CompTIA CASP

Pre-approved Training for CompTIA CASP Continuing Education Units (CEUs)

Note: Approved training courses in this document are subject to change without prior notification. Training submitted based on prior approval will remain valid. Training submitted after the date on this document must meet this documents training requirements.

Training approved in this document is based on the CompTIA CASP – CAS-003 objectives

 

CERTIFICATION PROVIDER COURSE TITLE
CHECK POINT CHECK POINT CERTIFIED SECURITY ADMINISTRATOR (CCSA) R77.30
SECURITY ENGINEERING (CHECK POINT CERTIFIED SECURITY EXPERT (CCSE) R77.30)
THREAT PREVENTION
SECURE WEB GATEWAY
MDSM WITH VSX (MULTI-DOMAIN SECURITY MANAGEMENT WITH VIRTUAL SYSTEM EXTENSION)
CHECK POINT CERTIFIED SECURITY MASTER (CCSM) R77.30
CHECK POINT CERTIFIED SECURITY ADMINISTRATOR (CCSA) R80
CHECK POINT MANAGED SECURITY EXPERT (CCMSE)
Cloud Security Alliance CCSK FOUNDATION
CCSK PLUS
CWNP CWSP - CERTIFIED WIRELESS SECURITY PROFESSIONAL
EC-COUNCIL DISASTER RECOVERY PROFESSIONAL (EDRP)
LICENSED PENETRATION TESTER (LPT)
CERTIFIED CHIEF INFORMATION SECURITY OFFICER (CCISO)
EC-COUNCIL INFORMATION SECURITY MANAGEMENT (EISM)
ENCASE ENCASE V7 FORENSICS AND ENTERPRISE FUNDAMENTALS
ENCASE® V7 COMPUTER FORENSICS I
INCIDENT INVESTIGATION
ENCASE® CYBERSECURITY AND ANALYTICS V5
ENCASE® ADVANCED COMPUTER FORENSICS
HOST INTRUSION METHODOLOGY AND INVESTIGATION
HP HPE ArcSight Master ASE Preparation Course
ArcSight ESM 6.5 Advanced Administrator
ArcSight ESM 6.5 Advanced Analyst
ArcSight Logger - 6.0 Administration and Operations
Dynamic Application Testing with HP WebInspect 10.3
HP Fortify Static Code Analyzer / Software Security Center 4.2
IBM IBM Security QRadar SIEM 7.2 Administration and Configuration
IBM Security QRadar SIEM Foundations
IBM Security QRadar Incident Forensics Configuration and Usage
Web Application Security Fundamentals
IBM Security Access Manager for Enterprise Single Sign-On 8.2.1 Administration
IBM Security Access Manager for Mobile 8.0
IBM Security Access Manager for Web
IBM Security Privileged Identity Manager Fundamentals
IBM Endpoint Manager 9.2 Security and Compliance Fundamentals
IBM Security QRadar Advanced Topics
IBM Security AppScan Standard Fundamentals
ISACA CISM EXAM REVIEW
CRISC EXAM REVIEW
CISA EXAM REVIEW
CGEIT Exam Review
ISC(2) (ISC)2 TRAINING  FOR CAP
(ISC)2 TRAINING  FOR CISSP
(ISC)2 TRAINING  FOR SSCP
(ISC)2 TRAINING FOR CISSP-ISSAP
(ISC)2 TRAINING  FOR HCISPP
(ISC)2 TRAINING FOR CISSP-ISSEP
(ISC)2 TRAINING  FOR CCSP
LINUX Linux Kernel Debugging and Security
Linux Security Fundamentals
Penetration Testing with Linux Tools
Oracle Oracle 12c Security Administration
ORACLE DATABASE 12C: MANAGING SECURITY
USER SECURITY AND AUDITING IN ORACLE DATABASE 12C
ORACLE DATABASE 11G: DATABASE SECURITY
ORACLE DATABASE 11G: BASIC USER AND STRONG AUTHENTICATION
ORACLE DATABASE 11G: ENTERPRISE USER SECURITY AND PROXY AUTHENTICATION
ORACLE DATABASE 11G: PRIVILEGES, ROLES, AND APPLICATION CONTEXTS
ORACLE DATABASE 11G: ORACLE NET SERVICES AND LISTENER SECURITY
ORACLE DATABASE 11G: FIREWALLS, ORACLE CONNECTION MANAGER, AND SQL*PLUS SECURITY
ORACLE DATABASE 11G RELEASE 2: STORAGE STRUCTURES AND USER SECURITY
SABSA MODULE A1 – ADVANCED SABSA RISK ASSURANCE & GOVERNANCE
MODULE A3 – ADVANCED SABSA ARCHITECTURE & DESIGN
SANS FOR578: CYBER THREAT INTELLIGENCE
ICS410: ICS/SCADA SECURITY ESSENTIALS
ICS515: ICS ACTIVE DEFENSE AND INCIDENT RESPONSE
ICS456: ESSENTIALS FOR NERC CRITICAL INFRASTRUCTURE PROTECTION
MGT305: TECHNICAL COMMUNICATION AND PRESENTATION SKILLS FOR SECURITY PROFESSIONALS
MGT405: CRITICAL INFRASTRUCTURE PROTECTION
MGT414: SANS +S TRAINING PROGRAM FOR THE CISSP® CERTIFICATION EXAM
MGT415: A PRACTICAL INTRODUCTION TO RISK ASSESSMENT
MGT433: SECURING THE HUMAN: HOW TO BUILD, MAINTAIN AND MEASURE A HIGH-IMPACT AWARENESS PROGRAM
MGT512: SANS SECURITY LEADERSHIP ESSENTIALS FOR MANAGERS WITH KNOWLEDGE COMPRESSION
MGT514: IT SECURITY STRATEGIC PLANNING, POLICY AND LEADERSHIP
MGT525: IT PROJECT MANAGEMENT, EFFECTIVE COMMUNICATION, AND PMP® EXAM PREP
MGT535: INCIDENT RESPONSE TEAM MANAGEMENT
SEC440: CRITICAL SECURITY CONTROLS: PLANNING, IMPLEMENTING AND AUDITING
SEC480: TOP 4 MITIGATION STRATEGIES: IMPLEMENTING & AUDITING
SEC501: ADVANCED SECURITY ESSENTIALS - ENTERPRISE DEFENDER
SEC504: HACKER TOOLS, TECHNIQUES, EXPLOITS AND INCIDENT HANDLING
SEC546: IPV6 ESSENTIALS
SEC550: ACTIVE DEFENSE, OFFENSIVE COUNTERMEASURES AND CYBER DECEPTION
SEC566: IMPLEMENTING AND AUDITING THE CRITICAL SECURITY CONTROLS - IN-DEPTH
NewsletterSignup-Solid
LeverageCertification