Skip to main content

Security+ Educational Units

Pre-approved training for CompTIA Security+ Continuing Education Units (CEUs)

Note: Training in this list is subject to change without prior notification. As CompTIA exams are updated, so is this list. Training uploaded into a certification record by the candidate prior to the change will remain valid. Training earned that was listed previously and has not been uploaded into a certification record can no longer be used for CEUs.

Training approved in this document is based on the CompTIA Security+ - SY0-701 objectives.

 
Certification provider Course title
AMAZON WEB SERVICES

ARCHITECTING ON AWS

SECURITY ENGINEERING ON AWS

EXAM READINESS: AWS CERTIFIED SECURITY - SPECIALTY

AWS SECURITY ESSENTIALS

AWS SECURITY FUNDAMENTALS (SECOND EDITION)

AWS SECURITY HUB PRIMER

CLOUD AUDIT ACADEMY

DEEP DIVE WITH SECURITY: AWS IDENTITY AND ACCESS MANAGEMENT (IAM)

GETTING STARTED WITH AWS SECURITY, IDENTITY, AND COMPLIANCE

BROADCOM/SYMANTEC

ADMINISTRATION OF SYMANTEC VIP (MARCH 2017)

ADMINISTRATION OF SYMANTEC IT MANAGEMENT SUITE 8.0

ADMINISTRATION OF DATA LOSS PREVENTION 14.5

ADMINISTRATION OF SYMANTEC CYBER SECURITY SERVICES (MAY 2016)

ADMINISTRATION OF SYMANTEC ADVANCED THREAT PROTECTION 2.0.2

ADMINISTRATION OF SYMANTEC ENDPOINT PROTECTION 14

ADMINISTRATION OF SYMANTEC DATA CENTER SECURITY - SERVER ADVANCED 6.7

VALIDATION AND ID PROTECTION (VIP) SERVICE R1

IT MANAGEMENT SUITE 8.0 FUNDAMENTALS

IT MANAGEMENT SUITE 8.0 MODULES

CLIENT MANAGEMENT SUITE 7.6 ADMINISTRATION

CLIENT MANAGEMENT SUITE 7.6 IMPLEMENTER

ASSET MANAGEMENT SUITE 7.5 ADMINISTRATION

DATA LOSS PREVENTION 14.5: ADMINISTRATION – MUST COMPLETE ALL MODULES FOR CEUS

DATA LOSS PREVENTION 14.5: DIFFERENCES

CSS ADMIN R1 – MUST COMPLETE ALL MODULES FOR CEUS

SYMANTEC DATA CENTER SECURITY – SERVER

ADVANCED 6.7 ADMINISTRATION – MUST COMPLETE ALL MODULES FOR CEUS

ADVANCED THREAT PROTECTION 2.X: INCIDENT RESPONSE – MUST COMPLETE ALL MODULES FOR CEUS

SYMANTEC ENDPOINT PROTECTION 12.1.X ADMINISTRATION

SYMANTEC ENDPOINT PROTECTION 12.1

MAINTAIN AND TROUBLESHOOT

EMAIL SECURITY SERVICES AND WEB SECURITY SERVICE: ADMINISTRATION

ENDPOINT PROTECTION 14: CONFIGURE AND PROTECT

ENDPOINT PROTECTION 14: DIFFERENCES

ENDPOINT PROTECTION 14: MIGRATION AND UPGRADES

CHECK POINT

CHECK POINT CERTIFIED SECURITY ADMINISTRATOR (CCSA)

SECURITY ENGINEERING (CHECK POINT

CERTIFIED SECURITY EXPERT (CCSE)
THREAT PREVENTION

SECURE WEB GATEWAY

CHECK POINT CERTIFIED SECURITY MASTER (CCSM)

CHECK POINT CERTIFIED SECURITY ADMINISTRATOR (CCSA)

CHECK POINT CERTIFIED CLOUD SPECIALIST (CCCS)

CISCO

IMPLEMENTING CISCO SECURE ACCESS CONTROL SYSTEM V5.2

IMPLEMENTING CISCO IOS NETWORK SECURITY (IINS) 3.0

IMPLEMENTING CISCO SECURE ACCESS SOLUTIONS (SISAS) 1.0

IMPLEMENTING CISCO EDGE NETWORK SECURITY SOLUTIONS (SENSS) 1.0

IMPLEMENTING CISCO SECURE MOBILITY SOLUTIONS (SIMOS) 1.0

SECURING CISCO NETWORKS WITH THREAT

DETECTION AND ANALYSIS (SCYBER) 1

UNDERSTANDING CISCO CYBERSECURITY FUNDAMENTALS (SECFND)

IMPLEMENTING CISCO CYBERSECURITY OPERATIONS (SECOPS)

IMPLEMENTING CISCO THREAT CONTROL SOLUTIONS (SITCS) 1.5

IMPLEMENTING AUTOMATION FOR CISCO SECURITY SOLUTIONS (SAUI)

IMPLEMENTING AND OPERATING CISCO SECURITY CORE TECHNOLOGIES (SCOR)

SECURING NETWORKS WITH CISCO FIREPOWER NEXT GENERATION FIREWALL (SSNGFW)

SECURING NETWORKS WITH CISCO FIREPOWER NEXT-GENERATION IPS (SSFIPS)

IMPLEMENTING AND CONFIGURING CISCO IDENTITY SERVICES ENGINE (SISE)

SECURING EMAIL WITH CISCO EMAIL SECURITY APPLIANCE (SESA)

SECURING THE WEB WITH CISCO WEB

SECURITY APPLIANCE (SWSA)

IMPLEMENTING SECURE SOLUTIONS WITH

VIRTUAL PRIVATE NETWORKS (SVPN)

COMPTIA

COMPTIA SECURITYX (CAS-005)

COMPTIA CYBERSECURITY ANALYST (CySA+) (CS0-003)

COMPTIA PENTEST+ (PT0-002)

COMPTIA CERTMASTER LEARN FOR PENTEST+ PT0-002 - 25 CEUS

COMPTIA CERTMASTER PRACTICE FOR PENTEST+ PT0-002 - 10 CEUS

COMPTIA CERTMASTER LEARN FOR CYSA+ CS0-003 - 25 CEUS

COMPTIA CERTMASTER PRACTICE FOR CYSA+ CS0-003 - 10 CEUS

CERTMASTER LABS FOR SECURITYX (EXAM CAS-005) - 40 CEUs

COMPTIA CERTMASTER LEARN FOR SECURITY+ SY0-701- 40 CEUS APPROVED ONLY FOR THOSE CERTIFIED IN SY0-601 AND EARLIER

COMPTIA CERTMASTER PRACTICE FOR SECURITY+ SY0-701 - 10 CEUS APPROVED ONLY FOR THOSE CERTIFIED IN SY0-601 AND EARLIER

COMPTIA SECURITY+ SY0-701 – APPROVED ONLY FOR THOSE CERTIFIED IN SY0-601 AND EARLIER

CWNP CWSP – CERTIFIED WIRELESS SECURITY PROFESSIONAL
EC-COUNCIL

CERTIFIED ETHICAL HACKER (CEH)

CERTIFIED SECURITY ANALYST (ECSA)

DISASTER RECOVERY PROFESSIONAL (EDRP)

COMPUTER HACKING FORENSICS INVESTIGATOR (CHFI)

CERTIFIED CHIEF INFORMATION SECURITY OFFICER (CCISO)

CERTIFIED SECURITY SPECIALIST (ECSS)

CERTIFIED INCIDENT HANDLER (ECIH)

CERTIFIED ENCRYPTION SPECIALIST (ECES)

CERTIFIED NETWORK DEFENDER (CND)

CERTIFIED NETWORK DEFENSE ARCHITECT (CNDA)

CAST 611V3 ADVANCED PENETRATION TESTING

CAST 616 SECURING WINDOWS INFRASTRUCTURE

ADVANCED MOBILE FORENSICS AND SECURITY (CAST 612)

CAST 613 HACKING AND HARDENING

CORPORATE WEB APP/WEB SITE

CAST 614 ADVANCED NETWORK DEFENSE
CERTIFIED SOC ANALYST (CSA)

CERTIFIED THREAT INTELLIGENCE ANALYST (CTIA)

CERTIFIED PENETRATION TESTING (CPENT)

FORTINET

FORTIGATE SECURITY

FORTIGATE INFRASTRUCTURE

NSE4 IMMERSION

FORTIMANAGER

FORTIEDR

FORTISIEM

FORTIANALYZER

FORTICLIENT EMS

FORTIANALYZER ADMINISTRATOR

FORTIMAIL

FORTISANDBOX

FORTIAUTHENTICATOR

CLOUD SECURITY FOR AZURE

CLOUD SECURITY FOR AWS

FORTIADC

FORTIWEB

FORTISOAR ADMINISTRATOR

FORTISWITCH

FORTINAC

SECURE WIRELESS LAN

FORTIVOICE

PUBLIC CLOUD SECURITY

OT SECURITY

LAN EDGE

SD-WAN

ENTERPRISE FIREWALL

ADVANCED ANALYTICS

FORTISOAR DESIGN AND DEVELOPMENT

HPE

HPE ArcSight Master ASE Preparation Course

ArcSight ESM 6.5 Advanced Administrator

ArcSight ESM 6.5 Advanced Analyst

ArcSight Logger - 6.0 Administration and Operations

Dynamic Application Testing with HP WebInspect 10.3

HP Fortify Static Code Analyzer / Software Security Center 4.2

IBM

IBM SECURITY QRADAR SIEM V7.5 ANALYSIS

IBM SECURITY QRADAR SIEM V7.5 ADMINISTRATION

IBM SECURITY QRADAR SIEM V7.5 DEPLOYMENT

IBM SECURITY IDENTITY GOVERNANCE AND INTELLIGENCE V5.2.5 DEPLOYMENT

DEVELOPING CUSTOM RULES IN IBM QRADAR SIEM

QRADAR PLANNING AND INSTALLATION GUIDE

QRADAR SIEM API

WHY QRADAR SIEM?

QRADAR SIEM V7.4.3 DEPLOYMENT

ISACA

COBIT 5 ASSESSOR FOR SECURITY

CRISC EXAM REVIEW

CYBERSECURITY FUNDAMENTALS

CSX PRACTITIONER: IDENTIFICATION AND PROTECTION

CSX PRACTITIONER: RESPOND AND RECOVER

CSX PRACTITIONER BOOT CAMP

CSX PRACTITIONER: DETECTION

CISM EXAM REVIEW

CISA EXAM REVIEW

(ISC)2

OFFICIAL (ISC)2 CBK TRAINING SEMINAR FOR THE CGRC

(ISC)2 TRAINING FOR CCSP

(ISC)2 TRAINING FOR CISSP

(ISC)2 TRAINING FOR HCISPP

(ISC)2 TRAINING FOR CISSP-ISSAP

(ISC)2 TRAINING FOR CISSP-ISSEP

(ISC)2 TRAINING FOR CISSP-ISSMP

(ISC)2 TRAINING FOR SSCP(ISC)2 

TRAINING FOR CCSP(ISC)2 

TRAINING FOR CISSP(ISC)2 

TRAINING FOR HCISPP(ISC)2 

TRAINING FOR CISSP-ISSAP(ISC)2 

TRAINING FOR CISSP-ISSEP(ISC)2 

TRAINING FOR CISSP-ISSMP(ISC)2

TRAINING FOR SSCP

JUNIPER

ADVANCED JUNOS SECURITY (AJSEC)

ATTACK PREVENTION WITH JUNIPER NETWORKS FIREWALLS (APJF)

CONFIGURING JUNIPER NETWORKS

FIREWALL/IPSEC VPN PRODUCTS (CJFV)

INTEGRATING JUNIPER NETWORKS

FIREWALL/IPSEC VPN PRODUCTS INTO HIGH-PERFORMANCE NETWORKS (IFVH)

JNCIE SECURITY BOOTCAMP (JNCIE-SEC)

JUNOS SECURITY (JSEC)

JUNOS SPACE-SECURITY DIRECTOR (JS-SD)

JUNIPER NETWORKS DESIGN-SECURITY (JND-SEC)

IMPLEMENTING JUNIPER NETWORKS SECURE ANALYTICS (IJSA)

CNFIGURING STEEL-BELTED RADIUS CARRIER (CSBR)

MICROSOFT SECURING WINDOWS SERVER 2016
OFFENSIVE SECURITY

EXP-301: WINDOWS USER MODE EXPLOIT DEVELOPMENT

EXP-312: ADVANCED MACOS CONTROL BYPASSES

EXP-401: ADVANCED WINDOWS EXPLOITATION

PEN-200: PENETRATION TESTING WITH KALI LINUX

PEN-210: FOUNDATIONAL WIRELESS NETWORK ATTACKS

PEN-300: ADVANCED EVASION TECHNIQUES AND BREACHING DEFENSES

WEB-200: FOUNDATIONAL WEB APPLICATION

ASSESSMENTS WITH KALI LINUX

WEB-300: ADVANCED WEB ATTACKS AND EXPLOITATION

OFFENSIVE SECURITY PENETRATION TESTING LAB

OPENTEXT

IR250 - INCIDENT INVESTIGATION

DFIR370 - HOST INTRUSION METHODOLOGY AND INVESTIGATION

DF120 - FOUNDATIONS IN DIGITAL FORENSICS WITH ENCASE

DF125 - MOBILE DEVICE EXAMINATIONS WITH ENCASE

DF210 - BUILDING AN INVESTIGATION WITH ENCASE

DF320 - ADVANCED ANALYSIS OF WINDOWS ARTIFACTS WITH ENCASE
IR280 ENCASE ENDPOINT SECURITY

DFIR130 ENCASE ENDPOINT INVESTIGATOR TRAINING

DFIR350 INTERNET-BASED INVESTIGATIONS WITH ENCASE

ED290 EDISCOVERY TRAINING WITH ENCASE INFORMATION ASSURANCE

DFIR450 ENCASE ENSCRIPT PROGRAMMING

PALO ALTO

FIREWALL 11.0 ESSENTIALS: CONFIGURATION AND MANAGEMENT (EDU-210)

PANORAMA 11.0: MANAGING FIREWALLS AT SCALE (EDU-220)

PRISMA CLOUD: MONITORING AND SECURING - EDU-150

PRISMA CLOUD: ONBOARDING AND OPERATIONALIZING - EDU- 152

PCC TRAINING

INTRODUCTION TO CYBERSECURITY
FUNDAMENTALS OF NETWORK SECURITY

FUNDAMENTALS OF CLOUD SECURITY

FUNDAMENTALS OF SECURITY OPERATIONS CENTER (SOC)

USE OF THE PALO ALTO NETWORKS CYBER SECURITY ACADEMY CYBERSECURITY SURVIVAL GUIDE

FUNDAMENTALS OF SECURITY OPERATIONS CENTER (SOC)

INTRODUCTION TO CORTEX XSOAR

CORTEX XSOAR ADMIN TRAINING

CORTEX XSOAR ANALYST TRAINING

CORTEX XSOAR SOAR ENGINEER TRAINING

RED HAT

RED HAT SERVER HARDENING (RH413)

RED HAT SYSTEM ADMINISTRATION I (RH124)

RED HAT SYSTEM ADMINISTRATION II (RH134)

RHCSA RAPID TRACK COURSE (RH199)

RED HAT SYSTEM ADMINISTRATION III (RH254)

RHCE CERTIFICATION LAB

RED HAT SECURITY: Linux in Physical, Virtual, and Cloud (RH415)

SABSA

A1 – ADVANCED SABSA RISK, ASSURANCE & GOVERNANCE

A2 – ADVANCED SABSA ARCHITECTURE PROGRAM MANAGEMENT

A3 – ADVANCED SABSA ARCHITECTURE DESIGN

A3 – SABSA A3 – ARCHITECTURE DESIGN DEVELOPMENT

A4 – ADVANCED SABSA INCIDENT, MONITORING & INVESTIGATIONS ARCHITECTURE

A5 – ADVANCED SABSA BUSINESS CONTINUITY AND CRISIS MANAGEMENT

SANS

AUD507: AUDITING & MONITORING NETWORKS, PERIMETERS & SYSTEMS

FOR498: BATTLEFIELD FORENSICS & DATA ACQUISITION

FOR500: WINDOWS FORENSIC ANALYSIS

FOR508: ADVANCED DIGITAL FORENSICS, INCIDENT RESPONSE, AND THREAT HUNTING

FOR509: ENTERPRISE CLOUD FORENSICS AND INCIDENT RESPONSE

FOR518: MAC FORENSIC ANALYSIS

FOR572: ADVANCED NETWORK FORENSICS AND ANALYSIS

FOR578: CYBER THREAT INTELLIGENCE

FOR585: ADVANCED SMARTPHONE FORENSICS

FOR610: REVERSE-ENGINEERING MALWARE: MALWARE ANALYSIS TOOLS AND TECHNIQUES

ICS410: ICS/SCADA SECURITY ESSENTIALS

ICS456: ESSENTIALS FOR NERC CRITICAL INFRASTRUCTURE PROTECTION

ICS515: ICS VISIBILITY, DETECTION, AND RESPONSE

MGT414: SANS TRAINING PROGRAM FOR THE CISSP CERTIFICATION

MGT512: SANS SECURITY LEADERSHIP ESSENTIALS FOR MANAGERS WITH KNOWLEDGE COMPRESSION

MGT514: SECURITY STRATEGIC PLANNING, POLICY, AND LEADERSHIP

MGT525: MANAGING CYBERSECURITY INITIATIVES & EFFECTIVE COMMUNICATION

MGT551: BUILDING AND LEADING SECURITY OPERATIONS CENTERS

SEC275: FOUNDATIONS: COMPUTERS, TECHNOLOGY, & SECURITY

SEC301: INTRODUCTION TO CYBER SECURITY

SEC401: SECURITY ESSENTIALS - NETWORK, ENDPOINT, AND CLOUD

SEC450: BLUE TEAM FUNDAMENTALS: SECURITY OPERATIONS AND ANALYSIS

SEC460: ENTERPRISE AND CLOUD | THREAT AND VULNERABILITY ASSESSMENT

SEC488: CLOUD SECURITY ESSENTIALS

SEC497: PRACTICAL OPEN-SOURCE INTELLIGENCE (OSINT)

SEC501: ADVANCED SECURITY ESSENTIALS - ENTERPRISE DEFENDER

SEC503: NETWORK MONITORING AND THREAT DETECTION IN-DEPTH

SEC504: HACKER TOOLS, TECHNIQUES, AND INCIDENT HANDLING

SEC505: SECURING WINDOWS AND POWERSHELL AUTOMATIO

SEC510: PUBLIC CLOUD SECURITY: AWS, AZURE, AND GCP

SEC511: CONTINUOUS MONITORING AND SECURITY OPERATIONS

SEC522: APPLICATION SECURITY: SECURING WEB APPLICATIONS, APIS, AND MICROSERVICES

SEC530: DEFENSIBLE SECURITY ARCHITECTURE AND ENGINEERING: IMPLEMENTING ZERO TRUST FOR THE HYBRID ENTERPRISE

SEC540: CLOUD SECURITY AND DEVSECOPS AUTOMATION

SEC541: CLOUD SECURITY ATTACKER TECHNIQUES, MONITORING, AND THREAT DETECTION

SEC542: WEB APP PENETRATION TESTING AND ETHICAL HACKING

SEC555: SIEM WITH TACTICAL ANALYTICS

SEC560: ENTERPRISE PENETRATION TESTING

SEC566: IMPLEMENTING AND AUDITING

SECURITY FRAMEWORKS AND CONTROLS

SEC575: MOBILE DEVICE SECURITY AND ETHICAL HACKING

SEC588: CLOUD PENETRATION TESTING

SEC599: DEFEATING ADVANCED ADVERSARIES - PURPLE TEAM TACTICS & KILL CHAIN DEFENSES

SEC617: WIRELESS PENETRATION TESTING AND ETHICAL HACKING

SEC660: ADVANCED PENETRATION TESTING, EXPLOIT WRITING, AND ETHICAL HACKING

SPLUNK USING SPLUNK ENTERPRISE SECURITY