Training Mile2

Training goals dlearning

code: C)SA2 | version: v1

The Mile2® vendor-neutral C)SA2 Certified Security Awareness 2 course is to help the student take organizational cyber awareness to the next level. Attendees will understand the security threats that are associated with a company culture.

The Certified Security Awareness 2 course provides lower and executive management a window as to the techniques of malicious hackers as well as the counter response controls management can implement to detour a major compromise.

The Certified Security Awareness 2 course focuses on creating a sober-minded security culture, which includes leadership skills, management roles organizational training drills, organizational targeted assets/IP, compliance models, incidence mitigation policies, crises management roles and global laws and standards.

The Mile2® Certified Security Awareness 2 course is innovative and every manager and executive team member should cover these course topics. This class will provide the attendee skills necessary to better understand an attack, how to train people to identify an attack but most importantly: how to train internal targets so that the CSA1 & CSA2 training is effective!

Upon completion:

  • Upon completion, the Certified Security Awareness 2 candidate will not only be able to competently take the CSA2 exam but will also understand basic cybersecurity knowledge to keep companies’ IP and IT infrastructure safe.

Who Should Attend:

  • Anyone
  • End User
  • Company Employee
  • Basic Computer User

Accreditations & Acknowledgements

Mile2® is:

  • ACCREDITED by the NSA CNSS 4011-4016
  • MAPPED to NIST / Homeland Security NICCS's Cyber Security Workforce Framework
  • APPROVED on the FBI Cyber Security Certification Requirement list (Tier 1-3)

Conspect Show list

  1. Creating a Cyber Security Culture
    • Non-malware Attack Statistics 2017 (Carbon Black)
    • Cyber Security Culture
    • Requirements for Successful CSC
    • Steps to Create CSC
    • Key People for a Successful CSC and Their Roles
    • How Various Departments are Related to the CSC
    • Program Leadership Skills
    • Techniques Used by Successful Leaders
    • Yearly Training and Drills
  2. Social Engineer Attacks: Executive Management and Assets
    • Techniques used by Hackers
    • Why Executives are Pinpointed as Targets
    • Whaling Attacks
    • Recent Successful Whaling Attacks
    • Whaling Mitigation
    • Intellectual Property
    • IP Categories
    • IP Legally Defined Categories
    • Keeping IP Safe
    • Keeping IP Safe -Recommendation
  3. Incident Preparedness and Management Planning
    • Incident Mitigation
    • Cyber Insurance
    • Cyber Insurance Gaps
    • Incident Preparedness Steps
    • Preparation Step
    • Identification Step
    • Crisis Management
    • Post Crisis Management
    • General Recommendation for Post Crisis
  4. Laws and Global Compliance Standards
    • Laws & Standards
    • 12 PCI DSS Requirements
    • SOX Most Important Sections
    • Data Classification
    • Objectives of Data Classification
    • Personal vs. Business Use
    • Business Standard for Deleting Data
    • Mobile Device Security Risks
    • Mobile Device Security
    • BYOD Challenges BYOD Policy
Download conspect training as PDF

Additional information

  • Basic Network Understanding
Difficulty level
Duration 1 day

The participants will obtain certificates signed by Mile2 (course completion).

This course will help prepare you for the Certified Security Awareness 2 exam, which is available through the on-line Mile2’s Assessment and Certification System (“MACS”), and is accessible on your account. The exam will take 1 hour and consist of 25 multiple choice questions. 

Each participant in an authorized training C)SA2 - Certified Security Awareness 2 will receive a free CSA1 exam voucher.


Certified Mile2 Instructor.

Other training Mile2 | Security Awareness

Training thematically related

IT Security

Contact form

Please fill form below to obtain more info about this training.

* Fields marked with (*) are required !!!

Information on data processing by Compendium - Centrum Edukacyjne Spółka z o.o.


  • Please contact us by phone using the form below in order to perform calculations as training