CompTIA PenTest+

Pre-approved Training for CompTIA Pentest+ Continuing Education Units (CEUs)

Note: Training in this list is subject to change without prior notification. As CompTIA exams are updated so is this list. Training uploaded into a certification record by the candidate prior to the change will remain valid. Training earned that was listed previously and has not been uploaded into a certification record can no longer be used for CEUs.

 

CERTIFICATION PROVIDER COURSE TITLE
CHECK POINT CHECK POINT MANAGED SECURITY EXPERT (CCMSE)
SECURITY MASTER - R80
CISCO IMPLEMENTING CISCO SECURE ACCESS SOLUTIONS (SISAS)
IMPLEMENTING CISCO EDGE NETWORK SECURITY SOLUTIONS (SENSS)
IMPLEMENTING CISCO SECURE MOBILITY SOLUTIONS (SIMOS)
IMPLEMENTING CISCO THREAT CONTROL SOLUTIONS (SITCS)
IMPLEMENTING CISCO NETWORK SECURITY (IINS)
IMPLEMENTING AUTOMATION FOR CISCO SECURITY SOLUTIONS (SAUI)
IMPLEMENTING AND OPERATING CISCO SECURITY CORE TECHNOLOGIES (SCOR)
SECURING NETWORKS WITH CISCO FIREPOWER NEXT GENERATION FIREWALL (SSNGFW)
SECURING NETWORKS WITH CISCO FIREPOWER NEXT-GENERATION IPS (SSFIPS)
IMPLEMENTING AND CONFIGURING CISCO IDENTITY SERVICES ENGINE (SISE)
SECURING EMAIL WITH CISCO EMAIL SECURITY APPLIANCE (SESA)
SECURING THE WEB WITH CISCO WEB SECURITY APPLIANCE (SWSA)
IMPLEMENTING SECURE SOLUTIONS WITH VIRTUAL PRIVATE NETWORKS (SVPN)
CLOUD SECURITY ALLIANCE CCSK FOUNDATION
COMPTIA COMPTIA ADVANCED SECURITY PRACTITIONER (CASP+) (CAS-003)
COMPTIA CYBERSECURITY ANALYST (CySA+) (CS0-002)
CWNP  CWSP - CERTIFIED WIRELESS SECURITY PROFESSIONAL 
EC-Council CERTIFIED INCIDENT HANDLER (ECIH)
CERTIFIED SECURITY ANALYST (ECSA) V9
DISASTER RECOVERY PROFESSIONAL (EDRP)
COMPUTER HACKING FORENSICS INVESTIGATOR (CHFI)
CERTIFIED CHIEF INFORMATION SECURITY OFFICER (CCISO)
CERTIFIED SECURITY SPECIALIST (ECSS)
CERTIFIED ENCRYPTION SPECIALIST (ECES)
ADVANCED PENETRATION TESTING (APT)
CYBER THREAT INTELLIGENCE ANALYST (CTIA)
ISACA CRISC EXAM REVIEW
CGEIT EXAM REVIEW
CISM EXAM REVIEW
CISA EXAM REVIEW
ISC(2) (ISC)2 TRAINING FOR CAP
(ISC)2 TRAINING FOR CCSP
(ISC)2 TRAINING FOR CISSP
(ISC)2 TRAINING FOR HCISPP
(ISC)2 TRAINING FOR CISSP-ISSAP
(ISC)2 TRAINING FOR CISSP-ISSEP
(ISC)2 TRAINING FOR CISSP-ISSMP
(ISC)2 TRAINING FOR SSCP
MCAFEE  MCAFEE ENDPOINT SECURITY 10.X ADMINISTRATION
MCAFEE ENDPOINT SECURITY UPGRADE
MCAFEE ADVANCED THREAT DETECTION ADMINISTRATION 
MCAFEE VIRUSSCAN AND EPOLICY ORCHESTRATOR ADMINISTRATION 
MCAFEE NETWORK SECURITY PLATFORM ADMINISTRATION 
MCAFEE HOST INTRUSION PREVENTION SYSTEM ADMINISTRATION 
MCAFEE DATA LOSS PREVENTION ENDPOINT ADMINISTRATION 
SECURITY INFORMATION AND EVENT MANAGEMENT (SIEM) ADMINISTRATION 
MCAFEE EPOLICY ORCHESTRATOR ADMINISTRATION (5.10)
MCAFEE EPOLICY ORCHESTRATOR 5.10 ESSENTIALS
MCAFEE ENTERPRISE SECURITY MANAGER FOR ANALYSTS-I
MCAFEE ENTERPRISE SECURITY MANAGER FOR ENGINEERS-I
OFFENSIVE SECURITY  PENETRATION TESTING WITH KALI LINUX 
ADVANCED WINDOWS EXPLOITATION 
OFFENSIVE SECURITY WIRELESS ATTACKS (WIFU) 
CRACKING THE PERIMETER (CTP) 
ADVANCED WEB ATTACKS AND EXPLOITATION 
PALO ALTO  FIREWALL 9.0 ESSENTIALS: CONFIGURATION AND MANAGEMENT (EDU-210)
PANORAMA 8.1: MANAGING FIREWALLS AT SCALE (EDU-220)
SABSA  A1 – ADVANCED SABSA RISK, ASSURANCE & GOVERNANCE
A3 – SABSA A3 – ARCHITECTURE DESIGN DEVELOPMENT
A2 – ADVANCED SABSA ARCHITECTURE PROGRAM MANAGEMENT
A3 – ADVANCED SABSA ARCHITECTURE DESIGN
A4 – ADVANCED SABSA INCIDENT, MONITORING & INVESTIGATIONS ARCHITECTURE
A5 – ADVANCED SABSA BUSINESS CONTINUITY AND CRISIS MANAGEMENT
SANS  AUD507: AUDITING & MONITORING NETWORKS, PERIMETERS & SYSTEMS 
FOR508: ADVANCED DIGITAL FORENSICS, INCIDENT RESPONSE, AND THREAT HUNTING 
FOR578: CYBER THREAT INTELLIGENCE 
FOR572: ADVANCED NETWORK FORENSICS AND ANALYSIS 
FOR585: ADVANCED SMARTPHONE FORENSICS 
FOR610: REVERSE-ENGINEERING MALWARE: MALWARE ANALYSIS TOOLS AND TECHNIQUES 
ICS456: ESSENTIALS FOR NERC CRITICAL INFRASTRUCTURE PROTECTION 
MGT414: SANS TRAINING PROGRAM FOR THE CISSP® CERTIFICATION EXAM 
MGT512: SANS SECURITY LEADERSHIP ESSENTIALS FOR MANAGERS WITH KNOWLEDGE COMPRESSION 
MGT514: IT SECURITY STRATEGIC PLANNING, POLICY AND LEADERSHIP 
SEC440: CRITICAL SECURITY CONTROLS: PLANNING, IMPLEMENTING AND AUDITING 
SEC504: HACKER TOOLS, TECHNIQUES, EXPLOITS AND INCIDENT HANDLING 
SEC542: WEB APP PENETRATION TESTING AND ETHICAL HACKING 
SEC550: ACTIVE DEFENSE, OFFENSIVE COUNTERMEASURES AND CYBER DECEPTION 
SEC560: NETWORK PENETRATION TESTING AND ETHICAL HACKING 
SEC561: INTENSE HANDS-ON PEN TESTING SKILL DEVELOPMENT (WITH SANS NETWARS) 
SEC562: CYBERCITY HANDS-ON KINETIC CYBER RANGE EXERCISE 
SEC575: MOBILE DEVICE SECURITY AND ETHICAL HACKING 
SEC580: METASPLOIT KUNG FU FOR ENTERPRISE PEN TESTING 
SEC617: WIRELESS ETHICAL HACKING, PENETRATION TESTING, AND DEFENSES 
SEC642: ADVANCED WEB APP PENETRATION TESTING AND ETHICAL HACKING 
SEC660: ADVANCED PENETRATION TESTING, EXPLOIT WRITING, AND ETHICAL HACKING 
SEC760: ADVANCED EXPLOIT DEVELOPMENT FOR PENETRATION TESTERS 
FOR500: WINDOWS FORENSIC ANALYSIS
SEC530: DEFENSIBLE SECURITY ARCHITECTURE
SEC555: SIEM WITH TACTICAL ANALYTICS
SEC599: DEFEATING ADVANCED ADVERSARIES - PURPLE TEAM TACTICS & KILL CHAIN DEFENSES
SPLUNK USING SPLUNK ENTERPRISE SECURITY