Federal Virtual Training Environment (FedVTE) Pre-Approved for CompTIA CEUs

Similar documents
Federal Virtual Training Environment (Fed/VTE) Pre-Approved for CompTIA CEUs

NetCom Learning Training Courses Pre-Approved for CompTIA CEUs

Voucher Procedures This office provides a maximum of 2 vouchers per position. No exceptions

Career Center for Development of Security Excellence (CDSE) Pre-Approved for CompTIA CEUs

Defense Information Services Agency (DISA) Training Pre-Approved for CompTIA CEUs

CompTIA Security+ Pre-approved Training for CompTIA Security+ Continuing Education Units (CEUs)

SECURITY+ COMPETITIVE ANALYSIS 1. GIAC GSEC 2. (ISC)2 SSCP 3. EC-COUNCIL CEH

Ingram Micro Cyber Security Portfolio

Course Schedule January December 2019

IT Technician Pathways Course Guide

Unlocking Potential Through Learning

Pluralsight CEU-Eligible Courses for CompTIA Network+ updated March 2018

NISTCSF.COM. NIST Cybersecurity Framework (NCSF) Workforce Development Solutions

A guide to CompTIA training and certification DDLS Australia Pty Ltd

NISTCSF.COM. NIST Cybersecurity Framework (NCSF) Workforce Development Solutions

DIABLO VALLEY COLLEGE CATALOG

Technical Classes. Cisco. Cisco Authorized Courses CISSP. Coding & Programming. CCNA Certification Bootcamp ( exam) 2/6/2015 9am-4:30pm

Business Skills Learning Sessions* SINGLE COURSE TITLES

Knowlogy Class Schedule

Course overview. CompTIA Security+ Certification (Exam SY0-501) Study Guide (G635eng v107)

EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led

What is the CISSP? Certified Ethical Hacker v8 or higher Certified Forensic Computer Examiner (CFCE) Certified Fraud Examiner (CFE)

CompTIA Cybersecurity Analyst+

Skillsoft Pre-Approved for CompTIA CEUs

E-guide CISSP Prep: 4 Steps to Achieve Your Certification

CASP CompTIA Advanced Security Practitioner Study Guide: (Exam CAS-001)

CIT 480: Securing Computer Systems. Putting It All Together

Workforce Certification

Required Textbook and Materials. Course Objectives. Course Outline

Career Paths In Cybersecurity

Security. Protect your business from security threats with Pearl Technology. The Connection That Matters Most

Skillsoft Pre-Approved for CompTIA CEUs

CyberVista Certify cybervista.net

CCNP ROUTING & SWITCHING

CALENDAR FOR THE YEAR 2018

Skillsoft Pre-Approved for CompTIA CEUs

E-guide Getting your CISSP Certification

UPDATED: 10/17/16. Senior Level. Senior Specialty Threat, Consultant, Engineer, Manager. Mid Level Analyst

RISK MANAGEMENT FRAMEWORK COURSE

TestOut Network Pro - English 4.1.x COURSE OUTLINE. Modified

CyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships. from the most trusted name in information security

A guide to CompTIA training and certification DDLS Australia Pty Ltd

CERTIFICATION TRAINING - ISC2

ITU CBS. Digital Security Capacity Building: Role of the University GLOBAL ICT CAPACITY BUILDING SYMPOSIUM SANTO DOMINGO 2018

Playing Security Poker I match your degree and raise you by a certification or 2 Grumpy Old Security Men What s up Cert?

TERIBITE TECHNOLOGIES ACADEMY

Mohammad Shahadat Hossain

Why MyITstudy is the best solution for your IT training needs

Bachelor of Applied Science Degree IT NETWORKING

TestBraindump. Latest test braindump, braindump actual test

CompTIA Continuing Education (CE) User Guide V13

New York Department of Financial Services Cybersecurity Regulation Compliance and Certification Deadlines

Information Systems and Tech (IST)

CISSP CEH PKI SECURITY + CEHv9: Certified Ethical Hacker. Upcoming Dates. Course Description. Course Outline

Building the Cybersecurity Workforce. November 2017

CompTIA CAS-002. CompTIA Advanced Security Practitioner (CASP) Download Full Version :

CompTIA Mobility+ Certification

COMPUTER INFORMATION SYSTEMS

Cybersecurity Employment SecureNinja

CISCO CERTIFIED INTERNETWORK EXPERT (CCIE)

CND Exam Blueprint v2.0

Certification and Career Guide

Apprenticeships CYBER SECURITY HIGHER APPRENTICESHIP FROM IT TECHNICIAN TO SKILLED INFORMATION SECURITY PROFESSIONAL

Application for Certification

Computer Information Systems

TestOut Network Pro - English 5.0.x COURSE OUTLINE. Modified

Networking Technology. Associate in Applied Science Networking Fundamentals Diploma Cisco Networking Certificate Network Security Certificate

Certified Information Security Manager (CISM) Course Overview

2017 PORT SECURITY SEMINAR & EXPO. ISACA/CISM Information Security Management Training for Security Directors/Managers

National Cyber Security Operations Center (N-CSOC) Stakeholders' Conference

PC Applications Schedule

Schedule of Maine is IT Offerings: 01/20/ /16/2015 Three Core IT Offerings:

PC Applications Schedule

PC Applications Schedule

Wolfpack Cyber Academy Training Catalogue

Building Secure Systems

Type Vendor Exam # Name Size. Technical Cisco Interconnecting Cisco Networking Devices Part 1 (ICND1) 180

CompTIA Continuing Education (CE) User Guide

About Us. We re now the world s largest independent IT training company, and we continue to lead

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers

CompTIA CASP (Advanced Security Practitioner)

Networking Technology

CCISO Blueprint v1. EC-Council

A New Cyber Defense Management Regulation. Ophir Zilbiger, CRISC, CISSP SECOZ CEO

PC Applications Schedule

Product Catalog Platinum 529,00 (1 jaar toegang) CertKit includes: Quizzes, Tips & Tricks, 24/7 help, practise tests and e-learning CompTIA

EXAM - CAS-002. CompTIA Advanced Security Practitioner (CASP) Exam. Buy Full Product.

Pluralsight CEU-Eligible Courses for CompTIA A+ updated March 2018

Cyber Security. Course Catalog

C T I A CERTIFIED THREAT INTELLIGENCE ANALYST. EC-Council PROGRAM BROCHURE. Certified Threat Intelligence Analyst 1. Certified

A Controls Factory Approach To Building a Cyber Security Program Based on the NIST Cybersecurity Framework (NCSF)

CompTIA IT Fundamentals:

DATA SUPPORT SPECIALIST CERTIFICATE PRODUCTIVITY SOFTWARE CERTIFICATE

Pass4suresVCE. Pass4sures exam vce dumps for guaranteed success with high scores

Certified Cyber Security Analyst VS-1160

Aston Martin Institute

STUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences

EC-Council Certified Incident Handler v2. Prepare to Handle and Respond to Security Incidents EC-COUNCIL CERTIFIED INCIDENT HANDLER 1

Idaho's Premiere Learning Center. Voted Best of Idaho Length. 5 Days Days 16. 2hrs. 1 day. Length. Length. 2 Days. 1 Day.

300 Riverview Plaza Odysseus Marcopolus, Chief Operating Officer Trenton, NJ POLICY NO: SUPERSEDES: N/A VERSION: 1.0

Transcription:

Federal Virtual Training Environment (FedVTE) Pre-Approved for CompTIA CEUs You can earn 1 CEU for each hour of training. Follow these requirements to earn and receive CEUs. All training must be at least 1 hour in duration to be valid for CEUs. Timing: You must complete the training course during your three-year renewal cycle, and the same course can only be submitted once. Relevance: At least 50 percent of the training course content must relate to one or more of the exam objectives for the certification you re renewing. Documentation: Submit the following documentation to receive CEUs for a training course: 1. Detailed description/outline of the training content 2. Completion certificate containing the following: Your name Name of the course Name of the training provider Date the course was completed Number of hours Training approved in this document is based on the exam objectives: A+ 220-1001 and 220-1002 Network+ N10-007 Security+ SY0-501 Cloud+ CV0-002 PenTest+ PT0-001 CySA+ CS0-001 CASP+ CAS-003 Note: Approved training courses in this document are subject to change without prior notification. Training submitted based on prior approval will remain valid. FedVTE February 2019 Page 1 of 5

Federal Virtual Training Environment (FedVTE) Pre-Valid for CompTIA CEUs Intro (101) Courses 101 Coding 101 - Critical Infrastructure Protection Valid N/A N/A N/A N/A N/A N/A 101 - Reverse Engineering Hacker 101 and Secure Coding Version 2 Valid Valid Valid Valid Valid Valid Valid Oversee and Govern Conducting the Cyber Resilience Valid Valid Valid Valid Valid Valid Valid Cyber Infrastructure Survey (CIS) Valid Valid Valid Valid Valid Valid Valid Cyber Risk Management for Managers Valid Valid Valid Valid Valid Valid Valid Cyber Risk Management for Technicians Valid Valid Valid Valid Valid Valid Valid Cyber Security Overview for Managers Valid Valid Valid Valid Valid Valid Valid ISACA Certified Information Security Manager (CISM) Prep Valid N/A Valid N/A Valid Valid Valid (ISC)2 CAP Certification Prep Self Study 2014 N/A Valid Valid N/A Valid Valid Valid (ISC)2 CISSP Prep 2015 Valid Valid Valid Valid Valid Valid Valid (ISC)2 CISSP: ISSEP Certification Prep Valid Valid Valid N/A Valid Valid Valid Investigate Analysis Pipeline Valid N/A N/A N/A N/A N/A N/A Cyber Fundamentals for Law Enforcement Investigations Valid Valid Valid N/A Valid Valid Valid Cyber Security Investigations Valid Valid Valid Valid Valid Valid N/A Introduction to Investigation of Digital Assets Valid Valid Valid N/A Valid Valid Valid Mobile and Device Security (2015) Valid Valid Valid N/A Valid Valid Valid Mobile Forensics Valid Valid Valid Valid Valid Valid Valid FedVTE February 2019 Page 2 of 5

Securely Provision CDM Module 1: Overview Valid N/A N/A N/A N/A N/A Valid CDM Module 2: Hardware Asset Management Valid N/A N/A N/A N/A N/A Valid CDM Module 3: Software Asset Management Valid N/A N/A N/A N/A N/A Valid CDM Module 4: Configuration Settings Management CDM Module 5: Vulnerability Management DB Evaluations using AppDetectivePro and dbprotect Valid Valid Valid N/A N/A Valid N/A Dynamic Testing using HPE WebInspect Valid Valid Valid N/A Valid Valid N/A Root Cause Analysis Valid Valid Valid N/A Valid Valid Valid Securing Infrastructure Devices Valid Valid Valid N/A Valid Valid Valid Software Assurance Executive (SAE) Static Code Analysis using HPE Fortify Static Code Analysis using Synopsis Coverity Supply Chain Assurance using Sonatype Nexus Analyze Advanced PCAP Analysis and Signature Development (APA) Valid N/A N/A N/A N/A N/A N/A Introduction to Threat Hunting Teams Valid Valid Valid N/A N/A Valid Valid Operate and Maintain Advanced Windows Scripting Cisco CCENT Self-Study Prep Valid Valid N/A Valid N/A N/A N/A Cisco CCNA Security Self-Study Prep Valid Valid Valid Valid Valid Valid N/A Cloud Computing Security Valid Valid Valid Valid Valid Valid Valid CompTIA Cybersecurity Analyst (CySA+) Prep Valid Valid Valid N/A Valid N/A N/A CompTIA Network+ (N10-007) Valid *Valid N/A Valid N/A N/A N/A *Approved for those who passed the N10-006 exam or previous Network+ exam versions CompTIA Security+ (SY0-501) Certification Prep Valid Valid **Valid N/A N/A N/A N/A **Approved for those who passed the SY0-401 exam or previous Security+ exam versions FedVTE February 2019 Page 3 of 5

Demilitarized Zone (DMZ) with IDS/IPS Valid Valid Valid N/A Valid Valid N/A DNSSEC Training Workshop Valid Valid Valid N/A Valid Valid N/A EC-Council Certified Ethical Hacker (CEHv9) Valid Valid Valid N/A N/A N/A N/A Emerging Cyber Security Threats Valid Valid Valid Valid Valid Valid Valid Introduction to Windows Scripting IPV6 Security Essentials Valid Valid Valid Valid Valid Valid Valid (ISC)2 Systems Security Certified Practitioner Valid Valid Valid Valid Valid Valid Valid LAN Security Using Switch Features Valid Valid Valid Valid Valid Valid Valid Network Layer 1 & 2 Troubleshooting Valid Valid N/A Valid N/A N/A Valid Radio Frequency Identification (RFID) Security Valid N/A N/A N/A N/A N/A Valid Securing the Network Perimeter Valid Valid Valid N/A Valid Valid Valid Security and DNS Valid Valid Valid N/A Valid Valid Valid Windows Operating System Security Valid Valid Valid Valid Valid Valid Valid Wireless Network Security Valid Valid Valid Valid Valid Valid Valid Protect and Defend CDM Dashboard CDM PRIVMGMT: CA PAM for Chief Information Security Officers (LT1) CDM PRIVMGMT: CyberArk for Chief Information Security Officers (LT1) CDM PRIVMGMT: CA PAM for Information System Security Officer (LT2) CDM PRIVMGMT: CyberArk for Information System Security Officer (LT2) CDM PRIVMGMT: CA PAM for Security Operations Center (LT3) CDM PRIVMGMT: CyberArk for Security Operations Center (LT3) CDM PRIVMGMT: CA PAM for Agency Privileged Users (LT4) CDM PRIVMGMT: CyberArk for Agency Privileged Users (LT4) CDM PRIVMGMT: CA PAM for Agency Privileged Users (LT5) FedVTE February 2019 Page 4 of 5

CDM PRIVMGMT: CyberArk for Privileged User Managers (LT5) CDM PRIVMGMT: CA PAM for Network Operations Center (LT6) CDM PRIVMGMT: CDM PRIVMGMT: CyberArk for Network Operations Center (LT6) CDM PRIVMGMT: SailPoint for SailPoint Administrators (LT7) CDM PRIVMGMT: CA PAM Administrator (LT8) CDM PRIVMGMT: CyberArk Administrators (LT8) CMaaS Transition Foundations of Incident Management Valid Valid Valid Valid Valid Valid Valid Linux Operating System Security Valid Valid Valid N/A Valid Valid Valid Offensive and Defensive Network Operations Valid Valid Valid Valid Valid Valid Valid SiLK Traffic Analysis FedVTE February 2019 Page 5 of 5