CompTIA A+

Pre-approved Training for CompTIA A+ Continuing Education Units (CEUs)

Note: Training in this list is subject to change without prior notification. As CompTIA exams are updated so is this list. Training uploaded into a certification record by the candidate prior to the change will remain valid. Training earned that was listed previously and has not been uploaded into a certification record can no longer be used for CEUs.

Training approved in this document is based on the CompTIA A+ - 1001/1002 objectives.

CERTIFICATION PROVIDER COURSE TITLE
AMAZON WEB SERVICES SECURITY OPERATIONS ON AWS
AWS SECURITY FUNDAMENTALS
MIGRATING TO AWS
SYSTEMS OPERATIONS ON AWS
DEVOPS ENGINEERING ON AWS
DEVELOPING ON AWS
ARCHITECTING ON AWS
ADVANCED ARCHITECTING ON AWS
EXAM READINESS WORKSHOP: AWS CERTIFIED SOLUTIONS ARCHITECT - PROFESSIONAL
EXAM READINESS WORKSHOP: AWS CERTIFIED SOLUTIONS ARCHITECT - ASSOCIATE
APPLE MAC INTEGRATION BASICS 10.11
MACOS SUPPORT ESSENTIALS 10.12 (SIERRA 101)
MACOS SUPPORT ESSENTIALS 10.11 (EL CAPITAN 101)
MAC INTEGRATION BASICS 10.12
APPLE SERVICE FUNDAMENTALS
APPLE CERTIFIED MAC TECHNICIAN (ACMT)
APPLE CERTIFIED IOS TECHNICIAN (ACIT)
ARCITURA CLOUD SCHOOL FUNDAMENTAL CLOUD ARCHITECTURE
ADVANCED CLOUD ARCHITECTURE
FUNDAMENTAL CLOUD SECURITY
ADVANCED CLOUD SECURITY
FUNDAMENTAL CLOUD STORAGE
ADVANCED CLOUD STORAGE
FUNDAMENTAL CLOUD VIRTUALIZATION
ADVANCED CLOUD VIRTUALIZATION
FUNDAMENTAL CLOUD CAPACITY
ADVANCED CLOUD CAPACITY
FUNDAMENTAL CLOUD COMPUTING
CLOUD TECHNOLOGY CONCEPTS
CHECK POINT CHECK POINT CYBER SECURITY ADMINISTRATOR (CCSA) R80.10
CHECK POINT CYBER SECURITY ENGINEERING (CCSE) R80.10
SECURITY MASTER - R80
MULTI-DOMAIN SECURITY MANAGEMENT WITH VIRTUAL SYSTEM EXTENSION
CISCO INTERCONNECTING CISCO NETWORKING DEVICES, PART 1 (ICND1) 3.0
IMPLEMENTING CISCO SECURE MOBILITY SOLUTIONS (SIMOS) 1.0
DESIGNING FOR CISCO INTERNETWORK SOLUTIONS (DESGN) V3.0
DESIGNING THE CISCO CLOUD (CLDDES) 1.0
AUTOMATING THE CISCO ENTERPRISE CLOUD (CLDAUT) 1.0 
IMPLEMENTING CISCO THREAT CONTROL SOLUTIONS (SITCS) 1.5
DEPLOYING CISCO WIRELESS ENTERPRISE NETWORKS (WIDEPLOY) 1.0
SECURING CISCO WIRELESS ENTERPRISE NETWORKS (WISECURE) 1.0
MANAGING INDUSTRIAL NETWORKS FOR MANUFACTURING WITH CISCO TECHNOLOGIES (IMINS2) 1.3
SUPPORTING CISCO DATA CENTER SYSTEM DEVICES (DCTECH) 2.0
DESIGNING CISCO WIRELESS ENTERPRISE NETWORKS (WIDESIGN) 1.0
IMPLEMENTING CISCO WIRELESS NETWORK FUNDAMENTALS (WIFUND) 1.0
IMPLEMENTING CISCO NETWORK SECURITY (IINS) 3.0
INTERCONNECTING CISCO NETWORKING DEVICES, PART 2 (ICND2) 3.0
INTERCONNECTING CISCO NETWORKING DEVICES: ACCELERATED (CCNAX) 3.0
DESIGNING CISCO NETWORK SERVICE ARCHITECTURES (ARCH) 3.0
TROUBLESHOOTING AND MAINTAINING CISCO IP NETWORKS (TSHOOT) 2.0
IMPLEMENTING CISCO IP SWITCHED NETWORKS (SWITCH) 2.0
IMPLEMENTING CISCO IP ROUTING (ROUTE) 2.0
UNDERSTANDING CISCO CLOUD FUNDAMENTALS (CLDFND) 1.0
INTRODUCING CISCO CLOUD ADMINISTRATION (CLDADM) 1.0
IMPLEMENTING AND TROUBLESHOOTING THE CISCO CLOUD INFRASTRUCTURE (CLDINF) 1.0
INTRODUCING CISCO DATA CENTER NETWORKING (DCICN) 6.0
INTRODUCING CISCO DATA CENTER NETWORKING TECHNOLOGIES (DCICT) 6.0
IMPLEMENTING CISCO DATA CENTER UNIFIED COMPUTING (DCUCI) V6.0
IMPLEMENTING CISCO DATA CENTER INFRASTRUCTURE (DCII) V6.0
IMPLEMENTING CISCO DATA CENTER VIRTUALIZATION AND AUTOMATION (DCVAI) V6.0
TROUBLESHOOTING CISCO DATA CENTER INFRASTRUCTURE (DCIT) V6.0
UNDERSTANDING CISCO CYBERSECURITY FUNDAMENTALS (SECFND)
IMPLEMENTING CISCO CYBERSECURITY OPERATIONS (SECOPS)
IMPLEMENTING CISCO EDGE NETWORK SECURITY SOLUTIONS (SENSS) 1.0
IMPLEMENTING CISCO SECURE ACCESS SOLUTIONS (SISAS) 1.0
BUILDING CISCO SERVICE PROVIDER NEXT GENERATION NETWORKS, PART 2 (SPNGN2) 1.2
DEPLOYING CISCO SERVICE PROVIDER NETWORK ROUTING (SPROUTE)
DEPLOYING CISCO SERVICE PROVIDER ADVANCED ROUTING (SPADVROUTE)
IMPLEMENTING CISCO SERVICE PROVIDER NEXT-GENERATION CORE NETWORK SERVICES (SPCORE)
IMPLEMENTING CISCO SERVICE PROVIDER NEXT-GENERATION EDGE NETWORK SERVICES (SPEDGE)
BUILDING CISCO SERVICE PROVIDER NEXT-GENERATION NETWORKS, PART 1 (SPNG1)
IMPLEMENTING CISCO VIDEO NETWORK DEVICES, PART 1 (CIVND1)
IMPLEMENTING CISCO VIDEO NETWORK DEVICES, PART 2 (CIVND2)
IMPLEMENTING CISCO IP TELEPHONY AND VIDEO, PART 1 (CIPTV1)
IMPLEMENTING CISCO IP TELEPHONY AND VIDEO, PART 2 (CIPTV2)
TROUBLESHOOTING CISCO IP TELEPHONY AND VIDEO (CTCOLLAB)
IMPLEMENTING CISCO COLLABORATION APPLICATIONS (CAPPS)
CITRIX CXM-302 DESIGN, DEPLOY AND MANAGE ENTERPRISE MOBILITY WITH XENMOBILE 9.0
CXD-210: CITRIX XENAPP AND XENDESKTOP ADMINISTRATION
CXD-310: CITRIX XENAPP AND XENDESKTOP ADVANCED ADMINISTRATION
CXD-400 DESIGNING APP AND DESKTOP SOLUTIONS WITH CITRIX XENAPP AND XENDESKTOP
CNS-220: CITRIX NETSCALER ESSENTIALS AND TRAFFIC MANAGEMENT
CNS-222: CITRIX NETSCALER ESSENTIALS AND UNIFIED GATEWAY
CNS-219: CITRIX NETSCALER TRAFFIC MANAGEMENT
CNS-221: CITRIX NETSCALER UNIFIED GATEWAY
NETSCALER SD-WAN
CNS-320: CITRIX NETSCALER ADVANCED TOPICS – SECURITY, MANAGEMENT, AND OPTIMIZATION
CXM-303 DEPLOYING ENTERPRISE MOBILITY SOLUTIONS WITH CITRIX XENMOBILE
CLOUDERA CLOUDERA’S ADMINISTRATOR
Cloud Security Alliance CCSK FOUNDATION
COMPTIA COMPTIA ADVANCED SECURITY PRACTITIONER (CASP+) (CAS-003)
COMPTIA NETWORK+ (N10-007)
COMPTIA SECURITY+ (SY0-501)
COMPTIA A+ 1001/1002 – APPROVED ONLY FOR THOSE CERTIFIED IN A+ 901/902 AND EARLIER
COMPTIA SERVER+ (SK0-004)
COMPTIA LINUX+ Powered by LPI (LX0-103/LX0-104)
COMPTIA CYBERSECURITY ANALYST (CySA+) (CS0-001)
COMPTIA CLOUD+ (CV0-002)
COMPTIA PENTEST+ (PT0-001)
LINUX+ (XK0-004)
CWNP CWTS - CERTIFIED WIRELESS TECHNOLOGY SPECIALIST
CWNA - CERTIFIED WIRELESS NETWORK ADMINISTRATOR
CWSP - CERTIFIED WIRELESS SECURITY PROFESSIONAL
CWDP – CERTIFIED WIRELESS DESIGN PROFESSIONAL
CWAP - CERTIFIED WIRELESS ANALYSIS PROFESSIONAL
CWS - CERTIFIED WIRELESS SPECIALIST
EC-COUNCIL CERTIFIED ETHICAL HACKER (CEH) V9
CERTIFIED SECURITY ANALYST (ECSA) V9
DISASTER RECOVERY PROFESSIONAL (EDRP)
COMPUTER HACKING FORENSICS INVESTIGATOR (CHFI)
CERTIFIED CHIEF INFORMATION SECURITY OFFICER (CCISO)
CERTIFIED SECURITY SPECIALIST (ECSS)
CERTIFIED INCIDENT HANDLER (ECIH)
CERTIFIED ENCRYPTION SPECIALIST (ECES)
EC-COUNCIL INFORMATION SECURITY MANAGEMENT (EISM)
CERTIFIED NETWORK DEFENDER (CND)
CERTIFIED NETWORK DEFENSE ARCHITECT (CNDA)
CYBER THREAT INTELLIGENCE ANALYST (CTIA)
ADVANCED PENETRATION TESTING (APT)
ENCASE ENCASE® EXAMINATION OF NTFS
IR250 - INCIDENT INVESTIGATION
DFIR370 - HOST INTRUSION METHODOLOGY AND INVESTIGATION
ENCASE EDISCOVERY V5
DF120 - FOUNDATIONS IN DIGITAL FORENSICS WITH ENCASE
DF125 - MOBILE DEVICE EXAMINATIONS WITH ENCASE
DF220 - NAVIGATING ENCASE VERSION 8
DF210 - BUILDING AN INVESTIGATION WITH ENCASE
DF310 - ENCASE™ CERTIFIED EXAMINER PREP
DF320 - ADVANCED ANALYSIS OF WINDOWS ARTIFACTS WITH ENCASE
DF410 - NTFS EXAMINATIONS WITH ENCASE
GOOGLE GOOGLE CLOUD PLATFORM FUNDAMENTALS FOR AWS PROFESSIONALS
ARCHITECTING WITH GOOGLE COMPUTE ENGINE
DATA ENGINEERING ON GOOGLE CLOUD PLATFORM
DEVELOPING APPLICATIONS WITH GOOGLE CLOUD PLATFORM
NETWORKING IN GOOGLE CLOUD PLATFORM
SECURITY IN GOOGLE CLOUD PLATFORM
GOOGLE’S APPLIED DIGITAL SKILLS
HP DESIGNING HP DATA CENTER AND CLOUD SOLUTIONS, REV. 15.11
DESIGNING HPE DATA CENTER AND CLOUD SOLUTIONS, REV. 16.11
DELTA - DESIGNING HPE DATA CENTER AND CLOUD SOLUTIONS, REV. 16.11
CREATING HPE SOFTWARE-DEFINED NETWORKS, REV. 15.41
BUILDING HP FLEXFABRIC DATA CENTERS, REV. 14.41
ARCHITECTING HP FLEXNETWORK SOLUTIONS, REV 14.21
DEPLOYING HP FLEXNETWORK CORE TECHNOLOGIES, REV 14.31
HP-UX SECURITY I
HP INTEGRITY VIRTUAL MACHINES V4.3 ADMINISTRATION
HP-UX LOGICAL VOLUME MANAGER
HP INTEGRITY VM V6 AND HP-UX VPARS V6 ADMINISTRATION
HP-UX PERFORMANCE AND TUNING
HP SERVICEGUARD I
HP SYSTEMS INSIGHT MANAGER
HPE ARCSIGHT MASTER ASE PREPARATION COURSE
ARCSIGHT ESM 6.5 ADVANCED ADMINISTRATOR
ARCSIGHT ESM 6.5 ADVANCED ANALYST
ARCSIGHT LOGGER - 6.0 ADMINISTRATION AND OPERATIONS
DYNAMIC APPLICATION TESTING WITH HP WEBINSPECT 10.3
HP FORTIFY STATIC CODE ANALYZER / SOFTWARE SECURITY CENTER 4.2
HP/ARUBA IMPLEMENTING ARUBA WLAN (IAW) 8
DESIGNING ADVANCED MOBILITY SOLUTIONS (DAMS)
CLEARPASS ESSENTIALS
SCALABLE WLAN DESIGN & IMPLEMENTATION (SWDI) V8
ADVANCED MOBILITY SOLUTIONS & TROUBLESHOOTING (AMST)
CLEARPASS ADVANCED (CPA)
DESIGNING ARUBA SOLUTIONS (DAS)
IMPLEMENTING ARUBA CAMPUS SWITCHING SOLUTIONS (IACSS)
CLEARPASS FUNDAMENTALS
ARUBA SWITCHING FUNDAMENTALS (ASF)
ISACA CISM EXAM REVIEW
CRISC EXAM REVIEW
CSX PRACTITIONER: IDENTIFICATION AND PROTECTION
CSX PRACTITIONER: RESPOND AND RECOVER
CSX PRACTITIONER BOOT CAMP
CSX PRACTITIONER: DETECTION
CISA EXAM REVIEW
ISC(2) (ISC)2TRAINING FOR CISSP
(ISC)2TRAINING FOR HCISPP
(ISC)2TRAINING FOR CISSP-ISSAP
(ISC)2TRAINING FOR SSCP
(ISC)2 TRAINING FOR CISSP-ISSEP
(ISC)2 TRAINING FOR CISSP-ISSMP
JUNIPER JUNIPER NETWORKS DESIGN FUNDAMENTALS (JNDF)
ADVANCED JUNOS ENTERPRISE ROUTING (AJER)
ADVANCED JUNOS ENTERPRISE SWITCHING (AJEX)
ADVANCED JUNOS SECURITY (AJSEC)
ADVANCED JUNOS SERVICE PROVIDER ROUTING (AJSPR)
JUNOS ENTERPRISE SWITCHING (JEX)
JUNOS INTERMEDIATE ROUTING (JIR)
NETWORK AUTOMATION USING CONTRAIL CLOUD (NACC)
JUNOS SERVICE PROVIDER SWITCHING (JSPX)
INTRODUCTION TO THE JUNOS OPERATING SYSTEM (IJOS)
JUNIPER NETWORKS DESIGN - DATA CENTER (JND-DC)
JUNOS EDGE SECURITY SERVICES (JESS)
JUNOS LAYER 3 VPNS (JL3V)
JUNOS LAYER 2 VPNS (JL2V)
JUNOS MPLS FUNDAMENTALS (JMF)
JUNOS FOR SECURITY PLATFORMS (JSEC)
JUNIPER NETWORKS DESIGN-SERVICE PROVIDER (JND-SP)
JUNIPER NETWORKS DESIGN FUNDAMENTALS (JNDF)
LINUX LINUX SECURITY
LINUX SYSTEM ADMINISTRATION
MASTERING THE LINUX COMMAND LINE
INTRODUCTION TO VMWARE ESXI
SOFTWARE DEFINED NETWORKING WITH OPENDAYLIGHT
ADVANCED LINUX SYSTEM ADMINISTRATION AND NETWORKING
ESSENTIALS OF SYSTEM ADMINISTRATION
PENETRATION TESTING WITH LINUX TOOLS
LINUX IN THE REAL WORLD
CENTOS SYSTEM ADMINISTRATOR PREP
LINUX ESSENTIALS
PUPPET FUNDAMENTALS
COMPLIANCE BASICS FOR DEVELOPERS
SOFTWARE DEFINED NETWORKING WITH OPENDAYLIGHT
OPEN SOURCE VIRTUALIZATION
LINUX ENTERPRISE AUTOMATION
ESSENTIALS OF OPENSTACK ADMINISTRATION
LINUX SECURITY
HIGH AVAILABILITY LINUX ARCHITECTURE
LINUX PERFORMANCE TUNING
LINUX SYSTEM ADMINISTRATION
ADVANCED LINUX SYSTEM ADMINISTRATION AND NETWORKING
INTRODUCTION TO LINUX, OPEN SOURCE DEVELOPMENT, AND GIT
INSIDE ANDROID: AN INTRO TO ANDROID INTERNALS
OPTIMIZING LINUX DEVICE DRIVERS FOR POWER EFFICIENCY
LINUX KERNEL DEBUGGING AND SECURITY
INTRODUCTION TO LINUX
INTRODUCTION TO CLOUD INFRASTRUCTURE TECHNOLOGIES
LINUX NETWORKING AND ADMINISTRATION
LINUX SECURITY FUNDAMENTALS
OPENSTACK ADMINISTRATION FUNDAMENTALS
SOFTWARE DEFINED NETWORKING FUNDAMENTALS
FUNDAMENTALS OF LINUX
MCAFEE MCAFEE ENDPOINT SECURITY 10.X ADMINISTRATION
MCAFEE ENDPOINT SECURITY UPGRADE
MCAFEE ADVANCED THREAT DETECTION ADMINISTRATION
MCAFEE VIRUSSCAN AND EPOLICY ORCHESTRATOR ADMINISTRATION
MCAFEE NETWORK SECURITY PLATFORM ADMINISTRATION
MCAFEE HOST INTRUSION PREVENTION SYSTEM ADMINISTRATION
MCAFEE DATA LOSS PREVENTION ENDPOINT ADMINISTRATION
MCAFEE EPOLICY ORCHESTRATOR ADMINISTRATION (5.10)
MCAFEE EPOLICY ORCHESTRATOR 5.10 ESSENTIALS
MCAFEE ENTERPRISE SECURITY MANAGER FOR ANALYSTS-I
MCAFEE ENTERPRISE SECURITY MANAGER FOR ENGINEERS-I
MCAFEE ADVANCED THREAT DETECTION ADMINISTRATION
MCAFEE VIRUSSCAN AND EPOLICY ORCHESTRATOR ADMINISTRATION
MCAFEE NETWORK SECURITY PLATFORM ADMINISTRATION
MCAFEE HOST INTRUSION PREVENTION SYSTEM ADMINISTRATION
MCAFEE DATA LOSS PREVENTION ENDPOINT ADMINISTRATION
SECURITY INFORMATION AND EVENT MANAGEMENT (SIEM) ADMINISTRATION
MICROSOFT INSTALLING AND CONFIGURING WINDOWS 10
DEPLOYING AND MANAGING WINDOWS 10 USING ENTERPRISE SERVICES
INSTALLING AND CONFIGURING WINDOWS® 7 CLIENT
TROUBLESHOOTING AND SUPPORTING WINDOWS® 7 IN THE ENTERPRISE
PLANNING AND MANAGING WINDOWS® 7 DESKTOP DEPLOYMENTS AND ENVIRONMENTS
DEPLOYING WINDOWS DESKTOPS AND ENTERPRISE APPLICATIONS
SUPPORTING AND TROUBLESHOOTING WINDOWS 10
NETWORKING FUNDAMENTALS
SECURITY FUNDAMENTALS
CONFIGURING WINDOWS® 8.1
SUPPORTING WINDOWS® 8.1
WINDOWS SERVER ADMINISTRATION FUNDAMENTALS
INSTALLATION, STORAGE, AND COMPUTE WITH WINDOWS SERVER 2016
NETWORKING WITH WINDOWS SERVER 2016
IDENTITY WITH WINDOWS SERVER 2016
INSTALLING AND CONFIGURING WINDOWS SERVER 2012
ADMINISTERING WINDOWS SERVER 2012
CONFIGURING ADVANCED WINDOWS SERVER 2012 SERVICES
DESIGNING AND IMPLEMENTING A SERVER INFRASTRUCTURE
IMPLEMENTING AN ADVANCED SERVER INFRASTRUCTURE
CORE SOLUTIONS OF MICROSOFT EXCHANGE SERVER 2013
ADVANCED SOLUTIONS OF MICROSOFT EXCHANGE SERVER 2013
DEPLOYING ENTERPRISE VOICE WITH SKYPE FOR BUSINESS 2015
ADMINISTERING MICROSOFT EXCHANGE SERVER 2016
CORE SOLUTIONS OF SKYPE FOR BUSINESS 2015
DESIGNING AND DEPLOYING MICROSOFT EXCHANGE SERVER 2016
SERVER VIRTUALIZATION WITH WINDOWS SERVER HYPER-V AND SYSTEM CENTER
ADMINISTERING SYSTEM CENTER CONFIGURATION MANAGER AND INTUNE
MONITORING AND OPERATING A PRIVATE CLOUD
CONFIGURING AND DEPLOYING A PRIVATE CLOUD
ENABLING AND MANAGING OFFICE 365
ADMINISTERING A SQL DATABASE INFRASTRUCTURE
DEVELOPING MICROSOFT AZURE SOLUTIONS
IMPLEMENTING MICROSOFT AZURE INFRASTRUCTURE SOLUTIONS
SECURING WINDOWS SERVER 2016
DESIGNING AND IMPLEMENTING CLOUD DATA PLATFORM SOLUTIONS
DEPLOYING VOICE WORKLOADS FOR SKYPE FOR BUSINESS ONLINE AND SERVER 2015
DESIGNING A DATA SOLUTION WITH MICROSOFT SQL SERVER
VIRTUALIZING ENTERPRISE DESKTOPS AND APPS
WINDOWS SERVER 2012: TECHNICAL OVERVIEW
WINDOWS 10 FEATURES FOR A MOBILE WORKFORCE
WINDOWS SERVER 2012 TRAINING: NETWORKING
WINDOWS SERVER 2012: IDENTITY AND ACCESS
WINDOWS SERVER 2012: STORAGE
DEVELOPING MICROSOFT SQL SERVER DATABASES
DESIGNING DATABASE SOLUTIONS FOR SQL SERVER
OFFENSIVE SECURITY PENETRATION TESTINGWITH KALI LINUX
ADVANCED WINDOWS EXPLOITATION
OFFENSIVE SECURITY WIRELESS ATTACKS (WIFU)
CRACKING THE PERIMETER (CTP)
ADVANCED WEB ATTACKS AND EXPLOITATION
METASPLOIT UNLEASHED
OFFENSIVE SECURITY PENETRATIONTESTING LAB
PALO ALTO FIREWALL 9.0 ESSENTIALS: CONFIGURATION AND MANAGEMENT (EDU-210)
PANORAMA 8.1: MANAGING FIREWALLS AT SCALE (EDU-220)
RED HAT RED HAT SYSTEM ADMINISTRATION I (RH124)
RED HAT SYSTEM ADMINISTRATION II (RH134)
RED HAT OPENSTACK ADMINISTRATION I (CL110)
RED HAT OPENSTACK ADMINISTRATION II (CL210)
RED HAT SYSTEM ADMINISTRATION III (RH254)
RED HAT OPENSTACK SYSTEM ADMINISTRATION III (CL310)
RED HAT CLOUDFORMS HYBRID CLOUD MANAGEMENT (CL220)
OPENSHIFT ENTERPRISE ADMINISTRATION (DO280)
RED HAT GLUSTER STORAGE ADMINISTRATION (RH236)
RED HAT VIRTUALIZATION ADMINISTRATION (RH318)
RED HAT JBOSS IN DATA VIRTUALIZATION ADMINISTRATION (JB450)
JBOSS ENTERPRISE APPLICATION DEVELOPMENT (JB225)
RED HAT ENTERPRISE DEPLOYMENT AND SYSTEMS MANAGEMENT (RH401)
RED HAT SATELLITE 6 ADMINISTRATION (RH403)
RED HAT ENTERPRISE LINUX DIAGNOSTICS AND TROUBLESHOOTING
RED HAT ENTERPRISE PERFORMANCE TUNING (RH442)
RED HAT HIGH AVAILABILITY CLUSTERING (RH436)
JBOSS APPLICATION ADMINISTRATION I (JB248)
RED HAT SECURITY: Linux in Physical, Virtual, and Cloud (RH415)
AUTOMATION WITH ANSIBLE II: ANSIBLE TOWER (DO409)
RIVERBED WAN200 OPTIMIZATION ESSENTIALS
HCB200 HYPER-CONVERGED BRANCH ESSENTIALS
NPM200 PERFORMANCE MONITORING ESSENTIALS
RIVERBED APM200 APPLICATION PERFORMANCE MONITORING ESSENTIALS
NOS200 NETWORK PLANNING AND CONFIGURATION MANAGEMENT
WAN310 OPTIMIZING ENTERPRISE APPLICATIONS AND PROTOCOLS
WAN350 IMPLEMENTING ENTERPRISE OPTIMIZATION ARCHITECTURES
NOS200 NETWORK PLANNING AND CONFIGURATION MANAGEMENT
CASCADE CONFIGURATION & OPERATIONS (CASC)
CASCADE SHARK/PILOT CONFIGURATION & OPERATIONS (CASP)
STEELHEAD APPLIANCE DEPLOYMENT & MANAGEMENT (SADM)
STEELHEAD MOBILE INSTALLATION & CONFIGURATION (SMC)
STEELHEAD APPLIANCE OPERATIONS & L1/L2 TROUBLESHOOTING (SAO)
CENTRAL MANAGEMENT CONSOLE CONFIGURATION & OPERATIONS (CMC)
INTERCEPTOR APPLIANCE INSTALLATION & CONFIGURATION (INTC)
STEELHEAD APPLIANCE ADVANCED DEPLOYMENT & TROUBLESHOOTING (SADT)
RCPE PROFESSIONAL BRANCH & DATACENTER NETWORK CONFIGURATION
RCPE PROFESSIONAL NETWORK PLANNING & CONFIGURATION MANAGEMENT
RCPE PROFESSIONAL BRANCH VIRTUALIZATION & STORAGE
RCPE PROFESSIONAL APPLICATION OPTIMIZATION
RCPE PROFESSIONAL DATACENTER OPTIMIZATION ARCHITECTURE
RCPE ASSOCIATE NETWORK & INFRASTRUCTURE VISIBILITY
RCPE PROFESSIONAL FLOW VISIBILITY & ANALYSIS
RCPE PROFESSIONAL USER OPTIMIZATION ARCHITECTURE
RCPE ASSOCIATE NETWORK CONFIGURATION
RCPE PROFESSIONAL AGGREGATE VISIBILITY
RCPE ASSOCIATE WAN OPTIMIZATION
SABSA SABSA FOUNDATION MODULES (F1 & F2)
MODULE A1 – ADVANCED SABSA RISK ASSURANCE & GOVERNANCE
MODULE A3 – ADVANCED SABSA ARCHITECTURE & DESIGN
SANS NETWARS - TOURNAMENT
NETWARS: CONTINUOUS
AUD507: AUDITING & MONITORING NETWORKS, PERIMETERS & SYSTEMS
FOR508: ADVANCED COMPUTER FORENSIC ANALYSIS AND INCIDENT RESPONSE
FOR518: MAC FORENSIC ANALYSIS
FOR578: CYBER THREAT INTELLIGENCE
FOR526: MEMORY FORENSICS IN-DEPTH
FOR572: ADVANCED NETWORK FORENSICS AND ANALYSIS
FOR585: ADVANCED SMARTPHONE AND MOBILE DEVICE FORENSICS
FOR610: REVERSE-ENGINEERING MALWARE: MALWARE ANALYSIS TOOLS AND TECHNIQUES
ICS515: ICS ACTIVE DEFENSE AND INCIDENT RESPONSE
ICS410: ICS/SCADA SECURITY ESSENTIALS
ICS456: ESSENTIALS FOR NERC CRITICAL INFRASTRUCTURE PROTECTION
MGT414: SANS +S TRAINING PROGRAM FOR THE CISSP® CERTIFICATION EXAM
MGT512: SANS SECURITY LEADERSHIP ESSENTIALS FOR MANAGERS WITH KNOWLEDGE COMPRESSION
MGT514: IT SECURITY STRATEGIC PLANNING, POLICY AND LEADERSHIP
LEG523: LAW OF DATA SECURITY AND INVESTIGATIONS
SEC301: INTRO TO INFORMATION SECURITY
SEC401: SECURITY ESSENTIALS BOOTCAMP STYLE
SEC440: CRITICAL SECURITY CONTROLS: PLANNING, IMPLEMENTING AND AUDITING
SEC501: ADVANCED SECURITY ESSENTIALS - ENTERPRISE DEFENDER
SEC503: INTRUSION DETECTION IN-DEPTH
SEC504: HACKER TOOLS, TECHNIQUES, EXPLOITS AND INCIDENT HANDLING
SEC505: SECURING WINDOWS WITH THE CRITICAL SECURITY CONTROLS
SEC506: SECURING LINUX/UNIX
SEC511: CONTINUOUS MONITORING AND SECURITY OPERATIONS
SEC524: CLOUD SECURITY FUNDAMENTALS
SEC542: WEB APP PENETRATION TESTING AND ETHICAL HACKING
SEC546: IPV6 ESSENTIALS
SEC550: ACTIVE DEFENSE, OFFENSIVE COUNTERMEASURES AND CYBER DECEPTION
SEC560: NETWORK PENETRATION TESTING AND ETHICAL HACKING
SEC561: INTENSE HANDS-ON PEN TESTING SKILL DEVELOPMENT (WITH SANS NETWARS)
SEC562: CYBERCITY HANDS-ON KINETIC CYBER RANGE EXERCISE
SEC566: IMPLEMENTING AND AUDITING THE CRITICAL SECURITY CONTROLS - IN-DEPTH
SEC573: PYTHON FOR PENETRATION TESTERS
SEC575: MOBILE DEVICE SECURITY AND ETHICAL HACKING
SEC579: VIRTUALIZATION AND PRIVATE CLOUD SECURITY
SEC580: METASPLOIT KUNG FU FOR ENTERPRISE PEN TESTING
SEC617: WIRELESS ETHICAL HACKING, PENETRATION TESTING, AND DEFENSES
SEC642: ADVANCED WEB APP PENETRATION TESTING AND ETHICAL HACKING
SEC660: ADVANCED PENETRATION TESTING, EXPLOIT WRITING, AND ETHICAL HACKING
SEC760: ADVANCED EXPLOIT DEVELOPMENT FOR PENETRATION TESTERS
FOR500: WINDOWS FORENSIC ANALYSIS
SEC573: AUTOMATING INFORMATION SECURITY WITH PYTHON
SEC599: DEFEATING ADVANCED ADVERSARIES - PURPLE TEAM TACTICS & KILL CHAIN DEFENSES
SEC555: SIEM WITH TACTICAL ANALYTICS
SEC530: DEFENSIBLE SECURITY ARCHITECTURE
SPLUNK USING SPLUNK ENTERPRISE SECURITY
SYMANTEC SYMANTEC DATA CENTER SECURITY – SERVER ADVANCED 6.7 ADMINISTRATION – MUST COMPLETE ALL MODULES FOR CEUS
ENDPOINT PROTECTION 14: CONFIGURE AND PROTECT
SYMANTEC ENDPOINT PROTECTION 14: PLAN AND IMPLEMENT
SYMANTEC ENDPOINT PROTECTION 14: MANAGE AND ADMINISTER
SYMANTEC ENDPOINT PROTECTION 14: MAINTAIN AND TROUBLESHOOT
SYMANTEC DATA LOSS PREVENTION 15.0 ADMINISTRATION
SYMANTEC DATA LOSS PREVENTION 15.0 INSTALL AND DEPLOY
SYMANTEC DATA LOSS PREVENTION 15.0 DIFFERENCES
SYMANTEC IDENTITY AND AUTHENTICATION SERVICES R1
PACKETSHAPER 11.9.1 ADMINISTRATION
SYMANTEC PROXYSG 6.6 BASIC ADMINISTRATION
SYMANTEC PROXYSG 6.6 ADVANCED ADMINISTRATION
SYMANTEC SECURITY ANALYTICS 7.2: ADMINISTRATOR
SYMANTEC SECURITY ANALYTICS 7.2: PROFESSIONAL
SSL VISIBILITY 5.0 ADMINISTRATION
CLOUDSOC ADMINISTRATION R2
CLOUDSOC DIFFERENCES R2.1.1
SYMANTEC ADVANCED THREAT PROTECTION 3.0: INCIDENT RESPONSE
SYMANTEC MESSAGING GATEWAY 10.6 ADMINISTRATION
SYMANTEC CONTROL COMPLIANCE SUITE (CCS) 11.0: ADMINISTRATION
EMAIL SECURITY.CLOUD ADMINISTRATION R1
VMWARE VMWARE HORIZON 7: INSTALL, CONFIGURE, MANAGE [V7]
VMWARE HORIZON 7: TROUBLESHOOTING AND PERFORMANCE OPTIMIZATION [V7]
VMWARE NSX-T: INSTALL, CONFIGURE, MANAGE [V2.2]
VMWARE NSX-T DATA CENTER: INSTALL, CONFIGURE, MANAGE [V2.4]
VMWARE NSX-T DATA CENTER: TROUBLESHOOTING AND OPERATIONS [V2.4]
VMWARE NSX-T DATA CENTER: DESIGN [V2.4]
VMWARE VSPHERE: DESIGN WORKSHOP [V6.5]
VMWARE HORIZON 7: DESIGN WORKSHOP [V7.0]
HORIZON: DESIGN AND DEPLOY [V6]
VCA-DBT
VMWARE NSX: TROUBLESHOOTING AND OPERATIONS [V6.4]
VMWARE NSX: INSTALL, CONFIGURE, MANAGE [V6.4]
VMWARE VSPHERE: INSTALL, CONFIGURE, MANAGE [V6.7]
VMWARE VSPHERE: OPTIMIZE AND SCALE [V6.7]
VMWARE VSPHERE: SKILLS FOR PUBLIC SECTOR ADMINISTRATORS [V6.7]
VMWARE VSPHERE: TROUBLESHOOTING WORKSHOP [V6.7]
VMWARE ADVANCED SKILLS FOR VSPHERE PROFESSIONAL WORKSHOP [V6.7]
VMWARE WORKSPACE ONE: DEPLOY AND MANAGE [V19.X]
VMWARE WORKSPACE ONE: INTEGRATING THE DIGITAL WORKSPACE [V19.X]
VMWARE WORKSPACE ONE: SKILLS FOR UNIFIED ENDPOINT MANAGEMENT [V19.X]
NewsletterSignup-Solid
LeverageCertification