Pre-approved Training for CompTIA CySA+ Continuing Education Units (CEUs)
Note: Training in this list is subject to change without prior notification. As CompTIA exams are updated so is this list. Training uploaded into a certification record by the candidate prior to the change will remain valid. Training earned that was listed previously and has not been uploaded into a certification record can no longer be used for CEUs.
Training approved in this document is based on the CompTIA CySA+ - CS0-003 objectives.
| CERTIFICATION PROVIDER | COURSE TITLE |
|---|---|
| CHECK POINT | CHECK POINT CERTIFIED SECURITY MASTER (CCSM) |
| CHECK POINT CERTIFIED CLOUD SPECIALIST (CCCS) | |
| CHECK POINT CERTIFIED ENDPOINT SPECIALIST (CCES) | |
| CHECK POINT CERTIFIED AUTOMATION SPECIALIST (CCAS) | |
| INFRASTRUCTURE HACKING CHECK POINT CERTIFIED PENTESTING EXPERT (CCPE) | |
| CISCO | CONDUCTING FORENSIC ANALYSIS AND INCIDENT RESPONSE USING CISCO TECHNOLOGIES FOR CYBEROPS (CBRFIR) |
| CONDUCTING THREAT HUNTING AND DEFENDING USING CISCO TECHNOLOGIES FOR CYBEROPS (CBRTHD) | |
| IMPLEMENTING AND CONFIGURING CISCO IDENTITY SERVICES ENGINE (SISE) | |
| IMPLEMENTING AUTOMATION FOR CISCO SECURITY SOLUTIONS (SAUI) | |
| IMPLEMENTING SECURE SOLUTIONS WITH VIRTUAL PRIVATE NETWORKS (SVPN) | |
| IMPLEMENTING AND OPERATING CISCO SECURITY CORE TECHNOLOGIES (SCOR) | |
| PERFORMING CYBEROPS USING CISCO SECURITY TECHNOLOGIES (CBRCOR) | |
| SECURING EMAIL WITH CISCO EMAIL SECURITY APPLIANCE (SESA) | |
| SECURING NETWORKS WITH CISCO FIREPOWER NEXT GENERATION FIREWALL (SSNGFW) | |
| SECURING NETWORKS WITH CISCO FIREPOWER NEXT-GENERATION IPS (SSFIPS) | |
| SECURING THE WEB WITH CISCO WEB SECURITY APPLIANCE (SWSA) | |
| CLOUD SECURITY ALLIANCE | CERTIFICATE OF CLOUD SECURITY KNOWLEDGE (CCSK) |
| COMPTIA | COMPTIA ADVANCED SECURITY PRACTITIONER (CASP+) (CAS-004) |
| COMPTIA PENTEST+ (PT0-002) | |
| COMPTIA CYBERSECURITY ANALYST (CySA+) (CS0-002) APPROVED ONLY FOR THOSE CERTIFIED IN CySA+ CS0-002 OR EARLIER EXAM VERSIONS | |
| COMPTIA CERTMASTER LEARN FOR PENTEST+ PT0-002 - 25 CEUS | |
| COMPTIA CERTMASTER PRACTICE FOR PENTEST+ PT0-002 - 10 CEUS | |
| COMPTIA CERTMASTER LEARN FOR CYSA+ CS0-003 - 25 CEUS APPROVED ONLY FOR THOSE CERTIFIED IN CYSA+ CS0-002 OR EARLIER EXAM VERSIONS | |
| COMPTIA CERTMASTER PRACTICE FOR CYSA+ CS0-003 - 10 CEUS APPROVED ONLY FOR THOSE CERTIFIED IN CYSA+ CS0-002 OR EARLIER EXAM VERSIONS | |
| CERTMASTER LABS FOR CASP+ (EXAM CAS-004) - 40 CEUs | |
| CERTMASTER LEARN FOR CASP+ (EXAM CAS-004) - 40 CEUs | |
| CWNP | CWSP - CERTIFIED WIRELESS SECURITY PROFESSIONAL |
| EC-COUNCIL | CERTIFIED INCIDENT HANDLER (ECIH) |
| CERTIFIED SECURITY ANALYST (ECSA) | |
| DISASTER RECOVERY PROFESSIONAL (EDRP) | |
| COMPUTER HACKING FORENSICS INVESTIGATOR (CHFI) | |
| CERTIFIED CHIEF INFORMATION SECURITY OFFICER (CCISO) | |
| CERTIFIED SECURITY SPECIALIST (ECSS) | |
| CERTIFIED ENCRYPTION SPECIALIST (ECES) | |
| CYBER THREAT INTELLIGENCE ANALYST (CTIA) | |
| CERTIFIED SOC ANALYST (CSA) | |
| CERTIFIED PENETRATION TESTING (CPENT) | |
| OPENTEXT | IR250 - INCIDENT INVESTIGATION |
| DFIR370 - HOST INTRUSION METHODOLOGY AND INVESTIGATION | |
| DF120 - FOUNDATIONS IN DIGITAL FORENSICS WITH ENCASE | |
| DF125 - MOBILE DEVICE EXAMINATIONS WITH ENCASE | |
| DF210 - BUILDING AN INVESTIGATION WITH ENCASE | |
| DF320 - ADVANCED ANALYSIS OF WINDOWS ARTIFACTS WITH ENCASE | |
| IR280 ENCASE ENDPOINT SECURITY | |
| DFIR130 ENCASE ENDPOINT INVESTIGATOR TRAINING | |
| DFIR350 INTERNET-BASED INVESTIGATIONS WITH ENCASE | |
| ED290 EDISCOVERY TRAINING WITH ENCASE INFORMATION ASSURANCE | |
| DFIR450 ENCASE ENSCRIPT PROGRAMMING | |
| FORTINET | FORTIGATE SECURITY |
| FORTIGATE INFRASTRUCTURE | |
| NSE4 IMMERSION | |
| PUBLIC CLOUD SECURITY | |
| OT SECURITY | |
| LAN EDGE | |
| SD-WAN | |
| ENTERPRISE FIREWALL | |
| ADVANCED ANALYTICS | |
| FORTISOAR DESIGN AND DEVELOPMENT | |
| ISACA | CRISC EXAM REVIEW |
| CGEIT EXAM REVIEW | |
| CISM EXAM REVIEW | |
| CISA EXAM REVIEW | |
| (ISC)2 | OFFICIAL (ISC)2 CBK TRAINING SEMINAR FOR THE CGRC |
| (ISC)2 TRAINING FOR CCSP | |
| (ISC)2 TRAINING FOR CISSP | |
| (ISC)2 TRAINING FOR HCISPP | |
| (ISC)2 TRAINING FOR CISSP-ISSAP | |
| (ISC)2 TRAINING FOR CISSP-ISSEP | |
| (ISC)2 TRAINING FOR CISSP-ISSMP | |
| (ISC)2 TRAINING FOR SSCP | |
| OFFENSIVE SECURITY | PEN-200: PENETRATION TESTING WITH KALI LINUX |
| PEN-210: FOUNDATIONAL WIRELESS NETWORK ATTACKS | |
| PEN-300: ADVANCED EVASION TECHNIQUES AND BREACHING DEFENSES | |
| EXP-401: ADVANCED WINDOWS EXPLOITATION | |
| WEB-300: ADVANCED WEB ATTACKS AND EXPLOITATION | |
| SABSA | A1 – ADVANCED SABSA RISK, ASSURANCE & GOVERNANCE |
| A3 – SABSA A3 – ARCHITECTURE DESIGN DEVELOPMENT | |
| A2 – ADVANCED SABSA ARCHITECTURE PROGRAM MANAGEMENT | |
| A3 – ADVANCED SABSA ARCHITECTURE DESIGN | |
| A4 – ADVANCED SABSA INCIDENT, MONITORING & INVESTIGATIONS ARCHITECTURE | |
| A5 – ADVANCED SABSA BUSINESS CONTINUITY AND CRISIS MANAGEMENT | |
| SANS | |
| AUD507: AUDITING & MONITORING NETWORKS, PERIMETERS & SYSTEMS | |
| FOR508: ADVANCED DIGITAL FORENSICS, INCIDENT RESPONSE, AND THREAT HUNTING | |
| FOR578: CYBER THREAT INTELLIGENCE | |
| FOR572: ADVANCED NETWORK FORENSICS AND ANALYSIS | |
| FOR585: ADVANCED SMARTPHONE FORENSICS | |
| FOR610: REVERSE-ENGINEERING MALWARE: MALWARE ANALYSIS TOOLS AND TECHNIQUES | |
| ICS456: ESSENTIALS FOR NERC CRITICAL INFRASTRUCTURE PROTECTION | |
| MGT414: SANS TRAINING PROGRAM FOR THE CISSP® CERTIFICATION EXAM | |
| MGT512: SANS SECURITY LEADERSHIP ESSENTIALS FOR MANAGERS WITH KNOWLEDGE COMPRESSION | |
| MGT514: IT SECURITY STRATEGIC PLANNING, POLICY AND LEADERSHIP | |
| SEC440: CRITICAL SECURITY CONTROLS: PLANNING, IMPLEMENTING AND AUDITING | |
| SEC504: HACKER TOOLS, TECHNIQUES, EXPLOITS AND INCIDENT HANDLING | |
| SEC542: WEB APP PENETRATION TESTING AND ETHICAL HACKING | |
| SEC550: ACTIVE DEFENSE, OFFENSIVE COUNTERMEASURES AND CYBER DECEPTION | |
| SEC560: NETWORK PENETRATION TESTING AND ETHICAL HACKING | |
| SEC561: INTENSE HANDS-ON PEN TESTING SKILL DEVELOPMENT (WITH SANS NETWARS) | |
| SEC562: CYBERCITY HANDS-ON KINETIC CYBER RANGE EXERCISE | |
| SEC575: MOBILE DEVICE SECURITY AND ETHICAL HACKING | |
| SEC580: METASPLOIT KUNG FU FOR ENTERPRISE PEN TESTING | |
| SEC617: WIRELESS ETHICAL HACKING, PENETRATION TESTING, AND DEFENSES | |
| SEC642: ADVANCED WEB APP PENETRATION TESTING AND ETHICAL HACKING | |
| SEC660: ADVANCED PENETRATION TESTING, EXPLOIT WRITING, AND ETHICAL HACKING | |
| SEC760: ADVANCED EXPLOIT DEVELOPMENT FOR PENETRATION TESTERS | |
| FOR500: WINDOWS FORENSIC ANALYSIS | |
| SEC530: DEFENSIBLE SECURITY ARCHITECTURE | |
| SEC555: SIEM WITH TACTICAL ANALYTICS | |
| SEC599: DEFEATING ADVANCED ADVERSARIES - PURPLE TEAM TACTICS & KILL CHAIN DEFENSES | |
| SEC599: Defeating Advanced Adversaries - Purple Team Tactics & Kill Chain Defenses |
If you have questions about specific stages of the certification renewal process, head over to our Help pages to find additional information, or contact our customer service team.