+ 31 10 2042220 [email protected]

Mile2 Cybersecurity Certifications

From job role to recognized certification

The cybersecurity job market demands professionals who can not only demonstrate knowledge, but also prove the level at which they operate. Mile2 offers a structured cybersecurity certification program aligned with concrete roles in the field: from security officer to ethical hacker, from digital forensics investigator to cloud security engineer.

As an official Mile2 Authorized Training Centre, LAI offers the complete Mile2 certification portfolio, including instructor-led classroom training and self-study options with Cyber Range Labs. All Mile2 certifications are internationally recognized and accredited by NICCS, CNSS and NIST, among others.

This page helps you quickly find the right cybersecurity learning path. Select the job role that fits you or your employee below. You will immediately see which certifications to pursue and in what order, from entry level to expert.

Foundations (100 Level)

All Mile2 cybersecurity learning paths start at 200 Level. To begin at that level, you are expected to have mastered the foundational knowledge covered in the four 100 Level courses. If you are new to IT or cybersecurity, we recommend completing these foundation courses first. If you already have an IT background, you can consider this knowledge as a given and start directly with a 200 Level certification.

The four 100 Level foundation courses are:

  • C)SA 1/2 – Security Awareness (8 hours)
  • C)ITP – Information Technology Principles (40 hours)
  • C)HT + C)OST – Hardware and Operating Systems Technician (80 hours)
  • C)NP – Network Principles (40 hours)

Select your job role


Management

As an Information Systems Security Officer (ISSO), you are responsible for securing an organization’s information systems. You develop security policies, monitor compliance and advise management on risks and controls. This role is found in mid-sized and large organizations across both the public and private sector, including financial institutions, healthcare organizations, government agencies and IT service providers. You work from a combination of technical knowledge and policy expertise. This cybersecurity career path is well suited to professionals with at least two years of experience in IT or information security who want to grow into a formal security responsibility.

200 LevelC)SPSecurity Principles40 hoursIncludes Cyber Range Labs
300 LevelC)ISSOInformation Systems Security Officer40 hours
350 LevelC)CSSMCybersecurity Systems Manager32 hours
400 LevelC)SLOSecurity Leadership Officer40 hours
Management

As a DOD Cybersecurity Manager, you implement and manage cybersecurity frameworks in environments with strict regulatory and compliance requirements, such as defense, government and critical infrastructure. You ensure that systems comply with national and international security standards and translate complex risk analyses into concrete measures for management. This role is typically found at government agencies, defense organizations, large public bodies and suppliers working on government contracts. A background in IT management or information security with three to five years of experience provides a strong foundation for this cybersecurity career path.

200 LevelC)SPSecurity Principles40 hoursIncludes Cyber Range Labs
300 LevelC)ISSOInformation Systems Security Officer40 hours
350 LevelC)CSFOCybersecurity Framework Officer32 hoursIncludes Cyber Range Labs
400 LevelC)RMFARisk Management Framework Analyst32 hoursIncludes Cyber Range Labs
Management

As an Information Systems Risk Manager, you identify, analyze and manage risks associated with information systems and digital processes. You translate technical vulnerabilities into business impact and advise the board and executive team on acceptable risk levels and the cost of security measures. This role is highly relevant in sectors where risk management carries significant weight, such as financial services, healthcare, energy and government. You work closely with auditors, compliance officers and IT architects. This cybersecurity certification path suits professionals with an analytical background and at least some years of experience in IT or information management who want to specialize in risk management.

200 LevelC)SPSecurity Principles40 hoursIncludes Cyber Range Labs
300 LevelC)ISSOInformation Systems Security Officer40 hours
350 LevelC)CSSMCybersecurity Systems Manager32 hours
400 LevelC)ISRMInformation Systems Risk Manager32 hours
Response & Recovery

As an Incident Handler, you are the first point of contact when a security incident occurs. You detect attacks, analyze what happened, contain the damage and coordinate the recovery. Afterwards you contribute to preventing recurrence. This role is found in Security Operations Centers (SOC), at managed security service providers and in larger organizations with their own incident response team, such as banks, telecom providers and government organizations. This cybersecurity learning path is well suited to professionals with a technical IT background who work well under pressure and can switch quickly. Some experience with networking or system administration is a strong starting point.

200 LevelC)SPSecurity Principles40 hoursIncludes Cyber Range Labs
300 LevelC)ISSOInformation Systems Security Officer40 hours
350 LevelC)IHEIncident Handling Engineer40 hoursIncludes Cyber Range Labs
400 LevelC)CSACybersecurity Analyst40 hoursIncludes Cyber Range Labs
Response & Recovery

As a Cyber Forensic Investigator, you examine digital evidence following a cyberattack, data breach or other security incident. You analyze systems, networks and storage media to determine what happened, who was involved and how the attack was carried out. Your findings may be used in legal proceedings. This role is found at specialized forensics firms, law enforcement agencies, large law firms and in the internal audit function of major organizations. This cybersecurity career path is well suited to professionals with a strong technical foundation and attention to detail. Experience with networks, operating systems or system administration is a valuable starting point.

200 LevelC)SPSecurity Principles40 hoursIncludes Cyber Range Labs
300 LevelC)DFEDigital Forensics Examiner40 hoursIncludes Cyber Range Labs
350 LevelC)NFENetwork Forensics Examiner40 hoursIncludes Cyber Range Labs
400 LevelC)CSACybersecurity Analyst40 hoursIncludes Cyber Range Labs
Response & Recovery

As a Disaster Recovery Engineer, you ensure that an organization can recover quickly after a serious disruption, such as a ransomware attack, a system failure or a natural disaster. You design and test recovery plans, establish priorities for critical systems and guide the organization back to normal operations. This role is essential in sectors where continuity is of paramount importance, including financial services, hospitals, logistics and government. This certification path is well suited to professionals with a background in system administration, IT operations or information security who want to specialize in business continuity management and recovery planning.

200 LevelC)SPSecurity Principles40 hoursIncludes Cyber Range Labs
300 LevelC)ISSOInformation Systems Security Officer40 hours
350 LevelC)CSSMCybersecurity Systems Manager32 hours
400 LevelC)DREDisaster Recovery Engineer32 hoursIncludes Cyber Range Labs
Prevention

As an Intrusion Prevention Specialist, you focus on actively detecting and blocking attacks on networks and systems before they can cause damage. You analyze traffic patterns, manage intrusion detection and prevention systems and configure rules that automatically intercept suspicious activity. This role is found in organizations with a higher threat profile, such as financial institutions, data centers, telecom providers and government organizations, as well as at managed security service providers. This ethical hacking and penetration testing learning path is well suited to professionals with a solid technical background in networking or system administration who want to work on the preventive side of cybersecurity.

200 LevelC)VAVulnerability Assessor24 hoursIncludes Cyber Range Labs
300 LevelC)PEHProfessional Ethical Hacker40 hoursIncludes Cyber Range Labs
350 LevelC)PTEPenetration Testing Engineer40 hoursIncludes Cyber Range Labs
400 LevelC)PTCPenetration Testing Consultant40 hoursIncludes Cyber Range Labs
Prevention

As a Cyber Threat Analyst, you collect and analyze information about current and emerging cyber threats. You map out attackers, their methods and their targets, and translate those insights into concrete recommendations for the organization’s defenses. You work closely with incident response teams, SOC analysts and management. This role is found at organizations with their own threat intelligence function, such as banks, energy companies, government agencies and specialized cybersecurity firms. This certification path is well suited to professionals with strong analytical skills and an affinity for both technology and strategy, preferably with experience in IT security or network management.

200 LevelC)VAVulnerability Assessor24 hoursIncludes Cyber Range Labs
300 LevelC)PEHProfessional Ethical Hacker40 hoursIncludes Cyber Range Labs
350 LevelC)TIAThreat Intelligence Analyst32 hoursIncludes Cyber Range Labs
400 LevelC)CSACybersecurity Analyst40 hoursIncludes Cyber Range Labs
Prevention

As an Application Security Coder, you ensure that software and web applications are developed and tested securely. You work within or closely alongside development teams to identify and remediate vulnerabilities early in the development process, and you perform security testing on existing applications. Think of techniques such as code reviews, application-level penetration testing and applying secure coding guidelines. This role is relevant at software companies, web agencies, financial service providers and organizations that develop their own software. This cybersecurity learning path suits developers or testers with some programming experience who want to specialize in application security.

200 LevelC)VAVulnerability Assessor24 hoursIncludes Cyber Range Labs
300 LevelC)PEHProfessional Ethical Hacker40 hoursIncludes Cyber Range Labs
350 LevelC)PTEPenetration Testing Engineer40 hoursIncludes Cyber Range Labs
400 LevelC)SWAESecure Web Application Engineer40 hoursIncludes Cyber Range Labs
Prevention

As a Cloud Security Engineer, you are responsible for securing cloud environments and platforms such as AWS, Microsoft Azure and Google Cloud. You design secure cloud architectures, manage access controls, monitor for threats and ensure that cloud environments comply with relevant laws and regulations. As organizations migrate their infrastructure to the cloud at scale, demand for this expertise is growing rapidly. This role is found at cloud service providers, IT service companies and in the internal IT departments of organizations moving their infrastructure to the cloud. This cloud security certification path is well suited to system administrators and network professionals with experience in cloud platforms who want to specialize in cloud security.

200 LevelC)VAVulnerability Assessor24 hoursIncludes Cyber Range Labs
300 LevelC)ISSOInformation Systems Security Officer40 hours
350 LevelC)CSSMCybersecurity Systems Manager32 hours
400 LevelC)CSOCloud Security Officer40 hoursIncludes Cyber Range Labs
Auditing

As an Information Systems Security Auditor, you independently assess whether an organization’s security measures are adequate and whether systems and processes comply with applicable laws, regulations, standards and internal policies. You report your findings to management and provide recommendations for improvement. This role is found at accounting and audit firms, internal audit departments of large organizations, regulators and government agencies. A combination of technical insight and analytical ability is essential. This cybersecurity certification path is well suited to professionals with experience in IT, information security or compliance who want to position themselves as an independent assessor of security practices.

200 LevelC)SPSecurity Principles40 hoursIncludes Cyber Range Labs
300 LevelC)ISSOInformation Systems Security Officer40 hours
350 LevelC)CSSMCybersecurity Systems Manager32 hours
400 LevelC)CSSACybersecurity Systems Auditor32 hours