Certified Security Awareness – CSA

Access to high-quality video classes

Electronic Book (Workbook/Lab guide)

Exam Prep Questions

Exam voucher

Request more information

We'll connect you at the earliest
Certified Security Awareness – CSA
Certified Security Awareness – CSA

Tools Covered in this Course

Course Details

Course Description

The mile2® vendor-neutral Certified Security Awareness 2 course is to help the student take organizational cyber awareness to the next level. Attendees will understand the security threats that are associated with company culture. The Certified Security Awareness 2 course provides lower and executive management a window as to the techniques of malicious hackers as well as the counter-response controls management can implement to detour a major compromise.

The C)SA2 course focuses on creating a sober-minded security culture, which includes leadership skills, management roles organizational training drills, organizational targeted assets/IP, compliance models, incidence mitigation policies, crises management roles, and global laws and standards. The mile2 C)SA2 course is innovative and every manager and executive team member should cover these course topics. This class will provide the attendee skills necessary to better understand an attack, how to train people to identify an attack but most importantly: how to train internal targets so that the CSA1 & CSA2 training is effective.

What you’ll learn

  • How to create a security-aware culture
  • How to prevent social engineering attacks
  • How to plan and prepare to defeat a security attack


A student needs to meet the following prerequisites in order to fully benefit from the course:

None, This is an entry-level course.

Course outcome

Upon completion, the Certified Security Awareness 2 candidate will understand basic cybersecurity knowledge to keep companies’ IP and IT infrastructure safe.

Who should attend

This course was designed for the benefit of the following organization roles:

  • Anyone
  • End-User
  • Company Employee
  • Basic Computer User


  • Online Video
  • Electronic Book (Workbook/Lab guide)
  • Exam Prep Questions
  • Exam

Course outline

Chapter 1: Creating a Cyber Security Culture

  • Non-malware Attack Statistics 2017 (Carbon Black)
  • Cyber Security Culture
  • Requirements for Successful CSC
  • Steps to Create CSC
  • Key People for a Successful CSC and Their Roles
  • How Various Departments are Related to the CSC
  • Program Leadership Skills
  • Techniques Used by Successful Leaders
  • Yearly Training and Drills

Chapter 2: Social Engineer Attacks: Executive Management and Assets

  • Techniques used by Hackers
  • Why Executives are Pinpointed as Targets
  • Whaling Attacks
  • Recent Successful Whaling Attacks
  • Whaling Mitigation
  • Intellectual Property
  • IP Categories
  • IP Legally Defined Categories
  • Keeping IP Safe
  • Keeping IP Safe -Recommendation

Chapter 3: Incident Preparedness and Management Planning

  • Incident Mitigation
  • Cyber Insurance
  • Cyber Insurance Gaps
  • Incident Preparedness Steps
  • Preparation Step
  • Identification Step
  • Crisis Management
  • Post Crisis Management
  • General Recommendation for Post Crisis

Chapter 4: Laws and Global Compliance Standards

  • Laws & Standards
  • 12 PCI DSS Requirements
  • SOX Most Important Sections
  • Data Classification
  • Objectives of Data Classification
  • Personal vs. Business Use
  • Business Standard for Deleting Data
  • Mobile Device Security Risks
  • Mobile Device Security
  • BYOD Challenges BYOD Policy

Accreditations & Acknowledgements

Mile2 is:

  • ACCREDITED by the NSA CNSS 4011-4016
  • MAPPED to NIST / Homeland Security NICCS's Cyber Security Workforce Framework
  • APPROVED on the FBI Cyber Security Certification Requirement list (Tier 1-3)