Macomb-OU Incubator
Velocity Collaboration Center
6633 Eighteen Mile Road
Sterling Heights, MI 48314
(586) 884-9320
Fax: (586) 884-9331
Hours: M-F, 8 a.m. - 5 p.m.

Education

We hold certification courses for more than 20 different cyber security disciplines. Each certification, hosted by Mac-OU INC through the Merit Network, can be obtained through an approximate four to five day course including an exam. These programs run through Oakland University’s Professional & Continuing Education and earn participants continuing education units. As stated on the Merit website, “Each course prepares you for real-life situations and for the related certification test. When you successfully complete a course, you will be able to confidently take a certification exam on the final day of the course.”

Cyber-security employers demand a highly educated, highly experienced workforce. Some 84 percent of cyber security postings specify at least a bachelor’s degree, and 83 percent require at least three years of experience. In addition, cyber-security positions are more likely to require certifications than other IT jobs. 35 percent of cyber security jobs call for an industry certification, compared to 23 percent of IT jobs overall.

UPCOMING CYBER-SECURITY COURSE OFFERINGS:

Velocity Hub of the Michigan Cyber Range
Macomb-OU Incubator at Velocity Center
6633 18 Mile Rd, Sterling Heights, MI 48314

For more information, contact Joan Carleton at macinc@oakland.edu or (586) 884-9324.

Certified Information Systems Security Officer (7/17/17 - 7/21/17)

Certified Information Systems Security Officer - C)ISSO

July 17 - 21, 2017: 8:30 a.m. - 5:30 p.m.

Merit Professional Development and the Michigan Cyber Range are pleased to present Certified Information Systems Security Officer – C)ISSO at the Macomb-OU Incubator’s Velocity Hub. The course prepares and certifies you to analyze an organization’s information security threats and risks, and to design a security program to mitigate them.

The C)ISSO course addresses the broad range of industry best practices, knowledge and skills expected of a security leader. You will learn both the theory and the requirements for practical implementation of core security concepts, practices, monitoring and compliance. Through the use of a risk-based approach a certified C)ISSO is able to implement and maintain cost-effective security controls that are closely aligned with business requirements. The Certified Information Systems Security Officer certification was a direct initiative of the DND (Department of Defense of Canada) in cooperation with the DOD (Department of Defense of the United States).

The C)ISSO course is designed for a forward-thinking security professional or consultant who manages or plays a key role in an organization’s information security department. Whether you are a security officer, a business analyst, an IT auditor or responsible for the management of an Information Security team, the Certified Information Security Officer-C)ISSO course is an ideal way to increase your knowledge, expertise and skill. The C)ISSO course, and subsequent examination, is the most up to date, practical and effective program available in the world today. The CISSO program is closely aligned with the leading standards of ISO27001, NIST, CISM® and the 2012 CISSP® CBK® Exam objectives, and it excels by providing a well-rounded and comprehensive overview of each topic area without being restricted to a single model or conceptual approach.

The C)ISSO course prepares you for the certification exam through Mile2, which is likewise aligned with the ISO27001, NIST, CISM® and the 2012 CISSP® CBK® objectives.

This course also prepares you for the Certified Information Systems Security Professional-CISSP exam, which can be taken separately through (ISC2).

Recommended Prerequisites: Experience in at least 2 modules of the course outline is beneficial but not required.

Who Should Attend? Security managers/officers, IT auditors, business analysts.

Certification: Cyber Range course fees include certification exam! Certification is dependent upon the student successfully passing the certification test with a score of 70 percent or better

Upon proper completion of the course, you will be able to confidently sit for the C)ISSO certification exam on the final day of the course. Exams are delivered online through a standard web browser. Students will enjoy an in-depth course that is continuously updated to maintain and incorporate changes in the security environment. This course offers up-to-date proprietary labs that have been researched and developed by leading security professionals from around the world. A C)ISSO Certification will be issued after successfully passing the exam.

Cost: $3,000 

Registration: To access registration, visit the Oakland University Professional & Continuing Education (PACE) registration page. Type the CRN 90013 into the search box to access the course. Please direct questions to PACE at oupace@oakland.edu or (248) 370-3177.

Additional Questions: Please direct to Joan Carleton at macinc@oakland.edu or (586) 884-9324.

Certified Professional Ethical Hacker (8/14/17 - 8/18/17)

Certified Professional Ethical Hacker – C)PEH

August 14 - 18, 2017: 8:30 a.m. - 5:30 p.m.

Merit Professional Development and the Michigan Cyber Range are pleased to present Certified Professional Ethical Hacker – C)PEH. This course is the introductory training in the line of penetration testing courses and certifications. The course helps students gain a valuable skill set in penetration testing by understand the importance of vulnerability assessments and ethical hacking.

The C)PEH certification training enables students to understand the importance of vulnerability assessments by providing industry knowledge and skills in Vulnerability Assessments. In doing so, the C)PEH student is able to understand how malware and destructive viruses function. In addition, the C)PEH course helps students learn how to implement counter response and preventative measures when it comes to a network hack.

The C)PEH course provides in-depth labs that focus on both open source and commercial based tools with industry best practices. These hands on labs emulate real world hacking scenarios and equip the candidate to assess your company’s security posture, help implement controls to better secure your company’s network infrastructure and how to combat against hackers and/or viruses, etc.

Upon completion of the Certified Professional Ethical Hacker course, candidates will be able to competently take the C)PEH exam.

Who Should Attend? Information System Owners, Security Officers, Ethical Hackers, Information Owners, Penetration Testers, System Owner and Managers, Cyber Security Engineers.

Recommended Prerequisites: 12 months of IT security experience or 12 months of Networking Experience.

The Certified Professional Ethical Hacker exam is taken online through Mile2’s Assessment and Certification System (“MACS”), which is accessible on your mile2.com account. The exam will take 2 hours and consist of 100 multiple-choice questions. The cost is $400 USD and must be purchased from mile2.com.

Cost: $3,000 

Registration: To access registration, visit the Oakland University Professional & Continuing Education (PACE) registration page. Type the CRN 90043 into the search box to access the course. Please direct questions to PACE at oupace@oakland.edu or (248) 370-3177.

Additional Questions: Please direct to Joan Carleton at macinc@oakland.edu or (586) 884-9324.

Guided Capture the Flag (9/21/17)

Guided Capture the Flag: Introduction to Hacking Tools and Techniques Through a Guided Capture the Flag Challenge

Thursday, September 21, 2017: 9:30 a.m. - 5:30 p.m.

This one-of-a-kind event is a hands on experiential Capture The Flag (CTF) coupled with real time training on the tools and operating systems needed to successfully work through each challenge. Six different modules allow students to learn the fundamentals of hacking tools, techniques and methodologies and use open source tools to fire off live attacks on networked systems in real time.

The guided CTF is hosted on the Michigan Cyber Range, the nation’s largest unclassified training cyber range, and will allow students to perform live scans and exploits with no danger of leakage onto production networks. Each student will have a unique experience based on the methodologies they deploy and the systems they target, but students can expect to learn and deploy the concepts below. Participants that want to work at their own pace are encouraged to do so!

Topics include but not limited to:

  • Linux / Kali Linux Tools
  • Kali Command Prompt
  • Tool Selection
  • Password Explotation & Storage
  • SQL Vulnerabilities
  • Scanning & Enumeration
  • Proxy Chaining
  • Traffic Sniffing & Manipulation

Cost: $625 

Registration: To access registration, visit the Oakland University Professional & Continuing Education (PACE) registration page. Type the CRN 90012 into the search box to access the course. Please direct questions to PACE at oupace@oakland.edu or (248) 370-3177.

Additional Questions: Please direct to Joan Carleton at macinc@oakland.edu or (586) 884-9324.

Guided Capture the Flag (12/14/17)

Guided Capture the Flag: Introduction to Hacking Tools and Techniques Through a Guided Capture the Flag Challenge

Thursday, December 14, 2017: 9:30 a.m. - 5:30 p.m.

This one-of-a-kind event is a hands on experiential Capture The Flag (CTF) coupled with real time training on the tools and operating systems needed to successfully work through each challenge. Six different modules allow students to learn the fundamentals of hacking tools, techniques and methodologies and use open source tools to fire off live attacks on networked systems in real time.

The guided CTF is hosted on the Michigan Cyber Range, the nation’s largest unclassified training cyber range, and will allow students to perform live scans and exploits with no danger of leakage onto production networks. Each student will have a unique experience based on the methodologies they deploy and the systems they target, but students can expect to learn and deploy the concepts below. Participants that want to work at their own pace are encouraged to do so!

Topics include but not limited to:

  • Linux / Kali Linux Tools
  • Kali Command Prompt
  • Tool Selection
  • Password Explotation & Storage
  • SQL Vulnerabilities
  • Scanning & Enumeration
  • Proxy Chaining
  • Traffic Sniffing & Manipulation

Cost: $625 

Registration: To access registration, visit the Oakland University Professional & Continuing Education (PACE) registration page. Type the CRN 90221 into the search box to access the course. Please direct questions to PACE at oupace@oakland.edu or (248) 370-3177.

Additional Questions: Please direct to Joan Carleton at macinc@oakland.edu or (586) 884-9324. 

CERTIFICATION
ROAD MAP

Cyber Security Certification Road Map

Career AreaFundamentalFoundationalSpecializedAdvanced
IS Management
Leadership
C)SSC)ISSOIS20ControlsC)SLO
Pen Testing HackingC)VAC)PEHC)PTEC)PTC
Incident HandlingC)SSC)ISSOC)IHE
ForensicsC)SSC)ISSOC)DFEC)NFE
Disaster RecoveryC)SSC)ISSOC)DRE
Wireless SecurityC)SSC)ISSOC)WSE
HealthcareC)SSC)ISSOC)HISSP
AuditingC)SSC)ISSO

C)ISMS-LA
C)ISMS-LI

C)ISSA
Application &
Security Code
C)SSC)ISSOC)SWAE
Virtual MachineC)SSC)ISSOC)VME 6.0
IS Management
Electives
C)ISSMC)ISRMISCAP
Fundamental

Fundamental Certification Courses:

  • C)SS (Certified Security Sentinel)
  • C)VA (Certified Vulnerability Assessor)
  • C)ISSM (Information Systems Security Manager)

Courses range from $1,500 to $3,500 each. For more details on each course, visit mile2.com/mile2-courses

Foundational

Foundational Certification Courses:

  • C)ISSO (Certified Information Systems Security Officer)
  • C)PEH (Certified Professional Ethical Hacker)
  • C)ISRM (Certified Information Systems Risk Manager)

Courses range from $1,500 to $3,500 each. For more details on each course, visit mile2.com/mile2-courses

Specialized

Specialized Certification Courses:

  • IS20Controls (IS20 Security Controls)
  • C)PTE (Certified Penetration Testing Engineer)
  • C)IHE (Certified Incident Handling Engineer)
  • (C)DFE (Certified Digital Forensics Examiner)
  • C)DRE (Certified Disaster Recovery Engineer)
  • C)WSE (Certified Wireless Security Engineer)
  • C)HISSP (Certified Healthcare Information Systems Security Practitioner)
  • C)ISMS-LA (Certified Information Security Management Systems Lead Auditor)
  • C)ISMS-LI (Certified Information Security Management Systems Lead Implementer)
  • C)SWAE (Certified Secure Web Application Engineer)
  • C)VME 6.0 (Certified Virtual Machine Engineer 6.0)

Courses range from $1,500 to $3,500 each. For more details on each course, visit mile2.com/mile2-courses

Advanced

Advanced Certification Courses:

  • C)SLO (Certified Security Leadership Officer)
  • C)PTC (Certified Penetration Testing Consultant)
  • C)NFE (Certified Network Forensics Examiner)
  • (C)ISSA (Certified Information Systems Security Auditor)
  • ISCAP (Information Systems Certification and Accreditation Professional

Courses range from $1,500 to $3,500 each. For more details on each course, visit mile2.com/mile2-courses