CompTIA Network+

Pre-approved Training for CompTIA Network+ Continuing Education Units (CEUs)

Note: Approved training courses in this document are subject to change without prior notification. Training submitted based on prior approval will remain valid. Training submitted after the date on this document must meet this documents training requirements.

Training approved in this document is based on the CompTIA Network+ - N10-00​7 objectives.

CERTIFICATION PROVIDER COURSE TITLE
AMAZON WEB SERVICES SECURITY OPERATIONS ON AWS
AWS SECURITY FUNDAMENTALS
ADVANCED ARCHITECTING ON AWS
EXAM READINESS WORKSHOP: AWS CERTIFIED SOLUTIONS ARCHITECT - PROFESSIONAL
DEVELOPING ON AWS
APPLE MAC INTEGRATION BASICS 10.11
MAC INTEGRATION BASICS 10.12
AVAYA IP OFFICE BASIC INTEGRATION AND CONFIGURATION (7720C)
INTRODUCTION TO SESSION INITIATION PROTOCOL (SIP) V2.0
MERIDIAN 1 OPTION 11C INSTALLATION, MAINTENANCE, AND DATABASE - COMMUNICATION SERVER 1000 RELEASE 5.5
STACKABLE ERS AND VSP INSTALLATION, CONFIGURATION, AND MAINTENANCE
AVAYA COMMUNICATION SERVER 1000 DIALING PLAN DESIGN AND IP PEER NETWORKING
ERS 8800/8600 INSTALLATION AND CONFIGURATION
BROCADE BROCADE PROFESSIONAL IP ADMINISTRATOR (BPIPA 200)
NETWORK INDUSTRY PROTOCOLS (NIP 200) ​
CHECK POINT CHECK POINT CERTIFIED SECURITY ADMINISTRATOR (CCSA) R77.30
SECURITY ENGINEERING (CHECK POINT CERTIFIED SECURITY EXPERT (CCSE) R77.30)
THREAT PREVENTION
SECURE WEB GATEWAY
MDSM WITH VSX (MULTI-DOMAIN SECURITY MANAGEMENT WITH VIRTUAL SYSTEM EXTENSION)
CHECK POINT CERTIFIED SECURITY MASTER (CCSM) R77.30
CHECK POINT CERTIFIED SECURITY ADMINISTRATOR (CCSA) R80
CHECK POINT MANAGED SECURITY EXPERT (CCMSE)
CISCO INTERCONNECTING CISCO NETWORKING DEVICES, PART 1 (ICND1) 2.0
INTRODUCING CISCO DATA CENTER NETWORKING (DCICN) 1.0
MANAGING INDUSTRIAL NETWORKS FOR MANUFACTURING WITH CISCO TECHNOLOGIES (IMINS2) 1.0
IMPLEMENTING CISCO NETWORK SECURITY (IINS) 3.0
IMPLEMENTING CISCO WIRELESS NETWORK FUNDAMENTALS (WIFUND) 1.0
IMPLEMENTING CISCO IP ROUTING (ROUTE) 2.0
IMPLEMENTING CISCO IP SWITCHED NETWORKS (SWITCH)  2.0
IMPLEMENTING CISCO SECURE ACCESS SOLUTIONS (SISAS)  1.0
IMPLEMENTING CISCO EDGE NETWORK SECURITY SOLUTIONS (SENSS) 1.0
IMPLEMENTING CISCO SECURE MOBILITY SOLUTIONS (SIMOS) 1.0
DESIGNING CISCO WIRELESS ENTERPRISE NETWORKS (WIDESIGN) 1.0
DEPLOYING CISCO WIRELESS ENTERPRISE NETWORKS (WIDEPLOY) 1.0
TROUBLESHOOTING CISCO WIRELESS ENTERPRISE NETWORKS (WITSHOOT) 1.0
SECURING CISCO WIRELESS ENTERPRISE NETWORKS (WISECURE) 1.0
SECURING CISCO NETWORKS WITH THREAT DETECTION AND ANALYSIS (SCYBER) 1
DESIGNING WITH CISCO NETWORK PROGRAMMABILITY V2.0
DESIGNING WITH CISCO NETWORK PROGRAMMABILITY FOR ACI V1.1
IMPLEMENTING CISCO NETWORK PROGRAMMABILITY V2.0
IMPLEMENTING CISCO NETWORK PROGRAMMABILITY FOR ACI V1.1
INTERCONNECTING CISCO NETWORKING DEVICES, PART 1 (ICND1) 3.0
IMPLEMENTING CISCO SECURE ACCESS CONTROL SYSTEM V5.2 
DESIGNING FOR CISCO INTERNETWORK SOLUTIONS (DESGN) V3.0 
IMPLEMENTING CISCO THREAT CONTROL SOLUTIONS (SITCS) 1.5
SUPPORTING CISCO DATA CENTER SYSTEM DEVICES (DCTECH)
UNDERSTANDING CISCO CYBERSECURITY FUNDAMENTALS (SECFND)
IMPLEMENTING CISCO CYBERSECURITY OPERATIONS (SECOPS)
INTERCONNECTING CISCO NETWORKING DEVICES: ACCELERATED (CCNAX) 3.0
INTERCONNECTING CISCO NETWORKING DEVICES, PART 2 (ICND2) 3.0
DESIGNING CISCO NETWORK SERVICE ARCHITECTURES (ARCH) 3.0
IMPLEMENTING CISCO DATA CENTER UNIFIED COMPUTING (DCUCI) 6.0
Add IMPLEMENTING CISCO DATA CENTER INFRASTRUCTURE (DCII) 6.0
INTRODUCING CISCO DATA CENTER NETWORKING TECHNOLOGIES (DCICT) 6.0
IMPLEMENTING CISCO DATA CENTER VIRTUALIZATION AND AUTOMATION (DCVAI) 6.0
DESIGNING CISCO DATA CENTER INFRASTRUCTURE (DCID) 6.0
TROUBLESHOOTING CISCO DATA CENTER INFRASTRUCTURE (DCIT) 6.0
BUILDING CISCO SERVICE PROVIDER NEXT GENERATION NETWORKS, PART 2 (SPNGN2) 1.2
BUILDING CISCO SERVICE PROVIDER NEXT GENERATION NETWORKS, PART 1 (SPNGN1) 1.2
CITRIX CXM-302 DESIGN, DEPLOY AND MANAGE ENTERPRISE MOBILITY WITH XENMOBILE 9.0
CXD-210: CITRIX XENAPP AND XENDESKTOP ADMINISTRATION
CXD-310: CITRIX XENAPP AND XENDESKTOP ADVANCED ADMINISTRATION
CXD-400 DESIGNING APP AND DESKTOP SOLUTIONS WITH CITRIX XENAPP AND XENDESKTOP
CNS-220: CITRIX NETSCALER ESSENTIALS AND TRAFFIC MANAGEMENT
CNS-222: CITRIX NETSCALER ESSENTIALS AND UNIFIED GATEWAY
CNS-219: CITRIX NETSCALER TRAFFIC MANAGEMENT
CNS-221: CITRIX NETSCALER UNIFIED GATEWAY
NETSCALER SD-WAN
CNS-320: CITRIX NETSCALER ADVANCED TOPICS – SECURITY, MANAGEMENT, AND OPTIMIZATION
CXM-303 DEPLOYING ENTERPRISE MOBILITY SOLUTIONS WITH CITRIX XENMOBILE
CLOUDERA CLOUDERA’S APACHE HADOOP
CLOUD SECURITY ALLIANCE CCSK FOUNDATION
CCSK PLUS
COMPTIA COMPTIA CLOUD+  (CV0-002)
COMPTIA ADVANCED SECURITY PRACTITIONER (CASP) (CAS-003)
COMPTIA NETWORK+ (N10-007) APPROVED ONLY FOR THOSE CERTIFIED IN N10-006 AND EARLIER
COMPTIA SECURITY+  (SY0-501)
COMPTIA SERVER+ (SK0-004)
COMPTIA CYBERSECURITY ANALYST (CySA+) (CS0-001)
COMPTIA PENTEST+ (PT0-001)
CWNP CWTS - CERTIFIED WIRELESS TECHNOLOGY SPECIALIST
CWNA - CERTIFIED WIRELESS NETWORK ADMINISTRATOR
CWSP - CERTIFIED WIRELESS SECURITY PROFESSIONAL
CWDP – CERTIFIED WIRELESS DESIGN PROFESSIONAL
CWAP - CERTIFIED WIRELESS ANALYSIS PROFESSIONAL
DELL Introduction to Dell PS Series Storage Arrays
Dell Storage Networking Configuration
Dell FS8600 NAS Installation and Configuration
Dell Networking Planning
Dell Networking Installation and Configuration
Dell Networking Interoperability
Dell Networking Fundamentals-Routing
Dell Networking Fundamentals - Switching
Dell Networking Data Center Advanced Features & Administration
Dell Networking Campus Design, Advanced Features and Configuration
Dell Networking Fast Track from Cisco to Dell OS 9
Dell Campus Networking N-Series Features & Basic Administration
Dell Networking Data Center Overview & Basic Administration
EC-COUNCIL CERTIFIED SECURITY ANALYST (ECSA) V9
NETWORK SECURITY ADMINISTRATOR (ENSA)
DISASTER RECOVERY PROFESSIONAL (EDRP)
LICENSED PENETRATION TESTER (LPT)
COMPUTER HACKING FORENSICS INVESTIGATOR (CHFI)
CERTIFIED CHIEF INFORMATION SECURITY OFFICER (CCISO)
CERTIFIED ETHICAL HACKER (CEH) V9
CERTIFIED SECURITY SPECIALIST (ECSS)
CERTIFIED INCIDENT HANDLER (ECIH)
CERTIFIED ENCRYPTION SPECIALIST (ECES)
EC-COUNCIL INFORMATION SECURITY MANAGEMENT (EISM)
CERTIFIED NETWORK DEFENDER (CND)
CERTIFIED NETWORK DEFENSE ARCHITECT (CNDA)
CAST 611V3 ADVANCED PENETRATION TESTING
CAST 616 SECURING WINDOWS INFRASTRUCTURE
CAST 613 HACKING AND HARDENING CORPORATE WEB APP/WEB SITE
CAST 614 ADVANCED NETWORK DEFENSE
EMC Avamar Integration and Performance Management
Avamar Management
Backup Recovery Solutions – Avamar to Data Domain Integration
Celerra NS Series Installation and Maintenance
Celerra Unified QuickStart: Basic Implementation Using Provisioning Wizards
Celerra Unified QuickStart: NS-120 Hardware Overview & Installation
Celerra Unified QuickStart: Installation and Configuration Using CSA
Celerra Unified QuickStart: NS-480 Hardware Overview & Installation
Celerra Unified QuickStart: Product Installation and Configuration Overview
Celerra Unified QuickStart: NX4 Hardware Overview & Installation
Celerra Unified QuickStart: Provisioning for FCConnected Hosts
Centera Fundamentals
Centera Hardware Configurations
Centera Installation and Maintenance
Centera Software Configurations
CLARiiON CX3 Installation Differences
CLARiiON Foundations
CLARiiON Hardware
CLARiiON Installation and Maintenance
Cloud Infrastructure Planning and Design
Cloud Services Planning and Design
Connectivity Protocols
Data Domain System Administration
EMC Availability Infrastructure Solutions And Design
EMC Storage Integration with Oracle Best Practices
EMC Storage Integration with Microsoft Exchange Best Practices
VCE Vblock Systems Administration and Management
VMAX Family Installation and Maintenance
ViPR SRM Advanced Reporting
Storage Performance Fundamentals
Isilon Infrastructure Solutions
SAN Management
Networker Installation, Configuration and Administration
Isilon Solution Design
Isilon Initial Configuration
VMAX3 Security Concepts
Centera Tools and Installation
ENCASE ENCASE V7 FORENSICS AND ENTERPRISE FUNDAMENTALS
ENCASE® V7 COMPUTER FORENSICS I
INCIDENT INVESTIGATION
ENCASE® CYBERSECURITY AND ANALYTICS V5
ENCASE® ADVANCED COMPUTER FORENSICS
ENCASE® V7 COMPUTER FORENSICS II
HOST INTRUSION METHODOLOGY AND INVESTIGATION
GOOGLE GOOGLE CLOUD PLATFORM FUNDAMENTALS: CORE INFRASTRUCTURE
ARCHITECTING WITH GOOGLE CLOUD PLATFORM: INFRASTRUCTURE
GOOGLE CLOUD PLATFORM FOR SYSTEMS OPERATIONS PROFESSIONALS
GOOGLE CLOUD FUNDAMENTALS: BIG DATA & MACHINE LEARNING
DATA ENGINEERING ON GOOGLE CLOUD PLATFORM
G SUITE ADMINISTRATOR FUNDAMENTALS
GOOGLE CLOUD PLATFORM FUNDAMENTALS FOR AWS PROFESSIONALS
HP Designing HP Data Center and Cloud Solutions, Rev. 15.11
Designing HPE Data Center and Cloud Solutions, Rev. 16.11
Delta - Designing HPE Data Center and Cloud Solutions, Rev. 16.11
Creating HPE Software-defined Networks, Rev. 15.41
Building HP FlexFabric Data Centers, Rev. 14.41
Architecting HP FlexNetwork Solutions, Rev 14.21
Deploying HP FlexNetwork Core Technologies, Rev 14.31
HPE ArcSight Master ASE Preparation Course
ArcSight ESM 6.5 Advanced Administrator
ArcSight ESM 6.5 Advanced Analyst
ArcSight Logger - 6.0 Administration and Operations
Dynamic Application Testing with HP WebInspect 10.3
HP Fortify Static Code Analyzer / Software Security Center 4.2
HP/ARUBA ADVANCED TROUBLESHOOTING
AIRWAVE WIRELESS MANAGEMENT SUITE INSTALLATION, CONFIGURATION & USE
ARUBA INSTANT ACCESS POINTS (IAP)
CLEARPASS ESSENTIALS
HP ONLY - ARUBA MOBILITY BOOT CAMP
IMC ESSENTIALS FOR NETWORK ADMINISTRATORS
IMPLEMENTING ARUBA WLAN
MIGRATING FROM CISCO TO HP FLEXNETWORKS
MOBILITY ACCESS SWITCH
SCALABLE WLAN DESIGN & IMPLEMENTATION (SWDI)
SOLUTIONS PART 1
IBM IBM Security QRadar SIEM 7.2 Administration and Configuration
IBM Security QRadar SIEM Foundations
IBM Security Directory Server 6.3.1 System Administration
IBM Security Identity Manager 6.0 Basic Administration
IBM Security QRadar Incident Forensics Configuration and Usage
Web Application Security Fundamentals
IBM Security Access Manager for Enterprise Single Sign-On 8.2.1 Administration
IBM Security Access Manager for Mobile 8.0
IBM Security Access Manager for Web
IBM Security Privileged Identity Manager Fundamentals
IBM Endpoint Manager 9.2 Security and Compliance Fundamentals
IBM Security QRadar Advanced Topics
IBM Security AppScan Standard Fundamentals
AIX Network Installation Manager (NIM): Concepts and Configuration
ISACA COBIT 5 ASSESSOR FOR SECURITY
CRISC EXAM REVIEW
CYBERSECURITY FUNDAMENTALS
CSX PRACTITIONER: IDENTIFICATION AND PROTECTION
CSX PRACTITIONER: RESPOND AND RECOVER
CSX PRACTITIONER BOOT CAMP
CSX PRACTITIONER:  DETECTION
Real World Application of RMF for DoD IT
CISA EXAM REVIEW
ISC(2) (ISC)2 TRAINING  FOR CCFP
(ISC)2 TRAINING  FOR CCSP
(ISC)2 TRAINING  FOR CISSP
(ISC)2 TRAINING  FOR CISSP-ISSAP
(ISC)2 TRAINING  FOR CISSP-ISSEP
(ISC)2 TRAINING  FOR CISSP-ISSMP
(ISC)2 TRAINING  FOR SSCP
JUNIPER ADVANCED DATA CENTER SWITCHING (ADCX)
JUNIPER NETWORKS DESIGN FUNDAMENTALS (JNDF) 
ADVANCED JUNIPER NETWORKS VPN IMPLEMENTATIONS (AJVI)
ADVANCED JUNOS ENTERPRISE ROUTING (AJER)
ADVANCED JUNOS ENTERPRISE ROUTING TROUBLESHOOTING (AJERT)
ADVANCED JUNOS ENTERPRISE SECURITY TROUBLESHOOTING (AJEST)
ADVANCED JUNOS ENTERPRISE SWITCHING (AJEX)
ADVANCED JUNOS SECURITY (AJSEC)
ADVANCED JUNOS SERVICE PROVIDER ROUTING (AJSPR)
ADVANCED JUNOS ENTERPRISE SWITCHING USING ENHANCED LAYER 2 SOFTWARE (AJEX-ELS)
ADVANCED JUNOS SERVICE PROVIDER TROUBLESHOOTING (AJSPT)
ATTACK PREVENTION WITH JUNIPER NETWORKS FIREWALLS (APJF)
INTEGRATING JUNIPER NETWORKS FIREWALL/IPSEC VPN PRODUCTS INTO HIGH-PERFORMANCE NETWORKS (IFVH)
JUNOS ENTERPRISE SWITCHING (JEX)
JUNOS ENTERPRISE SWITCHING USING ELS (JEX-ELS) 
JUNOS INTERMEDIATE ROUTING (JIR)
JUNOS MULTICAST ROUTING (JMR)
JUNIPER NETWORKS DESIGN-WAN (JND-WAN)
CONFIGURING JUNIPER NETWORKS FIREWALL/IPSEC VPN PRODUCTS (CJFV)
JUNOS EDGE SECURITY SERVICES (JESS)
JNCIE SECURITY BOOTCAMP (JNCIE-SEC)
JNCIE SERVICE PROVIDER BOOTCAMP (JNCIE-SP)
JUNIPER NETWORKS DESIGN - DATA CENTER (JND-DC)
JUNOS SECURITY (JSEC)
NETWORK AUTOMATION USING CONTRAIL CLOUD (NACC)
JUNOS SERVICE PROVIDER SWITCHING (JSPX)
NETWORKING FUNDAMENTALS
WLAN FUNDAMENTALS
JNCIE ENTERPRISE BOOTCAMP (JNCIE-ENT)
INTRODUCTION TO THE JUNOS OPERATING SYSTEM (IJOS)
JUNOS CLASS OF SERVICE (JCOS)
CONFIGURING STEEL-BELTED RADIUS CARRIER (CSBR)
JUNIPER NETWORKS DESIGN-SECURITY (JND-SEC)
JUNOS SPACE-SECURITY DIRECTOR (JS-SD)
IMPLEMENTING JUNIPER NETWORKS SECURE ANALYTICS (IJSA)
NETWORK AUTOMATION IN THE WAN (NA-WAN)
JUNOS LAYER 3 VPNS (JL3V)
JUNOS LAYER 2 VPNS (JL2V)
JUNOS MPLS FUNDAMENTALS (JMF)
JUNOS TROUBLESHOOTING IN THE NOC (JTNOC)
JUNOS SUBSCRIBER MANAGEMENT (JSM)
JUNOS AUTOMATION (JAUT)
LINUX Linux Kernel Debugging and Security
Penetration Testing with Linux Tools
Advanced Linux System Administration and Networking
Software Defined Networking with OpenDaylight
Linux Networking and Administration
Linux Security Fundamentals
Software Defined Networking Fundamentals
MCAFEE MCAFEE ENDPOINT SECURITY 10.X ADMINISTRATION
MCAFEE ENDPOINT SECURITY UPGRADE
MCAFEE ADVANCED THREAT DETECTION ADMINISTRATION
MCAFEE VIRUSSCAN AND EPOLICY ORCHESTRATOR ADMINISTRATION
MCAFEE NETWORK SECURITY PLATFORM ADMINISTRATION
MCAFEE HOST INTRUSION PREVENTION SYSTEM ADMINISTRATION
MCAFEE DATA LOSS PREVENTION ENDPOINT ADMINISTRATION
SECURITY INFORMATION AND EVENT MANAGEMENT (SIEM) ADMINISTRATION
MICROSOFT NETWORKING FUNDAMENTALS
SECURITY FUNDAMENTALS
INSTALLING AND CONFIGURING WINDOWS SERVER® 2012
WINDOWS SERVER ADMINISTRATION FUNDAMENTALS
NETWORKING WITH WINDOWS SERVER 2016
IDENTITY WITH WINDOWS SERVER 2016
ADMINISTERING WINDOWS SERVER 2012
CONFIGURING ADVANCED WINDOWS SERVER 2012 SERVICES
DESIGNING AND IMPLEMENTING A SERVER INFRASTRUCTURE
IMPLEMENTING AN ADVANCED SERVER INFRASTRUCTURE
DEVELOPING MICROSOFT AZURE SOLUTIONS
IMPLEMENTING MICROSOFT AZURE INFRASTRUCTURE SOLUTIONS
ADMINISTERING MICROSOFT SQL SERVER DATABASES
DESIGNING A DATA SOLUTION WITH MICROSOFT SQL SERVER
WINDOWS OPERATING SYSTEM AND WINDOWS SERVER FUNDAMENTALS
WINDOWS SERVER 2012: TECHNICAL OVERVIEW
SECURING WINDOWS SERVER 2016
WINDOWS SERVER 2012 TRAINING: NETWORKING
WINDOWS SERVER 2012: IDENTITY AND ACCESS
WINDOWS SERVER 2012: STORAGE
DEVELOPING MICROSOFT SQL SERVER DATABASES
DESIGNING DATABASE SOLUTIONS FOR SQL SERVER
NOVELL DEPLOYING OPEN ENTERPRISE SERVER 11 FOR LINUX (COURSE 8727)
OPEN ENTERPRISE SERVER 11 ADMINISTRATION (COURSE 3119)
SUSE LINUX ENTERPRISE SERVER 10: NETWORKING SERVICES [COURSE 3074]
SUSE LINUX ENTERPRISE SERVER 10: SECURITY [COURSE 3075]
NETIQ EDIRECTORY DESIGN AND IMPLEMENTATION: EDIRECTORY 8.8 [COURSE 3067]
NOVELL OPEN ENTERPRISE SERVER FOR NETWARE ADMINISTRATION [COURSE 3081]
NOVELL OPEN ENTERPRISE SERVER FOR NETWARE ADVANCED ADMINISTRATION [COURSE 3082]
UPGRADING TO NOVELL OPEN ENTERPRISE SERVER FOR NETWARE [COURSE 3083]
FILE MANAGEMENT SUITE EDIRECTORY (COURSE 8720)
FILE MANAGEMENT SUITE - ACTIVE DIRECTORY (COURSE 8721)
ZENWORKS CONFIGURATION MANAGEMENT ADMINISTRATION (COURSE 3120)
SECURING WINDOWS WORKSTATIONS USING ZENWORKS ENDPOINT SECURITY MANAGEMENT 11.X (COURSE 8520)
OFFENSIVE SECURITY PENETRATION TESTING WITH KALI LINUX
ADVANCED WINDOWS EXPLOITATION 
OFFENSIVE SECURITY WIRELESS ATTACKS (WIFU)
CRACKING THE PERIMETER (CTP)
ADVANCED WEB ATTACKS AND EXPLOITATION
METASPLOIT UNLEASHED
OFFENSIVE SECURITY PENETRATION TESTING LAB
Oracle Oracle 12c Security Administration
ORACLE DATABASE 12C: MANAGING SECURITY
USER SECURITY AND AUDITING IN ORACLE DATABASE 12C
ORACLE DATABASE 11G: INTRODUCTION TO DATABASE SECURITY AND SOLUTIONS
ORACLE DATABASE 11G: DATABASE SECURITY
ORACLE DATABASE 11G: BASIC USER AND STRONG AUTHENTICATION
ORACLE DATABASE 11G: ENTERPRISE USER SECURITY AND PROXY AUTHENTICATION
ORACLE DATABASE 11G: PRIVILEGES, ROLES, AND APPLICATION CONTEXTS
ORACLE DATABASE 11G: ORACLE NET SERVICES AND LISTENER SECURITY
ORACLE DATABASE 11G: FIREWALLS, ORACLE CONNECTION MANAGER, AND SQL*PLUS SECURITY
ORACLE DATABASE 11G RELEASE 2: STORAGE STRUCTURES AND USER SECURITY
ORACLE SOA SUITE 11G: SOA SECURITY AND ADOPTION PLANNING
PALO ALTO FIREWALL ESSENTIALS 8.0: CONFIGURATION AND MANAGEMENT (EDU-210)
PANORAMA 8.0: MANAGE MULTIPLE FIREWALLS (EDU-221)
FIREWALL 8.0: DEBUG AND TROUBLESHOOT (EDU-311)
FIREWALL 7.1: INSTALL, CONFIGURE, AND MANAGE (EDU-201)
FIREWALL 7.1: CONFIGURE EXTENDED FEATURES (EDU-205)
PANORAMA 7.1: MANAGE MULTIPLE FIREWALLS (EDU-221)
FIREWALL 7.1: MANAGE CYBERTHREATS (EDU-231)
FIREWALL 7.1: DEBUG AND TROUBLESHOOT (EDU-311)
TRAPS 3.4: DEPLOY AND OPTIMIZE (EDU-285)
TRAPS 3.4: INSTALL, CONFIGURE AND MANAGE (EDU-281)
FIREWALL ESSENTIALS 8.0: CONFIGURATION AND MANAGEMENT (EDU-110)
RED HAT RED HAT SYSTEM ADMINISTRATION I (RH124)
RED HAT SYSTEM ADMINISTRATION II (RH134)
RHCSA RAPID TRACK COURSE (RH199)
RED HAT OPENSTACK ADMINISTRATION I (CL110)
RED HAT OPENSTACK ADMINISTRATION II (CL210)
RED HAT SYSTEM ADMINISTRATION III (RH254)
RHCE CERTIFICATION LAB
RED HAT OPENSTACK SYSTEM ADMINISTRATION III (CL310)
RED HAT CLOUDFORMS HYBRID CLOUD MANAGEMENT (CL220)
RED HAT SERVER HARDENING
RED HAT HIGH AVAILABILITY CLUSTERING (RH436)
RED HAT SECURITY: Linux in Physical, Virtual, and Cloud (RH415)
RIVERBED WAN200 OPTIMIZATION ESSENTIALS
HCB200 HYPER-CONVERGED BRANCH ESSENTIALS
NPM200 PERFORMANCE MONITORING ESSENTIALS
APPRESPONSE
TRANSACTION ANALYZER
RIVERBED APM200 APPLICATION PERFORMANCE MONITORING ESSENTIALS
RIVERBED RCPE-APPV APPLICATION VISIBILITY
NOS200 NETWORK PLANNING AND CONFIGURATION MANAGEMENT
WAN310 OPTIMIZING ENTERPRISE APPLICATIONS AND PROTOCOLS
WAN350 IMPLEMENTING ENTERPRISE OPTIMIZATION ARCHITECTURES
SABSA SABSA FOUNDATION MODULES (F1 & F2)
MODULE A1 – ADVANCED SABSA RISK ASSURANCE & GOVERNANCE
MODULE A3 – ADVANCED SABSA ARCHITECTURE & DESIGN
SANS NETWARS - TOURNAMENT
NETWARS: CONTINUOUS
AUD507: AUDITING & MONITORING NETWORKS, PERIMETERS & SYSTEMS
AUD566: IMPLEMENTING AND AUDITING THE CRITICAL SECURITY CONTROLS - IN-DEPTH
AUD440: CRITICAL SECURITY CONTROLS: PLANNING, IMPLEMENTING AND AUDITING
AUD480: TOP 4 MITIGATION STRATEGIES: IMPLEMENTING & AUDITING
FOR408: WINDOWS FORENSIC ANALYSIS
FOR508: ADVANCED DIGITAL FORENSICS, INCIDENT RESPONSE, AND THREAT HUNTING
FOR518: MAC FORENSIC ANALYSIS
FOR526: MEMORY FORENSICS IN-DEPTH
FOR572: ADVANCED NETWORK FORENSICS AND ANALYSIS
FOR578: CYBER THREAT INTELLIGENCE
FOR585: ADVANCED SMARTPHONE ​FORENSICS ​
ICS515: ICS ACTIVE DEFENSE AND INCIDENT RESPONSE
ICS410: ICS/SCADA SECURITY ESSENTIALS
ICS456: ESSENTIALS FOR NERC CRITICAL INFRASTRUCTURE PROTECTION
MGT414: SANS +S TRAINING PROGRAM FOR THE CISSP® CERTIFICATION EXAM
MGT415: A PRACTICAL INTRODUCTION TO RISK ASSESSMENT
MGT433: SECURING THE HUMAN: HOW TO BUILD, MAINTAIN AND MEASURE A HIGH-IMPACT AWARENESS PROGRAM
MGT512: SANS SECURITY LEADERSHIP ESSENTIALS FOR MANAGERS WITH KNOWLEDGE COMPRESSION
MGT514: IT SECURITY STRATEGIC PLANNING, POLICY AND LEADERSHIP
MGT535: INCIDENT RESPONSE TEAM MANAGEMENT ​
LEG523: LAW OF DATA SECURITY AND INVESTIGATIONS
SEC301: INTRO TO INFORMATION SECURITY
SEC401: SECURITY ESSENTIALS BOOTCAMP STYLE
SEC440: CRITICAL SECURITY CONTROLS: PLANNING, IMPLEMENTING AND AUDITING
SEC480: TOP 4 MITIGATION STRATEGIES: IMPLEMENTING & AUDITING
SEC501: ADVANCED SECURITY ESSENTIALS - ENTERPRISE DEFENDER
SEC502: PERIMETER PROTECTION IN-DEPTH
SEC503: INTRUSION DETECTION IN-DEPTH
SEC504: HACKER TOOLS, TECHNIQUES, EXPLOITS AND INCIDENT HANDLING
SEC506: SECURING LINUX/UNIX ​
SEC511: CONTINUOUS MONITORING AND SECURITY OPERATIONS
SEC524: CLOUD SECURITY FUNDAMENTALS
SEC542: WEB APP PENETRATION TESTING AND ETHICAL HACKING
SEC546: IPV6 ESSENTIALS
SEC550: ACTIVE DEFENSE, OFFENSIVE COUNTERMEASURES AND CYBER DECEPTION
SEC560: NETWORK PENETRATION TESTING AND ETHICAL HACKING
SEC561: INTENSE HANDS-ON PEN TESTING SKILL DEVELOPMENT (WITH SANS NETWARS)
SEC562: CYBERCITY HANDS-ON KINETIC CYBER RANGE EXERCISE
SEC566: IMPLEMENTING AND AUDITING THE CRITICAL SECURITY CONTROLS - IN-DEPTH
SEC573: PYTHON FOR PENETRATION TESTERS
SEC575: MOBILE DEVICE SECURITY AND ETHICAL HACKING
SEC579: VIRTUALIZATION AND PRIVATE CLOUD SECURITY
SEC580: METASPLOIT KUNG FU FOR ENTERPRISE PEN TESTING
SEC617: WIRELESS ETHICAL HACKING, PENETRATION TESTING, AND DEFENSES
SEC642: ADVANCED WEB APP PENETRATION TESTING AND ETHICAL HACKING
SEC660: ADVANCED PENETRATION TESTING, EXPLOIT WRITING, AND ETHICAL HACKING
SEC760: ADVANCED EXPLOIT DEVELOPMENT FOR PENETRATION TESTERS
SYMANTEC ADMINISTRATION OF SYMANTEC MESSAGING GATEWAY 10.5
ADMINISTRATION OF SYMANTEC CONTROL COMPLIANCE SUITE 11.X
ADMINISTRATION OF SYMANTEC VIP (MARCH 2017)
ADMINISTRATION OF SYMANTEC IT MANAGEMENT SUITE 8.0
ADMINISTRATION OF DATA LOSS PREVENTION 14.5
ADMINISTRATION OF SYMANTEC CYBER SECURITY SERVICES (MAY 2016)
ADMINISTRATION OF SYMANTEC ADVANCED THREAT PROTECTION 2.0.2
ADMINISTRATION OF SYMANTEC ENDPOINT PROTECTION 14
ADMINISTRATION OF SYMANTEC DATA CENTER SECURITY - SERVER ADVANCED 6.7
SYMANTEC MESSAGING GATEWAY 10.0 – ADMINISTRATION
SYMANTEC MESSAGING GATEWAY 10.5 ADMINISTRATION: WHAT’S NEW IN 10.5
SYMANTEC CONTROL COMPLIANCE SUITE 11.0: ADMINISTRATION - MUST COMPLETE ALL MODULES FOR CEUS
SYMANTEC CONTROL COMPLIANCE SUITE 11.0: DIFFERENCES
VALIDATION AND ID PROTECTION (VIP) SERVICE R1
IT MANAGEMENT SUITE 8.0 FUNDAMENTALS
IT MANAGEMENT SUITE 8.0 MODULES
CLIENT MANAGEMENT SUITE 7.6 ADMINISTRATION
CLIENT MANAGEMENT SUITE 7.6 IMPLEMENTER
ASSET MANAGEMENT SUITE 7.5 ADMINISTRATION
DATA LOSS PREVENTION 14.5: ADMINISTRATION – MUST COMPLETE ALL MODULES FOR CEUS
DATA LOSS PREVENTION 14.5: DIFFERENCES
CSS ADMIN R1 – MUST COMPLETE ALL MODULES FOR CEUS
SYMANTEC DATA CENTER SECURITY – SERVER ADVANCED 6.7 ADMINISTRATION – MUST COMPLETE ALL MODULES FOR CEUS
ADVANCED THREAT PROTECTION 2.X: INCIDENT RESPONSE – MUST COMPLETE ALL MODULES FOR CEUS
SYMANTEC ENDPOINT PROTECTION 12.1.X ADMINISTRATION
SYMANTEC ENDPOINT PROTECTION 12.1 MAINTAIN AND TROUBLESHOOT
EMAIL SECURITY SERVICES AND WEB SECURITY SERVICE: ADMINISTRATION
ENDPOINT PROTECTION 14: CONFIGURE AND PROTECT
ENDPOINT PROTECTION 14: DIFFERENCES
ENDPOINT PROTECTION 14: MIGRATION AND UPGRADES
VMWARE VMWARE NSX: INSTALL, CONFIGURE, MANAGE [V6.2]
VCLOUD: DESIGN BEST PRACTICES [V1.5]
VMWARE NSX TROUBLESHOOTING AND OPERATIONS [V6.2]
VMWARE NETWORK VIRTUALIZATION FUNDAMENTALS 2016
NewsletterSignup
LeverageCertification-Solid