CompTIA CASP Pre-approved Training for CompTIA CASP Continuing Education Units (CEUs)



Similar documents
CompTIA Security+ Pre-approved Training for CompTIA Security+ Continuing Education Units (CEUs)

CompTIA A+ Pre-approved Training for CompTIA A+ Continuing Education Units (CEUs)

JUNIPER NETWORKS LEARNING PATHS

Course and Service Portfolio Specialized IT courses for IT professional and organizations willing to take benefit from the competitive advantages

Field of Study Area of Expertise Certification Vendor Course

The following chart indicates the Career Academy courses eligible for transfer credit by challenge exam.

Pluralsight Training Pre-Approved for CompTIA CEUs

Learning Tree Training Pre-approved Training for Continuing Education Units (CEUs)

FedVTE Training Catalog SPRING advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

FedVTE Training Catalog SUMMER advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

Renewing CompTIA Certifications With Achieving Other Vendor Certifications

Class Name Retail Price # Days Start Date End Date. Microsoft Microsoft Certification Boot Camps. $4,495 or $4,995 (w/ travel & lodging)

Brandman University. School of CCNA

Skillsoft Pre-Approved for CompTIA CEUs

Boost elearning IT Training INSTRUCTIONAL DESIGN, LEARNING PATHS, AND COURSE CATALOGUE

Access FedVTE online at: fedvte.usalearning.gov

State of South Carolina InfoSec and Privacy Career Path Model

Cybercrime & Cybersecurity: the Ongoing Battle International Hellenic University

Event Length. Register for Events Online minutes 1 Each Week 2 hrs 2 hrs 2 hrs 2 hrs 2 hrs.

Defense Cyber Investigations Training Academy (DCITA) Pre-Approved Training for CompTIA Continuing Education Units (CEUs)

Information Security Principles and Practices

Hackers are here. Where are you?

Global Knowledge Cybersecurity Training

Social Media Security Training and Certifications. Stay Ahead. Get Certified. Ultimate Knowledge Institute. ultimateknowledge.com

IT Networking and Security

All about CPEs. David Gittens CISA CISM CISSP CRISC HISP

Ranking Certifications

SPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals: Job Profiles

Juniper training.

Microsoft Technologies

Information Technology Cluster

MANAGEMENT DEVELOPMENT COURSES

E-LEARNING BUSINESS COURSES

Certification and Training

Linux Technologies QUARTER 1 DESKTOP APPLICATIONS - ESSENTIALS QUARTER 2 NETWORKING AND OPERATING SYSTEMS ESSENTIALS. Module 1 - Office Applications

Microsoft : : : : Kuala Lumpur Petaling Jaya Penang Johor Bahru

INFORMATION SECURITY & GOVERNANCE SYSTEMS AND IT INFRASTRUCTURE INFOSEC & TECHNOLOGY TRAINING. forebrook

Diversen Interactief Centrum voor gerichte Training en Studie Edisonweg 14c, 1821 BN Alkmaar T:

Technical Manager / Fortinet Product Owner at Space Data Systems - Jordan (SDS) alzard_m@hotmail.com

Networking: EC Council Network Security Administrator NSA

Technology Approved Certifications

IT Networking and Security

Hackers are here. Where are you?

Diploma in Information Technology Network Integration Specialist COURSE INFO PACK

CH ENSA EC-Council Network Security Administrator Detailed Course Outline

BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports

Penetration testing & Ethical Hacking. Security Week 2014

Diploma in Information Technology Network Intergration Specialist COURSE INFORMATION PACK

EC-Council Network Security Administrator (ENSA) Duration: 5 Days Method: Instructor-Led

Course Venue :- Lab 302, IT Dept., Govt. Polytechnic Mumbai, Bandra (E)

Montgomery County Community College Non-Credit Programs Winter/Spring 2016 TECHNOLOGY PROGRAMS

LINUX / INFORMATION SECURITY

Analyze. Secure. Defend. Do you hold ECSA credential?

Implementing Cisco Secure AccessSolutions Exam

Course Title: Penetration Testing: Security Analysis

Schedule Singapore 2015

EC-Council Certified Security Analyst (ECSA)

Computer Forensics and Security Institute

EC-Council Certified Security Analyst / License Penetration Tester (ECSA/LPT) v4.0 Bootcamp

Guide to information security certifications. SearchSecurity.com's guide to vendor-neutral security certifications

SENIOR SYSTEMS ANALYST

Remote Lab Price List

CALGARY TRAINING & EDUCATION CALENDAR

Global Knowledge (Thailand) Co.,Ltd. Training Schedule for Jul -Dec 2015

Diploma in Network (LAN/WAN) Administration

Expert Reference Series of White Papers. 10 Security Concerns for Cloud Computing

FedVTE Course Library

Cybersecurity Workforce Training Partnership

Information Security Specialist Training on the Basis of ISO/IEC 27002

Profil stručnjaka za informacijsku sigurnost - certificirati se ili ne? Biljana Cerin, CISA, CISM, CGEIT, CBCP, PMP

167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College

THE CYBERSECURITY SKILL GAP: WHAT EMPLOYERS WANT YOU TO KNOW

Security Transcends Technology

Network Security Administrator

Track 2: Introductory Track PREREQUISITE: BASIC COMPUTER EXPERIENCE

Fundamentals of Windows Server 2008 Network and Applications Infrastructure

13 Courses Quick Guide

Cybersecurity Certificate Programs

InfoSec Academy Pen Testing & Hacking Track

CALGARY TRAINING & EDUCATION CALENDAR

CISCO IOS NETWORK SECURITY (IINS)

167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College

ISACA ON-SITE TRAINING DELIVERS EXPERT INSTRUCTION AT YOUR WORKPLACE

VMware vcloud Air Security TECHNICAL WHITE PAPER

Juniper training. Head Office: Northern Office:

Specialized Training Calendar May August Training for Professionals by Professionals

FedVTE Course Library

Transcription:

CompTIA CASP Pre-approved Training for CompTIA CASP Continuing Education Units (CEUs) Note: Approved training courses in this document are subject to change without prior notification. Training submitted based on prior approval will remain valid. Training submitted after the date on this document must meet this documents training requirements. Training approved in this document is based on the CompTIA CASP - CAS-001 objectives. Activity name to use when uploading CEUs into a certification record: Completed a Training Course Training formats accepted are Classroom-Based, Live Online, Private On-Site and Self-paced e-learning. CEU Required Documentation: The certified professional must upload a certificate of completion into their certification record as proof of attendance. The completion certification must contain the following information: 1. Name of training provider 2. Training course title 3. Name of the certified professional 4. Date the training was completed The course duration hours are to be used when entering CEU hours in a certification record. Please see the training provider course descriptions for durations. If a certified professional cannot provide proof of completion the training cannot be used for CEUs. CEU Activity Guidelines: If renewing a good for life certification the training must have been completed within 90 days prior to enrolling in the Continuing Education (CE) program or within the 3 year CE cycle. If renewing a ce certification, training must be completed within the 3 year CE cycle. To view pre-approved training for CompTIA CASP CEUs click on any of the certification provider names below. Cisco Citrix CWNP EC-Council GIAC ISACA ISC(2) Juniper Linux Microsoft Novell Red Hat Symantec VMware January 2015 CompTIA CASP v1 1

CISCO IMPLEMENTING CISCO IOS NETWORK SECURITY (IINS) 2.0 IMPLEMENTING CISCO SECURE ACCESS SOLUTIONS (SISAS) 1.0 IMPLEMENTING CISCO EDGE NETWORK SECURITY SOLUTIONS (SENSS) 1.0 IMPLEMENTING CISCO SECURE MOBILITY SOLUTIONS (SIMOS) 1.0 IMPLEMENTING CISCO THREAT CONTROL SOLUTIONS (SITCS) 1.0 IMPLEMENTING ADVANCED CISCO UNIFIED WIRELESS SECURITY (IAUWS) 2.0 CITRIX CBM-200 - CITRIX BYTEMOBILE T3100 1.4 ADMINISTRATION AND OPTIMIZATION CWNP CWTS ENTERPRISE WI-FI FUNDAMENTALS CWNA ENTERPRISE WI-FI ADMINISTRATION CWSP ENTERPRISE WI-FI SECURITY CWDP ENTERPRISE WI-FI DESIGN CWAP ENTERPRISE WI-FI ANALYSIS & TROUBLESHOOTING EC-COUNCIL CERTIFIED ETHICAL HACKER V8 (CEH) EC-COUNCIL CERTIFIED SECURITY ANALYST (ECSA) COMPUTER HACKING FORENSIC INVESTIGATOR (CHFI) EC-COUNCIL CERTIFIED CHIEF INFORMATION SECURITY OFFICER CCISO CERTIFIED INCIDENT HANDLER (CIH) EC-COUNCIL CERTIFIED SECURE PROGRAMMER.NET (ECSP) CORE CONCEPTS IT SECURITY NETWORK SECURITY ADMINISTRATOR (ENSA) CERTIFIED SECURE COMPUTER USER (CSCU) ADVANCED MOBILE HACKING & FORENSICS (CAST 612) ELEVATING MOBILE FORENSICS & INVESTIGATION TO AN ART FORM ADVANCED NETWORK DEFENSE (CAST 614) HARDENING YOUR ENTERPRISE NETWORK EXPLOITATION CONCEPTS AND METHODS (CAST 618) (BOOTCAMP) NETWORK FORENSICS: IDENTIFYING AND CORRELATING EVENTS (CAST 619) (NETWORK FORENSICS) PACKET AND TRAFFIC ANALYSIS (CAST 620) (WIRETAP) GIAC FOR572: ADVANCED NETWORK FORENSICS AND ANALYSIS ICS410: ICS/SCADA SECURITY ESSENTIALS MGT305: TECHNICAL COMMUNICATION AND PRESENTATION SKILLS FOR SECURITY PROFESSIONALS MGT405: CRITICAL PROTECTION MGT414: SANS +S TRAINING PROGRAM FOR THE CISSP CERTIFICATION EXAM MGT415: A PRACTICAL INTRODUCTION TO RISK ASSESSMENT MGT433: SECURING THE HUMAN: HOW TO BUILD, MAINTAIN AND MEASURE A HIGH-IMPACT AWARENESS PROGRAM MGT512: SANS SECURITY LEADERSHIP ESSENTIALS FOR MANAGERS WITH KNOWLEDGE COMPRESSION MGT514: IT SECURITY STRATEGIC PLANNING, POLICY AND LEADERSHIP MGT525: IT PROJECT MANAGEMENT, EFFECTIVE COMMUNICATION, AND PMP EXAM PREP MGT535: INCIDENT RESPONSE TEAM MANAGEMENT SEC440: CRITICAL SECURITY CONTROLS: PLANNING, IMPLEMENTING AND AUDITING SEC480: TOP 4 MITIGATION STRATEGIES: IMPLEMENTING & AUDITING SEC501: ADVANCED SECURITY ESSENTIALS - ENTERPRISE DEFENDER SEC504: HACKER TOOLS, TECHNIQUES, EXPLOITS AND INCIDENT HANDLING SEC546: IPV6 ESSENTIALS SEC566: IMPLEMENTING AND AUDITING THE CRITICAL SECURITY CONTROLS - IN- DEPTH WEB APPLICATION SECURITY FOR AUDITORS - SEMINAR THE ESSENTIALS OF CLOUD COMPUTING FOR AUDIT PROFESSIONALS January 2015 CompTIA CASP v1 2 ISACA

ISC(2) JUNIPER INFORMATION SECURITY MANAGEMENT INFORMATION SECURITY MANAGEMENT (ADVANCED) AUDIT & SECURITY OF FIREWALLS - SEMINAR SECURING & AUDITING MOBILE TECHNOLOGIES - SEMINAR SECURING & AUDITING WIRELESS & MOBILE TECHNOLOGIES - SEMINAR VIRTUALIZATION SECURITY & AUDIT - SEMINAR WINDOWS 8 SECURITY & AUDIT - SEMINAR CLOUD COMPUTING SECURITY & AUDIT - SEMINAR DATABASE SECURITY AND AUDIT - SEMINAR RISK-BASED APPROACH TO IT SECURITY & CONTROL ASSESSMENTS IT RISK MANAGEMENT ONLINE COBIT FOUNDATION COURSE V4.1 USING COBIT 5 IN IT ASSURANCE AND AUDIT COBIT 5 ASSESSOR COURSE COBIT 5 IMPLEMENTATION COURSE COBIT: STRATEGIES FOR IMPLEMENTING IT GOVERNANCE GOVERNANCE OF ENTERPRISE IT CGEIT EXAM REVIEW CISM EXAM REVIEW CISA EXAM REVIEW CRISC EXAM REVIEW MODULE 1 CISA: THE PROCESS OF AUDITING INFORMATION SYSTEMS MODULE 2 CISA'S ROLE IN IT GOVERNANCE MODULE 3 CISA'S ROLE IN SYSTEMS AND LIFE CYCLE MANAGEMENT MODULE 4 CISA'S ROLE IN IT SERVICE DELIVERY AND SUPPORT MODULE 5 CISA'S ROLE IN PROTECTION OF INFORMATION ASSETS COMPLETE CISA ONLINE REVIEW COURSE ALL 5 MODULES CGEIT EXAM REVIEW CISM EXAM REVIEW CISA EXAM REVIEW CRISC EXAM REVIEW MODULE 1 CISA: THE PROCESS OF AUDITING INFORMATION SYSTEMS (ISC) 2 TRAINING FOR CAP (ISC) 2 TRAINING FOR CISSP (ISC) 2 TRAINING FOR SSCP (ISC) 2 TRAINING FOR CISSP-ISSAP (ISC) 2 TRAINING FOR CISSP-ISSMP (ISC) 2 TRAINING FOR CSSLP (ISC) 2 TRAINING FOR CCFP (ISC) 2 TRAINING FOR HCISPP OWASP TOP 10 (ISC) 2 TRAINING FOR CISSP-ISSEP ACX SERIES UNIVERSAL ACCESS ROUTERS OVERVIEW AND DEPLOYMENT ADVANCED JUNIPER NETWORKS VPN IMPLEMENTATIONS (AJVI) ADVANCED JUNIPER NETWORKS WIRELESS LANS (AJWL) ADVANCED JUNOS ENTERPRISE ROUTING (AJER) ADVANCED JUNOS ENTERPRISE ROUTING TROUBLESHOOTING (AJERT) ADVANCED JUNOS ENTERPRISE SECURITY TROUBLESHOOTING (AJEST) ADVANCED JUNOS ENTERPRISE SWITCHING (AJEX) ADVANCED JUNOS ENTERPRISE SWITCHING TROUBLESHOOTING (AJEXT) January 2015 CompTIA CASP v1 3

ADVANCED JUNOS SECURITY (AJSEC) ADVANCED JUNOS SERVICE PROVIDER ROUTING (AJSPR) ADVANCED JUNOS SERVICE PROVIDER TROUBLESHOOTING (AJSPT) ATTACK PREVENTION WITH JUNIPER NETWORKS FIREWALLS (APJF) AX411 ACCESS POINT INSTALLATION AND CONFIGURATION BX7000 MULTI-ACCESS GATEWAY INSTALLATION AND INITIAL CONFIGURATION C SERIES (C2000 AND C4000) HARDWARE INSTALLATION AND CONFIGURATION C SERIES (C3000 AND C5000) CONTROLLER HARDWARE INSTALLATION AND CONFIGURATION CONFIGURING AND MONITORING CONTRAIL (CMC) CONFIGURING AND MONITORING QFABRIC SYSTEMS (CMQS) CONFIGURING AND MONITORING THE VGW VIRTUAL GATEWAY (CMVGW) CONFIGURING JUNIPER NETWORKS FIREWALL/IPSEC VPN PRODUCTS (CJFV) CONFIGURING SECURITY THREAT RESPONSE MANAGER (CSTRM) CONFIGURING STEEL-BELTED RADIUS CARRIER (CSBR) DATA CENTER SWITCHING (DCX) E-SERIES BROADBAND REMOTE ACCESS SERVER CONFIGURATION BASICS (BB) IMPLEMENTING JUNIPER NETWORKS SECURE ANALYTICS (IJSA) INTEGRATING JUNIPER NETWORKS FIREWALL/IPSEC VPN PRODUCTS INTO HIGH- PERFORMANCE NETWORKS (IFVH) INTRUSION DETECTION AND PREVENTION (IDP) SERIES HARDWARE INSTALLATION AND CONFIGURATION JNCIE ENTERPRISE BOOTCAMP (JNCIE-ENT) JNCIE SECURITY BOOTCAMP (JNCIE-SEC) JNCIE SERVICE PROVIDER BOOTCAMP (JNCIE-SP) JUNIPER NETWORKS LN2600 RUGGED SECURE ROUTER OVERVIEW AND DEPLOYMENT JUNOS EDGE SECURITY SERVICES (JESS) JUNOS ENTERPRISE SWITCHING USING ELS (JEX-ELS) JUNOS INTRUSION PREVENTION SYSTEMS (JIPS) JUNOS PULSE SECURE ACCESS (JPSA) JUNOS SECURITY (JSEC) JUNOS SPACE FOR THE ENTERPRISE (JS-ENT) SECURE ACCESS SERIES HARDWARE INSTALLATION AND CONFIGURATION LINUX LINUX SECURITY MICROSOFT INSTALLING AND CONFIGURING WINDOWS SERVER 2012 ADMINISTERING WINDOWS SERVER 2012 CONFIGURING ADVANCED WINDOWS SERVER 2012 SERVICES TROUBLESHOOTING WINDOWS SERVER 2008 ACTIVE DIRECTORY DOMAIN SERVICES TROUBLESHOOTING IDENTITY AND ACCESS SOLUTIONS WITH WINDOWS SERVER 2008 ACTIVE DIRECTORY WINDOWS SERVER 2008 NETWORK, CONFIGURING - CONFIGURING AND TROUBLESHOOTING A WINDOWS SERVER 2008 NETWORK WINDOWS SERVER 2008, SERVER ADMINISTRATOR - PLANNING AND IMPLEMENTING WINDOWS SERVER 2008 CONFIGURING ADVANCED WINDOWS SERVER 2012 SERVICES TROUBLESHOOTING WINDOWS SERVER 2008 ACTIVE DIRECTORY DOMAIN SERVICES January 2015 CompTIA CASP v1 4

WINDOWS SERVER 2008 NETWORK, CONFIGURING - CONFIGURING AND TROUBLESHOOTING A WINDOWS SERVER 2008 NETWORK DESIGNING AND IMPLEMENTING A SERVER IMPLEMENTING AN ADVANCED SERVER OVERVIEW OF ACTIVE DIRECTORY RIGHTS MANAGEMENT SERVICES WITH WINDOWS SERVER 2008 R2 MICROSOFT JUMP START: 70-659 WINDOWS SERVER 2008 R2, SERVER VIRTUALIZATION UPDATING YOUR WINDOWS SERVER 2003 TECHNOLOGY SKILLS TO WINDOWS SERVER 2008 DEPLOYING WINDOWS SERVER 2008 CONFIGURING, MANAGING AND MAINTAINING WINDOWS SERVER 2008-BASED SERVERS FUNDAMENTALS OF WINDOWS SERVER 2008 CONFIGURING AND TROUBLESHOOTING INTERNET INFORMATION SERVICES IN WINDOWS SERVER 2008 DESIGNING WINDOWS SERVER 2008 NETWORK AND APPLICATIONS IMPLEMENTING AND ADMINISTERING WINDOWS SHAREPOINT SERVICES 3.0 IN WINDOWS SERVER 2008 CONFIGURING AND TROUBLESHOOTING WINDOWS SERVER 2008 APPLICATIONS DEVELOPING MICROSOFT AZURE SOLUTIONS IMPLEMENTING MICROSOFT AZURE SOLUTIONS DESIGNING AND DEVELOPING MICROSOFT AZURE APPLICATIONS NOVELL FILR ADMINISTRATION RED HAT RED HAT SERVER HARDENING (RH413) SYMANTEC SYMANTEC SECURITY INFORMATION MANAGER 4.7 VMWARE VMWARE NSX: INSTALL, CONFIGURE, MANAGE [6.0] VMWARE NSX FOR INTERNETWORKING EXPERTS FAST TRACK [V6.0] VSPHERE SECURITY FUNDAMENTALS [V5.X] VSPHERE DATA PROTECTION ADVANCED FUNDAMENTALS [V5.5] VCLOUD NETWORKING AND SECURITY FUNDAMENTALS [V5.X] SECURITY PRINCIPLES IN VIRTUALIZED DATA CENTERS GETTING STARTED DEVELOPING SECURITY SOLUTIONS WITH EPSEC January 2015 CompTIA CASP v1 5