CompTIA Cloud+

Pre-approved Training for CompTIA Cloud+ Continuing Education Units (CEUs)

Note: Training in this list is subject to change without prior notification. As CompTIA exams are updated so is this list. Training uploaded into a certification record by the candidate prior to the change will remain valid. Training earned that was listed previously and has not been uploaded into a certification record can no longer be used for CEUs.

Training approved in this document is based on the CompTIA Cloud+ - CV0-003 objectives.

CERTIFICATION PROVIDER COURSE TITLE
AMAZON AWS SECURITY FUNDAMENTALS
DEVOPS ENGINEERING ON AWS
DEVELOPING ON AWS
ARCHITECTING ON AWS
ADVANCED ARCHITECTING ON AWS
EXAM READINESS WORKSHOP: AWS CERTIFIED SOLUTIONS ARCHITECT - PROFESSIONAL
AWS WELL-ARCHITECTED TRAINING
EXAM READINESS: AWS CERTIFIED DEVELOPER – ASSOCIATE
AWS CLOUD PRACTITIONER ESSENTIALS (SECOND EDITION)
AWS TECHNICAL ESSENTIALS
EXAM READINESS: AWS CERTIFIED ADVANCED NETWORKING - SPECIALTY
DATA ANALYTICS FUNDAMENTALS
BIG DATA ON AWS
SECURITY ENGINEERING ON AWS
EXAM READINESS: AWS CERTIFIED DEVOPS ENGINEER – PROFESSIONAL
EXAM READINESS: AWS CERTIFIED SYSOPS ADMINISTRATOR - ASSOCIATE
SYSTEMS OPERATIONS ON AWS
EXAM READINESS: AWS CERTIFIED SECURITY - SPECIALTY
ADVANCED DEVELOPING ON AWS
ADVANCED TESTING PRACTICES USING AWS DEVOPS TOOLS
ALEXA FOR DEVELOPERS
AMAZON API GATEWAY FOR SERVERLESS APPLICATIONS
AMAZON CONNECT: BUILD A CUSTOM CALL CONTROL PANEL
AMAZON ELASTIC KUBERNETES SERVICE (EKS) PRIMER
AMAZON FSX FOR LUSTRE PRIMER
AMAZON FSX FOR WINDOWS FILE SERVER PRIMER
AMAZON LUMBERYARD PRIMER
AMAZON WORKSPACES PRIMER
APPLICATION DEVELOPMENT USING AWS DYNAMODB
AWS CLOUD DEVELOPMENT KIT (CDK) PRIMER
AWS DATABASE OFFERINGS
AWS ELEMENTAL CONDUCTOR
AWS FOUNDATIONS: GETTING STARTED WITH THE AWS CLOUD ESSENTIALS
AWS HADOOP FUNDAMENTALS
AWS LAMBDA FOUNDATIONS
AWS SAAS FACTORY ARCHITECTURE TRACK: SAAS MIGRATION STRATEGIES
AWS SECURITY ESSENTIALS
AWS SECURITY FUNDAMENTALS (SECOND EDITION)
AWS SECURITY HUB PRIMER
AWS SNOWBALL EDGE LOGISTICS AND PLANNING
AWS STORAGE GATEWAY PRIMER: FILE GATEWAY
AWS SYSTEMS MANAGER
BREAK FREE OF LEGACY DATABASES
CLOUD AUDIT ACADEMY
CONFIGURE AND DEPLOY AWS PRIVATELINK
DATA WAREHOUSING ON AWS
DEEP DIVE INTO AMAZON ELASTIC BLOCK STORE (EBS)
DEEP DIVE WITH SECURITY: AWS IDENTITY AND ACCESS MANAGEMENT (IAM)
DEPLOYING AND SCALING APPLICATIONS WITH AMAZON LIGHTSAIL
DIVE DEEP INTO AMAZON CONNECT REPORTING AND METRICS
GAME SERVER HOSTING WITH AMAZON EC2
GETTING STARTED WITH AMAZON SIMPLE STORAGE SERVICE (AMAZON S3)
GETTING STARTED WITH AWS SECURITY, IDENTITY, AND COMPLIANCE
GETTING STARTED WITH DEVOPS ON AWS
INTERNET OF THINGS (IOT) MICROCONTROLLERS SERIES
INTRODUCTION TO BLOCKCHAIN
IOT EDGE COMPUTING: AWS IOT GREENGRASS PRIMER
MANAGING AMAZON SIMPLE STORAGE SERVICE (AMAZON S3)
MOBILE DEVELOPMENT IN IOT
PLANNING AN AWS OUTPOSTS IMPLEMENTATION
POSTGRESQL FUNDAMENTALS: ARCHITECTURE
SOME REALLY GOOD PRACTICES FOR IOT OPERATIONS
SPEAKING OF: MACHINE TRANSLATION AND NATURAL LANGUAGE PROCESSING (NLP)
TRANSIT GATEWAY NETWORKING AND SCALING
VISUALIZING WITH QUICKSIGHT
EXAM READINESS: AWS CERTIFIED DATA ANALYTICS – SPECIALTY
ARCITURA CLOUD SCHOOL FUNDAMENTAL CLOUD ARCHITECTURE
ADVANCED CLOUD ARCHITECTURE
FUNDAMENTAL CLOUD SECURITY
ADVANCED CLOUD SECURITY
FUNDAMENTAL CLOUD STORAGE
ADVANCED CLOUD STORAGE
FUNDAMENTAL CLOUD VIRTUALIZATION
ADVANCED CLOUD VIRTUALIZATION
FUNDAMENTAL CLOUD CAPACITY
ADVANCED CLOUD CAPACITY
BROADCOM/SYMANTEC SYMANTEC DATA CENTER SECURITY – SERVER ADVANCED 6.7 ADMINISTRATION – MUST COMPLETE ALL MODULES FOR CEUS
ENDPOINT PROTECTION 14: CONFIGURE AND PROTECT
ENDPOINT PROTECTION 14: MIGRATION AND UPGRADES
SYMANTEC ENDPOINT PROTECTION 14: PLAN AND IMPLEMENT
SYMANTEC ENDPOINT PROTECTION 14: MANAGE AND ADMINISTER
SYMANTEC ENDPOINT PROTECTION 14: MAINTAIN AND TROUBLESHOOT
SYMANTEC DATA LOSS PREVENTION 15.0 ADMINISTRATION
SYMANTEC DATA LOSS PREVENTION 15.0 INSTALL AND DEPLOY
SYMANTEC DATA LOSS PREVENTION 15.0 DIFFERENCES
SYMANTEC IDENTITY AND AUTHENTICATION SERVICES R1
PACKETSHAPER 11.9.1 ADMINISTRATION
SYMANTEC PROXYSG 6.6 BASIC ADMINISTRATION
SYMANTEC PROXYSG 6.6 ADVANCED ADMINISTRATION
SYMANTEC SECURITY ANALYTICS 7.2: ADMINISTRATOR
SYMANTEC SECURITY ANALYTICS 7.2: PROFESSIONAL
SSL VISIBILITY 5.0 ADMINISTRATION
CLOUDSOC ADMINISTRATION R2
CLOUDSOC DIFFERENCES R2.1.1
SYMANTEC ADVANCED THREAT PROTECTION 3.0: INCIDENT RESPONSE
CHECK POINT CHECK POINT CYBER SECURITY ENGINEERING (CCSE)
CHECK POINT CERTIFIED SECURITY MASTER (CCSM)
CHECK POINT CERTIFIED CLOUD SPECIALIST (CCCS)
CHECK POINT CERTIFIED ENDPOINT SPECIALIST (CCES)
CHECK POINT CERTIFIED AUTOMATION SPECIALIST (CCAS)
INFRASTRUCTURE HACKING CHECK POINT CERTIFIED PENTESTING EXPERT (CCPE)
CHECK POINT CERTIFIED MAESTRO EXPERT (CCME)
CISCO AUTOMATING AND PROGRAMMING CISCO COLLABORATION SOLUTIONS (CLAUTO)
CONFIGURING CISCO MDS 9000 SERIES SWITCHES (DCMDS)
DESIGNING CISCO DATA CENTER INFRASTRUCTURE (DCID)
DESIGNING CISCO ENTERPRISE NETWORKS (ENSLD)
DEVELOPING APPLICATIONS AND AUTOMATING WORKFLOWS USING CISCO PLATFORMS (DEVASC)
DEVELOPING APPLICATIONS USING CISCO CORE PLATFORMS AND APIS (DEVCOR)
DEVELOPING SOLUTIONS USING CISCO IOT AND EDGE PLATFORMS (DEVIOT)
IMPLEMENTING AND CONFIGURING CISCO IDENTITY SERVICES ENGINE (SISE)
IMPLEMENTING AND OPERATING CISCO DATA CENTER CORE TECHNOLOGIES (DCCOR)
IMPLEMENTING AND OPERATING CISCO ENTERPRISE NETWORK CORE TECHNOLOGIES (ENCOR)
IMPLEMENTING AND OPERATING CISCO SECURITY CORE TECHNOLOGIES (SCOR)
IMPLEMENTING AND OPERATING CISCO SERVICE PROVIDER NETWORK CORE TECHNOLOGIES (SPCOR)
IMPLEMENTING AUTOMATION FOR CISCO DATA CENTER SOLUTIONS (DCAUI)
IMPLEMENTING AUTOMATION FOR CISCO ENTERPRISE SOLUTIONS (ENAUI)
IMPLEMENTING AUTOMATION FOR CISCO SECURITY SOLUTIONS (SAUI)
IMPLEMENTING AUTOMATION FOR CISCO SERVICE PROVIDER SOLUTIONS (SPAUI)
IMPLEMENTING CISCO APPLICATION CENTRIC INFRASTRUCTURE (DCACI)
IMPLEMENTING CISCO COLLABORATION CLOUD AND EDGE SOLUTIONS (CLCEI)
IMPLEMENTING CISCO COLLABORATION CORE TECHNOLOGIES (CLCOR)
IMPLEMENTING CISCO ENTERPRISE ADVANCED ROUTING AND SERVICES (ENARSI)
IMPLEMENTING CISCO ENTERPRISE WIRELESS NETWORKS (ENWLSI)
IMPLEMENTING CISCO SD-WAN SOLUTIONS (ENSDWI)
IMPLEMENTING CISCO SERVICE PROVIDER ADVANCED ROUTING SOLUTIONS (SPRI)
IMPLEMENTING CISCO SERVICE PROVIDER VPN SERVICES (SPVI)
IMPLEMENTING DEVOPS SOLUTIONS AND PRACTICES USING CISCO PLATFORMS (DEVOPS)
IMPLEMENTING SECURE SOLUTIONS WITH VIRTUAL PRIVATE NETWORKS (SVPN)
SECURING EMAIL WITH CISCO EMAIL SECURITY APPLIANCE (SESA)
SECURING NETWORKS WITH CISCO FIREPOWER NEXT GENERATION FIREWALL (SSNGFW)
SECURING NETWORKS WITH CISCO FIREPOWER NEXT-GENERATION IPS (SSFIPS)
SECURING THE WEB WITH CISCO WEB SECURITY APPLIANCE (SWSA)
SUPPORTING CISCO DATA CENTER SYSTEM DEVICES (DCTECH)
SUPPORTING CISCO ROUTING AND SWITCHING NETWORK DEVICES
TROUBLESHOOTING CISCO DATA CENTER INFRASTRUCTURE (DCIT)
CLOUD SECURITY ALLIANCE CERTIFICATE OF CLOUD SECURITY KNOWLEDGE (CCSK)
CERTIFICATE OF CLOUD AUDITING KNOWLEDGE (CCAK)
COMPTIA COMPTIA CLOUD+ (CV0-003) - APPROVED ONLY FOR THOSE CERTIFIED IN CLOUD+ CV0-002 OR EARLIER EXAM VERSION
COMPTIA ADVANCED SECURITY PRACTITIONER (CASP+) (CAS-004)
COMPTIA CYBERSECURITY ANALYST (CySA+) (CS0-003)
COMPTIA PENTEST+ (PT0-002)
COMPTIA CERTMASTER LEARN FOR CLOUD+ CV0-003 - 25 CEUS – APPROVED ONLY FOR THOSE CERTIFIED IN CLOUD+ CV0-002 OR EARLIER EXAM VERSION
COMPTIA CERTMASTER PRACTICE FOR CLOUD+ CV0-003 - 10 CEUS –APPROVED ONLY FOR THOSE CERTIFIED IN CLOUD+ CV0-002 OR EARLIER EXAM VERSION
COMPTIA CERTMASTER LEARN FOR PENTEST+ PT0-002 - 25 CEUS
COMPTIA CERTMASTER PRACTICE FOR PENTEST+ PT0-002 - 10 CEUS
COMPTIA CERTMASTER LEARN FOR CYSA+ CS0-003 - 25 CEUS
COMPTIA CERTMASTER PRACTICE FOR CYSA+ CS0-003 - 10 CEUS
COMPTIA SECURITY+ (SY0-701)
COMPTIA CERTMASTER LEARN FOR SECURITY+ SY0-701- 40 CEUS
COMPTIA CERTMASTER PRACTICE FOR SECURITY+ SY0-701 - 10 CEUS
CWNP CWS - CERTIFIED WIRELESS SPECIALIST
EC-COUNCIL CERTIFIED NETWORK DEFENDER (CND)
CERTIFIED ETHICAL HACKER (CEH)
CERTIFIED SECURITY ANALYST (ECSA)
COMPUTER HACKING FORENSICS INVESTIGATOR (CHFI)
CERTIFIED SECURITY SPECIALIST (ECSS)
CERTIFIED CHIEF INFORMATION SECURITY OFFICER (CCISO)
DISASTER RECOVERY PROFESSIONAL (EDRP)
CERTIFIED SOC ANALYST (CSA)
FORESCOUT CERTIFIED EXPERT FSCE
CERTIFIED PROFESSIONAL FSCP
FORESCOUT CERTIFIED EXPERT OT/ICS FSCE:OT/ICS
FORTINET FORTIGATE SECURITY
FORTIGATE INFRASTRUCTURE
NSE4 IMMERSION
FORTIMANAGER
FORTIEDR
FORTISIEM
FORTIANALYZER
FORTICLIENT EMS
FORTIANALYZER ADMINISTRATOR
FORTIMAIL
FORTISANDBOX
FORTIAUTHENTICATOR
CLOUD SECURITY FOR AZURE
CLOUD SECURITY FOR AWS
FORTIADC
FORTIWEB
FORTISOAR ADMINISTRATOR
FORTISWITCH
FORTINAC
SECURE WIRELESS LAN
FORTIVOICE
PUBLIC CLOUD SECURITY
OT SECURITY
LAN EDGE
SD-WAN
ENTERPRISE FIREWALL
ADVANCED ANALYTICS
FORTISOAR DESIGN AND DEVELOPMENT
GOOGLE ARCHITECTING WITH GOOGLE COMPUTE ENGINE
DATA ENGINEERING ON GOOGLE CLOUD PLATFORM
DEVELOPING APPLICATIONS WITH GOOGLE CLOUD PLATFORM
NETWORKING IN GOOGLE CLOUD PLATFORM
SECURITY IN GOOGLE CLOUD PLATFORM
GOOGLE’S APPLIED DIGITAL SKILLS
GOOGLE CLOUD PLATFORM FUNDAMENTALS FOR AWS PROFESSIONALS
HPE/ARUBA IMPLEMENTING ARUBA WLAN (IAW) 8
SCALABLE WLAN DESIGN & IMPLEMENTATION (SWDI) V8
DESIGNING ADVANCED MOBILITY SOLUTIONS (DAMS)
CLEARPASS ESSENTIALS
IBM IBM SECURITY QRADAR SIEM V7.5 ANALYSIS
IBM SECURITY QRADAR SIEM V7.5 ADMINISTRATION
IBM SECURITY QRADAR SIEM V7.5 DEPLOYMENT
IBM SECURITY IDENTITY GOVERNANCE AND INTELLIGENCE V5.2.5 DEPLOYMENT
DATABASES AND SQL FOR DATA SCIENCE WITH PYTHON
DEVELOPING CUSTOM RULES IN IBM QRADAR SIEM
QRADAR PLANNING AND INSTALLATION GUIDE
BASELINE: DEPLOY & DEVELOP
DEVELOPING APPLICATIONS IN PYTHON ON AWS
QRADAR SIEM API
WHY QRADAR SIEM?
QRADAR SIEM V7.4.3 DEPLOYMENT
ISACA CGEIT CERTIFIED IN THE GOVERNANCE OF ENTERPRISE IT
CET CERTIFIED IN EMERGING TECHNOLOGY CERTIFICATION
CYBERSECURITY AUDIT
(ISC)2 (ISC)2 TRAINING FOR CCSP
(ISC)2 TRAINING FOR SSCP
JUNIPER JUNIPER NETWORKS DESIGN - DATA CENTER (JND-DC)
JUNIPER NETWORKS DESIGN-SECURITY (JND-SEC)
JUNIPER NETWORKS DESIGN-SERVICE PROVIDER (JND-SP)
MICROSOFT DEPLOYING AND MANAGING WINDOWS 10 USING ENTERPRISE SERVICES
DEVELOPING WINDOWS AZURE AND WEB SERVICES JUMP START
DEVELOPING MICROSOFT SHAREPOINT SERVER 2013 CORE SOLUTIONS JUMP START
PLANNING AND ADMINISTERING SHAREPOINT 2016
DEVELOPING MICROSOFT SHAREPOINT® SERVER 2013 CORE SOLUTIONS
ADVANCED TECHNOLOGIES OF SHAREPOINT 2016
DEVELOPING WINDOWS AZURE™ AND WEB SERVICES
QUERYING DATA WITH TRANSACT-SQL
DEVELOPING SQL DATA MODELS
INSTALLING AND CONFIGURING WINDOWS® 7 CLIENT
IMPLEMENTING A SQL DATA WAREHOUSE
DEVELOPING SQL DATABASES
SUPPORTING AND TROUBLESHOOTING WINDOWS 10
NETWORKING FUNDAMENTALS
SECURITY FUNDAMENTALS
CONFIGURING WINDOWS® 8.1
SUPPORTING WINDOWS® 8.1
WINDOWS SERVER ADMINISTRATION FUNDAMENTALS
INSTALLATION, STORAGE, AND COMPUTE WITH WINDOWS SERVER 2016
NETWORKING WITH WINDOWS SERVER 2016
IDENTITY WITH WINDOWS SERVER 2016
INSTALLING AND CONFIGURING WINDOWS SERVER 2012
ADMINISTERING WINDOWS SERVER 2012
CONFIGURING ADVANCED WINDOWS SERVER 2012 SERVICES
DESIGNING AND IMPLEMENTING A SERVER INFRASTRUCTURE
IMPLEMENTING AN ADVANCED SERVER INFRASTRUCTURE
DEPLOYING ENTERPRISE VOICE WITH SKYPE FOR BUSINESS 2015
SERVER VIRTUALIZATION WITH WINDOWS SERVER HYPER-V AND SYSTEM CENTER
MOC WORKSHOP: ARCHITECTING MICROSOFT AZURE SOLUTIONS
MONITORING AND OPERATING A PRIVATE CLOUD
CONFIGURING AND DEPLOYING A PRIVATE CLOUD
ADMINISTERING A SQL DATABASE INFRASTRUCTURE
DEVELOPING MICROSOFT AZURE SOLUTIONS
IMPLEMENTING MICROSOFT AZURE INFRASTRUCTURE SOLUTIONS
SECURING WINDOWS SERVER 2016
DESIGNING AND IMPLEMENTING CLOUD DATA PLATFORM SOLUTIONS
DESIGNING A DATA SOLUTION WITH MICROSOFT SQL SERVER
WINDOWS SERVER 2012: TECHNICAL OVERVIEW
WINDOWS 10 FEATURES FOR A MOBILE WORKFORCE
WINDOWS SERVER 2012 TRAINING: NETWORKING
WINDOWS SERVER 2012: IDENTITY AND ACCESS
WINDOWS SERVER 2012: STORAGE
DEVELOPING MICROSOFT SQL SERVER DATABASES
DESIGNING DATABASE SOLUTIONS FOR SQL SERVER
OFFENSIVE SECURITY WEB-300: ADVANCED WEB ATTACKS AND EXPLOITATION
EXP-401: ADVANCED WINDOWS EXPLOITATION
WEB-200: FOUNDATIONAL WEB APPLICATION ASSESSMENTS WITH KALI LINUX
SOC-200: FOUNDATIONAL SECURITY OPERATIONS AND DEFENSIVE ANALYSIS
OPENTEXT IR250 - INCIDENT INVESTIGATION
DFIR370 - HOST INTRUSION METHODOLOGY AND INVESTIGATION
DF120 - FOUNDATIONS IN DIGITAL FORENSICS WITH ENCASE
DF125 - MOBILE DEVICE EXAMINATIONS WITH ENCASE
DF210 - BUILDING AN INVESTIGATION WITH ENCASE
DF320 - ADVANCED ANALYSIS OF WINDOWS ARTIFACTS WITH ENCASE
IR280 ENCASE ENDPOINT SECURITY
DFIR130 ENCASE ENDPOINT INVESTIGATOR TRAINING
DFIR350 INTERNET-BASED INVESTIGATIONS WITH ENCASE
ED290 EDISCOVERY TRAINING WITH ENCASE INFORMATION ASSURANCE
DFIR450 ENCASE ENSCRIPT PROGRAMMING
PALO ALTO FIREWALL 11.0 ESSENTIALS: CONFIGURATION AND MANAGEMENT (EDU-210)
PANORAMA 11.0: MANAGING FIREWALLS AT SCALE (EDU-220)
PRISMA CLOUD: MONITORING AND SECURING - EDU-150
PRISMA CLOUD: ONBOARDING AND OPERATIONALIZING - EDU- 152
PCC TRAINING
INTRODUCTION TO CYBERSECURITY
FUNDAMENTALS OF NETWORK SECURITY
FUNDAMENTALS OF CLOUD SECURITY
FUNDAMENTALS OF SECURITY OPERATIONS CENTER (SOC)
USE OF THE PALO ALTO NETWORKS CYBER SECURITY ACADEMY CYBERSECURITY SURVIVAL GUIDE
FUNDAMENTALS OF SECURITY OPERATIONS CENTER (SOC)
INTRODUCTION TO CORTEX XSOAR
CORTEX XSOAR ADMIN TRAINING
CORTEX XSOAR ANALYST TRAINING
CORTEX XSOAR SOAR ENGINEER TRAINING
RED HAT RED HAT SYSTEM ADMINISTRATION I (RH124)
RED HAT SYSTEM ADMINISTRATION II (RH134)
RED HAT OPENSTACK ADMINISTRATION I (CL110)
RED HAT OPENSTACK ADMINISTRATION II (CL210)
RED HAT OPENSTACK SYSTEM ADMINISTRATION III (CL310)
RED HAT SYSTEM ADMINISTRATION III (RH254)
RED HAT SECURITY: Linux in Physical, Virtual, and Cloud (RH415)
RED HAT CLOUDFORMS HYBRID CLOUD MANAGEMENT (CL220)
RED HAT GLUSTER STORAGE ADMINISTRATION (RH236)
RED HAT SECURITY: LINUX IN PHYSICAL, VIRTUAL, AND CLOUD (RH415)
RED HAT ENTERPRISE LINUX DIAGNOSTICS AND TROUBLESHOOTING (RH342)
RED HAT SECURITY: IDENTITY MANAGEMENT AND ACTIVE DIRECTORY INTEGRATION (RH362)
AUTOMATION WITH ANSIBLE II: ANSIBLE TOWER (DO409)
RED HAT SATELLITE 6 ADMINISTRATION (RH403)
SABSA A1 – ADVANCED SABSA RISK, ASSURANCE & GOVERNANCE
A2 – ADVANCED SABSA ARCHITECTURE PROGRAM MANAGEMENT
A3 – ADVANCED SABSA ARCHITECTURE DESIGN
A3 – SABSA A3 – ARCHITECTURE DESIGN DEVELOPMENT
A4 – ADVANCED SABSA INCIDENT, MONITORING & INVESTIGATIONS ARCHITECTURE
A5 – ADVANCED SABSA BUSINESS CONTINUITY AND CRISIS MANAGEMENT
SANS AUD507: AUDITING & MONITORING NETWORKS, PERIMETERS & SYSTEMS
FOR498: BATTLEFIELD FORENSICS & DATA ACQUISITION
FOR509: ENTERPRISE CLOUD FORENSICS AND INCIDENT RESPONSE
FOR518: MAC AND IOS FORENSIC ANALYSIS AND INCIDENT RESPONSE
FOR572: ADVANCED NETWORK FORENSICS AND ANALYSIS
FOR578: CYBER THREAT INTELLIGENCE
ICS410: ICS/SCADA SECURITY ESSENTIALS
ICS456: ESSENTIALS FOR NERC CRITICAL INFRASTRUCTURE PROTECTION
ICS515: ICS ACTIVE DEFENSE AND INCIDENT RESPONSE
LEG523: LAW OF DATA SECURITY AND INVESTIGATIONS
MGT512: SANS SECURITY LEADERSHIP ESSENTIALS FOR MANAGERS WITH KNOWLEDGE COMPRESSION
MGT514: SECURITY STRATEGIC PLANNING, POLICY, AND LEADERSHIP
MGT551: BUILDING AND LEADING SECURITY OPERATIONS CENTERS
SEC275: FOUNDATIONS: COMPUTERS, TECHNOLOGY, & SECURITY
SEC301: INTRO TO INFORMATION SECURITY
SEC401: SECURITY ESSENTIALS BOOTCAMP STYLE
SEC450: BLUE TEAM FUNDAMENTALS: SECURITY OPERATIONS AND ANALYSIS
SEC460: ENTERPRISE AND CLOUD | THREAT AND VULNERABILITY ASSESSMENT
SEC488: CLOUD SECURITY ESSENTIALS
SEC497: PRACTICAL OPEN-SOURCE INTELLIGENCE (OSINT)
SPLUNK USING SPLUNK ENTERPRISE SECURITY
VMware VMWARE VSPHERE: FAST TRACK [V6.7]
VMWARE VSPHERE: INSTALL, CONFIGURE, MANAGE [V6.7]
VMWARE VSPHERE: OPTIMIZE AND SCALE [V6.7]
VMWARE VSPHERE: SKILLS FOR PUBLIC SECTOR ADMINISTRATORS [V6.7]
VMWARE VSPHERE: TROUBLESHOOTING WORKSHOP [V6.7]
VMWARE ADVANCED SKILLS FOR VSPHERE PROFESSIONAL WORKSHOP [V6.7]
VMWARE VSPHERE: DESIGN WORKSHOP [V6.5]
VMWARE NSX: INSTALL, CONFIGURE, MANAGE [V6.4]
VMWARE NSX: INSTALL, CONFIGURE, MANAGE [V6.2]
VMWARE NSX: TROUBLESHOOTING AND OPERATIONS [V6.4]
VMWARE NSX: TROUBLESHOOTING AND OPERATIONS [V6.3]
VMWARE NSX-T: INSTALL, CONFIGURE, MANAGE [V2.2]
VMWARE NSX-T DATA CENTER: INSTALL, CONFIGURE, MANAGE [V2.4]
VMWARE NSX-T DATA CENTER: TROUBLESHOOTING AND OPERATIONS [V2.4]
VMWARE NSX-T DATA CENTER: DESIGN [V2.4]
VMWARE HORIZON 7: INSTALL, CONFIGURE, MANAGE [V7.3]
VMWARE HORIZON 7: DESIGN WORKSHOP [V7.0]
ZSCALER ZIA INTRODUCTION
ZIA FUNDAMENTALS
MONITORING INTERNET ACCESS SECURITY
ANALYZING INTERNET ACCESS TRAFFIC PATTERNS
CHECKING ZSCALER CLIENT CONNECTOR
CHECKING USER INTERNET ACCESS
CHECKING ZIA NETWORK CONNECTIVITY
CHECKING ZIA USER AUTHENTICATION
ADJUSTING INTERNET ACCESS POLICIES
AUDITING SECURITY POLICY
INVESTIGATING SECURITY ISSUES
TROUBLESHOOTING ZIA
ZIA AUTHENTICATION (ADVANCED)
ZIA TRAFFIC FORWARDING (ADVANCED)
CLIENT CONNECTOR MANAGEMENT
CLIENT CONNECTOR: ZIA SPECIFIC CONFIGURATIONS
ZIA BANDWIDTH CONTROL
ZIA DNS SECURITY & OPTIMIZATION
ZIA NANOLOG STREAMING SERVICE (NSS)
SURVEY FOR THE ZIA PRO PATH
ZPA ARCHITECTURE
ZPA APP CONNECTORS (ADVANCED)
ZPA POLICY
ZPA FEATURES
ZPA AUTHENTICATION
INTUNE FOR IOS USING SCEP
SURVEY FOR THE ZPA PRO PATH