CompTIA Cloud+

Pre-approved Training for CompTIA Cloud+ Continuing Education Units (CEUs)

Note: Training in this list is subject to change without prior notification. As CompTIA exams are updated so is this list. Training uploaded into a certification record by the candidate prior to the change will remain valid. Training earned that was listed previously and has not been uploaded into a certification record can no longer be used for CEUs.

Training approved in this document is based on the CompTIA Cloud+ - CV0-002 objectives.

CERTIFICATION PROVIDER COURSE TITLE
AMAZON WEB SERVICES MIGRATING TO AWS
AWS SECURITY FUNDAMENTALS
DEVOPS ENGINEERING ON AWS
DEVELOPING ON AWS
ARCHITECTING ON AWS
ADVANCED ARCHITECTING ON AWS
EXAM READINESS WORKSHOP: AWS CERTIFIED SOLUTIONS ARCHITECT - PROFESSIONAL
AWS WELL-ARCHITECTED TRAINING
EC2 SYSTEMS MANAGER
EXAM READINESS: AWS CERTIFIED DEVELOPER – ASSOCIATE
AWS CLOUD PRACTITIONER ESSENTIALS (SECOND EDITION)
AWS TECHNICAL ESSENTIALS
EXAM READINESS: AWS CERTIFIED ADVANCED NETWORKING - SPECIALTY
DATA ANALYTICS FUNDAMENTALS
BIG DATA ON AWS
EXAM READINESS: AWS CERTIFIED BIG DATA - SPECIALTY
SECURITY ENGINEERING ON AWS
COLLECTING AND ANALYZING LOGS WITH AMAZON CLOUDWATCH LOGS INSIGHTS
CENTRALIZED LOG PROCESSING WITH AMAZON ELASTICSEARCH SERVICE
EXAM READINESS: AWS CERTIFIED DEVOPS ENGINEER – PROFESSIONAL
EXAM READINESS: AWS CERTIFIED SYSOPS ADMINISTRATOR - ASSOCIATE
SYSTEMS OPERATIONS ON AWS
EXAM READINESS: AWS CERTIFIED SECURITY - SPECIALTY
ARCITURA CLOUD SCHOOL FUNDAMENTAL CLOUD ARCHITECTURE
ADVANCED CLOUD ARCHITECTURE
FUNDAMENTAL CLOUD SECURITY
ADVANCED CLOUD SECURITY
FUNDAMENTAL CLOUD STORAGE
ADVANCED CLOUD STORAGE
FUNDAMENTAL CLOUD VIRTUALIZATION
ADVANCED CLOUD VIRTUALIZATION
FUNDAMENTAL CLOUD CAPACITY
ADVANCED CLOUD CAPACITY
CHECK POINT CHECK POINT CYBER SECURITY ENGINEERING (CCSE) R80.10
SECURITY MASTER - R80
CISCO SUPPORTING CISCO DATA CENTER SYSTEM DEVICES (DCTECH) 2.0
IMPLEMENTING CISCO NETWORK SECURITY (IINS) 3.0
INTERCONNECTING CISCO NETWORKING DEVICES, PART 2 (ICND2) 3.0
INTERCONNECTING CISCO NETWORKING DEVICES: ACCELERATED (CCNAX) 3.0
DESIGNING CISCO NETWORK SERVICE ARCHITECTURES (ARCH) 3.0
TROUBLESHOOTING AND MAINTAINING CISCO IP NETWORKS (TSHOOT) 2.0
IMPLEMENTING CISCO IP SWITCHED NETWORKS (SWITCH) 2.0
IMPLEMENTING CISCO IP ROUTING (ROUTE) 2.0
INTERCONNECTING CISCO NETWORKING DEVICES, PART 1 (ICND1) 3.0
UNDERSTANDING CISCO CLOUD FUNDAMENTALS (CLDFND) 1.0
INTRODUCING CISCO CLOUD ADMINISTRATION (CLDADM) 1.0
AUTOMATING THE CISCO ENTERPRISE CLOUD (CLDAUT) 1.0
DESIGNING THE CISCO CLOUD (CLDDES) 1.0
IMPLEMENTING AND TROUBLESHOOTING THE CISCO CLOUD INFRASTRUCTURE (CLDINF) 1.0
INTRODUCING CISCO DATA CENTER NETWORKING (DCICN) 6.0
INTRODUCING CISCO DATA CENTER NETWORKING TECHNOLOGIES (DCICT) 6.0
IMPLEMENTING CISCO DATA CENTER UNIFIED COMPUTING (DCUCI) V6.0
IMPLEMENTING CISCO DATA CENTER INFRASTRUCTURE (DCII) V6.0
IMPLEMENTING CISCO DATA CENTER VIRTUALIZATION AND AUTOMATION (DCVAI) V6.0
TROUBLESHOOTING CISCO DATA CENTER INFRASTRUCTURE (DCIT) V6.0
DESIGNING FOR CISCO INTERNETWORK SOLUTIONS (DESGN) V3.0
IMPLEMENTING CISCO THREAT CONTROL SOLUTIONS (SITCS) 1.5
IMPLEMENTING CISCO EDGE NETWORK SECURITY SOLUTIONS (SENSS) 1.0
IMPLEMENTING CISCO SECURE ACCESS SOLUTIONS (SISAS) 1.0
IMPLEMENTING CISCO SECURE MOBILITY SOLUTIONS (SIMOS) 1.0
BUILDING CISCO SERVICE PROVIDER NEXT GENERATION NETWORKS, PART 2 (SPNGN2) 1.2
DESIGNING CISCO DATA CENTER INFRASTRUCTURE (DCID)
IMPLEMENTING CISCO WIRELESS NETWORK FUNDAMENTALS (WIFUND)
DEPLOYING CISCO SERVICE PROVIDER NETWORK ROUTING (SPROUTE)
DEPLOYING CISCO SERVICE PROVIDER ADVANCED ROUTING (SPADVROUTE)
IMPLEMENTING CISCO SERVICE PROVIDER NEXT-GENERATION CORE NETWORK SERVICES (SPCORE)
IMPLEMENTING CISCO SERVICE PROVIDER NEXT-GENERATION EDGE NETWORK SERVICES (SPEDGE)
SUPPORTING CISCO ROUTING AND SWITCHING NETWORK DEVICES
CLOUDERA CLOUDERA’S ADMINISTRATOR
CLOUD SECURITY ALLIANCE CCSK FOUNDATION
COMPTIA COMPTIA NETWORK+ (N10-007)
COMPTIA CLOUD+ (CV0-002) - APPROVED ONLY FOR THOSE CERTIFIED IN CLOUD+ CV0-001
COMPTIA SECURITY+ (SY0-501)
COMPTIA ADVANCED SECURITY PRACTITIONER (CASP+) (CAS-003)
COMPTIA CYBERSECURITY ANALYST (CySA+) (CS0-001)
COMPTIA PENTEST+ (PT0-001)
CWNP CWS - CERTIFIED WIRELESS SPECIALIST
EC-COUNCIL CERTIFIED NETWORK DEFENDER (CND)
CERTIFIED ETHICAL HACKER (CEH) V9
CERTIFIED SECURITY ANALYST (ECSA) V9
COMPUTER HACKING FORENSICS INVESTIGATOR (CHFI)
CERTIFIED SECURITY SPECIALIST (ECSS)
CERTIFIED CHIEF INFORMATION SECURITY OFFICER (CCISO)
DISASTER RECOVERY PROFESSIONAL (EDRP)
EC-COUNCIL INFORMATION SECURITY MANAGEMENT (EISM)
ENCASE ENCASE® EXAMINATION OF NTFS
IR250 - INCIDENT INVESTIGATION
DFIR370 - HOST INTRUSION METHODOLOGY AND INVESTIGATION
ENCASE EDISCOVERY V5
DF120 - FOUNDATIONS IN DIGITAL FORENSICS WITH ENCASE
DF125 - MOBILE DEVICE EXAMINATIONS WITH ENCASE
DF220 - NAVIGATING ENCASE VERSION 8
DF210 - BUILDING AN INVESTIGATION WITH ENCASE
DF310 - ENCASE™ CERTIFIED EXAMINER PREP
DF320 - ADVANCED ANALYSIS OF WINDOWS ARTIFACTS WITH ENCASE
DF410 - NTFS EXAMINATIONS WITH ENCASE
GOOGLE ARCHITECTING WITH GOOGLE COMPUTE ENGINE
DATA ENGINEERING ON GOOGLE CLOUD PLATFORM
DEVELOPING APPLICATIONS WITH GOOGLE CLOUD PLATFORM
NETWORKING IN GOOGLE CLOUD PLATFORM
SECURITY IN GOOGLE CLOUD PLATFORM
GOOGLE’S APPLIED DIGITAL SKILLS
GOOGLE CLOUD PLATFORM FUNDAMENTALS FOR AWS PROFESSIONALS
HP/ARUBA IMPLEMENTING ARUBA WLAN (IAW) 8
SCALABLE WLAN DESIGN & IMPLEMENTATION (SWDI) V8
DESIGNING ADVANCED MOBILITY SOLUTIONS (DAMS)
CLEARPASS ESSENTIALS
ISC(2) (ISC)2 TRAINING FOR CCSP
(ISC)2 TRAINING FOR SSCP
JUNIPER JUNIPER NETWORKS DESIGN - DATA CENTER (JND-DC)
JUNIPER NETWORKS DESIGN-SECURITY (JND-SEC)
JUNIPER NETWORKS DESIGN-SERVICE PROVIDER (JND-SP)
MCAFEE MCAFEE ENDPOINT SECURITY 10.X ADMINISTRATION
MCAFEE ENDPOINT SECURITY UPGRADE
MCAFEE ADVANCED THREAT DETECTION ADMINISTRATION
MCAFEE VIRUSSCAN AND EPOLICY ORCHESTRATOR ADMINISTRATION
MCAFEE NETWORK SECURITY PLATFORM ADMINISTRATION
MCAFEE HOST INTRUSION PREVENTION SYSTEM ADMINISTRATION
MCAFEE DATA LOSS PREVENTION ENDPOINT ADMINISTRATION
MCAFEE EPOLICY ORCHESTRATOR ADMINISTRATION (5.10)
MCAFEE EPOLICY ORCHESTRATOR 5.10 ESSENTIALS
MCAFEE ENTERPRISE SECURITY MANAGER FOR ANALYSTS-I
MCAFEE ENTERPRISE SECURITY MANAGER FOR ENGINEERS-I
SECURITY INFORMATION AND EVENT MANAGEMENT (SIEM) ADMINISTRATION
MICROSOFT DEPLOYING AND MANAGING WINDOWS 10 USING ENTERPRISE SERVICES
DEVELOPING WINDOWS AZURE AND WEB SERVICES JUMP START
DEVELOPING MICROSOFT SHAREPOINT SERVER 2013 CORE SOLUTIONS JUMP START
PLANNING AND ADMINISTERING SHAREPOINT 2016
DEVELOPING MICROSOFT SHAREPOINT® SERVER 2013 CORE SOLUTIONS
ADVANCED TECHNOLOGIES OF SHAREPOINT 2016
DEVELOPING WINDOWS AZURE™ AND WEB SERVICES
QUERYING DATA WITH TRANSACT-SQL
DEVELOPING SQL DATA MODELS
INSTALLING AND CONFIGURING WINDOWS® 7 CLIENT
IMPLEMENTING A SQL DATA WAREHOUSE
DEVELOPING SQL DATABASES
SUPPORTING AND TROUBLESHOOTING WINDOWS 10
NETWORKING FUNDAMENTALS
SECURITY FUNDAMENTALS
CONFIGURING WINDOWS® 8.1
SUPPORTING WINDOWS® 8.1
WINDOWS SERVER ADMINISTRATION FUNDAMENTALS
INSTALLATION, STORAGE, AND COMPUTE WITH WINDOWS SERVER 2016
NETWORKING WITH WINDOWS SERVER 2016
IDENTITY WITH WINDOWS SERVER 2016
INSTALLING AND CONFIGURING WINDOWS SERVER 2012
ADMINISTERING WINDOWS SERVER 2012
CONFIGURING ADVANCED WINDOWS SERVER 2012 SERVICES
DESIGNING AND IMPLEMENTING A SERVER INFRASTRUCTURE
IMPLEMENTING AN ADVANCED SERVER INFRASTRUCTURE
DEPLOYING ENTERPRISE VOICE WITH SKYPE FOR BUSINESS 2015
SERVER VIRTUALIZATION WITH WINDOWS SERVER HYPER-V AND SYSTEM CENTER
MOC WORKSHOP: ARCHITECTING MICROSOFT AZURE SOLUTIONS
MONITORING AND OPERATING A PRIVATE CLOUD
CONFIGURING AND DEPLOYING A PRIVATE CLOUD
ADMINISTERING A SQL DATABASE INFRASTRUCTURE
DEVELOPING MICROSOFT AZURE SOLUTIONS
IMPLEMENTING MICROSOFT AZURE INFRASTRUCTURE SOLUTIONS
SECURING WINDOWS SERVER 2016
DESIGNING AND IMPLEMENTING CLOUD DATA PLATFORM SOLUTIONS
DESIGNING A DATA SOLUTION WITH MICROSOFT SQL SERVER
WINDOWS SERVER 2012: TECHNICAL OVERVIEW
WINDOWS 10 FEATURES FOR A MOBILE WORKFORCE
WINDOWS SERVER 2012 TRAINING: NETWORKING
WINDOWS SERVER 2012: IDENTITY AND ACCESS
WINDOWS SERVER 2012: STORAGE
DEVELOPING MICROSOFT SQL SERVER DATABASES
DESIGNING DATABASE SOLUTIONS FOR SQL SERVER
OFFENSIVE SECURITY PENETRATION TESTING WITH KALI LINUX
ADVANCED WINDOWS EXPLOITATION
OFFENSIVE SECURITY WIRELESS ATTACKS (WIFU)
CRACKING THE PERIMETER (CTP)
ADVANCED WEB ATTACKS AND EXPLOITATION
METASPLOIT UNLEASHED
OFFENSIVE SECURITY PENETRATION TESTING LAB
PALO ALTO FIREWALL 9.0 ESSENTIALS: CONFIGURATION AND MANAGEMENT (EDU-210)
PANORAMA 8.1: MANAGING FIREWALLS AT SCALE (EDU-220)
RED HAT RED HAT SYSTEM ADMINISTRATION I (RH124)
RED HAT SYSTEM ADMINISTRATION II (RH134)
RED HAT OPENSTACK ADMINISTRATION I (CL110)
RED HAT OPENSTACK ADMINISTRATION II (CL210)
RED HAT OPENSTACK SYSTEM ADMINISTRATION III (CL310)
RED HAT SYSTEM ADMINISTRATION III (RH254)
RED HAT CLOUDFORMS HYBRID CLOUD MANAGEMENT (CL220)
RED HAT GLUSTER STORAGE ADMINISTRATION (RH236)
RED HAT SECURITY: Linux in Physical, Virtual, and Cloud (RH415)
RED HAT CLOUDFORMS HYBRID CLOUD MANAGEMENT (CL220)
RED HAT GLUSTER STORAGE ADMINISTRATION (RH236)
RED HAT SECURITY: LINUX IN PHYSICAL, VIRTUAL, AND CLOUD (RH415)
RED HAT ENTERPRISE LINUX DIAGNOSTICS AND TROUBLESHOOTING (RH342)
RED HAT SECURITY: IDENTITY MANAGEMENT AND ACTIVE DIRECTORY INTEGRATION (RH362)
AUTOMATION WITH ANSIBLE II: ANSIBLE TOWER (DO409)
RED HAT SATELLITE 6 ADMINISTRATION (RH403)
RIVERBED WAN310 OPTIMIZING ENTERPRISE APPLICATIONS AND PROTOCOLS
WAN350 IMPLEMENTING ENTERPRISE OPTIMIZATION ARCHITECTURES
WAN200 OPTIMIZATION ESSENTIALS
NPM200 PERFORMANCE MONITORING ESSENTIALS
RIVERBED APM200 APPLICATION PERFORMANCE MONITORING ESSENTIALS
HCB200 HYPER-CONVERGED BRANCH ESSENTIALS
NOS200 NETWORK PLANNING AND CONFIGURATION MANAGEMENT
CASCADE CONFIGURATION & OPERATIONS (CASC)
CASCADE SHARK/PILOT CONFIGURATION & OPERATIONS (CASP)
STEELHEAD APPLIANCE DEPLOYMENT & MANAGEMENT (SADM)
STEELHEAD MOBILE INSTALLATION & CONFIGURATION (SMC)
STEELHEAD APPLIANCE OPERATIONS & L1/L2 TROUBLESHOOTING (SAO)
CENTRAL MANAGEMENT CONSOLE CONFIGURATION & OPERATIONS (CMC)
INTERCEPTOR APPLIANCE INSTALLATION & CONFIGURATION (INTC)
STEELHEAD APPLIANCE ADVANCED DEPLOYMENT & TROUBLESHOOTING (SADT)
RCPE PROFESSIONAL BRANCH & DATACENTER NETWORK CONFIGURATION
RCPE PROFESSIONAL NETWORK PLANNING & CONFIGURATION MANAGEMENT
RCPE PROFESSIONAL BRANCH VIRTUALIZATION & STORAGE
RCPE PROFESSIONAL APPLICATION OPTIMIZATION
RCPE PROFESSIONAL DATACENTER OPTIMIZATION ARCHITECTURE
RCPE ASSOCIATE NETWORK & INFRASTRUCTURE VISIBILITY
RCPE PROFESSIONAL FLOW VISIBILITY & ANALYSIS
RCPE PROFESSIONAL USER OPTIMIZATION ARCHITECTURE
RCPE ASSOCIATE NETWORK CONFIGURATION
RCPE PROFESSIONAL AGGREGATE VISIBILITY
RCPE ASSOCIATE WAN OPTIMIZATION
SABSA SABSA FOUNDATION MODULES (F1 & F2)
MODULE A1 – ADVANCED SABSA RISK ASSURANCE & GOVERNANCE
MODULE A3 – ADVANCED SABSA ARCHITECTURE & DESIGN
SANS NETWARS - TOURNAMENT
NETWARS: CONTINUOUS
AUD507: AUDITING & MONITORING NETWORKS, PERIMETERS & SYSTEMS
FOR578: CYBER THREAT INTELLIGENCE
ICS515: ICS ACTIVE DEFENSE AND INCIDENT RESPONSE
ICS410: ICS/SCADA SECURITY ESSENTIALS
ICS456: ESSENTIALS FOR NERC CRITICAL INFRASTRUCTURE PROTECTION
MGT512: SANS SECURITY LEADERSHIP ESSENTIALS FOR MANAGERS WITH KNOWLEDGE COMPRESSION
LEG523: LAW OF DATA SECURITY AND INVESTIGATIONS
SEC301: INTRO TO INFORMATION SECURITY
SEC401: SECURITY ESSENTIALS BOOTCAMP STYLE
SEC506: SECURING LINUX/UNIX
SEC511: CONTINUOUS MONITORING AND SECURITY OPERATIONS
SEC566: IMPLEMENTING AND AUDITING THE CRITICAL SECURITY CONTROLS - IN-DEPTH
SEC573: AUTOMATING INFORMATION SECURITY WITH PYTHON
SEC599: DEFEATING ADVANCED ADVERSARIES - PURPLE TEAM TACTICS & KILL CHAIN DEFENSES
SEC505: SECURING WINDOWS AND POWERSHELL AUTOMATION
FOR572: ADVANCED NETWORK FORENSICS AND ANALYSIS
MGT514: SECURITY STRATEGIC PLANNING, POLICY, AND LEADERSHIP
SEC555: SIEM WITH TACTICAL ANALYTICS
SEC530: DEFENSIBLE SECURITY ARCHITECTURE
SPLUNK USING SPLUNK ENTERPRISE SECURITY
SYMANTEC SYMANTEC DATA CENTER SECURITY – SERVER ADVANCED 6.7 ADMINISTRATION – MUST COMPLETE ALL MODULES FOR CEUS
ENDPOINT PROTECTION 14: CONFIGURE AND PROTECT
ENDPOINT PROTECTION 14: MIGRATION AND UPGRADES
SYMANTEC ENDPOINT PROTECTION 14: PLAN AND IMPLEMENT
SYMANTEC ENDPOINT PROTECTION 14: MANAGE AND ADMINISTER
SYMANTEC ENDPOINT PROTECTION 14: MAINTAIN AND TROUBLESHOOT
SYMANTEC DATA LOSS PREVENTION 15.0 ADMINISTRATION
SYMANTEC DATA LOSS PREVENTION 15.0 INSTALL AND DEPLOY
SYMANTEC DATA LOSS PREVENTION 15.0 DIFFERENCES
SYMANTEC IDENTITY AND AUTHENTICATION SERVICES R1
PACKETSHAPER 11.9.1 ADMINISTRATION
SYMANTEC PROXYSG 6.6 BASIC ADMINISTRATION
SYMANTEC PROXYSG 6.6 ADVANCED ADMINISTRATION
SYMANTEC SECURITY ANALYTICS 7.2: ADMINISTRATOR
SYMANTEC SECURITY ANALYTICS 7.2: PROFESSIONAL
SSL VISIBILITY 5.0 ADMINISTRATION
CLOUDSOC ADMINISTRATION R2
CLOUDSOC DIFFERENCES R2.1.1
SYMANTEC ADVANCED THREAT PROTECTION 3.0: INCIDENT RESPONSE
VMware VMWARE VSPHERE: FAST TRACK [V6.7]
VMWARE VSPHERE: INSTALL, CONFIGURE, MANAGE [V6.7]
VMWARE VSPHERE: OPTIMIZE AND SCALE [V6.7]
VMWARE VSPHERE: SKILLS FOR PUBLIC SECTOR ADMINISTRATORS [V6.7]
VMWARE VSPHERE: TROUBLESHOOTING WORKSHOP [V6.7]
VMWARE ADVANCED SKILLS FOR VSPHERE PROFESSIONAL WORKSHOP [V6.7]
VMWARE VSPHERE: DESIGN WORKSHOP [V6.5]
VMWARE NSX: INSTALL, CONFIGURE, MANAGE [V6.4]
VMWARE NSX: INSTALL, CONFIGURE, MANAGE [V6.2]
VMWARE NSX: TROUBLESHOOTING AND OPERATIONS [V6.4]
VMWARE NSX: TROUBLESHOOTING AND OPERATIONS [V6.3]
VMWARE NSX-T: INSTALL, CONFIGURE, MANAGE [V2.2]
VMWARE NSX-T DATA CENTER: INSTALL, CONFIGURE, MANAGE [V2.4]
VMWARE NSX-T DATA CENTER: TROUBLESHOOTING AND OPERATIONS [V2.4]
VMWARE NSX-T DATA CENTER: DESIGN [V2.4]
VMWARE HORIZON 7: INSTALL, CONFIGURE, MANAGE [V7.3]
VMWARE HORIZON 7: DESIGN WORKSHOP [V7.0]