CompTIA Cybersecurity Analyst

Pre-approved Training for CompTIA CySA+ Continuing Education Units (CEUs)

Note: Approved training courses in this document are subject to change without prior notification. Training submitted based on prior approval will remain valid. Training submitted after the date on this document must meet this documents training requirement.

Training approved in this document is based on the CompTIA CySA+ - CS0-001 objectives.

 

CERTIFICATION PROVIDER COURSE TITLE
CHECK POINT CHECK POINT CERTIFIED SECURITY MASTER (CCSM) R77.30
CHECK POINT MANAGED SECURITY EXPERT (CCMSE)
CISCO IMPLEMENTING CISCO SECURE ACCESS CONTROL SYSTEM V5.2
IMPLEMENTING CISCO IOS NETWORK SECURITY (IINS) 3.0
IMPLEMENTING CISCO SECURE ACCESS SOLUTIONS (SISAS) 1.0
IMPLEMENTING CISCO EDGE NETWORK SECURITY SOLUTIONS (SENSS) 1.0
IMPLEMENTING CISCO SECURE MOBILITY SOLUTIONS (SIMOS) 1.0
IMPLEMENTING CISCO THREAT CONTROL SOLUTIONS (SITCS) 1.5
CLOUD SECURITY ALLIANCE CCSK FOUNDATION
CCSK PLUS
COMPTIA COMPTIA ADVANCED SECURITY PRACTITIONER (CASP) (CAS-003)
COMPTIA PENTEST+ (PT0-001)
CWNP CWSP - CERTIFIED WIRELESS SECURITY PROFESSIONAL
EC-Council CERTIFIED INCIDENT HANDLER (ECIH)
CERTIFIED SECURITY ANALYST (ECSA) V9
EC-COUNCIL INFORMATION SECURITY MANAGEMENT (EISM)
DISASTER RECOVERY PROFESSIONAL (EDRP)
LICENSED PENETRATION TESTER (LPT)
COMPUTER HACKING FORENSICS INVESTIGATOR (CHFI)
CERTIFIED CHIEF INFORMATION SECURITY OFFICER (CCISO)
CERTIFIED SECURITY SPECIALIST (ECSS)
CERTIFIED INCIDENT HANDLER (ECIH)
CERTIFIED ENCRYPTION SPECIALIST (ECES)
CAST 611V3 ADVANCED PENETRATION TESTING
ADVANCED MOBILE FORENSICS AND SECURITY (CAST 612)
CAST 616 SECURING WINDOWS INFRASTRUCTURE
CAST 613 HACKING AND HARDENING CORPORATE WEB APP/WEB SITE
CAST 614 Advanced Network Defense
ISACA CRISC EXAM REVIEW
CGEIT EXAM REVIEW
CISM EXAM REVIEW
CISA EXAM REVIEW
COBIT 5 FOUNDATION
COBIT 5 IMPLEMENTATION
COBIT 5 ASSESSOR
IMPLEMENTING NIST CYBERSECURITY FRAMEWORK USING COBIT 5
COBIT 5 ASSESSOR FOR SECURITY
ISC(2) (ISC)2 TRAINING FOR CAP
(ISC)2 TRAINING FOR CCFP
(ISC)2 TRAINING FOR CCSP
(ISC)2 TRAINING FOR CISSP
(ISC)2 TRAINING FOR HCISPP
(ISC)2 TRAINING FOR CISSP-ISSAP
(ISC)2 TRAINING FOR CISSP-ISSEP
(ISC)2 TRAINING FOR CISSP-ISSMP
(ISC)2 TRAINING FOR SSCP
JUNIPER JUNOS SECURITY (JSEC)
JUNOS SPACE-SECURITY DIRECTOR (JS-SD)
ATTACK PREVENTION WITH JUNIPER NETWORKS FIREWALLS (APJF)
INTRODUCTION TO THE JUNOS OPERATING SYSTEM (IJOS)
JUNIPER NETWORKS DESIGN-SECURITY (JND-SEC)
ADVANCED JUNOS SECURITY (AJSEC)
IMPLEMENTING JUNIPER NETWORKS SECURE ANALYTICS (IJSA)
CONFIGURING STEEL-BELTED RADIUS CARRIER (CSBR)
INTEGRATING JUNIPER NETWORKS FIREWALL/IPSEC VPN PRODUCTS INTO HIGH-PERFORMANCE NETWORKS (IFVH)
CONFIGURING JUNIPER NETWORKS FIREWALL/IPSEC VPN PRODUCTS (CJFV)
JNCIE SECURITY BOOTCAMP (JNCIE-SEC)
MCAFEE MCAFEE ENDPOINT SECURITY 10.X ADMINISTRATION
MCAFEE ENDPOINT SECURITY UPGRADE
MCAFEE ADVANCED THREAT DETECTION ADMINISTRATION
MCAFEE VIRUSSCAN AND EPOLICY ORCHESTRATOR ADMINISTRATION
MCAFEE NETWORK SECURITY PLATFORM ADMINISTRATION
MCAFEE HOST INTRUSION PREVENTION SYSTEM ADMINISTRATION
MCAFEE DATA LOSS PREVENTION ENDPOINT ADMINISTRATION
SECURITY INFORMATION AND EVENT MANAGEMENT (SIEM) ADMINISTRATION
MICROSOFT SECURITY FUNDAMENTALS
SECURING WINDOWS SERVER 2016
OFFENSIVE SECURITY PENETRATION TESTING WITH KALI LINUX
ADVANCED WINDOWS EXPLOITATION
OFFENSIVE SECURITY WIRELESS ATTACKS (WIFU)
CRACKING THE PERIMETER (CTP)
ADVANCED WEB ATTACKS AND EXPLOITATION
METASPLOIT UNLEASHED
OFFENSIVE SECURITY PENETRATION TESTING LAB
PALO ALTO FIREWALL ESSENTIALS 8.0: CONFIGURATION AND MANAGEMENT (EDU-210)
PANORAMA 8.0: MANAGE MULTIPLE FIREWALLS (EDU-221)
FIREWALL 8.0: DEBUG AND TROUBLESHOOT (EDU-311)
FIREWALL 7.1: INSTALL, CONFIGURE, AND MANAGE (EDU-201)
FIREWALL 7.1: CONFIGURE EXTENDED FEATURES (EDU-205)
PANORAMA 7.1: MANAGE MULTIPLE FIREWALLS (EDU-221)
FIREWALL 7.1: MANAGE CYBERTHREATS (EDU-231)
FIREWALL 7.1: DEBUG AND TROUBLESHOOT (EDU-311)
TRAPS 3.4: DEPLOY AND OPTIMIZE (EDU-285)
TRAPS 3.4: INSTALL, CONFIGURE AND MANAGE (EDU-281)
RIVERBED WAN200 OPTIMIZATION ESSENTIALS
WAN310 OPTIMIZING ENTERPRISE APPLICATIONS AND PROTOCOLS
WAN350 IMPLEMENTING ENTERPRISE OPTIMIZATION ARCHITECTURES
NPM200 PERFORMANCE MONITORING ESSENTIALS
RIVERBED APM200 APPLICATION PERFORMANCE MONITORING ESSENTIALS
RIVERBED RCPE-APPV APPLICATION VISIBILITY
HCB200 HYPER-CONVERGED BRANCH ESSENTIALS
SABSA SABSA FOUNDATION MODULES (F1 & F2)
MODULE A1 – ADVANCED SABSA RISK ASSURANCE & GOVERNANCE
MODULE A3 – ADVANCED SABSA ARCHITECTURE & DESIGN
SANS NETWARS - TOURNAMENT
NETWARS: CONTINUOUS
AUD507: AUDITING & MONITORING NETWORKS, PERIMETERS & SYSTEMS
AUD480: TOP 4 MITIGATION STRATEGIES: IMPLEMENTING & AUDITINGENTING AND AUDITING THE CRITICAL SECURITY CONTROLS - IN-DEPTH
AUD566: IMPLEMAUD440: CRITICAL SECURITY CONTROLS: PLANNING, IMPLEMENTING AND AUDITING
AUD440: CRITICAL SECURITY CONTROLS: PLANNING, IMPLEMENTING AND AUDITING
FOR408: WINDOWS FORENSIC ANALYSIS
FOR508: ADVANCED DIGITAL FORENSICS, INCIDENT RESPONSE, AND THREAT HUNTING
FOR518: MAC FORENSIC ANALYSIS
FOR578: CYBER THREAT INTELLIGENCE
FOR526: MEMORY FORENSICS IN-DEPTH
FOR572: ADVANCED NETWORK FORENSICS AND ANALYSIS
FOR585: ADVANCED SMARTPHONE FORENSICS
FOR610: REVERSE-ENGINEERING MALWARE: MALWARE ANALYSIS TOOLS AND TECHNIQUES
ICS515: ICS ACTIVE DEFENSE AND INCIDENT RESPONSE
ICS410: ICS/SCADA SECURITY ESSENTIALS
ICS456: ESSENTIALS FOR NERC CRITICAL INFRASTRUCTURE PROTECTION
MGT415: A PRACTICAL INTRODUCTION TO RISK ASSESSMENT
MGT414: SANS TRAINING PROGRAM FOR THE CISSP® CERTIFICATION EXAM
MGT433: SECURING THE HUMAN: HOW TO BUILD, MAINTAIN AND MEASURE A HIGH-IMPACT AWARENESS PROGRAM
MGT512: SANS SECURITY LEADERSHIP ESSENTIALS FOR MANAGERS WITH KNOWLEDGE COMPRESSION
MGT514: IT SECURITY STRATEGIC PLANNING, POLICY AND LEADERSHIP
MGT535: INCIDENT RESPONSE TEAM MANAGEMENT
LEG523: LAW OF DATA SECURITY AND INVESTIGATIONS
SEC301: INTRO TO INFORMATION SECURITY
SEC401: SECURITY ESSENTIALS BOOTCAMP STYLE
SEC440: CRITICAL SECURITY CONTROLS: PLANNING, IMPLEMENTING AND AUDITING
SEC480: TOP 4 MITIGATION STRATEGIES: IMPLEMENTING & AUDITING
SEC501: ADVANCED SECURITY ESSENTIALS - ENTERPRISE DEFENDER
SEC502: PERIMETER PROTECTION IN-DEPTH
SEC503: INTRUSION DETECTION IN-DEPTH
SEC504: HACKER TOOLS, TECHNIQUES, EXPLOITS AND INCIDENT HANDLING
SEC505: SECURING WINDOWS WITH THE CRITICAL SECURITY CONTROLS
SEC506: SECURING LINUX/UNIX
SEC511: CONTINUOUS MONITORING AND SECURITY OPERATIONS
SEC524: CLOUD SECURITY FUNDAMENTALS
SEC542: WEB APP PENETRATION TESTING AND ETHICAL HACKING
SEC546: IPV6 ESSENTIALS
SEC550: ACTIVE DEFENSE, OFFENSIVE COUNTERMEASURES AND CYBER DECEPTION
SEC560: NETWORK PENETRATION TESTING AND ETHICAL HACKING
SEC561: INTENSE HANDS-ON PEN TESTING SKILL DEVELOPMENT (WITH SANS NETWARS)
SEC562: CYBERCITY HANDS-ON KINETIC CYBER RANGE EXERCISE
SEC566: IMPLEMENTING AND AUDITING THE CRITICAL SECURITY CONTROLS - IN-DEPTH
SEC575: MOBILE DEVICE SECURITY AND ETHICAL HACKING
SEC579: VIRTUALIZATION AND PRIVATE CLOUD SECURITY
SEC580: METASPLOIT KUNG FU FOR ENTERPRISE PEN TESTING
SEC617: WIRELESS ETHICAL HACKING, PENETRATION TESTING, AND DEFENSES
SEC642: ADVANCED WEB APP PENETRATION TESTING AND ETHICAL HACKING
SEC660: ADVANCED PENETRATION TESTING, EXPLOIT WRITING, AND ETHICAL HACKING
SEC760: ADVANCED EXPLOIT DEVELOPMENT FOR PENETRATION TESTERS
SYMANTEC ADMINISTRATION OF SYMANTEC VIP (MARCH 2017)
ADMINISTRATION OF SYMANTEC IT MANAGEMENT SUITE 8.0
ADMINISTRATION OF DATA LOSS PREVENTION 14.5
ADMINISTRATION OF SYMANTEC CYBER SECURITY SERVICES (MAY 2016)
ADMINISTRATION OF SYMANTEC ADVANCED THREAT PROTECTION 2.0.2
ADMINISTRATION OF SYMANTEC ENDPOINT PROTECTION 14
ADMINISTRATION OF SYMANTEC DATA CENTER SECURITY - SERVER ADVANCED 6.7
VALIDATION AND ID PROTECTION (VIP) SERVICE R1
IT MANAGEMENT SUITE 8.0 FUNDAMENTALS
IT MANAGEMENT SUITE 8.0 MODULES
CLIENT MANAGEMENT SUITE 7.6 ADMINISTRATION
CLIENT MANAGEMENT SUITE 7.6 IMPLEMENTER
ASSET MANAGEMENT SUITE 7.5 ADMINISTRATION
DATA LOSS PREVENTION 14.5: ADMINISTRATION – MUST COMPLETE ALL MODULES FOR CEUS
DATA LOSS PREVENTION 14.5: DIFFERENCES
CSS ADMIN R1 – MUST COMPLETE ALL MODULES FOR CEUS
SYMANTEC DATA CENTER SECURITY – SERVER ADVANCED 6.7 ADMINISTRATION – MUST COMPLETE ALL MODULES FOR CEUS
ADVANCED THREAT PROTECTION 2.X: INCIDENT RESPONSE – MUST COMPLETE ALL MODULES FOR CEUS
SYMANTEC ENDPOINT PROTECTION 12.1.X ADMINISTRATION
SYMANTEC ENDPOINT PROTECTION 12.1 MAINTAIN AND TROUBLESHOOT
EMAIL SECURITY SERVICES AND WEB SECURITY SERVICE: ADMINISTRATION
ENDPOINT PROTECTION 14: CONFIGURE AND PROTECT
ENDPOINT PROTECTION 14: DIFFERENCES
ENDPOINT PROTECTION 14: MIGRATION AND UPGRADES
NewsletterSignup-Solid
LeverageCertification