handler. - C)NFE – Network Forensics Examiner (40 hours, including Cyber Range Labs)
Forensic investigation at the network level. You analyze network traffic and trace the origin of attacks. Suitable job roles: Cyber Forensic Investigator. - C)PTE – Penetration Testing Engineer (40 hours, including Cyber Range Labs)
Advanced penetration testing. A deeper dive into C)PEH with professional offensive techniques and methodologies. Suitable job roles: Intrusion Prevention Specialist, Application Security Coder. - C)TIA – Threat Intelligence Analyst (32 hours, including Cyber Range Labs)
You gather and analyze threat intelligence to proactively identify and report cyber risks facing your organization. Suitable job roles: Cyber Threat Analyst. - C)CSFO – Cybersecurity Framework Officer (32 hours, including Cyber Range Labs)
Implementation and management of cybersecurity frameworks such as NIST. Focused on government and defense environments. Suitable job roles: DOD Cybersecurity Manager.
400 Level: Expert
The highest regular certification level in the Mile2 framework. At 400 Level, you earn a recognized expert certification in a specific cybersecurity specialization. Study load varies from 24 to 40 hours per certification.
- C)SLO – Security Leadership Officer (40 hours)
Strategic leadership in cybersecurity. Prepares you for CISO and executive security roles. Suitable job roles: Information Systems Security Officer. - C)RMFA – Risk Management Framework Analyst (32 hours, including Cyber Range Labs)
In-depth analysis and implementation of risk management frameworks, focused on government and defense environments. Suitable job roles: DOD Cybersecurity Manager. - C)ISRM – Information Systems Risk Manager (32 hours)
Risk management for information systems at senior level. Comparable to ISACA CRISC. Suitable job roles: Information Systems Risk Manager. - C)CSA – Cybersecurity Analyst (40 hours, including Cyber Range Labs)
Advanced analysis of cyber threats and security incidents at SOC senior analyst level. Comparable to CompTIA CySA+. Suitable job roles: Incident Handler, Cyber Forensic Investigator, Cyber Threat Analyst. - C)DRE – Disaster Recovery Engineer (32 hours, including Cyber Range Labs)
Design and implement disaster recovery plans to ensure business continuity after major incidents or cyberattacks. Suitable job roles: Disaster Recovery Engineer. - C)PTC – Penetration Testing Consultant (40 hours, including Cyber Range Labs)
Advanced penetration testing at consultant level. Prepares you for independent engagements and red team operations. Comparable to Offensive Security OSCP. Suitable job roles: Intrusion Prevention Specialist. - C)SWAE – Secure Web Application Engineer (40 hours, including Cyber Range Labs)
Securing web applications against modern attacks. Covers OWASP Top 10 and beyond. Comparable to GIAC GWAPT. Suitable job roles: Application Security Coder. - C)CSO – Cloud Security Officer (40 hours, including Cyber Range Labs)
Securing cloud environments including AWS, Azure and Google Cloud. Comparable to ISC2 CCSP. Suitable job roles: Cloud Security Engineer. - C)CSSA – Cybersecurity Systems Auditor (32 hours)
Auditing cybersecurity systems and processes. Comparable to ISACA CISA. Suitable job roles: Information Systems Security Auditor.
400 Level: Electives
In addition to the career paths, Mile2 offers four elective certifications at 400 Level. These are not tied to a specific career path but provide focused technical or managerial specialization in a targeted area.
- C)PSH – PowerShell Hacker (32 hours): PowerShell for offensive and defensive security, including scripting for automation and attack simulation.
- C)WSE – Wireless Security Engineer (40 hours): Securing wireless networks, Wi-Fi attack techniques and enterprise wireless security.
- IS18 – IS18 Controls (32 hours): The 18 critical security controls of the CIS framework and their practical implementation.
- C)ISMSLA – Information Security Lead Auditor (24 hours): ISO 27001 lead auditor certification for auditing Information Security Management Systems.