Pre-approved Training for CompTIA Network+ Continuing Education Units (CEUs)
Note: Training in this list is subject to change without prior notification. As CompTIA exams are updated so is this list. Training uploaded into a certification record by the candidate prior to the change will remain valid. Training earned that was listed previously and has not been uploaded into a certification record can no longer be used for CEUs.
Training approved in this document is based on the CompTIA Network+ - N10-009 objectives.
| CERTIFICATION PROVIDER | COURSE TITLE |
|---|---|
| AMAZON | AWS SECURITY FUNDAMENTALS |
| ADVANCED ARCHITECTING ON AWS | |
| EXAM READINESS WORKSHOP: AWS CERTIFIED SOLUTIONS ARCHITECT - PROFESSIONAL | |
| DEVELOPING ON AWS | |
| AWS WELL-ARCHITECTED TRAINING | |
| AWS CLOUD PRACTITIONER ESSENTIALS (SECOND EDITION) | |
| AWS TECHNICAL ESSENTIALS | |
| EXAM READINESS: AWS CERTIFIED ADVANCED NETWORKING - SPECIALTY | |
| DATA ANALYTICS FUNDAMENTALS | |
| BIG DATA ON AWS | |
| ARCHITECTING ON AWS | |
| SECURITY ENGINEERING ON AWS | |
| EXAM READINESS: AWS CERTIFIED SECURITY - SPECIALTY | |
| ALEXA FOR DEVELOPERS | |
| AMAZON API GATEWAY FOR SERVERLESS APPLICATIONS | |
| AMAZON CONNECT: BUILD A CUSTOM CALL CONTROL PANEL | |
| AMAZON ELASTIC KUBERNETES SERVICE (EKS) PRIMER | |
| AMAZON LUMBERYARD PRIMER | |
| AMAZON WORKSPACES PRIMER | |
| APPLICATION DEVELOPMENT USING AWS DYNAMODB | |
| AWS ELEMENTAL CONDUCTOR | |
| AWS FOUNDATIONS: GETTING STARTED WITH THE AWS CLOUD ESSENTIALS | |
| AWS HADOOP FUNDAMENTALS | |
| AWS LAMBDA FOUNDATIONS | |
| AWS SAAS FACTORY ARCHITECTURE TRACK: SAAS MIGRATION STRATEGIES | |
| AWS SECURITY ESSENTIALS | |
| AWS SECURITY FUNDAMENTALS (SECOND EDITION) | |
| AWS SECURITY HUB PRIMER | |
| AWS SYSTEMS MANAGER | |
| BREAK FREE OF LEGACY DATABASES | |
| CLOUD AUDIT ACADEMY | |
| CONFIGURE AND DEPLOY AWS PRIVATELINK | |
| DATA WAREHOUSING ON AWS | |
| DEEP DIVE WITH SECURITY: AWS IDENTITY AND ACCESS MANAGEMENT (IAM) | |
| DEPLOYING AND SCALING APPLICATIONS WITH AMAZON LIGHTSAIL | |
| DIVE DEEP INTO AMAZON CONNECT REPORTING AND METRICS | |
| EXAM READINESS: AWS CERTIFIED DATA ANALYTICS – SPECIALTY | |
| GAME SERVER HOSTING WITH AMAZON EC2 | |
| GETTING STARTED WITH AMAZON SIMPLE STORAGE SERVICE (AMAZON S3) | |
| GETTING STARTED WITH AWS SECURITY, IDENTITY, AND COMPLIANCE | |
| GETTING STARTED WITH DEVOPS ON AWS | |
| INTERNET OF THINGS (IOT) MICROCONTROLLERS SERIES | |
| INTRODUCTION TO BLOCKCHAIN | |
| IOT EDGE COMPUTING: AWS IOT GREENGRASS PRIMER | |
| MANAGING AMAZON SIMPLE STORAGE SERVICE (AMAZON S3) | |
| MOBILE DEVELOPMENT IN IOT | |
| PLANNING AN AWS OUTPOSTS IMPLEMENTATION | |
| POSTGRESQL FUNDAMENTALS: ARCHITECTURE | |
| SPEAKING OF: MACHINE TRANSLATION AND NATURAL LANGUAGE PROCESSING (NLP) | |
| TRANSIT GATEWAY NETWORKING AND SCALING | |
| VISUALIZING WITH QUICKSIGHT | |
| APPLE | MAC INTEGRATION BASICS 10.11 |
| MAC INTEGRATION BASICS 10.12 | |
| ARCITURA CLOUD SCHOOL | FUNDAMENTAL CLOUD ARCHITECTURE |
| ADVANCED CLOUD ARCHITECTURE | |
| FUNDAMENTAL CLOUD SECURITY | |
| ADVANCED CLOUD SECURITY | |
| FUNDAMENTAL CLOUD STORAGE | |
| ADVANCED CLOUD STORAGE | |
| FUNDAMENTAL CLOUD VIRTUALIZATION | |
| ADVANCED CLOUD VIRTUALIZATION | |
| FUNDAMENTAL CLOUD CAPACITY | |
| ADVANCED CLOUD CAPACITY | |
| FUNDAMENTAL CLOUD COMPUTING | |
| CLOUD TECHNOLOGY CONCEPTS | |
| BROADCOM/SYMANTEC | SYMANTEC DATA CENTER SECURITY – SERVER ADVANCED 6.7 ADMINISTRATION – MUST COMPLETE ALL MODULES FOR CEUS |
| ENDPOINT PROTECTION 14: CONFIGURE AND PROTECT | |
| SYMANTEC ENDPOINT PROTECTION 14: PLAN AND IMPLEMENT | |
| SYMANTEC ENDPOINT PROTECTION 14: MANAGE AND ADMINISTER | |
| SYMANTEC ENDPOINT PROTECTION 14: MAINTAIN AND TROUBLESHOOT | |
| SYMANTEC DATA LOSS PREVENTION 15.0 ADMINISTRATION | |
| SYMANTEC DATA LOSS PREVENTION 15.0 INSTALL AND DEPLOY | |
| SYMANTEC DATA LOSS PREVENTION 15.0 DIFFERENCES | |
| SYMANTEC IDENTITY AND AUTHENTICATION SERVICES R1 | |
| PACKETSHAPER 11.9.1 ADMINISTRATION | |
| SYMANTEC PROXYSG 6.6 BASIC ADMINISTRATION | |
| SYMANTEC PROXYSG 6.6 ADVANCED ADMINISTRATION | |
| SYMANTEC SECURITY ANALYTICS 7.2: ADMINISTRATOR | |
| SYMANTEC SECURITY ANALYTICS 7.2: PROFESSIONAL | |
| SSL VISIBILITY 5.0 ADMINISTRATION | |
| CLOUDSOC ADMINISTRATION R2 | |
| CLOUDSOC DIFFERENCES R2.1.1 | |
| SYMANTEC ADVANCED THREAT PROTECTION 3.0: INCIDENT RESPONSE | |
| SYMANTEC MESSAGING GATEWAY 10.6 ADMINISTRATION | |
| SYMANTEC CONTROL COMPLIANCE SUITE (CCS) 11.0: ADMINISTRATION | |
| EMAIL SECURITY.CLOUD ADMINISTRATION R1 | |
| CHECK POINT | CHECK POINT CYBER SECURITY ADMINISTRATOR (CCSA) |
| CHECK POINT CYBER SECURITY ENGINEERING (CCSE) | |
| CHECK POINT CERTIFIED SECURITY MASTER (CCSM) | |
| CHECK POINT CERTIFIED CLOUD SPECIALIST (CCCS) | |
| CHECK POINT CERTIFIED MAESTRO EXPERT (CCME) | |
| CISCO | IMPLEMENTING AND ADMINISTERING CISCO SOLUTIONS (CCNA) |
| AUTOMATING AND PROGRAMMING CISCO COLLABORATION SOLUTIONS (CLAUTO) | |
| CONFIGURING CISCO MDS 9000 SERIES SWITCHES (DCMDS) | |
| DESIGNING CISCO DATA CENTER INFRASTRUCTURE (DCID) | |
| DESIGNING CISCO ENTERPRISE NETWORKS (ENSLD) | |
| DEVELOPING APPLICATIONS AND AUTOMATING WORKFLOWS USING CISCO PLATFORMS (DEVASC) | |
| DEVELOPING APPLICATIONS USING CISCO CORE PLATFORMS AND APIS (DEVCOR) | |
| DEVELOPING SOLUTIONS USING CISCO IOT AND EDGE PLATFORMS (DEVIOT) | |
| IMPLEMENTING AND CONFIGURING CISCO IDENTITY SERVICES ENGINE (SISE) | |
| IMPLEMENTING AND OPERATING CISCO DATA CENTER CORE TECHNOLOGIES (DCCOR) | |
| IMPLEMENTING AND OPERATING CISCO ENTERPRISE NETWORK CORE TECHNOLOGIES (ENCOR) | |
| IMPLEMENTING AND OPERATING CISCO SECURITY CORE TECHNOLOGIES (SCOR) | |
| IMPLEMENTING AND OPERATING CISCO SERVICE PROVIDER NETWORK CORE TECHNOLOGIES (SPCOR) | |
| IMPLEMENTING AUTOMATION FOR CISCO DATA CENTER SOLUTIONS (DCAUI) | |
| IMPLEMENTING AUTOMATION FOR CISCO ENTERPRISE SOLUTIONS (ENAUI) | |
| IMPLEMENTING AUTOMATION FOR CISCO SECURITY SOLUTIONS (SAUI) | |
| IMPLEMENTING AUTOMATION FOR CISCO SERVICE PROVIDER SOLUTIONS (SPAUI) | |
| IMPLEMENTING CISCO APPLICATION CENTRIC INFRASTRUCTURE (DCACI) | |
| IMPLEMENTING CISCO COLLABORATION CLOUD AND EDGE SOLUTIONS (CLCEI) | |
| IMPLEMENTING CISCO COLLABORATION CORE TECHNOLOGIES (CLCOR) | |
| IMPLEMENTING CISCO ENTERPRISE ADVANCED ROUTING AND SERVICES (ENARSI) | |
| IMPLEMENTING CISCO ENTERPRISE WIRELESS NETWORKS (ENWLSI) | |
| IMPLEMENTING CISCO SD-WAN SOLUTIONS (ENSDWI) | |
| IMPLEMENTING CISCO SERVICE PROVIDER ADVANCED ROUTING SOLUTIONS (SPRI) | |
| IMPLEMENTING CISCO SERVICE PROVIDER VPN SERVICES (SPVI) | |
| IMPLEMENTING DEVOPS SOLUTIONS AND PRACTICES USING CISCO PLATFORMS (DEVOPS) | |
| IMPLEMENTING SECURE SOLUTIONS WITH VIRTUAL PRIVATE NETWORKS (SVPN) | |
| SECURING EMAIL WITH CISCO EMAIL SECURITY APPLIANCE (SESA) | |
| SECURING NETWORKS WITH CISCO FIREPOWER NEXT GENERATION FIREWALL (SSNGFW) | |
| SECURING NETWORKS WITH CISCO FIREPOWER NEXT-GENERATION IPS (SSFIPS) | |
| SECURING THE WEB WITH CISCO WEB SECURITY APPLIANCE (SWSA) | |
| SUPPORTING CISCO DATA CENTER SYSTEM DEVICES (DCTECH) | |
| SUPPORTING CISCO ROUTING AND SWITCHING NETWORK DEVICES | |
| TROUBLESHOOTING CISCO DATA CENTER INFRASTRUCTURE (DCIT) | |
| CITRIX | CXM-302 DESIGN, DEPLOY AND MANAGE ENTERPRISE MOBILITY WITH XENMOBILE 9.0 |
| CXD-210: CITRIX XENAPP AND XENDESKTOP ADMINISTRATION | |
| CXD-310: CITRIX XENAPP AND XENDESKTOP ADVANCED ADMINISTRATION | |
| CXD-400 DESIGNING APP AND DESKTOP SOLUTIONS WITH CITRIX XENAPP AND XENDESKTOP | |
| CNS-220: CITRIX NETSCALER ESSENTIALS AND TRAFFIC MANAGEMENT | |
| CNS-222: CITRIX NETSCALER ESSENTIALS AND UNIFIED GATEWAY | |
| CNS-219: CITRIX NETSCALER TRAFFIC MANAGEMENT | |
| CNS-221: CITRIX NETSCALER UNIFIED GATEWAY | |
| NETSCALER SD-WAN | |
| CNS-320: CITRIX NETSCALER ADVANCED TOPICS – SECURITY, MANAGEMENT, AND OPTIMIZATION | |
| CXM-303 DEPLOYING ENTERPRISE MOBILITY SOLUTIONS WITH CITRIX XENMOBILE | |
| CLOUD SECURITY ALLIANCE | CCSK FOUNDATION |
| CERTIFICATE OF CLOUD AUDITING KNOWLEDGE (CCAK) | |
| CERTIFICATE OF CLOUD SECURITY KNOWLEDGE (CCSK) | |
| COMPTIA | COMPTIA COMPTIA CLOUD+ (CV0-003) |
| COMPTIA ADVANCED SECURITY PRACTITIONER (CASP+) (CAS-004) | |
| COMPTIA NETWORK+ (N10-008) APPROVED ONLY FOR THOSE CERTIFIED IN N10-007 AND EARLIER | |
| COMPTIA CYBERSECURITY ANALYST (CySA+) (CS0-003) | |
| COMPTIA PENTEST+ (PT0-002) | |
| COMPTIA LINUX+ (XK0-004) | |
| COMPTIA CERTMASTER LEARN FOR NETWORK+ N10-008 - 30 CEUS APPROVED ONLY FOR THOSE CERTIFIED IN N10-007 AND EARLIER | |
| COMPTIA CERTMASTER PRACTICE FOR NETWORK+ N10-008 - 10 CEUS APPROVED ONLY FOR THOSE CERTIFIED IN N10-007 AND EARLIER | |
| COMPTIA CERTMASTER LEARN FOR CLOUD+ CV0-003 - 25 CEUS | |
| COMPTIA CERTMASTER PRACTICE FOR CLOUD+ CV0-003 - 10 CEUS | |
| COMPTIA CERTMASTER LEARN FOR PENTEST+ PT0-002 - 25 CEUS | |
| COMPTIA CERTMASTER PRACTICE FOR PENTEST+ PT0-002 - 10 CEUS | |
| COMPTIA CERTMASTER LEARN FOR CYSA+ CS0-003 - 25 CEUS | |
| COMPTIA CERTMASTER PRACTICE FOR CYSA+ CS0-003 - 10 CEUS | |
| COMPTIA CERTMASTER LEARN FOR SECURITY+ SY0-701- 40 CEUS | |
| COMPTIA CERTMASTER PRACTICE FOR SECURITY+ SY0-701 - 10 CEUS | |
| COMPTIA CERTMASTER LEARN FOR LINUX+ XK0-005 - 30 CEUS | |
| COMPTIA CERTMASTER PRACTICE FOR LINUX+ XK0-005 - 10 CEUS | |
| COMPTIA SERVER+ (SK0-005) | |
| COMPTIA SECURITY+ (SY0-701) | |
| CWNP | CWS - CERTIFIED WIRELESS SPECIALIST |
| CWNA - CERTIFIED WIRELESS NETWORK ADMINISTRATOR | |
| CWSP - CERTIFIED WIRELESS SECURITY PROFESSIONAL | |
| CWDP – CERTIFIED WIRELESS DESIGN PROFESSIONAL | |
| CWAP - CERTIFIED WIRELESS ANALYSIS PROFESSIONAL | |
| EC-COUNCIL | CERTIFIED SECURITY ANALYST (ECSA) |
| DISASTER RECOVERY PROFESSIONAL (EDRP) | |
| COMPUTER HACKING FORENSICS INVESTIGATOR (CHFI) | |
| CERTIFIED CHIEF INFORMATION SECURITY OFFICER (CCISO) | |
| CERTIFIED ETHICAL HACKER (CEH) | |
| CERTIFIED SECURITY SPECIALIST (ECSS) | |
| CERTIFIED INCIDENT HANDLER (ECIH) | |
| CERTIFIED ENCRYPTION SPECIALIST (ECES) | |
| CERTIFIED NETWORK DEFENDER (CND) | |
| CERTIFIED NETWORK DEFENSE ARCHITECT (CNDA) | |
| CERTIFIED SOC ANALYST (CSA) | |
| CERTIFIED PENETRATION TESTING (CPENT) | |
| FORESCOUT | ASSOCIATE FSCA |
| ASSOCIATE FSCA:OT/ICS | |
| CERTIFIED EXPERT FSCE | |
| CERTIFIED PROFESSIONAL FSCP | |
| FORESCOUT CERTIFIED EXPERT OT/ICS FSCE:OT/ICS | |
| FORTINET | FORTIGATE SECURITY |
| FORTIGATE INFRASTRUCTURE | |
| NSE4 IMMERSION | |
| FORTIMANAGER | |
| FORTIEDR | |
| FORTISIEM | |
| FORTIANALYZER | |
| FORTICLIENT EMS | |
| FORTIANALYZER ADMINISTRATOR | |
| FORTIMAIL | |
| FORTISANDBOX | |
| FORTIAUTHENTICATOR | |
| CLOUD SECURITY FOR AZURE | |
| CLOUD SECURITY FOR AWS | |
| FORTIADC | |
| FORTIWEB | |
| FORTISOAR ADMINISTRATOR | |
| FORTISWITCH | |
| FORTINAC | |
| SECURE WIRELESS LAN | |
| FORTIVOICE | |
| PUBLIC CLOUD SECURITY | |
| OT SECURITY | |
| LAN EDGE | |
| SD-WAN | |
| ENTERPRISE FIREWALL | |
| ADVANCED ANALYTICS | |
| FORTISOAR DESIGN AND DEVELOPMENT | |
| ARCHITECTING WITH GOOGLE COMPUTE ENGINE | |
| DATA ENGINEERING ON GOOGLE CLOUD PLATFORM | |
| DEVELOPING APPLICATIONS WITH GOOGLE CLOUD PLATFORM | |
| NETWORKING IN GOOGLE CLOUD PLATFORM | |
| SECURITY IN GOOGLE CLOUD PLATFORM | |
| GOOGLE’S APPLIED DIGITAL SKILLS | |
| GOOGLE CLOUD PLATFORM FUNDAMENTALS FOR AWS PROFESSIONALS | |
| HPE | Designing HP Data Center and Cloud Solutions, Rev. 15.11 |
| Designing HPE Data Center and Cloud Solutions, Rev. 16.11 | |
| Delta - Designing HPE Data Center and Cloud Solutions, Rev. 16.11 | |
| Creating HPE Software-defined Networks, Rev. 15.41 | |
| Building HP FlexFabric Data Centers, Rev. 14.41 | |
| Architecting HP FlexNetwork Solutions, Rev 14.21 | |
| Deploying HP FlexNetwork Core Technologies, Rev 14.31 | |
| HPE ArcSight Master ASE Preparation Course | |
| ArcSight ESM 6.5 Advanced Administrator | |
| ArcSight ESM 6.5 Advanced Analyst | |
| ArcSight Logger - 6.0 Administration and Operations | |
| Dynamic Application Testing with HP WebInspect 10.3 | |
| HP Fortify Static Code Analyzer / Software Security Center 4.2 | |
| HPE/ARUBA | CLEARPASS ESSENTIALS |
| IMPLEMENTING ARUBA WLAN | |
| SCALABLE WLAN DESIGN & IMPLEMENTATION (SWDI) | |
| DESIGNING ADVANCED MOBILITY SOLUTIONS (DAMS) | |
| ADVANCED MOBILITY SOLUTIONS & TROUBLESHOOTING (AMST) | |
| CLEARPASS ADVANCED (CPA) | |
| DESIGNING ARUBA SOLUTIONS (DAS) | |
| IMPLEMENTING ARUBA CAMPUS SWITCHING SOLUTIONS (IACSS) | |
| CLEARPASS FUNDAMENTALS | |
| ARUBA SWITCHING FUNDAMENTALS (ASF) | |
| IBM | IBM SECURITY QRADAR SIEM V7.5 ANALYSIS |
| IBM SECURITY QRADAR SIEM V7.5 ADMINISTRATION | |
| IBM SECURITY QRADAR SIEM V7.5 DEPLOYMENT | |
| IBM SECURITY IDENTITY GOVERNANCE AND INTELLIGENCE V5.2.5 DEPLOYMENT | |
| DEVELOPING CUSTOM RULES IN IBM QRADAR SIEM | |
| QRADAR PLANNING AND INSTALLATION GUIDE | |
| QRADAR SIEM API | |
| WHY QRADAR SIEM? | |
| QRADAR SIEM V7.4.3 DEPLOYMENT | |
| ISACA | CRISC EXAM REVIEW |
| CSX PRACTITIONER: IDENTIFICATION AND PROTECTION | |
| CSX PRACTITIONER: RESPOND AND RECOVER | |
| CSX PRACTITIONER BOOT CAMP | |
| CSX PRACTITIONER: DETECTION | |
| Real World Application of RMF for DoD IT | |
| CISA EXAM REVIEW | |
| (ISC)2 | (ISC)2 TRAINING FOR CCSP |
| (ISC)2 TRAINING FOR CISSP | |
| (ISC)2 TRAINING FOR CISSP-ISSAP | |
| (ISC)2 TRAINING FOR CISSP-ISSEP | |
| (ISC)2 TRAINING FOR CISSP-ISSMP | |
| (ISC)2 TRAINING FOR SSCP | |
| JUNIPER | JUNIPER NETWORKS DESIGN FUNDAMENTALS (JNDF) |
| ADVANCED JUNOS ENTERPRISE ROUTING (AJER) | |
| ADVANCED JUNOS ENTERPRISE SWITCHING (AJEX) | |
| ADVANCED JUNOS SECURITY (AJSEC) | |
| ADVANCED JUNOS SERVICE PROVIDER ROUTING (AJSPR) | |
| JUNOS ENTERPRISE SWITCHING (JEX) | |
| JUNOS INTERMEDIATE ROUTING (JIR) | |
| JUNIPER NETWORKS DESIGN - DATA CENTER (JND-DC) | |
| NETWORK AUTOMATION USING CONTRAIL CLOUD (NACC) | |
| JUNOS SERVICE PROVIDER SWITCHING (JSPX) | |
| INTRODUCTION TO THE JUNOS OPERATING SYSTEM (IJOS) | |
| JUNOS LAYER 3 VPNS (JL3V) | |
| JUNOS LAYER 2 VPNS (JL2V) | |
| JUNOS MPLS FUNDAMENTALS (JMF) | |
| JUNOS FOR SECURITY PLATFORMS (JSEC) | |
| JUNIPER NETWORKS DESIGN-SERVICE PROVIDER (JND-SP) | |
| MICROSOFT | SECURITY FUNDAMENTALS |
| INSTALLING AND CONFIGURING WINDOWS SERVER® 2012 | |
| WINDOWS SERVER ADMINISTRATION FUNDAMENTALS | |
| NETWORKING WITH WINDOWS SERVER 2016 | |
| IDENTITY WITH WINDOWS SERVER 2016 | |
| ADMINISTERING WINDOWS SERVER 2012 | |
| CONFIGURING ADVANCED WINDOWS SERVER 2012 SERVICES | |
| DESIGNING AND IMPLEMENTING A SERVER INFRASTRUCTURE | |
| IMPLEMENTING AN ADVANCED SERVER INFRASTRUCTURE | |
| DEVELOPING MICROSOFT AZURE SOLUTIONS | |
| IMPLEMENTING MICROSOFT AZURE INFRASTRUCTURE SOLUTIONS | |
| ADMINISTERING MICROSOFT SQL SERVER DATABASES | |
| DESIGNING A DATA SOLUTION WITH MICROSOFT SQL SERVER | |
| WINDOWS OPERATING SYSTEM AND WINDOWS SERVER FUNDAMENTALS | |
| WINDOWS SERVER 2012: TECHNICAL OVERVIEW | |
| SECURING WINDOWS SERVER 2016 | |
| WINDOWS SERVER 2012 TRAINING: NETWORKING | |
| WINDOWS SERVER 2012: IDENTITY AND ACCESS | |
| WINDOWS SERVER 2012: STORAGE | |
| DEVELOPING MICROSOFT SQL SERVER DATABASES | |
| DESIGNING DATABASE SOLUTIONS FOR SQL SERVER | |
| OFFENSIVE SECURITY | EXP-401: ADVANCED WINDOWS EXPLOITATION |
| PEN-200: PENETRATION TESTING WITH KALI LINUX | |
| PEN-210: FOUNDATIONAL WIRELESS NETWORK ATTACKS | |
| SOC-200: FOUNDATIONAL SECURITY OPERATIONS AND DEFENSIVE ANALYSIS | |
| WEB-200: FOUNDATIONAL WEB APPLICATION ASSESSMENTS WITH KALI LINUX | |
| WEB-300: ADVANCED WEB ATTACKS AND EXPLOITATION | |
| OpenText | IR250 - INCIDENT INVESTIGATION |
| DFIR370 - HOST INTRUSION METHODOLOGY AND INVESTIGATION | |
| DF120 - FOUNDATIONS IN DIGITAL FORENSICS WITH ENCASE | |
| DF125 - MOBILE DEVICE EXAMINATIONS WITH ENCASE | |
| DF210 - BUILDING AN INVESTIGATION WITH ENCASE | |
| ED290 EDISCOVERY TRAINING WITH ENCASE INFORMATION ASSURANCE | |
| DFIR450 ENCASE ENSCRIPT PROGRAMMING | |
| DF320 - ADVANCED ANALYSIS OF WINDOWS ARTIFACTS WITH ENCASE | |
| PALO ALTO | FIREWALL 11.0 ESSENTIALS: CONFIGURATION AND MANAGEMENT (EDU-210) |
| PANORAMA 11.0: MANAGING FIREWALLS AT SCALE (EDU-220) | |
| PRISMA CLOUD: MONITORING AND SECURING - EDU-150 | |
| PRISMA CLOUD: ONBOARDING AND OPERATIONALIZING - EDU- 152 | |
| PCC TRAINING | |
| INTRODUCTION TO CYBERSECURITY | |
| FUNDAMENTALS OF NETWORK SECURITY | |
| FUNDAMENTALS OF CLOUD SECURITY | |
| FUNDAMENTALS OF SECURITY OPERATIONS CENTER (SOC) | |
| USE OF THE PALO ALTO NETWORKS CYBER SECURITY ACADEMY CYBERSECURITY SURVIVAL GUIDE | |
| FUNDAMENTALS OF SECURITY OPERATIONS CENTER (SOC) | |
| INTRODUCTION TO CORTEX XSOAR | |
| CORTEX XSOAR ADMIN TRAINING | |
| CORTEX XSOAR ANALYST TRAINING | |
| CORTEX XSOAR SOAR ENGINEER TRAINING | |
| RED HAT | RED HAT SYSTEM ADMINISTRATION I (RH124) |
| RED HAT SYSTEM ADMINISTRATION II (RH134) | |
| RED HAT OPENSTACK ADMINISTRATION I (CL110) | |
| RED HAT OPENSTACK ADMINISTRATION II (CL210) | |
| RED HAT SYSTEM ADMINISTRATION III (RH254) | |
| RED HAT CLOUDFORMS HYBRID CLOUD MANAGEMENT (CL220) | |
| RED HAT HIGH AVAILABILITY CLUSTERING (RH436) | |
| RED HAT SECURITY: Linux in Physical, Virtual, and Cloud (RH415) | |
| SABSA | A1 – ADVANCED SABSA RISK, ASSURANCE & GOVERNANCE |
| A2 – ADVANCED SABSA ARCHITECTURE PROGRAM MANAGEMENT | |
| A3 – ADVANCED SABSA ARCHITECTURE DESIGN | |
| A3 – SABSA A3 – ARCHITECTURE DESIGN DEVELOPMENT | |
| A4 – ADVANCED SABSA INCIDENT, MONITORING & INVESTIGATIONS ARCHITECTURE | |
| A5 – ADVANCED SABSA BUSINESS CONTINUITY AND CRISIS MANAGEMENT | |
| SANS | AUD507: AUDITING & MONITORING NETWORKS, PERIMETERS & SYSTEMS |
| FOR498: BATTLEFIELD FORENSICS & DATA ACQUISITION | |
| FOR500: WINDOWS FORENSIC ANALYSIS | |
| FOR508: ADVANCED DIGITAL FORENSICS, INCIDENT RESPONSE, AND THREAT HUNTING | |
| FOR509: ENTERPRISE CLOUD FORENSICS AND INCIDENT RESPONSE | |
| FOR518: MAC FORENSIC ANALYSIS | |
| FOR572: ADVANCED NETWORK FORENSICS AND ANALYSIS | |
| FOR578: CYBER THREAT INTELLIGENCE | |
| FOR585: ADVANCED SMARTPHONE FORENSICS | |
| FOR610: REVERSE-ENGINEERING MALWARE: MALWARE ANALYSIS TOOLS AND TECHNIQUES | |
| ICS410: ICS/SCADA SECURITY ESSENTIALS | |
| ICS456: ESSENTIALS FOR NERC CRITICAL INFRASTRUCTURE PROTECTION | |
| ICS515: ICS VISIBILITY, DETECTION, AND RESPONSE | |
| MGT414: SANS TRAINING PROGRAM FOR THE CISSP CERTIFICATION | |
| MGT512: SANS SECURITY LEADERSHIP ESSENTIALS FOR MANAGERS WITH KNOWLEDGE COMPRESSION | |
| MGT514: SECURITY STRATEGIC PLANNING, POLICY, AND LEADERSHIP | |
| MGT525: MANAGING CYBERSECURITY INITIATIVES & EFFECTIVE COMMUNICATION | |
| MGT551: BUILDING AND LEADING SECURITY OPERATIONS CENTERS | |
| SEC275: FOUNDATIONS: COMPUTERS, TECHNOLOGY, & SECURITY | |
| SEC301: INTRODUCTION TO CYBER SECURITY | |
| SEC401: SECURITY ESSENTIALS - NETWORK, ENDPOINT, AND CLOUD | |
| SEC450: BLUE TEAM FUNDAMENTALS: SECURITY OPERATIONS AND ANALYSIS | |
| SEC460: ENTERPRISE AND CLOUD | THREAT AND VULNERABILITY ASSESSMENT | |
| SEC488: CLOUD SECURITY ESSENTIALS | |
| SEC497: PRACTICAL OPEN-SOURCE INTELLIGENCE (OSINT) | |
| SEC501: ADVANCED SECURITY ESSENTIALS - ENTERPRISE DEFENDER | |
| SEC503: NETWORK MONITORING AND THREAT DETECTION IN-DEPTH | |
| SEC504: HACKER TOOLS, TECHNIQUES, AND INCIDENT HANDLING | |
| SEC505: SECURING WINDOWS AND POWERSHELL AUTOMATION | |
| SEC510: PUBLIC CLOUD SECURITY: AWS, AZURE, AND GCP | |
| SEC511: CONTINUOUS MONITORING AND SECURITY OPERATIONS | |
| SEC522: APPLICATION SECURITY: SECURING WEB APPLICATIONS, APIS, AND MICROSERVICES | |
| SEC530: DEFENSIBLE SECURITY ARCHITECTURE AND ENGINEERING: IMPLEMENTING ZERO TRUST FOR THE HYBRID ENTERPRISE | |
| SEC540: CLOUD SECURITY AND DEVSECOPS AUTOMATION | |
| SEC541: CLOUD SECURITY ATTACKER TECHNIQUES, MONITORING, AND THREAT DETECTION | |
| SEC542: WEB APP PENETRATION TESTING AND ETHICAL HACKING | |
| SEC555: SIEM WITH TACTICAL ANALYTICS | |
| SEC560: ENTERPRISE PENETRATION TESTING | |
| SEC566: IMPLEMENTING AND AUDITING SECURITY FRAMEWORKS AND CONTROLS | |
| SEC575: MOBILE DEVICE SECURITY AND ETHICAL HACKING | |
| SEC588: CLOUD PENETRATION TESTING | |
| SEC599: DEFEATING ADVANCED ADVERSARIES - PURPLE TEAM TACTICS & KILL CHAIN DEFENSES | |
| SEC617: WIRELESS PENETRATION TESTING AND ETHICAL HACKING | |
| SEC660: ADVANCED PENETRATION TESTING, EXPLOIT WRITING, AND ETHICAL HACKING | |
| SPLUNK | USING SPLUNK ENTERPRISE SECURITY |
| VMWARE | VMWARE VSPHERE: OPTIMIZE AND SCALE [V6.5] |
| HORIZON: DESIGN AND DEPLOY [V6] | |
| VMWARE NSX: INSTALL, CONFIGURE, MANAGE [V6.4] | |
| VMWARE NSX: TROUBLESHOOTING AND OPERATIONS [V6.4] | |
| VMWARE NSX-T: INSTALL, CONFIGURE, MANAGE [V2.2] | |
| VMWARE NSX-T DATA CENTER: INSTALL, CONFIGURE, MANAGE [V2.4] | |
| VMWARE NSX-T DATA CENTER: TROUBLESHOOTING AND OPERATIONS [V2.4] | |
| VMWARE NSX-T DATA CENTER: DESIGN [V2.4] | |
| ZSCALER | ZIA INTRODUCTION |
| ZIA FUNDAMENTALS | |
| MONITORING INTERNET ACCESS SECURITY | |
| ANALYZING INTERNET ACCESS TRAFFIC PATTERNS | |
| CHECKING ZSCALER CLIENT CONNECTOR | |
| CHECKING USER INTERNET ACCESS | |
| CHECKING ZIA NETWORK CONNECTIVITY | |
| CHECKING ZIA USER AUTHENTICATION | |
| ADJUSTING INTERNET ACCESS POLICIES | |
| AUDITING SECURITY POLICY | |
| INVESTIGATING SECURITY ISSUES | |
| TROUBLESHOOTING ZIA | |
| ZIA AUTHENTICATION (ADVANCED) | |
| ZIA TRAFFIC FORWARDING (ADVANCED) | |
| CLIENT CONNECTOR MANAGEMENT | |
| CLIENT CONNECTOR: ZIA SPECIFIC CONFIGURATIONS | |
| ZIA BANDWIDTH CONTROL | |
| ZIA DNS SECURITY & OPTIMIZATION | |
| ZIA NANOLOG STREAMING SERVICE (NSS) | |
| SURVEY FOR THE ZIA PRO PATH | |
| ZPA ARCHITECTURE | |
| ZPA APP CONNECTORS (ADVANCED) | |
| ZPA POLICY | |
| ZPA FEATURES | |
| ZPA AUTHENTICATION | |
| INTUNE FOR IOS USING SCEP | |
| SURVEY FOR THE ZPA PRO PATH |
If you have questions about specific stages of the certification renewal process, head over to our Help pages to find additional information, or contact our customer service team.