Skip to main content

PenTest+トレーニングユニット

本サイト上のコンテンツは、参照目的だけのために、英語の原本から翻訳されたものです。また、本サイト上のコンテンツの一部は機械翻訳されたものです。日本語版と英語版の間に何らかの齟齬がある場合には、英語版が優先されます。
当社は改善のためのあらゆる努力を行いますが、翻訳の正確性及び信頼性は保証せず、当社に故意または重大な過失がある場合を除き、不正確性又は遺漏により生じる損失又は損害に責任を負わないものとします。

CompTIA Pentest+継続教育単位(CEU)の事前承認トレーニング

注:このリストに記載されているトレーニングは、事前の通知なしに変更される場合があります。 CompTIA認定資格試験のバージョンが更新されると、このリストも更新されます。 変更前に受験者が認定記録にアップロードしたトレーニングは引き続き有効です。更新前のリストに記載されていたトレーニングで、認定記録にアップロードされていないものは、CEUとして使用できなくなります。

この文書で承認されているトレーニングは、CompTIA PenTest+ - PT0-002の目標に基づいています。

認証プロバイダー コースタイトル
CHECK POINT

CHECK POINT CERTIFIED SECURITY MASTER (CCSM)

CHECK POINT CERTIFIED CLOUD SPECIALIST (CCCS)

CHECK POINT CERTIFIED ENDPOINT SPECIALIST (CCES)

CHECK POINT CERTIFIED AUTOMATION SPECIALIST (CCAS)

INFRASTRUCTURE HACKING CHECK POINT CERTIFIED PENTESTING EXPERT (CCPE) 

CISCO

IMPLEMENTING AND CONFIGURING CISCO IDENTITY SERVICES ENGINE (SISE)

IMPLEMENTING AND OPERATING CISCO SECURITY CORE TECHNOLOGIES (SCOR)

IMPLEMENTING SECURE SOLUTIONS WITH VIRTUAL PRIVATE NETWORKS (SVPN)

IMPLEMENTING SECURE SOLUTIONS WITH VIRTUAL PRIVATE NETWORKS (SVPN)

SECURING EMAIL WITH CISCO EMAIL SECURITY APPLIANCE (SESA)

SECURING THE WEB WITH CISCO WEB SECURITY APPLIANCE (SWSA)

SECURING NETWORKS WITH CISCO FIREPOWER NEXT GENERATION FIREWALL (SSNGFW)

SECURING NETWORKS WITH CISCO FIREPOWER NEXT-GENERATION IPS (SSFIPS)

CLOUD SECURITY ALLIANCE

CERTIFICATE OF CLOUD SECURITY KNOWLEDGE (CCSK)

COMPTIA

COMPTIA SECURITYX (CAS-005)

COMPTIA CYBERSECURITY ANALYST (CySA+) (CS0-003)

COMPTIA CERTMASTER LEARN FOR CYSA+ CS0-003 - 25 CEUS

COMPTIA CERTMASTER PRACTICE FOR CYSA+ CS0-003 - 10 CEUS

COMPTIA PENTEST+ (PT0-002) : PT0-001 以前の認定資格者のみ承認

COMPTIA CERTMASTER LEARN FOR PENTEST+ PT0-002 - 25 CEUS: PT0-001 以前の認定資格者のみ承認

COMPTIA CERTMASTER PRACTICE FOR PENTEST+ PT0-002 - 10 CEUS: PT0-001 以前の認定資格者のみ承認

CERTMASTER LABS FOR SECURITYX (EXAM CAS-005) - 40 CEUs

CERTMASTER LEARN FOR SECURITYX (EXAM CAS-005) - 40 CEUs

CWNP

CWSP - CERTIFIED WIRELESS SECURITY PROFESSIONAL

EC-Council

CERTIFIED INCIDENT HANDLER (ECIH)

CERTIFIED SECURITY ANALYST (ECSA)

DISASTER RECOVERY PROFESSIONAL (EDRP)

COMPUTER HACKING FORENSICS INVESTIGATOR (CHFI)

CERTIFIED CHIEF INFORMATION SECURITY OFFICER (CCISO)

CERTIFIED SECURITY SPECIALIST (ECSS)

CERTIFIED ENCRYPTION SPECIALIST (ECES)

CYBER THREAT INTELLIGENCE ANALYST (CTIA)

CERTIFIED SOC ANALYST (CSA)

CERTIFIED PENETRATION TESTING (CPENT)

FORTINET

FORTIGATE SECURITY

FORTIGATE INFRASTRUCTURE

NSE4 IMMERSION

FORTIMANAGER

FORTIEDR

FORTISIEM

FORTIANALYZER

FORTICLIENT EMS

FORTIANALYZER ADMINISTRATOR

FORTIMAIL

FORTISANDBOX

FORTIAUTHENTICATOR

CLOUD SECURITY FOR AZURE

CLOUD SECURITY FOR AWS

FORTIADC

FORTIWEB

FORTISOAR ADMINISTRATOR

FORTISWITCH

FORTINAC SECURE WIRELESS LAN

FORTIVOICE PUBLIC CLOUD SECURITY

OT SECURITY

LAN EDGE

SD-WAN

ENTERPRISE FIREWALL

ADVANCED ANALYTICS

FORTISOAR DESIGN AND DEVELOPMENT

ISACA

CRISC EXAM REVIEW

CGEIT EXAM REVIEW

CISM EXAM REVIEW

CISA EXAM REVIEW

(ISC)2

OFFICIAL (ISC)2 CBK TRAINING SEMINAR FOR THE CGRC

(ISC)2 TRAINING FOR CCSP

(ISC)2 TRAINING FOR CISSP

(ISC)2 TRAINING FOR HCISPP

(ISC)2 TRAINING FOR CISSP-ISSAP

(ISC)2 TRAINING FOR CISSP-ISSEP

(ISC)2 TRAINING FOR CISSP-ISSMP

(ISC)2 TRAINING FOR SSCP

OFFENSIVE SECURITY

PEN-200: PENETRATION TESTING WITH KALI LINUX

PEN-210: FOUNDATIONAL WIRELESS NETWORK ATTACKS

PEN-300: ADVANCED EVASION TECHNIQUES AND BREACHING DEFENSES

EXP-401: ADVANCED WINDOWS EXPLOITATION

WEB-200: FOUNDATIONAL WEB APPLICATION ASSESSMENTS WITH KALI LINUX

OPENTEXT

DF120 — FOUNDATIONS IN DIGITAL FORENSICS WITH ENCASE

DF125 — MOBILE DEVICE EXAMINATIONS WITH ENCASE

DF210 — BUILDING AN INVESTIGATION WITH ENCASE

DF320 — ADVANCED ANALYSIS OF WINDOWS ARTIFACTS WITH ENCASE

IR250 — INCIDENT INVESTIGATION

IR280 — ENCASE ENDPOINT SECURITY TRAINING

DFIR130 — ENCASE ENDPOINT INVESTIGATOR TRAINING

DFIR350 — INTERNET-BASED INVESTIGATIONS WITH ENCASE

DFIR370 — HOST INTRUSION METHODOLOGY AND INVESTIGATION

DFIR450 — ENCASE ENSCRIPT PROGRAMMING

ED290 — EDISCOVERY TRAINING WITH ENCASE INFORMATION ASSURANCE

SABSA

A1 – ADVANCED SABSA RISK, ASSURANCE & GOVERNANCE

A3 – SABSA A3 – ARCHITECTURE DESIGN DEVELOPMENT

A2 – ADVANCED SABSA ARCHITECTURE PROGRAM MANAGEMENT

A3 – ADVANCED SABSA ARCHITECTURE DESIGN

A4 – ADVANCED SABSA INCIDENT, MONITORING & INVESTIGATIONS ARCHITECTURE

A5 – ADVANCED SABSA BUSINESS CONTINUITY AND CRISIS MANAGEMENT

SANS

AUD507:AUDITING & MONITORING NETWORKS, PERIMETERS & SYSTEMS

FOR500: WINDOWS FORENSIC ANALYSIS

FOR508: ADVANCED DIGITAL FORENSICS, INCIDENT RESPONSE, AND THREAT HUNTING

FOR509: ENTERPRISE CLOUD FORENSICS AND INCIDENT RESPONSE

FOR578: CYBER THREAT INTELLIGENCE

FOR572: ADVANCED NETWORK FORENSICS AND ANALYSIS

FOR585: ADVANCED SMARTPHONE FORENSICS

FOR610: REVERSE-ENGINEERING MALWARE: MALWARE ANALYSIS TOOLS AND TECHNIQUES

ICS456: ESSENTIALS FOR NERC CRITICAL INFRASTRUCTURE PROTECTION

MGT414: SANS TRAINING PROGRAM FOR THE CISSP® CERTIFICATION EXAM

MGT512: SANS SECURITY LEADERSHIP ESSENTIALS FOR MANAGERS WITH KNOWLEDGE COMPRESSION

MGT514: IT SECURITY STRATEGIC PLANNING, POLICY AND LEADERSHIP

MGT551: BUILDING AND LEADING SECURITY OPERATIONS CENTERS

SEC450: BLUE TEAM FUNDAMENTALS: SECURITY OPERATIONS AND ANALYSIS

SEC460: ENTERPRISE AND CLOUD | THREAT AND VULNERABILITY ASSESSMENT

SEC488: CLOUD SECURITY ESSENTIALS

SEC497: PRACTICAL OPEN-SOURCE INTELLIGENCE (OSINT)

SEC504: HACKER TOOLS, TECHNIQUES, EXPLOITS AND INCIDENT HANDLING

SEC510: PUBLIC CLOUD SECURITY: AWS, AZURE, AND GCP

SEC530: DEFENSIBLE SECURITY ARCHITECTURE AND ENGINEERING: IMPLEMENTING ZERO TRUST FOR THE HYBRID ENTERPRISE

SEC540: CLOUD SECURITY AND DEVSECOPS AUTOMATION

SEC541: CLOUD SECURITY ATTACKER TECHNIQUES, MONITORING, AND THREAT DETECTION

SEC542: WEB APP PENETRATION TESTING AND ETHICAL HACKING

SEC460: ENTERPRISE AND CLOUD | THREAT AND VULNERABILITY ASSESSMENT

SEC555: SIEM WITH TACTICAL ANALYTICS

SEC560: NETWORK PENETRATION TESTING AND ETHICAL HACKING

SEC575: MOBILE DEVICE SECURITY AND ETHICAL HACKING

SEC588: CLOUD PENETRATION TESTING

SEC617: WIRELESS ETHICAL HACKING, PENETRATION TESTING, AND DEFENSES

SPLUNK

USING SPLUNK ENTERPRISE SECURITY