Information Security Training Company, The Hacker Academy, Authorized To Offer CompTIA Continuing Education Units

Share Article

CompTIA has authorized The Hacker Academy to provide Continuing Education Units for people with existing CompTIA credentials. These CEUs are used to keep credentials current.

The Hacker Academy

CompTIA, a worldwide leader in information technology certifications, has awarded The Hacker Academy the ability to issue Continuing Education Units to their students, allowing students to keep their CompTIA credentials current. Qualifying certifications include A+, Network+, and Security+. When paired with knowledge gained at The Hacker Academy on topics such as Ethical Hacking, Reverse Engineering, Digital Forensics, and Penetration Testing, these students will be ready to move forward towards more challenging endeavors such as the CompTIA Advanced Security Practitioner (CASP) certification.

Students of The Hacker Academy will find it easy to claim their Continuing Education Units. One Hacker Academy module, which includes a video, quiz, and hands-on interactive lab, will get a student 1 CEU to put towards their respective certification. With over 150 modules currently in rotation, students are able to pick content that caters specifically to their wants and needs.

The aforementioned certifications provide great starting points for people ready to get serious about information technology and they are great examples of prerequisites for THA membership. Since the world is on the brink of what the press deems an unavoidable ‘Global Cyber War', providing a spot to bridge the gap from general IT to information security may persuade more entry and beginner level professionals to intertwine the two.

About The Hacker Academy:

The Hacker Academy has been taking information security professionals from amateurs to ninjas for over 5 years, and continues to be a leading source of tools and techniques for the info sec community. Their on-demand, cloud based portal allows people to train when they want on what they want. It provides a go to spot for all things info sec, from ethical hacking and penetration testing, to digital forensics and reverse engineering. All content can be found and accessed 24/7/365 at

Share article on social media or email:

View article via:

Pdf Print

Contact Author

Megan Horner
Follow us on
Visit website