CompTIA A+

Pre-approved Training for CompTIA A+ Continuing Education Units (CEUs)

Note: Training in this list is subject to change without prior notification. As CompTIA exams are updated so is this list. Training uploaded into a certification record by the candidate prior to the change will remain valid. Training earned that was listed previously and has not been uploaded into a certification record can no longer be used for CEUs.

Training approved in this document is based on the CompTIA A+ - 1101/1102 objectives.

CERTIFICATION PROVIDER COURSE TITLE
AMAZON DEVOPS ENGINEERING ON AWS
DEVELOPING ON AWS
ARCHITECTING ON AWS
ADVANCED ARCHITECTING ON AWS
EXAM READINESS WORKSHOP: AWS CERTIFIED SOLUTIONS ARCHITECT - PROFESSIONAL
EXAM READINESS WORKSHOP: AWS CERTIFIED SOLUTIONS ARCHITECT - ASSOCIATE
AWS WELL-ARCHITECTED TRAINING
EXAM READINESS: AWS CERTIFIED DEVELOPER – ASSOCIATE
AWS CLOUD PRACTITIONER ESSENTIALS (SECOND EDITION)
AWS TECHNICAL ESSENTIALS
EXAM READINESS: AWS CERTIFIED ADVANCED NETWORKING - SPECIALTY
DATA ANALYTICS FUNDAMENTALS
BIG DATA ON AWS
SECURITY ENGINEERING ON AWS
EXAM READINESS: AWS CERTIFIED DEVOPS ENGINEER – PROFESSIONAL
EXAM READINESS: AWS CERTIFIED SYSOPS ADMINISTRATOR - ASSOCIATE
SYSTEMS OPERATIONS ON AWS
EXAM READINESS: AWS CERTIFIED SECURITY - SPECIALTY
ADVANCED DEVELOPING ON AWS
ADVANCED TESTING PRACTICES USING AWS DEVOPS TOOLS
ALEXA FOR DEVELOPERS
AMAZON API GATEWAY FOR SERVERLESS APPLICATIONS
AMAZON CONNECT: BUILD A CUSTOM CALL CONTROL PANEL
AMAZON ELASTIC KUBERNETES SERVICE (EKS) PRIMER
AMAZON FSX FOR LUSTRE PRIMER
AMAZON FSX FOR WINDOWS FILE SERVER PRIMER
AMAZON LUMBERYARD PRIMER
AMAZON WORKSPACES PRIMER
APPLICATION DEVELOPMENT USING AWS DYNAMODB
AWS CLOUD DEVELOPMENT KIT (CDK) PRIMER
AWS DATABASE OFFERINGS
AWS ELEMENTAL CONDUCTOR
AWS FOUNDATIONS: GETTING STARTED WITH THE AWS CLOUD ESSENTIALS
AWS HADOOP FUNDAMENTALS
AWS LAMBDA FOUNDATIONS
AWS SAAS FACTORY ARCHITECTURE TRACK: SAAS MIGRATION STRATEGIES
AWS SECURITY ESSENTIALS
AWS SECURITY FUNDAMENTALS (SECOND EDITION)
AWS SECURITY FUNDAMENTALS
AWS SECURITY HUB PRIMER
AWS SNOWBALL EDGE LOGISTICS AND PLANNING
AWS STORAGE GATEWAY PRIMER: FILE GATEWAY
AWS SYSTEMS MANAGER
BREAK FREE OF LEGACY DATABASES
CLOUD AUDIT ACADEMY
CONFIGURE AND DEPLOY AWS PRIVATELINK
DATA WAREHOUSING ON AWS
DEEP DIVE INTO AMAZON ELASTIC BLOCK STORE (EBS)
DEEP DIVE WITH SECURITY: AWS IDENTITY AND ACCESS MANAGEMENT (IAM)
DEPLOYING AND SCALING APPLICATIONS WITH AMAZON LIGHTSAIL
DIVE DEEP INTO AMAZON CONNECT REPORTING AND METRICS
GAME SERVER HOSTING WITH AMAZON EC2
GETTING STARTED WITH AMAZON SIMPLE STORAGE SERVICE (AMAZON S3)
GETTING STARTED WITH AWS SECURITY, IDENTITY, AND COMPLIANCE
GETTING STARTED WITH DEVOPS ON AWS
INTERNET OF THINGS (IOT) MICROCONTROLLERS SERIES
INTRODUCTION TO BLOCKCHAIN
IOT EDGE COMPUTING: AWS IOT GREENGRASS PRIMER
MANAGING AMAZON SIMPLE STORAGE SERVICE (AMAZON S3)
MOBILE DEVELOPMENT IN IOT
PLANNING AN AWS OUTPOSTS IMPLEMENTATION
POSTGRESQL FUNDAMENTALS: ARCHITECTURE
SOME REALLY GOOD PRACTICES FOR IOT OPERATIONS
SPEAKING OF: MACHINE TRANSLATION AND NATURAL LANGUAGE PROCESSING (NLP)
TRANSIT GATEWAY NETWORKING AND SCALING
VISUALIZING WITH QUICKSIGHT
EXAM READINESS: AWS CERTIFIED DATA ANALYTICS – SPECIALTY
ARCITURA CLOUD SCHOOL FUNDAMENTAL CLOUD ARCHITECTURE
ADVANCED CLOUD ARCHITECTURE
FUNDAMENTAL CLOUD SECURITY
ADVANCED CLOUD SECURITY
FUNDAMENTAL CLOUD STORAGE
ADVANCED CLOUD STORAGE
FUNDAMENTAL CLOUD VIRTUALIZATION
ADVANCED CLOUD VIRTUALIZATION
FUNDAMENTAL CLOUD CAPACITY
ADVANCED CLOUD CAPACITY
FUNDAMENTAL CLOUD COMPUTING
CLOUD TECHNOLOGY CONCEPTS
BROADCOM/SYMANTEC SYMANTEC DATA CENTER SECURITY – SERVER ADVANCED 6.7 ADMINISTRATION – MUST COMPLETE ALL MODULES FOR CEUS
ENDPOINT PROTECTION 14: CONFIGURE AND PROTECT
SYMANTEC ENDPOINT PROTECTION 14: PLAN AND IMPLEMENT
SYMANTEC ENDPOINT PROTECTION 14: MANAGE AND ADMINISTER
SYMANTEC ENDPOINT PROTECTION 14: MAINTAIN AND TROUBLESHOOT
SYMANTEC DATA LOSS PREVENTION 15.0 ADMINISTRATION
SYMANTEC DATA LOSS PREVENTION 15.0 INSTALL AND DEPLOY
SYMANTEC DATA LOSS PREVENTION 15.0 DIFFERENCES
SYMANTEC IDENTITY AND AUTHENTICATION SERVICES R1
PACKETSHAPER 11.9.1 ADMINISTRATION
SYMANTEC PROXYSG 6.6 BASIC ADMINISTRATION
SYMANTEC PROXYSG 6.6 ADVANCED ADMINISTRATION
SYMANTEC SECURITY ANALYTICS 7.2: ADMINISTRATOR
SYMANTEC SECURITY ANALYTICS 7.2: PROFESSIONAL
SSL VISIBILITY 5.0 ADMINISTRATION
CLOUDSOC ADMINISTRATION R2
CLOUDSOC DIFFERENCES R2.1.1
SYMANTEC ADVANCED THREAT PROTECTION 3.0: INCIDENT RESPONSE
SYMANTEC MESSAGING GATEWAY 10.6 ADMINISTRATION
SYMANTEC CONTROL COMPLIANCE SUITE (CCS) 11.0: ADMINISTRATION
EMAIL SECURITY.CLOUD ADMINISTRATION R1
CHECK POINT CHECK POINT CYBER SECURITY ADMINISTRATOR (CCSA)
CHECK POINT CYBER SECURITY ENGINEERING (CCSE)
CHECK POINT CERTIFIED SECURITY MASTER (CCSM)
CHECK POINT CERTIFIED CLOUD SPECIALIST (CCCS)
CISCO SUPPORTING CISCO DATA CENTER SYSTEM DEVICES (DCTECH)
TROUBLESHOOTING CISCO DATA CENTER INFRASTRUCTURE (DCIT)
DEVELOPING APPLICATIONS AND AUTOMATING WORKFLOWS USING CISCO PLATFORMS (DEVASC)
IMPLEMENTING AND ADMINISTERING CISCO SOLUTIONS (CCNA)
IMPLEMENTING AUTOMATION FOR CISCO ENTERPRISE SOLUTIONS (ENAUI)
IMPLEMENTING AUTOMATION FOR CISCO DATA CENTER SOLUTIONS (DCAUI)
IMPLEMENTING AUTOMATION FOR CISCO SERVICE PROVIDER SOLUTIONS (SPAUI)
IMPLEMENTING AUTOMATION FOR CISCO SECURITY SOLUTIONS (SAUI)
IMPLEMENTING DEVOPS SOLUTIONS AND PRACTICES USING CISCO PLATFORMS (DEVOPS)
DEVELOPING SOLUTIONS USING CISCO IOT AND EDGE PLATFORMS (DEVIOT)
IMPLEMENTING AND OPERATING CISCO ENTERPRISE NETWORK CORE TECHNOLOGIES (ENCOR)
IMPLEMENTING CISCO ENTERPRISE ADVANCED ROUTING AND SERVICES (ENARSI)
DESIGNING CISCO ENTERPRISE NETWORKS (ENSLD)
IMPLEMENTING CISCO ENTERPRISE WIRELESS NETWORKS (ENWLSI)
IMPLEMENTING CISCO COLLABORATION CLOUD AND EDGE SOLUTIONS (CLCEI)
IMPLEMENTING AND OPERATING CISCO DATA CENTER CORE TECHNOLOGIES (DCCOR)
DESIGNING CISCO DATA CENTER INFRASTRUCTURE (DCID)
IMPLEMENTING CISCO APPLICATION CENTRIC INFRASTRUCTURE (DCACI)
CONFIGURING CISCO MDS 9000 SERIES SWITCHES (DCMDS)
IMPLEMENTING AND OPERATING CISCO SECURITY CORE TECHNOLOGIES (SCOR)
SECURING NETWORKS WITH CISCO FIREPOWER NEXT GENERATION FIREWALL (SSNGFW)
SECURING NETWORKS WITH CISCO FIREPOWER NEXT-GENERATION IPS (SSFIPS)
IMPLEMENTING AND CONFIGURING CISCO IDENTITY SERVICES ENGINE (SISE)
SECURING EMAIL WITH CISCO EMAIL SECURITY APPLIANCE (SESA)
SECURING THE WEB WITH CISCO WEB SECURITY APPLIANCE (SWSA)
IMPLEMENTING SECURE SOLUTIONS WITH VIRTUAL PRIVATE NETWORKS (SVPN)
IMPLEMENTING AND OPERATING CISCO SERVICE PROVIDER NETWORK CORE TECHNOLOGIES (SPCOR)
IMPLEMENTING CISCO SERVICE PROVIDER ADVANCED ROUTING SOLUTIONS (SPRI)
IMPLEMENTING CISCO SERVICE PROVIDER VPN SERVICES (SPVI)
SUPPORTING CISCO ROUTING AND SWITCHING NETWORK DEVICES
AUTOMATING AND PROGRAMMING CISCO COLLABORATION SOLUTIONS (CLAUTO)
DEVELOPING APPLICATIONS USING CISCO CORE PLATFORMS AND APIS (DEVCOR)
CITRIX CXM-302 DESIGN, DEPLOY AND MANAGE ENTERPRISE MOBILITY WITH XENMOBILE 9.0
CXD-210: CITRIX XENAPP AND XENDESKTOP ADMINISTRATION
CXD-310: CITRIX XENAPP AND XENDESKTOP ADVANCED ADMINISTRATION
CXD-400 DESIGNING APP AND DESKTOP SOLUTIONS WITH CITRIX XENAPP AND XENDESKTOP
CNS-220: CITRIX NETSCALER ESSENTIALS AND TRAFFIC MANAGEMENT
CNS-222: CITRIX NETSCALER ESSENTIALS AND UNIFIED GATEWAY
CNS-219: CITRIX NETSCALER TRAFFIC MANAGEMENT
CNS-221: CITRIX NETSCALER UNIFIED GATEWAY
NETSCALER SD-WAN
CNS-320: CITRIX NETSCALER ADVANCED TOPICS – SECURITY, MANAGEMENT, AND OPTIMIZATION
CXM-303 DEPLOYING ENTERPRISE MOBILITY SOLUTIONS WITH CITRIX XENMOBILE
Cloud Security Alliance CERTIFICATE OF CLOUD SECURITY KNOWLEDGE (CCSK)
CERTIFICATE OF CLOUD AUDITING KNOWLEDGE (CCAK)
COMPTIA COMPTIA ADVANCED SECURITY PRACTITIONER (CASP+) (CAS-004)
COMPTIA NETWORK+ (N10-008)
COMPTIA SECURITY+ (SY0-701)
COMPTIA A+ 1101/1102 – APPROVED ONLY FOR THOSE CERTIFIED IN A+ 1001/1002 AND EARLIER EXAM SERIES
COMPTIA SERVER+ (SK0-005)
COMPTIA LINUX+ (XK0-005)
COMPTIA CYBERSECURITY ANALYST (CySA+) (CS0-003)
COMPTIA CLOUD+ (CV0-003)
COMPTIA PENTEST+ (PT0-002)
COMPTIA CERTMASTER LEARN FOR A+ 1101/1102 - 20 CEUS – APPROVED ONLY FOR THOSE CERTIFIED IN A+ 1001/1002 AND EARLIER EXAM SERIES
COMPTIA CERTMASTER PRACTICE FOR A+ 1101/1102 - 10 CEUS – APPROVED ONLY FOR THOSE CERTIFIED IN A+ 1001/1002 AND EARLIER EXAM SERIES
COMPTIA CERTMASTER LEARN FOR NETWORK+ N10-008 - 30 CEUS
COMPTIA CERTMASTER PRACTICE FOR NETWORK+ N10-008 - 10 CEUS
COMPTIA CERTMASTER LEARN FOR SECURITY+ SY0-701- 40 CEUS
COMPTIA CERTMASTER PRACTICE FOR SECURITY+ SY0-701 - 10 CEUS
COMPTIA CERTMASTER LEARN FOR LINUX+ XK0-004 - 30 CEUS
COMPTIA CERTMASTER PRACTICE FOR LINUX+ XK0-004 - 10 CEUS
COMPTIA CERTMASTER LEARN FOR CLOUD+ CV0-003 - 25 CEUS
COMPTIA CERTMASTER PRACTICE FOR CLOUD+ CV0-003 - 10 CEUS
COMPTIA CERTMASTER LEARN FOR PENTEST+ PT0-002 - 25 CEUS
COMPTIA CERTMASTER PRACTICE FOR PENTEST+ PT0-002 - 10 CEUS
COMPTIA CERTMASTER LEARN FOR CYSA+ CS0-003 - 25 CEUS
COMPTIA CERTMASTER PRACTICE FOR CYSA+ CS0-003 - 10 CEUS
CWNP CWTS - CERTIFIED WIRELESS TECHNOLOGY SPECIALIST
CWNA - CERTIFIED WIRELESS NETWORK ADMINISTRATOR
CWSP - CERTIFIED WIRELESS SECURITY PROFESSIONAL
CWDP – CERTIFIED WIRELESS DESIGN PROFESSIONAL
CWAP - CERTIFIED WIRELESS ANALYSIS PROFESSIONAL
CWS - CERTIFIED WIRELESS SPECIALIST
EC-COUNCIL CERTIFIED ETHICAL HACKER (CEH)
CERTIFIED SECURITY ANALYST (ECSA)
DISASTER RECOVERY PROFESSIONAL (EDRP)
COMPUTER HACKING FORENSICS INVESTIGATOR (CHFI)
CERTIFIED CHIEF INFORMATION SECURITY OFFICER (CCISO)
CERTIFIED SECURITY SPECIALIST (ECSS)
CERTIFIED INCIDENT HANDLER (ECIH)
CERTIFIED ENCRYPTION SPECIALIST (ECES)
CERTIFIED NETWORK DEFENDER (CND)
CERTIFIED NETWORK DEFENSE ARCHITECT (CNDA)
CYBER THREAT INTELLIGENCE ANALYST (CTIA)
CERTIFIED SOC ANALYST (CSA)
CERTIFIED PENETRATION TESTING (CPENT)
BLOCK CHAIN PROFESSIONAL (CBP)
FORESCOUT ASSOCIATE FSCA
ASSOCIATE FSCA:OT/ICS
CERTIFIED EXPERT FSCE
CERTIFIED PROFESSIONAL FSCP
FORESCOUT CERTIFIED EXPERT OT/ICS FSCE:OT/ICS
FORTINET FORTIGATE SECURITY
FORTIGATE INFRASTRUCTURE
NSE4 IMMERSION
FORTIMANAGER
FORTIEDR
FORTISIEM
FORTIANALYZER
FORTICLIENT EMS
FORTIANALYZER ADMINISTRATOR
FORTIMAIL
FORTISANDBOX
FORTIAUTHENTICATOR
CLOUD SECURITY FOR AZURE
CLOUD SECURITY FOR AWS
FORTIADC
FORTIWEB
FORTISOAR ADMINISTRATOR
FORTISWITCH
FORTINAC
SECURE WIRELESS LAN
FORTIVOICE
PUBLIC CLOUD SECURITY
OT SECURITY
LAN EDGE
SD-WAN
ENTERPRISE FIREWALL
ADVANCED ANALYTICS
FORTISOAR DESIGN AND DEVELOPMENT
GOOGLE GOOGLE CLOUD PLATFORM FUNDAMENTALS FOR AWS PROFESSIONALS
ARCHITECTING WITH GOOGLE COMPUTE ENGINE
DATA ENGINEERING ON GOOGLE CLOUD PLATFORM
DEVELOPING APPLICATIONS WITH GOOGLE CLOUD PLATFORM
NETWORKING IN GOOGLE CLOUD PLATFORM
SECURITY IN GOOGLE CLOUD PLATFORM
GOOGLE’S APPLIED DIGITAL SKILLS
HPE DESIGNING HP DATA CENTER AND CLOUD SOLUTIONS, REV. 15.11
DESIGNING HPE DATA CENTER AND CLOUD SOLUTIONS, REV. 16.11
DELTA - DESIGNING HPE DATA CENTER AND CLOUD SOLUTIONS, REV. 16.11
CREATING HPE SOFTWARE-DEFINED NETWORKS, REV. 15.41
BUILDING HP FLEXFABRIC DATA CENTERS, REV. 14.41
ARCHITECTING HP FLEXNETWORK SOLUTIONS, REV 14.21
DEPLOYING HP FLEXNETWORK CORE TECHNOLOGIES, REV 14.31
HP-UX SECURITY I
HP INTEGRITY VIRTUAL MACHINES V4.3 ADMINISTRATION
HP-UX LOGICAL VOLUME MANAGER
HP INTEGRITY VM V6 AND HP-UX VPARS V6 ADMINISTRATION
HP-UX PERFORMANCE AND TUNING
HP SERVICEGUARD I
HP SYSTEMS INSIGHT MANAGER
HPE ARCSIGHT MASTER ASE PREPARATION COURSE
ARCSIGHT ESM 6.5 ADVANCED ADMINISTRATOR
ARCSIGHT ESM 6.5 ADVANCED ANALYST
ARCSIGHT LOGGER - 6.0 ADMINISTRATION AND OPERATIONS
DYNAMIC APPLICATION TESTING WITH HP WEBINSPECT 10.3
HP FORTIFY STATIC CODE ANALYZER / SOFTWARE SECURITY CENTER 4.2
HPE/ARUBA IMPLEMENTING ARUBA WLAN (IAW) 8
DESIGNING ADVANCED MOBILITY SOLUTIONS (DAMS)
CLEARPASS ESSENTIALS
SCALABLE WLAN DESIGN & IMPLEMENTATION (SWDI) V8
ADVANCED MOBILITY SOLUTIONS & TROUBLESHOOTING (AMST)
CLEARPASS ADVANCED (CPA)
DESIGNING ARUBA SOLUTIONS (DAS)
IMPLEMENTING ARUBA CAMPUS SWITCHING SOLUTIONS (IACSS)
CLEARPASS FUNDAMENTALS
ARUBA SWITCHING FUNDAMENTALS (ASF)
IBM IBM QRADAR SIEM V7.3.2 FUNDAMENTAL ANALYSIS
IBM QRADAR SIEM V7.3.2 FUNDAMENTAL ADMINISTRATION
IBM QRADAR SIEM V7.3.2 DEPLOYMENT
IBM SECURITY IDENTITY GOVERNANCE AND INTELLIGENCE V5.2.5, DEPLOYMENT
ISACA CISM EXAM REVIEW
CRISC EXAM REVIEW
CSX PRACTITIONER: IDENTIFICATION AND PROTECTION
CSX PRACTITIONER: RESPOND AND RECOVER
CSX PRACTITIONER BOOT CAMP
CSX PRACTITIONER: DETECTION
CISA EXAM REVIEW
(ISC)2 (ISC)2TRAINING FOR CISSP
(ISC)2TRAINING FOR HCISPP
(ISC)2TRAINING FOR CISSP-ISSAP
(ISC)2TRAINING FOR SSCP
(ISC)2 TRAINING FOR CISSP-ISSEP
(ISC)2 TRAINING FOR CISSP-ISSMP
(ISC)2 TRAINING FOR CCSP
(ISC)2 CERTIFIED IN CYBERSECURITY (CC) TRAINING
JUNIPER JUNIPER NETWORKS DESIGN FUNDAMENTALS (JNDF)
ADVANCED JUNOS ENTERPRISE ROUTING (AJER)
ADVANCED JUNOS ENTERPRISE SWITCHING (AJEX)
ADVANCED JUNOS SECURITY (AJSEC)
ADVANCED JUNOS SERVICE PROVIDER ROUTING (AJSPR)
JUNOS ENTERPRISE SWITCHING (JEX)
JUNOS INTERMEDIATE ROUTING (JIR)
NETWORK AUTOMATION USING CONTRAIL CLOUD (NACC)
JUNOS SERVICE PROVIDER SWITCHING (JSPX)
INTRODUCTION TO THE JUNOS OPERATING SYSTEM (IJOS)
JUNIPER NETWORKS DESIGN - DATA CENTER (JND-DC)
JUNOS EDGE SECURITY SERVICES (JESS)
JUNOS LAYER 3 VPNS (JL3V)
JUNOS LAYER 2 VPNS (JL2V)
JUNOS MPLS FUNDAMENTALS (JMF)
JUNOS FOR SECURITY PLATFORMS (JSEC)
JUNIPER NETWORKS DESIGN-SERVICE PROVIDER (JND-SP)
JUNIPER NETWORKS DESIGN FUNDAMENTALS (JNDF)
MICROSOFT INSTALLING AND CONFIGURING WINDOWS 10
DEPLOYING AND MANAGING WINDOWS 10 USING ENTERPRISE SERVICES
INSTALLING AND CONFIGURING WINDOWS® 7 CLIENT
TROUBLESHOOTING AND SUPPORTING WINDOWS® 7 IN THE ENTERPRISE
PLANNING AND MANAGING WINDOWS® 7 DESKTOP DEPLOYMENTS AND ENVIRONMENTS
DEPLOYING WINDOWS DESKTOPS AND ENTERPRISE APPLICATIONS
SUPPORTING AND TROUBLESHOOTING WINDOWS 10
NETWORKING FUNDAMENTALS
SECURITY FUNDAMENTALS
CONFIGURING WINDOWS® 8.1
SUPPORTING WINDOWS® 8.1
WINDOWS SERVER ADMINISTRATION FUNDAMENTALS
INSTALLATION, STORAGE, AND COMPUTE WITH WINDOWS SERVER 2016
NETWORKING WITH WINDOWS SERVER 2016
IDENTITY WITH WINDOWS SERVER 2016
INSTALLING AND CONFIGURING WINDOWS SERVER 2012
ADMINISTERING WINDOWS SERVER 2012
CONFIGURING ADVANCED WINDOWS SERVER 2012 SERVICES
DESIGNING AND IMPLEMENTING A SERVER INFRASTRUCTURE
IMPLEMENTING AN ADVANCED SERVER INFRASTRUCTURE
CORE SOLUTIONS OF MICROSOFT EXCHANGE SERVER 2013
ADVANCED SOLUTIONS OF MICROSOFT EXCHANGE SERVER 2013
DEPLOYING ENTERPRISE VOICE WITH SKYPE FOR BUSINESS 2015
ADMINISTERING MICROSOFT EXCHANGE SERVER 2016
CORE SOLUTIONS OF SKYPE FOR BUSINESS 2015
DESIGNING AND DEPLOYING MICROSOFT EXCHANGE SERVER 2016
SERVER VIRTUALIZATION WITH WINDOWS SERVER HYPER-V AND SYSTEM CENTER
ADMINISTERING SYSTEM CENTER CONFIGURATION MANAGER AND INTUNE
MONITORING AND OPERATING A PRIVATE CLOUD
CONFIGURING AND DEPLOYING A PRIVATE CLOUD
ENABLING AND MANAGING OFFICE 365
ADMINISTERING A SQL DATABASE INFRASTRUCTURE
DEVELOPING MICROSOFT AZURE SOLUTIONS
IMPLEMENTING MICROSOFT AZURE INFRASTRUCTURE SOLUTIONS
SECURING WINDOWS SERVER 2016
DESIGNING AND IMPLEMENTING CLOUD DATA PLATFORM SOLUTIONS
DEPLOYING VOICE WORKLOADS FOR SKYPE FOR BUSINESS ONLINE AND SERVER 2015
DESIGNING A DATA SOLUTION WITH MICROSOFT SQL SERVER
VIRTUALIZING ENTERPRISE DESKTOPS AND APPS
WINDOWS SERVER 2012: TECHNICAL OVERVIEW
WINDOWS 10 FEATURES FOR A MOBILE WORKFORCE
WINDOWS SERVER 2012 TRAINING: NETWORKING
WINDOWS SERVER 2012: IDENTITY AND ACCESS
WINDOWS SERVER 2012: STORAGE
DEVELOPING MICROSOFT SQL SERVER DATABASES
DESIGNING DATABASE SOLUTIONS FOR SQL SERVER
OFFENSIVE SECURITY EXP-301: WINDOWS USER MODE EXPLOIT DEVELOPMENT
EXP-312: ADVANCED MACOS CONTROL BYPASSES
EXP-401: ADVANCED WINDOWS EXPLOITATION
PEN-200: PENETRATION TESTING WITH KALI LINUX
PEN-210: FOUNDATIONAL WIRELESS NETWORK ATTACKS
PEN-300: ADVANCED EVASION TECHNIQUES AND BREACHING DEFENSES
SOC-200: FOUNDATIONAL SECURITY OPERATIONS AND DEFENSIVE ANALYSIS
WEB-200: FOUNDATIONAL WEB APPLICATION ASSESSMENTS WITH KALI LINUX
WEB-300: ADVANCED WEB ATTACKS AND EXPLOITATION
OPENTEXT IR250 - INCIDENT INVESTIGATION
DFIR370 - HOST INTRUSION METHODOLOGY AND INVESTIGATION
DF120 - FOUNDATIONS IN DIGITAL FORENSICS WITH ENCASE
DF125 - MOBILE DEVICE EXAMINATIONS WITH ENCASE
DF210 - BUILDING AN INVESTIGATION WITH ENCASE
DF320 - ADVANCED ANALYSIS OF WINDOWS ARTIFACTS WITH ENCASE
IR280 ENCASE ENDPOINT SECURITY
DFIR130 ENCASE ENDPOINT INVESTIGATOR TRAINING
DFIR350 INTERNET-BASED INVESTIGATIONS WITH ENCASE
ED290 EDISCOVERY TRAINING WITH ENCASE INFORMATION ASSURANCE
DFIR450 ENCASE ENSCRIPT PROGRAMMING
PALO ALTO FIREWALL 11.0 ESSENTIALS: CONFIGURATION AND MANAGEMENT (EDU-210)
PANORAMA 11.0: MANAGING FIREWALLS AT SCALE (EDU-220)
PRISMA CLOUD: MONITORING AND SECURING - EDU-150
PRISMA CLOUD: ONBOARDING AND OPERATIONALIZING - EDU- 152
PCC TRAINING
INTRODUCTION TO CYBERSECURITY
FUNDAMENTALS OF NETWORK SECURITY
FUNDAMENTALS OF CLOUD SECURITY
FUNDAMENTALS OF SECURITY OPERATIONS CENTER (SOC)
USE OF THE PALO ALTO NETWORKS CYBER SECURITY ACADEMY CYBERSECURITY SURVIVAL GUIDE
FUNDAMENTALS OF SECURITY OPERATIONS CENTER (SOC)
INTRODUCTION TO CORTEX XSOAR
CORTEX XSOAR ADMIN TRAINING
CORTEX XSOAR ANALYST TRAINING
CORTEX XSOAR SOAR ENGINEER TRAINING
RED HAT RED HAT SYSTEM ADMINISTRATION I (RH124)
RED HAT SYSTEM ADMINISTRATION II (RH134)
RED HAT OPENSTACK ADMINISTRATION I (CL110)
RED HAT OPENSTACK ADMINISTRATION II (CL210)
RED HAT SYSTEM ADMINISTRATION III (RH254)
RED HAT OPENSTACK SYSTEM ADMINISTRATION III (CL310)
RED HAT CLOUDFORMS HYBRID CLOUD MANAGEMENT (CL220)
OPENSHIFT ENTERPRISE ADMINISTRATION (DO280)
RED HAT GLUSTER STORAGE ADMINISTRATION (RH236)
RED HAT VIRTUALIZATION ADMINISTRATION (RH318)
RED HAT JBOSS IN DATA VIRTUALIZATION ADMINISTRATION (JB450)
JBOSS ENTERPRISE APPLICATION DEVELOPMENT (JB225)
RED HAT ENTERPRISE DEPLOYMENT AND SYSTEMS MANAGEMENT (RH401)
RED HAT SATELLITE 6 ADMINISTRATION (RH403)
RED HAT ENTERPRISE LINUX DIAGNOSTICS AND TROUBLESHOOTING
RED HAT ENTERPRISE PERFORMANCE TUNING (RH442)
RED HAT HIGH AVAILABILITY CLUSTERING (RH436)
JBOSS APPLICATION ADMINISTRATION I (JB248)
RED HAT SECURITY: Linux in Physical, Virtual, and Cloud (RH415)
AUTOMATION WITH ANSIBLE II: ANSIBLE TOWER (DO409)
SABSA A1 – ADVANCED SABSA RISK, ASSURANCE & GOVERNANCE
A2 – ADVANCED SABSA ARCHITECTURE PROGRAM MANAGEMENT
A3 – ADVANCED SABSA ARCHITECTURE DESIGN
A3 – SABSA A3 – ARCHITECTURE DESIGN DEVELOPMENT
A4 – ADVANCED SABSA INCIDENT, MONITORING & INVESTIGATIONS ARCHITECTURE
A5 – ADVANCED SABSA BUSINESS CONTINUITY AND CRISIS MANAGEMENT
SANS AUD507: AUDITING & MONITORING NETWORKS, PERIMETERS & SYSTEMS
FOR498: BATTLEFIELD FORENSICS & DATA ACQUISITION
FOR500: WINDOWS FORENSIC ANALYSIS
FOR508: ADVANCED DIGITAL FORENSICS, INCIDENT RESPONSE, AND THREAT HUNTING
FOR509: ENTERPRISE CLOUD FORENSICS AND INCIDENT RESPONSE
FOR518: MAC FORENSIC ANALYSIS
FOR572: ADVANCED NETWORK FORENSICS AND ANALYSIS
FOR578: CYBER THREAT INTELLIGENCE
FOR585: ADVANCED SMARTPHONE FORENSICS
FOR610: REVERSE-ENGINEERING MALWARE: MALWARE ANALYSIS TOOLS AND TECHNIQUES
ICS410: ICS/SCADA SECURITY ESSENTIALS
ICS456: ESSENTIALS FOR NERC CRITICAL INFRASTRUCTURE PROTECTION
ICS515: ICS VISIBILITY, DETECTION, AND RESPONSE
MGT414: SANS TRAINING PROGRAM FOR THE CISSP CERTIFICATION
MGT512: SANS SECURITY LEADERSHIP ESSENTIALS FOR MANAGERS WITH KNOWLEDGE COMPRESSION
MGT514: SECURITY STRATEGIC PLANNING, POLICY, AND LEADERSHIP
MGT525: MANAGING CYBERSECURITY INITIATIVES & EFFECTIVE COMMUNICATION
MGT551: BUILDING AND LEADING SECURITY OPERATIONS CENTERS
SEC275: FOUNDATIONS: COMPUTERS, TECHNOLOGY, & SECURITY
SEC301: INTRODUCTION TO CYBER SECURITY
SEC401: SECURITY ESSENTIALS - NETWORK, ENDPOINT, AND CLOUD
SEC450: BLUE TEAM FUNDAMENTALS: SECURITY OPERATIONS AND ANALYSIS
SEC460: ENTERPRISE AND CLOUD | THREAT AND VULNERABILITY ASSESSMENT
SEC488: CLOUD SECURITY ESSENTIALS
SEC497: PRACTICAL OPEN-SOURCE INTELLIGENCE (OSINT)
SEC501: ADVANCED SECURITY ESSENTIALS - ENTERPRISE DEFENDER
SEC503: NETWORK MONITORING AND THREAT DETECTION IN-DEPTH
SEC504: HACKER TOOLS, TECHNIQUES, AND INCIDENT HANDLING
SEC505: SECURING WINDOWS AND POWERSHELL AUTOMATION
SEC510: PUBLIC CLOUD SECURITY: AWS, AZURE, AND GCP
SEC511: CONTINUOUS MONITORING AND SECURITY OPERATIONS
SEC522: APPLICATION SECURITY: SECURING WEB APPLICATIONS, APIS, AND MICROSERVICES
SEC530: DEFENSIBLE SECURITY ARCHITECTURE AND ENGINEERING: IMPLEMENTING ZERO TRUST FOR THE HYBRID ENTERPRISE
SEC540: CLOUD SECURITY AND DEVSECOPS AUTOMATION
SEC541: CLOUD SECURITY ATTACKER TECHNIQUES, MONITORING, AND THREAT DETECTION
SEC542: WEB APP PENETRATION TESTING AND ETHICAL HACKING
SEC555: SIEM WITH TACTICAL ANALYTICS
SEC560: ENTERPRISE PENETRATION TESTING
SEC566: IMPLEMENTING AND AUDITING SECURITY FRAMEWORKS AND CONTROLS
SEC573: AUTOMATING INFORMATION SECURITY WITH PYTHON
SEC575: MOBILE DEVICE SECURITY AND ETHICAL HACKING
SEC588: CLOUD PENETRATION TESTING
SEC599: DEFEATING ADVANCED ADVERSARIES - PURPLE TEAM TACTICS & KILL CHAIN DEFENSES
SEC617: WIRELESS PENETRATION TESTING AND ETHICAL HACKING
SEC660: ADVANCED PENETRATION TESTING, EXPLOIT WRITING, AND ETHICAL HACKING
SPLUNK USING SPLUNK ENTERPRISE SECURITY
VMWARE VMWARE HORIZON 7: INSTALL, CONFIGURE, MANAGE [V7]
VMWARE HORIZON 7: TROUBLESHOOTING AND PERFORMANCE OPTIMIZATION [V7]
VMWARE NSX-T: INSTALL, CONFIGURE, MANAGE [V2.2]
VMWARE NSX-T DATA CENTER: INSTALL, CONFIGURE, MANAGE [V2.4]
VMWARE NSX-T DATA CENTER: TROUBLESHOOTING AND OPERATIONS [V2.4]
VMWARE NSX-T DATA CENTER: DESIGN [V2.4]
VMWARE VSPHERE: DESIGN WORKSHOP [V6.5]
VMWARE HORIZON 7: DESIGN WORKSHOP [V7.0]
HORIZON: DESIGN AND DEPLOY [V6]
VCA-DBT
VMWARE NSX: TROUBLESHOOTING AND OPERATIONS [V6.4]
VMWARE NSX: INSTALL, CONFIGURE, MANAGE [V6.4]
VMWARE VSPHERE: INSTALL, CONFIGURE, MANAGE [V6.7]
VMWARE VSPHERE: OPTIMIZE AND SCALE [V6.7]
VMWARE VSPHERE: SKILLS FOR PUBLIC SECTOR ADMINISTRATORS [V6.7]
VMWARE VSPHERE: TROUBLESHOOTING WORKSHOP [V6.7]
VMWARE ADVANCED SKILLS FOR VSPHERE PROFESSIONAL WORKSHOP [V6.7]
VMWARE WORKSPACE ONE: DEPLOY AND MANAGE [V19.X]
VMWARE WORKSPACE ONE: INTEGRATING THE DIGITAL WORKSPACE [V19.X]
VMWARE WORKSPACE ONE: SKILLS FOR UNIFIED ENDPOINT MANAGEMENT [V19.X]
ZSCALER ZIA INTRODUCTION
ZIA FUNDAMENTALS
MONITORING INTERNET ACCESS SECURITY
ANALYZING INTERNET ACCESS TRAFFIC PATTERNS
CHECKING ZSCALER CLIENT CONNECTOR
CHECKING USER INTERNET ACCESS
CHECKING ZIA NETWORK CONNECTIVITY
CHECKING ZIA USER AUTHENTICATION
ADJUSTING INTERNET ACCESS POLICIES
AUDITING SECURITY POLICY
INVESTIGATING SECURITY ISSUES
TROUBLESHOOTING ZIA
ZIA AUTHENTICATION (ADVANCED)
ZIA TRAFFIC FORWARDING (ADVANCED)
CLIENT CONNECTOR MANAGEMENT
CLIENT CONNECTOR: ZIA SPECIFIC CONFIGURATIONS
ZIA BANDWIDTH CONTROL
ZIA DNS SECURITY & OPTIMIZATION
ZIA NANOLOG STREAMING SERVICE (NSS)
SURVEY FOR THE ZIA PRO PATH
ZPA ARCHITECTURE
ZPA APP CONNECTORS (ADVANCED)
ZPA POLICY
ZPA FEATURES
ZPA AUTHENTICATION
INTUNE FOR IOS USING SCEP
SURVEY FOR THE ZPA PRO PATH





c