CompTIA ​A+

Pre-approved Training for CompTIA ​A+ Continuing Education Units (CEUs)

Note: Approved training courses in this document are subject to change without prior notification. Training submitted based on prior approval will remain valid. Training submitted after the date on this document must meet this documents training requirements.

Training approved in this document is based on the CompTIA A+ - 901/902 objectives.

CERTIFICATION PROVIDER COURSE TITLE
AMAZON WEB SERVICES SECURITY OPERATIONS ON AWS
AWS SECURITY FUNDAMENTALS
MIGRATING TO AWS
SYSTEMS OPERATIONS ON AWS
DEVOPS ENGINEERING ON AWS
DEVELOPING ON AWS
ARCHITECTING ON AWS
ADVANCED ARCHITECTING ON AWS
EXAM READINESS WORKSHOP: AWS CERTIFIED SOLUTIONS ARCHITECT - PROFESSIONAL
EXAM READINESS WORKSHOP: AWS CERTIFIED SOLUTIONS ARCHITECT - ASSOCIATE
APPLE MAC INTEGRATION BASICS 10.11
MACOS SUPPORT ESSENTIALS 10.12 (SIERRA 101)
MACOS SUPPORT ESSENTIALS 10.11 (EL CAPITAN 101)
MAC INTEGRATION BASICS 10.12
APPLE SERVICE FUNDAMENTALS
APPLE CERTIFIED MAC TECHNICIAN (ACMT)
APPLE CERTIFIED IOS TECHNICIAN (ACIT)
AVAYA IP OFFICE BASIC INTEGRATION AND CONFIGURATION (7720C)
INTRODUCTION TO SESSION INITIATION PROTOCOL (SIP) V2.0
MERIDIAN 1 OPTION 11C INSTALLATION, MAINTENANCE, AND DATABASE - COMMUNICATION SERVER 1000 RELEASE 5.5
STACKABLE ERS AND VSP INSTALLATION, CONFIGURATION, AND MAINTENANCE
AVAYA COMMUNICATION SERVER 1000 DIALING PLAN DESIGN AND IP PEER NETWORKING
ERS 8800/8600 INSTALLATION AND CONFIGURATION
BROCADE BROCADE PROFESSIONAL IP ADMINISTRATOR (BPIPA 200)
NETWORK INDUSTRY PROTOCOLS (NIP 200) ​
CHECK POINT CHECK POINT CERTIFIED SECURITY ADMINISTRATOR (CCSA) R77.30
CHECK POINT CERTIFIED SECURITY ADMINISTRATOR (CCSA) R80
SECURITY ENGINEERING (CHECK POINT CERTIFIED SECURITY EXPERT (CCSE) R77.30)
THREAT PREVENTION
SECURE WEB GATEWAY
MDSM WITH VSX (MULTI-DOMAIN SECURITY MANAGEMENT WITH VIRTUAL SYSTEM EXTENSION)
CHECK POINT CERTIFIED SECURITY MASTER (CCSM) R77.30
CHECK POINT MANAGED SECURITY EXPERT (CCMSE)
CISCO SECURING CISCO NETWORKS WITH THREAT DETECTION AND ANALYSIS (SCYBER) 1
INTERCONNECTING CISCO NETWORKING DEVICES, PART 1 (ICND1) 3.0
DESIGNING WITH CISCO NETWORK PROGRAMMABILITY V2.0
DESIGNING WITH CISCO NETWORK PROGRAMMABILITY FOR ACI V1.10
IMPLEMENTING CISCO NETWORK PROGRAMMABILITY V2.0
IMPLEMENTING CISCO NETWORK PROGRAMMABILITY FOR ACI V1.1
IMPLEMENTING CISCO SECURE MOBILITY SOLUTIONS (SIMOS) 1.0
IMPLEMENTING CISCO SECURE ACCESS CONTROL SYSTEM V5.2 
DESIGNING FOR CISCO INTERNETWORK SOLUTIONS (DESGN) V3.0
DESIGNING THE CISCO CLOUD (CLDDES) 1.0
AUTOMATING THE CISCO ENTERPRISE CLOUD (CLDAUT) 1.0 
IMPLEMENTING CISCO THREAT CONTROL SOLUTIONS (SITCS) 1.5
DEPLOYING CISCO WIRELESS ENTERPRISE NETWORKS (WIDEPLOY) 1.0
SECURING CISCO WIRELESS ENTERPRISE NETWORKS (WISECURE) 1.0
MANAGING INDUSTRIAL NETWORKS FOR MANUFACTURING WITH CISCO TECHNOLOGIES (IMINS2) 1.3
SUPPORTING CISCO DATA CENTER SYSTEM DEVICES (DCTECH) 2.0
DESIGNING CISCO WIRELESS ENTERPRISE NETWORKS (WIDESIGN) 1.0
IMPLEMENTING CISCO WIRELESS NETWORK FUNDAMENTALS (WIFUND) 1.0
IMPLEMENTING CISCO NETWORK SECURITY (IINS) 3.0
INTERCONNECTING CISCO NETWORKING DEVICES, PART 2 (ICND2) 3.0
INTERCONNECTING CISCO NETWORKING DEVICES: ACCELERATED (CCNAX) 3.0
DESIGNING CISCO NETWORK SERVICE ARCHITECTURES (ARCH) 3.0
TROUBLESHOOTING AND MAINTAINING CISCO IP NETWORKS (TSHOOT) 2.0
IMPLEMENTING CISCO IP SWITCHED NETWORKS (SWITCH) 2.0
IMPLEMENTING CISCO IP ROUTING (ROUTE) 2.0
UNDERSTANDING CISCO CLOUD FUNDAMENTALS (CLDFND) 1.0
INTRODUCING CISCO CLOUD ADMINISTRATION (CLDADM) 1.0
IMPLEMENTING AND TROUBLESHOOTING THE CISCO CLOUD INFRASTRUCTURE (CLDINF) 1.0
INTRODUCING CISCO DATA CENTER NETWORKING (DCICN) 6.0
INTRODUCING CISCO DATA CENTER NETWORKING TECHNOLOGIES (DCICT) 6.0
IMPLEMENTING CISCO DATA CENTER UNIFIED COMPUTING (DCUCI) V6.0
IMPLEMENTING CISCO DATA CENTER INFRASTRUCTURE (DCII) V6.0
IMPLEMENTING CISCO DATA CENTER VIRTUALIZATION AND AUTOMATION (DCVAI) V6.0
TROUBLESHOOTING CISCO DATA CENTER INFRASTRUCTURE (DCIT) V6.0
UNDERSTANDING CISCO CYBERSECURITY FUNDAMENTALS (SECFND)
IMPLEMENTING CISCO CYBERSECURITY OPERATIONS (SECOPS)
IMPLEMENTING CISCO EDGE NETWORK SECURITY SOLUTIONS (SENSS) 1.0
IMPLEMENTING CISCO SECURE ACCESS SOLUTIONS (SISAS) 1.0
BUILDING CISCO SERVICE PROVIDER NEXT GENERATION NETWORKS, PART 2 (SPNGN2) 1.2
BUILDING CISCO SERVICE PROVIDER NEXT GENERATION NETWORKS, PART 1 (SPNGN1) 1.2
CITRIX CXM-302 DESIGN, DEPLOY AND MANAGE ENTERPRISE MOBILITY WITH XENMOBILE 9.0
CXD-210: CITRIX XENAPP AND XENDESKTOP ADMINISTRATION
CXD-310: CITRIX XENAPP AND XENDESKTOP ADVANCED ADMINISTRATION
CXD-400 DESIGNING APP AND DESKTOP SOLUTIONS WITH CITRIX XENAPP AND XENDESKTOP
CNS-220: CITRIX NETSCALER ESSENTIALS AND TRAFFIC MANAGEMENT
CNS-222: CITRIX NETSCALER ESSENTIALS AND UNIFIED GATEWAY
CNS-219: CITRIX NETSCALER TRAFFIC MANAGEMENT
CNS-221: CITRIX NETSCALER UNIFIED GATEWAY
NETSCALER SD-WAN
CNS-320: CITRIX NETSCALER ADVANCED TOPICS – SECURITY, MANAGEMENT, AND OPTIMIZATION
CXM-303 DEPLOYING ENTERPRISE MOBILITY SOLUTIONS WITH CITRIX XENMOBILE
CLOUDERA CLOUDERA’S APACHE HADOOP
Cloud Security Alliance CCSK FOUNDATION
CCSK PLUS
COMPTIA COMPTIA ADVANCED SECURITY PRACTITIONER (CASP+) (CAS-003)
COMPTIA NETWORK+ (N10-007)
COMPTIA SECURITY+ (SY0-501)
COMPTIA A+ 901/902 – APPROVED ONLY FOR THOSE CERTIFIED IN A+ 801/802 AND EARLIER
COMPTIA SERVER+ (SK0-004)
COMPTIA LINUX+ Powered by LPI (LX0-103/LX0-104)
COMPTIA CYBERSECURITY ANALYST (CySA+) (CS0-001)
COMPTIA CLOUD+ (CV0-002)
COMPTIA PENTEST+ (PT0-001)
CWNP CWTS - CERTIFIED WIRELESS TECHNOLOGY SPECIALIST
CWNA - CERTIFIED WIRELESS NETWORK ADMINISTRATOR
CWSP - CERTIFIED WIRELESS SECURITY PROFESSIONAL
CWDP – CERTIFIED WIRELESS DESIGN PROFESSIONAL
CWAP - CERTIFIED WIRELESS ANALYSIS PROFESSIONAL
DELL Dell SC Series Installation and Configuration
Introduction to Dell PS Series Storage Arrays
Dell PS Series Storage Admin and Data Protection Tools
Integrating vSphere with Dell PS Series Storage
Dell SC Storage Center Administration and Management
Dell PS Series vSphere Integration
Dell Storage Networking Configuration
Dell Networking Planning
Dell Networking Installation and Configuration
Dell Networking Interoperability
Dell Networking Fundamentals-Routing
Dell Networking Fundamentals - Switching
Dell Networking Data Center Advanced Features & Administration
Dell Networking Campus Design, Advanced Features and Configuration
Dell Networking Fast Track from Cisco to Dell OS 9
Dell Campus Networking N-Series Features & Basic Administration
Dell Networking Data Center Overview & Basic Administration
Dell OpenManage Essentials Administration
Optimizing and Managing Dell PowerEdge Blade Server Solutions
Optimizing and Managing Dell PowerEdge Server Solutions
EC-COUNCIL CERTIFIED ETHICAL HACKER (CEH) V9
CERTIFIED SECURITY ANALYST (ECSA) V9
NETWORK SECURITY ADMINISTRATOR (ENSA)
DISASTER RECOVERY PROFESSIONAL (EDRP)
LICENSED PENETRATION TESTER (LPT)
COMPUTER HACKING FORENSICS INVESTIGATOR (CHFI)
CERTIFIED CHIEF INFORMATION SECURITY OFFICER (CCISO)
CERTIFIED SECURITY SPECIALIST (ECSS)
CERTIFIED INCIDENT HANDLER (ECIH)
CERTIFIED ENCRYPTION SPECIALIST (ECES)
CERTIFIED VOIP PROFESSIONAL (ECVP)
EC-COUNCIL INFORMATION SECURITY MANAGEMENT (EISM)
CAST 611V3 ADVANCED PENETRATION TESTING
CAST 616 SECURING WINDOWS INFRASTRUCTURE
CAST 612 ADVANCED MOBILE FORENSICS AND SECURITY
CAST 613 HACKING AND HARDENING CORPORATE WEB APP/WEB SITE
CAST 614 ADVANCED NETWORK DEFENSE
CERTIFIED NETWORK DEFENDER (CND)
CERTIFIED NETWORK DEFENSE ARCHITECT (CNDA)
EMC AVAMAR INTEGRATION AND PERFORMANCE MANAGEMENT
AVAMAR MANAGEMENT
BACKUP RECOVERY SOLUTIONS – AVAMAR TO DATA DOMAIN INTEGRATION
BACKUP RECOVERY SOLUTIONS – MICROSOFT EXCHANGE INTEGRATION
BACKUP RECOVERY SOLUTIONS – MICROSOFT SHAREPOINT INTEGRATION
BACKUP RECOVERY SOLUTIONS – NDMP INTEGRATION
BACKUP RECOVERY SOLUTIONS – NETWORKER TO AVAMAR INTEGRATION
BACKUP RECOVERY SOLUTIONS – NETWORKER TO DATA DOMAIN INTEGRATION
BACKUP RECOVERY SOLUTIONS – ORACLE INTEGRATION
BACKUP RECOVERY SOLUTIONS – VMWARE INTEGRATION
BUSINESS CONTINUITY SOLUTIONS DESIGNER (BCSD) FOR RECOVERPOINT
BUSINESS CONTINUITY SOLUTIONS DESIGNER (BCSD) FOR VPLEX
CELERRA NS SERIES INSTALLATION AND MAINTENANCE
CELERRA UNIFIED QUICKSTART: BASIC MANAGEMENT OVERVIEW
CELERRA UNIFIED QUICKSTART: INSTALLATION AND CONFIGURATION USING CSA
CELERRA UNIFIED QUICKSTART: NS-120 HARDWARE OVERVIEW & INSTALLATION
CELERRA UNIFIED QUICKSTART: NS-480 HARDWARE OVERVIEW & INSTALLATION
CELERRA UNIFIED QUICKSTART: NX4 HARDWARE OVERVIEW & INSTALLATION
CELERRA UNIFIED QUICKSTART: PRODUCT INSTALLATION AND CONFIGURATION OVERVIEW
CELERRA UNIFIED QUICKSTART: PROVISIONING FOR FCCONNECTED HOSTS
CENTERA FUNDAMENTALS
CENTERA HARDWARE CONFIGURATIONS
CENTERA INSTALLATION AND MAINTENANCE
CENTERA TOOLS AND INSTALLATION
CENTERA UNIVERSAL ACCESS
CENTERA UPGRADES AND MAINTENANCE
CLARIION BASIC MANAGEMENT
CLARIION CX3 INSTALLATION DIFFERENCES
CLARIION FOUNDATIONS
CLARIION HARDWARE
CLARIION INSTALLATION AND MAINTENANCE
CLOUD INFRASTRUCTURE PLANNING AND DESIGN
CLOUD SERVICES PLANNING AND DESIGN
CONNECTIVITY PROTOCOLS
EMC AVAILABILITY INFRASTRUCTURE SOLUTIONS AND DESIGN
EMC BACKUP RECOVERY INFRASTRUCTURE SOLUTIONS
EMC BACKUP RECOVERY SOLUTIONS DESIGN
ISILON FUNDAMENTALS
ISILON HARDWARE BASICS AND GUIDELINES
ISILON HARDWARE INSTALLATION
ISILON HARDWARE MAINTENANCE
ISILON INFRASTRUCTURE SOLUTIONS
ISILON INITIAL CONFIGURATION
ISILON SOLUTION DESIGN
NETWORKER INSTALLATION, CONFIGURATION AND ADMINISTRATION
RECOVERPOINT FUNDAMENTALS
SAN MANAGEMENT
VMAX FAMILY INSTALLATION AND MAINTENANCE
VMAX1 AND VMAX2 HARDWARE FUNDAMENTALS
VMAX3 - UNISPHERE FOR VMAX IMPLEMENTATION AND MANAGEMENT
VMAX3 CONFIGURATION MANAGEMENT
VMAX3 FUNDAMENTALS
VMAX3 HARDWARE FUNDAMENTALS
VMAX3 SECURITY CONCEPTS
VNX APPLICATION PROTECTION SUITE FUNDAMENTALS
VNX BASIC HARDWARE MAINTENANCE
VNX HARDWARE FUNDAMENTALS
VNX INSTALLATION AND INITIAL CONFIGURATION
XTREMIO HARDWARE FUNDAMENTALS
ENCASE DIGITAL MEDIA – ACQUISITION AND TRIAGE
ENCASE V7 FORENSICS AND ENTERPRISE FUNDAMENTALS
ENCASE® V7 COMPUTER FORENSICS I
INCIDENT INVESTIGATION
ENCASE® ENTERPRISE EXAMINATIONS
ENCASE® EXAMINATIONS OF THE MACINTOSH OPERATING SYSTEMS
HOST INTRUSION METHODOLOGY AND INVESTIGATION
ENCASE® CYBERSECURITY AND ANALYTICS V5
ENCASE® EXAMINATION OF NTFS
ENCASE® ADVANCED INTERNET EXAMINATIONS
ENCASE® ADVANCED COMPUTER FORENSICS
GOOGLE GOOGLE CLOUD PLATFORM FUNDAMENTALS: CORE INFRASTRUCTURE
ARCHITECTING WITH GOOGLE CLOUD PLATFORM: INFRASTRUCTURE
GOOGLE CLOUD PLATFORM FOR SYSTEMS OPERATIONS PROFESSIONALS
GOOGLE CLOUD FUNDAMENTALS: BIG DATA & MACHINE LEARNING
DATA ENGINEERING ON GOOGLE CLOUD PLATFORM
G SUITE ADMINISTRATOR FUNDAMENTALS
GOOGLE CLOUD PLATFORM FUNDAMENTALS FOR AWS PROFESSIONALS
HP DESIGNING HP DATA CENTER AND CLOUD SOLUTIONS, REV. 15.11
DESIGNING HPE DATA CENTER AND CLOUD SOLUTIONS, REV. 16.11
DELTA - DESIGNING HPE DATA CENTER AND CLOUD SOLUTIONS, REV. 16.11
CREATING HPE SOFTWARE-DEFINED NETWORKS, REV. 15.41
BUILDING HP FLEXFABRIC DATA CENTERS, REV. 14.41
ARCHITECTING HP FLEXNETWORK SOLUTIONS, REV 14.21
DEPLOYING HP FLEXNETWORK CORE TECHNOLOGIES, REV 14.31
HP-UX SECURITY I
HP INTEGRITY VIRTUAL MACHINES V4.3 ADMINISTRATION
HP-UX LOGICAL VOLUME MANAGER
HP INTEGRITY VM V6 AND HP-UX VPARS V6 ADMINISTRATION
HP-UX PERFORMANCE AND TUNING
HP SERVICEGUARD I
HP SYSTEMS INSIGHT MANAGER
HPE ARCSIGHT MASTER ASE PREPARATION COURSE
ARCSIGHT ESM 6.5 ADVANCED ADMINISTRATOR
ARCSIGHT ESM 6.5 ADVANCED ANALYST
ARCSIGHT LOGGER - 6.0 ADMINISTRATION AND OPERATIONS
DYNAMIC APPLICATION TESTING WITH HP WEBINSPECT 10.3
HP FORTIFY STATIC CODE ANALYZER / SOFTWARE SECURITY CENTER 4.2
HP/ARUBA MOBILE FIRST NETWORK DESIGN
AIRWAVE WIRELESS MANAGEMENT SUITE INSTALLATION, CONFIGURATION AND USE (AICU) 8.2
ADVANCED TROUBLESHOOTING (ATS)
IMPLEMENTING ARUBA WLAN (IAW) 8
IMPLEMENTING ARUBA WLAN (IAW) 6.4
ARUBA MOBILITY BOOT CAMP 6.4
CLEARPASS ESSENTIALS (CPE) 6.5
SCALABLE WLAN DESIGN AND IMPLEMENTATION (SWDI) 6.4
IBM SOFTLAYER FUNDAMENTALS
IBM SECURITY QRADAR SIEM 7.2 ADMINISTRATION AND CONFIGURATION
IBM SECURITY QRADAR SIEM FOUNDATIONS
IBM SECURITY DIRECTORY SERVER 6.3.1 SYSTEM ADMINISTRATION
IBM SECURITY IDENTITY MANAGER 6.0 BASIC ADMINISTRATION
IBM SECURITY QRADAR INCIDENT FORENSICS CONFIGURATION AND USAGE
WEB APPLICATION SECURITY FUNDAMENTALS
IBM SECURITY ACCESS MANAGER FOR ENTERPRISE SINGLE SIGN-ON 8.2.1 ADMINISTRATION
IBM SECURITY ACCESS MANAGER FOR MOBILE 8.0
IBM SECURITY ACCESS MANAGER FOR WEB
IBM SECURITY PRIVILEGED IDENTITY MANAGER FUNDAMENTALS
IBM ENDPOINT MANAGER 9.2 SECURITY AND COMPLIANCE FUNDAMENTALS
IBM SECURITY QRADAR ADVANCED TOPICS
IBM SECURITY APPSCAN STANDARD FUNDAMENTALS
LINUX BASIC AND INSTALLATION
INTRODUCTION TO IBM I FOR NEW USERS
LINUX SYSTEM ADMINISTRATION I: IMPLEMENTATION
LINUX ON POWER PERFORMANCE
ISACA COBIT 5 ASSESSOR FOR SECURITY
CISM EXAM REVIEW
CRISC EXAM REVIEW
CYBERSECURITY FUNDAMENTALS
CSX PRACTITIONER: IDENTIFICATION AND PROTECTION
CSX PRACTITIONER: RESPOND AND RECOVER
CSX PRACTITIONER BOOT CAMP
CSX PRACTITIONER: DETECTION
CISA EXAM REVIEW
ISC(2) (ISC)2TRAINING FOR CCFP
(ISC)2TRAINING FOR CISSP
(ISC)2TRAINING FOR HCISPP
(ISC)2TRAINING FOR CISSP-ISSAP
(ISC)2TRAINING FOR SSCP
JUNIPER ADVANCED DATA CENTER SWITCHING (ADCX)
JUNIPER NETWORKS DESIGN FUNDAMENTALS (JNDF)
ADVANCED JUNIPER NETWORKS VPN IMPLEMENTATIONS (AJVI)
ADVANCED JUNOS ENTERPRISE ROUTING (AJER)
ADVANCED JUNOS ENTERPRISE ROUTING TROUBLESHOOTING (AJERT)
ADVANCED JUNOS ENTERPRISE SECURITY TROUBLESHOOTING (AJEST)
ADVANCED JUNOS ENTERPRISE SWITCHING (AJEX)
ADVANCED JUNOS SECURITY (AJSEC)
ADVANCED JUNOS SERVICE PROVIDER ROUTING (AJSPR)
ADVANCED JUNOS ENTERPRISE SWITCHING USING ENHANCED LAYER 2 SOFTWARE (AJEX-ELS)
ADVANCED JUNOS SERVICE PROVIDER TROUBLESHOOTING (AJSPT)
ATTACK PREVENTION WITH JUNIPER NETWORKS FIREWALLS (APJF)
INTEGRATING JUNIPER NETWORKS FIREWALL/IPSEC VPN PRODUCTS INTO HIGH-PERFORMANCE NETWORKS (IFVH)
JUNOS ENTERPRISE SWITCHING (JEX)
JUNOS ENTERPRISE SWITCHING USING ELS (JEX-ELS)
JUNOS INTERMEDIATE ROUTING (JIR)
JUNOS MULTICAST ROUTING (JMR)
JUNIPER NETWORKS DESIGN-WAN (JND-WAN)
CONFIGURING JUNIPER NETWORKS FIREWALL/IPSEC VPN PRODUCTS (CJFV)
JUNOS EDGE SECURITY SERVICES (JESS)
JUNOS SECURITY (JSEC)
NETWORK AUTOMATION USING CONTRAIL CLOUD (NACC)
JUNOS SERVICE PROVIDER SWITCHING (JSPX)
NETWORKING FUNDAMENTALS
WLAN FUNDAMENTALS
JNCIE ENTERPRISE BOOTCAMP (JNCIE-ENT)
INTRODUCTION TO THE JUNOS OPERATING SYSTEM (IJOS)
JUNOS CLASS OF SERVICE (JCOS)
JNCIE SERVICE PROVIDER BOOTCAMP (JNCIE-SP)
CONFIGURING STEEL-BELTED RADIUS CARRIER (CSBR)
JUNIPER NETWORKS DESIGN - DATA CENTER (JND-DC)
JUNIPER NETWORKS DESIGN-SECURITY (JND-SEC)
JUNOS SPACE-SECURITY DIRECTOR (JS-SD)
IMPLEMENTING JUNIPER NETWORKS SECURE ANALYTICS (IJSA)
NETWORK AUTOMATION IN THE WAN (NA-WAN)
JUNOS EDGE SECURITY SERVICES (JESS)
JNCIE SECURITY BOOTCAMP (JNCIE-SEC)
JUNOS LAYER 3 VPNS (JL3V)
JUNOS LAYER 2 VPNS (JL2V)
JUNOS MPLS FUNDAMENTALS (JMF)
JUNOS TROUBLESHOOTING IN THE NOC (JTNOC)
JUNOS SUBSCRIBER MANAGEMENT (JSM)
JUNOS AUTOMATION (JAUT)
LINUX LINUX SECURITY
LINUX SYSTEM ADMINISTRATION
MASTERING THE LINUX COMMAND LINE
INTRODUCTION TO VMWARE ESXI
SOFTWARE DEFINED NETWORKING WITH OPENDAYLIGHT
ADVANCED LINUX SYSTEM ADMINISTRATION AND NETWORKING
ESSENTIALS OF SYSTEM ADMINISTRATION
PENETRATION TESTING WITH LINUX TOOLS
LINUX IN THE REAL WORLD
CENTOS SYSTEM ADMINISTRATOR PREP
LINUX ESSENTIALS
PUPPET FUNDAMENTALS
COMPLIANCE BASICS FOR DEVELOPERS
SOFTWARE DEFINED NETWORKING WITH OPENDAYLIGHT
OPEN SOURCE VIRTUALIZATION
LINUX ENTERPRISE AUTOMATION
ESSENTIALS OF OPENSTACK ADMINISTRATION
LINUX SECURITY
HIGH AVAILABILITY LINUX ARCHITECTURE
LINUX PERFORMANCE TUNING
LINUX SYSTEM ADMINISTRATION
ADVANCED LINUX SYSTEM ADMINISTRATION AND NETWORKING
INTRODUCTION TO LINUX, OPEN SOURCE DEVELOPMENT, AND GIT
INSIDE ANDROID: AN INTRO TO ANDROID INTERNALS
OPTIMIZING LINUX DEVICE DRIVERS FOR POWER EFFICIENCY
LINUX KERNEL DEBUGGING AND SECURITY
INTRODUCTION TO LINUX
INTRODUCTION TO CLOUD INFRASTRUCTURE TECHNOLOGIES
LINUX NETWORKING AND ADMINISTRATION
LINUX SECURITY FUNDAMENTALS
OPENSTACK ADMINISTRATION FUNDAMENTALS
SOFTWARE DEFINED NETWORKING FUNDAMENTALS
FUNDAMENTALS OF LINUX
MCAFEE MCAFEE ENDPOINT SECURITY 10.X ADMINISTRATION
MCAFEE ENDPOINT SECURITY UPGRADE
MCAFEE ADVANCED THREAT DETECTION ADMINISTRATION
MCAFEE VIRUSSCAN AND EPOLICY ORCHESTRATOR ADMINISTRATION
MCAFEE NETWORK SECURITY PLATFORM ADMINISTRATION
MCAFEE HOST INTRUSION PREVENTION SYSTEM ADMINISTRATION
MCAFEE DATA LOSS PREVENTION ENDPOINT ADMINISTRATION
SECURITY INFORMATION AND EVENT MANAGEMENT (SIEM) ADMINISTRATION
MICROSOFT INSTALLING AND CONFIGURING WINDOWS 10
DEPLOYING AND MANAGING WINDOWS 10 USING ENTERPRISE SERVICES
INSTALLING AND CONFIGURING WINDOWS® 7 CLIENT
TROUBLESHOOTING AND SUPPORTING WINDOWS® 7 IN THE ENTERPRISE
PLANNING AND MANAGING WINDOWS® 7 DESKTOP DEPLOYMENTS AND ENVIRONMENTS
DEPLOYING WINDOWS DESKTOPS AND ENTERPRISE APPLICATIONS
SUPPORTING AND TROUBLESHOOTING WINDOWS 10
NETWORKING FUNDAMENTALS
SECURITY FUNDAMENTALS
CONFIGURING WINDOWS® 8.1
SUPPORTING WINDOWS® 8.1
WINDOWS SERVER ADMINISTRATION FUNDAMENTALS
INSTALLATION, STORAGE, AND COMPUTE WITH WINDOWS SERVER 2016
NETWORKING WITH WINDOWS SERVER 2016
IDENTITY WITH WINDOWS SERVER 2016
INSTALLING AND CONFIGURING WINDOWS SERVER 2012
ADMINISTERING WINDOWS SERVER 2012
CONFIGURING ADVANCED WINDOWS SERVER 2012 SERVICES
DESIGNING AND IMPLEMENTING A SERVER INFRASTRUCTURE
IMPLEMENTING AN ADVANCED SERVER INFRASTRUCTURE
CORE SOLUTIONS OF MICROSOFT EXCHANGE SERVER 2013
ADVANCED SOLUTIONS OF MICROSOFT EXCHANGE SERVER 2013
DEPLOYING ENTERPRISE VOICE WITH SKYPE FOR BUSINESS 2015
ADMINISTERING MICROSOFT EXCHANGE SERVER 2016
CORE SOLUTIONS OF SKYPE FOR BUSINESS 2015
DESIGNING AND DEPLOYING MICROSOFT EXCHANGE SERVER 2016
SERVER VIRTUALIZATION WITH WINDOWS SERVER HYPER-V AND SYSTEM CENTER
ADMINISTERING SYSTEM CENTER CONFIGURATION MANAGER AND INTUNE
MONITORING AND OPERATING A PRIVATE CLOUD
CONFIGURING AND DEPLOYING A PRIVATE CLOUD
ENABLING AND MANAGING OFFICE 365
ADMINISTERING A SQL DATABASE INFRASTRUCTURE
DEVELOPING MICROSOFT AZURE SOLUTIONS
IMPLEMENTING MICROSOFT AZURE INFRASTRUCTURE SOLUTIONS
SECURING WINDOWS SERVER 2016
DESIGNING AND IMPLEMENTING CLOUD DATA PLATFORM SOLUTIONS
DEPLOYING VOICE WORKLOADS FOR SKYPE FOR BUSINESS ONLINE AND SERVER 2015
DESIGNING A DATA SOLUTION WITH MICROSOFT SQL SERVER
VIRTUALIZING ENTERPRISE DESKTOPS AND APPS
WINDOWS SERVER 2012: TECHNICAL OVERVIEW
WINDOWS 10 FEATURES FOR A MOBILE WORKFORCE
WINDOWS SERVER 2012 TRAINING: NETWORKING
WINDOWS SERVER 2012: IDENTITY AND ACCESS
WINDOWS SERVER 2012: STORAGE
DEVELOPING MICROSOFT SQL SERVER DATABASES
DESIGNING DATABASE SOLUTIONS FOR SQL SERVER
NOVELL SERVICE DESK: SERVICE MANAGEMENT (COURSE 8522)
SECURING WINDOWS WORKSTATIONS USING ZENWORKS ENDPOINT SECURITY MANAGEMENT 11.X (COURSE 8520)
OFFENSIVE SECURITY PENETRATION TESTINGWITH KALI LINUX
ADVANCED WINDOWS EXPLOITATION
OFFENSIVE SECURITY WIRELESS ATTACKS (WIFU)
CRACKING THE PERIMETER (CTP)
ADVANCED WEB ATTACKS AND EXPLOITATION
METASPLOIT UNLEASHED
OFFENSIVE SECURITY PENETRATIONTESTING LAB
ORACLE ORACLE 12C SECURITY ADMINISTRATION
ORACLE DATABASE 12C: MANAGING SECURITY
USER SECURITY AND AUDITING IN ORACLE DATABASE 12C
ORACLE DATABASE 11G: INTRODUCTION TO DATABASE SECURITY AND SOLUTIONS
ORACLE DATABASE 11G: DATABASE SECURITY
ORACLE DATABASE 11G: BASIC USER AND STRONG AUTHENTICATION
ORACLE DATABASE 11G: ENTERPRISE USER SECURITY AND PROXY AUTHENTICATION
ORACLE DATABASE 11G: PRIVILEGES, ROLES, AND APPLICATION CONTEXTS
ORACLE DATABASE 11G: ORACLE NET SERVICES AND LISTENER SECURITY
ORACLE DATABASE 11G: FIREWALLS, ORACLE CONNECTION MANAGER, AND SQL*PLUS SECURITY
ORACLE DATABASE 11G RELEASE 2: ORACLE PARTITIONING AND SECURITY FEATURES
ORACLE DATABASE 11G RELEASE 2: STORAGE STRUCTURES AND USER SECURITY
PALO ALTO FIREWALL ESSENTIALS 8.0: CONFIGURATION AND MANAGEMENT (EDU-210)
PANORAMA 8.0: MANAGE MULTIPLE FIREWALLS (EDU-221)
FIREWALL 8.0: DEBUG AND TROUBLESHOOT (EDU-311)
FIREWALL 7.1: INSTALL, CONFIGURE, AND MANAGE (EDU-201)
FIREWALL 7.1: CONFIGURE EXTENDED FEATURES (EDU-205)
PANORAMA 7.1: MANAGE MULTIPLE FIREWALLS (EDU-221)
FIREWALL 7.1: MANAGE CYBERTHREATS (EDU-231)
FIREWALL 7.1: DEBUG AND TROUBLESHOOT (EDU-311)
TRAPS 3.4: DEPLOY AND OPTIMIZE (EDU-285)
TRAPS 3.4: INSTALL, CONFIGURE AND MANAGE (EDU-281)
FIREWALL ESSENTIALS 8.0: CONFIGURATION AND MANAGEMENT (EDU-110)
RED HAT RED HAT SERVER HARDENING (RH413)
RED HAT ENTERPRISE LINUX DIAGNOSTICS AND TROUBLESHOOTING (RH342)
RED HAT SYSTEM ADMINISTRATION I (RH124)
RED HAT SYSTEM ADMINISTRATION II (RH134)
RHCSA RAPID TRACK COURSE (RH199)
RED HAT OPENSTACK ADMINISTRATION I (CL110)
RED HAT OPENSTACK ADMINISTRATION II (CL210)
RED HAT SYSTEM ADMINISTRATION III (RH254)
RHCE CERTIFICATION LAB
RED HAT OPENSTACK SYSTEM ADMINISTRATION III (CL310)
RED HAT CLOUDFORMS HYBRID CLOUD MANAGEMENT (CL220)
OPENSHIFT ENTERPRISE ADMINISTRATION (DO280)
RED HAT GLUSTER STORAGE ADMINISTRATION (RH236)
RED HAT VIRTUALIZATION ADMINISTRATION (RH318)
RED HAT JBOSS IN DATA VIRTUALIZATION ADMINISTRATION (JB450)
JBOSS ENTERPRISE APPLICATION DEVELOPMENT (JB225)
RED HAT ENTERPRISE DEPLOYMENT AND SYSTEMS MANAGEMENT (RH401)
RED HAT SATELLITE 6 ADMINISTRATION (RH403)
RED HAT ENTERPRISE LINUX DIAGNOSTICS AND TROUBLESHOOTING
RED HAT SERVER HARDENING
RED HAT ENTERPRISE PERFORMANCE TUNING (RH442)
RED HAT HIGH AVAILABILITY CLUSTERING (RH436)
CONTAINERIZING SOFTWARE APPLICATIONS
JBOSS APPLICATION ADMINISTRATION I (JB248) ​
RED HAT SECURITY: Linux in Physical, Virtual, and Cloud (RH415)
RIVERBED WAN200 OPTIMIZATION ESSENTIALS
HCB200 HYPER-CONVERGED BRANCH ESSENTIALS
NPM200 PERFORMANCE MONITORING ESSENTIALS
APPRESPONSE
TRANSACTION ANALYZER
RIVERBED APM200 APPLICATION PERFORMANCE MONITORING ESSENTIALS
RIVERBED RCPE-APPV APPLICATION VISIBILITY
NOS200 NETWORK PLANNING AND CONFIGURATION MANAGEMENT
WAN310 OPTIMIZING ENTERPRISE APPLICATIONS AND PROTOCOLS
WAN350 IMPLEMENTING ENTERPRISE OPTIMIZATION ARCHITECTURES
SABSA SABSA FOUNDATION MODULES (F1 & F2)
MODULE A1 – ADVANCED SABSA RISK ASSURANCE & GOVERNANCE
MODULE A3 – ADVANCED SABSA ARCHITECTURE & DESIGN
SANS NETWARS - TOURNAMENT
NETWARS: CONTINUOUS
AUD507: AUDITING & MONITORING NETWORKS, PERIMETERS & SYSTEMS
AUD566: IMPLEMENTING AND AUDITING THE CRITICAL SECURITY CONTROLS - IN-DEPTH
AUD440: CRITICAL SECURITY CONTROLS: PLANNING, IMPLEMENTING AND AUDITING
AUD480: TOP 4 MITIGATION STRATEGIES: IMPLEMENTING & AUDITING
FOR408: WINDOWS FORENSIC ANALYSIS
FOR508: ADVANCED COMPUTER FORENSIC ANALYSIS AND INCIDENT RESPONSE
FOR518: MAC FORENSIC ANALYSIS
FOR578: CYBER THREAT INTELLIGENCE
FOR526: MEMORY FORENSICS IN-DEPTH
FOR572: ADVANCED NETWORK FORENSICS AND ANALYSIS
FOR585: ADVANCED SMARTPHONE AND MOBILE DEVICE FORENSICS
FOR610: REVERSE-ENGINEERING MALWARE: MALWARE ANALYSIS TOOLS AND TECHNIQUES
ICS515: ICS ACTIVE DEFENSE AND INCIDENT RESPONSE
ICS410: ICS/SCADA SECURITY ESSENTIALS
ICS456: ESSENTIALS FOR NERC CRITICAL INFRASTRUCTURE PROTECTION
MGT414: SANS +S TRAINING PROGRAM FOR THE CISSP® CERTIFICATION EXAM
MGT415: A PRACTICAL INTRODUCTION TO RISK ASSESSMENT
MGT433: SECURING THE HUMAN: HOW TO BUILD, MAINTAIN AND MEASURE A HIGH-IMPACT AWARENESS PROGRAM
MGT512: SANS SECURITY LEADERSHIP ESSENTIALS FOR MANAGERS WITH KNOWLEDGE COMPRESSION
MGT514: IT SECURITY STRATEGIC PLANNING, POLICY AND LEADERSHIP
MGT535: INCIDENT RESPONSE TEAM MANAGEMENT
LEG523: LAW OF DATA SECURITY AND INVESTIGATIONS
SEC301: INTRO TO INFORMATION SECURITY
SEC401: SECURITY ESSENTIALS BOOTCAMP STYLE
SEC440: CRITICAL SECURITY CONTROLS: PLANNING, IMPLEMENTING AND AUDITING
SEC480: TOP 4 MITIGATION STRATEGIES: IMPLEMENTING & AUDITING
SEC501: ADVANCED SECURITY ESSENTIALS - ENTERPRISE DEFENDER
SEC502: PERIMETER PROTECTION IN-DEPTH
SEC503: INTRUSION DETECTION IN-DEPTH
SEC504: HACKER TOOLS, TECHNIQUES, EXPLOITS AND INCIDENT HANDLING
SEC505: SECURING WINDOWS WITH THE CRITICAL SECURITY CONTROLS
SEC506: SECURING LINUX/UNIX
SEC511: CONTINUOUS MONITORING AND SECURITY OPERATIONS
SEC524: CLOUD SECURITY FUNDAMENTALS
SEC542: WEB APP PENETRATION TESTING AND ETHICAL HACKING
SEC546: IPV6 ESSENTIALS
SEC550: ACTIVE DEFENSE, OFFENSIVE COUNTERMEASURES AND CYBER DECEPTION
SEC560: NETWORK PENETRATION TESTING AND ETHICAL HACKING
SEC561: INTENSE HANDS-ON PEN TESTING SKILL DEVELOPMENT (WITH SANS NETWARS)
SEC562: CYBERCITY HANDS-ON KINETIC CYBER RANGE EXERCISE
SEC566: IMPLEMENTING AND AUDITING THE CRITICAL SECURITY CONTROLS - IN-DEPTH
SEC573: PYTHON FOR PENETRATION TESTERS
SEC575: MOBILE DEVICE SECURITY AND ETHICAL HACKING
SEC579: VIRTUALIZATION AND PRIVATE CLOUD SECURITY
SEC580: METASPLOIT KUNG FU FOR ENTERPRISE PEN TESTING
SEC617: WIRELESS ETHICAL HACKING, PENETRATION TESTING, AND DEFENSES
SEC642: ADVANCED WEB APP PENETRATION TESTING AND ETHICAL HACKING
SEC660: ADVANCED PENETRATION TESTING, EXPLOIT WRITING, AND ETHICAL HACKING
SEC760: ADVANCED EXPLOIT DEVELOPMENT FOR PENETRATION TESTERS
SYMANTEC ADMINISTRATION OF SYMANTEC MESSAGING GATEWAY 10.5
ADMINISTRATION OF SYMANTEC CONTROL COMPLIANCE SUITE 11.X
ADMINISTRATION OF SYMANTEC VIP (MARCH 2017)
ADMINISTRATION OF SYMANTEC IT MANAGEMENT SUITE 8.0
ADMINISTRATION OF DATA LOSS PREVENTION 14.5
ADMINISTRATION OF SYMANTEC CYBER SECURITY SERVICES (MAY 2016)
ADMINISTRATION OF SYMANTEC ADVANCED THREAT PROTECTION 2.0.2
ADMINISTRATION OF SYMANTEC ENDPOINT PROTECTION 14
ADMINISTRATION OF SYMANTEC DATA CENTER SECURITY - SERVER ADVANCED 6.7
SYMANTEC MESSAGING GATEWAY 10.0 – ADMINISTRATION
SYMANTEC MESSAGING GATEWAY 10.5 ADMINISTRATION: WHAT’S NEW IN 10.5
SYMANTEC CONTROL COMPLIANCE SUITE 11.0: ADMINISTRATION - MUST COMPLETE ALL MODULES FOR CEUS
SYMANTEC CONTROL COMPLIANCE SUITE 11.0: DIFFERENCES
VALIDATION AND ID PROTECTION (VIP) SERVICE R1
IT MANAGEMENT SUITE 8.0 FUNDAMENTALS
IT MANAGEMENT SUITE 8.0 MODULES
CLIENT MANAGEMENT SUITE 7.6 ADMINISTRATION
CLIENT MANAGEMENT SUITE 7.6 IMPLEMENTER
ASSET MANAGEMENT SUITE 7.5 ADMINISTRATION
DATA LOSS PREVENTION 14.5: ADMINISTRATION – MUST COMPLETE ALL MODULES FOR CEUS
DATA LOSS PREVENTION 14.5: DIFFERENCES
CSS ADMIN R1 – MUST COMPLETE ALL MODULES FOR CEUS
SYMANTEC DATA CENTER SECURITY – SERVER ADVANCED 6.7 ADMINISTRATION – MUST COMPLETE ALL MODULES FOR CEUS
ADVANCED THREAT PROTECTION 2.X: INCIDENT RESPONSE – MUST COMPLETE ALL MODULES FOR CEUS
SYMANTEC ENDPOINT PROTECTION 12.1.X ADMINISTRATION
SYMANTEC ENDPOINT PROTECTION 12.1 MAINTAIN AND TROUBLESHOOT
EMAIL SECURITY SERVICES AND WEB SECURITY SERVICE: ADMINISTRATION
ENDPOINT PROTECTION 14: CONFIGURE AND PROTECT
ENDPOINT PROTECTION 14: DIFFERENCES
ENDPOINT PROTECTION 14: MIGRATION AND UPGRADES
VMWARE VMWARE HORIZON 7: INSTALL, CONFIGURE, MANAGE [V7]
VMWARE HORIZON 7: TROUBLESHOOTING AND PERFORMANCE OPTIMIZATION [V7]
DATA CENTER VIRTUALIZATION FUNDAMENTALS [V6]
VSPHERE: OPTIMIZE AND SCALE [V6]
VMWARE VSPHERE: BOOTCAMP [V6]
VMWARE VSPHERE: DESIGN AND DEPLOY FAST TRACK [V6]
VMWARE VSPHERE: INSTALL, CONFIGURE AND MANAGE PLUS OPTIMIZE AND SCALE FAST TRACK [V6.0]
VCLOUD AIR FUNDAMENTALS
HORIZON: DESIGN AND DEPLOY [V6]
VMWARE NETWORK VIRTUALIZATION FUNDAMENTALS 2016
VMWARE NSX: INSTALL, CONFIGURE, MANAGE [V6.2]
VMWARE NSX FOR INTERNETWORKING EXPERTS FAST TRACK [V6.2]
VMWARE NSX FOR INTERNETWORKING EXPERTS FAST TRACK [V6.1]
VMWARE NSX TROUBLESHOOTING & OPERATIONS [V6.2]
VMWARE NSX: INSTALL, CONFIGURE, MANAGE PLUS TROUBLESHOOTING & OPERATIONS FAST TRACK [V6.2]
VMWARE NSX: DESIGN & DEPLOY [V6.2]
SECURITY OPERATIONS FOR THE SOFTWARE DEFINED DATA CENTER
VCLOUD: DESIGN BEST PRACTICES [V1.5]
VIEW: DESIGN BEST PRACTICES [V5.X]
VSPHERE: INSTALL, CONFIGURE, MANAGE [V5.5]
VSPHERE: FAST TRACK [V5.5]
VSPHERE: OPTIMIZE & SCALE [V5.5]
VMWARE VSPHERE: TROUBLESHOOTING WORKSHOP [V5.5]
VSPHERE WITH OPERATIONS MANAGEMENT: FAST TRACK [V5.1]
NewsletterSignup-Solid
LeverageCertification