CompTIA Network+

Pre-approved Training for CompTIA Network+ Continuing Education Units (CEUs)

Note: Training in this list is subject to change without prior notification. As CompTIA exams are updated so is this list. Training uploaded into a certification record by the candidate prior to the change will remain valid. Training earned that was listed previously and has not been uploaded into a certification record can no longer be used for CEUs.

Training approved in this document is based on the CompTIA Network+ - N10-009 objectives.

CERTIFICATION PROVIDER COURSE TITLE
AMAZON AWS SECURITY FUNDAMENTALS
ADVANCED ARCHITECTING ON AWS
EXAM READINESS WORKSHOP: AWS CERTIFIED SOLUTIONS ARCHITECT - PROFESSIONAL
DEVELOPING ON AWS
AWS WELL-ARCHITECTED TRAINING
AWS CLOUD PRACTITIONER ESSENTIALS (SECOND EDITION)
AWS TECHNICAL ESSENTIALS
EXAM READINESS: AWS CERTIFIED ADVANCED NETWORKING - SPECIALTY
DATA ANALYTICS FUNDAMENTALS
BIG DATA ON AWS
ARCHITECTING ON AWS
SECURITY ENGINEERING ON AWS
EXAM READINESS: AWS CERTIFIED SECURITY - SPECIALTY
ALEXA FOR DEVELOPERS
AMAZON API GATEWAY FOR SERVERLESS APPLICATIONS
AMAZON CONNECT: BUILD A CUSTOM CALL CONTROL PANEL
AMAZON ELASTIC KUBERNETES SERVICE (EKS) PRIMER
AMAZON LUMBERYARD PRIMER
AMAZON WORKSPACES PRIMER
APPLICATION DEVELOPMENT USING AWS DYNAMODB
AWS ELEMENTAL CONDUCTOR
AWS FOUNDATIONS: GETTING STARTED WITH THE AWS CLOUD ESSENTIALS
AWS HADOOP FUNDAMENTALS
AWS LAMBDA FOUNDATIONS
AWS SAAS FACTORY ARCHITECTURE TRACK: SAAS MIGRATION STRATEGIES
AWS SECURITY ESSENTIALS
AWS SECURITY FUNDAMENTALS (SECOND EDITION)
AWS SECURITY HUB PRIMER
AWS SYSTEMS MANAGER
BREAK FREE OF LEGACY DATABASES
CLOUD AUDIT ACADEMY
CONFIGURE AND DEPLOY AWS PRIVATELINK
DATA WAREHOUSING ON AWS
DEEP DIVE WITH SECURITY: AWS IDENTITY AND ACCESS MANAGEMENT (IAM)
DEPLOYING AND SCALING APPLICATIONS WITH AMAZON LIGHTSAIL
DIVE DEEP INTO AMAZON CONNECT REPORTING AND METRICS
EXAM READINESS: AWS CERTIFIED DATA ANALYTICS – SPECIALTY
GAME SERVER HOSTING WITH AMAZON EC2
GETTING STARTED WITH AMAZON SIMPLE STORAGE SERVICE (AMAZON S3)
GETTING STARTED WITH AWS SECURITY, IDENTITY, AND COMPLIANCE
GETTING STARTED WITH DEVOPS ON AWS
INTERNET OF THINGS (IOT) MICROCONTROLLERS SERIES
INTRODUCTION TO BLOCKCHAIN
IOT EDGE COMPUTING: AWS IOT GREENGRASS PRIMER
MANAGING AMAZON SIMPLE STORAGE SERVICE (AMAZON S3)
MOBILE DEVELOPMENT IN IOT
PLANNING AN AWS OUTPOSTS IMPLEMENTATION
POSTGRESQL FUNDAMENTALS: ARCHITECTURE
SPEAKING OF: MACHINE TRANSLATION AND NATURAL LANGUAGE PROCESSING (NLP)
TRANSIT GATEWAY NETWORKING AND SCALING
VISUALIZING WITH QUICKSIGHT
APPLE MAC INTEGRATION BASICS 10.11
MAC INTEGRATION BASICS 10.12
ARCITURA CLOUD SCHOOL FUNDAMENTAL CLOUD ARCHITECTURE
ADVANCED CLOUD ARCHITECTURE
FUNDAMENTAL CLOUD SECURITY
ADVANCED CLOUD SECURITY
FUNDAMENTAL CLOUD STORAGE
ADVANCED CLOUD STORAGE
FUNDAMENTAL CLOUD VIRTUALIZATION
ADVANCED CLOUD VIRTUALIZATION
FUNDAMENTAL CLOUD CAPACITY
ADVANCED CLOUD CAPACITY
FUNDAMENTAL CLOUD COMPUTING
CLOUD TECHNOLOGY CONCEPTS
BROADCOM/SYMANTEC SYMANTEC DATA CENTER SECURITY – SERVER ADVANCED 6.7 ADMINISTRATION – MUST COMPLETE ALL MODULES FOR CEUS
ENDPOINT PROTECTION 14: CONFIGURE AND PROTECT
SYMANTEC ENDPOINT PROTECTION 14: PLAN AND IMPLEMENT
SYMANTEC ENDPOINT PROTECTION 14: MANAGE AND ADMINISTER
SYMANTEC ENDPOINT PROTECTION 14: MAINTAIN AND TROUBLESHOOT
SYMANTEC DATA LOSS PREVENTION 15.0 ADMINISTRATION
SYMANTEC DATA LOSS PREVENTION 15.0 INSTALL AND DEPLOY
SYMANTEC DATA LOSS PREVENTION 15.0 DIFFERENCES
SYMANTEC IDENTITY AND AUTHENTICATION SERVICES R1
PACKETSHAPER 11.9.1 ADMINISTRATION
SYMANTEC PROXYSG 6.6 BASIC ADMINISTRATION
SYMANTEC PROXYSG 6.6 ADVANCED ADMINISTRATION
SYMANTEC SECURITY ANALYTICS 7.2: ADMINISTRATOR
SYMANTEC SECURITY ANALYTICS 7.2: PROFESSIONAL
SSL VISIBILITY 5.0 ADMINISTRATION
CLOUDSOC ADMINISTRATION R2
CLOUDSOC DIFFERENCES R2.1.1
SYMANTEC ADVANCED THREAT PROTECTION 3.0: INCIDENT RESPONSE
SYMANTEC MESSAGING GATEWAY 10.6 ADMINISTRATION
SYMANTEC CONTROL COMPLIANCE SUITE (CCS) 11.0: ADMINISTRATION
EMAIL SECURITY.CLOUD ADMINISTRATION R1
CHECK POINT CHECK POINT CYBER SECURITY ADMINISTRATOR (CCSA)
CHECK POINT CYBER SECURITY ENGINEERING (CCSE)
CHECK POINT CERTIFIED SECURITY MASTER (CCSM)
CHECK POINT CERTIFIED CLOUD SPECIALIST (CCCS)
CHECK POINT CERTIFIED MAESTRO EXPERT (CCME)
CISCO IMPLEMENTING AND ADMINISTERING CISCO SOLUTIONS (CCNA)
AUTOMATING AND PROGRAMMING CISCO COLLABORATION SOLUTIONS (CLAUTO)
CONFIGURING CISCO MDS 9000 SERIES SWITCHES (DCMDS)
DESIGNING CISCO DATA CENTER INFRASTRUCTURE (DCID)
DESIGNING CISCO ENTERPRISE NETWORKS (ENSLD)
DEVELOPING APPLICATIONS AND AUTOMATING WORKFLOWS USING CISCO PLATFORMS (DEVASC)
DEVELOPING APPLICATIONS USING CISCO CORE PLATFORMS AND APIS (DEVCOR)
DEVELOPING SOLUTIONS USING CISCO IOT AND EDGE PLATFORMS (DEVIOT)
IMPLEMENTING AND CONFIGURING CISCO IDENTITY SERVICES ENGINE (SISE)
IMPLEMENTING AND OPERATING CISCO DATA CENTER CORE TECHNOLOGIES (DCCOR)
IMPLEMENTING AND OPERATING CISCO ENTERPRISE NETWORK CORE TECHNOLOGIES (ENCOR)
IMPLEMENTING AND OPERATING CISCO SECURITY CORE TECHNOLOGIES (SCOR)
IMPLEMENTING AND OPERATING CISCO SERVICE PROVIDER NETWORK CORE TECHNOLOGIES (SPCOR)
IMPLEMENTING AUTOMATION FOR CISCO DATA CENTER SOLUTIONS (DCAUI)
IMPLEMENTING AUTOMATION FOR CISCO ENTERPRISE SOLUTIONS (ENAUI)
IMPLEMENTING AUTOMATION FOR CISCO SECURITY SOLUTIONS (SAUI)
IMPLEMENTING AUTOMATION FOR CISCO SERVICE PROVIDER SOLUTIONS (SPAUI)
IMPLEMENTING CISCO APPLICATION CENTRIC INFRASTRUCTURE (DCACI)
IMPLEMENTING CISCO COLLABORATION CLOUD AND EDGE SOLUTIONS (CLCEI)
IMPLEMENTING CISCO COLLABORATION CORE TECHNOLOGIES (CLCOR)
IMPLEMENTING CISCO ENTERPRISE ADVANCED ROUTING AND SERVICES (ENARSI)
IMPLEMENTING CISCO ENTERPRISE WIRELESS NETWORKS (ENWLSI)
IMPLEMENTING CISCO SD-WAN SOLUTIONS (ENSDWI)
IMPLEMENTING CISCO SERVICE PROVIDER ADVANCED ROUTING SOLUTIONS (SPRI)
IMPLEMENTING CISCO SERVICE PROVIDER VPN SERVICES (SPVI)
IMPLEMENTING DEVOPS SOLUTIONS AND PRACTICES USING CISCO PLATFORMS (DEVOPS)
IMPLEMENTING SECURE SOLUTIONS WITH VIRTUAL PRIVATE NETWORKS (SVPN)
SECURING EMAIL WITH CISCO EMAIL SECURITY APPLIANCE (SESA)
SECURING NETWORKS WITH CISCO FIREPOWER NEXT GENERATION FIREWALL (SSNGFW)
SECURING NETWORKS WITH CISCO FIREPOWER NEXT-GENERATION IPS (SSFIPS)
SECURING THE WEB WITH CISCO WEB SECURITY APPLIANCE (SWSA)
SUPPORTING CISCO DATA CENTER SYSTEM DEVICES (DCTECH)
SUPPORTING CISCO ROUTING AND SWITCHING NETWORK DEVICES
TROUBLESHOOTING CISCO DATA CENTER INFRASTRUCTURE (DCIT)
CITRIX CXM-302 DESIGN, DEPLOY AND MANAGE ENTERPRISE MOBILITY WITH XENMOBILE 9.0
CXD-210: CITRIX XENAPP AND XENDESKTOP ADMINISTRATION
CXD-310: CITRIX XENAPP AND XENDESKTOP ADVANCED ADMINISTRATION
CXD-400 DESIGNING APP AND DESKTOP SOLUTIONS WITH CITRIX XENAPP AND XENDESKTOP
CNS-220: CITRIX NETSCALER ESSENTIALS AND TRAFFIC MANAGEMENT
CNS-222: CITRIX NETSCALER ESSENTIALS AND UNIFIED GATEWAY
CNS-219: CITRIX NETSCALER TRAFFIC MANAGEMENT
CNS-221: CITRIX NETSCALER UNIFIED GATEWAY
NETSCALER SD-WAN
CNS-320: CITRIX NETSCALER ADVANCED TOPICS – SECURITY, MANAGEMENT, AND OPTIMIZATION
CXM-303 DEPLOYING ENTERPRISE MOBILITY SOLUTIONS WITH CITRIX XENMOBILE
CLOUD SECURITY ALLIANCE CCSK FOUNDATION
CERTIFICATE OF CLOUD AUDITING KNOWLEDGE (CCAK)
CERTIFICATE OF CLOUD SECURITY KNOWLEDGE (CCSK)
COMPTIA COMPTIA COMPTIA CLOUD+ (CV0-003)
COMPTIA ADVANCED SECURITY PRACTITIONER (CASP+) (CAS-004)
COMPTIA NETWORK+ (N10-008) APPROVED ONLY FOR THOSE CERTIFIED IN N10-007 AND EARLIER
COMPTIA CYBERSECURITY ANALYST (CySA+) (CS0-003)
COMPTIA PENTEST+ (PT0-002)
COMPTIA LINUX+ (XK0-004)
COMPTIA CERTMASTER LEARN FOR NETWORK+ N10-008 - 30 CEUS APPROVED ONLY FOR THOSE CERTIFIED IN N10-007 AND EARLIER
COMPTIA CERTMASTER PRACTICE FOR NETWORK+ N10-008 - 10 CEUS APPROVED ONLY FOR THOSE CERTIFIED IN N10-007 AND EARLIER
COMPTIA CERTMASTER LEARN FOR CLOUD+ CV0-003 - 25 CEUS
COMPTIA CERTMASTER PRACTICE FOR CLOUD+ CV0-003 - 10 CEUS
COMPTIA CERTMASTER LEARN FOR PENTEST+ PT0-002 - 25 CEUS
COMPTIA CERTMASTER PRACTICE FOR PENTEST+ PT0-002 - 10 CEUS
COMPTIA CERTMASTER LEARN FOR CYSA+ CS0-003 - 25 CEUS
COMPTIA CERTMASTER PRACTICE FOR CYSA+ CS0-003 - 10 CEUS
COMPTIA CERTMASTER LEARN FOR SECURITY+ SY0-701- 40 CEUS
COMPTIA CERTMASTER PRACTICE FOR SECURITY+ SY0-701 - 10 CEUS
COMPTIA CERTMASTER LEARN FOR LINUX+ XK0-005 - 30 CEUS
COMPTIA CERTMASTER PRACTICE FOR LINUX+ XK0-005 - 10 CEUS
COMPTIA SERVER+ (SK0-005)
COMPTIA SECURITY+ (SY0-701)
CWNP CWS - CERTIFIED WIRELESS SPECIALIST
CWNA - CERTIFIED WIRELESS NETWORK ADMINISTRATOR
CWSP - CERTIFIED WIRELESS SECURITY PROFESSIONAL
CWDP – CERTIFIED WIRELESS DESIGN PROFESSIONAL
CWAP - CERTIFIED WIRELESS ANALYSIS PROFESSIONAL
EC-COUNCIL CERTIFIED SECURITY ANALYST (ECSA)
DISASTER RECOVERY PROFESSIONAL (EDRP)
COMPUTER HACKING FORENSICS INVESTIGATOR (CHFI)
CERTIFIED CHIEF INFORMATION SECURITY OFFICER (CCISO)
CERTIFIED ETHICAL HACKER (CEH)
CERTIFIED SECURITY SPECIALIST (ECSS)
CERTIFIED INCIDENT HANDLER (ECIH)
CERTIFIED ENCRYPTION SPECIALIST (ECES)
CERTIFIED NETWORK DEFENDER (CND)
CERTIFIED NETWORK DEFENSE ARCHITECT (CNDA)
CERTIFIED SOC ANALYST (CSA)
CERTIFIED PENETRATION TESTING (CPENT)
FORESCOUT ASSOCIATE FSCA
ASSOCIATE FSCA:OT/ICS
CERTIFIED EXPERT FSCE
CERTIFIED PROFESSIONAL FSCP
FORESCOUT CERTIFIED EXPERT OT/ICS FSCE:OT/ICS
FORTINET FORTIGATE SECURITY
FORTIGATE INFRASTRUCTURE
NSE4 IMMERSION
FORTIMANAGER
FORTIEDR
FORTISIEM
FORTIANALYZER
FORTICLIENT EMS
FORTIANALYZER ADMINISTRATOR
FORTIMAIL
FORTISANDBOX
FORTIAUTHENTICATOR
CLOUD SECURITY FOR AZURE
CLOUD SECURITY FOR AWS
FORTIADC
FORTIWEB
FORTISOAR ADMINISTRATOR
FORTISWITCH
FORTINAC
SECURE WIRELESS LAN
FORTIVOICE
PUBLIC CLOUD SECURITY
OT SECURITY
LAN EDGE
SD-WAN
ENTERPRISE FIREWALL
ADVANCED ANALYTICS
FORTISOAR DESIGN AND DEVELOPMENT
GOOGLE ARCHITECTING WITH GOOGLE COMPUTE ENGINE
DATA ENGINEERING ON GOOGLE CLOUD PLATFORM
DEVELOPING APPLICATIONS WITH GOOGLE CLOUD PLATFORM
NETWORKING IN GOOGLE CLOUD PLATFORM
SECURITY IN GOOGLE CLOUD PLATFORM
GOOGLE’S APPLIED DIGITAL SKILLS
GOOGLE CLOUD PLATFORM FUNDAMENTALS FOR AWS PROFESSIONALS
HPE Designing HP Data Center and Cloud Solutions, Rev. 15.11
Designing HPE Data Center and Cloud Solutions, Rev. 16.11
Delta - Designing HPE Data Center and Cloud Solutions, Rev. 16.11
Creating HPE Software-defined Networks, Rev. 15.41
Building HP FlexFabric Data Centers, Rev. 14.41
Architecting HP FlexNetwork Solutions, Rev 14.21
Deploying HP FlexNetwork Core Technologies, Rev 14.31
HPE ArcSight Master ASE Preparation Course
ArcSight ESM 6.5 Advanced Administrator
ArcSight ESM 6.5 Advanced Analyst
ArcSight Logger - 6.0 Administration and Operations
Dynamic Application Testing with HP WebInspect 10.3
HP Fortify Static Code Analyzer / Software Security Center 4.2
HPE/ARUBA CLEARPASS ESSENTIALS
IMPLEMENTING ARUBA WLAN
SCALABLE WLAN DESIGN & IMPLEMENTATION (SWDI)
DESIGNING ADVANCED MOBILITY SOLUTIONS (DAMS)
ADVANCED MOBILITY SOLUTIONS & TROUBLESHOOTING (AMST)
CLEARPASS ADVANCED (CPA)
DESIGNING ARUBA SOLUTIONS (DAS)
IMPLEMENTING ARUBA CAMPUS SWITCHING SOLUTIONS (IACSS)
CLEARPASS FUNDAMENTALS
ARUBA SWITCHING FUNDAMENTALS (ASF)
IBM IBM SECURITY QRADAR SIEM V7.5 ANALYSIS
IBM SECURITY QRADAR SIEM V7.5 ADMINISTRATION
IBM SECURITY QRADAR SIEM V7.5 DEPLOYMENT
IBM SECURITY IDENTITY GOVERNANCE AND INTELLIGENCE V5.2.5 DEPLOYMENT
DEVELOPING CUSTOM RULES IN IBM QRADAR SIEM
QRADAR PLANNING AND INSTALLATION GUIDE
QRADAR SIEM API
WHY QRADAR SIEM?
QRADAR SIEM V7.4.3 DEPLOYMENT
ISACA CRISC EXAM REVIEW
CSX PRACTITIONER: IDENTIFICATION AND PROTECTION
CSX PRACTITIONER: RESPOND AND RECOVER
CSX PRACTITIONER BOOT CAMP
CSX PRACTITIONER:  DETECTION
Real World Application of RMF for DoD IT
CISA EXAM REVIEW
(ISC)2 (ISC)2 TRAINING  FOR CCSP
(ISC)2 TRAINING  FOR CISSP
(ISC)2 TRAINING  FOR CISSP-ISSAP
(ISC)2 TRAINING  FOR CISSP-ISSEP
(ISC)2 TRAINING  FOR CISSP-ISSMP
(ISC)2 TRAINING  FOR SSCP
JUNIPER JUNIPER NETWORKS DESIGN FUNDAMENTALS (JNDF) 
ADVANCED JUNOS ENTERPRISE ROUTING (AJER)
ADVANCED JUNOS ENTERPRISE SWITCHING (AJEX)
ADVANCED JUNOS SECURITY (AJSEC)
ADVANCED JUNOS SERVICE PROVIDER ROUTING (AJSPR)
JUNOS ENTERPRISE SWITCHING (JEX)
JUNOS INTERMEDIATE ROUTING (JIR)
JUNIPER NETWORKS DESIGN - DATA CENTER (JND-DC)
NETWORK AUTOMATION USING CONTRAIL CLOUD (NACC)
JUNOS SERVICE PROVIDER SWITCHING (JSPX)
INTRODUCTION TO THE JUNOS OPERATING SYSTEM (IJOS)
JUNOS LAYER 3 VPNS (JL3V)
JUNOS LAYER 2 VPNS (JL2V)
JUNOS MPLS FUNDAMENTALS (JMF)
JUNOS FOR SECURITY PLATFORMS (JSEC)
JUNIPER NETWORKS DESIGN-SERVICE PROVIDER (JND-SP)
MICROSOFT SECURITY FUNDAMENTALS
INSTALLING AND CONFIGURING WINDOWS SERVER® 2012
WINDOWS SERVER ADMINISTRATION FUNDAMENTALS
NETWORKING WITH WINDOWS SERVER 2016
IDENTITY WITH WINDOWS SERVER 2016
ADMINISTERING WINDOWS SERVER 2012
CONFIGURING ADVANCED WINDOWS SERVER 2012 SERVICES
DESIGNING AND IMPLEMENTING A SERVER INFRASTRUCTURE
IMPLEMENTING AN ADVANCED SERVER INFRASTRUCTURE
DEVELOPING MICROSOFT AZURE SOLUTIONS
IMPLEMENTING MICROSOFT AZURE INFRASTRUCTURE SOLUTIONS
ADMINISTERING MICROSOFT SQL SERVER DATABASES
DESIGNING A DATA SOLUTION WITH MICROSOFT SQL SERVER
WINDOWS OPERATING SYSTEM AND WINDOWS SERVER FUNDAMENTALS
WINDOWS SERVER 2012: TECHNICAL OVERVIEW
SECURING WINDOWS SERVER 2016
WINDOWS SERVER 2012 TRAINING: NETWORKING
WINDOWS SERVER 2012: IDENTITY AND ACCESS
WINDOWS SERVER 2012: STORAGE
DEVELOPING MICROSOFT SQL SERVER DATABASES
DESIGNING DATABASE SOLUTIONS FOR SQL SERVER
OFFENSIVE SECURITY EXP-401: ADVANCED WINDOWS EXPLOITATION
PEN-200: PENETRATION TESTING WITH KALI LINUX
PEN-210: FOUNDATIONAL WIRELESS NETWORK ATTACKS
SOC-200: FOUNDATIONAL SECURITY OPERATIONS AND DEFENSIVE ANALYSIS
WEB-200: FOUNDATIONAL WEB APPLICATION ASSESSMENTS WITH KALI LINUX
WEB-300: ADVANCED WEB ATTACKS AND EXPLOITATION
OpenText IR250 - INCIDENT INVESTIGATION
DFIR370 - HOST INTRUSION METHODOLOGY AND INVESTIGATION
DF120 - FOUNDATIONS IN DIGITAL FORENSICS WITH ENCASE
DF125 - MOBILE DEVICE EXAMINATIONS WITH ENCASE
DF210 - BUILDING AN INVESTIGATION WITH ENCASE
ED290 EDISCOVERY TRAINING WITH ENCASE INFORMATION ASSURANCE
DFIR450 ENCASE ENSCRIPT PROGRAMMING
DF320 - ADVANCED ANALYSIS OF WINDOWS ARTIFACTS WITH ENCASE
PALO ALTO FIREWALL 11.0 ESSENTIALS: CONFIGURATION AND MANAGEMENT (EDU-210)
PANORAMA 11.0: MANAGING FIREWALLS AT SCALE (EDU-220)
PRISMA CLOUD: MONITORING AND SECURING - EDU-150
PRISMA CLOUD: ONBOARDING AND OPERATIONALIZING - EDU- 152
PCC TRAINING
INTRODUCTION TO CYBERSECURITY
FUNDAMENTALS OF NETWORK SECURITY
FUNDAMENTALS OF CLOUD SECURITY
FUNDAMENTALS OF SECURITY OPERATIONS CENTER (SOC)
USE OF THE PALO ALTO NETWORKS CYBER SECURITY ACADEMY CYBERSECURITY SURVIVAL GUIDE
FUNDAMENTALS OF SECURITY OPERATIONS CENTER (SOC)
INTRODUCTION TO CORTEX XSOAR
CORTEX XSOAR ADMIN TRAINING
CORTEX XSOAR ANALYST TRAINING
CORTEX XSOAR SOAR ENGINEER TRAINING
RED HAT RED HAT SYSTEM ADMINISTRATION I (RH124)
RED HAT SYSTEM ADMINISTRATION II (RH134)
RED HAT OPENSTACK ADMINISTRATION I (CL110)
RED HAT OPENSTACK ADMINISTRATION II (CL210)
RED HAT SYSTEM ADMINISTRATION III (RH254)
RED HAT CLOUDFORMS HYBRID CLOUD MANAGEMENT (CL220)
RED HAT HIGH AVAILABILITY CLUSTERING (RH436)
RED HAT SECURITY: Linux in Physical, Virtual, and Cloud (RH415)
SABSA A1 – ADVANCED SABSA RISK, ASSURANCE & GOVERNANCE
A2 – ADVANCED SABSA ARCHITECTURE PROGRAM MANAGEMENT
A3 – ADVANCED SABSA ARCHITECTURE DESIGN
A3 – SABSA A3 – ARCHITECTURE DESIGN DEVELOPMENT
A4 – ADVANCED SABSA INCIDENT, MONITORING & INVESTIGATIONS ARCHITECTURE
A5 – ADVANCED SABSA BUSINESS CONTINUITY AND CRISIS MANAGEMENT
SANS AUD507: AUDITING & MONITORING NETWORKS, PERIMETERS & SYSTEMS
FOR498: BATTLEFIELD FORENSICS & DATA ACQUISITION
FOR500: WINDOWS FORENSIC ANALYSIS
FOR508: ADVANCED DIGITAL FORENSICS, INCIDENT RESPONSE, AND THREAT HUNTING
FOR509: ENTERPRISE CLOUD FORENSICS AND INCIDENT RESPONSE
FOR518: MAC FORENSIC ANALYSIS
FOR572: ADVANCED NETWORK FORENSICS AND ANALYSIS
FOR578: CYBER THREAT INTELLIGENCE
FOR585: ADVANCED SMARTPHONE FORENSICS
FOR610: REVERSE-ENGINEERING MALWARE: MALWARE ANALYSIS TOOLS AND TECHNIQUES
ICS410: ICS/SCADA SECURITY ESSENTIALS
ICS456: ESSENTIALS FOR NERC CRITICAL INFRASTRUCTURE PROTECTION
ICS515: ICS VISIBILITY, DETECTION, AND RESPONSE
MGT414: SANS TRAINING PROGRAM FOR THE CISSP CERTIFICATION
MGT512: SANS SECURITY LEADERSHIP ESSENTIALS FOR MANAGERS WITH KNOWLEDGE COMPRESSION
MGT514: SECURITY STRATEGIC PLANNING, POLICY, AND LEADERSHIP
MGT525: MANAGING CYBERSECURITY INITIATIVES & EFFECTIVE COMMUNICATION
MGT551: BUILDING AND LEADING SECURITY OPERATIONS CENTERS
SEC275: FOUNDATIONS: COMPUTERS, TECHNOLOGY, & SECURITY
SEC301: INTRODUCTION TO CYBER SECURITY
SEC401: SECURITY ESSENTIALS - NETWORK, ENDPOINT, AND CLOUD
SEC450: BLUE TEAM FUNDAMENTALS: SECURITY OPERATIONS AND ANALYSIS
SEC460: ENTERPRISE AND CLOUD | THREAT AND VULNERABILITY ASSESSMENT
SEC488: CLOUD SECURITY ESSENTIALS
SEC497: PRACTICAL OPEN-SOURCE INTELLIGENCE (OSINT)
SEC501: ADVANCED SECURITY ESSENTIALS - ENTERPRISE DEFENDER
SEC503: NETWORK MONITORING AND THREAT DETECTION IN-DEPTH
SEC504: HACKER TOOLS, TECHNIQUES, AND INCIDENT HANDLING
SEC505: SECURING WINDOWS AND POWERSHELL AUTOMATION
SEC510: PUBLIC CLOUD SECURITY: AWS, AZURE, AND GCP
SEC511: CONTINUOUS MONITORING AND SECURITY OPERATIONS
SEC522: APPLICATION SECURITY: SECURING WEB APPLICATIONS, APIS, AND MICROSERVICES
SEC530: DEFENSIBLE SECURITY ARCHITECTURE AND ENGINEERING: IMPLEMENTING ZERO TRUST FOR THE HYBRID ENTERPRISE
SEC540: CLOUD SECURITY AND DEVSECOPS AUTOMATION
SEC541: CLOUD SECURITY ATTACKER TECHNIQUES, MONITORING, AND THREAT DETECTION
SEC542: WEB APP PENETRATION TESTING AND ETHICAL HACKING
SEC555: SIEM WITH TACTICAL ANALYTICS
SEC560: ENTERPRISE PENETRATION TESTING
SEC566: IMPLEMENTING AND AUDITING SECURITY FRAMEWORKS AND CONTROLS
SEC575: MOBILE DEVICE SECURITY AND ETHICAL HACKING
SEC588: CLOUD PENETRATION TESTING
SEC599: DEFEATING ADVANCED ADVERSARIES - PURPLE TEAM TACTICS & KILL CHAIN DEFENSES
SEC617: WIRELESS PENETRATION TESTING AND ETHICAL HACKING
SEC660: ADVANCED PENETRATION TESTING, EXPLOIT WRITING, AND ETHICAL HACKING
SPLUNK USING SPLUNK ENTERPRISE SECURITY
VMWARE VMWARE VSPHERE: OPTIMIZE AND SCALE [V6.5]
HORIZON: DESIGN AND DEPLOY [V6]
VMWARE NSX: INSTALL, CONFIGURE, MANAGE [V6.4]
VMWARE NSX: TROUBLESHOOTING AND OPERATIONS [V6.4]
VMWARE NSX-T: INSTALL, CONFIGURE, MANAGE [V2.2]
VMWARE NSX-T DATA CENTER: INSTALL, CONFIGURE, MANAGE [V2.4]
VMWARE NSX-T DATA CENTER: TROUBLESHOOTING AND OPERATIONS [V2.4]
VMWARE NSX-T DATA CENTER: DESIGN [V2.4]
ZSCALER ZIA INTRODUCTION
ZIA FUNDAMENTALS
MONITORING INTERNET ACCESS SECURITY
ANALYZING INTERNET ACCESS TRAFFIC PATTERNS
CHECKING ZSCALER CLIENT CONNECTOR
CHECKING USER INTERNET ACCESS
CHECKING ZIA NETWORK CONNECTIVITY
CHECKING ZIA USER AUTHENTICATION
ADJUSTING INTERNET ACCESS POLICIES
AUDITING SECURITY POLICY
INVESTIGATING SECURITY ISSUES
TROUBLESHOOTING ZIA
ZIA AUTHENTICATION (ADVANCED)
ZIA TRAFFIC FORWARDING (ADVANCED)
CLIENT CONNECTOR MANAGEMENT
CLIENT CONNECTOR: ZIA SPECIFIC CONFIGURATIONS
ZIA BANDWIDTH CONTROL
ZIA DNS SECURITY & OPTIMIZATION
ZIA NANOLOG STREAMING SERVICE (NSS)
SURVEY FOR THE ZIA PRO PATH
ZPA ARCHITECTURE
ZPA APP CONNECTORS (ADVANCED)
ZPA POLICY
ZPA FEATURES
ZPA AUTHENTICATION
INTUNE FOR IOS USING SCEP
SURVEY FOR THE ZPA PRO PATH