skip to Main Content


Cyber Challenge

Cybersecurity education training opportunities – including DoD approved baseline certifications – are offered as private classes for your organization and through Merit Network’s Cyber Range Hubs. Most training opportunities can be offered through a virtual presence only.

Classes & Certifications
DoD Directives 8570.1 to 8140
Merit Academy Program



Organizations will learn to prioritize actions to improve enterprise security posture using a threat-focused approach, rather than regulatory compliance. This workshop offers a lens for focusing activity on improving the areas which will have the largest impact on security by concentrating on specific threats and how they can be used to exploit security weaknesses.


K-12 focused presentations discuss social engineering, critical controls for IT managers, cybersecurity from a hacker’s vantage point, OWASP 10 and SANS Top 20 Controls, securing endpoints and applications and IT risk management. Any individual in the K-12 arena will benefit from gaining an understanding in beginning an onsite security program through this workshop. Contact us to develop a custom program for your organization!


For those starting out in cybersecurity field; a great basic cybersecurity course with opportunity to learn and use popular open source tools. Learn the fundamental skills required to defend your networks against most computer hacking attempts in Defense Essentials. Eligible for Merit Academy Program.


Thinking like a hacker is crucial to being a skilled security professional and to proficiently test an organization’s security.  Hacking Essentials provides understanding and insight about how to look for weaknesses and vulnerabilities in target systems and shows you how to use the same knowledge and tools as a malicious hacker.  This class is taught with a combination of lecture, demonstration, and access to a Secure Sandbox for lab exercises on your own set VMs. Eligible for Merit Academy Program.


Develop a roadmap for tracking and addressing risks throughout your development lifecycles. This workshop discusses implementation of NIST’s (National Institute of Standards and Technology) Risk Management Framework to reduce overall risk in your organization.


Build an incident response plan for your organization. The IR Workshop is based on the National Institute of Standards and Technology (NIST) 800 framework for managing computer security incidents. Attendees will learn the format of an IR plan, how to determine a reportable incident, roles of a response team and more. Participants will leave the workshop with a drafted incident response plan.

Any company that must comply with the North American Electric Reliability Corporation (NERC) critical infrastructure protection (CIP) cybersecurity standards should attend, as well as accounting firms, emergency managers, government officials and police personnel.

This workshop can be tailored to instruct on development and testing for NERC CIPv6.


This course provides valuable insight about the development of governance within an organization, ways to create policy training and awareness within your staff and the establishment of policies that align to data regulations. Attendees will complete policy management templates and will gain an understanding of a formal policy organization structure. Groups and individuals will practice crafting, or improve upon an already existing policy, standards and procedure guide.


This workshop discusses the implementation of NIST’s (National Institute of Standards and Technology) Risk Management Framework to reduce overall risk in your organization. Develop a roadmap for tracking and addressing risks throughout your development lifecycles.


This is an introductory secure coding class aimed at the practice of developing computer software in a way that guards against the accidental introduction of security vulnerabilities. A critical first step in developing secure applications is effective training that allows developers to learn important secure coding principles and how they can be applied, then integrate it to your platform.


Start a security program with no budget. While larger organizations are able to purchase necessary equipment and hire staff dedicated to security, small and medium sized businesses are not able to keep up. In this session, you will learn how to implement low or no cost solutions within your organization.


Threat At Your Doorstep is comprised of several 50-minute modules focusing on the current threat landscape, social engineering, critical controls, common attack vectors and more. Participants receive an in-depth overview of the types of various hackers, the nature and role of training programs and warning signs of an attack. Attendees will also participate in a phishing demonstration.


From hardware and software configuration to end-user security, there are multiple potential vulnerabilities in the IoT space. The growing demand of new device technology often means that security is a secondary concern. With the global rise in hacking attempts, organizations must develop IoT security frameworks, secure programming best practices and end-user education.

In this introductory session on IoT, attendees will gain an understanding of how to apply IoT frameworks for increased security in manufacturing and consumer products.


Phishing attempts, the tactics employed to trick users into sharing personal information, passwords and credit card numbers, are growing in frequency and sophistication. This demonstration illustrates the ease and speed of phishing attempts and arms attendees with tactics to protect their personal data.


Michigan Cyber Range exercises offer an affordable, hands-on training environment via a secure sandbox, providing real life scenarios that teach users to detect and mitigate cyber attacks. Sandbox services are available for further use by any member institution as well. More information can be found on our Secure Sandbox and Connected Sandbox pages.

These exercises complement other elements of cybersecurity training by challenging participants to apply the skills they’ve learned in classes and on-the-job training in realistic settings.

All teams can participate in Michigan Cyber Range exercises virtually – there is no requirement to be onsite. User experience is augmented through the use of our scoreboard and 3D visualization of the Alphaville training environment.

Unlike our competitors, Michigan Cyber Range exercises are wholly contained within the secure Michigan Cyber Range and are extremely affordable for organizations of all sizes and can be customized to meet your scheduling and organizational needs:

Game-based problem solving • More effective than book learning • Flexible scheduling with ½ day to week-long exercises • Facilitated by Cybersecurity Experts • Some exercises are self-paced • Customize teams to the needs of your organization • Training takes place at a Cyber Range facility or your site • All exercises mapped to the NICE Workforce Development framework.



Capture the Flag, or CTF, is a challenge designed to cover the spectrum of cybersecurity. From Python scripting and web application hijacking to penetrating SCADA networks, reverse engineering and database hacking, the exercise challenges participants’ technical skills. Attendees will also learn to become better defenders by using open source tools.

Participants will use open source tools to fire off live attacks on networked systems in real time. A self-paced exercise, the CTF is a means to assess individual skills across a broad range of systems.

Teams and individuals can play from any location in a complete Capture the Flag environment. This means that nobody can prevent another’s ability to capture a flag or achieve a challenge. User experience is augmented through the use of our scoreboard and 3D visualization of the Alphaville environment. This is ideal for Capstone activity.

CTF participants should have basic computer skills, familiarity with the command line, understanding of IP addressing and DNS, familiarity with basic security concepts, problem solving skills, and resourcefulness. Participants will not know all the solutions to problems encountered in the CTF. The solutions will require research outside of the game.

PLEASE NOTE: Participants are shown how to access to the CTF and how to interact with the environment. A proctor is onsite to solve technical problems only. No assistance in how to solve challenges is offered. All participants must hold intermediate to advanced cybersecurity and programming skills in order to succeed in the exercise.


The Cyber Defense Exercise scenario is a force-on-force cyber exercise that challenges cybersecurity professionals with a live, thinking, adapting adversary.

This exercise is completely customizable – your teams can attack, defend or both. Cyber Defense Exercise takes place in a subset of our larger Alphaville Training environment. Teams are assessed based on learning objectives in an after-action review.


Cyber Sentinel Active is a version of Cyber Sentinel that is intended to strengthen and assess the response capability of an organization’s already established Incident Response team. This exercise is intended for established teams who understand their current roles during an incident.

Your preexisting cyber incident response teams will play against one or more Red Teams to secure your network and conduct forensic analysis.


Cyber Sentinel Passive is a hands-on foundational Incident Response exercise that maps to the NIST 800 standards. Sentinel will lay the groundwork for establishing and strengthening your Incident Response teams, assigning team member roles and assessing your organization’s readiness to an actual incident. Newly formed teams should participate in this exercise – Cyber Range Analysts will leave forensic clues for your participants to work through as a team.

Teams will need to quickly distinguish between precursors, indicators and false positives to secure the network and conduct forensic analysis. Problem solving and tool selection play an integral role in progressing through the exercise, as well as utilizing various open source tools to enumerate actual threats. Traditionally this exercise is not scripted, and requires players to simulate their actions and policies as they would in defending a live network against passive adversaries.

• Preparation and IR planning

• Detection and analysis

• Containment, eradication and recovery

• Post-incident activity


Paintball is a multi-team-based engagement, which challenges the penetration and defense skills across the spectrum of cybersecurity. Similar to Capture The Flag, teams use open source tools to fire off live attacks on networked systems in  real time.

Teams compete against each other in the Alphaville environment with the goal of penetrating, controlling, and securing as many systems as possible.


Tabletop Exercises test and validate an organization’s ability to handle cyber incidents, and execute procedures at an organizational level.

Executives and employees from within finance, human resources, IT and legal departments should attend. Tabletop exercises are designed to facilitate discussion around policies and procedures.

The Michigan Cyber Range can design custom tabletop exercises to fit nearly any learning objective.

Examples include:

  • Continuity of operations
  • DDoS mitigation
  • Ransomware mitigation
  • Disaster recovery planning


Disaster recovery is of critical importance to every institution. Why not gamify scenarios and see if your team has what it takes to survive? Explore DR scenarios like never before by playing the role of a fictitious organization faced with dangerous cyber incidents.

Facilitated by Merit’s resident CISO, this tabletop exercise tests and validates an organization’s ability to handle cyber incidents and execute procedures at an organizational level. Tabletop exercises are designed to facilitate discussion around policies and procedures. In addition to playing through the exercise scenario, there are specific breakpoints in which the group will stop and discuss their actions and consequences, and specifically how those responses would have occurred in their own, actual environment.

The theme of the tabletop exercise will be a simulated disaster event at a fictitious, comparable organization. Players will work together to develop a response to the disaster based on their collective experience, taking away core knowledge needed to implement or enhance a successful DR plan at their own organizations. When deciding on actions to take place, “incident time” will occur based on the choices and selections made by the group. Random elements of both successes and failures are judiciously introduced during the course of the event to simulate the natural and realistic unknowns which take place during cybersecurity incidents. Players will have the ability to “level up” certain skills before the event, resulting in a more powerful incident response team and greater chances of successfully navigating the incident.

Players would ideally have visibility and understanding of all major IT components and how they interoperate. This would typically be a “DR Manager” or someone with the role of ensuring disaster recovery and business continuity within the IT group of your organization. However, participants of all levels of IT responsibility are encouraged to join and play.

Meritclasses Computers

The Michigan Cyber Range features a cybersecurity education experience based upon the National Institute of Standards and Technology (NIST) and the National Initiative for Cybersecurity Education (NICE) guidelines. The NICE framework organizes and presents the skills and work requirements that America’s cybersecurity workforce requires to support the National Preparedness Goals of detecting, mitigating, and defeating malicious actors and cyber-based threats. The framework engages all levels of the workforce, presenting essential concepts, techniques and practices based on an individual’s function within the organization.

These training opportunities, including DoD approved baseline certifications, are offered both as private classes for your organization and through our Cyber Range Hubs.

The 8570 compliant courses are offered through four out of the five recognized certification providers in partnership with Cyber World Institute. Merit Network is the only non-profit in North America able to offer EC Council, ISC2, CompTIA and ISACA. Courses are available live online, in person, and private on-site.

EC-Council classes are offered by Cyber World Institute, an EC-Council Accredited Training Center(ATC) Partner. All trademarks are sole property of EC-Council.

Statewide hubs operate as a physical extension of the Michigan Cyber Range, the nation’s largest unclassified cyber range. Hubs offer more than forty industry-recognized certifications, exercises and workshops aimed at qualifying individuals for positions and contracts in cybersecurity fields.


Scholarships may be available for Merit Members who may not otherwise be able to attend.

CWI Logo VT 3c Gradient

CCISO – Certified Chief Information Security Officer – EC-Council

The Certified CISO (CCISO) program is the first of its kind training and certification program aimed at producing top-level information security executives. The CCISO does not focus solely on technical knowledge but on the application of information security management principles from an executive management point of view. The program was developed by sitting CISOs for current and aspiring CISOs. In order to sit for the CCISO exam and earn the certification, candidates must meet the basic CCISO requirements.


CCSP – Certified Cloud Security Professional

The Certified Cloud Security Professional certification is most appropriate for those well versed in IT and information security, with some experience in cloud computing. The ideal candidate will have experience in applying security concepts and controls to cloud environments. To attain CCSP, applicants must have a minimum of five years of cumulative, paid, full-time working experience in information technology, of which three years must be in information security and one year in one of the six CBK domains. Earning the Cloud Security Alliance’s Certificate of Cloud Security Knowledge (CCSKTM) can be substituted for one year of experience in one of the six domains of the CCSP CBK. Earning the (ISC)² Certified Information Systems Security Professional (CISSP) credential can be substituted for the entire CCSP experience requirement.


CEH – Certified Ethical Hacker – EC-Council

A Certified Ethical Hacker is a skilled professional who understands and knows how to look for weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner to assess the security posture of a target system(s). The CEH credential certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective.


CHFI – Computer Hacking Forensic Investigator – EC-Council

The Computer Hacking Forensic Investigator course provides a strong baseline knowledge of key concepts and practices in the digital forensic domains relevant to today’s organizations. CHFI provides its attendees a firm grasp on the domains of digital forensics. In the event of a cyber-attack or incident, it is critical investigations be carried out in a manner that is forensically sound to preserve evidence in the event of a breach of the law.


CISSP – Certified Information Systems Security Professional – ISC2

As other CISSPs will tell you, this certification will raise your visibility and credibility, improve your job security, create new opportunities for you or even increase your salary — depending on your country and employer. Challenge yourself to grow and be better. The CISSP exam is a rigorous test of your knowledge. But well beyond the exam, the CISSP is about reaching a deeper, better and broader understanding of the common body of knowledge for cybersecurity. It’s an exhilarating feeling to become a CISSP.


ECIH – EC-Council Certified Incident Handler – EC-Council

The EC-Council Certified Incident Handler program is designed to provide the fundamental skills to handle and respond to the computer security incidents in an information system. The course addresses various underlying principles and techniques for detecting and responding to current and emerging computer security threats. Students will learn how to handle various types of incidents, risk assessment methodologies, and various laws and policy related to incident handling.


ECSA – EC-Council Certified Security Analyst – EC-Council

The ECSA penetration testing course provides you with a real world hands-on penetration testing experience and is a globally accepted hacking and penetration testing class available that covers the testing of modern infrastructures, operating systems and application environments while teaching the students how to document and write a penetration testing report.


L)PT – Licensed Penetration Tester – EC-Council

EC-Council’s prestigious endorsement as a licensed penetration testing professional, allows successful candidates to practice penetration testing and consulting internationally. You will need to demonstrate a mastery of the skills required to conduct a full blackbox penetration test of a network provided to you by EC-Council on our cyber range, iLabs. You will follow the entire process taught to you through Ethical Hacking and Security Assessment, taking you from reconnaissance, scanning, enumeration, gaining access, maintaining access, then exploiting vulnerabilities that you will have to seek out in a network that only a true professional will be able to break.


S+ – Security+ – CompTIA

IT security is paramount to organizations as cloud computing and mobile devices have changed the way we do business. With the massive amounts of data transmitted and stored on networks throughout the world, it’s essential to have effective security practices in place. That’s where CompTIA Security+ comes in. Get the Security+ certification to show that you have the skills to secure a network and deter hackers and you’re ready for the job.


CCNP – Cisco Certified Network Professional – CISCO

Cisco Certified Network Professional Security (CCNP Security) certification program is aligned specifically to the job role of the Cisco Network Security Engineer responsible for Security in Routers, Switches, Networking devices and appliances, as well as choosing, deploying, supporting and troubleshooting Firewalls, VPNS, and IDS/IPS solutions for their networking environments.


C)CSO – Certified Cloud Security Officer

The Cloud is being widely adopted today for a diverse set of reasons! However, many are finding that security in the cloud is a huge challenge! Either because of implementation or Governance. Yes, Governance of security related to your cloud vendor is a huge challenge. However, many global standards have been developed that provide a great baseline for cloud security along with governance. This course will provide for you what you do not find in other classes! The combination of knowledge combined into one source from the leading global standards. We also provide practical skills regarding implementing cloud security, auditing and compliance. This is all managed by a unique delivery of cloud security along with the hands-on labs needed to truly understand what is happening to your data at all the layers of the cloud stack. This is a relevant course which introduces many technologies used in the cloud from implementing a private cloud architecture to using a new key management solution from various vendors.


C)DFE – Certified Digital Forensics Examiner – Mile2*

The Certified Digital Forensics Examiner vendor neutral certification is designed to train Cyber Crime and Fraud Investigators whereby students are taught electronic discovery and advanced investigation techniques. This course is essential to anyone encountering digital evidence while conducting an investigation. The Certified Digital Forensics Examiner course will benefit organizations, individuals, government offices, and law enforcement agencies interested in pursuing litigation, proof of guilt, or corrective action based on digital evidence.


C)DRE – Certified Disaster Recovery Engineer – Mile2

The comprehensive Certified Disaster Recovery Engineer course goes beyond traditional BCP training -preparing students for industry certification in Business Continuity planning, and presenting the latest methodologies and best practices for real-world systems recovery. Students will receive a solid foundation of instruction that will enable them to create meaningful business continuity plans. This course offers up-to-date information that has been developed by leading risk management professionals.


C)FVE – Certified Virtualization Forensics Examiner

This course takes two enormously challenging areas facing IT security professionals today: incident response and virtualization and attempts to meld these together. Forensics is at the heart of incident response, and therefore this training will focus on how to gather evidence relating to an incident – the what, when, where, who and why of an incident – within today’s common virtual environments. Additionally, the course will take a deep dive into the virtual infrastructure, and contrast the various virtual entities against their physical counterparts. This will allow a clear demonstration of the forensically-relevant differences between the virtual and physical environments. The course uses a lab-centric, scenario-based approach to demonstrate how to forensically examine relevant components of a virtual infrastructure for specific use cases.


C)IHE – Certified Incident Handling Engineer – Mile2*

The Certified Incident Handling Engineer vendor neutral certification is designed to help Incident Handlers, System Administrators, and any General Security Engineers understand how to plan, create and utilize their systems in order to prevent, detect and respond to attacks. Furthermore, students will enjoy numerous hands-on laboratory exercises that focus on topics, such as reconnaissance, vulnerability assessments using Nessus, network sniffing, web application manipulation, malware and using Netcat plus several additional scenarios for both Windows and Linux systems.


C)ISRM – Certified Information Systems Risk Manager

The vendor neutral Certified Information Systems Risk Manager certification is designed for IT and IS professionals who are involved with risk identification, assessment & evaluation, risk response, risk monitoring, IS control design & implementation as well as IS control monitoring & maintenance.

The Certified Information Systems Risk Manager training will enable professionals to elevate their understanding in identifying and evaluating entity-specific risk but also aid them in assessing risks associated to enterprise business objectives by equipping the practitioner to design, implement, monitor and maintain risk-based, efficient and effective IS controls.

The Certified Information Systems Risk Manager covers 5 critical subjects; Risk Identification Assessment and Evaluation, Risk Response, Risk Monitoring, IS Control Design and Implementation and IS Control Monitoring & Maintenance.


C)ISSM – Certified Information Systems Security Manager – Mile2

The Certified Information Systems Security Manager covers the skills and knowledge to assess threat analysis and risks, Risk & incident management, Security programs and CISO roles, IS security strategy and frameworks, Audit and Risk management creation of policies, compliance and awareness, as well as DR and BCP development, deployment and maintenance.  The Certified Information Systems Security Manager will receive in-depth knowledge.


C)ISSO – Certified Information Systems Security Officer*

The C)ISSO 5 day course is designed for a forward-thinking security professional or consultant that manages or plays a key role in an organization’s information security department. The C)ISSO course/certification has been validated by the NSA for: CNSSI-4012, National Information Assurance Training Standard for Senior System Managers and NSTISSI – 4011, National Training Standard for Information Systems Security (INFOSEC). The C)ISSO addresses the broad range of industry best practices, knowledge and skills expected of a cyber security leader. The student will learn both the theory and the requirements for practical implementation of core security concepts, practices, monitoring and compliance. Through the use of a risk-based approach the C)ISSO is able to implement and maintain cost-effective security controls that is closely aligned with business requirements.


C)NFE – Certified Network Forensics Examiner – Mile2*

The C)NFE takes a digital and network forensic skill set to the next level by navigating through over twenty modules of network forensic topics. The CNFE provides practical experience through our lab exercises that simulate real-world scenarios that cover investigation and recovery of data in network, Physical Interception, Traffic Acquisition, Analysis, Wireless Attacks and SNORT. The course focuses on the centralizing and investigating of logging systems as well as network devices.


C)PEH – Certified Professional Ethical Hacker – Mile2*

The CPEH certification training enables students to understand the importance of vulnerability assessments by providing industry knowledge and skills in Vulnerability Assessments. In doing so, the CPEH student is able to understand how malware and destructive viruses function. In addition, the CPEH course helps students learn how to implement counter response and preventative measures when it comes to a network hack.


C)PSH – Certified PowerShell Hacker

This course is an intense few days covering the keys to hacking with PowerShell. We know that most companies have an Active Directory infrastructure that manages authentication and authorization to most devices and objects within the organization. Many use PowerShell to speed up and simplify management, which only makes sense. Did you know that a large percentage of hacks over the last year included PowerShell based attacks? Well, they did, which is why we spend 4 days learning how to hack like the pros using nothing but what is already available to us in Windows or now in open source code on Mac and Linux! The course is based on real-world implementations of a windows infrastructure along with real-world penetration testing techniques. You will leave with a really strong skill set to help test your windows environment like never before. An attendee will also walk away with a strong skill set on how to help prevent these attacks from happening in the first place!


C)PTC – Certified Penetration Testing Consultant – Mile2

The vendor neutral Certified Penetration Testing Consultant course is designed for IT Security Professionals and IT Network Administrators who are interested in conducting Penetration tests against large network infrastructures similar to large corporate networks, Services Providers and Telecommunication Companies.


C)PTE – Certified Penetration Testing Engineer – Mile2*

The C)PTE presents information based on the 5 Key Elements of Pen Testing; Information Gathering, Scanning, Enumeration, Exploitation and Reporting. The latest vulnerabilities will be discovered using these tried and true techniques. This course also enhances the business skills needed to identify protection opportunities, justify testing activities and optimize security controls to reduce risk associated to working with the internet.


C)SA1 – Certified Security Awareness 1

The Mile2® vendor-neutral Certified Security Awareness 1 certification course is intended for anyone that uses a computer on the internet. Attendees will understand the security threats as well as the countermeasures associated with these attacks. Employees will learn that the weakest link in any security program is a poorly trained department. This course teaches general security awareness as well as how to develop a strong security culture within your company’s community. The Social Engineering portion of the class is designed to teach the participants the skills used by Social Engineers to facilitate the extraction of information from an organization using technical and non-technical methods.


C)SA2 – Certified Security Awareness 2

The mile2® vendor-neutral Certified Security Awareness 2 course is to help the student take organizational cyber awareness to the next level. Attendees will understand the security threats that are associated with a company culture. The Certified Security Awareness 2 course provides lower and executive management a window as to the techniques of malicious hackers as well as the counter response controls management can implement to detour a major compromise.


C)SLO – Certified Security Leadership Officer – Mile2

The C)SLO course was designed to give management an essential understanding of current security issues, best practices, and technology. Because a security officer or manager understands the value of security, he or she is prepared to manage the security component of an information technology security projects. A C)SLO candidate can be seen as the bridge between the cyber security team and operations as well as business management.


C)SP – Certified Security Principles

Certified Security Principles course provides the skills necessary to apply and implement technical knowledge of security concepts in today’s security environment. Students will gain an in‐depth knowledge of systems security, access control, network infrastructure, assessments and audits, cryptography and organizational security across all vendor products.


C)SWAE – Certified Secure Web Application Engineer – Mile2*

The Secure Web programmer knows how to identify, mitigate and defend against all attacks through designing and building systems that are resistant to failure. The secure web application developer knows how to develop web applications that aren’t subject to common vulnerabilities, and how to test and validate that their applications are secure, reliable and resistant to attack. The vendor neutral Certified Secure Web Application Engineer certification provides the developer with a thorough and broad understanding of secure application concepts, principles and standards.


C)VCP – Certified Virtualization and Cloud Principles


C)VE – Certified Virtualization Engineer

This fast paced, high energy, hands-on course provides not only the foundation needed for a top performing software defined datacenter, it also provides the latest in virtualization and cloud technologies which gives the engineer or administrator the knowledge and skills needed to design and manage the datacenter for tomorrow’s needs. This course will cover everything from design, installation, configuration, best practices, performance monitoring, and just about everything in between!


C)VSE – Certified Virtualization Security Engineer

This fast paced, deep dive, hands-on course provides not only the foundation needed for highly secure deployment of VMware vSphere, it also provides a complete understanding of the CIA triad as it relates to virtualization. This course will cover everything from design, configuration, best practices, performance monitoring, and just about everything in between! We endeavor to provide an understanding of what can and cannot be performed to secure your virtualized datacenter!


IS20 Security Controls – Mile2

IS20 Controls certification course covers proven general controls and methodologies that are used to execute and analyze the Top Twenty Most Critical Security Controls. This course allows the security professional to see how to implement controls in their existing network(s) through highly effective and economical automation. For management, this training is the best way to distinguish how you’ll assess whether these security controls are effectively being administered or if they are falling short to industry standards.


ISCAP – Information Systems Certification and Accreditation Professional

Mile2’s Information Systems Certification and Accreditation Professional training quantifies the process of certifying, reviewing and accrediting an information system. This certification is designed to provide, through its contents and referenced resources, a complete guide to establishing a certifiable and accredited information system in any organization. This course was created as a standard to measure the set of skills that specific members of an organization is required to have for the practice of certifying, reviewing and accrediting the security of information systems. Specifically, this training was designed for the individuals who are responsible for creating and implementing the processes used to evaluate risk and institute security baselines and requirements. These critical decisions will be essential in making sure that the security of the information systems outweighs the potential risks to an organization from any internal or external threats. This three-day training course that will provide you and your team with the skills needed to recognize and construct a C&A program for new or legacy systems in accordance with the DIACAP Instruction 8510.01. This course also covers the ISC2 CAP course objectives.


*These classes are also available as part of the Merit Academy Program. See more details below.

Army Computer Worker

DoD 8570 to 8140

The Department of Defense (DoD) released the Cyberspace Workforce Management directive, DoD Directive (DoDD) 8140.01, on August 11, 2015. This directive is for personnel who support DoD intelligence, security and law enforcement missions in cyberspace. Through NIST Publication 800-181, the NICE Framework establishes 7 broad categories, 31 specialty areas, and 52 work roles. All supported by KSATs – Knowledge, Skills, Abilities, and Tasks.

8140.01 reissues and renumbers DoDD 8570.01 to update and expand established policies and assigned responsibilities for managing the DoD cyberspace workforce. The goal of this directive is to unify the overall cyberspace workforce and establish specific workforce elements (cyberspace effects, cybersecurity and cyberspace information technology) to align, manage and standardize cyberspace work roles, baseline qualifications and training requirements.

Until the Information Assurance (IA) Workforce Improvement Program 8140.01 manual is issued, the 8570.01 baseline certifications remain in effect.

It is important to note that the DoD has added new certifications to the 8570.01 – COMPTIAs CySA+, Logical Operations Certified First Responder CFR, and Cisco’s SCyber. The DoD Approved Baseline Certifications table provides a list of DoD-approved certifications aligned to each category and level of the IA workforce. Personnel performing IA functions must obtain one of the certifications required for their position’s category or specialty and level.

World Network Conectivity
Cyberworldinstitute Logo


Merit Network, in partnership with Cyber World Institute, is the only non-profit in North America able to offer EC-Council, ISC2, CompTIA and ISACA courses. Many classes include certification test fees and course offerings include most of the Department of Defense Directive 8570.1 requirements. 

EC-Council classes are offered by Cyber World Institute, an EC-Council Accredited Training Center(ATC) Partner. All trademarks are sole property of EC-Council.



IAT Level I
Network+ CE
IAT Level II
Security+ CE
CISSP (or Associate)


IAM Level I
Security+ CE
IAM Level II
CISSP (or Associate)
CISSP (or Associate)


CISSP (or Associate)
CISSP (or Associate)


CSSP Analyst1

CSSP Infrastructure Support1
CSSP Incident Responder1
CSSP Auditor1
CSSP Manager1

1 This certification is equivalent to the CND-SP certification cited in the DoD 8570.01-M. The name was changed from CND-SP to CCSP to reflect current terminology in the DoD Instruction 8530.01 “Cybersecurity Activities Support to DoD Information Network Operations.


The Merit Academy Program is the first of its kind in the nation, offering accredited cybersecurity certification courses that support your curriculum. This comes at a greatly reduced cost for institutions that have their own teaching or training staff. While the Academy program is used more often in a Higher Education platform, it is available to any organization. The duration of the course is at the sole discretion of the institution and is required to be greater than one week and less than six months in length. A Merit membership is required to offer the Academy Program.

  • Instructor portal includes: PowerPoint, lab guides, quiz and test generators, videos, study material and additional on-demand learning for students
  • Academy courses are accredited by the NSA, the National Initiative for Cybersecurity Education (NICE), the National Initiative for Cybersecurity Careers and Studies (NICCS), and ISACA.
  • Access to trainer and Merit staff best practices learning for students
  • Virtualized lab environment provides students and instructors with 24×7 access from anywhere in the world
  • Full curriculum and instructor materials provided to the instructor
  • Industry certified examination (upon institution approval) provided at no additional costs for all students and one re-take exam (optional) included
  • Early access to instructor material and virtual lab environment
  • While certificates do not comply with DOD 8570 credentialing, they are regarded as the best preparation courses to sit for those exams in the nation
  • Virtualized lab environment allows participants to practice live attacks and network scans without fear of damaging your production network or compromising institutional servers

CIHE: The Certified Incident Handling Engineer 5 day course is designed to help Incident Handlers, System Administrators, and Cyber Security Engineers understand how to plan, create and utilize their systems in order to prevent, detect and respond to attacks. In this in depth training, students will learn step-by-step approaches used by hackers globally, the latest attack vectors and how to safeguard against them, Incident Handling procedures (including developing the process from start to finish and establishing your Incident Handling team), strategies for each type of attack, recovering from attacks and much more.

The C)ISSO is internationally regarded as the most complete and comprehensive prep course to sit for the C)ISSP and includes instruction for all of the eight domains associated with proper Information Security Management. Where applicable, students may also receive proprietary study material for the C)ISSP exam in conjunction with the Mile2 curriculum. This course is theoretical and does not contain labs. Most members place this in the Information Security or MIS platform but that is at the member’s discretion.

The C)PEH training presents information on the latest exploit techniques, vulnerabilities and defenses. This class also enhances the business skills needed to identify protection opportunities, justify testing activities and optimize security controls appropriate to the business needs in order to reduce business risk. This course was developed based on principles and methods used by malicious hackers, but its focus is professional penetration testing and securing information assets. The course provides in-depth labs that focus on open source and commercial based tools, and on industry best practices. These hands-on labs emulate real world hacking scenarios. The labs equip the candidate to assess an organization’s security posture, help implement controls to better secure network infrastructure.

This course is the introductory training in the line of penetration testing courses and certifications. The course helps students gain a foundational knowledge of vulnerability assessments, penetration testing and report writing. Students will learn the process of penetration testing with an emphasis on the business skills needed to identify protection opportunities, justify testing activities and optimize security controls appropriate with organizational needs to reduce risk. The course provides in-depth labs that focus on both open source and commercial based tools with industry best practices. These hands-on labs emulate real world hacking scenarios and equip the candidate to assess your company’s security posture, help implement controls to better secure network infrastructure.

This course provides students with the knowledge and processes needed to identify and defend against security vulnerabilities in software applications. This course provides the aspiring developer or experienced developer with a thorough and broad understanding of secure application concepts, principles and standards. The student will be able to design, develop and test web applications that will provide reliable web services that meet functional business requirements and satisfy compliance and assurance needs. Students will put theory to practice by completing real world labs that include testing applications for software vulnerabilities, identifying weaknesses in design through architecture risks analysis and threat modeling and conducting secure code reviews. This course was developed in conjunction with leading OWASP experts and industry demand in web applications.

This course empowers the student to put together a more complete report using evidence from reconstructed and recovered network transactions. Students learn principles of network forensics analysis and how to apply them by using common tools to recognize traffic patterns associated with suspicious network behavior and subsequently perform network repair procedures. Students will put theory to practice by completing real world labs that simulate real-world scenarios, which cover investigation and recovery of data in network, physical interception, traffic acquisition, analysis, wireless attacks and SNORT. The course focuses on the centralizing and investigating of logging systems as well as network devices.

Certified Digital Forensics Examiner training teaches the methodology for conducting a computer forensic examination. Students will learn to use forensically sound investigative techniques in order to evaluate the scene, collect and document all relevant information, interview appropriate personnel, maintain chain-of-custody, and write a findings report. The Certified Digital Forensics Examiner course will benefit organizations, individuals, government offices, and law enforcement agencies interested in pursuing litigation, proof of guilt, or corrective action based on digital evidence.


• Security Officers

• IS Managers

• Agents/Police Officers

• Attorneys

• Data Owners

• IT managers

• IS Manager/Officers

WesternMichiganstack Gold Black
Lawrence Technological University
Augusta University


Fill out the form below, or contact us by calling 734-527-5700.

First Name*
Last Name*
Additional Comments/Questions
0 /
I am interested in receiving updates on Merit events, Merit news and the Michigan Moonshot.
FormCraft - WordPress form builder