Pre-approved Training for CompTIA Security+ Continuing Education Units (CEUs)
Note: Training in this list is subject to change without prior notification. As CompTIA exams are updated so is this list. Training uploaded into a certification record by the candidate prior to the change will remain valid. Training earned that was listed previously and has not been uploaded into a certification record can no longer be used for CEUs.
Training approved in this document is based on the CompTIA Security+ - SY0-601 objectives.
CERTIFICATION PROVIDER | COURSE TITLE |
---|---|
AMAZON WEB SERVICES | ARCHITECTING ON AWS |
SECURITY ENGINEERING ON AWS | |
EXAM READINESS: AWS CERTIFIED SECURITY - SPECIALTY | |
AWS SECURITY ESSENTIALS | |
AWS SECURITY FUNDAMENTALS (SECOND EDITION) | |
AWS SECURITY HUB PRIMER | |
CLOUD AUDIT ACADEMY | |
DEEP DIVE WITH SECURITY: AWS IDENTITY AND ACCESS MANAGEMENT (IAM) | |
GETTING STARTED WITH AWS SECURITY, IDENTITY, AND COMPLIANCE | |
BROADCOM/SYMANTEC | ADMINISTRATION OF SYMANTEC VIP (MARCH 2017) |
ADMINISTRATION OF SYMANTEC IT MANAGEMENT SUITE 8.0 | |
ADMINISTRATION OF DATA LOSS PREVENTION 14.5 | |
ADMINISTRATION OF SYMANTEC CYBER SECURITY SERVICES (MAY 2016) | |
ADMINISTRATION OF SYMANTEC ADVANCED THREAT PROTECTION 2.0.2 | |
ADMINISTRATION OF SYMANTEC ENDPOINT PROTECTION 14 | |
ADMINISTRATION OF SYMANTEC DATA CENTER SECURITY - SERVER ADVANCED 6.7 | |
VALIDATION AND ID PROTECTION (VIP) SERVICE R1 | |
IT MANAGEMENT SUITE 8.0 FUNDAMENTALS | |
IT MANAGEMENT SUITE 8.0 MODULES | |
CLIENT MANAGEMENT SUITE 7.6 ADMINISTRATION | |
CLIENT MANAGEMENT SUITE 7.6 IMPLEMENTER | |
ASSET MANAGEMENT SUITE 7.5 ADMINISTRATION | |
DATA LOSS PREVENTION 14.5: ADMINISTRATION – MUST COMPLETE ALL MODULES FOR CEUS | |
DATA LOSS PREVENTION 14.5: DIFFERENCES | |
CSS ADMIN R1 – MUST COMPLETE ALL MODULES FOR CEUS | |
SYMANTEC DATA CENTER SECURITY – SERVER ADVANCED 6.7 ADMINISTRATION – MUST COMPLETE ALL MODULES FOR CEUS | |
ADVANCED THREAT PROTECTION 2.X: INCIDENT RESPONSE – MUST COMPLETE ALL MODULES FOR CEUS | |
SYMANTEC ENDPOINT PROTECTION 12.1.X ADMINISTRATION | |
SYMANTEC ENDPOINT PROTECTION 12.1 MAINTAIN AND TROUBLESHOOT | |
EMAIL SECURITY SERVICES AND WEB SECURITY SERVICE: ADMINISTRATION | |
ENDPOINT PROTECTION 14: CONFIGURE AND PROTECT | |
ENDPOINT PROTECTION 14: DIFFERENCES | |
ENDPOINT PROTECTION 14: MIGRATION AND UPGRADES | |
CHECK POINT | CHECK POINT CERTIFIED SECURITY ADMINISTRATOR (CCSA) R77.30 |
SECURITY ENGINEERING (CHECK POINT CERTIFIED SECURITY EXPERT (CCSE) R77.30) | |
THREAT PREVENTION | |
SECURE WEB GATEWAY | |
MDSM WITH VSX (MULTI-DOMAIN SECURITY MANAGEMENT WITH VIRTUAL SYSTEM EXTENSION) | |
CHECK POINT CERTIFIED SECURITY MASTER (CCSM) R77.30 | |
CHECK POINT CERTIFIED SECURITY ADMINISTRATOR (CCSA) R80 | |
CHECK POINT MANAGED SECURITY EXPERT (CCMSE) | |
CISCO | IMPLEMENTING CISCO SECURE ACCESS CONTROL SYSTEM V5.2 |
IMPLEMENTING CISCO IOS NETWORK SECURITY (IINS) 3.0 | |
IMPLEMENTING CISCO SECURE ACCESS SOLUTIONS (SISAS) 1.0 | |
IMPLEMENTING CISCO EDGE NETWORK SECURITY SOLUTIONS (SENSS) 1.0 | |
IMPLEMENTING CISCO SECURE MOBILITY SOLUTIONS (SIMOS) 1.0 | |
SECURING CISCO NETWORKS WITH THREAT DETECTION AND ANALYSIS (SCYBER) 1 | |
UNDERSTANDING CISCO CYBERSECURITY FUNDAMENTALS (SECFND) | |
IMPLEMENTING CISCO CYBERSECURITY OPERATIONS (SECOPS) | |
IMPLEMENTING CISCO THREAT CONTROL SOLUTIONS (SITCS) 1.5 | |
IMPLEMENTING AUTOMATION FOR CISCO SECURITY SOLUTIONS (SAUI) | |
IMPLEMENTING AND OPERATING CISCO SECURITY CORE TECHNOLOGIES (SCOR) | |
SECURING NETWORKS WITH CISCO FIREPOWER NEXT GENERATION FIREWALL (SSNGFW) | |
SECURING NETWORKS WITH CISCO FIREPOWER NEXT-GENERATION IPS (SSFIPS) | |
IMPLEMENTING AND CONFIGURING CISCO IDENTITY SERVICES ENGINE (SISE) | |
SECURING EMAIL WITH CISCO EMAIL SECURITY APPLIANCE (SESA) | |
SECURING THE WEB WITH CISCO WEB SECURITY APPLIANCE (SWSA) | |
IMPLEMENTING SECURE SOLUTIONS WITH VIRTUAL PRIVATE NETWORKS (SVPN) | |
CompTIA | COMPTIA ADVANCED SECURITY PRACTITIONER (CASP+) (CAS-004) |
COMPTIA SECURITY+ SY0-601 – APPROVED ONLY FOR THOSE CERTIFIED IN SY0-501 AND EARLIER | |
COMPTIA CYBERSECURITY ANALYST (CySA+) (CS0-002) | |
COMPTIA PENTEST+ (PT0-002) | |
COMPTIA CERTMASTER LEARN FOR SECURITY+ SY0-601- 40 CEUS APPROVED ONLY FOR THOSE CERTIFIED IN SY0-501 AND EARLIER | |
COMPTIA CERTMASTER PRACTICE FOR SECURITY+ SY0-601 - 10 CEUS APPROVED ONLY FOR THOSE CERTIFIED IN SY0-501 AND EARLIER | |
COMPTIA CERTMASTER LEARN FOR PENTEST+ PT0-002 - 25 CEUS | |
COMPTIA CERTMASTER PRACTICE FOR PENTEST+ PT0-002 - 10 CEUS | |
COMPTIA CERTMASTER LEARN FOR CYSA+ CS0-002 - 25 CEUS | |
COMPTIA CERTMASTER PRACTICE FOR CYSA+ CS0-002 - 10 CEUS | |
CERTMASTER LABS FOR CASP+ (EXAM CAS-004) - 40 CEUs | |
CWNP | CWSP – CERTIFIED WIRELESS SECURITY PROFESSIONAL |
EC-COUNCIL | CERTIFIED ETHICAL HACKER (CEH) V11 |
CERTIFIED SECURITY ANALYST (ECSA) V10 | |
DISASTER RECOVERY PROFESSIONAL (EDRP) | |
LICENSED PENETRATION TESTER (LPT) | |
COMPUTER HACKING FORENSICS INVESTIGATOR (CHFI) | |
CERTIFIED CHIEF INFORMATION SECURITY OFFICER (CCISO) | |
CERTIFIED SECURITY SPECIALIST (ECSS) | |
CERTIFIED INCIDENT HANDLER (ECIH) | |
CERTIFIED ENCRYPTION SPECIALIST (ECES) | |
CERTIFIED NETWORK DEFENDER (CND) | |
CERTIFIED NETWORK DEFENSE ARCHITECT (CNDA) | |
EC-COUNCIL INFORMATION SECURITY MANAGEMENT (EISM) | |
CAST 611V3 ADVANCED PENETRATION TESTING | |
CAST 616 SECURING WINDOWS INFRASTRUCTURE | |
ADVANCED MOBILE FORENSICS AND SECURITY (CAST 612) | |
CAST 613 HACKING AND HARDENING CORPORATE WEB APP/WEB SITE | |
CAST 614 ADVANCED NETWORK DEFENSE | |
ENCASE | IR250 - INCIDENT INVESTIGATION |
DFIR370 - HOST INTRUSION METHODOLOGY AND INVESTIGATION | |
ED290 ENCASE EDISCOVERY | |
DF120 - FOUNDATIONS IN DIGITAL FORENSICS WITH ENCASE | |
DF125 - MOBILE DEVICE EXAMINATIONS WITH ENCASE | |
DF210 - BUILDING AN INVESTIGATION WITH ENCASE | |
DF310 - ENCASE ENCE PREP COURSE | |
DF320 - ADVANCED ANALYSIS OF WINDOWS ARTIFACTS WITH ENCASE | |
DF410 - NTFS EXAMINATIONS WITH ENCASE | |
IR280 ENCASE ENDPOINT SECURITY | |
DFIR130 ENCASE ENDPOINT INVESTIGATOR TRAINING | |
DFIR350 INTERNET-BASED INVESTIGATIONS WITH ENCASE | |
HPE | HPE ArcSight Master ASE Preparation Course |
ArcSight ESM 6.5 Advanced Administrator | |
ArcSight ESM 6.5 Advanced Analyst | |
ArcSight Logger - 6.0 Administration and Operations | |
Dynamic Application Testing with HP WebInspect 10.3 | |
HP Fortify Static Code Analyzer / Software Security Center 4.2 | |
ISACA | COBIT 5 ASSESSOR FOR SECURITY |
CRISC EXAM REVIEW | |
CYBERSECURITY FUNDAMENTALS | |
CSX PRACTITIONER: IDENTIFICATION AND PROTECTION | |
CSX PRACTITIONER: RESPOND AND RECOVER | |
CSX PRACTITIONER BOOT CAMP | |
CSX PRACTITIONER: DETECTION | |
CISM EXAM REVIEW | |
CISA EXAM REVIEW | |
ISC(2) | (ISC)2 TRAINING FOR CAP |
(ISC)2 TRAINING FOR CCFP | |
(ISC)2 TRAINING FOR CCSP | |
(ISC)2 TRAINING FOR CISSP | |
(ISC)2 TRAINING FOR HCISPP | |
(ISC)2 TRAINING FOR CISSP-ISSAP | |
(ISC)2 TRAINING FOR CISSP-ISSEP | |
(ISC)2 TRAINING FOR CISSP-ISSMP | |
(ISC)2 TRAINING FOR SSCP | |
JUNIPER | ADVANCED JUNOS SECURITY (AJSEC) |
ATTACK PREVENTION WITH JUNIPER NETWORKS FIREWALLS (APJF) | |
CONFIGURING JUNIPER NETWORKS FIREWALL/IPSEC VPN PRODUCTS (CJFV) | |
INTEGRATING JUNIPER NETWORKS FIREWALL/IPSEC VPN PRODUCTS INTO HIGH-PERFORMANCE NETWORKS (IFVH) | |
JNCIE SECURITY BOOTCAMP (JNCIE-SEC) | |
JUNOS SECURITY (JSEC) | |
JUNOS SPACE-SECURITY DIRECTOR (JS-SD) | |
JUNIPER NETWORKS DESIGN-SECURITY (JND-SEC) | |
IMPLEMENTING JUNIPER NETWORKS SECURE ANALYTICS (IJSA) | |
CONFIGURING STEEL-BELTED RADIUS CARRIER (CSBR) | |
LINUX | Linux Kernel Debugging and Security |
Linux Security Fundamentals | |
Penetration Testing with Linux Tools | |
MICROSOFT | SECURING WINDOWS SERVER 2016 |
OFFENSIVE SECURITY | PENETRATION TESTING WITH KALI LINUX |
ADVANCED WINDOWS EXPLOITATION | |
OFFENSIVE SECURITY WIRELESS ATTACKS (WIFU) | |
CRACKING THE PERIMETER (CTP) | |
ADVANCED WEB ATTACKS AND EXPLOITATION | |
METASPLOIT UNLEASHED | |
OFFENSIVE SECURITY PENETRATION TESTING LAB | |
PALO ALTO | FIREWALL ESSENTIALS 8.0: CONFIGURATION AND MANAGEMENT (EDU-210) |
PANORAMA 8.0: MANAGE MULTIPLE FIREWALLS (EDU-221) | |
FIREWALL 8.0: DEBUG AND TROUBLESHOOT (EDU-311) | |
FIREWALL 7.1: INSTALL, CONFIGURE, AND MANAGE (EDU-201) | |
FIREWALL 7.1: CONFIGURE EXTENDED FEATURES (EDU-205) | |
PANORAMA 7.1: MANAGE MULTIPLE FIREWALLS (EDU-221) | |
FIREWALL 7.1: MANAGE CYBERTHREATS (EDU-231) | |
FIREWALL 7.1: DEBUG AND TROUBLESHOOT (EDU-311) | |
TRAPS 3.4: DEPLOY AND OPTIMIZE (EDU-285) | |
TRAPS 3.4: INSTALL, CONFIGURE AND MANAGE (EDU-281) | |
FIREWALL ESSENTIALS 8.0: CONFIGURATION AND MANAGEMENT (EDU-110) | |
RED HAT | RED HAT SERVER HARDENING (RH413) |
RED HAT SYSTEM ADMINISTRATION I (RH124) | |
RED HAT SYSTEM ADMINISTRATION II (RH134) | |
RHCSA RAPID TRACK COURSE (RH199) | |
RED HAT SYSTEM ADMINISTRATION III (RH254) | |
RHCE CERTIFICATION LAB | |
RED HAT SECURITY: Linux in Physical, Virtual, and Cloud (RH415) | |
SABSA | SABSA FOUNDATION MODULES (F1 & F2) |
MODULE A1 – ADVANCED SABSA RISK ASSURANCE & GOVERNANCE | |
MODULE A3 – ADVANCED SABSA ARCHITECTURE & DESIGN | |
SANS | NETWARS - CORE TOURNAMENT |
NETWARS: CONTINUOUS | |
AUD566: IMPLEMENTING AND AUDITING THE CRITICAL SECURITY CONTROLS - IN-DEPTH | |
AUD507: AUDITING & MONITORING NETWORKS, PERIMETERS & SYSTEMS | |
AUD440: CRITICAL SECURITY CONTROLS: PLANNING, IMPLEMENTING AND AUDITING | |
AUD480: TOP 4 MITIGATION STRATEGIES: IMPLEMENTING & AUDITING | |
FOR408: WINDOWS FORENSIC ANALYSIS | |
FOR508: ADVANCED DIGITAL FORENSICS, INCIDENT RESPONSE, AND THREAT HUNTING | |
FOR518: MAC FORENSIC ANALYSIS | |
FOR526: MEMORY FORENSICS IN-DEPTH | |
FOR572: ADVANCED NETWORK FORENSICS AND ANALYSIS | |
FOR578: CYBER THREAT INTELLIGENCE | |
FOR585: ADVANCED SMARTPHONE FORENSICS | |
FOR610: REVERSE-ENGINEERING MALWARE: MALWARE ANALYSIS TOOLS AND TECHNIQUES | |
MGT414: SANS +S TRAINING PROGRAM FOR THE CISSP® CERTIFICATION EXAM | |
MGT415: A PRACTICAL INTRODUCTION TO RISK ASSESSMENT | |
MGT433: SECURING THE HUMAN: HOW TO BUILD, MAINTAIN AND MEASURE A HIGH-IMPACT AWARENESS PROGRAM | |
MGT512: SANS SECURITY LEADERSHIP ESSENTIALS FOR MANAGERS WITH KNOWLEDGE COMPRESSION | |
MGT514: IT SECURITY STRATEGIC PLANNING, POLICY AND LEADERSHIP | |
MGT535: INCIDENT RESPONSE TEAM MANAGEMENT | |
LEG523: LAW OF DATA SECURITY AND INVESTIGATIONS | |
SEC301: INTRO TO INFORMATION SECURITY | |
SEC401: SECURITY ESSENTIALS BOOTCAMP STYLE | |
SEC440: CRITICAL SECURITY CONTROLS: PLANNING, IMPLEMENTING AND AUDITING | |
SEC480: TOP 4 MITIGATION STRATEGIES: IMPLEMENTING & AUDITING | |
SEC501: ADVANCED SECURITY ESSENTIALS - ENTERPRISE DEFENDER | |
SEC502: PERIMETER PROTECTION IN-DEPTH | |
SEC503: INTRUSION DETECTION IN-DEPTH | |
SEC504: HACKER TOOLS, TECHNIQUES, EXPLOITS AND INCIDENT HANDLING | |
SEC511: CONTINUOUS MONITORING AND SECURITY OPERATIONS | |
SEC505: SECURING WINDOWS WITH THE CRITICAL SECURITY CONTROLS | |
SEC524: CLOUD SECURITY FUNDAMENTALS | |
SEC542: WEB APP PENETRATION TESTING AND ETHICAL HACKING | |
SEC546: IPV6 ESSENTIALS | |
SEC550: ACTIVE DEFENSE, OFFENSIVE COUNTERMEASURES AND CYBER DECEPTION | |
SEC560: NETWORK PENETRATION TESTING AND ETHICAL HACKING | |
SEC561: INTENSE HANDS-ON PEN TESTING SKILL DEVELOPMENT (WITH SANS NETWARS) | |
SEC562: CYBERCITY HANDS-ON KINETIC CYBER RANGE EXERCISE | |
SEC566: IMPLEMENTING AND AUDITING THE CRITICAL SECURITY CONTROLS - IN-DEPTH | |
SEC567: SOCIAL ENGINEERING FOR PENETRATION TESTERS | |
SEC575: MOBILE DEVICE SECURITY AND ETHICAL HACKING | |
SEC579: VIRTUALIZATION AND PRIVATE CLOUD SECURITY | |
SEC580: METASPLOIT KUNG FU FOR ENTERPRISE PEN TESTING | |
SEC617: WIRELESS ETHICAL HACKING, PENETRATION TESTING, AND DEFENSES | |
SEC642: ADVANCED WEB APP PENETRATION TESTING AND ETHICAL HACKING | |
SEC660: ADVANCED PENETRATION TESTING, EXPLOIT WRITING, AND ETHICAL HACKING | |
SEC760: ADVANCED EXPLOIT DEVELOPMENT FOR PENETRATION TESTERS | |
MGT535: INCIDENT RESPONSE TEAM MANAGEMENT | |
MGT405: CRITICAL INFRASTRUCTURE PROTECTION | |
ICS515: ICS ACTIVE DEFENSE AND INCIDENT RESPONSE | |
ICS456: ESSENTIALS FOR NERC CRITICAL INFRASTRUCTURE PROTECTION | |
ICS410: ICS/SCADA SECURITY ESSENTIALS | |
SEC599: Defeating Advanced Adversaries - Purple Team Tactics & Kill Chain Defenses | |
SPLUNK | USING SPLUNK ENTERPRISE SECURITY |
If you have questions about specific stages of the certification renewal process, head over to our Help pages to find additional information, or contact our customer service team.