CompTIA Linux+

Pre-approved Training for CompTIA Linux+ Continuing Education Units (CEUs)

Note: Training in this list is subject to change without prior notification. As CompTIA exams are updated so is this list. Training uploaded into a certification record by the candidate prior to the change will remain valid. Training earned that was listed previously and has not been uploaded into a certification record can no longer be used for CEUs.

Training approved in this document is based on the CompTIA Linux+ - XK0-004 objectives.

 

CERTIFICATION PROVIDER COURSE TITLE
AMAZON WEB SERVICES AWS CLOUD PRACTITIONER ESSENTIALS (2ND EDITION)
AWS TECHNICAL ESSENTIALS
EXAM READINESS: AWS CERTIFIED ADVANCED NETWORKING - SPECIALTY
DATA ANALYTICS FUNDAMENTALS
BIG DATA ON AWS
AWS SECURITY FUNDAMENTALS (SECOND EDITION)
ARCHITECTING ON AWS
AWS WELL-ARCHITECTED TRAINING
SECURITY ENGINEERING ON AWS
COLLECTING AND ANALYZING LOGS WITH AMAZON CLOUDWATCH LOGS INSIGHTS
CENTRALIZED LOG PROCESSING WITH AMAZON ELASTICSEARCH SERVICE
ADVANCED ARCHITECTING ON AWS
EXAM READINESS: AWS CERTIFIED BIG DATA - SPECIALTY
EXAM READINESS: AWS CERTIFIED SECURITY - SPECIALTY
CHECK POINT CHECK POINT CYBER SECURITY ADMINISTRATOR (CCSA) R80.10
CHECK POINT CYBER SECURITY ENGINEERING (CCSE) R80.10
SECURITY MASTER - R80
MULTI-DOMAIN SECURITY MANAGEMENT WITH VIRTUAL SYSTEM EXTENSION
CISCO INTERCONNECTING CISCO NETWORKING DEVICES PART 1 (ICND1)
INTERCONNECTING CISCO NETWORKING DEVICES PART 2 (ICND2)
INTERCONNECTING CISCO NETWORKING DEVICES: ACCELERATED (CCNAX)
UNDERSTANDING CISCO CLOUD FUNDAMENTALS (CLDFND)
INTRODUCING CISCO CLOUD ADMINISTRATION (CLDADM)
UNDERSTANDING CISCO CYBERSECURITY FUNDAMENTALS (SECFND) V1.0
INTRODUCING CISCO DATA CENTER NETWORKING (DCICN)
INTRODUCING CISCO DATA CENTER NETWORKING TECHNOLOGIES (DCICT)
MANAGING INDUSTRIAL NETWORKING FOR MANUFACTURING WITH CISCO TECHNOLOGIES (IMINS2)
DESIGNING FOR CISCO INTERNETWORK SOLUTIONS (DESGN)
IMPLEMENTING CISCO NETWORK SECURITY (IINS)
BUILDING CISCO SERVICE PROVIDER NEXT-GENERATION NETWORKS, PART 1 (SPNG1)
BUILDING CISCO SERVICE PROVIDER NEXT-GENERATION NETWORKS, PART 2 (SPNGN2)
IMPLEMENTING CISCO IP ROUTING (ROUTE)
IMPLEMENTING CISCO IP SWITCHED NETWORKS (SWITCH)
DESIGNING CISCO NETWORK SERVICE ARCHITECTURES (ARCH)
IMPLEMENTING AND TROUBLESHOOTING THE CISCO CLOUD INFRASTRUCTURE (CLDINF)
DESIGNING THE CISCO CLOUD (CLDDES)
AUTOMATING THE CISCO ENTERPRISE CLOUD (CLDAUT)
BUILDING THE CISCO CLOUD WITH APPLICATION CENTRIC INFRASTRUCTURE (CLDACI)
IMPLEMENTING CISCO DATA CENTER UNIFIED COMPUTING (DCUCI)
IMPLEMENTING CISCO DATA CENTER INFRASTRUCTURE (DCII)
IMPLEMENTING CISCO DATA CENTER VIRTUALIZATION AND AUTOMATION (DCVAI)
DESIGNING CISCO DATA CENTER INFRASTRUCTURE (DCID)
TROUBLESHOOTING CISCO DATA CENTER INFRASTRUCTURE (DCIT)
TROUBLESHOOTING AND MAINTAINING CISCO IP NETWORKS (TSHOOT)
IMPLEMENTING CISCO SECURE ACCESS SOLUTIONS (SISAS)
IMPLEMENTING CISCO SECURE MOBILITY SOLUTIONS (SIMOS)
IMPLEMENTING CISCO THREAT CONTROL SOLUTIONS (SITCS)
DESIGNING CISCO WIRELESS ENTERPRISE NETWORKS (WIDESIGN)
DEPLOYING CISCO WIRELESS ENTERPRISE NETWORKS (WIDEPLOY)
TROUBLESHOOTING CISCO WIRELESS ENTERPRISE NETWORKS (WITSHOOT)
SECURING CISCO WIRELESS ENTERPRISE NETWORKS (WISECURE)
IMPLEMENTING CISCO EDGE NETWORK SECURITY SOLUTIONS (SENSS)
IMPLEMENTING AUTOMATION FOR CISCO ENTERPRISE SOLUTIONS (ENAUI)
IMPLEMENTING AUTOMATION FOR CISCO COLLABORATION SOLUTIONS (CLAUI)
IMPLEMENTING AUTOMATION FOR CISCO DATA CENTER SOLUTIONS (DCAUI)
IMPLEMENTING AUTOMATION FOR CISCO SERVICE PROVIDER SOLUTIONS (SPAUI)
IMPLEMENTING AUTOMATION FOR CISCO SECURITY SOLUTIONS (SAUI)
IMPLEMENTING DEVOPS SOLUTIONS AND PRACTICES USING CISCO PLATFORMS (DEVOPS)
DEVELOPING SOLUTIONS USING CISCO IOT AND EDGE PLATFORMS (DEVIOT)
IMPLEMENTING AND OPERATING CISCO ENTERPRISE NETWORK CORE TECHNOLOGIES (ENCOR)
IMPLEMENTING CISCO ENTERPRISE ADVANCED ROUTING AND SERVICES (ENARSI)
IMPLEMENTING CISCO SD-WAN SOLUTIONS (SDWAN300)
DESIGNING CISCO ENTERPRISE NETWORKS (ENSLD)
DESIGNING CISCO ENTERPRISE WIRELESS NETWORKS (ENWLSD)
IMPLEMENTING CISCO ENTERPRISE WIRELESS NETWORKS (ENWLSI)
IMPLEMENTING AND OPERATING CISCO COLLABORATION CORE TECHNOLOGIES (CLCOR)
IMPLEMENTING CISCO COLLABORATION CLOUD AND EDGE SOLUTIONS (CLCEI)
IMPLEMENTING AND OPERATING CISCO DATA CENTER CORE TECHNOLOGIES (DCCOR)
DESIGNING CISCO DATA CENTER INFRASTRUCTURE (DCID)
IMPLEMENTING CISCO APPLICATION CENTRIC INFRASTRUCTURE (DCACI)
CONFIGURING CISCO MDS 9000 SERIES SWITCHES (DCMDS)
IMPLEMENTING AND OPERATING CISCO SECURITY CORE TECHNOLOGIES (SCOR)
SECURING NETWORKS WITH CISCO FIREPOWER NEXT GENERATION FIREWALL (SSNGFW)
SECURING NETWORKS WITH CISCO FIREPOWER NEXT-GENERATION IPS (SSFIPS)
IMPLEMENTING AND CONFIGURING CISCO IDENTITY SERVICES ENGINE (SISE)
SECURING EMAIL WITH CISCO EMAIL SECURITY APPLIANCE (SESA)
SECURING THE WEB WITH CISCO WEB SECURITY APPLIANCE (SWSA)
IMPLEMENTING SECURE SOLUTIONS WITH VIRTUAL PRIVATE NETWORKS (SVPN)
IMPLEMENTING AND OPERATING CISCO SERVICE PROVIDER NETWORK CORE TECHNOLOGIES (SPCOR)
IMPLEMENTING CISCO SERVICE PROVIDER ADVANCED ROUTING SOLUTIONS (SPRI)
IMPLEMENTING CISCO SERVICE PROVIDER VPN SERVICES (SPVI)
COMPTIA CLOUD+ (CV0-002)
GOOGLE ARCHITECTING WITH GOOGLE CLOUD PLATFORM: INFRASTRUCTURE
GOOGLE CLOUD PLATFORM FUNDAMENTALS: CORE INFRASTRUCTURE
DEVELOPING APPLICATIONS WITH GOOGLE CLOUD PLATFORM
ISACA CISA Exam Review
CSX PRACTITIONER: IDENTIFICATION AND PROTECTION
CSX PRACTITIONER: RESPOND AND RECOVER
CSX PRACTITIONER BOOT CAMP
CSX PRACTITIONER: DETECTION
ISC(2) (ISC)2 TRAINING FOR CCSP
(ISC)2 TRAINING FOR CISSP
(ISC)2 TRAINING FOR CISSP-ISSAP
(ISC)2 TRAINING FOR CISSP-ISSEP
(ISC)2 TRAINING FOR CISSP-ISSMP
(ISC)2 TRAINING FOR SSCP
(ISC)2 TRAINING FOR CAP
(ISC)2 TRAINING FOR HCISPP
JUNIPER JUNIPER NETWORKS DESIGN-SERVICE PROVIDER (JND-SP)
JUNIPER NETWORKS DESIGN - SECURITY (JND-SEC)
ADVANCED JUNOS SECURITY (AJSEC)
JUNOS FOR SECURITY PLATFORMS (JSEC)
MCAFEE MCAFEE ENDPOINT SECURITY UPGRADE TRAINING
MCAFEE ENDPOINT SECURITY 10.X ADMINISTRATION
MCAFEE EPOLICY ORCHESTRATOR ADMINISTRATION (5.10)
MCAFEE EPOLICY ORCHESTRATOR 5.10 ESSENTIALS
MCAFEE ENTERPRISE SECURITY MANAGER FOR ANALYSTS-I
MCAFEE ENTERPRISE SECURITY MANAGER FOR ENGINEERS-I
MCAFEE ADVANCED THREAT DETECTION ADMINISTRATION
MCAFEE VIRUSSCAN AND EPOLICY ORCHESTRATOR ADMINISTRATION
MCAFEE NETWORK SECURITY PLATFORM ADMINISTRATION
MCAFEE HOST INTRUSION PREVENTION SYSTEM ADMINISTRATION
MCAFEE DATA LOSS PREVENTION ENDPOINT ADMINISTRATION
SECURITY INFORMATION AND EVENT MANAGEMENT (SIEM) ADMINISTRATION
MICROSOFT MANAGING MICROSOFT 365 IDENTITY AND ACCESS
IMPLEMENTING MICROSOFT 365 THREAT PROTECTION
ADMINISTERING MICROSOFT 365 BUILT-IN COMPLIANCE
IMPLEMENTING MICROSOFT 365 INFORMATION PROTECTION
OFFICE 365 MANAGEMENT
MICROSOFT 365 TENANT & SERVICE MANAGEMENT
MICROSOFT 365 IDENTITY MANAGEMENT
MICROSOFT 365 SECURITY MANAGEMENT
MICROSOFT 365 COMPLIANCE MANAGEMENT
MANAGING OFFICE 365 CONTENT SERVICES
ENABLING OFFICE 365 WORKLOADS FOR COLLABORATION
IMPLEMENTING SHAREPOINT HYBRID SCENARIOS
MIGRATING TO SHAREPOINT ONLINE
RED HAT RED HAT SYSTEM ADMINISTRATION I (RH124)
RED HAT SYSTEM ADMINISTRATION II (RH134)
RHCSA RAPID TRACK COURSE (RH199)
RED HAT OPENSTACK ADMINISTRATION I (CL110)
RED HAT OPENSTACK ADMINISTRATION II (CL210)
RED HAT SYSTEM ADMINISTRATION III (RH254)
RED HAT OPENSTACK SYSTEM ADMINISTRATION III (CL310)
RED HAT CLOUDFORMS HYBRID CLOUD MANAGEMENT (CL220)
JBOSS APPLICATION ADMINISTRATION I (JB248)
RED HAT GLUSTER STORAGE ADMINISTRATION (RH236)
RED HAT VIRTUALIZATION ADMINISTRATION (RH318)
CAMEL INTEGRATION AND DEVELOPMENT WITH RED HAT FUSE (JB421)
RED HAT SATELLITE 6 ADMINISTRATION (RH403)
RED HAT ENTERPRISE LINUX DIAGNOSTICS AND TROUBLESHOOTING (RH342)
RED HAT SECURITY: LINUX IN PHYSICAL, VIRTUAL, AND CLOUD (RH415)
AUTOMATION WITH ANSIBLE (DO407)
CONFIGURATION MANAGEMENT WITH PUPPET (DO405)
RED HAT ENTERPRISE PERFORMANCE TUNING (RH442)
RED HAT HIGH AVAILABILITY CLUSTERING (RH436)
RED HAT JBOSS DATA GRID DEVELOPMENT (JB453)
INTRODUCTION TO CONTAINERS, KUBERNETES, AND RED HAT OPENSHIFT (DO180)
RED HAT OPENSHIFT ADMINISTRATION I (DO280)
RIVERBED RCPE Professional Branch Virtualization & Storage
RCPE Professional Network Planning & Configuration Management
RCPE Professional Branch & Datacenter Network Configuration
RCPE Associate Network Configuration
RCPE Professional Datacenter Optimization Architecture
RCPE Professional Application Optimization
RCPE Professional User Optimization Architecture
RCPE Associate Network & Infrastructure Visibility
RCPE Associate WAN Optimization
SANS SEC599: DEFEATING ADVANCED ADVERSARIES - PURPLE TEAM TACTICS & KILL CHAIN DEFENSES
ICS456: ESSENTIALS FOR NERC CRITICAL INFRASTRUCTURE PROTECTION
FOR578: CYBER THREAT INTELLIGENCE
SEC555: SIEM with Tactical Analytics
SEC530: Defensible Security Architecture
SPLUNK USING SPLUNK ENTERPRISE SECURITY
SYMANTEC SYMANTEC ENDPOINT PROTECTION 14: PLAN AND IMPLEMENT
SYMANTEC ENDPOINT PROTECTION 14: MANAGE AND ADMINISTER
SYMANTEC ENDPOINT PROTECTION 14: MAINTAIN AND TROUBLESHOOT
SYMANTEC DATA LOSS PREVENTION 15.0 ADMINISTRATION
SYMANTEC DATA LOSS PREVENTION 15.0 INSTALL AND DEPLOY
SYMANTEC DATA LOSS PREVENTION 15.0 DIFFERENCES
SYMANTEC IDENTITY AND AUTHENTICATION SERVICES R1
PACKETSHAPER 11.9.1 ADMINISTRATION
SYMANTEC PROXYSG 6.6 BASIC ADMINISTRATION
SYMANTEC PROXYSG 6.6 ADVANCED ADMINISTRATION
SYMANTEC SECURITY ANALYTICS 7.2: ADMINISTRATOR
SYMANTEC SECURITY ANALYTICS 7.2: PROFESSIONAL
SSL VISIBILITY 5.0 ADMINISTRATION
CLOUDSOC ADMINISTRATION R2
CLOUDSOC DIFFERENCES R2.1.1
SYMANTEC ADVANCED THREAT PROTECTION 3.0: INCIDENT RESPONSE
ENDPOINT PROTECTION 14: CONFIGURE AND PROTECT
SYMANTEC DATA CENTER SECURITY – SERVER ADVANCED 6.7 ADMINISTRATION
EMAIL SECURITY.CLOUD ADMINISTRATION R1
SYMANTEC MESSAGING GATEWAY 10.6 ADMINISTRATION