Skip to main content

Cloud+ Educational Units

Pre-approved training for CompTIA Cloud+ Continuing Education Units (CEUs)

Note: Training in this list is subject to change without prior notification. As CompTIA exams are updated, so is this list. Training uploaded into a certification record by the candidate prior to the change will remain valid. Training earned that was listed previously and has not been uploaded into a certification record can no longer be used for CEUs.

Training approved in this document is based on the CompTIA Cloud+ - CV0-003 objectives.

Cisco

Cloud Security Alliance

CompTIA

CWNP

EC-Council

Forescout

Fortinet

Google

HPE/Aruba

IBM

ISACA

(ISC)2

Juniper

Microsoft

Offensive Security

OpenText

Palo Alto

Red Hat

SABSA

SANS

 

Certification provider

Course title

AMAZON

AWS SECURITY FUNDAMENTALS

DEVOPS ENGINEERING ON AWS

DEVELOPING ON AWS

ARCHITECTING ON AWS

ADVANCED ARCHITECTING ON AWS

EXAM READINESS WORKSHOP: AWS CERTIFIED

SOLUTIONS ARCHITECT - PROFESSIONAL

AWS WELL-ARCHITECTED TRAINING

EXAM READINESS: AWS CERTIFIED DEVELOPER – ASSOCIATE

AWS CLOUD PRACTITIONER ESSENTIALS (SECOND EDITION)

AWS TECHNICAL ESSENTIALS

EXAM READINESS: AWS CERTIFIED ADVANCED NETWORKING - SPECIALTY

DATA ANALYTICS FUNDAMENTALS

BIG DATA ON AWS

SECURITY ENGINEERING ON AWS

EXAM READINESS: AWS CERTIFIED DEVOPS ENGINEER – PROFESSIONAL

EXAM READINESS: AWS CERTIFIED SYSOPS ADMINISTRATOR - ASSOCIATE

SYSTEMS OPERATIONS ON AWS

EXAM READINESS: AWS CERTIFIED SECURITY - SPECIALTY

ADVANCED DEVELOPING ON AWS

ADVANCED TESTING PRACTICES USING AWS DEVOPS TOOLS

ALEXA FOR DEVELOPERS

AMAZON API GATEWAY FOR SERVERLESS APPLICATIONS

AMAZON CONNECT: BUILD A CUSTOM CALL CONTROL PANEL

AMAZON ELASTIC KUBERNETES SERVICE (EKS) PRIMER

AMAZON FSX FOR LUSTRE PRIMER

AMAZON FSX FOR WINDOWS FILE SERVER PRIMER

AMAZON LUMBERYARD PRIMER

AMAZON WORKSPACES PRIMER

APPLICATION DEVELOPMENT USING AWS DYNAMODB

AWS CLOUD DEVELOPMENT KIT (CDK) PRIMER

AWS DATABASE OFFERINGS

AWS ELEMENTAL CONDUCTOR

AWS FOUNDATIONS: GETTING STARTED WITH THE

AWS CLOUD ESSENTIALS

AWS HADOOP FUNDAMENTALS

AWS LAMBDA FOUNDATIONS

AWS SAAS FACTORY ARCHITECTURE TRACK: SAAS MIGRATION STRATEGIES

AWS SECURITY ESSENTIALS

AWS SECURITY FUNDAMENTALS (SECOND EDITION)

AWS SECURITY HUB PRIMER

AWS SNOWBALL EDGE LOGISTICS AND PLANNING

AWS STORAGE GATEWAY PRIMER: FILE GATEWAY

AWS SYSTEMS MANAGER

BREAK FREE OF LEGACY DATABASES

CLOUD AUDIT ACADEMY

CONFIGURE AND DEPLOY AWS PRIVATELINK

DATA WAREHOUSING ON AWS

DEEP DIVE INTO AMAZON ELASTIC BLOCK STORE (EBS)

DEEP DIVE WITH SECURITY: AWS IDENTITY AND ACCESS MANAGEMENT (IAM)

DEPLOYING AND SCALING APPLICATIONS WITH AMAZON LIGHTSAIL

DIVE DEEP INTO AMAZON CONNECT REPORTING AND METRICS

GAME SERVER HOSTING WITH AMAZON EC2

GETTING STARTED WITH AMAZON SIMPLE STORAGE SERVICE (AMAZON S3)

GETTING STARTED WITH AWS SECURITY, IDENTITY, AND COMPLIANCE

GETTING STARTED WITH DEVOPS ON AWS

INTERNET OF THINGS (IOT) MICROCONTROLLERS SERIES

INTRODUCTION TO BLOCKCHAIN

IOT EDGE COMPUTING: AWS IOT

GREENGRASS PRIMER
MANAGING AMAZON SIMPLE STORAGE SERVICE (AMAZON S3)

MOBILE DEVELOPMENT IN IOT

PLANNING AN AWS OUTPOSTS IMPLEMENTATION

POSTGRESQL FUNDAMENTALS: ARCHITECTURE

SOME REALLY GOOD PRACTICES FOR IOT OPERATIONS

SPEAKING OF: MACHINE TRANSLATION AND NATURAL LANGUAGE PROCESSING (NLP)

TRANSIT GATEWAY NETWORKING AND SCALING

VISUALIZING WITH QUICKSIGHT

EXAM READINESS: AWS CERTIFIED DATA ANALYTICS – SPECIALTY

ARCITURA CLOUD SCHOOL

FUNDAMENTAL CLOUD ARCHITECTURE

ADVANCED CLOUD ARCHITECTURE

FUNDAMENTAL CLOUD SECURITY

ADVANCED CLOUD SECURITY

FUNDAMENTAL CLOUD STORAGE

ADVANCED CLOUD STORAGE

FUNDAMENTAL CLOUD VIRTUALIZATION

ADVANCED CLOUD VIRTUALIZATION

FUNDAMENTAL CLOUD CAPACITY

ADVANCED CLOUD CAPACITY

BROADCOM/SYMANTEC

SYMANTEC DATA CENTER SECURITY – SERVER ADVANCED 6.7 ADMINISTRATION – MUST COMPLETE ALL MODULES FOR CEUS

ENDPOINT PROTECTION 14: CONFIGURE AND PROTECT

ENDPOINT PROTECTION 14: MIGRATION AND UPGRADES

SYMANTEC ENDPOINT PROTECTION 14: PLAN AND IMPLEMENT

SYMANTEC ENDPOINT PROTECTION 14: MANAGE AND ADMINISTER

SYMANTEC ENDPOINT PROTECTION 14: MAINTAIN AND TROUBLESHOOT

SYMANTEC DATA LOSS PREVENTION 15.0 ADMINISTRATION

SYMANTEC DATA LOSS PREVENTION 15.0 INSTALL AND DEPLOY

SYMANTEC DATA LOSS PREVENTION 15.0 DIFFERENCES

SYMANTEC IDENTITY AND AUTHENTICATION SERVICES R1

PACKETSHAPER 11.9.1 ADMINISTRATION

SYMANTEC PROXYSG 6.6 BASIC ADMINISTRATION

SYMANTEC PROXYSG 6.6 ADVANCED ADMINISTRATION

SYMANTEC SECURITY ANALYTICS 7.2: ADMINISTRATOR

SYMANTEC SECURITY ANALYTICS 7.2: PROFESSIONAL

SSL VISIBILITY 5.0 ADMINISTRATION

CLOUDSOC ADMINISTRATION R2

CLOUDSOC DIFFERENCES R2.1.1

SYMANTEC ADVANCED THREAT PROTECTION 3.0: INCIDENT RESPONSE

CHECK POINT

CHECK POINT CYBER SECURITY ENGINEERING (CCSE)

CHECK POINT CERTIFIED SECURITY MASTER (CCSM)

CHECK POINT CERTIFIED CLOUD SPECIALIST (CCCS)

CHECK POINT CERTIFIED ENDPOINT SPECIALIST (CCES)

CHECK POINT CERTIFIED AUTOMATION SPECIALIST (CCAS)

INFRASTRUCTURE HACKING CHECK POINT

CERTIFIED PENTESTING EXPERT (CCPE)

CHECK POINT CERTIFIED MAESTRO EXPERT (CCME)

CISCO

AUTOMATING AND PROGRAMMING CISCO COLLABORATION SOLUTIONS (CLAUTO)

CONFIGURING CISCO MDS 9000 SERIES SWITCHES (DCMDS)

DESIGNING CISCO DATA CENTER INFRASTRUCTURE (DCID)

DESIGNING CISCO ENTERPRISE NETWORKS (ENSLD)

DEVELOPING APPLICATIONS AND AUTOMATING WORKFLOWS USING CISCO PLATFORMS (DEVASC)

DEVELOPING APPLICATIONS USING CISCO CORE PLATFORMS AND APIS (DEVCOR)

DEVELOPING SOLUTIONS USING CISCO IOT AND EDGE PLATFORMS (DEVIOT)

IMPLEMENTING AND CONFIGURING CISCO IDENTITY SERVICES ENGINE (SISE)

IMPLEMENTING AND OPERATING CISCO DATA CENTER CORE TECHNOLOGIES (DCCOR)

IMPLEMENTING AND OPERATING CISCO ENTERPRISE NETWORK CORE TECHNOLOGIES (ENCOR)

IMPLEMENTING AND OPERATING CISCO SECURITY CORE TECHNOLOGIES (SCOR)

IMPLEMENTING AND OPERATING CISCO SERVICE PROVIDER NETWORK CORE TECHNOLOGIES (SPCOR)

IMPLEMENTING AUTOMATION FOR CISCO DATA CENTER SOLUTIONS (DCAUI)

IMPLEMENTING AUTOMATION FOR CISCO ENTERPRISE SOLUTIONS (ENAUI)

IMPLEMENTING AUTOMATION FOR CISCO SECURITY SOLUTIONS (SAUI)

IMPLEMENTING AUTOMATION FOR CISCO SERVICE PROVIDER SOLUTIONS (SPAUI)

IMPLEMENTING CISCO APPLICATION CENTRIC INFRASTRUCTURE (DCACI)

IMPLEMENTING CISCO COLLABORATION CLOUD AND EDGE SOLUTIONS (CLCEI)

IMPLEMENTING CISCO COLLABORATION CORE TECHNOLOGIES (CLCOR)

IMPLEMENTING CISCO ENTERPRISE ADVANCED ROUTING AND SERVICES (ENARSI)

IMPLEMENTING CISCO ENTERPRISE WIRELESS NETWORKS (ENWLSI)

IMPLEMENTING CISCO SD-WAN SOLUTIONS (ENSDWI)

IMPLEMENTING CISCO SERVICE PROVIDER ADVANCED ROUTING SOLUTIONS (SPRI)

IMPLEMENTING CISCO SERVICE PROVIDER VPN SERVICES (SPVI)

IMPLEMENTING DEVOPS SOLUTIONS AND PRACTICES USING CISCO PLATFORMS (DEVOPS)

IMPLEMENTING SECURE SOLUTIONS WITH VIRTUAL PRIVATE NETWORKS (SVPN)

SECURING EMAIL WITH CISCO EMAIL SECURITY APPLIANCE (SESA)

SECURING NETWORKS WITH CISCO FIREPOWER NEXT GENERATION FIREWALL (SSNGFW)

SECURING NETWORKS WITH CISCO FIREPOWER NEXT-GENERATION IPS (SSFIPS)

SECURING THE WEB WITH CISCO WEB

SECURITY APPLIANCE (SWSA)

SUPPORTING CISCO DATA CENTER SYSTEM DEVICES (DCTECH)

SUPPORTING CISCO ROUTING AND SWITCHING NETWORK DEVICES

TROUBLESHOOTING CISCO DATA CENTER INFRASTRUCTURE (DCIT)

CLOUD SECURITY ALLIANCE

CERTIFICATE OF CLOUD SECURITY KNOWLEDGE (CCSK)

CERTIFICATE OF CLOUD AUDITING KNOWLEDGE (CCAK)

COMPTIA

COMPTIA CLOUD+ (CV0-003) - APPROVED ONLY FOR THOSE CERTIFIED IN CLOUD+ CV0-002 OR EARLIER EXAM VERSION

COMPTIA SECURITYX (CAS-005)

COMPTIA CYBERSECURITY ANALYST (CySA+) (CS0-003)

COMPTIA PENTEST+ (PT0-002)

COMPTIA CERTMASTER LEARN FOR CLOUD+ CV0-003 - 25 CEUS – APPROVED ONLY FOR THOSE CERTIFIED IN CLOUD+ CV0-002 OR EARLIER EXAM VERSION

COMPTIA CERTMASTER PRACTICE FOR CLOUD+ CV0-003 - 10 CEUS –APPROVED ONLY FOR THOSE CERTIFIED IN CLOUD+ CV0-002 OR EARLIER EXAM VERSION

COMPTIA CERTMASTER LEARN FOR PENTEST+ PT0-002 - 25 CEUS

COMPTIA CERTMASTER PRACTICE FOR PENTEST+ PT0-002 - 10 CEUS

COMPTIA CERTMASTER LEARN FOR CySA+ CS0-003 - 25 CEUS

COMPTIA CERTMASTER PRACTICE FOR CySA+ CS0-003 - 10 CEUS

COMPTIA SECURITY+ (SY0-701)

COMPTIA CERTMASTER LEARN FOR SECURITY+ SY0-701- 40 CEUS

COMPTIA CERTMASTER PRACTICE FOR SECURITY+ SY0-701 - 10 CEUS

CWNP CWS - CERTIFIED WIRELESS SPECIALIST
EC-COUNCIL

CERTIFIED NETWORK DEFENDER (CND)

CERTIFIED ETHICAL HACKER (CEH)

CERTIFIED SECURITY ANALYST (ECSA)

COMPUTER HACKING FORENSICS INVESTIGATOR (CHFI)

CERTIFIED SECURITY SPECIALIST (ECSS)

CERTIFIED CHIEF INFORMATION SECURITY OFFICER (CCISO)

DISASTER RECOVERY PROFESSIONAL (EDRP)
CERTIFIED SOC ANALYST (CSA)

FORESCOUT

CERTIFIED EXPERT FSCE

CERTIFIED PROFESSIONAL FSCP

FORESCOUT CERTIFIED EXPERT OT/ICS FSCE:OT/ICS

FORTINET

FORTIGATE SECURITY

FORTIGATE INFRASTRUCTURE

NSE4 IMMERSION

FORTIMANAGER

FORTIEDR

FORTISIEM

FORTIANALYZER

FORTICLIENT EMS

FORTIANALYZER ADMINISTRATOR

FORTIMAIL

FORTISANDBOX

FORTIAUTHENTICATOR

CLOUD SECURITY FOR AZURE

CLOUD SECURITY FOR AWS

FORTIADC

FORTIWEB

FORTISOAR ADMINISTRATOR

FORTISWITCH

FORTINAC

SECURE WIRELESS LAN

FORTIVOICE

PUBLIC CLOUD SECURITY

OT SECURITY

LAN EDGE

SD-WAN

ENTERPRISE FIREWALL

ADVANCED ANALYTICS

FORTISOAR DESIGN AND DEVELOPMENT

GOOGLE

ARCHITECTING WITH GOOGLE COMPUTE ENGINE

DATA ENGINEERING ON GOOGLE CLOUD PLATFORM

DEVELOPING APPLICATIONS WITH GOOGLE CLOUD PLATFORM

NETWORKING IN GOOGLE CLOUD PLATFORM

SECURITY IN GOOGLE CLOUD PLATFORM

GOOGLE’S APPLIED DIGITAL SKILLS

GOOGLE CLOUD PLATFORM FUNDAMENTALS FOR AWS PROFESSIONALS

HPE/ARUBA

IMPLEMENTING ARUBA WLAN (IAW) 8

SCALABLE WLAN DESIGN & IMPLEMENTATION (SWDI) V8

DESIGNING ADVANCED MOBILITY SOLUTIONS (DAMS)

CLEARPASS ESSENTIALS

IBM

IBM SECURITY QRADAR SIEM V7.5 ANALYSIS

IBM SECURITY QRADAR SIEM V7.5 ADMINISTRATION

IBM SECURITY QRADAR SIEM V7.5 DEPLOYMENT

IBM SECURITY IDENTITY GOVERNANCE AND INTELLIGENCE V5.2.5 DEPLOYMENT

DATABASES AND SQL FOR DATA SCIENCE WITH PYTHON

DEVELOPING CUSTOM RULES IN IBM QRADAR SIEM

QRADAR PLANNING AND INSTALLATION GUIDE

BASELINE: DEPLOY & DEVELOP

DEVELOPING APPLICATIONS IN PYTHON ON AWS

QRADAR SIEM API

WHY QRADAR SIEM?

QRADAR SIEM V7.4.3 DEPLOYMENT

ISACA

CGEIT CERTIFIED IN THE GOVERNANCE OF ENTERPRISE IT

CET CERTIFIED IN EMERGING TECHNOLOGY CERTIFICATION

CYBERSECURITY AUDIT

(ISC)2

(ISC)2 TRAINING FOR CCSP

(ISC)2 TRAINING FOR SSCP

JUNIPER

JUNIPER NETWORKS DESIGN - DATA CENTER (JND-DC)

JUNIPER NETWORKS DESIGN-SECURITY (JND-SEC)

JUNIPER NETWORKS DESIGN-SERVICE PROVIDER (JND-SP)

MICROSOFT

DEPLOYING AND MANAGING WINDOWS 10 USING ENTERPRISE SERVICES

DEVELOPING WINDOWS AZURE AND WEB SERVICES JUMP START

DEVELOPING MICROSOFT SHAREPOINT SERVER 2013 CORE SOLUTIONS JUMP START

PLANNING AND ADMINISTERING SHAREPOINT 2016

DEVELOPING MICROSOFT SHAREPOINT®

SERVER 2013 CORE SOLUTIONS

ADVANCED TECHNOLOGIES OF SHAREPOINT 2016

DEVELOPING WINDOWS AZURE™ AND WEB SERVICES

QUERYING DATA WITH TRANSACT-SQL

DEVELOPING SQL DATA MODELS

INSTALLING AND CONFIGURING WINDOWS® 7 CLIENT

IMPLEMENTING A SQL DATA WAREHOUSE

DEVELOPING SQL DATABASES

SUPPORTING AND TROUBLESHOOTING WINDOWS 10

NETWORKING FUNDAMENTALS

SECURITY FUNDAMENTALS

CONFIGURING WINDOWS® 8.1

SUPPORTING WINDOWS® 8.1

WINDOWS SERVER ADMINISTRATION FUNDAMENTALS

INSTALLATION, STORAGE, AND COMPUTE WITH WINDOWS SERVER 2016

NETWORKING WITH WINDOWS SERVER 2016

IDENTITY WITH WINDOWS SERVER 2016

INSTALLING AND CONFIGURING WINDOWS SERVER 2012

ADMINISTERING WINDOWS SERVER 2012
CONFIGURING ADVANCED WINDOWS SERVER 2012 SERVICES

DESIGNING AND IMPLEMENTING A SERVER INFRASTRUCTURE

IMPLEMENTING AN ADVANCED SERVER INFRASTRUCTURE

DEPLOYING ENTERPRISE VOICE WITH SKYPE FOR BUSINESS 2015

SERVER VIRTUALIZATION WITH WINDOWS

SERVER HYPER-V AND SYSTEM CENTER

MOC WORKSHOP: ARCHITECTING MICROSOFT AZURE SOLUTIONS

MONITORING AND OPERATING A PRIVATE CLOUD

CONFIGURING AND DEPLOYING A PRIVATE CLOUD

ADMINISTERING A SQL DATABASE INFRASTRUCTURE

DEVELOPING MICROSOFT AZURE SOLUTIONS

IMPLEMENTING MICROSOFT AZURE INFRASTRUCTURE SOLUTIONS

SECURING WINDOWS SERVER 2016

DESIGNING AND IMPLEMENTING CLOUD DATA PLATFORM SOLUTIONS

DESIGNING A DATA SOLUTION WITH MICROSOFT SQL SERVER

WINDOWS SERVER 2012: TECHNICAL OVERVIEW

WINDOWS 10 FEATURES FOR A MOBILE WORKFORCE

WINDOWS SERVER 2012 TRAINING: NETWORKING

WINDOWS SERVER 2012: IDENTITY AND ACCESS

WINDOWS SERVER 2012: STORAGE

DEVELOPING MICROSOFT SQL SERVER DATABASES

DESIGNING DATABASE SOLUTIONS FOR SQL SERVER

OFFENSIVE SECURITY

WEB-300: ADVANCED WEB ATTACKS AND EXPLOITATION

EXP-401: ADVANCED WINDOWS EXPLOITATION

WEB-200: FOUNDATIONAL WEB APPLICATION ASSESSMENTS WITH KALI LINUX

SOC-200: FOUNDATIONAL SECURITY OPERATIONS AND DEFENSIVE ANALYSIS

OPENTEXT

IR250 - INCIDENT INVESTIGATION

DFIR370 - HOST INTRUSION METHODOLOGY AND INVESTIGATION

DF120 - FOUNDATIONS IN DIGITAL FORENSICS WITH ENCASE

DF125 - MOBILE DEVICE EXAMINATIONS WITH ENCASE

DF210 - BUILDING AN INVESTIGATION WITH ENCASE

DF320 - ADVANCED ANALYSIS OF WINDOWS ARTIFACTS WITH ENCASE

IR280 ENCASE ENDPOINT SECURITY

DFIR130 ENCASE ENDPOINT INVESTIGATOR TRAINING

DFIR350 INTERNET-BASED INVESTIGATIONS WITH ENCASE

ED290 EDISCOVERY TRAINING WITH ENCASE INFORMATION ASSURANCE

DFIR450 ENCASE ENSCRIPT PROGRAMMING

PALO ALTO

FIREWALL 11.0 ESSENTIALS: CONFIGURATION AND MANAGEMENT (EDU-210)

PANORAMA 11.0: MANAGING FIREWALLS AT SCALE (EDU-220)

PRISMA CLOUD: MONITORING AND SECURING - EDU-150

PRISMA CLOUD: ONBOARDING AND OPERATIONALIZING - EDU- 152

PCC TRAINING

INTRODUCTION TO CYBERSECURITY

FUNDAMENTALS OF NETWORK SECURITY

FUNDAMENTALS OF CLOUD SECURITY

FUNDAMENTALS OF SECURITY OPERATIONS CENTER (SOC)

USE OF THE PALO ALTO NETWORKS CYBER SECURITY ACADEMY CYBERSECURITY SURVIVAL GUIDE

FUNDAMENTALS OF SECURITY OPERATIONS CENTER (SOC)

INTRODUCTION TO CORTEX XSOAR

CORTEX XSOAR ADMIN TRAINING

CORTEX XSOAR ANALYST TRAINING

CORTEX XSOAR SOAR ENGINEER TRAINING

RED HAT

RED HAT SYSTEM ADMINISTRATION I (RH124)

RED HAT SYSTEM ADMINISTRATION II (RH134)

RED HAT OPENSTACK ADMINISTRATION I (CL110)

RED HAT OPENSTACK ADMINISTRATION II (CL210)

RED HAT OPENSTACK SYSTEM ADMINISTRATION III (CL310)

RED HAT SYSTEM ADMINISTRATION III (RH254)

RED HAT SECURITY: Linux in Physical, Virtual, and Cloud (RH415)

RED HAT CLOUDFORMS HYBRID CLOUD MANAGEMENT (CL220)

RED HAT GLUSTER STORAGE ADMINISTRATION (RH236)

RED HAT SECURITY: LINUX IN PHYSICAL, VIRTUAL, AND CLOUD (RH415)

RED HAT ENTERPRISE LINUX DIAGNOSTICS AND TROUBLESHOOTING (RH342)

RED HAT SECURITY: IDENTITY MANAGEMENT AND ACTIVE DIRECTORY INTEGRATION (RH362)

AUTOMATION WITH ANSIBLE II: ANSIBLE TOWER (DO409)

RED HAT SATELLITE 6 ADMINISTRATION (RH403)

SABSA

A1 – ADVANCED SABSA RISK, ASSURANCE & GOVERNANCE

A2 – ADVANCED SABSA ARCHITECTURE PROGRAM MANAGEMENT

A3 – ADVANCED SABSA ARCHITECTURE DESIGN

A3 – SABSA A3 – ARCHITECTURE DESIGN DEVELOPMENT

A4 – ADVANCED SABSA INCIDENT, MONITORING & INVESTIGATIONS ARCHITECTURE

A5 – ADVANCED SABSA BUSINESS CONTINUITY AND CRISIS MANAGEMENT

SANS

AUD507: AUDITING & MONITORING NETWORKS, PERIMETERS & SYSTEMS

FOR498: BATTLEFIELD FORENSICS & DATA ACQUISITION

FOR509: ENTERPRISE CLOUD FORENSICS AND INCIDENT RESPONSE

FOR518: MAC AND IOS FORENSIC ANALYSIS AND INCIDENT RESPONSE

FOR572: ADVANCED NETWORK FORENSICS AND ANALYSIS

FOR578: CYBER THREAT INTELLIGENCE

ICS410: ICS/SCADA SECURITY ESSENTIALS

ICS456: ESSENTIALS FOR NERC CRITICAL INFRASTRUCTURE PROTECTION

ICS515: ICS ACTIVE DEFENSE AND INCIDENT RESPONSE

LEG523: LAW OF DATA SECURITY AND INVESTIGATIONS

MGT512: SANS SECURITY LEADERSHIP ESSENTIALS FOR MANAGERS WITHKNOWLEDGE COMPRESSION

MGT514: SECURITY STRATEGIC PLANNING, POLICY, AND LEADERSHIP

MGT551: BUILDING AND LEADING SECURITY OPERATIONS CENTERS

SEC275: FOUNDATIONS: COMPUTERS, TECHNOLOGY, & SECURITY

SEC301: INTRO TO INFORMATION SECURITY

SEC401: SECURITY ESSENTIALS BOOTCAMP STYLE

SEC450: BLUE TEAM FUNDAMENTALS: SECURITY OPERATIONS AND ANALYSIS

SEC460: ENTERPRISE AND CLOUD | THREAT AND VULNERABILITY ASSESSMENT

SEC488: CLOUD SECURITY ESSENTIALS

SEC497: PRACTICAL OPEN-SOURCE INTELLIGENCE (OSINT)

SPLUNK

USING SPLUNK ENTERPRISE SECURITY

VMWARE

VMWARE VSPHERE: FAST TRACK [V6.7]

VMWARE VSPHERE: INSTALL, CONFIGURE, MANAGE [V6.7]

VMWARE VSPHERE: OPTIMIZE AND SCALE [V6.7]

VMWARE VSPHERE: SKILLS FOR PUBLIC SECTOR ADMINISTRATORS [V6.7]

VMWARE VSPHERE: TROUBLESHOOTING WORKSHOP [V6.7]

VMWARE ADVANCED SKILLS FOR VSPHERE PROFESSIONAL WORKSHOP [V6.7]

VMWARE VSPHERE: DESIGN WORKSHOP [V6.5]

VMWARE NSX: INSTALL, CONFIGURE, MANAGE [V6.4]

VMWARE NSX: INSTALL, CONFIGURE, MANAGE [V6.2]

VMWARE NSX: TROUBLESHOOTING AND OPERATIONS [V6.4]

VMWARE NSX: TROUBLESHOOTING AND OPERATIONS [V6.3]

VMWARE NSX-T: INSTALL, CONFIGURE, MANAGE [V2.2]

VMWARE NSX-T DATA CENTER: INSTALL, CONFIGURE, MANAGE [V2.4]

VMWARE NSX-T DATA CENTER: TROUBLESHOOTING AND OPERATIONS [V2.4]

VMWARE NSX-T DATA CENTER: DESIGN [V2.4]

VMWARE HORIZON 7: INSTALL, CONFIGURE, MANAGE [V7.3]

VMWARE HORIZON 7: DESIGN WORKSHOP [V7.0]

ZSCALER

ZIA INTRODUCTION

ZIA FUNDAMENTALS

MONITORING INTERNET ACCESS SECURITY
ANALYZING INTERNET ACCESS TRAFFIC PATTERNS

CHECKING ZSCALER CLIENT CONNECTOR

CHECKING USER INTERNET ACCESS

CHECKING ZIA NETWORK CONNECTIVITY

CHECKING ZIA USER AUTHENTICATION

ADJUSTING INTERNET ACCESS POLICIES

AUDITING SECURITY POLICY

INVESTIGATING SECURITY ISSUES

TROUBLESHOOTING ZIA

ZIA AUTHENTICATION (ADVANCED)

ZIA TRAFFIC FORWARDING (ADVANCED)

CLIENT CONNECTOR MANAGEMENT

CLIENT CONNECTOR: ZIA SPECIFIC CONFIGURATIONS

ZIA BANDWIDTH CONTROL

ZIA DNS SECURITY & OPTIMIZATION

ZIA NANOLOG STREAMING SERVICE (NSS)
SURVEY FOR THE ZIA PRO PATH

ZPA ARCHITECTURE

ZPA APP CONNECTORS (ADVANCED)

ZPA POLICY

ZPA FEATURES

ZPA AUTHENTICATION

INTUNE FOR IOS USING SCEP

SURVEY FOR THE ZPA PRO PATH