CompTIA Security+ Pre-approved Training for CompTIA Security+ Continuing Education Units (CEUs)



Similar documents
CompTIA CASP Pre-approved Training for CompTIA CASP Continuing Education Units (CEUs)

CompTIA A+ Pre-approved Training for CompTIA A+ Continuing Education Units (CEUs)

Learning Tree Training Pre-approved Training for Continuing Education Units (CEUs)

Field of Study Area of Expertise Certification Vendor Course

Course and Service Portfolio Specialized IT courses for IT professional and organizations willing to take benefit from the competitive advantages

JUNIPER NETWORKS LEARNING PATHS

Pluralsight Training Pre-Approved for CompTIA CEUs

The following chart indicates the Career Academy courses eligible for transfer credit by challenge exam.

Brandman University. School of CCNA

FedVTE Training Catalog SPRING advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

Class Name Retail Price # Days Start Date End Date. Microsoft Microsoft Certification Boot Camps. $4,495 or $4,995 (w/ travel & lodging)

Skillsoft Pre-Approved for CompTIA CEUs

FedVTE Training Catalog SUMMER advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

Boost elearning IT Training INSTRUCTIONAL DESIGN, LEARNING PATHS, AND COURSE CATALOGUE

Access FedVTE online at: fedvte.usalearning.gov

Renewing CompTIA Certifications With Achieving Other Vendor Certifications

Defense Cyber Investigations Training Academy (DCITA) Pre-Approved Training for CompTIA Continuing Education Units (CEUs)

State of South Carolina InfoSec and Privacy Career Path Model

Hackers are here. Where are you?

Cybercrime & Cybersecurity: the Ongoing Battle International Hellenic University

Information Security Principles and Practices

Social Media Security Training and Certifications. Stay Ahead. Get Certified. Ultimate Knowledge Institute. ultimateknowledge.com

Track 2: Introductory Track PREREQUISITE: BASIC COMPUTER EXPERIENCE

Schedule Singapore 2015

Event Length. Register for Events Online minutes 1 Each Week 2 hrs 2 hrs 2 hrs 2 hrs 2 hrs.

Implementing Cisco Secure AccessSolutions Exam

IT Networking and Security

Stacey Cumberbatch Commissi oner

Ciscon koulutustarjonta arkkitehtuureittain 2015

E M P I R E C O L L E G E

Microsoft : : : : Kuala Lumpur Petaling Jaya Penang Johor Bahru

Global Knowledge Cybersecurity Training

Penetration testing & Ethical Hacking. Security Week 2014

Juniper training.

Microsoft Technologies

EC-Council Certified Security Analyst (ECSA)

Hackers are here. Where are you?

IT Technical and Business Applications. Training Catalogue 2011

167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College

WORK PROCESS SCHEDULE COMPUTER SYSTEMS ANALYST O*NET-SOC CODE: RAPIDS CODE: 2017HY. Work Process and Classroom Training Duties and Hours

Cyber Defense Operations Graduate Certificate

LINUX / INFORMATION SECURITY

SPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals: Job Profiles

167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College

CRYPTOGEDDON: HEALTH CARE COMPROMISE. Todd Dow, CISA, PMP Founder,

Global Knowledge Cybersecurity Training

Computer Networking Technology

Montgomery County Community College Non-Credit Programs Winter/Spring 2016 TECHNOLOGY PROGRAMS

CÓDIGO DESCRIPCIÓN LUGAR HORAS Ene Feb Mar Abr. CAT6KS Advanced Cisco Catalyst 6500 Switching Madrid

Linux Technologies QUARTER 1 DESKTOP APPLICATIONS - ESSENTIALS QUARTER 2 NETWORKING AND OPERATING SYSTEMS ESSENTIALS. Module 1 - Office Applications

Analyze. Secure. Defend. Do you hold ECSA credential?

Global Knowledge (Thailand) Co.,Ltd. Training Schedule for Jul -Dec 2015

FedVTE Course Library

Information Technology Cluster

Course Descriptions November 2014

CH ENSA EC-Council Network Security Administrator Detailed Course Outline

Information Security solutions that protect your business

Security Architect s.r.l. Via Boccaccio, Casamassima (BA) tel fax

Programa de Cursos 2013 Cisco

Course Venue :- Lab 302, IT Dept., Govt. Polytechnic Mumbai, Bandra (E)

Information Security Engineering

There are a lot more hot pick courses available at Training Partners now. These courses are confirmed to run in September

DoD Directive (DoDD) 8570 & GIAC Certification

Information Systems Security Certificate Program

IT Networking and Security

Computer Forensics and Security Institute

CISCO LEARNING PARTNER DOMAIN SPECIFIC COURSE LIST

Guide to information security certifications. SearchSecurity.com's guide to vendor-neutral security certifications

Knowlogy Class Schedule

Logical Operations CyberSec First Responder: Threat Detection and Response (CFR) Exam CFR-110

Ranking Certifications

InfoSec Academy Pen Testing & Hacking Track

E-LEARNING BUSINESS COURSES

Certification and Training

EC-Council Network Security Administrator (ENSA) Duration: 5 Days Method: Instructor-Led

Diploma in Information Technology Network Integration Specialist COURSE INFO PACK

ExecuTrain Live Virtual Training Schedule. Sepetember December 2013

EC-Council Certified Security Analyst / License Penetration Tester (ECSA/LPT) v4.0 Bootcamp

FedVTE Course Library

Remote Lab Price List

Juniper training. Head Office: Northern Office:

Implementing Cisco IOS Network Security v2.0 (IINS)

Networking: EC Council Network Security Administrator NSA

Network Support. Technical Certificate. Program Outcomes: FOUNDATION COURSES. 1 of 7

Diploma in Information Technology Network Intergration Specialist COURSE INFORMATION PACK

Programa de Cursos 2013 Cisco

IT Security Training. Why Security Certification? A Serious Business - Fear Drives the Demand High Demand Freedom to Make and Break Rules

Course Title: Penetration Testing: Security Analysis

Security Transcends Technology

For more information, please contact Anne Arundel Community College s Center for Workforce Solutions at

CCIE Exam Certification CCIE Routing and Switching Exam Certification Guide dec-2009

Professional Services Overview

Fast Lane México presenta su calendario de cursos:

Technical Manager / Fortinet Product Owner at Space Data Systems - Jordan (SDS) alzard_m@hotmail.com

Security Certifications. Presentatie SecCert 101 Jordy Kersten MSc., ISC2 Ass., CEH, OSCP

BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports

Cybersecurity Certificate Programs

EC-Council. Certified Ethical Hacker. Program Brochure

Hardening and Hacking vsphere and Private Cloud Everything you need to know about vsphere Security

Information Security and Privacy. Lynn McNulty, CISSP. Advisory Board November 2008

Transcription:

CompTIA Security+ Pre-approved Training for CompTIA Security+ Continuing Education Units (CEUs) Note: Approved training courses in this document are subject to change without prior notification. Training submitted based on prior approval will remain valid. Training submitted after the date on this document must meet this documents training requirements. Training approved in this document is based on the CompTIA Security+ - SY0-401 objectives. Activity name to use when uploading CEUs into a certification record: Completed a Training Course Training formats accepted are Classroom-Based, Live Online, Private On-Site and Self-paced e-learning. CEU Required Documentation: The certified professional must upload a certificate of completion into their certification record as proof of attendance. The completion certification must contain the following information: 1. Name of training provider 2. Training course title 3. Name of the certified professional 4. Date the training was completed The course duration hours are to be used when entering CEU hours in a certification record. Please see the training provider course descriptions for durations. If a certified professional cannot provide proof of completion the training cannot be used for CEUs. CEU Activity Guidelines: If renewing a good for life certification the training must have been completed within 90 days prior to enrolling in the Continuing Education (CE) program or within the 3 year CE cycle. If renewing a ce certification, training must be completed within the 3 year CE cycle. To view pre-approved training for CompTIA Security+ CEUs click on any of the certification provider names below Apple Cisco CompTIA CWNP EC-Council GIAC ISACA ISC(2) Juniper Linux Microsoft Novell Red Hat Symantec VMware January 2015 CompTIA Security+ v1 1

APPLE MAVERICKS 101: OS X SUPPORT ESSENTIALS 10.9 MOUNTAIN LION 201: MAC OS X SERVER ESSENTIALS V10.8 MAVERICKS 201: OS X SERVER ESSENTIALS 10.9 CISCO INTERCONNECTING CISCO NETWORKING DEVICES PART 1 (ICND1) 1.0 INTERCONNECTING CISCO NETWORKING DEVICES, PART 1 (ICND1) 2.0 INTERCONNECTING CISCO NETWORKING DEVICES, PART 2 (ICND2) 2.0 INTERCONNECTING CISCO NETWORKING DEVICES PART 2 (ICND2) 1.0 INTERCONNECTING CISCO NETWORKING DEVICES: ACCELERATED (CCNAX) 1.0 INTERCONNECTING CISCO NETWORKING DEVICES: ACCELERATED (CCNAX) 2.0 INTRODUCING CISCO DATA CENTER NETWORKING (DCICN) 1.0 INTRODUCING CISCO DATA CENTER TECHNOLOGIES (DCICT) 1.0 IMPLEMENTING CISCO IOS NETWORK SECURITY (IINS) 2.0 IMPLEMENTING CISCO SECURE ACCESS SOLUTIONS (SISAS) 1.0 IMPLEMENTING CISCO EDGE NETWORK SECURITY SOLUTIONS (SENSS) 1.0 IMPLEMENTING CISCO SECURE MOBILITY SOLUTIONS (SIMOS) 1.0 IMPLEMENTING CISCO THREAT CONTROL SOLUTIONS (SITCS) 1.0 IMPLEMENTING CISCO UNIFIED WIRELESS MOBILITY SERVICES (IUWMS) 2.0 COMPTIA CWNP EC-COUNCIL GIAC IMPLEMENTING ADVANCED CISCO UNIFIED WIRELESS SECURITY (IAUWS) 2.0 COMPTIA ADVANCED SECURITY PRACTITIONER (CASP) (CAS-001) COMPTIA MOBILE APP SECURITY+ - IOS EDITION (IOS-001) COMPTIA MOBILE APP SECURITY+ - ANDROID EDITION (ADR-001) COMPTIA MOBILITY+ (MB0-001) COMPTIA SERVER+ (SK0-003) CWTS ENTERPRISE WI-FI FUNDAMENTALS CWNA ENTERPRISE WI-FI ADMINISTRATION CWSP ENTERPRISE WI-FI SECURITY CWDP ENTERPRISE WI-FI DESIGN CWAP ENTERPRISE WI-FI ANALYSIS & TROUBLESHOOTING CERTIFIED ETHICAL HACKER V8 (CEH) EC-COUNCIL CERTIFIED SECURITY ANALYST (ECSA) NETWORK SECURITY ADMINISTRATOR (ENSA) EC-COUNCIL CERTIFIED CHIEF INFORMATION SECURITY OFFICER CCISO ADVANCED NETWORK DEFENSE (CAST 614) HARDENING YOUR ENTERPRISE NETWORK EXPLOITATION CONCEPTS AND METHODS (CAST 618) (BOOTCAMP) NETWORK FORENSICS: IDENTIFYING AND CORRELATING EVENTS (CAST 619) (NETWORK FORENSICS) COMPUTER HACKING FORENSIC INVESTIGATOR (CHFI) CERTIFIED INCIDENT HANDLER (CIH) EC-COUNCIL CERTIFIED SECURE PROGRAMMER.NET (ECSP) CERTIFIED SECURE COMPUTER USER (CSCU) ADVANCED MOBILE HACKING & FORENSICS (CAST 612) ELEVATING MOBILE FORENSICS & INVESTIGATION TO AN ART FORM DIGITAL MEDIA FORENSICS (CAST 621) (BASIC DIGI MEDIA FORENSICS) DIGITAL MEDIA FORENSICS II (CAST 622) (ADVANCED DIGI MEDIA FORENSICS) UNDERSTANDING MACHINE ASSEMBLY LANGUAGE (CAST 623 ) (ASSEMBLY FUNDAMENTALS) PACKET AND TRAFFIC ANALYSIS (CAST 620) (WIRETAP) NETWARS - TOURNAMENT DFIR NETWARS TOURNAMENT HOSTED: EMBEDDED DEVICE SECURITY ASSESSMENTS FOR THE REST OF US HOSTED: (ISC)² CERTIFIED SECURE SOFTWARE LIFECYCLE PROFESSIONAL (CSSLP) CBK EDUCATION PROGRAM January 2015 CompTIA Security+ v1 2

HOSTED: OFFENSIVE COUNTERMEASURES: THE ART OF ACTIVE DEFENSES HOSTED: PHYSICAL PENETRATION TESTING - INTRODUCTION AUD507: AUDITING & MONITORING NETWORKS, PERIMETERS & SYSTEMS DEV522: DEFENDING WEB APPLICATIONS SECURITY ESSENTIALS DEV536: SECURE CODING: DEVELOPING DEFENSIBLE APPLICATIONS DEV541: SECURE CODING IN JAVA/JEE: DEVELOPING DEFENSIBLE APPLICATIONS DEV543: SECURE CODING IN C & C++ DEV544: SECURE CODING IN.NET: DEVELOPING DEFENSIBLE APPLICATIONS FOR572: ADVANCED NETWORK FORENSICS AND ANALYSIS MGT414: SANS +S TRAINING PROGRAM FOR THE CISSP CERTIFICATION EXAM MGT415: A PRACTICAL INTRODUCTION TO RISK ASSESSMENT MGT433: SECURING THE HUMAN: HOW TO BUILD, MAINTAIN AND MEASURE A HIGH-IMPACT AWARENESS PROGRAM MGT512: SANS SECURITY LEADERSHIP ESSENTIALS FOR MANAGERS WITH KNOWLEDGE COMPRESSION MGT514: IT SECURITY STRATEGIC PLANNING, POLICY AND LEADERSHIP LEG523: LAW OF DATA SECURITY AND INVESTIGATIONS SEC301: INTRO TO INFORMATION SECURITY SEC401: SECURITY ESSENTIALS BOOTCAMP STYLE SEC440: CRITICAL SECURITY CONTROLS: PLANNING, IMPLEMENTING AND AUDITING SEC480: TOP 4 MITIGATION STRATEGIES: IMPLEMENTING & AUDITING SEC501: ADVANCED SECURITY ESSENTIALS - ENTERPRISE DEFENDER SEC502: PERIMETER PROTECTION IN-DEPTH SEC503: INTRUSION DETECTION IN-DEPTH SEC504: HACKER TOOLS, TECHNIQUES, EXPLOITS AND INCIDENT HANDLING SEC511: CONTINUOUS MONITORING AND SECURITY OPERATIONS SEC524: CLOUD SECURITY FUNDAMENTALS SEC542: WEB APP PENETRATION TESTING AND ETHICAL HACKING SEC546: IPV6 ESSENTIALS SEC560: NETWORK PENETRATION TESTING AND ETHICAL HACKING SEC561: INTENSE HANDS-ON PEN TESTING SKILL DEVELOPMENT (WITH SANS NETWARS) SEC562: CYBERCITY HANDS-ON KINETIC CYBER RANGE EXERCISE SEC566: IMPLEMENTING AND AUDITING THE CRITICAL SECURITY CONTROLS - IN- DEPTH SEC573: PYTHON FOR PENETRATION TESTERS SEC575: MOBILE DEVICE SECURITY AND ETHICAL HACKING SEC579: VIRTUALIZATION AND PRIVATE CLOUD SECURITY SEC580: METASPLOIT KUNG FU FOR ENTERPRISE PEN TESTING SEC617: WIRELESS ETHICAL HACKING, PENETRATION TESTING, AND DEFENSES SEC642: ADVANCED WEB APP PENETRATION TESTING AND ETHICAL HACKING SEC760: ADVANCED EXPLOIT DEVELOPMENT FOR PENETRATION TESTERS SEC506: SECURING LINUX/UNIX SEC505: SECURING WINDOWS WITH THE CRITICAL SECURITY CONTROLS MGT535: INCIDENT RESPONSE TEAM MANAGEMENT MGT405: CRITICAL INFRASTRUCTURE PROTECTION ICS410: ICS/SCADA SECURITY ESSENTIALS FOR408: WINDOWS FORENSIC ANALYSIS FOR508: ADVANCED COMPUTER FORENSIC ANALYSIS AND INCIDENT RESPONSE FOR518: MAC FORENSIC ANALYSIS FOR526: MEMORY FORENSICS IN-DEPTH January 2015 CompTIA Security+ v1 3

ISACA ISC(2) JUNIPER WEB APPLICATION SECURITY FOR AUDITORS - SEMINAR THE ESSENTIALS OF CLOUD COMPUTING FOR AUDIT PROFESSIONALS INFORMATION SECURITY MANAGEMENT INFORMATION SECURITY MANAGEMENT (ADVANCED) AUDIT & SECURITY OF FIREWALLS - SEMINAR SECURING & AUDITING MOBILE TECHNOLOGIES - SEMINAR SECURING & AUDITING WIRELESS & MOBILE TECHNOLOGIES - SEMINAR VIRTUALIZATION SECURITY & AUDIT - SEMINAR WINDOWS 8 SECURITY & AUDIT - SEMINAR CLOUD COMPUTING SECURITY & AUDIT - SEMINAR DATABASE SECURITY AND AUDIT - SEMINAR RISK-BASED APPROACH TO IT INFRASTRUCTURE SECURITY & CONTROL ASSESSMENTS IT RISK MANAGEMENT CGEIT EXAM REVIEW CISM EXAM REVIEW CISA EXAM REVIEW CRISC EXAM REVIEW MODULE 1 CISA: THE PROCESS OF AUDITING INFORMATION SYSTEMS MODULE 5 CISA'S ROLE IN PROTECTION OF INFORMATION ASSETS MODULE 2 CISA'S ROLE IN IT GOVERNANCE MODULE 3 CISA'S ROLE IN SYSTEMS AND INFRASTRUCTURE LIFE CYCLE MANAGEMENT MODULE 4 CISA'S ROLE IN IT SERVICE DELIVERY AND SUPPORT COMPLETE CISA ONLINE REVIEW COURSE ALL 5 MODULES (ISC) 2 TRAINING FOR CAP (ISC) 2 TRAINING FOR CISSP (ISC) 2 TRAINING FOR SSCP (ISC) 2 TRAINING FOR CISSP-ISSAP (ISC) 2 TRAINING FOR CISSP-ISSMP (ISC) 2 TRAINING FOR CSSLP (ISC) 2 TRAINING FOR CCFP (ISC) 2 TRAINING FOR HCISPP OWASP TOP 10 (ISC) 2 TRAINING FOR CISSP-ISSEP ACX SERIES UNIVERSAL ACCESS ROUTERS OVERVIEW AND DEPLOYMENT ADVANCED JUNIPER NETWORKS VPN IMPLEMENTATIONS (AJVI) ADVANCED JUNIPER NETWORKS WIRELESS LANS (AJWL) ADVANCED JUNOS ENTERPRISE ROUTING (AJER) ADVANCED JUNOS ENTERPRISE ROUTING TROUBLESHOOTING (AJERT) ADVANCED JUNOS ENTERPRISE SECURITY TROUBLESHOOTING (AJEST) ADVANCED JUNOS ENTERPRISE SWITCHING (AJEX) ADVANCED JUNOS ENTERPRISE SWITCHING TROUBLESHOOTING (AJEXT) ADVANCED JUNOS SECURITY (AJSEC) ATTACK PREVENTION WITH JUNIPER NETWORKS FIREWALLS (APJF) AX411 ACCESS POINT INSTALLATION AND CONFIGURATION BX7000 MULTI-ACCESS GATEWAY INSTALLATION AND INITIAL CONFIGURATION CONFIGURING JUNIPER NETWORKS FIREWALL/IPSEC VPN PRODUCTS (CJFV) CONFIGURING SECURITY THREAT RESPONSE MANAGER (CSTRM) DATA CENTER SWITCHING (DCX) E-SERIES BROADBAND REMOTE ACCESS SERVER CONFIGURATION BASICS (BB) January 2015 CompTIA Security+ v1 4

EX2200 AND EX2200-C ETHERNET SWITCHES INSTALLATION AND INITIAL CONFIGURATION EX3200, EX3300, AND EX4200 ETHERNET SWITCHES INSTALLATION AND INITIAL CONFIGURATION EX4500 ETHERNET SWITCH INSTALLATION AND INITIAL CONFIGURATION IC SERIES UNIFIED ACCESS CONTROL APPLIANCE INSTALLATION AND INITIAL CONFIGURATION IMPLEMENTING INTRUSION DETECTION AND PREVENTION PRODUCTS (IIDP) IMPLEMENTING JUNIPER NETWORKS SECURE ANALYTICS (IJSA) JNCIE ENTERPRISE BOOTCAMP (JNCIE-ENT) JNCIE SECURITY BOOTCAMP (JNCIE-SEC) JUNOS EDGE SECURITY SERVICES (JESS) JUNOS ENTERPRISE SWITCHING (JEX) JUNOS ENTERPRISE SWITCHING USING ELS (JEX-ELS) JUNOS INTRUSION PREVENTION SYSTEMS (JIPS) JUNOS MPLS AND VPNS (JMV) JUNOS PULSE MOBILE SECURITY SUITE (PMSS) JUNOS PULSE SECURE ACCESS (JPSA) JUNOS PULSE MOBILE SECURITY SUITE (PMSS) JUNOS PULSE SECURE ACCESS (JPSA) JUNOS SECURITY (JSEC) JUNOS SPACE-NETWORK DIRECTOR (JS-ND) JUNOS SPACE-SECURITY DIRECTOR (JS-SD) NETWORK AND SECURITY MANAGER FUNDAMENTALS (NSMF) STRM SERIES II SECURITY THREAT RESPONSE MANAGER HARDWARE INSTALLATION AND INITIAL CONFIGURATION M10I ROUTER INSTALLATION AND HARDWARE REPLACEMENT LINUX LINUX SECURITY LINUX SYSTEM ADMINISTRATION MICROSOFT SECURITY FUNDAMENTALS: MTA EXAM 98-367 WINDOWS SERVER 2008 ACTIVE DIRECTORY, CONFIGURING - CONFIGURING AND TROUBLESHOOTING IDENTITY AND ACCESS SOLUTIONS WITH WINDOWS SERVER 2008 ACTIVE DIRECTORY WINDOWS SERVER ADMINISTRATION FUNDAMENTALS: MTA EXAM 98-365 WINDOWS SERVER 2008, SERVER ADMINISTRATOR - PLANNING AND IMPLEMENTING WINDOWS SERVER 2008 NETWORKING FUNDAMENTALS: MTA EXAM 98-366 INSTALLING AND CONFIGURING WINDOWS SERVER 2012 ADMINISTERING WINDOWS SERVER 2012 CONFIGURING ADVANCED WINDOWS SERVER 2012 SERVICES WINDOWS SERVER 2008 ACTIVE DIRECTORY, CONFIGURING - CONFIGURING AND TROUBLESHOOTING WINDOWS SERVER 2008 ACTIVE DIRECTORY DOMAIN SERVICES WINDOWS SERVER 2008 NETWORK INFRASTRUCTURE, CONFIGURING - CONFIGURING AND TROUBLESHOOTING A WINDOWS SERVER 2008 NETWORK INFRASTRUCTURE DESIGNING AND IMPLEMENTING A SERVER INFRASTRUCTURE IMPLEMENTING AN ADVANCED SERVER INFRASTRUCTURE OVERVIEW OF ACTIVE DIRECTORY RIGHTS MANAGEMENT SERVICES WITH WINDOWS SERVER 2008 R2 MICROSOFT JUMP START: 70-659 WINDOWS SERVER 2008 R2, SERVER VIRTUALIZATION January 2015 CompTIA Security+ v1 5

UPDATING YOUR WINDOWS SERVER 2003 TECHNOLOGY SKILLS TO WINDOWS SERVER 2008 DEPLOYING WINDOWS SERVER 2008 CONFIGURING, MANAGING AND MAINTAINING WINDOWS SERVER 2008-BASED SERVERS FUNDAMENTALS OF WINDOWS SERVER 2008 CONFIGURING AND TROUBLESHOOTING INTERNET INFORMATION SERVICES IN WINDOWS SERVER 2008 DESIGNING WINDOWS SERVER 2008 NETWORK AND APPLICATIONS INFRASTRUCTURE IMPLEMENTING AND ADMINISTERING WINDOWS SHAREPOINT SERVICES 3.0 IN WINDOWS SERVER 2008 DESIGNING WINDOWS SERVER 2008 ACTIVE DIRECTORY INFRASTRUCTURE AND SERVICES CONFIGURING AND TROUBLESHOOTING WINDOWS SERVER 2008 APPLICATIONS INFRASTRUCTURE OVERVIEW OF ACTIVE DIRECTORY RIGHTS MANAGEMENT SERVICES WITH WINDOWS SERVER 2008 R2 NOVELL ZENWORKS FULL-DISK ENCRYPTION ADMINISTRATION AND TROUBLESHOOTING OPEN ENTERPRISE SERVER 11 ADMINISTRATION RED HAT RED HAT SERVER HARDENING (RH413) SYMANTEC SYMANTEC APP CENTER 4.1 ADMINISTRATION SYMANTEC APP CENTER 4.1.X INSTALLATION AND ADMINISTRATION SYMANTEC SECURITY INFORMATION MANAGER 4.7 VMWARE VMWARE NSX: INSTALL, CONFIGURE, MANAGE [6.0] VMWARE NSX FOR INTERNETWORKING EXPERTS FAST TRACK [V6.0] VSPHERE RESOURCE MANAGEMENT FUNDAMENTALS [V5.X] VSPHERE SECURITY FUNDAMENTALS [V5.X] VCLOUD NETWORKING AND SECURITY FUNDAMENTALS [V5.X] VMWARE MIRAGE: INSTALL, CONFIGURE, MANAGE [V5.0] GETTING STARTED DEVELOPING SECURITY SOLUTIONS WITH EPSEC VMWARE VSPHERE: MANAGE AND DESIGN FOR SECURITY [V4.1] January 2015 CompTIA Security+ v1 6