CompTIA ​Pentest+

Pre-approved Training for CompTIA Pentest+ Continuing Education Units (CEUs)

Note: Approved training courses in this document are subject to change without prior notification. Training submitted based on prior approval will remain valid. Training submitted after the date on this document must meet this documents training requirements.

 

CERTIFICATION PROVIDER COURSE TITLE
CHECK POINT CHECK POINT CERTIFIED SECURITY MASTER (CCSM) R77.30
CHECK POINT MANAGED SECURITY EXPERT (CCMSE)
CISCO IMPLEMENTING CISCO SECURE ACCESS CONTROL SYSTEM V5.2
IMPLEMENTING CISCO IOS NETWORK SECURITY (IINS) 3.0 
IMPLEMENTING CISCO SECURE ACCESS SOLUTIONS (SISAS) 1.0 
IMPLEMENTING CISCO EDGE NETWORK SECURITY SOLUTIONS (SENSS) 1.0 
IMPLEMENTING CISCO SECURE MOBILITY SOLUTIONS (SIMOS) 1.0 
IMPLEMENTING CISCO THREAT CONTROL SOLUTIONS (SITCS) 1.5 
CLOUD SECURITY ALLIANCE CLOUD SECURITY ALLIANCE
CCSK PLUS
COMPTIA COMPTIA ADVANCED SECURITY PRACTITIONER (CASP) (CAS-003)
COMPTIA Cybersecurity Analyst (CySA+) 
CWNP  CWSP - CERTIFIED WIRELESS SECURITY PROFESSIONAL 
EC-Council CERTIFIED INCIDENT HANDLER (ECIH)
CERTIFIED SECURITY ANALYST (ECSA) V9
EC-COUNCIL INFORMATION SECURITY MANAGEMENT (EISM)
DISASTER RECOVERY PROFESSIONAL (EDRP)
LICENSED PENETRATION TESTER (LPT)
COMPUTER HACKING FORENSICS INVESTIGATOR (CHFI)
CERTIFIED CHIEF INFORMATION SECURITY OFFICER (CCISO)
CERTIFIED SECURITY SPECIALIST (ECSS)
CERTIFIED INCIDENT HANDLER (ECIH)
CERTIFIED ENCRYPTION SPECIALIST (ECES)
CAST 611V3 ADVANCED PENETRATION TESTING
ADVANCED MOBILE FORENSICS AND SECURITY (CAST 612)
ISACA CRISC EXAM REVIEW
CGEIT EXAM REVIEW
CISM EXAM REVIEW
CISA EXAM REVIEW
COBIT 5 FOUNDATION 
COBIT 5 IMPLEMENTATION 
COBIT 5 ASSESSOR 
IMPLEMENTING NIST CYBERSECURITY FRAMEWORK USING COBIT 5 
COBIT 5 ASSESSOR FOR SECURITY 
ISC(2) (ISC)2 TRAINING FOR CAP
(ISC)2 TRAINING FOR CCFP
(ISC)2 TRAINING FOR CCSP
(ISC)2 TRAINING FOR CISSP
(ISC)2 TRAINING FOR HCISPP
(ISC)2 TRAINING FOR CISSP-ISSAP
(ISC)2 TRAINING FOR CISSP-ISSEP
(ISC)2 TRAINING FOR CISSP-ISSMP
(ISC)2 TRAINING FOR SSCP
JUNIPER JUNOS SECURITY (JSEC)
JUNOS SPACE-SECURITY DIRECTOR (JS-SD)
ATTACK PREVENTION WITH JUNIPER NETWORKS FIREWALLS (APJF)
ATTACK PREVENTION WITH JUNIPER NETWORKS FIREWALLS (APJF)
ATTACK PREVENTION WITH JUNIPER NETWORKS FIREWALLS (APJF)
ADVANCED JUNOS SECURITY (AJSEC)
IMPLEMENTING JUNIPER NETWORKS SECURE ANALYTICS (IJSA)
CONFIGURING STEEL-BELTED RADIUS CARRIER (CSBR)
INTEGRATING JUNIPER NETWORKS FIREWALL/IPSEC VPN PRODUCTS INTO HIGH-PERFORMANCE NETWORKS (IFVH)
CONFIGURING JUNIPER NETWORKS FIREWALL/IPSEC VPN PRODUCTS (CJFV)
CONFIGURING JUNIPER NETWORKS FIREWALL/IPSEC VPN PRODUCTS (CJFV)
MCAFEE  MCAFEE ENDPOINT SECURITY 10.X ADMINISTRATION
MCAFEE ENDPOINT SECURITY UPGRADE
MCAFEE ADVANCED THREAT DETECTION ADMINISTRATION 
MCAFEE VIRUSSCAN AND EPOLICY ORCHESTRATOR ADMINISTRATION 
MCAFEE NETWORK SECURITY PLATFORM ADMINISTRATION 
MCAFEE HOST INTRUSION PREVENTION SYSTEM ADMINISTRATION 
MCAFEE DATA LOSS PREVENTION ENDPOINT ADMINISTRATION 
SECURITY INFORMATION AND EVENT MANAGEMENT (SIEM) ADMINISTRATION 
MICROSOFT  SECURITY FUNDAMENTALS 
SECURING WINDOWS SERVER 2016 
OFFENSIVE SECURITY  PENETRATION TESTING WITH KALI LINUX 
ADVANCED WINDOWS EXPLOITATION 
OFFENSIVE SECURITY WIRELESS ATTACKS (WIFU) 
CRACKING THE PERIMETER (CTP) 
ADVANCED WEB ATTACKS AND EXPLOITATION 
METASPLOIT UNLEASHED 
OFFENSIVE SECURITY PENETRATION TESTING LAB 
PALO ALTO  FIREWALL ESSENTIALS 8.0: CONFIGURATION AND MANAGEMENT (EDU-210) 
PANORAMA 8.0: MANAGE MULTIPLE FIREWALLS (EDU-221) 
FIREWALL 8.0: DEBUG AND TROUBLESHOOT (EDU-311) 
FIREWALL 7.1: INSTALL, CONFIGURE, AND MANAGE (EDU-201) 
FIREWALL 7.1: CONFIGURE EXTENDED FEATURES (EDU-205) 
PANORAMA 7.1: MANAGE MULTIPLE FIREWALLS (EDU-221) 
FIREWALL 7.1: MANAGE CYBERTHREATS (EDU-231) 
FIREWALL 7.1: DEBUG AND TROUBLESHOOT (EDU-311) 
TRAPS 3.4: DEPLOY AND OPTIMIZE (EDU-285) 
TRAPS 3.4: INSTALL, CONFIGURE AND MANAGE (EDU-281) 
RIVERBED  WAN200 OPTIMIZATION ESSENTIALS 
WAN310 OPTIMIZING ENTERPRISE APPLICATIONS AND PROTOCOLSWAN200 OPTIMIZATION ESSENTIALS 
WAN350 IMPLEMENTING ENTERPRISE OPTIMIZATION ARCHITECTURES 
NPM200 PERFORMANCE MONITORING ESSENTIALS
RIVERBED APM200 APPLICATION PERFORMANCE MONITORING ESSENTIALS 
RIVERBED RCPE-APPV APPLICATION VISIBILITY 
HCB200 HYPER-CONVERGED BRANCH ESSENTIALS 
SABSA  SABSA FOUNDATION MODULES (F1 & F2) 
MODULE A1 – ADVANCED SABSA RISK ASSURANCE & GOVERNANCE 
MODULE A3 – ADVANCED SABSA ARCHITECTURE & DESIGN 
SANS  NETWARS - TOURNAMENT 
NETWARS: CONTINUOUS 
AUD507: AUDITING & MONITORING NETWORKS, PERIMETERS & SYSTEMS 
AUD480: TOP 4 MITIGATION STRATEGIES: IMPLEMENTING & AUDITINGENTING AND AUDITING THE CRITICAL SECURITY CONTROLS - IN-DEPTH 
AUD566: IMPLEMAUD440: CRITICAL SECURITY CONTROLS: PLANNING, IMPLEMENTING AND AUDITING 
AUD440: CRITICAL SECURITY CONTROLS: PLANNING, IMPLEMENTING AND AUDITING 
FOR408: WINDOWS FORENSIC ANALYSIS 
FOR508: ADVANCED DIGITAL FORENSICS, INCIDENT RESPONSE, AND THREAT HUNTING 
FOR518: MAC FORENSIC ANALYSIS 
FOR578: CYBER THREAT INTELLIGENCE 
FOR526: MEMORY FORENSICS IN-DEPTH 
FOR572: ADVANCED NETWORK FORENSICS AND ANALYSIS 
FOR585: ADVANCED SMARTPHONE FORENSICS 
FOR610: REVERSE-ENGINEERING MALWARE: MALWARE ANALYSIS TOOLS AND TECHNIQUES 
ICS515: ICS ACTIVE DEFENSE AND INCIDENT RESPONSE 
ICS410: ICS/SCADA SECURITY ESSENTIALS 
ICS456: ESSENTIALS FOR NERC CRITICAL INFRASTRUCTURE PROTECTION 
MGT415: A PRACTICAL INTRODUCTION TO RISK ASSESSMENT 
MGT414: SANS TRAINING PROGRAM FOR THE CISSP® CERTIFICATION EXAM 
MGT433: SECURING THE HUMAN: HOW TO BUILD, MAINTAIN AND MEASURE A HIGH-IMPACT AWARENESS PROGRAM 
MGT512: SANS SECURITY LEADERSHIP ESSENTIALS FOR MANAGERS WITH KNOWLEDGE COMPRESSION 
MGT514: IT SECURITY STRATEGIC PLANNING, POLICY AND LEADERSHIP 
MGT535: INCIDENT RESPONSE TEAM MANAGEMENT 
LEG523: LAW OF DATA SECURITY AND INVESTIGATIONS 
SEC301: INTRO TO INFORMATION SECURITY 
SEC401: SECURITY ESSENTIALS BOOTCAMP STYLE 
SEC440: CRITICAL SECURITY CONTROLS: PLANNING, IMPLEMENTING AND AUDITING 
SEC480: TOP 4 MITIGATION STRATEGIES: IMPLEMENTING & AUDITING 
SEC501: ADVANCED SECURITY ESSENTIALS - ENTERPRISE DEFENDER 
SEC502: PERIMETER PROTECTION IN-DEPTH 
SEC503: INTRUSION DETECTION IN-DEPTH 
SEC504: HACKER TOOLS, TECHNIQUES, EXPLOITS AND INCIDENT HANDLING 
SEC505: SECURING WINDOWS WITH THE CRITICAL SECURITY CONTROLS 
SEC506: SECURING LINUX/UNIX 
SEC511: CONTINUOUS MONITORING AND SECURITY OPERATIONS 
SEC524: CLOUD SECURITY FUNDAMENTALS 
SEC542: WEB APP PENETRATION TESTING AND ETHICAL HACKING 
SEC546: IPV6 ESSENTIALS 
SEC550: ACTIVE DEFENSE, OFFENSIVE COUNTERMEASURES AND CYBER DECEPTION 
SEC560: NETWORK PENETRATION TESTING AND ETHICAL HACKING 
SEC561: INTENSE HANDS-ON PEN TESTING SKILL DEVELOPMENT (WITH SANS NETWARS) 
SEC562: CYBERCITY HANDS-ON KINETIC CYBER RANGE EXERCISE 
SEC566: IMPLEMENTING AND AUDITING THE CRITICAL SECURITY CONTROLS - IN-DEPTH 
SEC575: MOBILE DEVICE SECURITY AND ETHICAL HACKING 
SEC579: VIRTUALIZATION AND PRIVATE CLOUD SECURITY 
SEC580: METASPLOIT KUNG FU FOR ENTERPRISE PEN TESTING 
SEC617: WIRELESS ETHICAL HACKING, PENETRATION TESTING, AND DEFENSES 
SEC642: ADVANCED WEB APP PENETRATION TESTING AND ETHICAL HACKING 
SEC660: ADVANCED PENETRATION TESTING, EXPLOIT WRITING, AND ETHICAL HACKING 
SEC760: ADVANCED EXPLOIT DEVELOPMENT FOR PENETRATION TESTERS 
SYMANTEC  ADMINISTRATION OF SYMANTEC VIP (MARCH 2017)
ADMINISTRATION OF SYMANTEC IT MANAGEMENT SUITE 8.0 
ADMINISTRATION OF DATA LOSS PREVENTION 14.5 
ADMINISTRATION OF SYMANTEC CYBER SECURITY SERVICES (MAY 2016) 
ADMINISTRATION OF SYMANTEC ADVANCED THREAT PROTECTION 2.0.2 
ADMINISTRATION OF SYMANTEC ENDPOINT PROTECTION 14 
ADMINISTRATION OF SYMANTEC DATA CENTER SECURITY - SERVER ADVANCED 6.7 
VALIDATION AND ID PROTECTION (VIP) SERVICE R1 
IT MANAGEMENT SUITE 8.0 FUNDAMENTALS 
IT MANAGEMENT SUITE 8.0 MODULES 
CLIENT MANAGEMENT SUITE 7.6 ADMINISTRATION 
CLIENT MANAGEMENT SUITE 7.6 IMPLEMENTER 
ASSET MANAGEMENT SUITE 7.5 ADMINISTRATION 
DATA LOSS PREVENTION 14.5: ADMINISTRATION – MUST COMPLETE ALL MODULES FOR CEUS 
DATA LOSS PREVENTION 14.5: DIFFERENCES 
CSS ADMIN R1 – MUST COMPLETE ALL MODULES FOR CEUS 
SYMANTEC DATA CENTER SECURITY – SERVER ADVANCED 6.7 ADMINISTRATION – MUST COMPLETE ALL MODULES FOR CEUS 
ADVANCED THREAT PROTECTION 2.X: INCIDENT RESPONSE – MUST COMPLETE ALL MODULES FOR CEUS 
SYMANTEC ENDPOINT PROTECTION 12.1.X ADMINISTRATION 
SYMANTEC ENDPOINT PROTECTION 12.1 MAINTAIN AND TROUBLESHOOT 
EMAIL SECURITY SERVICES AND WEB SECURITY SERVICE: ADMINISTRATION 
ENDPOINT PROTECTION 14: CONFIGURE AND PROTECT 
ENDPOINT PROTECTION 14: DIFFERENCES 
ENDPOINT PROTECTION 14: MIGRATION AND UPGRADES 
NewsletterSignup
LeverageCertification-Solid