Industry Certifications - Michael is authorized to teach the following


MiCHael I. Kaplan is a Corporate Information Security Officer, certified Mile2 Cyber Security Instructor, and a passionate advocate for military veteran issues with 21 years of experience in the security industry.  After serving honorably in the US Army’s 11th Special Forces Group (Airborne) as an expert in Soviet Military Operations and Tactics, Michael was recruited as a Trainer and Lead Investigator for an International Fugitive Task Force based in Miami, Florida, with areas of responsibility in the Caribbean and Latin America. 

In 1994, Michael transitioned from international high-risk warrants into domestic corporate security, attended numerous formal training programs and pursued a career as an Executive Protection Specialist, operating in both corporate and high-threat environments. Throughout his experience, Michael was always (informally) designated as the “team technology geek,” a role he officially (and formally) embraced in 2011.

Michael I. Kaplan is now a Cyber Security Instructor, Information Systems Risk Manager, and Disaster Recovery Engineer. His technical areas of specialization are Cyber Security Architecture, IT Risk Assessment, and IT Program Audit / Compliance.

Michael also possesses a high degree of subject matter expertise regarding conformance to Cyber Security Frameworks (CSF) including HIPAA Compliance (HITECH, GAPP), NIST SP 800 Series, ISO 27000 Series, PCI-DSS, SSAE 16 (SOC1, SOC2), and FedRAMP (moderate, high).

Click HERE to order your SIGNED copy!
Click Here for a Signed Copy
Michael is a graduate of Armstrong State University and remains active in several military / veteran advocacy programs.

The 2017 edition of his Amazon Bestseller, “The Prior-Service Entrepreneur: Veteran Entrepreneurship and Lean Business Start-Up,” is utilized in numerous civilian institutions of higher education, and he continues to be a passionate advocate for veterans transitioning into the civilian workforce, consulting part-time for those considering the pursuit of entrepreneurial small business ventures.

The most recent editions of Michael's published work can be found at all major booksellers, and on the VitalSource Academic Digital Platform for use in university and college business and entrepreneurship programs.  Michael and his family currently live in Savannah, Georgia.


Industry Certifications
(Descriptions on NICCS.US-CERT.GOV)

In his role as a cyber security instructor, Michael is authorized to teach the following Mile2 courses to students seeking certification.

Certified Information Security Management Systems - Lead Implementer
Certificate:  783700
Expiration:  2021

Certified Information Security Management Systems – Lead Auditor
Certificate:  782800
Expiration:  2021

Information Systems Certification and Accreditation Professional
Certificate:  1032700
Expiration:  2021

Certified Healthcare Information Systems Security Practitioner
Certificate:  748300
Expiration:  2020

Certified Information Systems Security Manager
Certificate:  752100
Expiration:  2020

Certified Information Systems Security Auditor
Certificate:  780200
Expiration:  2021

Certified Information Systems Security Officer
Certificate:  739100
Expiration:  2020

Certified Information Systems Risk Manager
Certificate:  749600
Expiration:  2020

Certified Secure Web Application Engineer
Certificate:  756900
Expiration:  2020

Information Systems 20 Controls (IS20)
Certificate:  741400
Expiration:  2020

Certified Penetration Testing Engineer
Certificate:  763000
Expiration:  2020

Certified Network Forensics Examiner
Certificate:  933600
Expiration:  2021

Certified Disaster Recovery Engineer
Certificate:  725000
Expiration:  2020

Certified Incident Handling Engineer
Certificate:  764100
Expiration:  2020

Certified Security Leadership Officer
Certificate:  743100
Expiration:  2020

Certified Digital Forensics Examiner
Certificate:  898000
Expiration:  2021

Certified Cyber Security Instructor
Certificate:  743500
Expiration:  2020

Certified Vulnerability Assessor
Certificate:  783700
Expiration:  2020


About the Certifying Organization

Mile2 is a developer of proprietary vendor neutral cyber security certifications which are accredited by NSA’s CNSS 4011-4016. Mile2’s courses are approved on Homeland’s Security NICCS training schedule and is on the FBI’s preferred cyber security certification requirements. 

Mile2 courseware has been approved by the Committee on National Security Systems (CNSS) National Training Standards. The Information Assurance Courseware Evaluation (IACE) Program provides consistency in technology training and education for the information assurance industry. 

Mile2 is a globally respected Cyber Security Organization that focuses on cyber security training for governmental and corporate entities who understand the value of “knowing your enemy.” By training businesses and organizations to think like an attacker, their intellectual property and data remains secure.

CYBER SECURITY TRAINING SCHEDULE



2019 Training Schedule

The courses listed below are instructor-led classroom format conducted at the Coastal Regional Commission of Georgia in Darien, Georgia.  We also conduct instructor-led online training via WebEx, and remote training at the client location upon request.  To discuss these options, or to find out about customized training solutions tailored specifically to your needs, please contact Michael Kaplan via email at michael@michaelikaplan.com.





Disaster recovery and business continuity planning is the process of having a professional work with a business to prepare processes, policies, and procedures to follow in case of a disruption. The comprehensive Mile2 Certified Disaster Recovery Engineer certification course goes beyond traditional BCP training - preparing students for industry certification in Business Continuity planning and presenting the latest methodologies and best practices for real-world systems recovery. Students will receive a solid foundation of instruction that will enable them to create meaningful business continuity plans.

Course Duration: 4 Days | Course Fee: $2,750 (lunches included) | Register for Training




The Mile2 Certified Information Systems Security Manager certification course covers the skills and knowledge to assess and analyze threats and risks posed to modern information systems. Topics covered in this course will include risk and incident management, security programs and CISO roles, Information Systems security strategy and frameworks, audit and risk management policy development, compliance and awareness. Students will also be prepared to address development, deployment, and maintenance of comprehensive disaster recovery and business continuity planning.

Course Duration: 4 Days | Course Fee: $2,750 (lunches included) | Register for Training




The Mile2 Certified Incident Handling Engineer vendor-neutral certification course is designed to help Incident Handlers, System Administrators, and any General Security Engineers understand how to plan, create, and utilize their systems in order to prevent, detect and respond to attacks. This course also provides numerous hands-on laboratory exercises that focus on topics such as reconnaissance, vulnerability assessments using Nessus, network sniffing, web application manipulation, malware, using Netcat, and scenarios for both Windows and Linux systems.

Course Duration: 4 Days | Course Fee: $2,750 (lunches included) | Register for Training




Disaster recovery and business continuity planning is the process of having a professional work with a business to prepare processes, policies, and procedures to follow in case of a disruption. The comprehensive Mile2 Certified Disaster Recovery Engineer certification course goes beyond traditional BCP training - preparing students for industry certification in Business Continuity planning and presenting the latest methodologies and best practices for real-world systems recovery. Students will receive a solid foundation of instruction that will enable them to create meaningful business continuity plans.

Course Duration: 4 Days | Course Fee: $2,750 (lunches included) | Register for Training

The Mile2 Certified Information Systems Risk Manager certification course is designed for Information Technology and Information Security professionals involved with risk identification, assessment and evaluation, risk response, risk monitoring, IS control design and implementation, monitoring and maintenance. Students will receive comprehensive training built around 5 core competencies: Risk Identification Assessment and Evaluation, Risk Response, Risk Monitoring, IS Control Design, Implementation, and Control Monitoring / Maintenance.

Course Duration: 4 Days | Course Fee: $2,750 (lunches included) | Register for Training




The Mile2 Certified Digital Forensics Examiner vendor-neutral certification course trains Cyber Crime and Fraud Investigator students using electronic discovery and advanced investigation techniques. This course is essential to anyone encountering digital evidence while conducting an investigation. Students will learn methodologies to implement forensically sound investigative techniques to evaluate scenes, collect and document all relevant information, interview appropriate personnel, maintain chain-of-custody, and write a findings report.

Course Duration: 4 Days | Course Fee: $2,750 (lunches included) | Register for Training




The Mile2 vendor-neutral Certified Vulnerability Assessor certification course provides foundational knowledge of general VA tools as well as popular exploits with which an IT engineer should be familiar. This course is a fundamental cyber security certification course that focuses on vulnerability assessments. The student will be versed with basic malware and viruses and how they can infiltrate an organizations network. The student will also learn how to assess a company’s security posture and perform a basic vulnerability test to help secure the organization’s networking infrastructure.

Course Duration: 4 Days | Course Fee: $2,750 (lunches included) | Register for Training




The Mile2 Certified Information Systems Security Manager certification course covers the skills and knowledge to assess and analyze threats and risks posed to modern information systems. Topics covered in this course will include risk and incident management, security programs and CISO roles, Information Systems security strategy and frameworks, audit and risk management policy development, compliance and awareness. Students will also be prepared to address development, deployment, and maintenance of comprehensive disaster recovery and business continuity planning.

Course Duration: 4 Days | Course Fee: $2,750 (lunches included) | Register for Training




Disaster recovery and business continuity planning is the process of having a professional work with a business to prepare processes, policies, and procedures to follow in case of a disruption. The comprehensive Mile2 Certified Disaster Recovery Engineer certification course goes beyond traditional BCP training - preparing students for industry certification in Business Continuity planning and presenting the latest methodologies and best practices for real-world systems recovery. Students will receive a solid foundation of instruction that will enable them to create meaningful business continuity plans.

Course Duration: 4 Days | Course Fee: $2,750 (lunches included) | Register for Training




The Mile2 Certified Information Systems Risk Manager certification course is designed for Information Technology and Information Security professionals involved with risk identification, assessment and evaluation, risk response, risk monitoring, IS control design and implementation, monitoring and maintenance. Students will receive comprehensive training built around 5 core competencies: Risk Identification Assessment and Evaluation, Risk Response, Risk Monitoring, IS Control Design, Implementation, and Control Monitoring / Maintenance.

Course Duration: 4 Days | Course Fee: $2,750 (lunches included) | Register for Training




The Mile2 vendor-neutral Certified Vulnerability Assessor certification course provides foundational knowledge of general VA tools as well as popular exploits with which an IT engineer should be familiar. This course is a fundamental cyber security certification course that focuses on vulnerability assessments. The student will be versed with basic malware and viruses and how they can infiltrate an organizations network. The student will also learn how to assess a company’s security posture and perform a basic vulnerability test to help secure the organization’s networking infrastructure.

Course Duration: 4 Days | Course Fee: $2,750 (lunches included) | Register for Training




Disaster recovery and business continuity planning is the process of having a professional work with a business to prepare processes, policies, and procedures to follow in case of a disruption. The comprehensive Mile2 Certified Disaster Recovery Engineer certification course goes beyond traditional BCP training - preparing students for industry certification in Business Continuity planning and presenting the latest methodologies and best practices for real-world systems recovery. Students will receive a solid foundation of instruction that will enable them to create meaningful business continuity plans.

Course Duration: 4 Days | Course Fee: $2,750 (lunches included) | Register for Training


EC-COUNCIL Portfolio IT Security Management: CEH | CCISO | CHFI | ECSA






CEH | CCISO | CHFI | ECSA

Certified Chief Information Security Officer
Certified Chief Information Security Officer Certification, EC-Council, CCISO The CCISO Certification is an industry-leading program that recognizes the real-world experience necessary to succeed at the highest executive levels of information security. The EC-Council CCISO Body of Knowledge covers all five the CCISO Domains in depth and was written by seasoned CISOs for current and aspiring CISOs.

Ethical Hacking:
Certified Ethical Hacker v10
security certification,penetration testing,ethical hacking,certified ethical hacker,information security training CEHv10 provides a comprehensive ethical hacking and network security-training program to meet the standards of highly skilled security professionals. Hundreds of SMEs and authors have contributed to the content presented in the CEHv10 course ware. Our researchers have invested thousands of man hours researching the latest trends and uncovering the covert techniques used by the underground community

Pen Testing:
Certified Security Analyst/Licensed Pen Tester
Security Analyst Certification,Vulnerability Assessment Training,Penetration Testing Training,Pen Testing,Ethical Hacking,Certified Security Analyst,EC Council Certified Security Analyst,Security Training EC Council Certified Security Analyst, ECSA complements the Certified Ethical Hacker, CEH certification by exploring the analytical phase of ethical hacking. While the Certified Ethical Hacker certification exposes the learner to hacking tools and technologies, the Certified Security Analyst course takes it a step further by exploring how to analyze the outcome from these tools and technologies.

Computer Forensics:
Computer Hacking Forensic Investigator:
 computer forensics,computer forensics training,computer forensics online,computer forensic training,computer forensics courses,computer forensics course,computer hacking forensic investigator,Computer Forensics Online Training,computer forensics online courseThis computer forensics course will give participants the necessary skills to identify an intruder's footprints and to properly gather the necessary evidence to prosecute. Many of today's top tools of the forensic trade will be taught during this course, including software, hardware and specialized techniques. It is no longer a matter of "will your organization be comprised (hacked)?" but, rather, "when?"

Computer Security Incident Handling:
Certified Incident Handler
Certified Incident Handler, First Responder, IT Security, Hacker
The EC-Council Certified Incident Handler program is designed to provide the fundamental skills to handle and respond to the computer security incidents in an information system.  The course addresses various underlying principles and techniques for detecting and responding to current and emerging computer security threats.

Secure Programming:
Certified Secure Programmer .Net
Certified Incident Handler, First Res ponder, IT Security, HackerEC-Council Secure Programmer .Net teaches developers how to identify security flaws and implement security countermeasures throughout the software development life cycle to improve the overall quality of products and applications.

Secure a 20 % DISCOUNT WITH THE FOLLOWING CODE (MILNET20%)

Core Concepts:
EC-Council Core Concepts
Security Analyst Certification,Vulnerability Assessment Training,Penetration Testing Training,Pen Testing,Ethical Hacking,Certified Security Analyst,EC Council Certified Security Analyst,Security Training

EC-Council’s Core Concepts course is the bridge between a beginning level security course and CEH; furthermore, it focuses on the main concepts required to build a foundation in security. Additionally, you will be introduced to vulnerability assessment and the hacking methodology. When you finish this course you will have a solid security foundation to pursue more advanced security training.



Security Awareness:
Certified Secure Computer User
Security Awareness, Computer Security Fundamentals, User, EC-Council, Certification, courseThe purpose of the CSCU training program is to provide students with the necessary knowledge and skills to protect their information assets. This class will immerse students into an interactive environment where they will acquire fundamental understanding of various computer and network security threats.

Certified Internet Marketing Practitioner (CIMP)
CIMP-Banner-small Internet Marketing combines the creative and technical aspects of the Internet with design, development, advertising, and marketing part of a business. It consists of search engine marketing, display advertising, email marketing, affiliate marketing, interactive advertising, viral marketing, social media advertising, mobile advertising, etc.

Center for Advanced Security Training (CAST) Courses
Hardening Your Enterprise: Advanced Network Defense (CAST 614)
Advanced Network Defense, IT Security, CAST, Training, CoursesThis is a comprehensive fast paced technical security training program that will take the perspective of the “hacker”, and use that for the foundation of defending against the latest attacks. It is fun to be on offense and do the hacking and penetration testing, but for most us the reality is we have to play defense.

Our TECHNOLOGY
IT Security Training, EC-Council, Certification, CEH, Ethical Hacker, Hacking,
Here at EC-Council's iClass training division we have pulled together the latest technology resources to assure that your training experience can be custom designed to fit your best learning style. We realize that it takes more than just a "talking head" style lecture to bring this complex course material to life, so we have incorporated the following options/upgrades into our model to give you, the learner, the control over which solutions will help you get the most out of your training dollars and more importantly, your time!
CEH | CCISO | CHFI | ECSA

Our TECHNOLOGY
IT Security Training, EC-Council, Certification, CEH, Ethical Hacker, Hacking.
Here at EC-Council's iClass training division we have pulled together the latest technology resources to assure that your training experience can be custom designed to fit your best learning style. We realize that it takes more than just a "talking head" style lecture to bring this complex course material to life, so we have incorporated the following options/upgrades into our model to give you, the learner, the control over which solutions will help you get the most out of your training dollars and more importantly, your time!

iLearn - Web-based/WBT/Streaming Video
Film Frame small
The two main reasons folks choose Web-based training, are reduced rates and more flexibility, and for that reason our iLearn program is by far our most popular option!

Our iClass team has assembled a talented group of Videographers to help us bring the live classroom experience to you! We use a 3 camera format which allows us to capture our instructors more naturally than other e-learning products that simply point one camera at a "talking head" with a green screen.

Another key factor to employing our own videographers, is the ability to get out of the classroom for demonstrations, technical interludes, and other extras that are all designed to give you a well rounded, real-world learning experience!


Mobile Learning
CEH, Certification, Training, Mobile, iPad, Samsung, Netbook
The world is obsessed with tablets! Still in its infancy, the tablet made its debut in 2010 with the launch of the original iPad and in 2012 31% of the U.S. population that used the Internet, (74 million users) did so with a tablet. That's up from 12%, or 28 million users, in 2011.

According to nydailynews.com by the end of 2013, sales will balloon even more, with penetration expected to reach 47%, or 117 million users!
With those kind of statistics how could we not deliver our world class content on a mobile device? According to our students, they are on the go and  they like the ability to take their training with them!

Computer-based/CBT/DVD
CEH, Certification, DVD, CBT, WBT
If you can play DVDs, you can train with this option! Many of our clients work in secure facilities with limited or no access to the internet, so we offer computer-based training (CBT) options delivered in an HD DVD format.

The content is the same as you would receive in our streaming or mobile courses, but they have been added to DVDs to eliminate the need to be connected to the internet. DVDs are an upgrade/add-on to the base iLearn program and are not sold independently.

Ilabs / Secure Cyber Range/Practice Labs
iLabs Graphic Logo small EC-Council iLabs allows students to dynamically access a host of Virtual Machines preconfigured with vulnerabilities, exploits, tools, and scripts from anywhere with an internet connection.

Our simplistic web portal enables the student to launch an entire range of target machines and access them remotely with one simple click. It is the most cost effective, easy to use, live range lab solution available. Most of our courses come equipped with iLabs, but iLabs can be purchased independently.

Client-Site  Courses
Certified Ethical Hacker, CEH, Client Site, Onsite, Private, Course
We get calls all the time wondering if we can arrange training at a client's site. The answer is a resounding, "YES!" We have access to the largest pool of EC-Council certified instructors via our Authorized Training Center (ATC) channel. Let us know where & when you want the training delivered, and we will arrange to have an instructor and all that is needed for a turn-key training course taught at a location of your choice.

EC-Council client-site training includes Official Course ware, certification exam (Prometric or VUE), iLabs, online labs where available and our test pass-guarantee. [If you don't pass the exam on our first attempt, the next one is on us!

iWeek - Live, Online
Live, Online, E-Learning, Web Training, Online CEH, Online ClassIf self-study or self-paced learning doesn't fit into your personal learning style we offer our live, online model; iWeek.

iWeek offers the course Monday thru Friday, 8 am to 4 pm Mountain time. This training method allows you the freedom to train from a location of your choice. Individuals who choose this delivery method consistently attribute their choice to the preference of having a live instructor available for which questions can be asked and answered. We offer early bird rates, group rates and even private courses delivered day or night are available!


CEH | CCISO | CHFI | ECSA



 iLabs- Online Secure Cyber Range
Our TECHNOLOGY, Solutions for Business, Solutions for Government, Solutions for Individuals Cyber Range, hands-on experience, hands-on learning, iLabs, Practice Labs, VMware Practice Labs

 EC-Council iLabs is a secure cyber range which allows you to dynamically access a host of Virtual Machines preconfigured with vulnerabilities, exploits, tools, and scripts from anywhere with an internet connection.

Our simplistic web portal enables the student to launch an entire range of target machines and access them remotely with one simple click. It is the most cost effective, easy to use, live range lab solution available.

The Cyber War requires a battle-ready training ground and iLabs Online Secure Cyber Range is place where you can safely practice to be ready for any malicious attacks coming your way!

How iLabs Works
Target Virtual Networks are maintained by EC-Council in an online virtualized platform.
When a student logs into iLabs, they are presented with Learning Objectives and Goals. Once receiving a content briefing, they launch the live environment.

Within 1 minute, a full target range is booted up in our Cloud environment and the student is provided browser-based access to the platform. All Labs are fully isolated and disconnected from live Internet. The remote viewer that operates through a range of protocols for maximum compatibility, gives the student a Screen view as well as Machine commands for the Virtual Machines.

These VM’s are housed inside of a Learning Environment that includes the ability to provide direct guidance, learning objectives, exercises and tasks as well as advanced feedback models like Alerts, Recommendations, Screen Shots and short Video Tutorials.

Secure a 20 % DISCOUNT WITH THE FOLLOWING CODE (MILNET20%)

How it works
Virtualized Solution
iLabs allows lab exercises can be accessed 24x7 allowing you to practice skills in a safe, fully functional network anytime it’s convenient.

Our guided step-by-step labs include exercises with detailed tasks, supporting tools, and additional materials as well as our state-of-the-art “Open Environment” allowing you to launch a complete Live range open for any form of hacking or testing.

Available target machines are completely virtualized allowing us to control and reset machines quickly and easily with no required instructor or administrative interaction. With iLabs, you have 100% control of the environment. Dynamically access virtual machines using a Web Browser. No plug-ins or additional software required.





Access the virtual environment with any device that supports HTML5 such as iPad, iPhone, Android devices iLabs comes with excellent step by step instruction guides. You have complete control of the virtual environment. Start, stop, pause, reboot, create snapshot etc.

Worried about hacking your own computer? With our iLabs virtualized solution you can restore the system to any state or level you desire. The iLabs virtual environment is available to you 24 x 7 anywhere in the world. Just login and start the session. It is that simple.
                                                                               
With remote access 24x7, students are able to take concepts learned in Ethical Hacking and Computer Forensics courses and test those concepts with the use of real tools, victim servers, pre-configured vulnerabilities, and much more. Applying concepts learned in the classroom in a controlled, hosted environment provides the ability to learn in real time based on how the systems respond. Through extensive planning and automation services, iLabs is able to provide seamless access to cutting edge content without the need to know or understand Virtualization or Target range development. You simply login to the online portal and launch your multi-machine environments as needed.


Performance Based
Pre-Configured Target Rich Environment
Each lab comes with a complete set of lab exercises for hours of guided, hands-on, practical learning. Machines are pre-configured with a host of tools and required resources as well as vulnerabilities for evaluation and testing purposes. Targets are not simulated, iLabs is a complete Virtualized environment with fully patched operating systems.

The use of cloud computing and virtualization technology provides the most realistic environment possible with NO simulations or animations. All machines are fully functioning, live installations of the respective Operating Systems and vulnerabilities.

Latest Operating Systems Supported
Operating Systems

iClass is EC-Council's Official delivery platform. So what that means for those who were wondering, is that if you choose to attend iClass training, your exam will be included in the package and you will not have to apply and prove 2 years IT Security experience in order to test!

Secure a 20 % DISCOUNT WITH THE FOLLOWING CODE (MILNET20%)


In the iClass platform we offer a few different ways in which you can train.

iWeek, Live, Online
This solution is a live, online course delivered via Blackboard's Elluminate platform in a format that is similar to a "Go To Meeting" on steroids. iWeek comes with a certification exam voucher and extended access to EC-Council's iLabs*, online lab platform.

iLearn, Self-Paced Streaming Video
This solution is an asynchronous, self-study environment which delivers EC-Council's sought after IT Security training courses, such as CEH, in a streaming video format. All lectures are delivered by a professional practitioner to assure a real-world perspective on the course concepts. iLearn comes with one year access to the streaming video lectures, a certification exam and iLabs*, online lab platform. (Many other options/upgrades are also available to aid you in tailoring the program to your study preferences.)

Mobile, Self-Paced, Tablet Device
The mobile solution offers everything that comes with the base iLearn package but with the option of having the video lectures loaded onto a mobile device such as an iPad or Samsung Tablet and ship to you. The mobile option allows you to take your training with you without tying you to your local

PC or the internet.
Onsite, Training at Your Location
We receive calls all the time from government and commercial companies alike requesting private courses to delivered locally and YES! we can deliver these courses and one of our Enrollment Specialists can work with you to determine the best way to fit your budgetary needs. Onsite, private courses are offered as a turn-key solution including Official Course-ware, certification exam, and iLabs*, online labs.

Self-Study, Course ware, ilabs, Exam
In this economy, we are finding more and more folks simply don't have the budget for a full blown training solution. Any of our course ware, exams and iLabs are available to be purchased separate from training.

*iLabs is a cyber security range of virtual machines that allow you to practice all the concepts and methodologies taught in EC-Council's IT Security Certification courses.


Robert Wilson, MCP
President, Military Network (http://mil-net.us)
CompTIA / USADOL Apprenticeship
and Training, Certified NITAS Consultant
robert@mil-net.com | 859-428-8163

Secure a 20 % DISCOUNT WITH THE FOLLOWING CODE (MILNET20%)