Hi, I need CEU’s for CompTia SecurityX.
Hey there - CompTIA is solely responsible for determining which content in our catalog it will pre-approve for cert-specific CEU’s. For some reason, they have declined to pre-approve any content for SecurityX - even if the content is demonstrably aligned to SecurityX. Said differently, they haven’t reviewed the content and said “no” - they just haven’t taken the time to review the content.
If you review their CEU Assessment tool, (CEU Assessment), you’ll see that, in order for content to be accepted, 50% of the content must pertain to one or more of the CompTIA Exam Objectives for the certification you are renewing.
And if you look at the SecurityX objectives, you’ll find, for example:
Objective 4.4 Given a scenario, analyze data and artifacts in support of incident response activities.
Taken at face value, the entirety of our Digital Forensics Skill Path maps to this objective. Additionally, given the hands-on nature of the Skill Path, it should also clear the following bar:
It is important to keep in mind that CompTIA does not only look at content “topics” to determine whether a course relates to exam objectives. There are other variables, including cognitive level of course content, that is taken into account during our internal review. CompTIA reserves the right to make a final determination about whether training course content may or may not relate to exam objectives, up to 50%, and leverages an unbiased third party to ensure accuracy throughout the review process.
So according to CompTIA’s own guidance, any of the courses or labs in the Skill Path should qualify as CEU’s for SecurityX.
Based on our own mapping efforts, I would consider Digital Forensics to be your best bet, as well as the Security Engineer career path.
Thank you.
The Digital Forensics Skill path gives only 17 CEU’s. ![]()
I would also recommend looking at the Security Engineer career path. Each activity maps to SecurityX as follows.
(Please note that each activity will individually issue its own Certificate of Completion and CEU’s. You can get a Certificate of Completion for the entire Learn portion of the path, but it will not cite CEU’s)
Security Engineering and Cyber Risk
1.1 Given a set of organizational security requirements, implement the appropriate governance components.
1.2 Given a set of organizational security requirements, perform risk management activities.
1.3 Explain how compliance affects information security strategies.
DevSecOps
1.4 Given a scenario, perform threat-modeling activities.
3.6 Given a scenario, use automation to secure the enterprise.
Zero Trust
2.6 Given a scenario, integrate Zero Trust concepts into system architecture design.
Threat Modeling
1.4 Given a scenario, perform threat-modeling activities.
Infrastructure and Operations Security Basics
2.3 Given a scenario, integrate appropriate controls in the design of a secure architecture.
Secure Network Architecture
2.1 Given a scenario, analyze requirements to design resilient systems.
2.3 Given a scenario, integrate appropriate controls in the design of a secure architecture.
System Hardening
2.3 Given a scenario, integrate appropriate controls in the design of a secure architecture.
3.2 Given a scenario, analyze requirements to enhance the security of endpoints and servers.
Virtualization Security
2.3 Given a scenario, integrate appropriate controls in the design of a secure architecture.
Deploying and Configuring Firewalls
2.3 Given a scenario, integrate appropriate controls in the design of a secure architecture.
Next-Gen Firewalls
2.3 Given a scenario, integrate appropriate controls in the design of a secure architecture.
SOAR
2.3 Given a scenario, integrate appropriate controls in the design of a secure architecture.
3.6 Given a scenario, use automation to secure the enterprise.
Application Security Basics
2.2 Given a scenario, implement security in the early stages of the systems life cycle and throughout subsequent stages.
Secure Coding Best Practices
2.2 Given a scenario, implement security in the early stages of the systems life cycle and throughout subsequent stages.
Static Code Analysis
2.2 Given a scenario, implement security in the early stages of the systems life cycle and throughout subsequent stages.
Dynamic Code Analysis
2.2 Given a scenario, implement security in the early stages of the systems life cycle and throughout subsequent stages.
API Security
2.2 Given a scenario, implement security in the early stages of the systems life cycle and throughout subsequent stages.
Data Security Basics
2.3 Given a scenario, integrate appropriate controls in the design of a secure architecture.
Database Security
2.3 Given a scenario, integrate appropriate controls in the design of a secure architecture.
Secure Data Storage and Transmission
2.3 Given a scenario, integrate appropriate controls in the design of a secure architecture.
Data Masking
2.3 Given a scenario, integrate appropriate controls in the design of a secure architecture.
File Integrity Monitoring
2.3 Given a scenario, integrate appropriate controls in the design of a secure architecture.
Data Classification
2.3 Given a scenario, integrate appropriate controls in the design of a secure architecture.
Data Loss Prevention
2.3 Given a scenario, integrate appropriate controls in the design of a secure architecture.
You can also browse the broader catalog and look additional content that you think CompTIA should accept in good faith as valid CEU’s for SecurityX (keeping in mind that CompTIA will have the final say on all CEU approvals).