Pre-approved Training for CompTIA Security+ Continuing Education Units (CEUs)
Note: Training in this list is subject to change without prior notification. As CompTIA exams are updated so is this list. Training uploaded into a certification record by the candidate prior to the change will remain valid. Training earned that was listed previously and has not been uploaded into a certification record can no longer be used for CEUs.
Training approved in this document is based on the CompTIA Security+ - SY0-701 objectives.
| CERTIFICATION PROVIDER | COURSE TITLE |
|---|---|
| AMAZON WEB SERVICES | ARCHITECTING ON AWS |
| SECURITY ENGINEERING ON AWS | |
| EXAM READINESS: AWS CERTIFIED SECURITY - SPECIALTY | |
| AWS SECURITY ESSENTIALS | |
| AWS SECURITY FUNDAMENTALS (SECOND EDITION) | |
| AWS SECURITY HUB PRIMER | |
| CLOUD AUDIT ACADEMY | |
| DEEP DIVE WITH SECURITY: AWS IDENTITY AND ACCESS MANAGEMENT (IAM) | |
| GETTING STARTED WITH AWS SECURITY, IDENTITY, AND COMPLIANCE | |
| BROADCOM/SYMANTEC | ADMINISTRATION OF SYMANTEC VIP (MARCH 2017) |
| ADMINISTRATION OF SYMANTEC IT MANAGEMENT SUITE 8.0 | |
| ADMINISTRATION OF DATA LOSS PREVENTION 14.5 | |
| ADMINISTRATION OF SYMANTEC CYBER SECURITY SERVICES (MAY 2016) | |
| ADMINISTRATION OF SYMANTEC ADVANCED THREAT PROTECTION 2.0.2 | |
| ADMINISTRATION OF SYMANTEC ENDPOINT PROTECTION 14 | |
| ADMINISTRATION OF SYMANTEC DATA CENTER SECURITY - SERVER ADVANCED 6.7 | |
| VALIDATION AND ID PROTECTION (VIP) SERVICE R1 | |
| IT MANAGEMENT SUITE 8.0 FUNDAMENTALS | |
| IT MANAGEMENT SUITE 8.0 MODULES | |
| CLIENT MANAGEMENT SUITE 7.6 ADMINISTRATION | |
| CLIENT MANAGEMENT SUITE 7.6 IMPLEMENTER | |
| ASSET MANAGEMENT SUITE 7.5 ADMINISTRATION | |
| DATA LOSS PREVENTION 14.5: ADMINISTRATION – MUST COMPLETE ALL MODULES FOR CEUS | |
| DATA LOSS PREVENTION 14.5: DIFFERENCES | |
| CSS ADMIN R1 – MUST COMPLETE ALL MODULES FOR CEUS | |
| SYMANTEC DATA CENTER SECURITY – SERVER ADVANCED 6.7 ADMINISTRATION – MUST COMPLETE ALL MODULES FOR CEUS | |
| ADVANCED THREAT PROTECTION 2.X: INCIDENT RESPONSE – MUST COMPLETE ALL MODULES FOR CEUS | |
| SYMANTEC ENDPOINT PROTECTION 12.1.X ADMINISTRATION | |
| SYMANTEC ENDPOINT PROTECTION 12.1 MAINTAIN AND TROUBLESHOOT | |
| EMAIL SECURITY SERVICES AND WEB SECURITY SERVICE: ADMINISTRATION | |
| ENDPOINT PROTECTION 14: CONFIGURE AND PROTECT | |
| ENDPOINT PROTECTION 14: DIFFERENCES | |
| ENDPOINT PROTECTION 14: MIGRATION AND UPGRADES | |
| CHECK POINT | CHECK POINT CERTIFIED SECURITY ADMINISTRATOR (CCSA) |
| SECURITY ENGINEERING (CHECK POINT CERTIFIED SECURITY EXPERT (CCSE) | |
| THREAT PREVENTION | |
| SECURE WEB GATEWAY | |
| CHECK POINT CERTIFIED SECURITY MASTER (CCSM) | |
| CHECK POINT CERTIFIED SECURITY ADMINISTRATOR (CCSA) | |
| CHECK POINT CERTIFIED CLOUD SPECIALIST (CCCS) | |
| CISCO | IMPLEMENTING CISCO SECURE ACCESS CONTROL SYSTEM V5.2 |
| IMPLEMENTING CISCO IOS NETWORK SECURITY (IINS) 3.0 | |
| IMPLEMENTING CISCO SECURE ACCESS SOLUTIONS (SISAS) 1.0 | |
| IMPLEMENTING CISCO EDGE NETWORK SECURITY SOLUTIONS (SENSS) 1.0 | |
| IMPLEMENTING CISCO SECURE MOBILITY SOLUTIONS (SIMOS) 1.0 | |
| SECURING CISCO NETWORKS WITH THREAT DETECTION AND ANALYSIS (SCYBER) 1 | |
| UNDERSTANDING CISCO CYBERSECURITY FUNDAMENTALS (SECFND) | |
| IMPLEMENTING CISCO CYBERSECURITY OPERATIONS (SECOPS) | |
| IMPLEMENTING CISCO THREAT CONTROL SOLUTIONS (SITCS) 1.5 | |
| IMPLEMENTING AUTOMATION FOR CISCO SECURITY SOLUTIONS (SAUI) | |
| IMPLEMENTING AND OPERATING CISCO SECURITY CORE TECHNOLOGIES (SCOR) | |
| SECURING NETWORKS WITH CISCO FIREPOWER NEXT GENERATION FIREWALL (SSNGFW) | |
| SECURING NETWORKS WITH CISCO FIREPOWER NEXT-GENERATION IPS (SSFIPS) | |
| IMPLEMENTING AND CONFIGURING CISCO IDENTITY SERVICES ENGINE (SISE) | |
| SECURING EMAIL WITH CISCO EMAIL SECURITY APPLIANCE (SESA) | |
| SECURING THE WEB WITH CISCO WEB SECURITY APPLIANCE (SWSA) | |
| IMPLEMENTING SECURE SOLUTIONS WITH VIRTUAL PRIVATE NETWORKS (SVPN) | |
| CompTIA | COMPTIA ADVANCED SECURITY PRACTITIONER (CASP+) (CAS-004) |
| COMPTIA CYBERSECURITY ANALYST (CySA+) (CS0-003) | |
| COMPTIA PENTEST+ (PT0-002) | |
| COMPTIA CERTMASTER LEARN FOR PENTEST+ PT0-002 - 25 CEUS | |
| COMPTIA CERTMASTER PRACTICE FOR PENTEST+ PT0-002 - 10 CEUS | |
| COMPTIA CERTMASTER LEARN FOR CYSA+ CS0-003 - 25 CEUS | |
| COMPTIA CERTMASTER PRACTICE FOR CYSA+ CS0-003 - 10 CEUS | |
| CERTMASTER LABS FOR CASP+ (EXAM CAS-004) - 40 CEUs | |
| COMPTIA CERTMASTER LEARN FOR SECURITY+ SY0-701- 40 CEUS APPROVED ONLY FOR THOSE CERTIFIED IN SY0-601 AND EARLIER | |
| COMPTIA CERTMASTER PRACTICE FOR SECURITY+ SY0-701 - 10 CEUS APPROVED ONLY FOR THOSE CERTIFIED IN SY0-601 AND EARLIER | |
| COMPTIA SECURITY+ SY0-701 – APPROVED ONLY FOR THOSE CERTIFIED IN SY0-601 AND EARLIER | |
| CWNP | CWSP – CERTIFIED WIRELESS SECURITY PROFESSIONAL |
| EC-COUNCIL | CERTIFIED ETHICAL HACKER (CEH) |
| CERTIFIED SECURITY ANALYST (ECSA) | |
| DISASTER RECOVERY PROFESSIONAL (EDRP) | |
| COMPUTER HACKING FORENSICS INVESTIGATOR (CHFI) | |
| CERTIFIED CHIEF INFORMATION SECURITY OFFICER (CCISO) | |
| CERTIFIED SECURITY SPECIALIST (ECSS) | |
| CERTIFIED INCIDENT HANDLER (ECIH) | |
| CERTIFIED ENCRYPTION SPECIALIST (ECES) | |
| CERTIFIED NETWORK DEFENDER (CND) | |
| CERTIFIED NETWORK DEFENSE ARCHITECT (CNDA) | |
| CAST 611V3 ADVANCED PENETRATION TESTING | |
| CAST 616 SECURING WINDOWS INFRASTRUCTURE | |
| ADVANCED MOBILE FORENSICS AND SECURITY (CAST 612) | |
| CAST 613 HACKING AND HARDENING CORPORATE WEB APP/WEB SITE | |
| CAST 614 ADVANCED NETWORK DEFENSE | |
| CERTIFIED SOC ANALYST (CSA) | |
| CERTIFIED THREAT INTELLIGENCE ANALYST (CTIA) | |
| CERTIFIED PENETRATION TESTING (CPENT) | |
| FORTINET | FORTIGATE SECURITY |
| FORTIGATE INFRASTRUCTURE | |
| NSE4 IMMERSION | |
| FORTIMANAGER | |
| FORTIEDR | |
| FORTISIEM | |
| FORTIANALYZER | |
| FORTICLIENT EMS | |
| FORTIANALYZER ADMINISTRATOR | |
| FORTIMAIL | |
| FORTISANDBOX | |
| FORTIAUTHENTICATOR | |
| CLOUD SECURITY FOR AZURE | |
| CLOUD SECURITY FOR AWS | |
| FORTIADC | |
| FORTIWEB | |
| FORTISOAR ADMINISTRATOR | |
| FORTISWITCH | |
| FORTINAC | |
| SECURE WIRELESS LAN | |
| FORTIVOICE | |
| PUBLIC CLOUD SECURITY | |
| OT SECURITY | |
| LAN EDGE | |
| SD-WAN | |
| ENTERPRISE FIREWALL | |
| ADVANCED ANALYTICS | |
| FORTISOAR DESIGN AND DEVELOPMENT | |
| HPE | HPE ArcSight Master ASE Preparation Course |
| ArcSight ESM 6.5 Advanced Administrator | |
| ArcSight ESM 6.5 Advanced Analyst | |
| ArcSight Logger - 6.0 Administration and Operations | |
| Dynamic Application Testing with HP WebInspect 10.3 | |
| HP Fortify Static Code Analyzer / Software Security Center 4.2 | |
| IBM | IBM SECURITY QRADAR SIEM V7.5 ANALYSIS |
| IBM SECURITY QRADAR SIEM V7.5 ADMINISTRATION | |
| IBM SECURITY QRADAR SIEM V7.5 DEPLOYMENT | |
| IBM SECURITY IDENTITY GOVERNANCE AND INTELLIGENCE V5.2.5 DEPLOYMENT | |
| DEVELOPING CUSTOM RULES IN IBM QRADAR SIEM | |
| QRADAR PLANNING AND INSTALLATION GUIDE | |
| QRADAR SIEM API | |
| WHY QRADAR SIEM? | |
| QRADAR SIEM V7.4.3 DEPLOYMENT | |
| ISACA | COBIT 5 ASSESSOR FOR SECURITY |
| CRISC EXAM REVIEW | |
| CYBERSECURITY FUNDAMENTALS | |
| CSX PRACTITIONER: IDENTIFICATION AND PROTECTION | |
| CSX PRACTITIONER: RESPOND AND RECOVER | |
| CSX PRACTITIONER BOOT CAMP | |
| CSX PRACTITIONER: DETECTION | |
| CISM EXAM REVIEW | |
| CISA EXAM REVIEW | |
| (ISC)2 | OFFICIAL (ISC)2 CBK TRAINING SEMINAR FOR THE CGRC |
| (ISC)2 TRAINING FOR CCSP | |
| (ISC)2 TRAINING FOR CISSP | |
| (ISC)2 TRAINING FOR HCISPP | |
| (ISC)2 TRAINING FOR CISSP-ISSAP | |
| (ISC)2 TRAINING FOR CISSP-ISSEP | |
| (ISC)2 TRAINING FOR CISSP-ISSMP | |
| (ISC)2 TRAINING FOR SSCP | |
| JUNIPER | ADVANCED JUNOS SECURITY (AJSEC) |
| ATTACK PREVENTION WITH JUNIPER NETWORKS FIREWALLS (APJF) | |
| CONFIGURING JUNIPER NETWORKS FIREWALL/IPSEC VPN PRODUCTS (CJFV) | |
| INTEGRATING JUNIPER NETWORKS FIREWALL/IPSEC VPN PRODUCTS INTO HIGH-PERFORMANCE NETWORKS (IFVH) | |
| JNCIE SECURITY BOOTCAMP (JNCIE-SEC) | |
| JUNOS SECURITY (JSEC) | |
| JUNOS SPACE-SECURITY DIRECTOR (JS-SD) | |
| JUNIPER NETWORKS DESIGN-SECURITY (JND-SEC) | |
| IMPLEMENTING JUNIPER NETWORKS SECURE ANALYTICS (IJSA) | |
| CONFIGURING STEEL-BELTED RADIUS CARRIER (CSBR) | |
| MICROSOFT | SECURING WINDOWS SERVER 2016 |
| OFFENSIVE SECURITY | EXP-301: WINDOWS USER MODE EXPLOIT DEVELOPMENT |
| EXP-312: ADVANCED MACOS CONTROL BYPASSES | |
| EXP-401: ADVANCED WINDOWS EXPLOITATION | |
| PEN-200: PENETRATION TESTING WITH KALI LINUX | |
| PEN-210: FOUNDATIONAL WIRELESS NETWORK ATTACKS | |
| PEN-300: ADVANCED EVASION TECHNIQUES AND BREACHING DEFENSES | |
| WEB-200: FOUNDATIONAL WEB APPLICATION ASSESSMENTS WITH KALI LINUX | |
| WEB-300: ADVANCED WEB ATTACKS AND EXPLOITATION | |
| OFFENSIVE SECURITY PENETRATION TESTING LAB | |
| OPENTEXT | IR250 - INCIDENT INVESTIGATION |
| DFIR370 - HOST INTRUSION METHODOLOGY AND INVESTIGATION | |
| DF120 - FOUNDATIONS IN DIGITAL FORENSICS WITH ENCASE | |
| DF125 - MOBILE DEVICE EXAMINATIONS WITH ENCASE | |
| DF210 - BUILDING AN INVESTIGATION WITH ENCASE | |
| DF320 - ADVANCED ANALYSIS OF WINDOWS ARTIFACTS WITH ENCASE | |
| IR280 ENCASE ENDPOINT SECURITY | |
| DFIR130 ENCASE ENDPOINT INVESTIGATOR TRAINING | |
| DFIR350 INTERNET-BASED INVESTIGATIONS WITH ENCASE | |
| ED290 EDISCOVERY TRAINING WITH ENCASE INFORMATION ASSURANCE | |
| DFIR450 ENCASE ENSCRIPT PROGRAMMING | |
| PALO ALTO | FIREWALL 11.0 ESSENTIALS: CONFIGURATION AND MANAGEMENT (EDU-210) |
| PANORAMA 11.0: MANAGING FIREWALLS AT SCALE (EDU-220) | |
| PRISMA CLOUD: MONITORING AND SECURING - EDU-150 | |
| PRISMA CLOUD: ONBOARDING AND OPERATIONALIZING - EDU- 152 | |
| PCC TRAINING | |
| INTRODUCTION TO CYBERSECURITY | |
| FUNDAMENTALS OF NETWORK SECURITY | |
| FUNDAMENTALS OF CLOUD SECURITY | |
| FUNDAMENTALS OF SECURITY OPERATIONS CENTER (SOC) | |
| USE OF THE PALO ALTO NETWORKS CYBER SECURITY ACADEMY CYBERSECURITY SURVIVAL GUIDE | |
| FUNDAMENTALS OF SECURITY OPERATIONS CENTER (SOC) | |
| INTRODUCTION TO CORTEX XSOAR | |
| CORTEX XSOAR ADMIN TRAINING | |
| CORTEX XSOAR ANALYST TRAINING | |
| CORTEX XSOAR SOAR ENGINEER TRAINING | |
| RED HAT | RED HAT SERVER HARDENING (RH413) |
| RED HAT SYSTEM ADMINISTRATION I (RH124) | |
| RED HAT SYSTEM ADMINISTRATION II (RH134) | |
| RHCSA RAPID TRACK COURSE (RH199) | |
| RED HAT SYSTEM ADMINISTRATION III (RH254) | |
| RHCE CERTIFICATION LAB | |
| RED HAT SECURITY: Linux in Physical, Virtual, and Cloud (RH415) | |
| SABSA | A1 – ADVANCED SABSA RISK, ASSURANCE & GOVERNANCE |
| A2 – ADVANCED SABSA ARCHITECTURE PROGRAM MANAGEMENT | |
| A3 – ADVANCED SABSA ARCHITECTURE DESIGN | |
| A3 – SABSA A3 – ARCHITECTURE DESIGN DEVELOPMENT | |
| A4 – ADVANCED SABSA INCIDENT, MONITORING & INVESTIGATIONS ARCHITECTURE | |
| A5 – ADVANCED SABSA BUSINESS CONTINUITY AND CRISIS MANAGEMENT | |
| SANS | AUD507: AUDITING & MONITORING NETWORKS, PERIMETERS & SYSTEMS |
| FOR498: BATTLEFIELD FORENSICS & DATA ACQUISITION | |
| FOR500: WINDOWS FORENSIC ANALYSIS | |
| FOR508: ADVANCED DIGITAL FORENSICS, INCIDENT RESPONSE, AND THREAT HUNTING | |
| FOR509: ENTERPRISE CLOUD FORENSICS AND INCIDENT RESPONSE | |
| FOR518: MAC FORENSIC ANALYSIS | |
| FOR572: ADVANCED NETWORK FORENSICS AND ANALYSIS | |
| FOR578: CYBER THREAT INTELLIGENCE | |
| FOR585: ADVANCED SMARTPHONE FORENSICS | |
| FOR610: REVERSE-ENGINEERING MALWARE: MALWARE ANALYSIS TOOLS AND TECHNIQUES | |
| ICS410: ICS/SCADA SECURITY ESSENTIALS | |
| ICS456: ESSENTIALS FOR NERC CRITICAL INFRASTRUCTURE PROTECTION | |
| ICS515: ICS VISIBILITY, DETECTION, AND RESPONSE | |
| MGT414: SANS TRAINING PROGRAM FOR THE CISSP CERTIFICATION | |
| MGT512: SANS SECURITY LEADERSHIP ESSENTIALS FOR MANAGERS WITH KNOWLEDGE COMPRESSION | |
| MGT514: SECURITY STRATEGIC PLANNING, POLICY, AND LEADERSHIP | |
| MGT525: MANAGING CYBERSECURITY INITIATIVES & EFFECTIVE COMMUNICATION | |
| MGT551: BUILDING AND LEADING SECURITY OPERATIONS CENTERS | |
| SEC275: FOUNDATIONS: COMPUTERS, TECHNOLOGY, & SECURITY | |
| SEC301: INTRODUCTION TO CYBER SECURITY | |
| SEC401: SECURITY ESSENTIALS - NETWORK, ENDPOINT, AND CLOUD | |
| SEC450: BLUE TEAM FUNDAMENTALS: SECURITY OPERATIONS AND ANALYSIS | |
| SEC460: ENTERPRISE AND CLOUD | THREAT AND VULNERABILITY ASSESSMENT | |
| SEC488: CLOUD SECURITY ESSENTIALS | |
| SEC497: PRACTICAL OPEN-SOURCE INTELLIGENCE (OSINT) | |
| SEC501: ADVANCED SECURITY ESSENTIALS - ENTERPRISE DEFENDER | |
| SEC503: NETWORK MONITORING AND THREAT DETECTION IN-DEPTH | |
| SEC504: HACKER TOOLS, TECHNIQUES, AND INCIDENT HANDLING | |
| SEC505: SECURING WINDOWS AND POWERSHELL AUTOMATIO | |
| SEC510: PUBLIC CLOUD SECURITY: AWS, AZURE, AND GCP | |
| SEC511: CONTINUOUS MONITORING AND SECURITY OPERATIONS | |
| SEC522: APPLICATION SECURITY: SECURING WEB APPLICATIONS, APIS, AND MICROSERVICES | |
| SEC530: DEFENSIBLE SECURITY ARCHITECTURE AND ENGINEERING: IMPLEMENTING ZERO TRUST FOR THE HYBRID ENTERPRISE | |
| SEC540: CLOUD SECURITY AND DEVSECOPS AUTOMATION | |
| SEC541: CLOUD SECURITY ATTACKER TECHNIQUES, MONITORING, AND THREAT DETECTION | |
| SEC542: WEB APP PENETRATION TESTING AND ETHICAL HACKING | |
| SEC555: SIEM WITH TACTICAL ANALYTICS | |
| SEC560: ENTERPRISE PENETRATION TESTING | |
| SEC566: IMPLEMENTING AND AUDITING SECURITY FRAMEWORKS AND CONTROLS | |
| SEC575: MOBILE DEVICE SECURITY AND ETHICAL HACKING | |
| SEC588: CLOUD PENETRATION TESTING | |
| SEC599: DEFEATING ADVANCED ADVERSARIES - PURPLE TEAM TACTICS & KILL CHAIN DEFENSES | |
| SEC617: WIRELESS PENETRATION TESTING AND ETHICAL HACKING | |
| SEC660: ADVANCED PENETRATION TESTING, EXPLOIT WRITING, AND ETHICAL HACKING | |
| SPLUNK | USING SPLUNK ENTERPRISE SECURITY |
If you have questions about specific stages of the certification renewal process, head over to our Help pages to find additional information, or contact our customer service team.