Pre-approved Training for CompTIA Linux+ Continuing Education Units (CEUs)
Note: Training in this list is subject to change without prior notification. As CompTIA exams are updated so is this list. Training uploaded into a certification record by the candidate prior to the change will remain valid. Training earned that was listed previously and has not been uploaded into a certification record can no longer be used for CEUs.
Training approved in this document is based on the CompTIA Linux+ - XK0-005 objectives.
CERTIFICATION PROVIDER | COURSE TITLE |
---|---|
AMAZON | AWS CLOUD PRACTITIONER ESSENTIALS (2ND EDITION) |
AWS TECHNICAL ESSENTIALS | |
EXAM READINESS: AWS CERTIFIED ADVANCED NETWORKING - SPECIALTY | |
DATA ANALYTICS FUNDAMENTALS | |
BIG DATA ON AWS | |
AWS SECURITY FUNDAMENTALS (SECOND EDITION) | |
ARCHITECTING ON AWS | |
AWS WELL-ARCHITECTED TRAINING | |
SECURITY ENGINEERING ON AWS | |
EXAM READINESS: AWS CERTIFIED SECURITY - SPECIALTY | |
ALEXA FOR DEVELOPERS | |
AMAZON WORKSPACES PRIMER | |
APPLICATION DEVELOPMENT USING AWS DYNAMODB | |
AWS FOUNDATIONS: GETTING STARTED WITH THE AWS CLOUD ESSENTIALS | |
AWS HADOOP FUNDAMENTALS | |
AWS SECURITY ESSENTIALS | |
AWS SECURITY FUNDAMENTALS | |
AWS SECURITY HUB PRIMER | |
AWS SYSTEMS MANAGER | |
BREAK FREE OF LEGACY DATABASES | |
CLOUD AUDIT ACADEMY | |
CONFIGURE AND DEPLOY AWS PRIVATELINK | |
DATA WAREHOUSING ON AWS | |
DEEP DIVE WITH SECURITY: AWS IDENTITY AND ACCESS MANAGEMENT (IAM) | |
EXAM READINESS: AWS CERTIFIED DATA ANALYTICS – SPECIALTY | |
GETTING STARTED WITH AWS SECURITY, IDENTITY, AND COMPLIANCE | |
INTERNET OF THINGS (IOT) MICROCONTROLLERS SERIES | |
IOT EDGE COMPUTING: AWS IOT GREENGRASS PRIMER | |
PLANNING AN AWS OUTPOSTS IMPLEMENTATION | |
TRANSIT GATEWAY NETWORKING AND SCALING | |
VISUALIZING WITH QUICKSIGHT | |
BROADCOM/SYMANTEC | SYMANTEC ENDPOINT PROTECTION 14: PLAN AND IMPLEMENT |
SYMANTEC ENDPOINT PROTECTION 14: MANAGE AND ADMINISTER | |
SYMANTEC ENDPOINT PROTECTION 14: MAINTAIN AND TROUBLESHOOT | |
SYMANTEC DATA LOSS PREVENTION 15.0 ADMINISTRATION | |
SYMANTEC DATA LOSS PREVENTION 15.0 INSTALL AND DEPLOY | |
SYMANTEC DATA LOSS PREVENTION 15.0 DIFFERENCES | |
SYMANTEC IDENTITY AND AUTHENTICATION SERVICES R1 | |
PACKETSHAPER 11.9.1 ADMINISTRATION | |
SYMANTEC PROXYSG 6.6 BASIC ADMINISTRATION | |
SYMANTEC PROXYSG 6.6 ADVANCED ADMINISTRATION | |
SYMANTEC SECURITY ANALYTICS 7.2: ADMINISTRATOR | |
SYMANTEC SECURITY ANALYTICS 7.2: PROFESSIONAL | |
SSL VISIBILITY 5.0 ADMINISTRATION | |
CLOUDSOC ADMINISTRATION R2 | |
CLOUDSOC DIFFERENCES R2.1.1 | |
SYMANTEC ADVANCED THREAT PROTECTION 3.0: INCIDENT RESPONSE | |
ENDPOINT PROTECTION 14: CONFIGURE AND PROTECT | |
SYMANTEC DATA CENTER SECURITY – SERVER ADVANCED 6.7 ADMINISTRATION | |
EMAIL SECURITY.CLOUD ADMINISTRATION R1 | |
SYMANTEC MESSAGING GATEWAY 10.6 ADMINISTRATION | |
CHECK POINT | CHECK POINT CYBER SECURITY ADMINISTRATOR (CCSA) |
CHECK POINT CYBER SECURITY ENGINEERING (CCSE) | |
CHECK POINT CERTIFIED SECURITY MASTER (CCSM) | |
CISCO | AUTOMATING AND PROGRAMMING CISCO COLLABORATION SOLUTIONS (CLAUTO) |
CONFIGURING CISCO MDS 9000 SERIES SWITCHES (DCMDS) | |
DESIGNING CISCO DATA CENTER INFRASTRUCTURE (DCID) | |
DESIGNING CISCO ENTERPRISE NETWORKS (ENSLD) | |
DEVELOPING APPLICATIONS AND AUTOMATING WORKFLOWS USING CISCO PLATFORMS (DEVASC) | |
DEVELOPING APPLICATIONS USING CISCO CORE PLATFORMS AND APIS (DEVCOR) | |
DEVELOPING SOLUTIONS USING CISCO IOT AND EDGE PLATFORMS (DEVIOT) | |
IMPLEMENTING AND CONFIGURING CISCO IDENTITY SERVICES ENGINE (SISE) | |
IMPLEMENTING AND OPERATING CISCO DATA CENTER CORE TECHNOLOGIES (DCCOR) | |
IMPLEMENTING AND OPERATING CISCO ENTERPRISE NETWORK CORE TECHNOLOGIES (ENCOR) | |
IMPLEMENTING AND OPERATING CISCO SECURITY CORE TECHNOLOGIES (SCOR) | |
IMPLEMENTING AND OPERATING CISCO SERVICE PROVIDER NETWORK CORE TECHNOLOGIES (SPCOR) | |
IMPLEMENTING AUTOMATION FOR CISCO DATA CENTER SOLUTIONS (DCAUI) | |
IMPLEMENTING AUTOMATION FOR CISCO ENTERPRISE SOLUTIONS (ENAUI) | |
IMPLEMENTING AUTOMATION FOR CISCO SECURITY SOLUTIONS (SAUI) | |
IMPLEMENTING AUTOMATION FOR CISCO SERVICE PROVIDER SOLUTIONS (SPAUI) | |
IMPLEMENTING CISCO APPLICATION CENTRIC INFRASTRUCTURE (DCACI) | |
IMPLEMENTING CISCO COLLABORATION CLOUD AND EDGE SOLUTIONS (CLCEI) | |
IMPLEMENTING CISCO COLLABORATION CORE TECHNOLOGIES (CLCOR) | |
IMPLEMENTING CISCO ENTERPRISE ADVANCED ROUTING AND SERVICES (ENARSI) | |
IMPLEMENTING CISCO ENTERPRISE WIRELESS NETWORKS (ENWLSI) | |
IMPLEMENTING CISCO SD-WAN SOLUTIONS (ENSDWI) | |
IMPLEMENTING CISCO SERVICE PROVIDER ADVANCED ROUTING SOLUTIONS (SPRI) | |
IMPLEMENTING CISCO SERVICE PROVIDER VPN SERVICES (SPVI) | |
IMPLEMENTING DEVOPS SOLUTIONS AND PRACTICES USING CISCO PLATFORMS (DEVOPS) | |
IMPLEMENTING SECURE SOLUTIONS WITH VIRTUAL PRIVATE NETWORKS (SVPN) | |
SECURING EMAIL WITH CISCO EMAIL SECURITY APPLIANCE (SESA) | |
SECURING NETWORKS WITH CISCO FIREPOWER NEXT GENERATION FIREWALL (SSNGFW) | |
SECURING NETWORKS WITH CISCO FIREPOWER NEXT-GENERATION IPS (SSFIPS) | |
SECURING THE WEB WITH CISCO WEB SECURITY APPLIANCE (SWSA) | |
TROUBLESHOOTING CISCO DATA CENTER INFRASTRUCTURE (DCIT) | |
CLOUD SECURITY ALLIANCE | CERTIFICATE OF CLOUD AUDITING KNOWLEDGE (CCAK) |
CERTIFICATE OF CLOUD SECURITY KNOWLEDGE (CCSK) | |
COMPTIA | COMPTIA CLOUD+ (CV0-003) |
COMPTIA CERTMASTER LEARN FOR CLOUD+ CV0-003 - 25 CEUS | |
COMPTIA CERTMASTER PRACTICE FOR CLOUD+ CV0-003 - 10 CEUS | |
FORESCOUT | CERTIFIED EXPERT FSCE |
CERTIFIED PROFESSIONAL FSCP | |
FORESCOUT CERTIFIED EXPERT OT/ICS FSCE:OT/ICS | |
FORTINET | FORTIGATE SECURITY |
FORTIGATE INFRASTRUCTURE | |
NSE4 IMMERSION | |
FORTIMANAGER | |
FORTIEDR | |
FORTISIEM | |
FORTIANALYZER | |
FORTICLIENT EMS | |
FORTIANALYZER ADMINISTRATOR | |
FORTIMAIL | |
FORTISANDBOX | |
FORTIAUTHENTICATOR | |
CLOUD SECURITY FOR AZURE | |
CLOUD SECURITY FOR AWS | |
FORTIADC | |
FORTIWEB | |
FORTISOAR ADMINISTRATOR | |
FORTISWITCH | |
FORTINAC | |
SECURE WIRELESS LAN | |
FORTIVOICE | |
PUBLIC CLOUD SECURITY | |
OT SECURITY | |
LAN EDGE | |
SD-WAN | |
ENTERPRISE FIREWALL | |
ADVANCED ANALYTICS | |
FORTISOAR DESIGN AND DEVELOPMENT | |
ARCHITECTING WITH GOOGLE CLOUD PLATFORM: INFRASTRUCTURE | |
GOOGLE CLOUD PLATFORM FUNDAMENTALS: CORE INFRASTRUCTURE | |
DEVELOPING APPLICATIONS WITH GOOGLE CLOUD PLATFORM | |
IBM | IBM SECURITY QRADAR SIEM V7.5 ANALYSIS |
IBM SECURITY QRADAR SIEM V7.5 ADMINISTRATION | |
IBM SECURITY QRADAR SIEM V7.5 DEPLOYMENT | |
IBM SECURITY IDENTITY GOVERNANCE AND INTELLIGENCE V5.2.5 DEPLOYMENT | |
DATABASES AND SQL FOR DATA SCIENCE WITH PYTHON | |
DEVELOPING CUSTOM RULES IN IBM QRADAR SIEM | |
QRADAR PLANNING AND INSTALLATION GUIDE | |
BASELINE: DEPLOY & DEVELOP | |
DEVELOPING APPLICATIONS IN PYTHON ON AWS | |
QRADAR SIEM API | |
WHY QRADAR SIEM? | |
QRADAR SIEM V7.4.3 DEPLOYMENT | |
ISACA | CISA Exam Review |
CSX PRACTITIONER: IDENTIFICATION AND PROTECTION | |
CSX PRACTITIONER: RESPOND AND RECOVER | |
CSX PRACTITIONER BOOT CAMP | |
CSX PRACTITIONER: DETECTION | |
(ISC)2 | (ISC)2 TRAINING FOR CCSP |
(ISC)2 TRAINING FOR CISSP | |
(ISC)2 TRAINING FOR CISSP-ISSAP | |
(ISC)2 TRAINING FOR CISSP-ISSEP | |
(ISC)2 TRAINING FOR CISSP-ISSMP | |
(ISC)2 TRAINING FOR SSCP | |
OFFICIAL (ISC)2 CBK TRAINING SEMINAR FOR THE CGRC | |
(ISC)2 TRAINING FOR HCISPP | |
(ISC)2 CERTIFIED IN CYBERSECURITY (CC) TRAINING | |
JUNIPER | JUNIPER NETWORKS DESIGN-SERVICE PROVIDER (JND-SP) |
JUNIPER NETWORKS DESIGN - SECURITY (JND-SEC) | |
ADVANCED JUNOS SECURITY (AJSEC) | |
JUNOS FOR SECURITY PLATFORMS (JSEC) | |
MICROSOFT | MANAGING MICROSOFT 365 IDENTITY AND ACCESS |
IMPLEMENTING MICROSOFT 365 THREAT PROTECTION | |
ADMINISTERING MICROSOFT 365 BUILT-IN COMPLIANCE | |
IMPLEMENTING MICROSOFT 365 INFORMATION PROTECTION | |
OFFICE 365 MANAGEMENT | |
MICROSOFT 365 TENANT & SERVICE MANAGEMENT | |
MICROSOFT 365 IDENTITY MANAGEMENT | |
MICROSOFT 365 SECURITY MANAGEMENT | |
MICROSOFT 365 COMPLIANCE MANAGEMENT | |
MANAGING OFFICE 365 CONTENT SERVICES | |
ENABLING OFFICE 365 WORKLOADS FOR COLLABORATION | |
IMPLEMENTING SHAREPOINT HYBRID SCENARIOS | |
MIGRATING TO SHAREPOINT ONLINE | |
OFFENSIVE SECURITY | WEB-200: FOUNDATIONAL WEB APPLICATION ASSESSMENTS WITH KALI LINUX |
SOC-200: FOUNDATIONAL SECURITY OPERATIONS AND DEFENSIVE ANALYSIS | |
PEN-200: PENETRATION TESTING WITH KALI LINUX | |
PEN-210: FOUNDATIONAL WIRELESS NETWORK ATTACKS | |
PEN-300: ADVANCED EVASION TECHNIQUES AND BREACHING DEFENSES | |
EXP-301: WINDOWS USER MODE EXPLOIT DEVELOPMENT | |
EXP-312: ADVANCED MACOS CONTROL BYPASSES | |
OPENTEXT | DF120 — FOUNDATIONS IN DIGITAL FORENSICS WITH ENCASE |
DF125 — MOBILE DEVICE EXAMINATIONS WITH ENCASE | |
DF210 — BUILDING AN INVESTIGATION WITH ENCASE | |
DF320 — ADVANCED ANALYSIS OF WINDOWS ARTIFACTS WITH ENCASE | |
IR250 — INCIDENT INVESTIGATION | |
IR280 — ENCASE ENDPOINT SECURITY TRAINING | |
DFIR130 — ENCASE ENDPOINT INVESTIGATOR TRAINING | |
DFIR350 — INTERNET-BASED INVESTIGATIONS WITH ENCASE | |
DFIR370 — HOST INTRUSION METHODOLOGY AND INVESTIGATION | |
DFIR450 — ENCASE ENSCRIPT PROGRAMMING | |
ED290 — EDISCOVERY TRAINING WITH ENCASE INFORMATION ASSURANCE | |
PALO ALTO | FIREWALL 11.0 ESSENTIALS: CONFIGURATION AND MANAGEMENT (EDU-210) |
PANORAMA 11.0: MANAGING FIREWALLS AT SCALE (EDU-220) | |
PRISMA CLOUD: MONITORING AND SECURING - EDU-150 | |
PRISMA CLOUD: ONBOARDING AND OPERATIONALIZING - EDU- 152 | |
PCC TRAINING | |
INTRODUCTION TO CYBERSECURITY | |
FUNDAMENTALS OF NETWORK SECURITY | |
FUNDAMENTALS OF CLOUD SECURITY | |
FUNDAMENTALS OF SECURITY OPERATIONS CENTER (SOC) | |
USE OF THE PALO ALTO NETWORKS CYBER SECURITY ACADEMY CYBERSECURITY SURVIVAL GUIDE | |
FUNDAMENTALS OF SECURITY OPERATIONS CENTER (SOC) | |
INTRODUCTION TO CORTEX XSOAR | |
CORTEX XSOAR ADMIN TRAINING | |
CORTEX XSOAR ANALYST TRAINING | |
CORTEX XSOAR SOAR ENGINEER TRAINING | |
RED HAT | RED HAT SYSTEM ADMINISTRATION I (RH124) |
RED HAT SYSTEM ADMINISTRATION II (RH134) | |
RHCSA RAPID TRACK COURSE (RH199) | |
RED HAT OPENSTACK ADMINISTRATION I (CL110) | |
RED HAT OPENSTACK ADMINISTRATION II (CL210) | |
RED HAT SYSTEM ADMINISTRATION III (RH254) | |
RED HAT OPENSTACK SYSTEM ADMINISTRATION III (CL310) | |
RED HAT CLOUDFORMS HYBRID CLOUD MANAGEMENT (CL220) | |
JBOSS APPLICATION ADMINISTRATION I (JB248) | |
RED HAT GLUSTER STORAGE ADMINISTRATION (RH236) | |
RED HAT VIRTUALIZATION ADMINISTRATION (RH318) | |
CAMEL INTEGRATION AND DEVELOPMENT WITH RED HAT FUSE (JB421) | |
RED HAT SATELLITE 6 ADMINISTRATION (RH403) | |
RED HAT ENTERPRISE LINUX DIAGNOSTICS AND TROUBLESHOOTING (RH342) | |
RED HAT SECURITY: LINUX IN PHYSICAL, VIRTUAL, AND CLOUD (RH415) | |
AUTOMATION WITH ANSIBLE (DO407) | |
CONFIGURATION MANAGEMENT WITH PUPPET (DO405) | |
RED HAT ENTERPRISE PERFORMANCE TUNING (RH442) | |
RED HAT HIGH AVAILABILITY CLUSTERING (RH436) | |
RED HAT JBOSS DATA GRID DEVELOPMENT (JB453) | |
INTRODUCTION TO CONTAINERS, KUBERNETES, AND RED HAT OPENSHIFT (DO180) | |
RED HAT OPENSHIFT ADMINISTRATION I (DO280) | |
SABSA | A1 – ADVANCED SABSA RISK, ASSURANCE & GOVERNANCE |
A2 – ADVANCED SABSA ARCHITECTURE PROGRAM MANAGEMENT | |
A3 – ADVANCED SABSA ARCHITECTURE DESIGN | |
A3 – SABSA A3 – ARCHITECTURE DESIGN DEVELOPMENT | |
A4 – ADVANCED SABSA INCIDENT, MONITORING & INVESTIGATIONS ARCHITECTURE | |
A5 – ADVANCED SABSA BUSINESS CONTINUITY AND CRISIS MANAGEMENT | |
SANS | FOR498: BATTLEFIELD FORENSICS & DATA ACQUISITION |
FOR509: ENTERPRISE CLOUD FORENSICS AND INCIDENT RESPONSE | |
FOR518: MAC AND IOS FORENSIC ANALYSIS AND INCIDENT RESPONSE | |
FOR578: CYBER THREAT INTELLIGENCE | |
ICS456: ESSENTIALS FOR NERC CRITICAL INFRASTRUCTURE PROTECTION | |
MGT551: BUILDING AND LEADING SECURITY OPERATIONS CENTERS | |
SEC275: FOUNDATIONS: COMPUTERS, TECHNOLOGY, & SECURITY | |
SEC450: BLUE TEAM FUNDAMENTALS: SECURITY OPERATIONS AND ANALYSIS | |
SEC460: ENTERPRISE AND CLOUD | THREAT AND VULNERABILITY ASSESSMENT | |
SEC497: PRACTICAL OPEN-SOURCE INTELLIGENCE (OSINT) | |
SEC510: PUBLIC CLOUD SECURITY: AWS, AZURE, AND GCP | |
SEC522: APPLICATION SECURITY: SECURING WEB APPLICATIONS, APIS, AND MICROSERVICES | |
SEC530: DEFENSIBLE SECURITY ARCHITECTURE | |
SEC540: CLOUD SECURITY AND DEVSECOPS AUTOMATION | |
SEC541: CLOUD SECURITY ATTACKER TECHNIQUES, MONITORING, AND THREAT DETECTION | |
SEC555: SIEM WITH TACTICAL ANALYTICS | |
SEC588: CLOUD PENETRATION TESTING | |
SEC599: DEFEATING ADVANCED ADVERSARIES - PURPLE TEAM TACTICS & KILL CHAIN DEFENSES | |
SPLUNK | USING SPLUNK ENTERPRISE SECURITY |
If you have questions about specific stages of the certification renewal process, head over to our Help pages to find additional information, or contact our customer service team.