Pre-approved Training for CompTIA A+ Continuing Education Units (CEUs)
Note: Training in this list is subject to change without prior notification. As CompTIA exams are updated so is this list. Training uploaded into a certification record by the candidate prior to the change will remain valid. Training earned that was listed previously and has not been uploaded into a certification record can no longer be used for CEUs.
Training approved in this document is based on the CompTIA A+ - 1101/1102 objectives.
CERTIFICATION PROVIDER | COURSE TITLE |
---|---|
AMAZON | DEVOPS ENGINEERING ON AWS |
DEVELOPING ON AWS | |
ARCHITECTING ON AWS | |
ADVANCED ARCHITECTING ON AWS | |
EXAM READINESS WORKSHOP: AWS CERTIFIED SOLUTIONS ARCHITECT - PROFESSIONAL | |
EXAM READINESS WORKSHOP: AWS CERTIFIED SOLUTIONS ARCHITECT - ASSOCIATE | |
AWS WELL-ARCHITECTED TRAINING | |
EXAM READINESS: AWS CERTIFIED DEVELOPER – ASSOCIATE | |
AWS CLOUD PRACTITIONER ESSENTIALS (SECOND EDITION) | |
AWS TECHNICAL ESSENTIALS | |
EXAM READINESS: AWS CERTIFIED ADVANCED NETWORKING - SPECIALTY | |
DATA ANALYTICS FUNDAMENTALS | |
BIG DATA ON AWS | |
SECURITY ENGINEERING ON AWS | |
EXAM READINESS: AWS CERTIFIED DEVOPS ENGINEER – PROFESSIONAL | |
EXAM READINESS: AWS CERTIFIED SYSOPS ADMINISTRATOR - ASSOCIATE | |
SYSTEMS OPERATIONS ON AWS | |
EXAM READINESS: AWS CERTIFIED SECURITY - SPECIALTY | |
ADVANCED DEVELOPING ON AWS | |
ADVANCED TESTING PRACTICES USING AWS DEVOPS TOOLS | |
ALEXA FOR DEVELOPERS | |
AMAZON API GATEWAY FOR SERVERLESS APPLICATIONS | |
AMAZON CONNECT: BUILD A CUSTOM CALL CONTROL PANEL | |
AMAZON ELASTIC KUBERNETES SERVICE (EKS) PRIMER | |
AMAZON FSX FOR LUSTRE PRIMER | |
AMAZON FSX FOR WINDOWS FILE SERVER PRIMER | |
AMAZON LUMBERYARD PRIMER | |
AMAZON WORKSPACES PRIMER | |
APPLICATION DEVELOPMENT USING AWS DYNAMODB | |
AWS CLOUD DEVELOPMENT KIT (CDK) PRIMER | |
AWS DATABASE OFFERINGS | |
AWS ELEMENTAL CONDUCTOR | |
AWS FOUNDATIONS: GETTING STARTED WITH THE AWS CLOUD ESSENTIALS | |
AWS HADOOP FUNDAMENTALS | |
AWS LAMBDA FOUNDATIONS | |
AWS SAAS FACTORY ARCHITECTURE TRACK: SAAS MIGRATION STRATEGIES | |
AWS SECURITY ESSENTIALS | |
AWS SECURITY FUNDAMENTALS (SECOND EDITION) | |
AWS SECURITY FUNDAMENTALS | |
AWS SECURITY HUB PRIMER | |
AWS SNOWBALL EDGE LOGISTICS AND PLANNING | |
AWS STORAGE GATEWAY PRIMER: FILE GATEWAY | |
AWS SYSTEMS MANAGER | |
BREAK FREE OF LEGACY DATABASES | |
CLOUD AUDIT ACADEMY | |
CONFIGURE AND DEPLOY AWS PRIVATELINK | |
DATA WAREHOUSING ON AWS | |
DEEP DIVE INTO AMAZON ELASTIC BLOCK STORE (EBS) | |
DEEP DIVE WITH SECURITY: AWS IDENTITY AND ACCESS MANAGEMENT (IAM) | |
DEPLOYING AND SCALING APPLICATIONS WITH AMAZON LIGHTSAIL | |
DIVE DEEP INTO AMAZON CONNECT REPORTING AND METRICS | |
GAME SERVER HOSTING WITH AMAZON EC2 | |
GETTING STARTED WITH AMAZON SIMPLE STORAGE SERVICE (AMAZON S3) | |
GETTING STARTED WITH AWS SECURITY, IDENTITY, AND COMPLIANCE | |
GETTING STARTED WITH DEVOPS ON AWS | |
INTERNET OF THINGS (IOT) MICROCONTROLLERS SERIES | |
INTRODUCTION TO BLOCKCHAIN | |
IOT EDGE COMPUTING: AWS IOT GREENGRASS PRIMER | |
MANAGING AMAZON SIMPLE STORAGE SERVICE (AMAZON S3) | |
MOBILE DEVELOPMENT IN IOT | |
PLANNING AN AWS OUTPOSTS IMPLEMENTATION | |
POSTGRESQL FUNDAMENTALS: ARCHITECTURE | |
SOME REALLY GOOD PRACTICES FOR IOT OPERATIONS | |
SPEAKING OF: MACHINE TRANSLATION AND NATURAL LANGUAGE PROCESSING (NLP) | |
TRANSIT GATEWAY NETWORKING AND SCALING | |
VISUALIZING WITH QUICKSIGHT | |
EXAM READINESS: AWS CERTIFIED DATA ANALYTICS – SPECIALTY | |
ARCITURA CLOUD SCHOOL | FUNDAMENTAL CLOUD ARCHITECTURE |
ADVANCED CLOUD ARCHITECTURE | |
FUNDAMENTAL CLOUD SECURITY | |
ADVANCED CLOUD SECURITY | |
FUNDAMENTAL CLOUD STORAGE | |
ADVANCED CLOUD STORAGE | |
FUNDAMENTAL CLOUD VIRTUALIZATION | |
ADVANCED CLOUD VIRTUALIZATION | |
FUNDAMENTAL CLOUD CAPACITY | |
ADVANCED CLOUD CAPACITY | |
FUNDAMENTAL CLOUD COMPUTING | |
CLOUD TECHNOLOGY CONCEPTS | |
BROADCOM/SYMANTEC | SYMANTEC DATA CENTER SECURITY – SERVER ADVANCED 6.7 ADMINISTRATION – MUST COMPLETE ALL MODULES FOR CEUS |
ENDPOINT PROTECTION 14: CONFIGURE AND PROTECT | |
SYMANTEC ENDPOINT PROTECTION 14: PLAN AND IMPLEMENT | |
SYMANTEC ENDPOINT PROTECTION 14: MANAGE AND ADMINISTER | |
SYMANTEC ENDPOINT PROTECTION 14: MAINTAIN AND TROUBLESHOOT | |
SYMANTEC DATA LOSS PREVENTION 15.0 ADMINISTRATION | |
SYMANTEC DATA LOSS PREVENTION 15.0 INSTALL AND DEPLOY | |
SYMANTEC DATA LOSS PREVENTION 15.0 DIFFERENCES | |
SYMANTEC IDENTITY AND AUTHENTICATION SERVICES R1 | |
PACKETSHAPER 11.9.1 ADMINISTRATION | |
SYMANTEC PROXYSG 6.6 BASIC ADMINISTRATION | |
SYMANTEC PROXYSG 6.6 ADVANCED ADMINISTRATION | |
SYMANTEC SECURITY ANALYTICS 7.2: ADMINISTRATOR | |
SYMANTEC SECURITY ANALYTICS 7.2: PROFESSIONAL | |
SSL VISIBILITY 5.0 ADMINISTRATION | |
CLOUDSOC ADMINISTRATION R2 | |
CLOUDSOC DIFFERENCES R2.1.1 | |
SYMANTEC ADVANCED THREAT PROTECTION 3.0: INCIDENT RESPONSE | |
SYMANTEC MESSAGING GATEWAY 10.6 ADMINISTRATION | |
SYMANTEC CONTROL COMPLIANCE SUITE (CCS) 11.0: ADMINISTRATION | |
EMAIL SECURITY.CLOUD ADMINISTRATION R1 | |
CHECK POINT | CHECK POINT CYBER SECURITY ADMINISTRATOR (CCSA) R80.10 |
CHECK POINT CYBER SECURITY ENGINEERING (CCSE) R80.10 | |
SECURITY MASTER - R80 | |
MULTI-DOMAIN SECURITY MANAGEMENT WITH VIRTUAL SYSTEM EXTENSION | |
CISCO | INTERCONNECTING CISCO NETWORKING DEVICES, PART 1 (ICND1) 3.0 |
IMPLEMENTING CISCO SECURE MOBILITY SOLUTIONS (SIMOS) 1.0 | |
DESIGNING FOR CISCO INTERNETWORK SOLUTIONS (DESGN) V3.0 | |
DESIGNING THE CISCO CLOUD (CLDDES) 1.0 | |
AUTOMATING THE CISCO ENTERPRISE CLOUD (CLDAUT) 1.0 | |
IMPLEMENTING CISCO THREAT CONTROL SOLUTIONS (SITCS) 1.5 |
|
DEPLOYING CISCO WIRELESS ENTERPRISE NETWORKS (WIDEPLOY) 1.0 | |
SECURING CISCO WIRELESS ENTERPRISE NETWORKS (WISECURE) 1.0 | |
MANAGING INDUSTRIAL NETWORKS FOR MANUFACTURING WITH CISCO TECHNOLOGIES (IMINS2) 1.3 | |
SUPPORTING CISCO DATA CENTER SYSTEM DEVICES (DCTECH) 2.0 | |
DESIGNING CISCO WIRELESS ENTERPRISE NETWORKS (WIDESIGN) 1.0 | |
IMPLEMENTING CISCO WIRELESS NETWORK FUNDAMENTALS (WIFUND) 1.0 | |
IMPLEMENTING CISCO NETWORK SECURITY (IINS) 3.0 | |
INTERCONNECTING CISCO NETWORKING DEVICES, PART 2 (ICND2) 3.0 | |
INTERCONNECTING CISCO NETWORKING DEVICES: ACCELERATED (CCNAX) 3.0 | |
DESIGNING CISCO NETWORK SERVICE ARCHITECTURES (ARCH) 3.0 | |
TROUBLESHOOTING AND MAINTAINING CISCO IP NETWORKS (TSHOOT) 2.0 | |
IMPLEMENTING CISCO IP SWITCHED NETWORKS (SWITCH) 2.0 | |
IMPLEMENTING CISCO IP ROUTING (ROUTE) 2.0 | |
UNDERSTANDING CISCO CLOUD FUNDAMENTALS (CLDFND) 1.0 | |
INTRODUCING CISCO CLOUD ADMINISTRATION (CLDADM) 1.0 | |
IMPLEMENTING AND TROUBLESHOOTING THE CISCO CLOUD INFRASTRUCTURE (CLDINF) 1.0 | |
INTRODUCING CISCO DATA CENTER NETWORKING (DCICN) 6.0 | |
INTRODUCING CISCO DATA CENTER NETWORKING TECHNOLOGIES (DCICT) 6.0 | |
IMPLEMENTING CISCO DATA CENTER UNIFIED COMPUTING (DCUCI) V6.0 | |
IMPLEMENTING CISCO DATA CENTER INFRASTRUCTURE (DCII) V6.0 | |
IMPLEMENTING CISCO DATA CENTER VIRTUALIZATION AND AUTOMATION (DCVAI) V6.0 | |
TROUBLESHOOTING CISCO DATA CENTER INFRASTRUCTURE (DCIT) V6.0 | |
UNDERSTANDING CISCO CYBERSECURITY FUNDAMENTALS (SECFND) | |
IMPLEMENTING CISCO CYBERSECURITY OPERATIONS (SECOPS) | |
IMPLEMENTING CISCO EDGE NETWORK SECURITY SOLUTIONS (SENSS) 1.0 | |
IMPLEMENTING CISCO SECURE ACCESS SOLUTIONS (SISAS) 1.0 | |
BUILDING CISCO SERVICE PROVIDER NEXT GENERATION NETWORKS, PART 2 (SPNGN2) 1.2 | |
DEPLOYING CISCO SERVICE PROVIDER NETWORK ROUTING (SPROUTE) | |
DEPLOYING CISCO SERVICE PROVIDER ADVANCED ROUTING (SPADVROUTE) | |
IMPLEMENTING CISCO SERVICE PROVIDER NEXT-GENERATION CORE NETWORK SERVICES (SPCORE) | |
IMPLEMENTING CISCO SERVICE PROVIDER NEXT-GENERATION EDGE NETWORK SERVICES (SPEDGE) | |
BUILDING CISCO SERVICE PROVIDER NEXT-GENERATION NETWORKS, PART 1 (SPNG1) | |
IMPLEMENTING CISCO VIDEO NETWORK DEVICES, PART 1 (CIVND1) | |
IMPLEMENTING CISCO VIDEO NETWORK DEVICES, PART 2 (CIVND2) | |
IMPLEMENTING CISCO IP TELEPHONY AND VIDEO, PART 1 (CIPTV1) | |
IMPLEMENTING CISCO IP TELEPHONY AND VIDEO, PART 2 (CIPTV2) | |
TROUBLESHOOTING CISCO IP TELEPHONY AND VIDEO (CTCOLLAB) | |
IMPLEMENTING CISCO COLLABORATION APPLICATIONS (CAPPS) | |
DEVELOPING APPLICATIONS AND AUTOMATING WORKFLOWS USING CISCO CORE PLATFORMS (DEVASC) | |
IMPLEMENTING AND ADMINISTERING CISCO SOLUTIONS (CCNA) | |
IMPLEMENTING AUTOMATION FOR CISCO ENTERPRISE SOLUTIONS (ENAUI) | |
IMPLEMENTING AUTOMATION FOR CISCO COLLABORATION SOLUTIONS (CLAUI) | |
IMPLEMENTING AUTOMATION FOR CISCO DATA CENTER SOLUTIONS (DCAUI) | |
IMPLEMENTING AUTOMATION FOR CISCO SERVICE PROVIDER SOLUTIONS (SPAUI) | |
IMPLEMENTING AUTOMATION FOR CISCO SECURITY SOLUTIONS (SAUI) | |
IMPLEMENTING DEVOPS SOLUTIONS AND PRACTICES USING CISCO PLATFORMS (DEVOPS) | |
DEVELOPING SOLUTIONS USING CISCO IOT AND EDGE PLATFORMS (DEVIOT) | |
IMPLEMENTING AND OPERATING CISCO ENTERPRISE NETWORK CORE TECHNOLOGIES (ENCOR) | |
IMPLEMENTING CISCO ENTERPRISE ADVANCED ROUTING AND SERVICES (ENARSI) | |
IMPLEMENTING CISCO SD-WAN SOLUTIONS (SDWAN300) | |
DESIGNING CISCO ENTERPRISE NETWORKS (ENSLD) | |
DESIGNING CISCO ENTERPRISE WIRELESS NETWORKS (ENWLSD) | |
IMPLEMENTING CISCO ENTERPRISE WIRELESS NETWORKS (ENWLSI) | |
IMPLEMENTING AND OPERATING CISCO COLLABORATION CORE TECHNOLOGIES (CLCOR) | |
IMPLEMENTING CISCO COLLABORATION CLOUD AND EDGE SOLUTIONS (CLCEI) | |
IMPLEMENTING AND OPERATING CISCO DATA CENTER CORE TECHNOLOGIES (DCCOR) | |
DESIGNING CISCO DATA CENTER INFRASTRUCTURE (DCID) | |
IMPLEMENTING CISCO APPLICATION CENTRIC INFRASTRUCTURE (DCACI) | |
CONFIGURING CISCO MDS 9000 SERIES SWITCHES (DCMDS) | |
IMPLEMENTING AND OPERATING CISCO SECURITY CORE TECHNOLOGIES (SCOR) | |
SECURING NETWORKS WITH CISCO FIREPOWER NEXT GENERATION FIREWALL (SSNGFW) | |
SECURING NETWORKS WITH CISCO FIREPOWER NEXT-GENERATION IPS (SSFIPS) | |
IMPLEMENTING AND CONFIGURING CISCO IDENTITY SERVICES ENGINE (SISE) | |
SECURING EMAIL WITH CISCO EMAIL SECURITY APPLIANCE (SESA) | |
SECURING THE WEB WITH CISCO WEB SECURITY APPLIANCE (SWSA) | |
IMPLEMENTING SECURE SOLUTIONS WITH VIRTUAL PRIVATE NETWORKS (SVPN) | |
IMPLEMENTING AND OPERATING CISCO SERVICE PROVIDER NETWORK CORE TECHNOLOGIES (SPCOR) | |
IMPLEMENTING CISCO SERVICE PROVIDER ADVANCED ROUTING SOLUTIONS (SPRI) | |
IMPLEMENTING CISCO SERVICE PROVIDER VPN SERVICES (SPVI) | |
SUPPORTING CISCO ROUTING AND SWITCHING NETWORK DEVICES | |
CITRIX | CXM-302 DESIGN, DEPLOY AND MANAGE ENTERPRISE MOBILITY WITH XENMOBILE 9.0 |
CXD-210: CITRIX XENAPP AND XENDESKTOP ADMINISTRATION | |
CXD-310: CITRIX XENAPP AND XENDESKTOP ADVANCED ADMINISTRATION | |
CXD-400 DESIGNING APP AND DESKTOP SOLUTIONS WITH CITRIX XENAPP AND XENDESKTOP | |
CNS-220: CITRIX NETSCALER ESSENTIALS AND TRAFFIC MANAGEMENT | |
CNS-222: CITRIX NETSCALER ESSENTIALS AND UNIFIED GATEWAY | |
CNS-219: CITRIX NETSCALER TRAFFIC MANAGEMENT | |
CNS-221: CITRIX NETSCALER UNIFIED GATEWAY | |
NETSCALER SD-WAN | |
CNS-320: CITRIX NETSCALER ADVANCED TOPICS – SECURITY, MANAGEMENT, AND OPTIMIZATION | |
CXM-303 DEPLOYING ENTERPRISE MOBILITY SOLUTIONS WITH CITRIX XENMOBILE | |
Cloud Security Alliance | CCSK FOUNDATION |
COMPTIA | COMPTIA ADVANCED SECURITY PRACTITIONER (CASP+) (CAS-004) |
COMPTIA NETWORK+ (N10-008) | |
COMPTIA SECURITY+ (SY0-601) | |
COMPTIA A+ 1101/1102 – APPROVED ONLY FOR THOSE CERTIFIED IN A+ 1001/1002 AND EARLIER EXAM SERIES | |
COMPTIA SERVER+ (SK0-004) | |
COMPTIA LINUX+ (XK0-004) | |
COMPTIA CYBERSECURITY ANALYST (CySA+) (CS0-002) | |
COMPTIA CLOUD+ (CV0-003) | |
COMPTIA PENTEST+ (PT0-002) | |
COMPTIA CERTMASTER LEARN FOR A+ 1101/1102 - 20 CEUS – APPROVED ONLY FOR THOSE CERTIFIED IN A+ 1001/1002 AND EARLIER EXAM SERIES | |
COMPTIA CERTMASTER PRACTICE FOR A+ 1101/1102 - 10 CEUS – APPROVED ONLY FOR THOSE CERTIFIED IN A+ 1001/1002 AND EARLIER EXAM SERIES | |
COMPTIA CERTMASTER LEARN FOR NETWORK+ N10-008 - 30 CEUS | |
COMPTIA CERTMASTER PRACTICE FOR NETWORK+ N10-008 - 10 CEUS | |
COMPTIA CERTMASTER LEARN FOR SECURITY+ SY0-601- 40 CEUS | |
COMPTIA CERTMASTER PRACTICE FOR SECURITY+ SY0-601 - 10 CEUS | |
COMPTIA CERTMASTER LEARN FOR LINUX+ XK0-004 - 30 CEUS | |
COMPTIA CERTMASTER PRACTICE FOR LINUX+ XK0-004 - 10 CEUS | |
COMPTIA CERTMASTER LEARN FOR CLOUD+ CV0-003 - 25 CEUS | |
COMPTIA CERTMASTER PRACTICE FOR CLOUD+ CV0-003 - 10 CEUS | |
COMPTIA CERTMASTER LEARN FOR PENTEST+ PT0-002 - 25 CEUS | |
COMPTIA CERTMASTER PRACTICE FOR PENTEST+ PT0-002 - 10 CEUS | |
COMPTIA CERTMASTER LEARN FOR CYSA+ CS0-002 - 25 CEUS | |
COMPTIA CERTMASTER PRACTICE FOR CYSA+ CS0-002 - 10 CEUS | |
CWNP | CWTS - CERTIFIED WIRELESS TECHNOLOGY SPECIALIST |
CWNA - CERTIFIED WIRELESS NETWORK ADMINISTRATOR | |
CWSP - CERTIFIED WIRELESS SECURITY PROFESSIONAL | |
CWDP – CERTIFIED WIRELESS DESIGN PROFESSIONAL | |
CWAP - CERTIFIED WIRELESS ANALYSIS PROFESSIONAL | |
CWS - CERTIFIED WIRELESS SPECIALIST | |
EC-COUNCIL | CERTIFIED ETHICAL HACKER (CEH) V11 |
CERTIFIED SECURITY ANALYST (ECSA) V10 | |
DISASTER RECOVERY PROFESSIONAL (EDRP) | |
COMPUTER HACKING FORENSICS INVESTIGATOR (CHFI) | |
CERTIFIED CHIEF INFORMATION SECURITY OFFICER (CCISO) | |
CERTIFIED SECURITY SPECIALIST (ECSS) | |
CERTIFIED INCIDENT HANDLER (ECIH) | |
CERTIFIED ENCRYPTION SPECIALIST (ECES) | |
EC-COUNCIL INFORMATION SECURITY MANAGEMENT (EISM) | |
CERTIFIED NETWORK DEFENDER (CND) | |
CERTIFIED NETWORK DEFENSE ARCHITECT (CNDA) | |
CYBER THREAT INTELLIGENCE ANALYST (CTIA) | |
ADVANCED PENETRATION TESTING (APT) | |
ENCASE | IR250 - INCIDENT INVESTIGATION |
DFIR370 - HOST INTRUSION METHODOLOGY AND INVESTIGATION | |
ED290 ENCASE EDISCOVERY | |
DF120 - FOUNDATIONS IN DIGITAL FORENSICS WITH ENCASE | |
DF125 - MOBILE DEVICE EXAMINATIONS WITH ENCASE | |
DF210 - BUILDING AN INVESTIGATION WITH ENCASE | |
DF310 - ENCASE ENCE PREP COURSE | |
DF320 - ADVANCED ANALYSIS OF WINDOWS ARTIFACTS WITH ENCASE | |
DF410 - NTFS EXAMINATIONS WITH ENCASE | |
IR280 ENCASE ENDPOINT SECURITY | |
DFIR130 ENCASE ENDPOINT INVESTIGATOR TRAINING | |
DFIR350 INTERNET-BASED INVESTIGATIONS WITH ENCASE | |
GOOGLE CLOUD PLATFORM FUNDAMENTALS FOR AWS PROFESSIONALS | |
ARCHITECTING WITH GOOGLE COMPUTE ENGINE | |
DATA ENGINEERING ON GOOGLE CLOUD PLATFORM | |
DEVELOPING APPLICATIONS WITH GOOGLE CLOUD PLATFORM | |
NETWORKING IN GOOGLE CLOUD PLATFORM | |
SECURITY IN GOOGLE CLOUD PLATFORM | |
GOOGLE’S APPLIED DIGITAL SKILLS | |
HPE | DESIGNING HP DATA CENTER AND CLOUD SOLUTIONS, REV. 15.11 |
DESIGNING HPE DATA CENTER AND CLOUD SOLUTIONS, REV. 16.11 | |
DELTA - DESIGNING HPE DATA CENTER AND CLOUD SOLUTIONS, REV. 16.11 | |
CREATING HPE SOFTWARE-DEFINED NETWORKS, REV. 15.41 | |
BUILDING HP FLEXFABRIC DATA CENTERS, REV. 14.41 | |
ARCHITECTING HP FLEXNETWORK SOLUTIONS, REV 14.21 | |
DEPLOYING HP FLEXNETWORK CORE TECHNOLOGIES, REV 14.31 | |
HP-UX SECURITY I | |
HP INTEGRITY VIRTUAL MACHINES V4.3 ADMINISTRATION | |
HP-UX LOGICAL VOLUME MANAGER | |
HP INTEGRITY VM V6 AND HP-UX VPARS V6 ADMINISTRATION | |
HP-UX PERFORMANCE AND TUNING | |
HP SERVICEGUARD I | |
HP SYSTEMS INSIGHT MANAGER | |
HPE ARCSIGHT MASTER ASE PREPARATION COURSE | |
ARCSIGHT ESM 6.5 ADVANCED ADMINISTRATOR | |
ARCSIGHT ESM 6.5 ADVANCED ANALYST | |
ARCSIGHT LOGGER - 6.0 ADMINISTRATION AND OPERATIONS | |
DYNAMIC APPLICATION TESTING WITH HP WEBINSPECT 10.3 | |
HP FORTIFY STATIC CODE ANALYZER / SOFTWARE SECURITY CENTER 4.2 | |
HPE/ARUBA | IMPLEMENTING ARUBA WLAN (IAW) 8 |
DESIGNING ADVANCED MOBILITY SOLUTIONS (DAMS) | |
CLEARPASS ESSENTIALS | |
SCALABLE WLAN DESIGN & IMPLEMENTATION (SWDI) V8 | |
ADVANCED MOBILITY SOLUTIONS & TROUBLESHOOTING (AMST) | |
CLEARPASS ADVANCED (CPA) | |
DESIGNING ARUBA SOLUTIONS (DAS) | |
IMPLEMENTING ARUBA CAMPUS SWITCHING SOLUTIONS (IACSS) | |
CLEARPASS FUNDAMENTALS | |
ARUBA SWITCHING FUNDAMENTALS (ASF) | |
ISACA | CISM EXAM REVIEW |
CRISC EXAM REVIEW | |
CSX PRACTITIONER: IDENTIFICATION AND PROTECTION | |
CSX PRACTITIONER: RESPOND AND RECOVER | |
CSX PRACTITIONER BOOT CAMP | |
CSX PRACTITIONER: DETECTION | |
CISA EXAM REVIEW | |
ISC(2) | (ISC)2TRAINING FOR CISSP |
(ISC)2TRAINING FOR HCISPP | |
(ISC)2TRAINING FOR CISSP-ISSAP | |
(ISC)2TRAINING FOR SSCP | |
(ISC)2 TRAINING FOR CISSP-ISSEP | |
(ISC)2 TRAINING FOR CISSP-ISSMP | |
JUNIPER | JUNIPER NETWORKS DESIGN FUNDAMENTALS (JNDF) |
ADVANCED JUNOS ENTERPRISE ROUTING (AJER) | |
ADVANCED JUNOS ENTERPRISE SWITCHING (AJEX) | |
ADVANCED JUNOS SECURITY (AJSEC) | |
ADVANCED JUNOS SERVICE PROVIDER ROUTING (AJSPR) | |
JUNOS ENTERPRISE SWITCHING (JEX) | |
JUNOS INTERMEDIATE ROUTING (JIR) | |
NETWORK AUTOMATION USING CONTRAIL CLOUD (NACC) | |
JUNOS SERVICE PROVIDER SWITCHING (JSPX) | |
INTRODUCTION TO THE JUNOS OPERATING SYSTEM (IJOS) | |
JUNIPER NETWORKS DESIGN - DATA CENTER (JND-DC) | |
JUNOS EDGE SECURITY SERVICES (JESS) | |
JUNOS LAYER 3 VPNS (JL3V) | |
JUNOS LAYER 2 VPNS (JL2V) | |
JUNOS MPLS FUNDAMENTALS (JMF) | |
JUNOS FOR SECURITY PLATFORMS (JSEC) | |
JUNIPER NETWORKS DESIGN-SERVICE PROVIDER (JND-SP) | |
JUNIPER NETWORKS DESIGN FUNDAMENTALS (JNDF) | |
LINUX | LINUX SECURITY |
LINUX SYSTEM ADMINISTRATION | |
MASTERING THE LINUX COMMAND LINE | |
INTRODUCTION TO VMWARE ESXI | |
SOFTWARE DEFINED NETWORKING WITH OPENDAYLIGHT | |
ADVANCED LINUX SYSTEM ADMINISTRATION AND NETWORKING | |
ESSENTIALS OF SYSTEM ADMINISTRATION | |
PENETRATION TESTING WITH LINUX TOOLS | |
LINUX IN THE REAL WORLD | |
CENTOS SYSTEM ADMINISTRATOR PREP | |
LINUX ESSENTIALS | |
PUPPET FUNDAMENTALS | |
COMPLIANCE BASICS FOR DEVELOPERS | |
SOFTWARE DEFINED NETWORKING WITH OPENDAYLIGHT | |
OPEN SOURCE VIRTUALIZATION | |
LINUX ENTERPRISE AUTOMATION | |
ESSENTIALS OF OPENSTACK ADMINISTRATION | |
LINUX SECURITY | |
HIGH AVAILABILITY LINUX ARCHITECTURE | |
LINUX PERFORMANCE TUNING | |
LINUX SYSTEM ADMINISTRATION | |
ADVANCED LINUX SYSTEM ADMINISTRATION AND NETWORKING | |
INTRODUCTION TO LINUX, OPEN SOURCE DEVELOPMENT, AND GIT | |
INSIDE ANDROID: AN INTRO TO ANDROID INTERNALS | |
OPTIMIZING LINUX DEVICE DRIVERS FOR POWER EFFICIENCY | |
LINUX KERNEL DEBUGGING AND SECURITY | |
INTRODUCTION TO LINUX | |
INTRODUCTION TO CLOUD INFRASTRUCTURE TECHNOLOGIES | |
LINUX NETWORKING AND ADMINISTRATION | |
LINUX SECURITY FUNDAMENTALS | |
OPENSTACK ADMINISTRATION FUNDAMENTALS | |
SOFTWARE DEFINED NETWORKING FUNDAMENTALS | |
FUNDAMENTALS OF LINUX | |
MICROSOFT | INSTALLING AND CONFIGURING WINDOWS 10 |
DEPLOYING AND MANAGING WINDOWS 10 USING ENTERPRISE SERVICES | |
INSTALLING AND CONFIGURING WINDOWS® 7 CLIENT | |
TROUBLESHOOTING AND SUPPORTING WINDOWS® 7 IN THE ENTERPRISE | |
PLANNING AND MANAGING WINDOWS® 7 DESKTOP DEPLOYMENTS AND ENVIRONMENTS | |
DEPLOYING WINDOWS DESKTOPS AND ENTERPRISE APPLICATIONS | |
SUPPORTING AND TROUBLESHOOTING WINDOWS 10 | |
NETWORKING FUNDAMENTALS | |
SECURITY FUNDAMENTALS | |
CONFIGURING WINDOWS® 8.1 | |
SUPPORTING WINDOWS® 8.1 | |
WINDOWS SERVER ADMINISTRATION FUNDAMENTALS | |
INSTALLATION, STORAGE, AND COMPUTE WITH WINDOWS SERVER 2016 | |
NETWORKING WITH WINDOWS SERVER 2016 | |
IDENTITY WITH WINDOWS SERVER 2016 | |
INSTALLING AND CONFIGURING WINDOWS SERVER 2012 | |
ADMINISTERING WINDOWS SERVER 2012 | |
CONFIGURING ADVANCED WINDOWS SERVER 2012 SERVICES | |
DESIGNING AND IMPLEMENTING A SERVER INFRASTRUCTURE | |
IMPLEMENTING AN ADVANCED SERVER INFRASTRUCTURE | |
CORE SOLUTIONS OF MICROSOFT EXCHANGE SERVER 2013 | |
ADVANCED SOLUTIONS OF MICROSOFT EXCHANGE SERVER 2013 | |
DEPLOYING ENTERPRISE VOICE WITH SKYPE FOR BUSINESS 2015 | |
ADMINISTERING MICROSOFT EXCHANGE SERVER 2016 | |
CORE SOLUTIONS OF SKYPE FOR BUSINESS 2015 | |
DESIGNING AND DEPLOYING MICROSOFT EXCHANGE SERVER 2016 | |
SERVER VIRTUALIZATION WITH WINDOWS SERVER HYPER-V AND SYSTEM CENTER | |
ADMINISTERING SYSTEM CENTER CONFIGURATION MANAGER AND INTUNE | |
MONITORING AND OPERATING A PRIVATE CLOUD | |
CONFIGURING AND DEPLOYING A PRIVATE CLOUD | |
ENABLING AND MANAGING OFFICE 365 | |
ADMINISTERING A SQL DATABASE INFRASTRUCTURE | |
DEVELOPING MICROSOFT AZURE SOLUTIONS | |
IMPLEMENTING MICROSOFT AZURE INFRASTRUCTURE SOLUTIONS | |
SECURING WINDOWS SERVER 2016 | |
DESIGNING AND IMPLEMENTING CLOUD DATA PLATFORM SOLUTIONS | |
DEPLOYING VOICE WORKLOADS FOR SKYPE FOR BUSINESS ONLINE AND SERVER 2015 | |
DESIGNING A DATA SOLUTION WITH MICROSOFT SQL SERVER | |
VIRTUALIZING ENTERPRISE DESKTOPS AND APPS | |
WINDOWS SERVER 2012: TECHNICAL OVERVIEW | |
WINDOWS 10 FEATURES FOR A MOBILE WORKFORCE | |
WINDOWS SERVER 2012 TRAINING: NETWORKING | |
WINDOWS SERVER 2012: IDENTITY AND ACCESS | |
WINDOWS SERVER 2012: STORAGE | |
DEVELOPING MICROSOFT SQL SERVER DATABASES | |
DESIGNING DATABASE SOLUTIONS FOR SQL SERVER | |
OFFENSIVE SECURITY | PENETRATION TESTINGWITH KALI LINUX |
ADVANCED WINDOWS EXPLOITATION | |
OFFENSIVE SECURITY WIRELESS ATTACKS (WIFU) | |
CRACKING THE PERIMETER (CTP) | |
ADVANCED WEB ATTACKS AND EXPLOITATION | |
METASPLOIT UNLEASHED | |
OFFENSIVE SECURITY PENETRATIONTESTING LAB | |
PALO ALTO | FIREWALL 9.0 ESSENTIALS: CONFIGURATION AND MANAGEMENT (EDU-210) |
PANORAMA 8.1: MANAGING FIREWALLS AT SCALE (EDU-220) | |
RED HAT | RED HAT SYSTEM ADMINISTRATION I (RH124) |
RED HAT SYSTEM ADMINISTRATION II (RH134) | |
RED HAT OPENSTACK ADMINISTRATION I (CL110) | |
RED HAT OPENSTACK ADMINISTRATION II (CL210) | |
RED HAT SYSTEM ADMINISTRATION III (RH254) | |
RED HAT OPENSTACK SYSTEM ADMINISTRATION III (CL310) | |
RED HAT CLOUDFORMS HYBRID CLOUD MANAGEMENT (CL220) | |
OPENSHIFT ENTERPRISE ADMINISTRATION (DO280) | |
RED HAT GLUSTER STORAGE ADMINISTRATION (RH236) | |
RED HAT VIRTUALIZATION ADMINISTRATION (RH318) | |
RED HAT JBOSS IN DATA VIRTUALIZATION ADMINISTRATION (JB450) | |
JBOSS ENTERPRISE APPLICATION DEVELOPMENT (JB225) | |
RED HAT ENTERPRISE DEPLOYMENT AND SYSTEMS MANAGEMENT (RH401) | |
RED HAT SATELLITE 6 ADMINISTRATION (RH403) | |
RED HAT ENTERPRISE LINUX DIAGNOSTICS AND TROUBLESHOOTING | |
RED HAT ENTERPRISE PERFORMANCE TUNING (RH442) | |
RED HAT HIGH AVAILABILITY CLUSTERING (RH436) | |
JBOSS APPLICATION ADMINISTRATION I (JB248) | |
RED HAT SECURITY: Linux in Physical, Virtual, and Cloud (RH415) | |
AUTOMATION WITH ANSIBLE II: ANSIBLE TOWER (DO409) | |
SABSA | SABSA FOUNDATION MODULES (F1 & F2) |
MODULE A1 – ADVANCED SABSA RISK ASSURANCE & GOVERNANCE | |
MODULE A3 – ADVANCED SABSA ARCHITECTURE & DESIGN | |
SANS | NETWARS - TOURNAMENT |
NETWARS: CONTINUOUS | |
AUD507: AUDITING & MONITORING NETWORKS, PERIMETERS & SYSTEMS | |
FOR508: ADVANCED COMPUTER FORENSIC ANALYSIS AND INCIDENT RESPONSE | |
FOR518: MAC FORENSIC ANALYSIS | |
FOR578: CYBER THREAT INTELLIGENCE | |
FOR526: MEMORY FORENSICS IN-DEPTH | |
FOR572: ADVANCED NETWORK FORENSICS AND ANALYSIS | |
FOR585: ADVANCED SMARTPHONE AND MOBILE DEVICE FORENSICS | |
FOR610: REVERSE-ENGINEERING MALWARE: MALWARE ANALYSIS TOOLS AND TECHNIQUES | |
ICS515: ICS ACTIVE DEFENSE AND INCIDENT RESPONSE | |
ICS410: ICS/SCADA SECURITY ESSENTIALS | |
ICS456: ESSENTIALS FOR NERC CRITICAL INFRASTRUCTURE PROTECTION | |
MGT414: SANS +S TRAINING PROGRAM FOR THE CISSP® CERTIFICATION EXAM | |
MGT512: SANS SECURITY LEADERSHIP ESSENTIALS FOR MANAGERS WITH KNOWLEDGE COMPRESSION | |
MGT514: IT SECURITY STRATEGIC PLANNING, POLICY AND LEADERSHIP | |
LEG523: LAW OF DATA SECURITY AND INVESTIGATIONS | |
SEC301: INTRO TO INFORMATION SECURITY | |
SEC401: SECURITY ESSENTIALS BOOTCAMP STYLE | |
SEC440: CRITICAL SECURITY CONTROLS: PLANNING, IMPLEMENTING AND AUDITING | |
SEC501: ADVANCED SECURITY ESSENTIALS - ENTERPRISE DEFENDER | |
SEC503: INTRUSION DETECTION IN-DEPTH | |
SEC504: HACKER TOOLS, TECHNIQUES, EXPLOITS AND INCIDENT HANDLING | |
SEC505: SECURING WINDOWS WITH THE CRITICAL SECURITY CONTROLS | |
SEC506: SECURING LINUX/UNIX | |
SEC511: CONTINUOUS MONITORING AND SECURITY OPERATIONS | |
SEC524: CLOUD SECURITY FUNDAMENTALS | |
SEC542: WEB APP PENETRATION TESTING AND ETHICAL HACKING | |
SEC546: IPV6 ESSENTIALS | |
SEC550: ACTIVE DEFENSE, OFFENSIVE COUNTERMEASURES AND CYBER DECEPTION | |
SEC560: NETWORK PENETRATION TESTING AND ETHICAL HACKING | |
SEC561: INTENSE HANDS-ON PEN TESTING SKILL DEVELOPMENT (WITH SANS NETWARS) | |
SEC562: CYBERCITY HANDS-ON KINETIC CYBER RANGE EXERCISE | |
SEC566: IMPLEMENTING AND AUDITING THE CRITICAL SECURITY CONTROLS - IN-DEPTH | |
SEC573: PYTHON FOR PENETRATION TESTERS | |
SEC575: MOBILE DEVICE SECURITY AND ETHICAL HACKING | |
SEC579: VIRTUALIZATION AND PRIVATE CLOUD SECURITY | |
SEC580: METASPLOIT KUNG FU FOR ENTERPRISE PEN TESTING | |
SEC617: WIRELESS ETHICAL HACKING, PENETRATION TESTING, AND DEFENSES | |
SEC642: ADVANCED WEB APP PENETRATION TESTING AND ETHICAL HACKING | |
SEC660: ADVANCED PENETRATION TESTING, EXPLOIT WRITING, AND ETHICAL HACKING | |
SEC760: ADVANCED EXPLOIT DEVELOPMENT FOR PENETRATION TESTERS | |
FOR500: WINDOWS FORENSIC ANALYSIS | |
SEC573: AUTOMATING INFORMATION SECURITY WITH PYTHON | |
SEC599: DEFEATING ADVANCED ADVERSARIES - PURPLE TEAM TACTICS & KILL CHAIN DEFENSES | |
SEC555: SIEM WITH TACTICAL ANALYTICS | |
SEC530: DEFENSIBLE SECURITY ARCHITECTURE | |
SEC599: Defeating Advanced Adversaries - Purple Team Tactics & Kill Chain Defenses | |
SPLUNK | USING SPLUNK ENTERPRISE SECURITY |
VMWARE | VMWARE HORIZON 7: INSTALL, CONFIGURE, MANAGE [V7] |
VMWARE HORIZON 7: TROUBLESHOOTING AND PERFORMANCE OPTIMIZATION [V7] | |
VMWARE NSX-T: INSTALL, CONFIGURE, MANAGE [V2.2] | |
VMWARE NSX-T DATA CENTER: INSTALL, CONFIGURE, MANAGE [V2.4] | |
VMWARE NSX-T DATA CENTER: TROUBLESHOOTING AND OPERATIONS [V2.4] | |
VMWARE NSX-T DATA CENTER: DESIGN [V2.4] | |
VMWARE VSPHERE: DESIGN WORKSHOP [V6.5] | |
VMWARE HORIZON 7: DESIGN WORKSHOP [V7.0] | |
HORIZON: DESIGN AND DEPLOY [V6] | |
VCA-DBT | |
VMWARE NSX: TROUBLESHOOTING AND OPERATIONS [V6.4] | |
VMWARE NSX: INSTALL, CONFIGURE, MANAGE [V6.4] | |
VMWARE VSPHERE: INSTALL, CONFIGURE, MANAGE [V6.7] | |
VMWARE VSPHERE: OPTIMIZE AND SCALE [V6.7] | |
VMWARE VSPHERE: SKILLS FOR PUBLIC SECTOR ADMINISTRATORS [V6.7] | |
VMWARE VSPHERE: TROUBLESHOOTING WORKSHOP [V6.7] | |
VMWARE ADVANCED SKILLS FOR VSPHERE PROFESSIONAL WORKSHOP [V6.7] | |
VMWARE WORKSPACE ONE: DEPLOY AND MANAGE [V19.X] | |
VMWARE WORKSPACE ONE: INTEGRATING THE DIGITAL WORKSPACE [V19.X] | |
VMWARE WORKSPACE ONE: SKILLS FOR UNIFIED ENDPOINT MANAGEMENT [V19.X] |
If you have questions about specific stages of the certification renewal process, head over to our Help pages to find additional information, or contact our customer service team.