1 / 5

Netcom Learning’s CompTIA Certification Training Courses

The certified professional must upload a certificate of completion into their certification record as proof of attendance. Training approved in this document is based on the CompTIA CASP - CAS-001 objectives. NetCom Learning being the platinum partner of CompTIA helps organizations to update their workforce with the on-demand CompTIA training courses. CompTIA offers vendor-neutral certifications that meet the knowledge standards from beginners to expert levels.<br>

Download Presentation

Netcom Learning’s CompTIA Certification Training Courses

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. CompTIA CASP Pre-approved Training for CompTIA CASP Continuing Education Units (CEUs) Note: Approved training courses in this document are subject to change without prior notification. Training submitted based on prior approval will remain valid. Training submitted after the date on this document must meet this documents training requirements. Training approved in this document is based on the CompTIA CASP - CAS-001 objectives. Activity name to use when uploading CEUs into a certification record: Completed a Training Course  Training formats accepted are Classroom-Based, Live Online, Private On-Site and Self-paced e-learning. CEU Required Documentation: The certified professional must upload a certificate of completion into their certification record as proof of attendance. The completion certification must contain the following information: 1.Name of training provider 2.Training course title 3.Name of the certified professional 4.Date the training was completed The course duration hours are to be used when entering CEU hours in a certification record. Please see the training provider course descriptions for durations. If a certified professional cannot provide proof of completion the training cannot be used for CEUs. CEU Activity Guidelines:  If renewing a ‘good for life’ certification the training must have been completed within 90 days prior to enrolling in the Continuing Education (CE) program or within the 3 year CE cycle.  If renewing a ‘ce’ certification, training must be completed within the 3 year CE cycle. To view pre-approved training for CompTIA CASP CEUs click on any of the certification provider names below. Cisco ISACA Novell Citrix ISC(2) Red Hat CWNP Juniper Symantec EC-Council Linux VMware GIAC Microsoft January 2015 CompTIA CASP v1 1

  2. CERTIFICATION PROVIDER COURSE TITLE CISCO IMPLEMENTING CISCO IOS NETWORK SECURITY (IINS) 2.0 IMPLEMENTING CISCO SECURE ACCESS SOLUTIONS (SISAS) 1.0 IMPLEMENTING CISCO EDGE NETWORK SECURITY SOLUTIONS (SENSS) 1.0 IMPLEMENTING CISCO SECURE MOBILITY SOLUTIONS (SIMOS) 1.0 IMPLEMENTING CISCO THREAT CONTROL SOLUTIONS (SITCS) 1.0 IMPLEMENTING ADVANCED CISCO UNIFIED WIRELESS SECURITY (IAUWS) 2.0 CBM-200 - CITRIX BYTEMOBILE T3100 1.4 ADMINISTRATION AND OPTIMIZATION CWTS – ENTERPRISE WI-FI FUNDAMENTALS CWNA – ENTERPRISE WI-FI ADMINISTRATION CWSP – ENTERPRISE WI-FI SECURITY CWDP – ENTERPRISE WI-FI DESIGN CWAP – ENTERPRISE WI-FI ANALYSIS & TROUBLESHOOTING CERTIFIED ETHICAL HACKER V8 (CEH) EC-COUNCIL CERTIFIED SECURITY ANALYST (ECSA) COMPUTER HACKING FORENSIC INVESTIGATOR (CHFI) EC-COUNCIL CERTIFIED CHIEF INFORMATION SECURITY OFFICER – CCISO CERTIFIED INCIDENT HANDLER (CIH) EC-COUNCIL CERTIFIED SECURE PROGRAMMER .NET (ECSP) CORE CONCEPTS – IT SECURITY NETWORK SECURITY ADMINISTRATOR (ENSA) CERTIFIED SECURE COMPUTER USER (CSCU) ADVANCED MOBILE HACKING & FORENSICS (CAST 612) – ELEVATING MOBILE FORENSICS & INVESTIGATION TO AN ART FORM ADVANCED NETWORK DEFENSE (CAST 614) – HARDENING YOUR ENTERPRISE NETWORK EXPLOITATION CONCEPTS AND METHODS (CAST 618) (BOOTCAMP) NETWORK FORENSICS: IDENTIFYING AND CORRELATING EVENTS (CAST 619) (NETWORK FORENSICS) PACKET AND TRAFFIC ANALYSIS (CAST 620) (WIRETAP) CITRIX CWNP EC-COUNCIL FOR572: ADVANCED NETWORK FORENSICS AND ANALYSIS ICS410: ICS/SCADA SECURITY ESSENTIALS MGT305: TECHNICAL COMMUNICATION AND PRESENTATION SKILLS FOR SECURITY PROFESSIONALS MGT405: CRITICAL INFRASTRUCTURE PROTECTION MGT414: SANS +S TRAINING PROGRAM FOR THE CISSP® CERTIFICATION EXAM MGT415: A PRACTICAL INTRODUCTION TO RISK ASSESSMENT MGT433: SECURING THE HUMAN: HOW TO BUILD, MAINTAIN AND MEASURE A HIGH-IMPACT AWARENESS PROGRAM MGT512: SANS SECURITY LEADERSHIP ESSENTIALS FOR MANAGERS WITH KNOWLEDGE COMPRESSION MGT514: IT SECURITY STRATEGIC PLANNING, POLICY AND LEADERSHIP MGT525: IT PROJECT MANAGEMENT, EFFECTIVE COMMUNICATION, AND PMP® EXAM PREP MGT535: INCIDENT RESPONSE TEAM MANAGEMENT SEC440: CRITICAL SECURITY CONTROLS: PLANNING, IMPLEMENTING AND AUDITING SEC480: TOP 4 MITIGATION STRATEGIES: IMPLEMENTING & AUDITING SEC501: ADVANCED SECURITY ESSENTIALS - ENTERPRISE DEFENDER SEC504: HACKER TOOLS, TECHNIQUES, EXPLOITS AND INCIDENT HANDLING SEC546: IPV6 ESSENTIALS SEC566: IMPLEMENTING AND AUDITING THE CRITICAL SECURITY CONTROLS - IN- DEPTH WEB APPLICATION SECURITY FOR AUDITORS - SEMINAR THE ESSENTIALS OF CLOUD COMPUTING FOR AUDIT PROFESSIONALS GIAC ISACA January 2015 CompTIA CASP v1 2

  3. CERTIFICATION PROVIDER COURSE TITLE INFORMATION SECURITY MANAGEMENT INFORMATION SECURITY MANAGEMENT (ADVANCED) AUDIT & SECURITY OF FIREWALLS - SEMINAR SECURING & AUDITING MOBILE TECHNOLOGIES - SEMINAR SECURING & AUDITING WIRELESS & MOBILE TECHNOLOGIES - SEMINAR VIRTUALIZATION SECURITY & AUDIT - SEMINAR WINDOWS 8 SECURITY & AUDIT - SEMINAR CLOUD COMPUTING SECURITY & AUDIT - SEMINAR DATABASE SECURITY AND AUDIT - SEMINAR RISK-BASED APPROACH TO IT INFRASTRUCTURE SECURITY & CONTROL ASSESSMENTS IT RISK MANAGEMENT ONLINE COBIT FOUNDATION COURSE V4.1 USING COBIT 5 IN IT ASSURANCE AND AUDIT COBIT 5 ASSESSOR COURSE COBIT 5 IMPLEMENTATION COURSE COBIT: STRATEGIES FOR IMPLEMENTING IT GOVERNANCE GOVERNANCE OF ENTERPRISE IT CGEIT EXAM REVIEW CISM EXAM REVIEW CISA EXAM REVIEW CRISC EXAM REVIEW MODULE 1—CISA: THE PROCESS OF AUDITING INFORMATION SYSTEMS MODULE 2—CISA'S ROLE IN IT GOVERNANCE MODULE 3—CISA'S ROLE IN SYSTEMS AND INFRASTRUCTURE LIFE CYCLE MANAGEMENT MODULE 4—CISA'S ROLE IN IT SERVICE DELIVERY AND SUPPORT MODULE 5—CISA'S ROLE IN PROTECTION OF INFORMATION ASSETS COMPLETE CISA ONLINE REVIEW COURSE—ALL 5 MODULES CGEIT EXAM REVIEW CISM EXAM REVIEW CISA EXAM REVIEW CRISC EXAM REVIEW MODULE 1—CISA: THE PROCESS OF AUDITING INFORMATION SYSTEMS (ISC)2 TRAINING FOR CAP (ISC)2 TRAINING FOR CISSP (ISC)2 TRAINING FOR SSCP (ISC)2 TRAINING FOR CISSP-ISSAP (ISC)2 TRAINING FOR CISSP-ISSMP (ISC)2 TRAINING FOR CSSLP (ISC)2 TRAINING FOR CCFP (ISC)2 TRAINING FOR HCISPP OWASP TOP 10 (ISC)2 TRAINING FOR CISSP-ISSEP ACX SERIES UNIVERSAL ACCESS ROUTERS OVERVIEW AND DEPLOYMENT ADVANCED JUNIPER NETWORKS VPN IMPLEMENTATIONS (AJVI) ADVANCED JUNIPER NETWORKS WIRELESS LANS (AJWL) ADVANCED JUNOS ENTERPRISE ROUTING (AJER) ADVANCED JUNOS ENTERPRISE ROUTING TROUBLESHOOTING (AJERT) ADVANCED JUNOS ENTERPRISE SECURITY TROUBLESHOOTING (AJEST) ADVANCED JUNOS ENTERPRISE SWITCHING (AJEX) ADVANCED JUNOS ENTERPRISE SWITCHING TROUBLESHOOTING (AJEXT) ISC(2) JUNIPER January 2015 CompTIA CASP v1 3

  4. CERTIFICATION PROVIDER COURSE TITLE ADVANCED JUNOS SECURITY (AJSEC) ADVANCED JUNOS SERVICE PROVIDER ROUTING (AJSPR) ADVANCED JUNOS SERVICE PROVIDER TROUBLESHOOTING (AJSPT) ATTACK PREVENTION WITH JUNIPER NETWORKS FIREWALLS (APJF) AX411 ACCESS POINT INSTALLATION AND CONFIGURATION BX7000 MULTI-ACCESS GATEWAY INSTALLATION AND INITIAL CONFIGURATION C SERIES (C2000 AND C4000) HARDWARE INSTALLATION AND CONFIGURATION C SERIES (C3000 AND C5000) CONTROLLER HARDWARE INSTALLATION AND CONFIGURATION CONFIGURING AND MONITORING CONTRAIL (CMC) CONFIGURING AND MONITORING QFABRIC SYSTEMS (CMQS) CONFIGURING AND MONITORING THE VGW VIRTUAL GATEWAY (CMVGW) CONFIGURING JUNIPER NETWORKS FIREWALL/IPSEC VPN PRODUCTS (CJFV) CONFIGURING SECURITY THREAT RESPONSE MANAGER (CSTRM) CONFIGURING STEEL-BELTED RADIUS CARRIER (CSBR) DATA CENTER SWITCHING (DCX) E-SERIES BROADBAND REMOTE ACCESS SERVER CONFIGURATION BASICS (BB) IMPLEMENTING JUNIPER NETWORKS SECURE ANALYTICS (IJSA) INTEGRATING JUNIPER NETWORKS FIREWALL/IPSEC VPN PRODUCTS INTO HIGH- PERFORMANCE NETWORKS (IFVH) INTRUSION DETECTION AND PREVENTION (IDP) SERIES HARDWARE INSTALLATION AND CONFIGURATION JNCIE ENTERPRISE BOOTCAMP (JNCIE-ENT) JNCIE SECURITY BOOTCAMP (JNCIE-SEC) JNCIE SERVICE PROVIDER BOOTCAMP (JNCIE-SP) JUNIPER NETWORKS LN2600 RUGGED SECURE ROUTER OVERVIEW AND DEPLOYMENT JUNOS EDGE SECURITY SERVICES (JESS) JUNOS ENTERPRISE SWITCHING USING ELS (JEX-ELS) JUNOS INTRUSION PREVENTION SYSTEMS (JIPS) JUNOS PULSE SECURE ACCESS (JPSA) JUNOS SECURITY (JSEC) JUNOS SPACE FOR THE ENTERPRISE (JS-ENT) SECURE ACCESS SERIES HARDWARE INSTALLATION AND CONFIGURATION LINUX SECURITY INSTALLING AND CONFIGURING WINDOWS SERVER 2012 ADMINISTERING WINDOWS SERVER 2012 CONFIGURING ADVANCED WINDOWS SERVER 2012 SERVICES WINDOWS SERVER 2008 ACTIVE DIRECTORY, CONFIGURING - CONFIGURING AND TROUBLESHOOTING WINDOWS SERVER 2008 ACTIVE DIRECTORY DOMAIN SERVICES WINDOWS SERVER 2008 ACTIVE DIRECTORY, CONFIGURING - CONFIGURING AND TROUBLESHOOTING IDENTITY AND ACCESS SOLUTIONS WITH WINDOWS SERVER 2008 ACTIVE DIRECTORY WINDOWS SERVER 2008 NETWORK INFRASTRUCTURE, CONFIGURING - CONFIGURING AND TROUBLESHOOTING A WINDOWS SERVER 2008 NETWORK INFRASTRUCTURE WINDOWS SERVER 2008, SERVER ADMINISTRATOR - PLANNING AND IMPLEMENTING WINDOWS SERVER 2008 CONFIGURING ADVANCED WINDOWS SERVER 2012 SERVICES WINDOWS SERVER 2008 ACTIVE DIRECTORY, CONFIGURING - CONFIGURING AND TROUBLESHOOTING WINDOWS SERVER 2008 ACTIVE DIRECTORY DOMAIN SERVICES LINUX MICROSOFT January 2015 CompTIA CASP v1 4

  5. CERTIFICATION PROVIDER COURSE TITLE WINDOWS SERVER 2008 NETWORK INFRASTRUCTURE, CONFIGURING - CONFIGURING AND TROUBLESHOOTING A WINDOWS SERVER 2008 NETWORK INFRASTRUCTURE DESIGNING AND IMPLEMENTING A SERVER INFRASTRUCTURE IMPLEMENTING AN ADVANCED SERVER INFRASTRUCTURE OVERVIEW OF ACTIVE DIRECTORY RIGHTS MANAGEMENT SERVICES WITH WINDOWS SERVER 2008 R2 MICROSOFT JUMP START: 70-659 WINDOWS SERVER 2008 R2, SERVER VIRTUALIZATION UPDATING YOUR WINDOWS SERVER 2003 TECHNOLOGY SKILLS TO WINDOWS SERVER 2008 DEPLOYING WINDOWS SERVER 2008 CONFIGURING, MANAGING AND MAINTAINING WINDOWS SERVER 2008-BASED SERVERS FUNDAMENTALS OF WINDOWS SERVER 2008 CONFIGURING AND TROUBLESHOOTING INTERNET INFORMATION SERVICES IN WINDOWS SERVER 2008 DESIGNING WINDOWS SERVER 2008 NETWORK AND APPLICATIONS INFRASTRUCTURE IMPLEMENTING AND ADMINISTERING WINDOWS SHAREPOINT SERVICES 3.0 IN WINDOWS SERVER 2008 CONFIGURING AND TROUBLESHOOTING WINDOWS SERVER 2008 APPLICATIONS INFRASTRUCTURE DEVELOPING MICROSOFT AZURE SOLUTIONS IMPLEMENTING MICROSOFT AZURE INFRASTRUCTURE SOLUTIONS DESIGNING AND DEVELOPING MICROSOFT AZURE APPLICATIONS FILR ADMINISTRATION RED HAT SERVER HARDENING (RH413) SYMANTEC SECURITY INFORMATION MANAGER 4.7 VMWARE NSX: INSTALL, CONFIGURE, MANAGE [6.0] VMWARE NSX FOR INTERNETWORKING EXPERTS FAST TRACK [V6.0] VSPHERE SECURITY FUNDAMENTALS [V5.X] VSPHERE DATA PROTECTION ADVANCED FUNDAMENTALS [V5.5] VCLOUD NETWORKING AND SECURITY FUNDAMENTALS [V5.X] SECURITY PRINCIPLES IN VIRTUALIZED DATA CENTERS GETTING STARTED DEVELOPING SECURITY SOLUTIONS WITH EPSEC NOVELL RED HAT SYMANTEC VMWARE January 2015 CompTIA CASP v1 5

More Related