Skip to main content

A+ Educational Units

Pre-approved training for CompTIA A+ Continuing Education Units (CEUs)

Note: Training in this list is subject to change without prior notification. As CompTIA exams are updated, so is this list. Training uploaded into a certification record by the candidate prior to the change will remain valid. Training earned that was listed previously and has not been uploaded into a certification record can no longer be used for CEUs.

Training approved in this document is based on the CompTIA A+ - 1101/1102 objectives.

Certification provider Course title

AMAZON

DEVOPS ENGINEERING ON AWS

DEVELOPING ON AWS

ARCHITECTING ON AWS

ADVANCED ARCHITECTING ON AWS

EXAM READINESS WORKSHOP: AWS CERTIFIED SOLUTIONS ARCHITECT - PROFESSIONAL

EXAM READINESS WORKSHOP: AWS CERTIFIED SOLUTIONS ARCHITECT - ASSOCIATE

AWS WELL-ARCHITECTED TRAINING
 
EXAM READINESS: AWS CERTIFIED DEVELOPER – ASSOCIATE

AWS CLOUD PRACTITIONER ESSENTIALS (SECOND EDITION)

AWS TECHNICAL ESSENTIALS

EXAM READINESS: AWS CERTIFIED ADVANCED NETWORKING - SPECIALTY

DATA ANALYTICS FUNDAMENTALS

BIG DATA ON AWS

SECURITY ENGINEERING ON AWS

EXAM READINESS: AWS CERTIFIED DEVOPS ENGINEER – PROFESSIONAL

EXAM READINESS: AWS CERTIFIED SYSOPS ADMINISTRATOR - ASSOCIATE

SYSTEMS OPERATIONS ON AWS

EXAM READINESS: AWS CERTIFIED SECURITY - SPECIALTY

ADVANCED DEVELOPING ON AWS

ADVANCED TESTING PRACTICES USING AWS DEVOPS TOOLS

ALEXA FOR DEVELOPERS

AMAZON API GATEWAY FOR SERVERLESS APPLICATIONS

AMAZON CONNECT: BUILD A CUSTOM CALL CONTROL PANEL

AMAZON ELASTIC KUBERNETES SERVICE (EKS) PRIMER

AMAZON FSX FOR LUSTRE PRIMER

AMAZON FSX FOR WINDOWS FILE SERVER PRIMER

AMAZON LUMBERYARD PRIMER

AMAZON WORKSPACES PRIMER

APPLICATION DEVELOPMENT USING AWS DYNAMODB

AWS CLOUD DEVELOPMENT KIT (CDK) PRIMER

AWS DATABASE OFFERINGS

AWS ELEMENTAL CONDUCTOR

AWS FOUNDATIONS: GETTING STARTED WITH THE

AWS CLOUD ESSENTIALS

AWS HADOOP FUNDAMENTALS

AWS LAMBDA FOUNDATIONS

AWS SAAS FACTORY ARCHITECTURE TRACK: SAAS MIGRATION STRATEGIES

AWS SECURITY ESSENTIALS

AWS SECURITY FUNDAMENTALS (SECOND EDITION)

AWS SECURITY FUNDAMENTALS

AWS SECURITY HUB PRIMER

AWS SNOWBALL EDGE LOGISTICS AND PLANNING

AWS STORAGE GATEWAY PRIMER: FILE GATEWAY

AWS SYSTEMS MANAGER

BREAK FREE OF LEGACY DATABASES

CLOUD AUDIT ACADEMY

CONFIGURE AND DEPLOY AWS PRIVATELINK

DATA WAREHOUSING ON AWS

DEEP DIVE INTO AMAZON ELASTIC BLOCK STORE (EBS)

DEEP DIVE WITH SECURITY: AWS IDENTITY AND ACCESS MANAGEMENT (IAM)

DEPLOYING AND SCALING APPLICATIONS WITH AMAZON LIGHTSAIL

DIVE DEEP INTO AMAZON CONNECT REPORTING AND METRICS

GAME SERVER HOSTING WITH AMAZON EC2

GETTING STARTED WITH AMAZON SIMPLE STORAGE SERVICE (AMAZON S3)

GETTING STARTED WITH AWS SECURITY, IDENTITY, AND COMPLIANCE

GETTING STARTED WITH DEVOPS ON AWS

INTERNET OF THINGS (IOT) MICROCONTROLLERS SERIES

INTRODUCTION TO BLOCKCHAIN

IOT EDGE COMPUTING: AWS IOT GREENGRASS PRIMER
MANAGING AMAZON SIMPLE STORAGE SERVICE (AMAZON S3)

MOBILE DEVELOPMENT IN IOT

PLANNING AN AWS OUTPOSTS IMPLEMENTATION

POSTGRESQL FUNDAMENTALS: ARCHITECTURE

SOME REALLY GOOD PRACTICES FOR IOT OPERATIONS

SPEAKING OF: MACHINE TRANSLATION AND NATURAL LANGUAGE PROCESSING (NLP)

TRANSIT GATEWAY NETWORKING AND SCALING
VISUALIZING WITH QUICKSIGHT

EXAM READINESS: AWS CERTIFIED DATA ANALYTICS – SPECIALTY

ARCITURA CLOUD SCHOOL

FUNDAMENTAL CLOUD ARCHITECTURE

ADVANCED CLOUD ARCHITECTURE

FUNDAMENTAL CLOUD SECURITY

ADVANCED CLOUD SECURITY

FUNDAMENTAL CLOUD STORAGE

ADVANCED CLOUD STORAGE

FUNDAMENTAL CLOUD VIRTUALIZATION

ADVANCED CLOUD VIRTUALIZATION

FUNDAMENTAL CLOUD CAPACITY

ADVANCED CLOUD CAPACITY

FUNDAMENTAL CLOUD COMPUTING

CLOUD TECHNOLOGY CONCEPTS

BROADCOM/SYMANTEC

SYMANTEC DATA CENTER SECURITY – SERVER ADVANCED 6.7 ADMINISTRATION – MUST COMPLETE ALL MODULES FOR CEUS

ENDPOINT PROTECTION 14: CONFIGURE AND PROTECT

SYMANTEC ENDPOINT PROTECTION 14: PLAN AND IMPLEMENT

SYMANTEC ENDPOINT PROTECTION 14: MANAGE AND ADMINISTER

SYMANTEC ENDPOINT PROTECTION 14: MAINTAIN AND TROUBLESHOOT

SYMANTEC DATA LOSS PREVENTION 15.0 ADMINISTRATION

SYMANTEC DATA LOSS PREVENTION 15.0 INSTALL AND DEPLOY

SYMANTEC DATA LOSS PREVENTION 15.0 DIFFERENCES

SYMANTEC IDENTITY AND AUTHENTICATION SERVICES R1
PACKETSHAPER 11.9.1 ADMINISTRATION

SYMANTEC PROXYSG 6.6 BASIC ADMINISTRATION

SYMANTEC PROXYSG 6.6 ADVANCED ADMINISTRATION

SYMANTEC SECURITY ANALYTICS 7.2: ADMINISTRATOR

SYMANTEC SECURITY ANALYTICS 7.2: PROFESSIONAL

SSL VISIBILITY 5.0 ADMINISTRATION

CLOUDSOC ADMINISTRATION R2

CLOUDSOC DIFFERENCES R2.1.1

SYMANTEC ADVANCED THREAT PROTECTION 3.0: INCIDENT RESPONSE

SYMANTEC MESSAGING GATEWAY 10.6 ADMINISTRATION

SYMANTEC CONTROL COMPLIANCE SUITE (CCS) 11.0: ADMINISTRATION

EMAIL SECURITY.CLOUD ADMINISTRATION R1

CHECK POINT

CHECK POINT CYBER SECURITY ADMINISTRATOR (CCSA)

CHECK POINT CYBER SECURITY ENGINEERING (CCSE)

CHECK POINT CERTIFIED SECURITY MASTER (CCSM)

CHECK POINT CERTIFIED CLOUD SPECIALIST (CCCS)

CISCO

SUPPORTING CISCO DATA CENTER SYSTEM DEVICES (DCTECH)

TROUBLESHOOTING CISCO DATA CENTER INFRASTRUCTURE (DCIT)

DEVELOPING APPLICATIONS AND AUTOMATING WORKFLOWS USING CISCO PLATFORMS (DEVASC)

IMPLEMENTING AND ADMINISTERING CISCO SOLUTIONS (CCNA)

IMPLEMENTING AUTOMATION FOR CISCO ENTERPRISE SOLUTIONS (ENAUI)

IMPLEMENTING AUTOMATION FOR CISCO DATA CENTER SOLUTIONS (DCAUI)

IMPLEMENTING AUTOMATION FOR CISCO SERVICE PROVIDER SOLUTIONS (SPAUI)

IMPLEMENTING AUTOMATION FOR CISCO SECURITY SOLUTIONS (SAUI)

IMPLEMENTING DEVOPS SOLUTIONS AND PRACTICES USING CISCO PLATFORMS (DEVOPS)

DEVELOPING SOLUTIONS USING CISCO IOT AND EDGE PLATFORMS (DEVIOT)

IMPLEMENTING AND OPERATING CISCO ENTERPRISE NETWORK CORE TECHNOLOGIES (ENCOR)

IMPLEMENTING CISCO ENTERPRISE ADVANCED ROUTING AND SERVICES (ENARSI)

DESIGNING CISCO ENTERPRISE NETWORKS (ENSLD)

IMPLEMENTING CISCO ENTERPRISE WIRELESS NETWORKS (ENWLSI)

IMPLEMENTING CISCO COLLABORATION CLOUD AND EDGE SOLUTIONS (CLCEI)

IMPLEMENTING AND OPERATING CISCO DATA CENTER CORE TECHNOLOGIES (DCCOR)

DESIGNING CISCO DATA CENTER INFRASTRUCTURE (DCID)

IMPLEMENTING CISCO APPLICATION CENTRIC INFRASTRUCTURE (DCACI)

CONFIGURING CISCO MDS 9000 SERIES SWITCHES (DCMDS)

IMPLEMENTING AND OPERATING CISCO SECURITY CORE TECHNOLOGIES (SCOR)

SECURING NETWORKS WITH CISCO

FIREPOWER NEXT GENERATION FIREWALL (SSNGFW)

SECURING NETWORKS WITH CISCO FIREPOWER NEXT-GENERATION IPS (SSFIPS)

IMPLEMENTING AND CONFIGURING CISCO IDENTITY SERVICES ENGINE (SISE)

SECURING EMAIL WITH CISCO EMAIL SECURITY APPLIANCE (SESA)

SECURING THE WEB WITH CISCO WEB

SECURITY APPLIANCE (SWSA)

IMPLEMENTING SECURE SOLUTIONS WITH VIRTUAL PRIVATE NETWORKS (SVPN)

IMPLEMENTING AND OPERATING CISCO SERVICE PROVIDER NETWORK CORE TECHNOLOGIES (SPCOR)

IMPLEMENTING CISCO SERVICE PROVIDER ADVANCED ROUTING SOLUTIONS (SPRI)

IMPLEMENTING CISCO SERVICE PROVIDER VPN SERVICES (SPVI)

SUPPORTING CISCO ROUTING AND SWITCHING NETWORK DEVICES

AUTOMATING AND PROGRAMMING CISCO COLLABORATION SOLUTIONS (CLAUTO)

DEVELOPING APPLICATIONS USING CISCO CORE PLATFORMS AND APIS (DEVCOR)

CITRIX

CXM-302 DESIGN, DEPLOY AND MANAGE ENTERPRISE MOBILITY WITH XENMOBILE 9.0

CXD-210: CITRIX XENAPP AND XENDESKTOP ADMINISTRATION

CXD-310: CITRIX XENAPP AND XENDESKTOP ADVANCED ADMINISTRATION

CXD-400 DESIGNING APP AND DESKTOP SOLUTIONS WITH CITRIX XENAPP AND XENDESKTOP

CNS-220: CITRIX NETSCALER ESSENTIALS AND TRAFFIC MANAGEMENT

CNS-222: CITRIX NETSCALER ESSENTIALS AND UNIFIED GATEWAY

CNS-219: CITRIX NETSCALER TRAFFIC MANAGEMENT

CNS-221: CITRIX NETSCALER UNIFIED GATEWAY
NETSCALER SD-WAN

CNS-320: CITRIX NETSCALER ADVANCED TOPICS – SECURITY, MANAGEMENT, AND OPTIMIZATION

CXM-303 DEPLOYING ENTERPRISE MOBILITY SOLUTIONS WITH CITRIX XENMOBILE

CLOUD SECURITY ALLIANCE

CERTIFICATE OF CLOUD SECURITY KNOWLEDGE (CCSK)

CERTIFICATE OF CLOUD AUDITING KNOWLEDGE (CCAK)

COMPTIA

COMPTIA ADVANCED SECURITY PRACTITIONER (CASP+) (CAS-004)

COMPTIA NETWORK+ (N10-008)

COMPTIA SECURITY+ (SY0-701)

COMPTIA A+ 1101/1102 – APPROVED ONLY FOR THOSE CERTIFIED IN A+ 1001/1002 AND EARLIER EXAM SERIES

COMPTIA SERVER+ (SK0-005)

COMPTIA LINUX+ (XK0-005)

COMPTIA CYBERSECURITY ANALYST (CySA+) (CS0-003)

COMPTIA CLOUD+ (CV0-003)

COMPTIA PENTEST+ (PT0-002)

COMPTIA CERTMASTER LEARN FOR A+ 1101/1102 - 20 CEUS – APPROVED ONLY FOR THOSE CERTIFIED IN A+ 1001/1002 AND EARLIER EXAM SERIES

COMPTIA CERTMASTER PRACTICE FOR A+ 1101/1102 - 10 CEUS – APPROVED ONLY FOR THOSE CERTIFIED IN A+ 1001/1002 AND EARLIER EXAM SERIES

COMPTIA CERTMASTER LEARN FOR NETWORK+ N10-008 - 30 CEUS

COMPTIA CERTMASTER PRACTICE FOR NETWORK+ N10-008 - 10 CEUS

COMPTIA CERTMASTER LEARN FOR SECURITY+ SY0-701- 40 CEUS

COMPTIA CERTMASTER PRACTICE FOR SECURITY+ SY0-701 - 10 CEUS

COMPTIA CERTMASTER LEARN FOR LINUX+ XK0-004 - 30 CEUS

COMPTIA CERTMASTER PRACTICE FOR LINUX+ XK0-004 - 10 CEUS

COMPTIA CERTMASTER LEARN FOR CLOUD+ CV0-003 - 25 CEUS

COMPTIA CERTMASTER PRACTICE FOR CLOUD+ CV0-003 - 10 CEUS

COMPTIA CERTMASTER LEARN FOR PENTEST+ PT0-002 - 25 CEUS

COMPTIA CERTMASTER PRACTICE FOR PENTEST+ PT0-002 - 10 CEUS

COMPTIA CERTMASTER LEARN FOR CYSA+ CS0-003 - 25 CEUS

COMPTIA CERTMASTER PRACTICE FOR CYSA+ CS0-003 - 10 CEUS

CWNP

CWTS - CERTIFIED WIRELESS TECHNOLOGY SPECIALIST

CWNA - CERTIFIED WIRELESS NETWORK ADMINISTRATOR

CWSP - CERTIFIED WIRELESS SECURITY PROFESSIONAL

CWDP – CERTIFIED WIRELESS DESIGN PROFESSIONAL

CWAP - CERTIFIED WIRELESS ANALYSIS PROFESSIONAL

CWS - CERTIFIED WIRELESS SPECIALIST

EC-COUNCIL

CERTIFIED ETHICAL HACKER (CEH)

CERTIFIED SECURITY ANALYST (ECSA)

DISASTER RECOVERY PROFESSIONAL (EDRP)

COMPUTER HACKING FORENSICS INVESTIGATOR (CHFI)

CERTIFIED CHIEF INFORMATION SECURITY OFFICER (CCISO)

CERTIFIED SECURITY SPECIALIST (ECSS)

CERTIFIED INCIDENT HANDLER (ECIH)

CERTIFIED ENCRYPTION SPECIALIST (ECES)

CERTIFIED NETWORK DEFENDER (CND)

CERTIFIED NETWORK DEFENSE ARCHITECT (CNDA)

CYBER THREAT INTELLIGENCE ANALYST (CTIA)

CERTIFIED SOC ANALYST (CSA)

CERTIFIED PENETRATION TESTING (CPENT)

BLOCK CHAIN PROFESSIONAL (CBP)

FORESCOUT

ASSOCIATE FSCA

ASSOCIATE FSCA:OT/ICS

CERTIFIED EXPERT FSCE

CERTIFIED PROFESSIONAL FSCP

FORESCOUT CERTIFIED EXPERT OT/ICS FSCE:OT/ICS

FORTINET

FORTIGATE SECURITY

FORTIGATE INFRASTRUCTURE

NSE4 IMMERSION

FORTIMANAGER

FORTIEDR

FORTISIEM

FORTIANALYZER

FORTICLIENT EMS

FORTIANALYZER ADMINISTRATOR

FORTIMAIL

FORTISANDBOX

FORTIAUTHENTICATOR

CLOUD SECURITY FOR AZURE

CLOUD SECURITY FOR AWS

FORTIADC

FORTIWEB

FORTISOAR ADMINISTRATOR

FORTISWITCH

FORTINAC

SECURE WIRELESS LAN

FORTIVOICE

PUBLIC CLOUD SECURITY

OT SECURITY

LAN EDGE

SD-WAN

ENTERPRISE FIREWALL

ADVANCED ANALYTICS

FORTISOAR DESIGN AND DEVELOPMENT

GOOGLE

 

GOOGLE CLOUD PLATFORM FUNDAMENTALS FOR AWS PROFESSIONALS

ARCHITECTING WITH GOOGLE COMPUTE ENGINE

DATA ENGINEERING ON GOOGLE CLOUD PLATFORM

DEVELOPING APPLICATIONS WITH GOOGLE CLOUD PLATFORM

NETWORKING IN GOOGLE CLOUD PLATFORM

SECURITY IN GOOGLE CLOUD PLATFORM

GOOGLE’S APPLIED DIGITAL SKILLS

HPE

DESIGNING HP DATA CENTER AND CLOUD SOLUTIONS, REV. 15.11

DESIGNING HPE DATA CENTER AND CLOUD SOLUTIONS, REV. 16.11

DELTA - DESIGNING HPE DATA CENTER AND CLOUD SOLUTIONS, REV. 16.11

CREATING HPE SOFTWARE-DEFINED NETWORKS, REV. 15.41

BUILDING HP FLEXFABRIC DATA CENTERS, REV. 14.41

ARCHITECTING HP FLEXNETWORK SOLUTIONS, REV 14.21

DEPLOYING HP FLEXNETWORK CORE TECHNOLOGIES, REV 14.31

HP-UX SECURITY I

HP INTEGRITY VIRTUAL MACHINES V4.3 ADMINISTRATION

HP-UX LOGICAL VOLUME MANAGER

HP INTEGRITY VM V6 AND HP-UX VPARS V6 ADMINISTRATION

HP-UX PERFORMANCE AND TUNING

HP SERVICEGUARD I

HP SYSTEMS INSIGHT MANAGER

HPE ARCSIGHT MASTER ASE PREPARATION COURSE

ARCSIGHT ESM 6.5 ADVANCED ADMINISTRATOR

ARCSIGHT ESM 6.5 ADVANCED ANALYST

ARCSIGHT LOGGER - 6.0 ADMINISTRATION AND OPERATIONS

DYNAMIC APPLICATION TESTING WITH HP WEBINSPECT 10.3

HP FORTIFY STATIC CODE ANALYZER / SOFTWARE SECURITY CENTER 4.2

HPE/ARUBA

IMPLEMENTING ARUBA WLAN (IAW) 8
DESIGNING ADVANCED MOBILITY SOLUTIONS (DAMS)

CLEARPASS ESSENTIALS
SCALABLE WLAN DESIGN & IMPLEMENTATION (SWDI) V8

ADVANCED MOBILITY SOLUTIONS & TROUBLESHOOTING (AMST)

CLEARPASS ADVANCED (CPA)
DESIGNING ARUBA SOLUTIONS (DAS)

IMPLEMENTING ARUBA CAMPUS SWITCHING SOLUTIONS (IACSS)

CLEARPASS FUNDAMENTALS

ARUBA SWITCHING FUNDAMENTALS (ASF)

IBM

IBM SECURITY QRADAR SIEM V7.5 ANALYSIS

IBM SECURITY QRADAR SIEM V7.5 ADMINISTRATION

IBM SECURITY QRADAR SIEM V7.5 DEPLOYMENT

IBM SECURITY IDENTITY GOVERNANCE AND INTELLIGENCE V5.2.5 DEPLOYMENT

DATABASES AND SQL FOR DATA SCIENCE WITH PYTHON

DEVELOPING CUSTOM RULES IN IBM QRADAR SIEM

QRADAR PLANNING AND INSTALLATION GUIDE

BASELINE: DEPLOY & DEVELOP

DEVELOPING APPLICATIONS IN PYTHON ON AWS

QRADAR SIEM API

WHY QRADAR SIEM?

QRADAR SIEM V7.4.3 DEPLOYMENT

ISACA

CISM EXAM REVIEW

CRISC EXAM REVIEW

CSX PRACTITIONER: IDENTIFICATION AND PROTECTION

CSX PRACTITIONER: RESPOND AND RECOVER

CSX PRACTITIONER BOOT CAMP

CSX PRACTITIONER: DETECTION

CISA EXAM REVIEW

(ISC)2

(ISC)2TRAINING FOR CISSP

(ISC)2TRAINING FOR HCISPP

(ISC)2TRAINING FOR CISSP-ISSAP

(ISC)2TRAINING FOR SSCP

(ISC)2 TRAINING FOR CISSP-ISSEP

(ISC)2 TRAINING FOR CISSP-ISSMP

(ISC)2 TRAINING FOR CCSP

(ISC)2 CERTIFIED IN CYBERSECURITY (CC) TRAINING

JUNIPER

JUNIPER NETWORKS DESIGN FUNDAMENTALS (JNDF)

ADVANCED JUNOS ENTERPRISE ROUTING (AJER)

ADVANCED JUNOS ENTERPRISE SWITCHING (AJEX)

ADVANCED JUNOS SECURITY (AJSEC)

ADVANCED JUNOS SERVICE PROVIDER ROUTING (AJSPR)

JUNOS ENTERPRISE SWITCHING (JEX)

JUNOS INTERMEDIATE ROUTING (JIR)

NETWORK AUTOMATION USING CONTRAIL CLOUD (NACC)

JUNOS SERVICE PROVIDER SWITCHING (JSPX)

INTRODUCTION TO THE JUNOS OPERATING SYSTEM (IJOS)

JUNIPER NETWORKS DESIGN - DATA CENTER (JND-DC)

JUNOS EDGE SECURITY SERVICES (JESS)

JUNOS LAYER 3 VPNS (JL3V)

JUNOS LAYER 2 VPNS (JL2V)

JUNOS MPLS FUNDAMENTALS (JMF)

JUNOS FOR SECURITY PLATFORMS (JSEC)

JUNIPER NETWORKS DESIGN-SERVICE PROVIDER (JND-SP)

JUNIPER NETWORKS DESIGN FUNDAMENTALS (JNDF)

MICROSOFT

INSTALLING AND CONFIGURING WINDOWS 10

DEPLOYING AND MANAGING WINDOWS 10 USING ENTERPRISE SERVICES

INSTALLING AND CONFIGURING WINDOWS® 7 CLIENT

TROUBLESHOOTING AND SUPPORTING WINDOWS® 7 IN THE ENTERPRISE

PLANNING AND MANAGING WINDOWS® 7 DESKTOP DEPLOYMENTS AND ENVIRONMENTS

DEPLOYING WINDOWS DESKTOPS AND ENTERPRISE APPLICATIONS

SUPPORTING AND TROUBLESHOOTING WINDOWS 10

NETWORKING FUNDAMENTALS

SECURITY FUNDAMENTALS

CONFIGURING WINDOWS® 8.1

SUPPORTING WINDOWS® 8.1

WINDOWS SERVER ADMINISTRATION FUNDAMENTALS

INSTALLATION, STORAGE, AND COMPUTE WITH WINDOWS SERVER 2016

NETWORKING WITH WINDOWS SERVER 2016

IDENTITY WITH WINDOWS SERVER 2016

INSTALLING AND CONFIGURING WINDOWS SERVER 2012

ADMINISTERING WINDOWS SERVER 2012

CONFIGURING ADVANCED WINDOWS SERVER 2012 SERVICES

DESIGNING AND IMPLEMENTING A SERVER INFRASTRUCTURE

IMPLEMENTING AN ADVANCED SERVER INFRASTRUCTURE

CORE SOLUTIONS OF MICROSOFT EXCHANGE SERVER 2013

ADVANCED SOLUTIONS OF MICROSOFT EXCHANGE SERVER 2013

DEPLOYING ENTERPRISE VOICE WITH SKYPE FOR BUSINESS 2015

ADMINISTERING MICROSOFT EXCHANGE SERVER 2016

CORE SOLUTIONS OF SKYPE FOR BUSINESS 2015

DESIGNING AND DEPLOYING MICROSOFT EXCHANGE SERVER 2016

SERVER VIRTUALIZATION WITH WINDOWS

SERVER HYPER-V AND SYSTEM CENTER

ADMINISTERING SYSTEM CENTER

CONFIGURATION MANAGER AND INTUNE

MONITORING AND OPERATING A PRIVATE CLOUD

CONFIGURING AND DEPLOYING A PRIVATE CLOUD

ENABLING AND MANAGING OFFICE 365

ADMINISTERING A SQL DATABASE INFRASTRUCTURE

DEVELOPING MICROSOFT AZURE SOLUTIONS

IMPLEMENTING MICROSOFT AZURE INFRASTRUCTURE SOLUTIONS

SECURING WINDOWS SERVER 2016

DESIGNING AND IMPLEMENTING CLOUD DATA PLATFORM SOLUTIONS

DEPLOYING VOICE WORKLOADS FOR SKYPE FOR BUSINESS ONLINE AND SERVER 2015

DESIGNING A DATA SOLUTION WITH MICROSOFT SQL SERVER

VIRTUALIZING ENTERPRISE DESKTOPS AND APPS

WINDOWS SERVER 2012: TECHNICAL OVERVIEW

WINDOWS 10 FEATURES FOR A MOBILE WORKFORCE

WINDOWS SERVER 2012 TRAINING: NETWORKING

WINDOWS SERVER 2012: IDENTITY AND ACCESS

WINDOWS SERVER 2012: STORAGE

DEVELOPING MICROSOFT SQL SERVER DATABASES

DESIGNING DATABASE SOLUTIONS FOR SQL SERVER

OFFENSIVE SECURITY

EXP-301: WINDOWS USER MODE EXPLOIT DEVELOPMENT

EXP-312: ADVANCED MACOS CONTROL BYPASSES

EXP-401: ADVANCED WINDOWS EXPLOITATION

PEN-200: PENETRATION TESTING WITH KALI LINUX

PEN-210: FOUNDATIONAL WIRELESS NETWORK ATTACKS

PEN-300: ADVANCED EVASION TECHNIQUES AND BREACHING DEFENSES

SOC-200: FOUNDATIONAL SECURITY OPERATIONS AND DEFENSIVE ANALYSIS

WEB-200: FOUNDATIONAL WEB APPLICATION ASSESSMENTS WITH KALI LINUX

WEB-300: ADVANCED WEB ATTACKS AND EXPLOITATION

OPENTEXT

IR250 - INCIDENT INVESTIGATION

DFIR370 - HOST INTRUSION METHODOLOGY AND INVESTIGATION

DF120 - FOUNDATIONS IN DIGITAL FORENSICS WITH ENCASE

DF125 - MOBILE DEVICE EXAMINATIONS WITH ENCASE

DF210 - BUILDING AN INVESTIGATION WITH ENCASE

DF320 - ADVANCED ANALYSIS OF WINDOWS ARTIFACTS WITH ENCASE

IR280 ENCASE ENDPOINT SECURITY

DFIR130 ENCASE ENDPOINT INVESTIGATOR TRAINING

DFIR350 INTERNET-BASED INVESTIGATIONS WITH ENCASE

ED290 EDISCOVERY TRAINING WITH ENCASE INFORMATION ASSURANCE

DFIR450 ENCASE ENSCRIPT PROGRAMMING

PALO ALTO

FIREWALL 11.0 ESSENTIALS: CONFIGURATION AND MANAGEMENT (EDU-210)

PANORAMA 11.0: MANAGING FIREWALLS AT SCALE (EDU-220)

PRISMA CLOUD: MONITORING AND SECURING - EDU-150

PRISMA CLOUD: ONBOARDING AND OPERATIONALIZING - EDU- 152

PCC TRAINING

INTRODUCTION TO CYBERSECURITY

FUNDAMENTALS OF NETWORK SECURITY

FUNDAMENTALS OF CLOUD SECURITY

FUNDAMENTALS OF SECURITY OPERATIONS CENTER (SOC)

USE OF THE PALO ALTO NETWORKS CYBER

SECURITY ACADEMY CYBERSECURITY SURVIVAL GUIDE

FUNDAMENTALS OF SECURITY OPERATIONS CENTER (SOC)

INTRODUCTION TO CORTEX XSOAR

CORTEX XSOAR ADMIN TRAINING

CORTEX XSOAR ANALYST TRAINING

CORTEX XSOAR SOAR ENGINEER TRAINING

RED HAT

RED HAT SYSTEM ADMINISTRATION I (RH124)

RED HAT SYSTEM ADMINISTRATION II (RH134)

RED HAT OPENSTACK ADMINISTRATION I (CL110)

RED HAT OPENSTACK ADMINISTRATION II (CL210)

RED HAT SYSTEM ADMINISTRATION III (RH254)

RED HAT OPENSTACK SYSTEM ADMINISTRATION III (CL310)

RED HAT CLOUDFORMS HYBRID CLOUD MANAGEMENT (CL220)

OPENSHIFT ENTERPRISE ADMINISTRATION (DO280)

RED HAT GLUSTER STORAGE ADMINISTRATION (RH236)

RED HAT VIRTUALIZATION ADMINISTRATION (RH318)

RED HAT JBOSS IN DATA VIRTUALIZATION ADMINISTRATION (JB450)

JBOSS ENTERPRISE APPLICATION DEVELOPMENT (JB225)

RED HAT ENTERPRISE DEPLOYMENT AND SYSTEMS MANAGEMENT (RH401)

RED HAT SATELLITE 6 ADMINISTRATION (RH403)

RED HAT ENTERPRISE LINUX DIAGNOSTICS AND TROUBLESHOOTING

RED HAT ENTERPRISE PERFORMANCE TUNING (RH442)

RED HAT HIGH AVAILABILITY CLUSTERING (RH436)

JBOSS APPLICATION ADMINISTRATION I (JB248)

RED HAT SECURITY: Linux in Physical, Virtual, and Cloud (RH415)

AUTOMATION WITH ANSIBLE II: ANSIBLE TOWER (DO409)

SABSA

A1 – ADVANCED SABSA RISK, ASSURANCE & GOVERNANCE

A2 – ADVANCED SABSA ARCHITECTURE PROGRAM MANAGEMENT

A3 – ADVANCED SABSA ARCHITECTURE DESIGN

A3 – SABSA A3 – ARCHITECTURE DESIGN DEVELOPMENT

A4 – ADVANCED SABSA INCIDENT, MONITORING & INVESTIGATIONS ARCHITECTURE

A5 – ADVANCED SABSA BUSINESS CONTINUITY AND CRISIS MANAGEMENT

SANS

AUD507: AUDITING & MONITORING NETWORKS, PERIMETERS & SYSTEMS

FOR498: BATTLEFIELD FORENSICS & DATA ACQUISITION

FOR500: WINDOWS FORENSIC ANALYSIS

FOR508: ADVANCED DIGITAL FORENSICS, INCIDENT RESPONSE, AND THREAT HUNTING

FOR509: ENTERPRISE CLOUD FORENSICS AND INCIDENT RESPONSE

FOR518: MAC FORENSIC ANALYSIS

FOR572: ADVANCED NETWORK FORENSICS AND ANALYSIS

FOR578: CYBER THREAT INTELLIGENCE

FOR585: ADVANCED SMARTPHONE FORENSICS

FOR610: REVERSE-ENGINEERING MALWARE: MALWARE ANALYSIS TOOLS AND TECHNIQUES

ICS410: ICS/SCADA SECURITY ESSENTIALS

ICS456: ESSENTIALS FOR NERC CRITICAL INFRASTRUCTURE PROTECTION

ICS515: ICS VISIBILITY, DETECTION, AND RESPONSE

MGT414: SANS TRAINING PROGRAM FOR THE CISSP CERTIFICATION

MGT512: SANS SECURITY LEADERSHIP ESSENTIALS FOR MANAGERS WITH KNOWLEDGE COMPRESSION

MGT514: SECURITY STRATEGIC PLANNING, POLICY, AND LEADERSHIP

MGT525: MANAGING CYBERSECURITY INITIATIVES & EFFECTIVE COMMUNICATION

MGT551: BUILDING AND LEADING SECURITY OPERATIONS CENTERS

SEC275: FOUNDATIONS: COMPUTERS, TECHNOLOGY, & SECURITY

SEC301: INTRODUCTION TO CYBER SECURITY

SEC401: SECURITY ESSENTIALS - NETWORK, ENDPOINT, AND CLOUD

SEC450: BLUE TEAM FUNDAMENTALS: SECURITY OPERATIONS AND ANALYSIS

SEC460: ENTERPRISE AND CLOUD | THREAT AND VULNERABILITY ASSESSMENT

SEC488: CLOUD SECURITY ESSENTIALS

SEC497: PRACTICAL OPEN-SOURCE INTELLIGENCE (OSINT)

SEC501: ADVANCED SECURITY ESSENTIALS - ENTERPRISE DEFENDER

SEC503: NETWORK MONITORING AND THREAT DETECTION IN-DEPTH

SEC504: HACKER TOOLS, TECHNIQUES, AND INCIDENT HANDLING

SEC505: SECURING WINDOWS AND POWERSHELL AUTOMATION

SEC510: PUBLIC CLOUD SECURITY: AWS, AZURE, AND GCP

SEC511: CONTINUOUS MONITORING AND SECURITY OPERATIONS

SEC522: APPLICATION SECURITY: SECURING WEB APPLICATIONS, APIS, AND MICROSERVICES

SEC530: DEFENSIBLE SECURITY ARCHITECTURE AND ENGINEERING: IMPLEMENTING ZERO TRUST FOR THE HYBRID ENTERPRISE

SEC540: CLOUD SECURITY AND DEVSECOPS AUTOMATION

SEC541: CLOUD SECURITY ATTACKER TECHNIQUES, MONITORING, AND THREAT DETECTION

SEC542: WEB APP PENETRATION TESTING AND ETHICAL HACKING

SEC555: SIEM WITH TACTICAL ANALYTICS

SEC560: ENTERPRISE PENETRATION TESTING

SEC566: IMPLEMENTING AND AUDITING SECURITY FRAMEWORKS AND CONTROLS

SEC573: AUTOMATING INFORMATION SECURITY WITH PYTHON

SEC575: MOBILE DEVICE SECURITY AND ETHICAL HACKING

SEC588: CLOUD PENETRATION TESTING

SEC599: DEFEATING ADVANCED ADVERSARIES - PURPLE TEAM TACTICS & KILL CHAIN DEFENSES

SEC617: WIRELESS PENETRATION TESTING AND ETHICAL HACKING

SEC660: ADVANCED PENETRATION TESTING, EXPLOIT WRITING, AND ETHICAL HACKING

SPLUNK

USING SPLUNK ENTERPRISE SECURITY

VMWAREZSCALER

VMWARE HORIZON 7: INSTALL, CONFIGURE, MANAGE [V7]

VMWARE HORIZON 7: TROUBLESHOOTING AND PERFORMANCE OPTIMIZATION [V7]

VMWARE NSX-T: INSTALL, CONFIGURE, MANAGE [V2.2]

VMWARE NSX-T DATA CENTER: INSTALL, CONFIGURE, MANAGE [V2.4]

VMWARE NSX-T DATA CENTER: TROUBLESHOOTING AND OPERATIONS [V2.4]

VMWARE NSX-T DATA CENTER: DESIGN [V2.4]

VMWARE VSPHERE: DESIGN WORKSHOP [V6.5]

VMWARE HORIZON 7: DESIGN WORKSHOP [V7.0]

HORIZON: DESIGN AND DEPLOY [V6]

VCA-DBT

VMWARE NSX: TROUBLESHOOTING AND OPERATIONS [V6.4]

VMWARE NSX: INSTALL, CONFIGURE, MANAGE [V6.4]

VMWARE VSPHERE: INSTALL, CONFIGURE, MANAGE [V6.7]

VMWARE VSPHERE: OPTIMIZE AND SCALE [V6.7]

VMWARE VSPHERE: SKILLS FOR PUBLIC SECTOR ADMINISTRATORS [V6.7]

VMWARE VSPHERE: TROUBLESHOOTING WORKSHOP [V6.7]

VMWARE ADVANCED SKILLS FOR VSPHERE PROFESSIONAL WORKSHOP [V6.7]

VMWARE WORKSPACE ONE: DEPLOY AND MANAGE [V19.X]

VMWARE WORKSPACE ONE: INTEGRATING THE DIGITAL WORKSPACE [V19.X]

VMWARE WORKSPACE ONE: SKILLS FOR UNIFIED ENDPOINT MANAGEMENT [V19.X]

 

ZIA INTRODUCTION

ZIA FUNDAMENTALS

ANALYZING INTERNET ACCESS TRAFFIC PATTERNS

CHECKING ZSCALER CLIENT CONNECTOR

CHECKING USER INTERNET ACCESS

CHECKING ZIA NETWORK CONNECTIVITY

CHECKING ZIA USER AUTHENTICATION

ADJUSTING INTERNET ACCESS POLICIES

AUDITING SECURITY POLICY

INVESTIGATING SECURITY ISSUES

TROUBLESHOOTING ZIA

ZIA AUTHENTICATION (ADVANCED)

ZIA TRAFFIC FORWARDING (ADVANCED)

CLIENT CONNECTOR MANAGEMENT

CLIENT CONNECTOR: ZIA SPECIFIC CONFIGURATIONS

ZIA BANDWIDTH CONTROL

ZIA DNS SECURITY & OPTIMIZATION

ZIA NANOLOG STREAMING SERVICE (NSS)

SURVEY FOR THE ZIA PRO PATH

ZPA ARCHITECTURE

ZPA APP CONNECTORS (ADVANCED)

ZPA POLICY

ZPA FEATURES

ZPA AUTHENTICATION

INTUNE FOR IOS USING SCEP

SURVEY FOR THE ZPA PRO PATH