New Horizons IT - Complete Collection - BidNet

110
Solution Area Curriculum Series Course Title SOFTWARE DEVELOPMENT Microsoft Web Applications Microsoft Visual Studio 2013: Windows Store App Essentials - HTML5 and JavaScript Microsoft Windows Store App Essentials with HTML5: Overview Microsoft Windows Store App Essentials with HTML5: The UI and Layout Controls Microsoft Windows Store App Essentials with HTML5: PLM and Contracts Microsoft Windows Store App Essentials with HTML5: Navigation, Contacts, Tiles Microsoft Windows Store App Essentials with HTML5: Input Devices and User Touch Microsoft Windows Store App Essentials with HTML5: Managing Data Microsoft Windows Store App Essentials with HTML5: Security Microsoft Windows Store App Essentials with HTML5: Deployment Microsoft Visual Studio 2012: Programming in HTML5 with JavaScript and CSS3 Microsoft Visual Studio 2012: Introduction to HTML5 and CSS3 Microsoft Visual Studio 2012: HTML5 and JavaScript Microsoft Visual Studio 2012: Advanced HTML5 and JavaScript Microsoft Visual Studio 2012: HTML5 APIs and Local Storage Microsoft Visual Studio 2012: HTML5, CSS3, and Adaptive UIs Microsoft Visual Studio 2012: HTML5 Graphics and Animation Microsoft Visual Studio 2012: Consuming and Transmitting Data with HTML5 Microsoft Visual Studio 2012: Utilizing the HTML5 WebSocket API and Web Workers Microsoft Azure and Web Services Working With Local Data Access Technologies Querying and Manipulating Data with the Entity Framework Creating and Consuming WCF Web Services WCF Instancing and Concurrency and WCF Data Services Creating and Consuming Web API Services Data Access and Services with Microsoft Azure Preparing and Packaging Applications For Deployment Web Application and Services Deployment Web API Essentials Web API Essentials Web API Advanced Microsoft Azure Microsoft Azure: Introduction Microsoft Azure: Networks and Storage Microsoft Azure: Publishing and Caching Microsoft Azure: Implementing Infrastructure Solutions Microsoft Azure - Implementing Infrastructure Solutions: Virtual Networks Microsoft Azure - Implementing Infrastructure Solutions: Virtual Machines Microsoft Azure - Implementing Infrastructure Solutions: Implementing Websites Microsoft Azure - Implementing Infrastructure Solutions: Storage and PaaS Cloud Microsoft Azure - Implementing Infrastructure Solutions: Data Services Microsoft Azure - Implementing Infrastructure Solutions: CDNs and Automation Microsoft Azure - Implementing Infrastructure Solutions: Active Directory Web Development Technologies Introduction to Ajax Development Ajax Basics Ajax API Essentials Ajax Applications and Server Communication Ajax Ajax: Requesting Data and Retrieving Responses CQRS Theory Introduction to CQRS Java 2 Programming Java SE7 Fundamentals Java SE7 Fundamentals: Introduction to Java Java SE7 Fundamentals: Variables, Operators, and Objects Java SE7 Fundamentals: Decision Constructs, Arrays, and Loops Java SE7 Fundamentals: Overloading, Validation, and Object-Oriented Concepts Java SE7 Fundamentals: Handling Errors and Deploying Applications Java SE 7 New Features Java SE7 New Features: Java Language and Technology Enhancements Java SE7 New Features: I/O, Network, and Desktop Enhancements Java SE7 Professional Java SE7 Professional: Syntax and Class Design Java SE7 Professional: Generics, Errors, and I/O Java SE7 Professional: File I/O, Concurrency, JDBC, and Localization Introduction to Java EE 6 Introduction to Java EE 6 Developing Applications Using Java Spring Java Spring: Spring Application Basics Java Spring: Annotation Configuration and Java Configuration in Spring Java Spring: Creating Web Applications Using Spring MVC Java Spring: Working with Data in Spring Java Spring: Aspect-Oriented Programming Using Spring AOP Java Spring: Adding Security Using the Spring Security Project Java Hibernate Getting Started with Java Hibernate Customized Mapping and Basic Querying in Java Hibernate Advanced Querying in Java Hibernate Java SE 8 Fundamentals Java SE 8 Fundamentals: Introduction to Java Java SE 8 Fundamentals: Classes and Objects Java SE 8 Fundamentals: Methods, Encapsulation, and Conditionals Java SE 8 Fundamentals: Data Manipulation and Inheritance New Horizons IT - Complete Collection Exhibit 1 to Addendum 3 1 DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Transcript of New Horizons IT - Complete Collection - BidNet

Solution Area Curriculum Series Course TitleSOFTWARE DEVELOPMENT

Microsoft Web ApplicationsMicrosoft Visual Studio 2013: Windows Store App Essentials - HTML5 and JavaScript

Microsoft Windows Store App Essentials with HTML5: OverviewMicrosoft Windows Store App Essentials with HTML5: The UI and Layout ControlsMicrosoft Windows Store App Essentials with HTML5: PLM and ContractsMicrosoft Windows Store App Essentials with HTML5: Navigation, Contacts, TilesMicrosoft Windows Store App Essentials with HTML5: Input Devices and User TouchMicrosoft Windows Store App Essentials with HTML5: Managing DataMicrosoft Windows Store App Essentials with HTML5: SecurityMicrosoft Windows Store App Essentials with HTML5: Deployment

Microsoft Visual Studio 2012: Programming in HTML5 with JavaScript and CSS3Microsoft Visual Studio 2012: Introduction to HTML5 and CSS3Microsoft Visual Studio 2012: HTML5 and JavaScriptMicrosoft Visual Studio 2012: Advanced HTML5 and JavaScriptMicrosoft Visual Studio 2012: HTML5 APIs and Local StorageMicrosoft Visual Studio 2012: HTML5, CSS3, and Adaptive UIsMicrosoft Visual Studio 2012: HTML5 Graphics and AnimationMicrosoft Visual Studio 2012: Consuming and Transmitting Data with HTML5Microsoft Visual Studio 2012: Utilizing the HTML5 WebSocket API and Web Workers

Microsoft Azure and Web ServicesWorking With Local Data Access TechnologiesQuerying and Manipulating Data with the Entity FrameworkCreating and Consuming WCF Web ServicesWCF Instancing and Concurrency and WCF Data ServicesCreating and Consuming Web API ServicesData Access and Services with Microsoft AzurePreparing and Packaging Applications For DeploymentWeb Application and Services Deployment

Web API EssentialsWeb API EssentialsWeb API Advanced

Microsoft AzureMicrosoft Azure: IntroductionMicrosoft Azure: Networks and StorageMicrosoft Azure: Publishing and Caching

Microsoft Azure: Implementing Infrastructure SolutionsMicrosoft Azure - Implementing Infrastructure Solutions: Virtual NetworksMicrosoft Azure - Implementing Infrastructure Solutions: Virtual MachinesMicrosoft Azure - Implementing Infrastructure Solutions: Implementing WebsitesMicrosoft Azure - Implementing Infrastructure Solutions: Storage and PaaS CloudMicrosoft Azure - Implementing Infrastructure Solutions: Data ServicesMicrosoft Azure - Implementing Infrastructure Solutions: CDNs and AutomationMicrosoft Azure - Implementing Infrastructure Solutions: Active Directory

Web Development TechnologiesIntroduction to Ajax Development

Ajax BasicsAjax API EssentialsAjax Applications and Server Communication

AjaxAjax: Requesting Data and Retrieving Responses

CQRS TheoryIntroduction to CQRS

Java 2 ProgrammingJava SE7 Fundamentals

Java SE7 Fundamentals: Introduction to JavaJava SE7 Fundamentals: Variables, Operators, and ObjectsJava SE7 Fundamentals: Decision Constructs, Arrays, and LoopsJava SE7 Fundamentals: Overloading, Validation, and Object-Oriented ConceptsJava SE7 Fundamentals: Handling Errors and Deploying Applications

Java SE 7 New FeaturesJava SE7 New Features: Java Language and Technology EnhancementsJava SE7 New Features: I/O, Network, and Desktop Enhancements

Java SE7 ProfessionalJava SE7 Professional: Syntax and Class DesignJava SE7 Professional: Generics, Errors, and I/OJava SE7 Professional: File I/O, Concurrency, JDBC, and Localization

Introduction to Java EE 6Introduction to Java EE 6

Developing Applications Using Java SpringJava Spring: Spring Application BasicsJava Spring: Annotation Configuration and Java Configuration in SpringJava Spring: Creating Web Applications Using Spring MVCJava Spring: Working with Data in SpringJava Spring: Aspect-Oriented Programming Using Spring AOPJava Spring: Adding Security Using the Spring Security Project

Java HibernateGetting Started with Java HibernateCustomized Mapping and Basic Querying in Java HibernateAdvanced Querying in Java Hibernate

Java SE 8 FundamentalsJava SE 8 Fundamentals: Introduction to JavaJava SE 8 Fundamentals: Classes and ObjectsJava SE 8 Fundamentals: Methods, Encapsulation, and ConditionalsJava SE 8 Fundamentals: Data Manipulation and Inheritance

New Horizons IT - Complete Collection

Exhibit 1 to Addendum 3

1

DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Solution Area Curriculum Series Course TitleNew Horizons IT - Complete Collection

Java SE 8 Fundamentals: Interfaces, Exceptions, and DeploymentJava SE 8 Programming

Java SE 8 Programming: Encapsulation, Polymorphism, and AbstractionJava SE 8 Programming: Interfaces, Lambda Expressions, Collections, and GenericsJava SE 8 Programming: Inheritance, Interfaces, Exceptions, and DeploymentJava SE 8 Programming: Date/Time API, I/O and File I/O (NIO.2), and ConcurrencyJava SE 8 Programming: Concurrency, Parallelism, the JDBC API, and Localization

Defensive Programming in JavaDefensive Programming in Java: Fundamentals

Working with Java SE 7Programming Apps with Java SE 7

Working with Java SE 6Programming Apps with Java SE 6

Microsoft .NET Software Development ToolsMicrosoft .NET Framework 4: Windows Application Development with Visual C# 2010

Creating Windows Applications with C# 2010Creating User Interfaces for Windows Applications with C# 2010Windows Applications Content Creation and Management with C# 2010Windows Applications Databinding with C# 2010Customizing and Managing Multithreaded Applications with C# 2010Securing and Deploying WPF Applications with C# 2010

Web Applications Development with Microsoft .NET Framework 4 using Visual Basic 2010

Microsoft .NET Framework 4.0: Web Applications with Visual Studio 2010 and Visual Basic 2010Microsoft .NET Framework 4.0: Web Form Controls with VB 2010Microsoft .NET Framework 4.0: Data Integration with VB 2010Microsoft .NET Framework 4.0: Client-Side Scripting and AJAX with VB 2010Microsoft .NET Framework 4.0: ASP.NET MVC 2 with VB 2010Microsoft .NET Framework 4.0: Configuring and Deploying Web Applications with VB 2010Microsoft .NET Framework 4: Debugging, Tracing and Monitoring Web Applications with VB 2010Microsoft .NET Framework 4.0: Web Application Optimization and Customization with VB 2010

Microsoft .NET Framework 4: Web Application Development with Visual C# 2010

Microsoft .NET Framework 4: Web Applications with Visual Studio 2010 and Visual C# 2010Microsoft.NET Framework 4: Web Form Controls with C# 2010Microsoft .NET Framework 4: Data Integration with C# 2010Microsoft .NET Framework 4: Client-Side Scripting and AJAX with C# 2010Microsoft .NET Framework 4: ASP.NET MVC 2 with C# 2010Microsoft .NET Framework 4: Configuring and Deploying Web Applications with C# 2010Microsoft .NET Framework 4: Debugging, Tracing and Monitoring Web Applications with C# 2010Microsoft .NET Framework 4: Web Application Optimization and Customization with C# 2010

Windows Communication Foundation Development in C# with Microsoft .NET Framework (70-513)Getting Started with WCF 4 Using C# 2010WCF 4 Contracts, Behaviors, and Data Management Using C# 2010Securing and Managing a WCF 4 Application with C# 2010Discovery, Routing, and RESTful Services in WCF 4 Applications with C# 2010

Accessing Data with Microsoft .NET Framework for C# Developers (70- 516)Getting Started with ADO.NET 4 Connections and Commands Using C# 2010Managing ADO.NET 4 Connections and Commands with C# 2010Getting Started with ADO.NET 4 DataSets Using C# 2010Viewing and Navigating Data with ADO.NET 4 DataSets Using C# 2010Updating ADO.NET DataSets with C# 2010Synchronizing Data and Managing ADO.NET 4 Applications with C# 2010Working with the ADO.NET Entity Framework 4 Using C# 2010Using LINQ and XML with ADO.NET 4 and C# 2010

Microsoft .NET Framework 4: Windows Communication Foundation with Visual Basic 2010Getting Started with WCF 4 using VB 2010WCF 4 Contracts, Behaviors, and Data Management Using Visual Basic 2010Securing and Managing a WCF 4 Application with Visual Basic 2010Discovery, Routing, and RESTful Services in WCF 4 Applications with VB 2010

Microsoft .NET Framework 4: Accessing Data with Visual Basic 2010Getting Started with ADO.NET 4 Connections and Commands Using Visual Basic 2010Managing ADO.NET 4 Connections and Commands with Visual Basic 2010Getting Started with ADO.NET 4 DataSets using Visual Basic 2010Updating ADO.NET DataSets with Visual Basic 2010Viewing and Navigating Data with ADO.NET 4 DataSets using Visual Basic 2010Synchronizing Data and Managing ADO.NET 4 Applications with Visual Basic 2010Working with the ADO.NET Entity Framework 4 using Visual Basic 2010Using LINQ and XML with ADO.NET 4 and Visual Basic 2010

Microsoft .NET Framework 4: Windows Application Development with Visual Basic 2010Windows Application Development with Visual Basic 2010Creating User Interfaces for Windows Applications with Visual Basic 2010Windows Applications Content Creation and Management with Visual Basic 2010Windows Applications Databinding with Visual Basic 2010Customizing and Managing Multithreaded Applications with Visual Basic 2010Securing and Deploying WPF Applications with Visual Basic 2010

Microsoft .NET: An Overview.NET Overview: Windows, Web, and the Cloud

Essentials of Developing Windows Store Apps Using C#Getting Familiar With Windows 8.1 UI and Layout

Exhibit 1 to Addendum 3

2

DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Solution Area Curriculum Series Course TitleNew Horizons IT - Complete Collection

Working With Data and FilesNavigation and Layout in Windows Store AppsWorking With Charms and ContractsWorking With The App Bar, Semantic Zoom, User Input, and Process Lifetime ManagementAuthentication, Authorization, and App Deployment

Microsoft .NET Framework: WPF with XAML and C#WPF Fundamentals with XAML and C#

Architecture N-Tier/RESTArchitecture N-Tier/REST: Designing and Building Applications

F# FundamentalsGetting Started with F#

Secure Programming for .NETSecuring .NET Programming

Visual Studio Code Cross-platform Code EditorVisual Studio Code Cross-platform Code Editor: Basics

Generic LanguagesDeveloping With Python

Python Language BasicsApplications of PythonAdvanced Python

Software Development Fundamentals with Visual StudioIntroduction to ProgrammingProgramming BasicsBeginning Windows Applications

Ruby On RailsRuby on Rails - FundamentalsRuby on Rails - Database FundamentalsDatabases in Ruby on Rails: Advanced ConceptsWeb APIs with Ruby on RailsRuby on Rails for .NET DevelopersWorking with Databases in Ruby on Rails

Ruby ProgrammingGetting Started with RubyWorking with RubyAdvanced Ruby Features

Working with ClojureClojure FundamentalsData and State Management in ClojureOptimizing Clojure ProjectsClojure Data-Driven and Web Application Fundamentals

Introduction to R ProgrammingIntroduction to R Programming

Programming with ANSI CANSI C Language FundamentalsIterations, Functions and Pointers in ANSI CData Structures and File Management in ANSI COptimizing and Debugging ANSI C Programs

Introduction to Swift ProgrammingSwift Language BasicsUsing Swift Advanced Language Features

Introduction to ScalaScala Introduction

Asynchronous Programming with ClojureAsynchronous Programming with Clojure's core.async Library

Ruby on Rails 4.2Introduction to RailsIntroduction to ModelsIntroduction to ViewsAdvanced RailsExamining Rails APIs

C/C++ ProgrammingC++11 Programming Essentials

C++11: Programming FundamentalsC++11: Programming TechniquesC++11: Programming with BoostC++11: Advanced Techniques and C++14 Preview

Programming in C++Programming in C++: Working with ClassesProgramming in C++: Arrays, Pointers, and STLProgramming in C++: STL I/O and Headers, Templates, and NamespacesProgramming in C++: Structure and Data TypesProgramming in C++: Program Structure and ExceptionsProgramming in C++: Tools and Techniques

Software Programming FundamentalsSoftware Programming Fundamentals

Getting Started with Software ProgrammingIntroduction to Software Program DesignSoftware Program Control Flow Fundamentals

Software Programming FundamentalsSoftware Programming Fundamentals: Design and Development Best PracticesSoftware Programming Fundamentals: Source Coding Best PracticesSoftware Programming Fundamentals: Software Security Best PracticesSoftware Programming Fundamentals: Best Practices for Maintaining Code

Software Design

Exhibit 1 to Addendum 3

3

DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Solution Area Curriculum Series Course TitleNew Horizons IT - Complete Collection

Object-oriented DesignBeginning Object-Oriented Design

Service Oriented ArchitectureSOA Fundamentals

SOLID Principles of Object-oriented DesignIntroduction to SOLIDSOLID Fundamentals

JIRA FundamentalsLeveraging the JIRA Platform for Development Projects

Software Development PrinciplesAgile Software Development

Introducing Agile Software DevelopmentPlanning an Agile Software Development ProjectManaging Agile Software DevelopmentAgile Programming and Testing

Advanced ScrumAdvanced Scrum: Developing the Product and Sprint BacklogsAdvanced Scrum: Integrating and Customizing ScrumAdvanced Scrum: Addressing Sprint Execution Challenges

Software Practices (SCRUM)Software Practices (SCRUM): SCRUM RolesSoftware Practices (SCRUM): SCRUM Meetings

User Experience (UX) Design FoundationsUX Design Foundations: Design Principles and StrategiesUX Design Foundations: Techniques and ToolsUX Design Foundations: Navigation, Layout, and Content

Software Practices: WaterfallThe Waterfall Software Development Model

Agile Software TestingAgile Software Testing: Methodologies and Testing ApproachesAgile Software Testing: Techniques and Tools

Software Testing FoundationsSoftware Testing Foundations

Fundamentals of Software TestingTesting Throughout the Software Life CycleStatic Techniques and Test Design in Software TestingBlack-Box Software Testing TechniquesWhite-Box Software Testing TechniquesSoftware Test ManagementConfiguration Management, Risks, and Incidents in Software TestingTool Support in Software Testing

Microsoft Visual Studio Team Foundation Server 2013 AdministrationMicrosoft Team Foundation Server 2013: Installation and ConfigurationMicrosoft Team Foundation Server 2013: Customization for Team UseMicrosoft Team Foundation Server 2013: Managing an ImplementationMicrosoft Team Foundation Server 2013: Clients, Workspaces, and Version Control

Selenium Automated Web TestingSelenium Automated Web Testing FundamentalsAdvanced Features of Selenium Automated Web TestingSelenium and JavaSelenium and C#Selenium and Python

Testing with JUnitJUnit FundamentalsWorking with JUnit Tests

Software Testing with Visual StudioSoftware Testing with Visual Studio: Create and Configure Test PlansSoftware Testing with Visual Studio: Manage Test CasesSoftware Testing with Visual Studio: Manage Test Execution Part 1Software Testing with Visual Studio: Manage Test Execution Part 2

Debugging FundamentalsIntroduction to DebuggingVisual Studio 2013 DebuggingDebugging ToolsSoftware Debugging in Windows

Software Testing FundamentalsCreating Software TestsManaging, Troubleshooting, and Automating Software Tests

Using CucumberCucumber Fundamentals

Software Testing FoundationsSoftware Testing Foundations: Testing throughout the Software Life CycleSoftware Testing Foundations: Static, Dynamic, Black-box, and White-box TestingSoftware Testing Foundations: Test Planning, Management, and Tool Support

Testing Android Apps with GenymotionGenymotion: Testing Android Apps

Testing Social Media ApplicationsEnsuring Social Media and Application Quality

Microsoft Windows Store AppsMicrosoft Advanced Windows Store App Development using HTML5 and JavaScript

Microsoft Advanced Windows Store Apps with HTML5: Enhancing PerformanceMicrosoft Advanced Windows Store Apps with HTML5: Animations and Custom ControlsMicrosoft Advanced Windows Store App Development with HTML5: Media and DevicesMicrosoft Advanced Windows Store App Development with HTML5: User InteractionMicrosoft Advanced Windows Store App Development with HTML5: Data and Security

Exhibit 1 to Addendum 3

4

DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Solution Area Curriculum Series Course TitleNew Horizons IT - Complete Collection

Microsoft Advanced Windows Store App Development with HTML5: Localize and DeployAdvanced Windows Store App Development Using C# and XAML

Advanced Windows Store Apps with C# in Visual Studio 2013: Data ManagementAdvanced Windows Store Apps with C# in Visual Studio 2013: The UI, Printing, WNSAdvanced Windows Store Apps with C# in Visual Studio 2013: Media and DevicesAdvanced Windows Store Apps with C# in Visual Studio 2013: Security & OptimizingAdvanced Windows Store Apps with C# in Visual Studio 2013: Testing & Deployment

ASP.NET MVC Web Application DevelopmentGetting Started with ASP.NET MVC Web Applications in Visual Studio 2013Designing the User Experience in ASP.NET MVC Web ApplicationsWorking with ASP.NET MVC ModelsASP.NET MVC Databases and the Entity FrameworkDeveloping the User Experience in ASP.NET MVCDesigning ASP.NET MVC Application ArchitectureImplementing ASP.NET Authentication and AuthorizationDebugging ASP.NET MVC Web ApplicationsConfiguring and Deploying an ASP.NET MVC ApplicationOptimizing and Protecting Application Data

Working with ASP.NET MVC 5Creating and Securing MVC 5 ApplicationsUsing MVC 5 with EF6, Web API 2, SignalR, and Azure

Microsoft C#Programming in C#

Programming in C#: Managing Program FlowProgramming in C#: Creating and Using TypesProgramming in C#: Debugging and Security ImplementationProgramming in C#: Implementing Data Access

EclipseFundamentals of Eclipse

Introduction to EclipseUsing Eclipse

Microsoft LINQMicrosoft LINQ

Getting Started with LINQMicrosoft Enterprise Library

Microsoft Enterprise LibraryMicrosoft Enterprise Library

Microsoft ORMNHibernate

NHibernate EssentialsNHibernate Advanced Techniques

Microsoft Entity FrameworkGetting Started With Entity FrameworkAdvanced Entity Framework

AlgorithmsIntroduction to Algorithms and Data Structures

Introduction to Algorithms and Data StructuresMobile Application Development

Programming Cross-Platform Applications in Visual Studio with XamarinXamarin Android and iOS Projects in Cross-Platform Solutions in Visual StudioCross-Platform Shared Code and Xamarin.Forms in Visual Studio

New Features in Android 5.x Lollipop For DevelopersAndroid Lollipop New Features For Developers

Developing Apple Watch ApplicationsDeveloping Basic Apple Watch ApplicationsDeveloping Advanced Apple Watch Applications

Ionic FrameworkExploring the Basic Features of the Ionic FrameworkExploring the Advanced Features of the Ionic Framework

PhoneGapPhoneGap: Exploring Basic FeaturesPhoneGap: Exploring Advanced Features

Android For .NET DevelopersIntroduction to Xamarin for .NETAdvanced Topics 1Android OSOther Approaches to DevelopmentAndroid User Interface ElementsAdvanced Topics 2

Windows EmbeddedWindows Embedded 8.1 Industry

Windows Embedded 8.1 IndustryConfiguration Management

Git FundamentalsBeginner GitAdvanced Git

Defensive ProgrammingDefensive Programming in C/C++

Defensive Coding Fundamentals for C/C++Defensive Coding for C/C++

Defensive Programming in C#Defensive Coding Fundamentals for C#Defensive Coding for C#

Defensive Programming in JavaScript and HTML5

Exhibit 1 to Addendum 3

5

DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Solution Area Curriculum Series Course TitleNew Horizons IT - Complete Collection

Defensive Coding Fundamentals for JavaScript and HTML5Defensive Coding for JavaScript and HTML5

Defensive Programming in iOSThinking Defensively about Functions, Methods, and InputManaging Network InteractionErrors, Exceptions, and TestingProtecting Data in iOS Apps

Defensive Programming in AndroidDefensive Programming in Android: Input and MethodsDefensive Programming in Android: Using StandardsDefensive Programming in Android: Errors, Exceptions, and TestingDefensive Programming in Android: Network Access and Java Defensive Techniques

ApacheMaven Fundamentals

Getting Started with MavenGo

Go Programming FundamentalsProgramming in Go

Mentoring AssetsMentoring Assets

Mentoring 1Z0-851 Java Standard Edition 6 ProgrammerMentoring 70-515 VB - TS: Web Applications Development with .NET 4Mentoring 70-513 C# - TS: Windows Communication Foundation with .NET 4Mentoring 70-515 C# - TS: Web Applications Development with .NET 4Mentoring 70-516 C# - TS: Accessing Data with Microsoft .NET Framework 4Mentoring 70-511 C# - TS: Windows Applications Development with .NET 4Mentoring 70-513 VB - TS: Windows Communication Foundation with .NET 4Mentoring 70-516 VB - TS: Accessing Data with Microsoft .NET Framework 4Mentoring 70-511 VB - TS: Windows Applications Development with .NET 4Mentoring 1Z0-804 Java SE 7 Programmer IIMentoring 70-480 Programming in HTML5 with JavaScript and CSS3Mentoring BH0-010 Certified Tester Foundation LevelMentoring 70-481 Developing Windows Store Apps using HTML5 and JavaScriptMentoring 70-482 Advanced Windows Store App Development, HTML5 and JavaScriptMentoring 70-483 Programming in C#Mentoring 98-361 Software Development FundamentalsMentoring 70-484 Essentials of Developing Windows Store Apps Using C#Mentoring 70-486 Developing ASP.NET MVC Web ApplicationsMentoring 70-485 Advanced Windows Store App Development Using C#Mentoring 70-487 Developing Microsoft Azure and Web ServicesMentoring 1Z0-808 Java SE Programmer 8Mentoring Software Testing FundamentalsMentoring 1Z0-809 Java SE 8 Programmer IIMentoring JIRA FundamentalsMentoring Selenium FundamentalsMentoring 1Z0-803 Java SE 7 Programmer I

Test PrepsTest Preps

TestPrep 70-515 VB - TS: Web Applications Development with .NET 4TestPrep 70-515 C# - TS: Web Applications Development with .NET 4TestPrep 70-513 C# - TS: Windows Communication Foundation with .NET 4TestPrep 70-516 C# - TS: Accessing Data with Microsoft .NET Framework 4TestPrep 70-511 C# - TS: Windows Applications Development with .NET 4TestPrep 70-513 VB - TS: Windows Communication Foundation with .NET 4TestPrep 1Z0-803 Java SE 7 Programmer ITestPrep 70-511 VB - TS: Windows Applications Development with .NET 4TestPrep 1Z0-804 Java SE 7 Programmer IITestPrep 70-480 Programming in HTML5 with JavaScript and CSS3TestPrep BH0-010 Certified Tester Foundation LevelTestPrep 70-481 Developing Windows Store Apps using HTML5 and JavaScriptTestPrep 70-482 Advanced Windows Store App Development, HTML5 and JavaScriptTestPrep 70-483 Programming in C#TestPrep 70-484 Essentials of Developing Windows Store Apps Using C#TestPrep 98-361 Software Development FundamentalsTestPrep 70-485 Advanced Windows Store App Development Using C#TestPrep 70-486 Developing ASP.NET MVC Web ApplicationsTestPrep 70-487 Developing Microsoft Azure and Web ServicesTestPrep 1Z0-808 Java SE 8 Programmer ITestPrep 98-379 Software Testing FundamentalsTestPrep 70-516 VB - TS: Accessing Data with Microsoft .NET Framework 4

OPERATING SYSTEMS AND SERVER TECHNOLOGIESCompTIA A+

CompTIA A+ Exam 1CompTIA A+ Exam 220-901: BIOS and StartupCompTIA A+ Exam 220-901: MotherboardsCompTIA A+ Exam 220-901: RAMCompTIA A+ Exam 220-901: Storage SolutionsCompTIA A+ Exam 220-901: CPUsCompTIA A+ Exam 220-901: Connectors and Connections

CompTIA A+ 220-801CompTIA A+ 220-801: BIOS and MotherboardsCompTIA A+ 220-801: Memory, Expansion Cards and Storage DevicesCompTIA A+ 220-801: CPUs, Connections, and Power SuppliesCompTIA A+ 220-801: Configurations, Displays, Connectors, & PeripheralsCompTIA A+ 220-801: Network Cabling, IP Addressing, Ports, and Protocols

Exhibit 1 to Addendum 3

6

DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Solution Area Curriculum Series Course TitleNew Horizons IT - Complete Collection

CompTIA A+ 220-801: Networking TechnologiesCompTIA A+ 220-801: Networking Devices and ToolsCompTIA A+ 220-801: LaptopsCompTIA A+ 220-801: PrintersCompTIA A+ 220-801: Operational Procedures

CompTIA A+ 220-802CompTIA A+ 220-802: Introducing Microsoft WindowsCompTIA A+ 220-802: Installing and Configuring WindowsCompTIA A+ 220-802: Optimizing WindowsCompTIA A+ 220-802: Managing WindowsCompTIA A+ 220-802: Security and Data DisposalCompTIA A+ 220-802: Mobile DevicesCompTIA A+ 220-802: System TroubleshootingCompTIA A+ 220-802: General Troubleshooting

CompTIA Server+CompTIA Server+ 2009

CompTIA Server+ 2009: System HardwareCompTIA Server+ 2009: System SoftwareCompTIA Server+ 2009: Server Functions and Network EssentialsCompTIA Server+ 2009: StorageCompTIA Server+ 2009: IT EnvironmentCompTIA Server+ 2009: Disaster RecoveryCompTIA Server+ 2009: TroubleshootingCompTIA Server+ 2009: Network and Storage Troubleshooting

CompTIA Server+ 2014CompTIA Server+ SK0-004: Server ArchitectureCompTIA Server+ SK0-004: Server Administration ICompTIA Server+ SK0-004: Server Administration IICompTIA Server+ SK0-004: StorageCompTIA Server+ SK0-004: SecurityCompTIA Server+ SK0-004: Networking and Disaster RecoveryCompTIA Server+ SK0-004: Troubleshooting ICompTIA Server+ SK0-004: Troubleshooting II

CompTIA Linux+CompTIA Linux+ 2014 Powered By LPI: LX0-103

CompTIA Linux+ 2014 Powered By LPI: LX0-103: System ArchitectureCompTIA Linux+ 2014 Powered By LPI: LX0-103: Installation and Package ManagementCompTIA Linux+ 2014 Powered By LPI: LX0-103: GNU and Unix CommandsCompTIA Linux+ 2014 Powered By LPI: LX0-103: Advanced GNU and Unix CommandsCompTIA Linux+ 2014 Powered By LPI: LX0-103: Devices and Filesystems

CompTIA Linux+ 2014 Powered By LPI: LX0-104CompTIA Linux+ 2014 Powered By LPI: LX0-104 Scripting and Administrative TasksCompTIA Linux+ 2014 Powered By LPI: LX0-104 Essential System ServicesCompTIA Linux+ 2014 Powered By LPI: LX0-104 Networking FundamentalsCompTIA Linux+ 2014 Powered By LPI: LX0-104 Security, Data, and Accessibility

Microsoft SharePoint Server 2013Microsoft Sharepoint Server 2013: Core Solutions

Microsoft SharePoint Server 2013 - Core Solutions: Information ArchitectureMicrosoft SharePoint Server 2013 - Core Solutions: Logical and Physical DesignMicrosoft SharePoint Server 2013 - Core Solutions: InstallationMicrosoft SharePoint Server 2013 - Core Solutions: Web and Service ApplicationsMicrosoft SharePoint Server 2013 - Core Solutions: AuthenticationMicrosoft SharePoint Server 2013 - Core Solutions: Security and TaxonomyMicrosoft SharePoint Server 2013 - Core Solutions: User Profiles and SearchMicrosoft SharePoint Server 2013 - Core Solutions: Maintenance and Monitoring

Microsoft SharePoint Server 2013 - Developing Core SolutionsMicrosoft SharePoint Server 2013 - Developing Core Solutions: Planning SitesMicrosoft SharePoint Server 2013 - Developing Core Solutions: Implement SecurityMicrosoft SharePoint Server 2013 - Developing Core Solutions: Managing DataMicrosoft SharePoint Server 2013 - Developing Core Solutions: Manage SolutionsMicrosoft SharePoint Server 2013 - Developing Core Solutions: User ExperienceMicrosoft SharePoint Server 2013 - Developing Core Solutions: Business ProcessesMicrosoft SharePoint Server 2013 - Developing Core Solutions: Create Office Apps

Microsoft SharePoint Server 2013: Designing Advanced SolutionsMicrosoft SharePoint Server 2013 - Designing Advanced Solutions: UpgradingMicrosoft SharePoint Server 2013 - Designing Advanced Solutions: ContinuityMicrosoft SharePoint Server 2013 - Designing Advanced Solutions: Search ServicesMicrosoft SharePoint Server 2013 - Designing Advanced Solutions: Content SupportMicrosoft SharePoint Server 2013 - Designing Advanced Solutions: ApplicationsMicrosoft SharePoint Server 2013 - Designing Advanced Solutions: Support ServiceMicrosoft SharePoint Server 2013 - Designing Advanced Solutions: Solutions

Microsoft SharePoint Server 2010Designing and Developing Microsoft SharePoint 2010 Applications

Data Access and Storage in SharePoint 2010Development Models and Methods in SharePoint 2010Presentation Layers and Components in SharePoint 2010AJAX, the SharePoint Ribbon, and Content Type Development in SharePoint 2010Custom Branding and Navigation for SharePoint 2010Application Design and Security in SharePoint 2010Performance Analysis and Debugging in SharePoint 2010Integration and Data Capture Methodologies with SharePoint 2010Information Architecture and Workflow Solutions in SharePoint 2010Regional Settings and Configuration in SharePoint 2010

Microsoft SharePoint 2010: Application DevelopmentCustomizing the SharePoint 2010 User Interface Programmatically

Exhibit 1 to Addendum 3

7

DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Solution Area Curriculum Series Course TitleNew Horizons IT - Complete Collection

Developing SharePoint 2010 Web Parts and ControlsDeveloping Business Logic Using SharePoint 2010 Workflows and ECMProgrammatically Working with Permissions and BCS in SharePoint 2010Working With SharePoint 2010 DataSharePoint Server 2010 Object ModelSharePoint 2010 Features and SolutionsSharePoint 2010 Site BrandingExtending SharePoint 2010 Search and Document NamespacesStabilizing and Deploying SharePoint 2010 Components

Microsoft SharePoint 2010 SP1: AdministrationSharepoint 2010 SP1: Designing the Physical ArchitectureSharePoint 2010 SP1: Logical Design and Sandbox SolutionsSharePoint 2010 SP1: Deployment Topology and AvailabilitySharePoint 2010 SP1: Planning Service Applications and Component StrategySharepoint 2010 SP1: Planning a SharePoint 2010 SP1 UpgradeSharepoint 2010 SP1: Designing SecuritySharePoint 2010 SP1: Maintenance and ProvisioningSharepoint 2010 SP1: Backing Up, Restoring, and MonitoringSharepoint 2010 SP1: Planning for SearchSharePoint 2010 SP1: Content Management, Social Computing, and Collaboration

Microsoft SharePoint Server 2010 SP1: ConfiguringSharepoint 2010 SP1: Installation and ConfigurationSharepoint 2010 SP1: Core ConfigurationSharepoint 2010 SP1: Upgrading to SharePoint 2010 SP1Sharepoint 2010 SP1: Configuring and Administering SearchSharepoint 2010 SP1: Configuring Web ApplicationsSharePoint 2010 SP1: Authentication and Web Application Security ConfigurationSharepoint 2010 SP1: Configuring Site CollectionsSharepoint 2010 SP1: Managing Features and SolutionsSharePoint 2010 SP1: Operational HealthSharePoint 2010 SP1: PerformanceSharePoint Online

Microsoft System Center EssentialsMicrosoft System Center Essentials: installation and Configuration

Installing and Configuring System Center Essentials 2010Managing Computers, Devices, and Updates in System Center Essentials 2010Monitoring and Using Reports in System Center Essentials 2010Virtualization Management in Essentials 2010Backing up, Restoring, and Troubleshooting Essentials 2010

Microsoft Windows 8Microsoft Windows 8.1: Supporting Windows 8.1

Microsoft Windows 8.1 - Supporting Windows 8.1: Installation and ApplicationsMicrosoft Windows 8.1 - Supporting Windows 8.1: Cloud Applications and SettingsMicrosoft Windows 8.1 - Supporting Windows 8.1: Networking and Remote AccessMicrosoft Windows 8.1 - Supporting Windows 8.1: Data Storage and SecurityMicrosoft Windows 8.1 - Supporting Windows 8.1: Hardware and Mobile DevicesMicrosoft Windows 8.1 - Supporting Windows 8.1: Recovery and Endpoint SecurityMicrosoft Windows 8.1 - Supporting Windows 8.1: Intune and Public Cloud ServicesMicrosoft Windows 8.1 - Supporting Windows 8.1: Using MDOP

Microsoft Windows 8.1: ConfigurationMicrosoft Windows 8.1 - Configuring: Installing and Upgrading to Windows 8.1Microsoft Windows 8.1 - Configuring: Hardware and ApplicationsMicrosoft Windows 8.1 - Configuring: Network ConfigurationMicrosoft Windows 8.1 - Configuring: Remote Management and SecurityMicrosoft Windows 8.1 - Configuring: Resource AccessMicrosoft Windows 8.1 - Configuring: Remote Access and Mobile DevicesMicrosoft Windows 8.1 - Configuring: Windows ClientsMicrosoft Windows 8.1 - Configuring: File and System Recovery

Microsoft Windows: Deploying Windows Devices and Enterprise AppsMicrosoft Windows - Deploying Windows Devices and Apps: Assessment StrategiesMicrosoft Windows - Deploying Windows Devices and Enterprise Apps: CompatibilityMicrosoft Windows - Deploying Windows Devices and Enterprise Apps: Images & PXEMicrosoft Windows - Deploying Windows Devices and Enterprise Apps: MDT and LTIMicrosoft Windows - Deploying Windows Devices and Enterprise Apps: ZTI and SCCMMicrosoft Windows - Deploying Windows Devices and Enterprise Apps: Activation

Microsoft Windows: Managing Enterprise Devices and AppsMicrosoft Windows - Managing Enterprise Devices and Apps: Desktops and DevicesMicrosoft Windows - Managing Enterprise Devices and Apps: Preparing SCCMMicrosoft Windows - Managing Enterprise Devices and Apps: Client ManagementMicrosoft Windows - Managing Enterprise Devices and Apps: Inventory and AssetsMicrosoft Windows - Managing Enterprise Devices and Apps: Managing ApplicationsMicrosoft Windows - Managing Enterprise Devices and Apps: Software UpdatesMicrosoft Windows - Managing Enterprise Devices and Apps: ComplianceMicrosoft Windows - Managing Enterprise Devices and Apps: Site Management

Microsoft Windows 7Microsoft Windows 7: First Look for IT Professionals

Microsoft Windows 7: First Look for IT ProfessionalsMicrosoft Windows 7: Configuration

Installing, Upgrading, and Migrating to Windows 7Deploying Windows 7Configuring Hardware and Applications in Windows 7Configuring Network Connectivity in Windows 7Configuring Access to Resources in Windows 7Configuring Mobile Computing in Windows 7Monitoring, Backing Up, and Restoring Windows 7 Systems

Exhibit 1 to Addendum 3

8

DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Solution Area Curriculum Series Course TitleNew Horizons IT - Complete Collection

Microsoft Windows 7: Enterprise Desktop AdministratorPlanning for Windows 7 DeploymentDetermining Application Compatibility for Windows 7Creating a Standard Image to Deploy Windows 7Deploying Windows 7 Using WDS and USMTDeploying Windows 7 Using Lite-Touch InstallationDeploying Windows 7 Using Zero-Touch InstallationDesigning Windows 7 Client ConfigurationTroubleshooting Windows 7 Client ConfigurationDesigning Application and Update Deployments for Windows 7

Microsoft Windows 7: Enterprise Desktop Support TechnicianIdentifying and Resolving Windows 7 Application IssuesManagement and Maintenance of Windows 7 Client SystemsTroubleshooting Logon and Resource Access Issues in Windows 7Resolving Windows 7 Network Connectivity IssuesTroubleshooting IE8 and Encryption Issues in Windows 7Protecting Windows 7 Against Malware and Vulnerabilities

Microsoft Exchange Server 2013Microsoft Exchange Server 2013: Advanced Solutions

Microsoft Exchange Server 2013 - Advanced Solutions: AvailabilityMicrosoft Exchange Server 2013 - Advanced Solutions: Site-resilience SolutionsMicrosoft Exchange Server 2013 - Advanced Solutions: Advanced SecurityMicrosoft Exchange Server 2013 - Advanced Solutions: Compliance and DiscoveryMicrosoft Exchange Server 2013 - Advanced Solutions: Migration and FederationMicrosoft Exchange Server 2013 - Advanced Solutions: TroubleshootingMicrosoft Exchange Server 2013 - Advanced Solutions: Unified Messaging

Microsoft Windows Server 2012Microsoft Windows Server 2012 R2: Installing and Configuring

Microsoft Windows Server 2012 R2 - Installing and Configuring: ServersMicrosoft Windows Server 2012 R2 - Installing and Configuring: StorageMicrosoft Windows Server 2012 R2 - Installing and Configuring: Print ServicesMicrosoft Windows Server 2012 R2 - Installing and Configuring: Hyper - VMicrosoft Windows Server 2012 R2 - Installing and Configuring: NetworkingMicrosoft Windows Server 2012 R2 - Installing and Configuring: DNSMicrosoft Windows Server 2012 R2 - Installing and Configuring: Active DirectoryMicrosoft Windows Server 2012 R2 - Installing and Configuring: AD Groups & GPOsMicrosoft Windows Server 2012 R2 - Installing and Configuring: Security

Microsoft Windows Server 2012 R2: AdministrationMicrosoft Windows Server 2012 R2 - Administration: Deploying and Managing WDSMicrosoft Windows Server 2012 R2 - Administration: Updating and MonitoringMicrosoft Windows Server 2012 R2 - Administration: File Services and EncryptionMicrosoft Windows Server 2012 R2 - Administration: Network Services and AccessMicrosoft Windows Server 2012 R2 - Administration: RADIUS, NPS, and NAPMicrosoft Windows Server 2012 R2 - Administration: Service Accounts and PoliciesMicrosoft Windows Server 2012 R2 - Administration: Managing Active DirectoryMicrosoft Windows Server 2012 R2 - Administration: Group Policy ProcessingMicrosoft Windows Server 2012 R2 - Administration: Managing GPOs and Preferences

Microsoft Windows Server 2012 R2: Configuring Advanced ServicesMicrosoft Windows Server 2012 R2 - Configuring Advanced Services: HAMicrosoft Windows Server 2012 R2 - Configuring Advanced Services: VMs and DRMicrosoft Windows Server 2012 R2 - Configuring Advanced Services: StorageMicrosoft Windows Server 2012 R2 - Configuring Advanced Services: DACMicrosoft Windows Server 2012 R2 - Configuring Advanced Services: DHCP & DNSMicrosoft Windows Server 2012 R2 - Configuring Advanced Services: AD DomainsMicrosoft Windows Server 2012 R2 - Configuring Advanced Services: AD ReplicationMicrosoft Windows Server 2012 R2 - Configuring Advanced Services: PKIMicrosoft Windows Server 2012 R2 - Configuring Advanced Services: Federation

Microsoft Windows Server 2012 R2: Implementing an Advanced InfrastructureMicrosoft Windows Server 2012 R2 - Advanced Infrastructure: UpdatesMicrosoft Windows Server 2012 R2 - Advanced Infrastructure: VM hosts and guestsMicrosoft Windows Server 2012 R2 - Advanced Infrastructure: Storage and NetworksMicrosoft Windows Server 2012 R2 - Advanced Infrastructure: VM AdministrationMicrosoft Windows Server 2012 R2 - Advanced Infrastructure: Clustering and NLBMicrosoft Windows Server 2012 R2 - Advanced Infrastructure: Business ContinuityMicrosoft Windows Server 2012 R2 - Advanced Infrastructure: MonitoringMicrosoft Windows Server 2012 R2 - Advanced Infrastructure: Certificate ServicesMicrosoft Windows Server 2012 R2 - Advanced Infrastructure: AD RMS and AD FS

Microsoft Windows Server 2012 R2: Designing and Implementing an InfrastructureMicrosoft Windows Server 2012 R2: Server Infrastructure - AD DesignMicrosoft Windows Server 2012 R2: Server Infrastructure - AD DSMicrosoft Windows Server 2012 R2: Server Infrastructure - OU and Group PolicyMicrosoft Windows Server 2012 R2: Server Infrastructure – Server DeploymentMicrosoft Windows Server 2012 R2: Server Infrastructure - DHCP DesignMicrosoft Windows Server 2012 R2: Server Infrastructure - DNS, File and StorageMicrosoft Windows Server 2012 R2: Server Infrastructure - IPAM and VPNMicrosoft Windows Server 2012 R2: Server Infrastructure – DirectAccessMicrosoft Windows Server 2012 R2: Server Infrastructure - Network ProtectionMicrosoft Windows Server 2012 R2: Server Infrastructure - Implement NPS and WAP

Microsoft Windows Server 2008Microsoft Windows Server 2008: Configuring Active Directory

The Active Directory Infrastructure in Windows Server 2008Additional Active Directory Server Roles in Windows Server 2008Active Directory Objects in Windows Server 2008Group Policy Objects Strategy in Windows Server 2008Configuring DNS in Windows Server 2008

Exhibit 1 to Addendum 3

9

DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Solution Area Curriculum Series Course TitleNew Horizons IT - Complete Collection

Active Directory Certificate Services in Windows Server 2008Communications and Security in Windows Server 2008Monitoring, Backups, and Recovery in Windows Server 2008

Microsoft Windows Server 2008: Configuring Network InfrastructureConfigure IP Addressing and Windows Services in Windows Server 2008Configure, Manage, and Maintain IP Services in Windows Server 2008Name Resolution in Windows Server 2008DNS Zones and Replication in Windows Server 2008Configure Network Access in Windows Server 2008Network Access Security in Windows Server 2008Configure File and Print Services in Windows Server 2008Monitor Network Infrastructure in Windows Server 2008

Microsoft Windows Server 2008: Configuring Applications InfrastructureDeploying Windows Server 2008 ServersConfiguring Windows Server 2008 AvailabilityConfigure Terminal Services in Windows 2008Terminal Services Resource Access in Windows 2008Configuring Windows Server Hyper-V and Virtual MachinesConfiguring Web Services and Security in Windows Server 2008Managing IIS in Windows Server 2008Configuring Web Service Protocols in Windows Server 2008Configuring Network Application Services in Windows Server 2008

Microsoft Windows Server 2008: Server AdministrationPlanning Windows Server 2008 DeploymentPlanning Active Directory and Group Policy for Windows Server 2008Windows Server 2008 Management and DelegationManaging File Servers and Data Provisioning in Windows Server 2008Windows Server 2008 Application Server Management and Application ProvisioningWindows Server 2008 Application Servers and ServicesPatch Management and Securing and Monitoring Servers in Windows Server 2008Certificate Services, SANs, and High Availability in Windows Server 2008Accessing Windows Networks Remotely in Windows Server 2008Windows Server 2008 Backup and Recovery

Microsoft Windows Server 2008: Enterprise AdministrationPlanning Name Resolution and IP Addressing in Microsoft Windows Server 2008Network Access in Microsoft Windows Server 2008Application Access and Delivery in Microsoft Windows Server 2008Server and Application Virtualization in Microsoft Windows Server 2008Designing the Active Directory Infrastructure in Microsoft Windows Server 2008Active Directory Administration in Microsoft Windows Server 2008Existing Infrastructures and Branch Deployments in Microsoft Windows Server 2008The Certificate Services Infrastructure in Microsoft Windows Server 2008Software Updates and Compliance Management in Microsoft Windows Server 2008Designing Data Security and High Availability in Microsoft Windows Server 2008

Microsoft Windows 2008: Update to R2Active Directory Domain Services in Windows Server 2008 R2Management Improvements in Windows Server 2008 R2Improvements to Role Services in Windows Server 2008 R2Access Control in Windows Server 2008 R2

Microsoft Exchange ServerMicrosoft Exchange Server 2013: Core Solutions

Microsoft Exchange Server 2013 - Core Solutions: DeploymentMicrosoft Exchange Server 2013 - Core Solutions: Mailbox Server ManagementMicrosoft Exchange Server 2013 - Core Solutions: Client Access ServersMicrosoft Exchange Server 2013 - Core Solutions: Configuring Mobile ConnectivityMicrosoft Exchange Server 2013 - Core Solutions: Message TransportMicrosoft Exchange Server 2013 - Core Solutions: Access ControlMicrosoft Exchange Server 2013 - Core Solutions: High Availability and DRMicrosoft Exchange Server 2013 - Core Solutions: Monitoring and Troubleshooting

Microsoft Exchange Server 2010 SP1: ConfiguringExchange Server 2010 SP1: Planning for Exchange ServerExchange Server 2010 SP1: Installation and ConfigurationExchange Server 2010 SP1: Administrative ToolsExchange Server 2010 SP1: Mailbox Server AdministrationExchange Server 2010 SP1: Public Folders and Messaging Records ManagementExchange Server 2010 SP1: Message TransportExchange Server 2010 SP1: Transport Rules, Message Compliance and SecurityExchange Server 2010 SP1: Client AccessExchange Server 2010 SP1: High AvailabilityExchange Server 2010 SP1: Backup and RecoveryExchange Server 2010 SP1: Monitoring Mail Flow and Performance

Microsoft Hyper-VMicrosoft Windows Server 2008 R2: Server Virtualization with Hyper-V

Microsoft Windows Server 2008 R2 Hyper-V: Introduction and Planning OverviewMicrosoft Windows Server 2008 R2 Hyper-V: Installing Hyper-VMicrosoft Windows Server 2008 R2 Hyper-V: Manage & Optimize the Hyper-V ServerMicrosoft Windows Server 2008 R2 Hyper-V: Networking and Remote AdministrationMicrosoft Windows Server 2008 R2 Hyper-V: Migration, Creation, and ManagementMicrosoft Windows Server 2008 R2 Hyper-V: Deploying VMs Using TemplatesMicrosoft Windows Server 2008 R2 Hyper-V: High Availability and RecoverabilityMicrosoft Windows Server 2008 R2 Hyper-V: Implementing Remote Desktop ServicesMicrosoft Windows Server 2008 R2 Hyper-V: Remote Desktop Virtualization RolesMicrosoft Windows Server 2008 R2 Hyper-V: Monitoring and Managing Environments

UNIX EssentialsUnix OS Fundamentals

Exhibit 1 to Addendum 3

10

DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Solution Area Curriculum Series Course TitleNew Horizons IT - Complete Collection

Unix OS Fundamentals: An Introduction to UnixUnix OS Fundamentals: Managing Files and DirectoriesUnix OS Fundamentals: SecurityUnix OS Fundamentals: Network Administration

Linux Professional InstituteLinux Professional Institute: Advanced Level Linux Professional (LPIC-2) Exam 201

Linux User Notification and Device ManagementE-mail and Security in LinuxLinux Kernel Compilation and Linux StartupLinux File Sharing and Filesystem ManagementLinux Network ConfigurationManaging Resource Utilization in Linux

Linux Professional Institute: Advanced Level Linux Professional (LPIC-2) Exam 202Linux Network ServicesLinux System Maintenance and Hardware ConfigurationLinux SecurityLinux System TroubleshootingBooting Linux and Installing Applications from Source

VMwareVMware: Datacenter Virtualization with vSphere 5 - Part 2

VMware vSphere 5 - Part 2: VSphere ClusteringVMware vSphere 5 - Part 2: High Availability and Fault ToleranceVMware vSphere 5 - Part 2: Processor and Resource ManagementVMware vSphere 5 - Part 2: DRS, Resource Pools, and vAppsVMware vSphere 5 - Part 2: Logging and PerformanceVMware vSphere 5 - Part 2: vSphere SecurityVMware vSphere 5 - Part 2: Securing Hosts, Internal Components, Certificate UseVMware vSphere 5 - Part 2: Host Profiles, Update Manager, and Auto DeployVMware vSphere 5 - Part 2: vCenter Server Appliance Deployments and UpgradesVMware vSphere 5 - Part 2: Upgrading Hosts and Virtual Machines

VMware: Datacenter Virtualization Design and Optimization with vSphere 5VMware vSphere 5 – Datacenter Design: Introducing vSphere Design FundamentalsVMware vSphere 5 – Datacenter Design: Creating vSphere Conceptual and Logical DesignsVMware vSphere 5 – Datacenter Design: vSphere Network and Storage DesignVMware vSphere 5 - Datacenter Design VMs, Management, and Implementation

VMware vSphere 6 Install, Configure, Manage: Part 2VMware vSphere 6 Install, Configure, Manage - Part 2: vSphere 6 ClusteringVMware vSphere 6 Install, Configure, Manage - Part 2: vSphere 6 DRSVMware vSphere 6 Install, Configure, Manage - Part 2: vSphere 6 MonitoringVMware vSphere 6 Install, Configure, Manage - Part 2: vSphere 6 DesignVMware vSphere 6 Install, Configure, Manage - Part 2: vSphere 6 UpdatingVMware vSphere 6 Install, Configure, Manage - Part 2: vSphere 6 Upgrading

VMware vSphere 6 Install, Configure, Manage: Part 1VMware vSphere 6 Install, Configure, Manage - Part 1: vSphere 6 OverviewVMware vSphere 6 Install, Configure, Manage - Part 1: vSphere InstallationVMware vSphere 6 Install, Configure, Manage - Part 1: Virtual NetworksVMware vSphere 6 Install, Configure, Manage - Part 1: Storage and VMs

VMware Workstation 11 FundamentalsInstalling and Configuring VMware Workstation 11Creating and Configuring Virtual Machines in VMware Workstation 11Managing Virtual Machine Devices and Resources in VMware Workstation 11VMware Workstation 11 Networking and Remote Connectivity

VMware NSX Network VirtualizationVMware NSX Network Virtualization: Physical Infrastructure RequirementsVMware NSX Network Virtualization: Configuring vSphere NetworkingVMware NSX Network Virtualization: NSX Network Services

VMware OverviewVMware Desktop Virtualization OverviewVMware Data Center Virtualization OverviewVMware Business Mobility SolutionsVMware Cloud Services Solutions

VMware: Datacenter Virtualization with vSphere 5 - Part 1VMware vSphere 5 - Part 1: Introduction to VirtualizationVMware vSphere 5 - Part 1: vCenter Server InstallationVMware vSphere 5 - Part 1: vSphere Client and vCenter Server ConfigurationVMware vSphere 5 - Part 1: ESXi Installation and ConfigurationVMware vSphere 5 – Part 1: vCenter Server InventoryVMware vSphere 5 - Part 1: vCenter Server AdministrationVMware vSphere 5 - Part 1: vCenter Server ManagementVMware vSphere 5 - Part 1: Creating Virtual MachinesVMware vSphere 5 - Part 1: Configuring and Managing Virtual MachinesVMware vSphere 5 - Part 1: An Overview of Virtual Network CreationVMware vSphere 5 - Part 1: Configuring and Managing Virtual NetworksVMware vSphere 5 - Part 1: Introduction to vSphere Storage ConceptsVMware vSphere 5 – Part 1: Storage Configuration and Management

Office 365Managing Identities and Requirements in Office 365

Office 365 ConfigurationOffice 365 DeploymentManaging Office 365 Cloud Identities, Synchronization, and ClientsOffice 365 Federated Identities (Single Sign-On)Monitoring and Troubleshooting Office 365 Usage

Enabling Office 365 ServicesOffice 365 Services: Managing Clients and End-User Devices

Exhibit 1 to Addendum 3

11

DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Solution Area Curriculum Series Course TitleNew Horizons IT - Complete Collection

Office 365 Services: SharePoint Online Site CollectionsOffice 365 Services: Planning for Exchange Online and Lync OnlineOffice 365 Services: Configuring Exchange Online and Lync Online

Windows PowerShellMicrosoft PowerShell and Exchange Server

Microsoft PowerShell and Exchange Server: Getting StartedMicrosoft PowerShell and Exchange Server: Managing MailboxesMicrosoft PowerShell and Exchange Server: Distribution Groups and Databases

Microsoft PowerShell and SharePointMicrosoft PowerShell and SharePoint: Getting StartedMicrosoft PowerShell and SharePoint: Managing Sites

Microsoft PowerShell and SQL ServerMicrosoft PowerShell and SQL Server: IntroductionMicrosoft PowerShell and SQL Server: Database Management

Microsoft PowerShell for WindowsMicrosoft PowerShell for Windows: Getting Started with PowerShellMicrosoft PowerShell for Windows: Aliases, Providers, and ObjectsMicrosoft PowerShell for Windows: Remoting and Modules

Windows Powershell Desired State ConfigurationWindows PowerShell Desired State Configuration Fundamentals

Advanced PowerShell Desired State ConfigurationAdvanced PowerShell Desired State Configuration: Writing Custom ResourcesAdvanced PowerShell Desired State Configuration: Advanced Configuration

Microsoft Lync Server 2013Microsoft Lync Server 2013

Microsoft Lync Server 2013: Administration and Data Resiliency OverviewMicrosoft Lync Server 2013: Configuration and Maintenance

Microsoft Windows 10Microsoft Windows 10: Exploring the Technical Preview

First Encounters with Windows 10Microsoft Windows 10 End User First Look

Microsoft Windows 10 First Look: Interface and New FeaturesMicrosoft Windows 10 First Look: Configuration

Microsoft Windows 10: Configuring Windows DevicesIntroduction to Windows 10Deploy Windows 10 with New and Traditional ToolsConfigure Devices and Disks in Windows 10Configure Networking and Remote Connections in Windows 10Maintain Windows 10 and Configure Virtualization Technologies in Windows 10Configure Authentication and Secure Identities for Windows 10Threat Resistance Technologies in Windows 10Data Protection in Windows 10Install and Manage Windows 10 Applications and Universal Windows AppsManage Windows 10 Devices

Microsoft Internet Information Services 8.5Microsoft Internet Information Services

Installing and Configuring a Microsoft IIS Server ServiceDevOps

Working with ChefWorking with Chef: Fundamentals

DevOps FundamentalsDevOps Fundamentals: Tools, Technologies, and Infrastructures

Using DockerUsing Docker: Benefits and InstallationUsing Docker: Dockerizing ApplicationsUsing Docker: Customizing and Clustering

Using PuppetUsing Puppet: Implementation and BenefitsUsing Puppet: Configuration and Programming

Using VagrantUsing Vagrant: IntroductionUsing Vagrant: Configuration

Red Hat LinuxRed Hat Certified System Administrator RHEL 7

Red Hat Certified System Administrator: The EnvironmentRed Hat Certified System Administrator: The Command LineRed Hat Certified System Administrator: Administration and PermissionsRed Hat Certified System Administrator: Scripting and SchedulingRed Hat Certified System Administrator: Processes, Networking, and LoggingRed Hat Certified System Administrator: Advanced NetworkingRed Hat Certified System Administrator: Remote Connections and AccessRed Hat Certified System Administrator: File Systems and Device ManagementRed Hat Certified System Administrator: Boot Process and InstallationRed Hat Certified System Administrator: Introduction to VirtualizationRed Hat Certified System Administrator: SELinux and Troubleshooting

Microsoft Mobility and Device FundamentalsWindows Devices and Mobility Fundamentals

Device Configuration and Data AccessData Management and Device SecurityCloud Services and Enterprise Mobility

UbuntuGetting Started with Ubuntu

Introduction to UbuntuEssential Tools for Ubuntu

Software Development

Exhibit 1 to Addendum 3

12

DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Solution Area Curriculum Series Course TitleNew Horizons IT - Complete Collection

Working with JenkinsWorking with Jenkins: Fundamentals

Windows Server 2016Microsoft Windows Server 2016 (First Look)

Microsoft Windows Server 2016 (First Look): Active Directory and NetworkingMicrosoft Windows Nano Server First Look

Microsoft Windows Nano Server: Nano Server First LookMentoring Assets

Mentoring AssetsMentoring 70-640 TS: Windows Server 2008 Active Directory, ConfiguringMentoring 70-642 TS: Windows Server 2008 Network Infrastructure, ConfiguringMentoring 70-646 PRO: Windows Server 2008, Server AdministratorMentoring 70-647 Pro: Windows Server 2008, Enterprise AdministratorMentoring 70-680 TS: Windows 7, ConfiguringMentoring 70-686 PRO: Windows 7, Enterprise Desktop AdministratorMentoring SK0-003 Server+Mentoring 70-685 PRO: Windows 7, Enterprise Desktop Support TechnicianMentoring 70-668 PRO: Microsoft SharePoint 2010, AdministratorMentoring 70-667 TS: Microsoft SharePoint 2010, ConfiguringMentoring LX0-101 Linux+ Powered by LPI Exam 1Mentoring LX0-102 Linux+ Powered by LPI Exam 2Mentoring 70-662 TS: Microsoft Exchange Server 2010, ConfiguringMentoring VMware: Datacenter Virtualization with vSphere 5 - Part 2Mentoring 220-801 CompTIA A+Mentoring 220-802 CompTIA A+Mentoring 70-687 Configuring Windows 8.1Mentoring 70-410 Installing and Configuring Windows Server 2012Mentoring 70-461 Querying Microsoft SQL Server 2012Mentoring 70-411 Administering Windows Server 2012Mentoring 70-412 Configuring Advanced Windows Server 2012 ServicesMentoring 70-688Mentoring 70-341 Core Solutions of Microsoft Exchange Server 2013Mentoring 70-331 Core Solutions of Microsoft SharePoint Server 2013Mentoring 70-332 Advanced Solutions of Microsoft SharePoint Server 2013Mentoring 70-342 Advanced Solutions of Microsoft Exchange Server 2013Mentoring 70-346 Managing Office 365 Identities and RequirementsMentoring N10-006 CompTIA Network+Mentoring 70-347 Enabling Office 365 ServicesMentoring LX0-104 CompTIA Linux+ Powered by LPI Exam 2Mentoring 70-695 Deploying Windows Devices and Enterprise AppsMentoring 70-696 Managing Enterprise Devices and AppsMentoring 98-368 Mobility and Device FundamentalsMentoring 220-902 CompTIA A+Mentoring 220-901 CompTIA A+Mentoring 70-697 Configuring Windows DevicesMentoring VMware Certified Professional 5, Data Center Virtualization (VCP5-DCV)

Test PrepsTest Preps

TestPrep 70-640 TS: Windows Server 2008 Active Directory, ConfiguringTestPrep 70-642 TS: Windows Server 2008 Network Infrastructure, ConfiguringTestPrep 70-680 TS: Windows 7, ConfiguringTestPrep SK0-003 Server+TestPrep 70-686 PRO: Windows 7, Enterprise Desktop AdministratorTestPrep 70-685 PRO: Windows 7, Enterprise Desktop Support TechnicianTestPrep 70-647 PRO: Windows Server 2008, Enterprise AdministratorTestPrep 70-646 PRO: Windows Server 2008, Server AdministratorTestPrep 70-667 TS: Microsoft SharePoint 2010, ConfiguringTestPrep 70-668 PRO: Microsoft SharePoint 2010, AdministratorTestPrep LX0-101 Linux+ Powered by LPI Exam 1TestPrep LX0-102 Linux+ Powered by LPI Exam 2TestPrep 70-662 TS: Microsoft Exchange Server 2010, ConfiguringTestPrep 220-801 CompTIA A+TestPrep 220-802 CompTIA A+TestPrep 70-688 Supporting Windows 8.1TestPrep 70-411 Administering Windows Server 2012TestPrep 70-410 Installing and Configuring Windows Server 2012TestPrep 70-412 Configuring Advanced Windows Server 2012 ServicesTestPrep 70-687 Configuring Windows 8.1TestPrep 70-341 Core Solutions of Microsoft Exchange Server 2013TestPrep 70-331 Core Solutions of Microsoft SharePoint Server 2013TestPrep 70-414 Implementing an Advanced Server InfrastructureTestPrep 70-332 Advanced Solutions of Microsoft SharePoint Server 2013TestPrep 70-346 Managing Office 365 Identities and RequirementsTestPrep 70-342 Advanced Solutions of Microsoft Exchange Server 2013TestPrep 70-347 Enabling Office 365 ServicesTestPrep SK0-004 CompTIA Server+TestPrep LX0-103 CompTIA Linux+ Powered by LPI Exam 1TestPrep LX0-104 CompTIA Linux+ Powered by LPI Exam 2TestPrep 70-696 Managing Enterprise Devices and AppsTestPrep 70-695 Deploying Windows Devices and Enterprise AppsTestPrep 98-368 Mobility and Device FundamentalsTestPrep 220-901 CompTIA A+TestPrep 220-902 CompTIA A+TestPrep 70-697 Configuring Windows Devices

INTERNET AND NETWORK TECHNOLOGIES

Exhibit 1 to Addendum 3

13

DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Solution Area Curriculum Series Course TitleNew Horizons IT - Complete Collection

Social NetworkingYammer for Business Users

Yammer for Business Users: Using YammerGetting the Most from Social Networking

Social Networking FundamentalsSocial Networking Services, Strategy, and Management

CompTIA Networking, Internetworking, and Security TechnologiesCompTIA Security+ SY0-401

CompTIA Security+ SY0-401: Control Fundamentals and Security ThreatsCompTIA Security+ SY0-401: Network Protocols, Attacks, and DefensesCompTIA Security+ SY0-401: Creating Secure NetworksCompTIA Security+ SY0-401: Vulnerability Assessment and Penetration TestingCompTIA Security+ SY0-401: Authentication, Biometrics, and Security ControlsCompTIA Security+ SY0-401: Securing a Networked EnvironmentCompTIA Security+ SY0-401: Remote Access, Mobile, and Wireless SecurityCompTIA Security+ SY0-401: Cryptographic Methods and Public Key InfrastructuresCompTIA Security+ SY0-401: Securing Applications, Virtualization, and the CloudCompTIA Security+ SY0-401: Continuity, Disaster Recovery, and Computer Forensics

CompTIA Network+ N10-006CompTIA Network+ N10-006: Network Architecture Part 1CompTIA Network+ N10-006: Network Architecture Part 2CompTIA Network+ N10-006: Network Operations Part 1CompTIA Network+ N10-006: Network Operations Part 2CompTIA Network+ N10-006: Network SecurityCompTIA Network+ N10-006: Troubleshooting Part 1CompTIA Network+ N10-006: Troubleshooting Part 2CompTIA Network+ N10-006: Industry Standards, Practices, and Network Theory

CompTIA Mobility+ MB0-001CompTIA Mobility+ MB0-001: Over The Air TechnologiesCompTIA Mobility+ MB0-001: Network InfrastructureCompTIA Mobility+ MB0-001: Mobile Device Management 1CompTIA Mobility+ MB0-001: Mobile Device Management 2CompTIA Mobility+ MB0-001: SecurityCompTIA Mobility+ MB0-001: Troubleshooting 1CompTIA Mobility+ MB0-001: Troubleshooting 2

WirelessInternet of Things Introduction

Internet of Things ApplicationsInternet of Things Hardware

Networking and Telecommunications FundamentalsNetworking Fundamentals

Networking Fundamentals: Configuring Wired and Wireless Networks and FirewallsNetworking Fundamentals: Remote Connections, Shares, and Mac OSX Networking

Security SolutionsCertified Internet Security Auditor (CISA)

CISA Domain: The Process of Auditing Information Systems - Part 1CISA Domain: The Process of Auditing Information Systems - Part 2CISA Domain: Governance and Management of IT - Part 1CISA Domain: Governance and Management of IT - Part 2CISA Domain: IS Acquisition, Development, and Implementation - Part 1CISA Domain: IS Acquisition, Development and Implementation - Part 2CISA Domain: IS Operations, Maintenance and Support - Part 1CISA Domain: IS Operations, Maintenance, and Support - Part 2CISA Domain: Protection of Information Assets - Part 1CISA Domain: Protection of Information Assets - Part 2CISA Domain: IS Acquisition, Development and Implementation - Part 3

Certified Ethical Hacker (CEH)Certified Ethical Hacker (CEH): Hacking and Penetration TestingCertified Ethical Hacker (CEH): Footprinting and ReconnaissanceCertified Ethical Hacker (CEH): Network ScanningCertified Ethical Hacker (CEH): Enumeration and CryptographyCertified Ethical Hacker (CEH): System HackingCertified Ethical Hacker (CEH): MalwareCertified Ethical Hacker (CEH): SniffingCertified Ethical Hacker (CEH): Social EngineeringCertified Ethical Hacker (CEH): Denial of Service and Session HijackingCertified Ethical Hacker (CEH): Hacking Web ServersCertified Ethical Hacker (CEH): Hacking Web ApplicationsCertified Ethical Hacker (CEH): SQL InjectionCertified Ethical Hacker (CEH): Hacking Wireless NetworksCertified Ethical Hacker (CEH): Hacking Mobile PlatformsCertified Ethical Hacker (CEH): Evading IDS, Firewalls, and HoneypotsCertified Ethical Hacker (CEH): Buffer Overflow

Certified Information Security Manager (CISM)CISM: Information Security Governance (Part 1)CISM: Information Security Governance (Part 2)CISM: Information Security Governance (Part 3)CISM: Information Risk Management and Compliance (Part 1)CISM: Information Risk Management and Compliance (Part 2)CISM: Information Security Program Development and Management (Part 1)CISM: Information Security Program Development and Management (Part 2)CISM: Information Security Program Development and Management (Part 3)CISM: Information Security Program Development and Management (Part 4)CISM: Information Security Program Development and Management (Part 5)CISM: Information Security Incident Management (Part 1)

Exhibit 1 to Addendum 3

14

DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Solution Area Curriculum Series Course TitleNew Horizons IT - Complete Collection

CISM: Information Security Incident Management (Part 2)CompTIA Advanced Security Practitioner CAS-002

CompTIA CASP CAS-002: Cryptography and Enterprise Storage ConcernsCompTIA CASP CAS-002: Advanced Network Design, Management, and ControlsCompTIA CASP CAS-002: Security Controls for HostsCompTIA CASP CAS-002: Application Vulnerabilities and Security ControlsCompTIA CASP CAS-002: Industry Influences, Risk Planning, Strategy, and ControlCompTIA CASP CAS-002: Privacy Policies & Procedures and Incident RecoveryCompTIA CASP CAS-002: Research, Analysis and AssessmentCompTIA CASP CAS-002: Integration of Computing, Communications, and DisciplinesCompTIA CASP CAS-002: Technical Integration of Enterprise Components

Microsoft Security FundamentalsMicrosoft Security Fundamentals: Security LayersMicrosoft Security Fundamentals: Operating System SecurityMicrosoft Security Fundamentals: Network SecurityMicrosoft Security Fundamentals: Security Software

Certified Secure Software Lifecycle Professional (CSSLP)CSSLP: Secure Software ConceptsCSSLP: Secure Software RequirementsCSSLP: Secure Software DesignCSSLP: Secure Software Implementation and CodingCSSLP: Secure Software TestingCSSLP: Software Acceptance, Deployment, Operations, Maintenance, and DisposalCSSLP: Supply Chain and Software Acquisition

OWASP Top 10Introduction to OWASP and the Top 10OWASP Mitigations for .NET

Foundations of Android SecurityAndroid Architecture, Protection, and Development Best PracticesAndroid Security Vulnerabilities, Testing, and Enterprise Considerations

Foundations of iOS SecurityiOS Security Architecture and Application Data ProtectionSecuring Against Threats, Securing for Enterprise, and Jailbreaking Devices

Cryptography FundamentalsCryptography Fundamentals: Defining CryptographyCryptography Fundamentals: Applying Cryptography

Systems Security Certified PractitionerSystems Security Certified Practitioner: Access ControlsSystems Security Certified Practitioner: Security OperationsSystems Security Certified Practitioner: Security AdministrationSystems Security Certified Practitioner: Risk ManagementSystems Security Certified Practitioner: Incident Response and Recovery

Securing User AccountsSecuring User Accounts: Fundamental Security ConceptsSecuring User Accounts: Logon, Logoff, Account Changes, and Attack MitigationSecuring User Accounts: Authorization, Registration, and Passwords

What's New in CISSP 2015Changes to CISSP 2015

CiscoIINS 2.0: Implementing Cisco IOS Network Security

Cisco IINS 2.0: Introducing Networking Security FundamentalsCisco IINS 2.0: Security Policies and StrategiesCisco IINS 2.0: Cisco Network Foundation ProtectionCisco IINS 2.0: Securing the Management Plane and AAA ConfigurationCisco IINS 2.0: Securing the Data Plane on Cisco SwitchesCisco IINS 2.0: Securing the Data Plane in IPv6 EnvironmentsCisco IINS 2.0: Threat Control, Mitigation, and FirewallsCisco IINS 2.0: Implementing Firewall PoliciesCisco IINS 2.0: Implementing IPSCisco IINS 2.0: VPN Technologies and Public Key InfrastructureCisco IINS 2.0: IPsec Fundamentals and VPNs

DESGN 2.1: Designing for Cisco Internetwork SolutionsCisco DESGN 2.1: Network Design Methodology OverviewCisco DESGN 2.1: Structuring and Modularizing the NetworkCisco DESGN 2.1: Designing Basic Campus and Data Center NetworksCisco DESGN 2.1: Identifying WAN Technology ConsiderationsCisco DESGN 2.1: Designing the Enterprise WAN and BranchCisco DESGN 2.1: Designing IP AddressingCisco DESGN 2.1: Selecting Routing ProtocolsCisco DESGN 2.1: Defining Network SecurityCisco DESGN 2.1: Security Solutions for the NetworkCisco DESGN 2.1: Integrating Voice and Video ArchitecturesCisco DESGN 2.1: Voice and Video Technology RequirementsCisco DESGN 2.1: Design Considerations for Basic Wireless Networking

ICND1 2.0: Interconnecting Cisco Networking Devices Part 1ICND1 2.0: Networking, Communications, and LANsICND1 2.0: Operating Cisco IOS SoftwareICND1 2.0: Switch OperationsICND1 2.0: Ethernet OperationsICND1 2.0: Understanding IPv4 AddressesICND1 2.0: Address Blocks and VLSMICND1 2.0: The Transport Layer and Router ConfigurationICND1 2.0: Packet Delivery and Static RoutingICND1 2.0: Access Control Lists and Network Address TranslationICND1 2.0: Managing Network Device Security

Exhibit 1 to Addendum 3

15

DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Solution Area Curriculum Series Course TitleNew Horizons IT - Complete Collection

ICND1 2.0: VLANs and DHCPICND1 2.0: WANs and Dynamic Routing ProtocolsICND1 2.0: IPv6

ICND2 2.0: Interconnecting Cisco Networking Devices Part 2ICND2 2.0: VLANs and Spanning-TreeICND2 2.0: EtherChannel and Layer 3 RedundancyICND2 2.0: Troubleshooting Basic ConnectivityICND2 2.0: Implementing an EIGRP Based SolutionICND2 2.0: An Overview of OSPFICND2 2.0: Implementing a Scalable, Multiarea Network, OSPF Based SolutionICND2 2.0: Wan Technology Overview and Serial ConnectionsICND2 2.0: Establishing a WAN Connection Using Frame RelayICND2 2.0: VPN Solutions and GRE TunnelsICND2 2.0: Network Device Management

Cisco SENSS 1.0SENSS 1.0: Secure Design PrinciplesSENSS 1.0: Deploying Cisco IOS Control and Management Plane Security ControlsSENSS 1.0: Deploying Cisco Traffic Telemetry MethodsSENSS 1.0: Deploying Cisco IOS Layer 2 and Layer 3 Data Plane Security ControlsSENSS 1.0: NAT Deployment on Cisco IOS Software and Cisco ASASENSS 1.0: Firewall Threat Controls and Basic Cisco ASA Policy ConfigurationSENSS 1.0: Deploying Advanced Cisco ASA Access PoliciesSENSS 1.0: Deploying Reputation and Identity-Based Cisco ASA Access PoliciesSENSS 1.0: Threat Controls Deployment on Cisco IOS Software

ROUTE 2.0: Implementing Cisco IP RoutingCisco ROUTE 2.0: Basic Network and Routing ConceptsCisco ROUTE 2.0: Understanding the RIP and EIGRP Routing ProtocolsCisco ROUTE 2.0: EIGRP Topology Table and Optimizing EIGRP BehaviorCisco ROUTE 2.0: Configuring EIGRP for IPv6 and Named EIGRPCisco ROUTE 2.0: Establishing OSPF Neighbor RelationshipsCisco ROUTE 2.0: Link-State Database and Optimizing OSPF BehaviorCisco ROUTE 2.0: Configuring OSPFv3Cisco ROUTE 2.0: Configuring Routing Protocol RedistributionCisco ROUTE 2.0: Redistribution Using Distribute and Prefix ListsCisco ROUTE 2.0: Path Control ImplementationCisco ROUTE 2.0: Enterprise Internet Connectivity ICisco ROUTE 2.0: Implementing Basic BGP OperationsCisco ROUTE 2.0: BGP Path Manipulation, Control, and BGP in the IPv6 EnvironmentCisco ROUTE 2.0: Routers and Routing Protocol HardeningCisco ROUTE 2.0: Redistribution Using Route Maps and TagsCisco ROUTE 2.0: Enterprise Internet Connectivity IICisco ROUTE 2.0: Optimizing and Tuning OSPFCisco ROUTE 2.0: Network Principles and Layer 2 TechnologiesCisco ROUTE 2.0: Layer 3 TechnologiesCisco ROUTE 2.0: VPN TechnologiesCisco ROUTE 2.0: Securing AccessCisco ROUTE 2.0: Infrastructure Services

SWITCH 2.0: Implementing Cisco IP Switched NetworksCisco SWITCH 2.0: Basic Concepts and Network DesignCisco SWITCH 2.0: Campus Network Architecture ICisco SWITCH 2.0: Campus Network Architecture IICisco SWITCH 2.0: Spanning Tree ImplementationCisco SWITCH 2.0: Spanning Tree Implementation IICisco SWITCH 2.0: Inter-VLAN RoutingCisco SWITCH 2.0: High-Availability NetworksCisco SWITCH 2.0: Layer 3 Redundancy with HSRPCisco SWITCH 2.0: Campus Network Security ICisco SWITCH 2.0: Campus Network Security IICisco SWITCH 2.0: STP Tuning and PVST and RSTP ImplementationCisco SWITCH 2.0: Configuring Layer 3 Redundancy with VRRP and GLBPCisco SWITCH 2.0: Campus Network Security III

TSHOOT 2.0: Troubleshooting and Maintaining Cisco IP NetworksCisco TSHOOT 2.0: Tools and Methodologies of TroubleshootingCisco TSHOOT 2.0: Troubleshooting IPv4 and IPv6 Addressing and RoutingCisco TSHOOT 2.0: Troubleshooting OSPFCisco TSHOOT 2.0: Troubleshooting EIGRP and BGPCisco TSHOOT 2.0: Troubleshooting RIPv2Cisco TSHOOT 2.0: Troubleshooting RIPngCisco TSHOOT 2.0: Troubleshooting RedistributionCisco TSHOOT 2.0: Troubleshooting Layer 2 Switching and Inter-VLAN RoutingCisco TSHOOT 2.0: Troubleshooting FHRPCisco TSHOOT 2.0: Troubleshooting Security IssuesCisco TSHOOT 2.0: Troubleshooting Router Features

Cisco SITCS 1.0: Implementing Cisco Threat Control SolutionsCisco SITCS 1.0: Cisco ASA (CX) NGFW Services ICisco SITCS 1.0: Cisco ASA (CX) NGFW Services IICisco SITCS 1.0: Cisco Web Security ApplianceCisco SITCS 1.0: Configuring Cisco Web Security ApplianceCisco SITCS 1.0: Cisco Cloud Web SecurityCisco SITCS 1.0: Cisco Email Security ApplianceCisco SITCS 1.0: Cisco Intrusion Prevention Systems ICisco SITCS 1.0: Cisco Intrusion Prevention Systems IICisco SITCS 1.0: Configuring Cisco Email Security

Implementing Cisco Secure Access Solutions (SISAS) 1.0Cisco SISAS 1.0: Identity Services Overview and 802.1X

Exhibit 1 to Addendum 3

16

DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Solution Area Curriculum Series Course TitleNew Horizons IT - Complete Collection

Cisco SISAS 1.0: EAP and Logging into Cisco Identity Services Engine (ISE)Cisco SISAS 1.0: Cisco ISE TechnologiesCisco SISAS 1.0: Certificate-based Authentication and AuthorizationCisco SISAS 1.0: Cisco TrustSec, MACsec, and WebAuth AccessCisco SISAS 1.0: Endpoint Access Control Enhancements and Troubleshooting

CICD 1.0: Implementing Cisco Collaboration DevicesCICD 1.0: Cisco Unified Communications SolutionsCICD 1.0: Characteristics of Cisco Unified Communications SolutionsCICD 1.0: Cisco Unified Communications Manager Administrator InterfacesCICD 1.0: Cisco UCM End-user Interfaces and Call Flows and Call LegsCICD 1.0: Component Impact on Call Flows in Unified Communications ManagerCICD 1.0: Cisco UCM and Cisco UCM Express End-usersCICD 1.0: Cisco UCM and Cisco UCM Express EndpointsCICD 1.0: Cisco UCM and Cisco UCM Express Endpoint Implementation OptionsCICD 1.0: Understanding Telephony FeaturesCICD 1.0: Telephony Feature Implementation and Mobility OptionsCICD 1.0: Unity Connection and End User and Mailbox RequirementsCICD 1.0: Unity Connection End User Implementation and IM and Presence ServiceCICD 1.0: Supporting End Users and Understanding Cisco UCM ReportsCICD 1.0: Cisco UCM Call Detail Records and Reporting and Monitoring Tools

DCICN 1.0: Introducing Cisco Data Center NetworkingDCICN 1.0 - Ethernet NetworksDCICN 1.0 - Simple NetworksDCICN 1.0 - Switched NetworksDCICN 1.0 - VLANs and TrunksDCICN 1.0 - Redundant Switched TopologyDCICN 1.0 - IPv4 and the Routing ProcessDCICN 1.0 - IPv6 and Packet DeliveryDCICN 1.0 - Routing and ACLs on Cisco Nexus Switches

SIMOS 1.0: Implementing Cisco Secure Mobility SolutionsSIMOS 1.0: Fundamentals of VPN Technologies and CryptographySIMOS 1.0: Deploying Secure Site-to-Site Connectivity Solutions (Part 1)SIMOS 1.0: Deploying Secure Site-to-Site Connectivity Solutions (Part 2)SIMOS 1.0: Deploying Cisco IOS Site-to-Site FlexVPN SolutionsSIMOS 1.0: Deploying Clientless SSL VPNsSIMOS 1.0: Deploying Cisco AnyConnect VPNsSIMOS 1.0: Clientless SSL VPNs, Endpoint Security, and Dynamic Access Policies

Certified Information Systems Security Professional (CISSP)CISSP: Security Principles, Governance, and GuidelinesCISSP: Risk ManagementCISSP: Asset SecurityCISSP: Security Engineering Part 1CISSP: Security Engineering Part 2CISSP: Communication & Network Security DesignCISSP: Identity and Access ManagementCISSP: Security Assessment and TestingCISSP: Security Operations Part 1CISSP: Security Operations Part 2CISSP: Security Operations Part 3CISSP: Software Development Security

DCICT 1.0: Introducing Cisco Data Center TechnologiesCisco DCICT 1.0 - Cisco Data Center Layers and the Nexus 7000 Series SwitchCisco DCICT 1.0 - Reviewing the Cisco Nexus 5000, 2000, and MDS Product FamiliesCisco DCICT 1.0 - Monitoring the Cisco Nexus 7000 and 5000 Series SwitchesCisco DCICT 1.0 - Describing vPCs, Cisco FabricPath, and OTV in the DataCenterCisco DCICT 1.0 - Virtualizing Network Devices and FEX OperationsCisco DCICT 1.0 - Virtualizing Storage and ServersCisco DCICT 1.0 - Using the Cisco Nexus 1000V Series SwitchCisco DCICT 1.0 - Comparing Storage Connectivity Options in the Data CenterCisco DCICT 1.0 - Fibre Channel Storage and Cisco MDS 9000 Series ConfigurationCisco DCICT 1.0 - Cisco Data Center Unified FabricCisco DCICT 1.0 - The Cisco UCS Series Product FamilyCisco DCICT 1.0 - RAID Options and B-Series Blades and Cluster OptionsCisco DCICT 1.0 - UCS Management Operations

Implementing Cisco Video Network Devices, Part 2CIVND2 1.0: Cisco Business Video CollaborationCIVND2 1.0: Cisco Business Video SolutionsCIVND2 1.0: Installation and Configuration of Cisco IP Phones and Cisco JabberCIVND2 1.0: Troubleshooting Cisco IP Phone, Cisco Jabber and Endpoint IssuesCIVND2 1.0: Describing Cisco TelePresence and EndpointsCIVND2 1.0: Configuring Cisco TelePresence TCCIVND2 1.0: Troubleshooting Cisco TelePresence EndpointsCIVND2 1.0: Configuring and Monitoring Cisco Conferencing and DMPs

Implementing Cisco IP Telephony and Video, Part 1Introduction to Cisco Unified Communications ManagerIntroduction to Single-site On-cluster CallingCall Routing ImplementationPath Selection, Dial-Peers and H.323 and SIP GatewaysCisco Unified Border Element and Media ResourcesCisco Audio and Video Conferencing using TelePresenceOverview of QoS in a Packet Switched Network

Cisco Service Provider Next-Gen Networks Part 1Networking FunctionsProtocol Suites and the Internet Layer of IPManaging IPv4 and IPv6 Addressing

Exhibit 1 to Addendum 3

17

DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Solution Area Curriculum Series Course TitleNew Horizons IT - Complete Collection

The TCP/IP Transport Layer and Internet Security ThreatsIPv4 Subnetting and VLSMEthernet FundamentalsSwitching FundamentalsOperating and Securing a Cisco SwitchSwitching Infrastructure ConnectivitySwitch Troubleshooting and Routing FundamentalsIOS XR Routers and Distance Vector RoutingEIGRP Configuration and Router SecurityWAN ConnectivityService Provider Edge TechnologiesIP Addressing Solutions with NAT and DHCPPPP and SONET in the WANVPN TechnologiesCisco Device ManagementMonitoring Network Traffic, Behavior and Administration

Implementing Cisco Video NetworkVideo Conferencing and Streaming FundamentalsVideo Compression TechnologiesVideo Conferencing and ProtocolVideo EndpointsCisco TelePresence Endpoint Environmental Requirements and Configuration

Implementing Cisco IP Telephony & Video, Part 2CUCM v10 Video and Dynamic Routing Using ILS and GDPRCisco Unified Communications Manager v10 Multisite Deployment SolutionsCisco Unified Communications Manager v10 Globalized Call Routing and PSTN BackupCisco Unified Communications Manager v10 URI Dialing, MGCP Fallback, and SRSTCUCM v10 Bandwidth Management Tools and MOH Solutions

Designing for Cisco Internetwork SolutionsDesigning Wide Area NetworksBranch Office and Datacenter DesignCampus Network Design FundamentalsNetwork Design MethodologiesBuilding a Modular Network DesignDesigning a Highly Available Campus NetworkDesigning a Secure Network and Edge ConnectivityDesigning Routed Networks with EIGRP and OSPFDesigning Routed Networks with IS-IS and BGPSupporting QoS and Wireless in a Network DesignDesigning a Network for Collaboration and Introducing IP AddressingDesigning IPv4 and IPv6 Addressing PlansManaging IP Addresses and Introducing SDN

Network Management and SecuritySoftware Defined Networking Essentials

Software Defined Networking FundamentalsJuniper Networks Junos Essentials

Juniper Networks Junos Essentials: Networking FundamentalsJuniper Networks Junos Essentials: Junos OS FundamentalsJuniper Networks Junos Essentials: Configuration BasicsJuniper Networks Junos Essentials: Monitoring and MaintenanceJuniper Networks Junos Essentials: Routing FundamentalsJuniper Networks Junos Essentials: Routing Policy & Firewall Filters

EMCEMC Information Storage and Management (ISM) v2

EMC ISM v2: Data Center EnvironmentEMC ISM v2: RAID and Intelligent Storage SystemsEMC ISM v2: FC SAN, IP SAN, and FCoEEMC ISM v2: NAS, Object-based Storage, and Unified StorageEMC ISM v2: Business Continuity, Backup, Replication, and ArchivingEMC ISM v2: Remote Replication and Cloud ComputingEMC ISM v2: Securing the Storage InfrastructureEMC ISM v2: Managing the Storage Infrastructure

Cloud ComputingMicrosoft System Center 2012 R2: Monitoring and Operating a Private Cloud

Microsoft System Center 2012 R2 – Monitor and Operate: Monitoring Cloud ServicesMicrosoft System Center 2012 R2 – Monitor and Operate: Private Cloud OverviewMicrosoft System Center 2012 R2 – Monitor and Operate: Deploying Cloud ServicesMicrosoft System Center 2012 R2 – Monitor and Operate: Service ManagementMicrosoft System Center 2012 R2 – Monitor and Operate: Problem ManagementMicrosoft System Center 2012 R2 – Monitor and Operate: Backup and RecoveryMicrosoft System Center 2012 R2 – Monitor and Operate: ComplianceMicrosoft System Center 2012 R2 – Monitor and Operate: SLAs Widgets & Dashboards

CompTIA Cloud+CompTIA Cloud+ CV0-001: Cloud FundamentalsCompTIA Cloud+ CV0-001: VirtualizationCompTIA Cloud+ CV0-001: Data Center InfrastructureCompTIA Cloud+ CV0-001: Cloud ManagementCompTIA Cloud+ CV0-001: Cloud SecurityCompTIA Cloud+ CV0-001: Managing Cloud Systems

Microsoft System Center 2012 R2: Configuring and Deploying a Private CloudMicrosoft System Center 2012 R2 – Configure and Deploy: VMM OverviewMicrosoft System Center 2012 R2 – Configure and Deploy: Extending & MaintainingMicrosoft System Center 2012 R2 – Configure and Deploy: Application DeliveryMicrosoft System Center 2012 R2 – Configure and Deploy: Building Private CloudsMicrosoft System Center 2012 R2 – Configure and Deploy: Monitoring

Exhibit 1 to Addendum 3

18

DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Solution Area Curriculum Series Course TitleNew Horizons IT - Complete Collection

Microsoft System Center 2012 R2 – Configure and Deploy: Service ManagementMicrosoft System Center 2012 R2 – Configure and Deploy: DPMMicrosoft System Center 2012 R2 – Configure and Deploy: Automation

Managing Citrix XenDesktop 7 SolutionsAdministrating XenDesktop 7.5 and Hypervisor ManagementManaging XenDesktop 7.5 Desktops and ApplicationsConfiguring Citrix XenDesktop 7.6 ComponentsManaging a Citrix XenDesktop 7.6 Environment

OpenStack FundamentalsImplementing OpenStackConfiguring OpenStack

Virtualizing Enterprise Desktops and AppsVirtualizing Enterprise Desktops and Apps: Plan App Virtualization and Use MAPVirtualizing Enterprise Desktops and Apps: App-V Clients and App SequencingVirtualizing Enterprise Desktops and Apps: VM-based and Session-based RDSVirtualizing Enterprise Desktops and Apps: RemoteAppsVirtualizing Enterprise Desktops and Apps: Plan for Resilient Virtualized Apps

Certified Cloud Security Professional (CCSP)Cloud System Architecture – Concepts and DesignCloud Data SecurityCloud System Security - Platform and InfrastructureCloud Application SecurityCloud Service – Operations ManagementCloud Service – Legal and Compliance

Microsoft Hyper-V 2016 First LookMicrosoft Hyper-V 2016: First Look

Cloud Computing for the Business UserCloud Computing for the Business User: Concepts and Moving to the Cloud

Architecting on Amazon Web ServicesArchitecting on Amazon Web Services: IAM and Object StorageArchitecting on Amazon Web Services: Elastic Compute Cloud (EC2) OverviewArchitecting on Amazon Web Services: Elastic Compute Cloud (EC2) Auto ScalingArchitecting on Amazon Web Services: Databases and Application ServicesArchitecting on Amazon Web Services: Networking and Best Practice

Advanced Architecting on Amazon Web ServicesAdvanced Architecting on Amazon Web Services: HA and Business ContinuityAdvanced Architecting on Amazon Web Services: CostingAdvanced Architecting on Amazon Web Services: Deployment ManagementAdvanced Architecting on Amazon Web Services: Cloud Migration and ArchitectureAdvanced Architecting on Amazon Web Services: Data Storage ArchitectureAdvanced Architecting on Amazon Web Services: Security ArchitectureAdvanced Architecting on Amazon Web Services: Scalability and Elasticity

Cloud Computing Technology FundamentalsCloud Computing Fundamentals: Virtualization and Data CentersCloud Computing Fundamentals: OverviewCloud Computing Fundamentals: Storing and Managing Cloud DataCloud Computing Fundamentals: Migrating to the CloudCloud Computing Fundamentals: Identity, Presence, and PrivacyCloud Computing Fundamentals: Cloud Security

Microsoft SCCM 2012: Administering and DeployingOverview & Prerequisite Setup for System Center Configuration Manager 2012 R2Basic SCCM Maintenance and Managing Operating System DeploymentDeploying Applications and Software UpdatesAdministering System Center Configuration Manager 2012 R2SCCM 2012 R2 Performance and Health MonitoringSCCM 2012 R2 Boundaries and Security ConsiderationsSCCM 2012 R2 Compliance Settings and Managing ClientsManaging Inventory and Reporting

Mentoring AssetsMentoring Assets

Mentoring Certified Information Systems Security Professional (CISSP)Mentoring 640-461 Intro Cisco Voice and Unified Communications Admin (ICOMM)Mentoring 642-437 Implementing CUC Voice over IP and QoS (CVOICE)Mentoring 642-447 Implementing CUCM, Part 1 (CIPT1)Mentoring 642-457 Implementing CUCM, Part 2 (CIPT2)Mentoring 642-467 Integrating Cisco Unified Communications Applications (CAPPS)Mentoring 642-427 Troubleshooting Cisco Unified Communications (TVOICE)Mentoring Certified Information Systems Auditor (CISA)Mentoring Systems Security Certified Practitioner (SSCP)Mentoring Certified Information Security Manager (CISM)Mentoring E10-001 Information Storage and ManagementMentoring 100-101 Interconnecting Cisco Networking Devices Part 1 (ICND1)Mentoring 200-101 Interconnecting Cisco Networking Devices Part 2 (ICND2)Mentoring 200-120 Cisco Certified Network Associate (CCNA)Mentoring 312-50 Certified Ethical Hacker (CEH)Mentoring SY0-401 CompTIA Security+Mentoring 300-115 Implementing Cisco IP Switched Networks (SWITCH)Mentoring 300-101 Implementing Cisco IP Routing (ROUTE)Mentoring 300-135 Troubleshooting and Maintaining Cisco IP Networks (TSHOOT)Mentoring 300-206 Implementing Cisco Edge Network Security Solutions (SENSS)Mentoring 70-246 Monitoring and Operating a Private Cloud, System Center 2012Mentoring 70-247 Configuring and Deploying a Private Cloud, System Center 2012Mentoring CV0-001 CompTIA Cloud+Mentoring N10-006 CompTIA Network+Mentoring 300-207 Implementing Cisco Threat Control Solutions (SITCS)

Exhibit 1 to Addendum 3

19

DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Solution Area Curriculum Series Course TitleNew Horizons IT - Complete Collection

Mentoring 300-208 Implementing Cisco Secure Access Solutions (SISAS)Mentoring CAS-002 CompTIA Advanced Security PractitionerMentoring 300-209 Implementing Cisco Secure Mobility Solutions (SIMOS)Mentoring LX0-103 CompTIA Linux+ Powered by LPI Exam 1Mentoring SK0-004 CompTIA Server+Mentoring 640-911 Introducing Cisco Data Center Networking (DCICN)Mentoring 640-916 Introducing Cisco Data Center Technologies (DCICT)Mentoring 98-367 MTA Security FundamentalsMentoring MB0-001 CompTIA Mobility+Mentoring 210-060 Implementing Cisco Collaboration Devices (CICD)Mentoring 210-065 Implementing Cisco Video Network Devices (CIVND)Mentoring 210-260 Implementing Cisco Network Security (IINS)Mentoring 300-070 Implementing Cisco IP Telephony & Video, Part 1 (CIPTV1)Mentoring 640-875 Building Cisco Service Provider Next Generation NetworksMentoring N10-005 Network+

Test PrepsTest Preps

TestPrep 640-461 Intro Cisco Voice and Unified Communications Admin (ICOMM)TestPrep Certified Information Systems Security Professional (CISSP)TestPrep Certified Information Security Manager (CISM)TestPrep E10-001 Information Storage and ManagementTestPrep 100-101 Interconnecting Cisco Networking Devices Part 1 (ICND1)TestPrep 200-101 Interconnecting Cisco Networking Devices Part 2 (ICND2)TestPrep 200-120 Cisco Certified Network Associate (CCNA)TestPrep 312-50 Certified Ethical Hacker (CEH)TestPrep SY0-401 CompTIA Security+TestPrep 300-101 Implementing Cisco IP Routing (ROUTE)TestPrep 300-115 Implementing Cisco IP Switched Networks (SWITCH)TestPrep 300-206 Implementing Cisco Edge Network Security Solutions (SENSS)TestPrep CV0-001 CompTIA Cloud+TestPrep 70-246 Monitoring and Operating a Private Cloud, System Center 2012TestPrep N10-006 CompTIA Network+TestPrep 70-247 Configuring and Deploying a Private Cloud, System Center 2012TestPrep 300-135 Troubleshooting and Maintaining Cisco IP Networks (TSHOOT)TestPrep 300-208 Implementing Cisco Secure Access Solutions (SISAS)TestPrep 300-207 Implementing Cisco Threat Control Solutions (SITCS)TestPrep CAS-002 CompTIA Advanced Security PractitionerTestPrep 300-209 Implementing Cisco Secure Mobility Solutions (SIMOS)TestPrep 640-916 Introducing Cisco Data Center Technologies (DCICT)TestPrep 640-911 Introducing Cisco Data Center Networking (DCICN)TestPrep MB0-001 CompTIA Mobility+TestPrep Certified Information Systems Security Professional (CISSP)TestPrep 98-367 Microsoft Security FundamentalsTestPrep Systems Security Certified Practitioner (SSCP)TestPrep 98-369 Cloud FundamentalsTestPrep 70-694 Virtualizing Enterprise Desktops and AppsTestPrep 210-060 Implementing Cisco Collaboration Devices (CICD)TestPrep 210-065 Implementing Cisco Video Network Devices (CICD)TestPrep 210-260 Implementing Cisco Network Security (IINS)TestPrep Systems Security Certified Practitioner (SSCP)TestPrep Certified Information Systems Auditor (CISA)TestPrep N10-005 Network+

ENTERPRISE DATABASE SYSTEMSOracle 12c

Oracle Database 12c: New Features for AdministratorsOracle Database 12c: Enterprise Manager Cloud Control and Creating CDB and PDBOracle Database 12c: Managing CDB and PDB, and Data OptimizationOracle Database 12c: Using Automatic Data Optimization, Storage, and ArchivingOracle Database 12c: Managing SecurityOracle Database 12c: High Availability and Database ManagementOracle Database 12c: Tuning SQL and Using ADDMOracle Database 12c: Resource Manager, Online Operations, and ADROracle Database 12c: Transporting Databases and Managing Data

Oracle Database 12c: Install and UpgradeOracle Database 12c – Install and Upgrade: Database ArchitectureOracle Database 12c – Install and Upgrade: InstallationOracle Database 12c – Install and Upgrade: Upgrading

Oracle Database 12c: AdministrationOracle Database 12c - Administration: Database Architecture and Management ToolsOracle Database 12c – Administration: Manage the Database InstanceOracle Database 12c – Administration: The Network Environment and User SecurityOracle Database 12c – Administration: Storage structures and Undo DataOracle Database 12c – Administration: Data Concurrency and AuditingOracle Database 12c – Administration: Backup, Recover, and Move DataOracle Database 12c – Administration: Maintenance and Performance TuningOracle Database 12c – Administration: Resource Manager, Scheduler, and Support

Oracle Database 12c: Backup and RecoveryOracle Database 12c - Backup and Recovery: Configuring for RecoverabilityOracle Database 12c - Backup and Recovery: Performing and Managing BackupsOracle Database 12c - Backup and Recovery: Failure and Recovery ConceptsOracle Database 12c - Backup and Recovery: Perform Recovery and Secure BackupOracle Database 12c - Backup and Recovery: Using Flashback TechnologiesOracle Database 12c - Backup and Recovery: Transporting Data and Performing PITROracle Database 12c - Backup and Recovery: Duplicating Databases and Tuning RMAN

Oracle Database 12c: Introduction to SQL

Exhibit 1 to Addendum 3

20

DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Solution Area Curriculum Series Course TitleNew Horizons IT - Complete Collection

Oracle Database 12c - Introduction to SQL: Relational Database and SQL DeveloperOracle Database 12c - Introduction to SQL: SQL*Plus and SELECT StatementOracle Database 12c - Introduction to SQL: Restrict, Sort, and Customize OutputOracle Database 12c - Introduction to SQL: Data Conversion and Aggregating DataOracle Database 12c - Introduction to SQL: Working with Joins and SubqueriesOracle Database 12c - Introduction to SQL: Data Manipulation LanguageOracle Database 12c - Introduction to SQL: Working with SET Operators and DDL

Oracle Database 12c: Performance TuningOracle 12c Performance Tuning: IntroductionOracle 12c Performance Tuning: Automatic Workload RepositoryOracle 12c Performance Tuning: Metrics and MonitoringOracle 12c Performance Tuning: Application Monitoring and SQL DiagnosticsOracle 12c Performance Tuning: Tuning Problem SQL StatementsOracle 12c Performance Tuning: Measuring and Maintaining SQL Performance

Oracle Database 12c: RAC AdministrationOracle Database 12c RAC Administration: Introduction to Oracle RACOracle Database 12c RAC Administration: Installing, Configuring, and PatchingOracle Database 12c RAC Administration: Day-to-Day AdministrationOracle Database 12c RAC Administration: Backup and RecoveryOracle Database 12c RAC Administration: Global Resource ManagementOracle Database 12c RAC Administration: Monitoring and Tuning

Oracle 11gOracle Database 11g: SQL Tuning

Oracle Database 11g: Architecture, SQL Tuning, and OptimizationOracle Database 11g: Indexes, Access Paths, and Join OperationsOracle Database 11g: Execution Plans and Star TransformationsOracle Database 11g: Optimizer Statistics, Hints, and Cursor SharingOracle Database 11g: Application Tracing and Automatic SQL Tuning

Oracle Database 11g: Secure BackupOracle Database 11g: Configuring OSB and SecurityOracle Database 11g: Securing Domain and Data in Oracle Secure BackupOracle Database 11g: RMAN and Oracle Secure BackupOracle Database 11g: Managing Backups and InfrastructureOracle Database 11g: Tape Vaulting, Duplication, and Tuning

Oracle Database 11g: RAC AdministrationOracle Database 11g: Installation of Clusterware and RACOracle Database 11g: RAC Database and Oracle Clusterware AdministrationOracle Database 11g: RAC Performance TuningOracle Database 11g: Configure, Manage, and Use Services in RACOracle Database 11g: Diagnosing Oracle Clusterware and Node ManagementOracle Database 11g: High Availability in RAC

Oracle Database 11g: SecurityOracle Database 11g: Introduction to Database Security and SolutionsOracle Database 11g: Database SecurityOracle Database 11g: Database AuditingOracle Database 11g: Basic User and Strong AuthenticationOracle Database 11g: Enterprise User Security and Proxy AuthenticationOracle Database 11g: Privileges, Roles, and Application ContextsOracle Database 11g: Virtual Private DatabaseOracle Database 11g: Oracle Label Security and the Data Masking PackOracle Database 11g: Encryption ConceptsOracle Database 11g: Transparent Data EncryptionOracle Database 11g: Oracle Net Services and Listener SecurityOracle Database 11g: Firewalls, Oracle Connection Manager, and SQL*Plus Security

Oracle Database 11g: New Features for Administrators Release 2Oracle Database 11g Release 2: Installation and Oracle RestartOracle Database 11g Release 2: ASM, Storage and Partitioning EnhancementsOracle Database 11g Release 2: Oracle Partitioning and Security FeaturesOracle Database 11g Release 2: Using Change Management SolutionsOracle Database 11g Release 2: Intelligent Infrastructure EnhancementsOracle Database 11g Release 2: Diagnosability EnhancementsOracle Database 11g Release 2: SQL Monitoring and Performance EnhancementsOracle Database 11g Release 2: Application Performance EnhancementsOracle Database 11g Release 2: Backup, Recover, Archive, and Repair DataOracle Database 11g Release 2: Oracle Scheduler and Secure Backup

Oracle Database 11g: Administration Workshop I Release 2Oracle Database 11g Release 2: Database Architecture and InstallationOracle Database 11g Release 2: Database Creation and Instance ManagementOracle Database 11g Release 2: The ASM Instance and Network ConnectivityOracle Database 11g Release 2: Storage Structures and User SecurityOracle Database 11g Release 2: Managing Concurrency, Undo, and AuditingOracle Database 11g Release 2: Managing Database Maintenance and PerformanceOracle Database 11g Release 2: Backup and RecoveryOracle Database 11g Release 2: Moving Data and Oracle Support

Oracle Database 11g: Administration Workshop II Release 2Oracle Database 11g Release 2: Database Architecture and Recovery OperationsOracle Database 11g Release 2: The RMAN Catalog and Creating BackupsOracle Database 11g Release 2: Performing Restore and Recovery TasksOracle Database 11g Release 2: Using, Monitoring and Tuning RMANOracle Database 11g Release 2: Database Diagnostics and Flashback TechnologiesOracle Database 11g Release 2: Managing Database Memory and PerformanceOracle Database 11g Release 2: Managing Database Resources and the SchedulerOracle Database 11g Release 2: Managing Database Space and Duplication

Oracle SOA Suite 11gOracle SOA Suite 11g: Introduction to SOA

Exhibit 1 to Addendum 3

21

DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Solution Area Curriculum Series Course TitleNew Horizons IT - Complete Collection

Oracle SOA Suite 11g: SOA Governance and Service DesignOracle SOA Suite 11g: SOA Composite ApplicationsOracle SOA Suite 11g: Mediator and BPEL ComponentsOracle SOA Suite 11g: Human Task and Business Rules ComponentsOracle SOA Suite 11g: SOA Security and Adoption Planning

Microsoft SQL Server 2014Microsoft SQL Server 2014: Designing Database Solutions

Microsoft SQL Server 2014 - Designing Solutions: Planning InfrastructureMicrosoft SQL Server 2014 - Designing Solutions: Private CloudsMicrosoft SQL Server 2014 - Designing Solutions: Windows Azure SQL DatabaseMicrosoft SQL Server 2014 - Designing Solutions: High AvailabilityMicrosoft SQL Server 2014 - Designing Solutions: Clustering and AlwaysOnMicrosoft SQL Server 2014 - Designing Solutions: Backup and Recovery

Microsoft SQL Server 2014: Designing Business Intelligence SolutionsMicrosoft SQL Server 2014 - Designing BI Solutions: BI Infrastructure DesignMicrosoft SQL Server 2014 - Designing BI Solutions: Extract, Transform, and LoadMicrosoft SQL Server 2014 - Designing BI Solutions: Data ModelsMicrosoft SQL Server 2014 - Designing BI Solutions: Reporting ServicesMicrosoft SQL Server 2014 - Designing BI Solutions: SharePoint IntegrationMicrosoft SQL Server 2014 - Designing BI Solutions: MDX Queries and PerformanceMicrosoft SQL Server 2014 - Designing BI Solutions: Availability and Recovery

Microsoft SQL Server 2014: Implementing Data Models and ReportsMicrosoft SQL Server 2014: Design and Install Analysis Services and ToolsMicrosoft SQL Server 2014: Designing Multidimensional Models and Data SourcesMicrosoft SQL Server: Implement and Configure CubesMicrosoft SQL Server 2014: Design and Implement DimensionsMicrosoft SQL Server: Implement Partitions and Custom LogicMicrosoft SQL Server 2014: MDX Queries, Process Models, and Deploy DatabasesMicrosoft SQL Server 2014: Manage, Maintain, and Troubleshoot SSASMicrosoft SQL Server 2014: Create and Manage Tabular Data ModelsMicrosoft SQL Server 2014: Design Reports and Create Data Sources and DatasetsMicrosoft SQL Server 2014: Report Formatting and InteractivityMicrosoft SQL Server 2014: Manage Reporting ServicesMicrosoft SQL Server 2014: Process Report and Create Subscriptions and Schedules

Microsoft SQL Server 2012Microsoft SQL Server 2012: Querying

Microsoft SQL Server 2012: Creating Database ObjectsMicrosoft SQL Server 2012: Querying Basics and Modifying DataMicrosoft SQL Server 2012: Manipulate Data Using Operators and FunctionsMicrosoft SQL Server 2012: Creating Functions and TriggersMicrosoft SQL Server 2012: Creating Programming Objects and Optimizing QueriesMicrosoft SQL Server 2012: Managing XML Data

Microsoft SQL Server 2012: Database AdministrationMicrosoft SQL Server 2012: Installation and UpgradeMicrosoft SQL Server 2012: Instance Configuration and Database CreationMicrosoft SQL Server 2012: Managing Databases and Automating TasksMicrosoft SQL Server 2012: Security ManagementMicrosoft SQL Server 2012: Managing Database DataMicrosoft SQL Server 2012: Managing Indexes, Full-Text Search and PartitionsMicrosoft SQL Server 2012: Backing Up and Restoring DatabasesMicrosoft SQL Server 2012: Database Monitoring and Performance TuningMicrosoft SQL Server 2012: Configuring High Availability

Microsoft SQL Server: Developing DatabasesMicrosoft SQL Server 2012 – Developing Databases: Implementing Tables and ViewsMicrosoft SQL Server 2012 – Developing Databases: Implementing IndexesMicrosoft SQL Server 2012 – Developing Databases: Stored ProceduresMicrosoft SQL Server 2012 – Developing Databases: CLR IntegrationMicrosoft SQL Server 2012 – Developing Databases: Working with DataMicrosoft SQL Server 2012 – Developing Databases: Working with XML DataMicrosoft SQL Server 2012 – Developing Databases: Tuning and Optimizing QueriesMicrosoft SQL Server 2012 – Developing Databases: Managing and TroubleshootingMicrosoft SQL Server 2014 - Developing Databases: New Features

Microsoft SQL Server 2012: Implementing a Data WarehouseMicrosoft SQL Server 2012 – Implementing a Data Warehouse: Design and DeploymentMicrosoft SQL Server 2012 – Implementing a Data Warehouse: Create Basic PackagesMicrosoft SQL Server 2012 – Implementing a Data Warehouse: ETL SolutionsMicrosoft SQL Server 2012 – Implementing a Data Warehouse: Enhancing PackagesMicrosoft SQL Server 2012 – Implementing a Data Warehouse: Custom ComponentsMicrosoft SQL Server 2012 – Implementing a Data Warehouse: Installing SSISMicrosoft SQL Server 2012 – Implementing a Data Warehouse: TroubleshootingMicrosoft SQL Server 2012 – Implementing a Data Warehouse: DQS and MDS Solutions

Microsoft SQL Server 2008Microsoft SQL Server 2008: Business Intelligence Development and Maintenance

Implementing SQL Server 2008 Integration ServicesConfiguring SQL Server 2008 Integration Services PackagesDeploying SQL Server 2008 Integration Services PackagesImplementing SQL Server 2008 Reporting Services SolutionsDeploying and Delivering SQL Server 2008 Reporting Services ReportsMaintaining SQL Server 2008 Reporting ServicesImplementing SQL Server 2008 Analysis Services SolutionsQuerying Cubes and Working with Data Mining in SSASManaging SQL Server 2008 Analysis Services SolutionsManaging SSIS Packages in SQL Server 2008

Microsoft SQL Server 2008 R2: Implementation and MaintenanceSQL Server 2008 R2: Installation

Exhibit 1 to Addendum 3

22

DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Solution Area Curriculum Series Course TitleNew Horizons IT - Complete Collection

SQL Server 2008 R2: Instance and Database ConfigurationSQL Server 2008 R2: Security ManagementSQL Server 2008 R2: Database ManagementSQL Server 2008 R2: Data ManagementSQL Server 2008 R2: Database Monitoring and PerformanceSQL Server 2008 R2: Backups, Restores, and Database SnapshotsSQL Server 2008 R2: High Availability

Microsoft SQL Server 2008 R2: Database DevelopmentSQL Server 2008 R2: Creating and Implementing Database ObjectsSQL Server 2008 R2: Creating and Altering PartitionsSQL Server 2008 R2: Running Queries and Manipulating DataSQL Server 2008 R2: Performing Advanced Query TechniquesSQL Server 2008 R2: Implementing Programming ObjectsSQL Server 2008 R2: Querying and Managing XML DataSQL Server 2008 R2: Messaging, Full-Text Search, Scripts, and Track ChangesSQL Server 2008 R2: Gathering Performance Data

MySQLMySQL Essentials

MySQL: Database Concepts, Design, and InstallationMySQL: Querying Data Using the SELECT StatementMySQL: Using the Data Manipulation and Definition StatementsMySQL: General Syntax, Advanced Queries, and Stored ProgramsMySQL: Advanced Routines, Optimization, and DCLMySQL: Storage Engines, Advanced Indexing, and MaintenanceMySQL: Administration, Transactions, Optimization, Scaling, Backup, and RecoveryMySQL: Performance Monitoring, Database Health and Integrity, and Security

Big DataBig Data Fundamentals

The Big Data Technology WaveBig Data Opportunities and Challenges

Apache Spark FundamentalsProgramming and Deploying Apache Spark Applications

Apache Hadoop and MapReduce EssentialsApache HadoopMapReduce Essentials

Hadoop EcosystemEcosystem for HadoopInstallation of HadoopData Repository with HDFS and HBaseData Repository with FlumeData Repository with SqoopData Refinery with YARN and MapReduceData Factory with HiveData Factory with PigData Factory with Oozie and HueData Flow for the Hadoop Ecosystem

Hadoop OperationsDesigning Hadoop ClustersHadoop in the CloudDeploying Hadoop ClustersHadoop Cluster AvailabilityOperating Hadoop ClustersCapacity Management for Hadoop ClustersPerformance Tuning of Hadoop Clusters

Big Data – The Corporate Leadership PerspectiveBig Data Corporate Leadership Perspective

Big Data – The Engineering PerspectiveBig Data Engineering Perspectives

Big Data – The Legal PerspectiveBig Data - The Legal Perspective

Big Data - The Marketing PerspectiveBig Data Marketing Perspective

Big Data – The Strategic Planning PerspectiveBig Data Strategic Planning

Apache Spark Advanced TopicsSpark CoreSpark StreamingMLlib, GraphX, and R

Apache KafkaApache Kafka OperationsApache Kafka Development

Business IntelligenceMicrosoft SQL Server Data Warehousing and Business Intelligence Introduction

Microsoft SQL Server Data Warehousing and Business Intelligence OverviewBusiness Intelligence with QlikView

Business Intelligence with QlikViewData Science

Data Science Fundamentals in RFundamental Methods for Data Science in RMachine Learning Examples for Data Science in R

No SQLMongoDB

MongoDB: Concepts, Installation, and QueryingMongoDB: Indexing, Replication, and Security

NoSQL

Exhibit 1 to Addendum 3

23

DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Solution Area Curriculum Series Course TitleNew Horizons IT - Complete Collection

NoSQL Concepts and BackgroundNoSQL Models and ApplicationsProgramming with NoSQLIn Depth with NoSQL

RavenDB FundamentalsRavenDB OverviewRavenDB Integration

Apache CassandraAn Overview of Apache Cassandra

Apache HBase FundamentalsApache HBase Fundamentals: Installation, Architecture, and Data ModelingApache HBase Fundamentals: Access Data through the Shell and Client APIApache HBase Fundamentals: Advanced API, Administration, and MapReduce

Data VisualizationData Visualization with Tableau

Tableau VisualizationTableau Charts, Maps, and Dashboards

Data Visualization EssentialsData Visualization: Essentials

Database FundamentalsDatabase Fundamentals

SQL Server Database Fundamentals: Design Principles and Data ManipulationSQL Server Database Fundamentals: Creating, Optimizing, and Securing Databases

Operational IntelligenceOperational Intelligence Fundamentals with Splunk

Splunk FundamentalsUsing Your Data with SplunkSplunk AdministrationSplunk Visualizations and DashboardsIndexers, Clusters, and Advanced Search

Mentoring AssetsMentoring Assets

Mentoring 1Z0-047 Oracle Database SQL ExpertMentoring 1Z0-050 Oracle Database 11g: New Features for AdministratorsMentoring 1Z0-052 Oracle Database 11g: Administration IMentoring 1Z0-053 Oracle Database 11g: Administration IIMentoring 70-432 TS: Microsoft SQL Server 2008, Implementation and MaintenanceMentoring 70-433 TS: Microsoft SQL Server 2008, Database DevelopmentMentoring 70-462 Administering Microsoft SQL Server 2012 DatabasesMentoring 70-463 Implementing a Data Warehouse with Microsoft SQL Server 2012Mentoring 70-464 Developing Microsoft SQL Server 2012 DatabasesMentoring 70-413 Designing and Implementing a Server InfrastructureMentoring 1Z0-060 Upgrade to Oracle Database 12cMentoring 1Z0-062 Oracle Database 12c: Installation and AdministrationMentoring 70-414 Implementing an Advanced Server Infrastructure

Test PrepsTest Preps

TestPrep 1Z0-050 Oracle Database 11g: New Features for AdministratorsTestPrep 1Z0-052 Oracle Database 11g: Administration ITestPrep 70-432 TS: Microsoft SQL Server 2008, Implementation and MaintenanceTestPrep 70-433 TS: Microsoft SQL Server 2008, Database DevelopmentTestPrep 1Z0-053 Oracle Database 11g: Administration IITestPrep 70-462 Administering Microsoft SQL Server 2012 DatabasesTestPrep 70-461 Querying Microsoft SQL Server 2012TestPrep 70-463 Implementing a Data Warehouse with Microsoft SQL Server 2012TestPrep 70-464 Developing Microsoft SQL Server DatabasesTestPrep 1Z0-060 Upgrade to Oracle Database 12cTestPrep 70-413 Designing and Implementing a Server InfrastructureTestPrep 1Z0-062 Oracle Database 12c: Installation and AdministrationTestPrep 1Z0-047 Oracle Database SQL Expert

ENTERPRISE RESOURCE PLANNING SYSTEMSSAP

Overview of SAP for Project TeamsOverview of SAP SolutionsFinancial Accounting with SAPSAP Logistics ModulesSAP ERP ArchitectureSAP AdministrationSAP Project Planning and ImplementationSAP NetWeaver Platform

SAP Business Suite 7 for End UsersSAP Enterprise Resource Planning (ERP)SAP Customer Relationship Management (CRM)SAP Product Lifecycle ManagementSAP Supply Chain ManagementSAP Supplier Relationship Management

SAP Business One for End UsersSAP Business One - Introduction for End Users

SAP Business Objects Business IntelligenceSAP BusinessObjects: OverviewSAP BusinessObjects: Crystal ReportsSAP BusinessObjects: Web IntelligenceSAP BusinessObjects: Dashboards and AnalyticsSAP BusinessObjects: InfoViewSAP BusinessObjects: Business Intelligence

Exhibit 1 to Addendum 3

24

DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Solution Area Curriculum Series Course TitleNew Horizons IT - Complete Collection

Microsoft DynamicsMicrosoft Dynamics CRM 2013: Applications

Application Skills in Microsoft Dynamics CRM 2013Sales Automation in Microsoft Dynamics CRM 2013Marketing Automation in Microsoft Dynamics CRM 2013Customer Service Automation in Microsoft Dynamics CRM 2013

Microsoft Dynamics CRM 2013: Customization and ConfigurationMicrosoft Dynamics CRM 2013 - Customization and Configuration: IntroductionMicrosoft Dynamics CRM 2013 - Customization and Configuration: EntitiesMicrosoft Dynamics CRM 2013 - Customization and Configuration: Relationships

Business Intelligence with Microsoft Dynamics CRM 2013Microsoft Dynamics CRM 2013: Forms, Marketing, Contacts, and Processes

TOGAFTOGAF 9.1

TOGAF Fundamentals - Enterprise Architecture BasicsTOGAF Fundamentals - Content Framework and Capability Basics

SalesforceCreating Employee Apps with Force.com

Creating AppsReporting and User Management

Developing Applications in Force.comIntermediate Programming in Force.comBasic Programming in Force.com

WEB DESIGNWeb Development

HTML5Introduction to HTML5HTML5 LayoutHTML5 FormsHTML5 APIs and MediaHTML5 and CSS3HTML5 Layout with CSS3HTML5 and Advanced CSS3HTML5 and JavaScriptHTML5 Graphics and CanvasAdvanced HTML5Advanced Features of JavaScript, CSS3 and HTML5

XML EssentialsXML Language BasicsManipulating XML with the XML DOM and AjaxXML Transformation Using XSLT and XSL-FOQuerying XML Data with XPath and XQueryWeb Services and XML

Drupal 8Drupal 8 First Look

JSON FundamentalsJSON Essentials

Web Site Design - PrinciplesResponsive Web Design

Responsive Web Design: Flexible Grids, Images, and Media QueriesResponsive Web Design: Flexible Data and UIs, Devices, Process and Performance

WordPressWordPress Introduction and Basic ConfigurationWordPress Networking and SecurityWordPress Advanced Themes and Administration

Web Design EssentialsWeb Design BasicsWeb Design Enhancements

AdobeAdobe Reader X

Adobe Reader XAdobe AIR 3

Adobe Air 3 for Flash CS5.5 DevelopersAdobe InDesign CS5

Adobe InDesign CS5: FundamentalsAdobe Acrobat Pro X1

Adobe Acrobat Pro XI FundamentalsAdobe Captivate 7

Adobe Captivate 7 FundamentalsAdobe Captivate 7 Editing Project Files

Adobe Dreamweaver CCAdobe Dreamweaver CC - Essentials

Adobe Flash Professional CCAdobe Flash Professional CC - Introduction and Basic ToolsAdobe Flash Professional CC - Working with ActionScriptAdobe Flash Professional CC - Additional Tools and Features

Adobe CC Overview New FeaturesAdobe CC Overview of New Features

Adobe ColdFusion 10Adobe ColdFusion 10 Fundamentals

Adobe Captivate 8 FundamentalsAdobe Captivate 8: Getting StartedAdobe Captivate 8: Media and Interactivity

Adobe Acrobat DCAdobe Acrobat DC Fundamentals

Exhibit 1 to Addendum 3

25

DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Solution Area Curriculum Series Course TitleNew Horizons IT - Complete Collection

Working with Adobe Acrobat DCAdobe Dreamweaver CC 2015

Adobe Dreamweaver CC 2015 FundamentalsBasic Coding with Adobe Dreamweaver CC 2015The Adobe Dreamweaver CC 2015 InterfaceAdobe Dreamweaver CC 2015 Browsers and HTMLAdobe Dreamweaver CC 2015 Web Design

Adobe Flash Professional CC 2015Adobe Flash Professional CC 2015 FundamentalsDrawing with Adobe Flash Professional CC 2015Adobe Flash Professional CC 2015 ToolsAdobe Flash Professional CC 2015 AnimationsAdobe Flash Professional CC 2015 Programming

Adobe Illustrator CC 2015Adobe Illustrator CC 2015 Introduction and New FeaturesAdobe Illustrator CC 2015 FundamentalsDrawing in Adobe Illustrator CC 2015Working with Text in Adobe Illustrator CC 2015Adobe Illustrator CC 2015 ToolsAdobe Illustrator CC 2015 Working with the Pen Tools and ObjectsAdobe Illustrator CC 2015 Gradients and Bitmap ImagesAdobe Illustrator CC 2015 Advanced Tools and Effects

Adobe InDesign CC 2015Adobe InDesign CC 2015 FundamentalsAdobe InDesign CC 2015 Basic Navigation and ToolsWorking with Images and Exporting Files in Adobe InDesign CC 2015Working with Objects and Editing Tools in Adobe InDesign CC 2015Working with Text in Adobe InDesign CC 2015Working with Pages in Adobe InDesign CC 2015

Adobe Photoshop CC 2015Adobe Photoshop CC 2015: File Types and Color EditingAdobe Photoshop CC 2015 BasicsAdobe Photoshop CC 2015 Enhancement Tools and TechniquesAdobe Photoshop CC 2015 Cloning and EditingAdobe Photoshop CC 2015 Paths and TechniquesAdobe Photoshop CC 2015: Selection Tools and TechniquesAdobe Photoshop CC 2015: Layers and Type

Adobe Premiere Elements 13Adobe Premiere Elements 13 Essentials

Adobe Premiere Pro CC 2015Adobe Premiere Pro CC 2015 FundamentalsAdobe Premiere Pro CC 2015 Panels and EffectsAdobe Premiere Pro CC 2015 Movies and Application Extensibility

Adobe Edge Animate CCAdobe Edge Animate CC: Exploring the Interface

Scripting and Web LanguagesJavaScript - JsRender

JsRender FundamentalsAdvanced JsRender Features

JavaScript Single Page AppsJavaScript SPA: Getting Started with SPA in Visual Studio 2013JavaScript SPA: SPA Views and RoutesJavaScript SPA: Durandal Modules and Lifecycle eventsJavaScript SPA: Adding Views and Handling View Navigation in DurandalJavaScript SPA: Connecting to and Managing DataJavaScript SPA: Working with Rich Application DataJavaScript SPA: Managing Application DataJavaScript SPA: Working With Validation

Building Apps with jQuery MobilejQuery Mobile – App Basics, UI Controls and NavigationjQuery Mobile – Forms, Lists, Sets and TablesOptimizing jQuery Mobile AppsIntegrating jQuery Mobile with PhoneGap

Developing with Kendo UIKendo UI: Installation and OverviewKendo UI: HTML Helpers for ASP.NET MVCKendo UI: Mobile API

JavaScript - Ember.jsJavaScript - Ember.js Fundamentals

JavaScript - KnockoutKnockout FundamentalsConfiguring Forms with KnockoutWorking with KnockoutAdvanced Knockout Techniques

JavaScript EssentialsJavaScript Essentials: Getting StartedJavaScript Essentials: Language FeaturesJavaScript Essentials: JavaScript In DepthJavaScript Essentials: Basic Browser InteractionJavaScript Essentials: Date and Math FunctionsJavaScript Essentials: Working with StringsJavaScript Essentials: Working with Page ElementsJavaScript Essentials: Dynamic Content and HTML5JavaScript Essentials: Dynamic JavaScript CodeJavaScript Essentials: Input and the Mouse

Exhibit 1 to Addendum 3

26

DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Solution Area Curriculum Series Course TitleNew Horizons IT - Complete Collection

Angular JSGetting Started with AngularJSWorking with Directives in AngularJSServices in AngularJSTesting in AngularJSAngularJS Controllers and Directives

JavaScript SenchaJavaScript Sencha: Ext JSJavaScript Sencha: Sencha Touch

TypeScript EssentialsTypeScript Essentials: Getting StartedTypeScript Essentials: Advanced TypeScript

Underscore.jsUnderscore.js: Collection Functions and Function FunctionsUnderscore.js: Array, Object, and Utility Functions

Javascript: Backbone.jsGetting Started with Backbone.jsComplex Application Development with Backbone.js

CSS3, Sass and LessCreating Styles with CSS3 and Styling TextStyling Page Elements using CSS3Navigation Elements and Animations with CSS3Forms, Positioning, and Layout with CSS3Advanced Options, Responsive Web Design, and Management with CSS3Extending CSS3 with Sass and Less

Introduction to BootstrapBootstrap IntroductionBootstrap Elements

jQueryjQuery: Basic Setup and FeaturesjQuery: Using Essential Features and FunctionsjQuery: Advanced Features and Functions

Building Web Applications with Node.jsNode.js FundamentalsNode.js: Files, Data Stores, Networked, and WebSocket ApplicationsNode.js: Express Applications and the MEAN StackOptimizing and Securing Node.js ApplicationsNode.js: Debugging, Testing, Deploying, and Maintaining Node Applications

Application Development with Node.js and the .NET FrameworkWorking with Node.js and .NETEdge.js, Node.js, and ASP.NET MVCAzure, Node.js, and SQL Server

Advanced AngularJSWorking with Data in AngularJSAngularJS Security ConsiderationsAngularJS and TypeScriptAngularUI Companion FrameworksAngularUI Utilities and Modules

AngularJS FundamentalsControllers and DirectivesServices and RoutingTesting AngularJSAnimation and InternationalizationBeginning AngularJSIntroduction to Directives

Building Apps with MEAN StackDeveloping and Deploying Web Applications with MEAN.jsSecuring, Testing, and Deploying MEAN Applications

Automating Web Development Tasks with Gulp.jsIntroducing Gulp.js to Web DevelopmentWeb Building and Testing with Gulp.js

Web ServicesApache Web Services

Fundamentals of Apache Web ServicesApache Web Services Advanced

Web Application FrameworksBuilding Dynamic Web Sites with LAMP Stack

Creating a LAMP StackBuilding Dynamic Web Sites with MySQL and PHP

Mentoring AssetsMentoring Assets

Mentoring VBScript FundamentalsTest Preps

Test PrepsTestPrep 70-486 Developing ASP.NET MVC Web Applications

BUSINESS SKILLS FOR THE IT PROFESSIONALIT Business

IT Infrastructure Library (ITIL®) 2011 Edition Foundation SyllabusITIL® 2011 Edition Foundation: ITIL® and the Service LifecycleITIL® 2011 Edition Foundation: Service Strategy FundamentalsITIL® 2011 Edition Foundation: Service Strategy ProcessesITIL® 2011 Edition Foundation: Service Design FundamentalsITIL® 2011 Edition Foundation: Service Design ProcessesITIL® 2011 Edition Foundation: Service Transition Processes and PoliciesITIL® 2011 Edition Foundation: Introduction to Service Operation

Exhibit 1 to Addendum 3

27

DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Solution Area Curriculum Series Course TitleNew Horizons IT - Complete Collection

ITIL® 2011 Edition Foundation: Service Operation ProcessesITIL® 2011 Edition Foundation: Continual Service Improvement

ITIL® 2011 Edition Intermediate Level: Operational Support & Analysis (OSA)ITIL® 2011 Edition OSA: Introduction to Operational Support and AnalysisITIL® 2011 Edition OSA: Introduction to Event ManagementITIL® 2011 Edition OSA: Introduction to Incident ManagementITIL® 2011 Edition OSA: Incident Management InteractionsITIL® 2011 Edition OSA: Introduction to Request FulfillmentITIL® 2011 Edition OSA: Request Fulfillment Process Interfaces and ChallengesITIL® 2011 Edition OSA: Introduction to Problem ManagementITIL® 2011 Edition OSA: Problem Management Process Interfaces and ChallengesITIL® 2011 Edition OSA: Introduction to Access ManagementITIL® 2011 Edition OSA: Introduction to the Service DeskITIL® 2011 Edition OSA: Service Desk Metrics and OutsourcingITIL® 2011 Edition OSA: Introduction to FunctionsITIL® 2011 Edition OSA: Function ActivitiesITIL® 2011 Edition OSA: Technology and Implementation Considerations

ITIL® 2011 Edition OverviewITIL® 2011 Edition Overview: Creating a Service CultureITIL® 2011 Edition Overview: Introduction to the ITIL® FrameworkITIL® 2011 Edition Overview: Certification and Benefits

Technical Management EssentialsTransitioning from Technical Professional to ManagementStrategies for Transitioning to Technical ManagementManaging Technical Professionals

Customer Service Representative, ProfessionalismThe Customer Service Representative (CSR)Support Center Services and Work EnvironmentTeam and Customer Relationships

Customer Service Representative, SkillsCustomer InteractionsCommunication SkillsConflict, Stress, and Time Management

Customer Service Representative, ProcessCustomer Service Processes and ProceduresQuality in a Support CenterSupport Center Tools, Technologies and MetricsDealing with Irrational Customers and Escalating Complaints

Writing Skills for Technical ProfessionalsWriting for Technical Professionals: Preparation and PlanningWriting for Technical Professionals: Effective Writing Techniques

IT Strategy EssentialsIT Strategy Essentials: Business and IT Strategy AlignmentIT Strategy Essentials: Creating an IT Strategy PlanIT Strategy Essentials: Implementing an IT StrategyFinal Exam: IT Strategy Essentials

IT Security for End UsersIT Security for End Users: IT Security FundamentalsIT Security for End Users: Using Corporate Devices SecurelyIT Security for End Users: Secure Corporate Communications and Networking

Test PrepsTest Preps

TestPrep ITIL FoundationMentoring

MentoringMentoring ITIL Foundation

PROJECT EFFECTIVENESSProject Management Curriculum

Project Management for Non-Project ManagersManaging Projects with No Direct AuthorityEnsuring Management Buy-in on a ProjectManaging Conflict in Project TeamsManaging Scope on a ProjectWeighing the Costs of Project ChangeManaging Vendor RelationshipsAnticipating and Solving Problems as a Project ChampionAddressing Stakeholder ConflictsPortfolios, Programs, and Projects: What's the Difference?Controlling Project CostProject Management Essentials

Project Management Essentials (PMBOK® Guide - Fifth Edition-aligned)Managing Projects within Organizations (PMBOK® Guide Fifth Edition)Project Management Overview (PMBOK® Guide Fifth Edition)Project Management Process Groups (PMBOK® Guide Fifth Edition)

Project Integration Management (PMBOK® Guide - Fifth Edition-aligned)Integrated Initiation and Planning (PMBOK® Guide Fifth Edition)Direct, Monitor, and Control Project Work (PMBOK® Guide Fifth Edition)Controlling Changes and Closing a Project (PMBOK® Guide Fifth Edition)Capturing, Analyzing, and Managing Lessons LearnedStrategic Alignment and Benefits Realization

Project Scope Management (PMBOK® Guide - Fifth Edition-aligned)Project Requirements and Defining Scope (PMBOK® Guide Fifth Edition)Creating the Work Breakdown Structure (PMBOK® Guide Fifth Edition)Monitoring and Controlling Project Scope (PMBOK® Guide Fifth Edition)

Project Time Management (PMBOK® Guide - Fifth Edition-aligned)

Exhibit 1 to Addendum 3

28

DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Solution Area Curriculum Series Course TitleNew Horizons IT - Complete Collection

Defining and Sequencing Project Activities (PMBOK® Guide Fifth Edition)Estimating Activity Resources and Durations (PMBOK® Guide Fifth Edition)Developing and Controlling the Project Schedule (PMBOK® Guide Fifth Edition)

Project Cost Management (PMBOK® Guide - Fifth Edition-aligned)Planning Project Costs (PMBOK® Guide Fifth Edition)Controlling Project Costs (PMBOK® Guide Fifth Edition)

Project Quality Management (PMBOK® Guide - Fifth Edition-aligned)Plan Quality Management (PMBOK® Guide Fifth Edition)Quality Assurance and Quality Control (PMBOK® Guide Fifth Edition)Quality Management for Continuous Improvement

Project Human Resource Management (PMBOK® Guide - Fifth Edition-aligned)Planning Project Human Resources (PMBOK® Guide Fifth Edition)Managing Project Human Resources (PMBOK® Guide Fifth Edition)

Project Communications Management (PMBOK® Guide - Fifth Edition-aligned)Plan and Manage Project Communications (PMBOK® Guide Fifth Edition)Control Project Communications (PMBOK® Guide Fifth Edition)

Project Risk Management (PMBOK® Guide - Fifth Edition-aligned)Risk Management Planning (PMBOK® Guide Fifth Edition)Identifying Project Risks (PMBOK® Guide Fifth Edition)Performing Risk Analysis (PMBOK® Guide Fifth Edition)Risk Response and Control (PMBOK® Guide Fifth Edition)

Project Procurement Management (PMBOK® Guide - Fifth Edition-aligned)Planning Project Procurement Management (PMBOK® Guide Fifth Edition)Managing Procurements (PMBOK® Guide Fifth Edition)

Project Stakeholder Management (PMBOK® Guide - Fifth Edition-aligned)Project Stakeholder Management (PMBOK® Guide Fifth Edition)Managing and Controlling Stakeholder Engagement (PMBOK® Guide Fifth Edition)

Program Management (PMI® Second Edition-aligned)Introduction to Program ManagementProgram Life Cycle and Benefits Management

Code of Ethics and Professional Conduct (PMI® Standard-aligned)The Role of Ethics in Project ManagementCore PMI® Values and Ethical Standards

IT Project Management EssentialsIT Project Management Essentials: Introduction to IT Project ManagementIT Project Management Essentials: Initiating and Planning IT ProjectsIT Project Management Essentials: Executing IT ProjectsIT Project Management Essentials: Monitoring and Controlling IT ProjectsIT Project Management Essentials: Managing Risks in an IT ProjectIT Project Management Essentials: Testing Deliverables and Closing IT Projects

Managing Software Project OutsourcingManaging Software Project Outsourcing: Preparing to Manage an Outsourced ProjectManaging Software Project Outsourcing: Developing a Vendor ContractManaging Software Project Outsourcing: Working with the Outsourced TeamManaging Software Project Outsourcing: Dealing with Risks

Agile Practitioner - (PMI-ACP & ScrumMaster aligned)Core PMI® Values and Ethical Standards

Agile Project Management Fundamentals (PMI_ACP Certification aligned)Agile Principles, Methodologies, and MindsetAgile PlanningPlanning and Monitoring Iterations in Agile ProjectsEngaging Agile Stakeholders and Leading Agile TeamsCore PMI® Values and Ethical Standards

PRINCE2®: 2009 FoundationOverview of Project Management (PRINCE2®: 2009-aligned)Project Organization, Planning and Risk (PRINCE2: 2009-aligned)Project Quality, Change and Progress (PRINCE2: 2009-aligned)Starting Up, Initiating and Directing a Project (PRINCE2: 2009-aligned)Controlling, Managing and Closing a Project (PRINCE2®: 2009-aligned)Tailoring PRINCE2 to a Project Environment (PRINCE2®: 2009-aligned)

PRINCE2®: PractitionerPRINCE2® Practitioner Exam Information

Mentoring AssetsMentoring PRINCE2: FoundationMentoring Project Management Professional (PMP) PMBOK Guide 5th Edition AlignedMentoring Certified Associate in Project Management (CAPM) PMBOK Guide 5th Ed.Mentoring PRINCE2: Practitioner

Project Management for EveryoneGet Your Project off the GroundPlan a Bulletproof ProjectLead Your Project Like a ProComplete Your Project On-time and On-budget

Test PrepsTestPrep PRINCE2®: FoundationTestPrep Project Management Professional PMBOK 5th Ed (valid until 12Jan2016)TestPrep Certified Associate in Project Management (CAPM) PMBOK Guide 5th Ed.TestPrep Project Management Professional PMBOK 5th Ed (Jan 2016 update)TestPrep PRINCE2®: Practitioner

Team Building CurriculumOptimizing Your Performance On a Team

Being an Effective Team MemberEstablishing Team Goals and ResponsibilitiesElements of a Cohesive TeamEffective Team CommunicationUsing Feedback to Improve Team Performance

Exhibit 1 to Addendum 3

29

DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Solution Area Curriculum Series Course TitleNew Horizons IT - Complete Collection

Power and Politics in Matrixed TeamsLeading Teams

Leading Teams: Launching a Successful TeamLeading Teams: Establishing Goals, Roles, and GuidelinesLeading Teams: Developing the Team and its CultureLeading Teams: Building Trust and CommitmentLeading Teams: Fostering Effective Communication and CollaborationLeading Teams: Motivating and Optimizing PerformanceLeading Teams: Dealing with ConflictLeading Teams: Managing Virtual TeamsBuilding Trust IncrementallyInspiring Your TeamSupport Your LeaderChoosing the Right Team CultureManaging Communications in a Virtual TeamBuilding and Leading TeamsMeeting Team Performance Challenges

Business AnalysisBABOK® v3: Business Analysis Key Concepts

Introduction to Business AnalysisBusiness Analysis Planning and MonitoringBusiness Analysis Elicitation and CollaborationBusiness Analysis and Requirements Life Cycle ManagementBusiness Analysis and Strategy AnalysisBusiness Analysis and RADD: Requirements DefinitionBusiness Analysis and RADD: Design DefinitionBusiness Analysis and Solution Evaluation

BABOK® v3: Business Analysis TechniquesAnalytical Techniques Used for Business AnalysisActivities and Tools Used for Business AnalysisDocumentation and Criteria Used for Business Analysis

BABOK® v3: Business Analysis CompetenciesBusiness Analysis Competencies: Personal SkillsBusiness Analysis Competencies: Professional EffectivenessBusiness Analysis Perspectives

Certified Business Analysis Professional (CBAP™) - BABOK® Guide V2.0 alignedIntroduction to Business Analysis and Essential CompetenciesIntroduction to Business Analysis PlanningPlanning Business Analysis Communication and MonitoringBusiness Analysis Requirements ElicitationBusiness Analysis Requirements Management and CommunicationBusiness Analysis: Enterprise AnalysisBusiness Analysis: Introduction to Requirements AnalysisBusiness Analysis: Verify and Validate RequirementsBusiness Analysis: Solution Assessment and ValidationFinal Exam: Certified Business Analysis Professional (CBAP) - BABOK V2.0 aligned

Exhibit 1 to Addendum 3

30

DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Certified Information Systems Security Professional (CISSP)Mentoring Assets (1)

Mentoring Certified Information Systems Security Professional (CISSP)Test Preps (1)

TestPrep Certified Information Systems Security Professional (CISSP)Courses (12)

CISSP: Security Principles, Governance, and GuidelinesCISSP: Risk ManagementCISSP: Asset SecurityCISSP: Security Engineering Part 1CISSP: Security Engineering Part 2CISSP: Communication & Network Security DesignCISSP: Identity and Access ManagementCISSP: Security Assessment and TestingCISSP: Security Operations Part 1CISSP: Security Operations Part 2CISSP: Security Operations Part 3CISSP: Software Development Security

Systems Security Certified Practitioner (SSCP)Mentoring Assets (1)

Mentoring Systems Security Certified Practitioner (SSCP)Test Preps (1)

TestPrep Systems Security Certified Practitioner (SSCP)Courses (6)

Systems Security Certified Practitioner: Access ControlsSystems Security Certified Practitioner: Security OperationsSystems Security Certified Practitioner: Security AdministrationSystems Security Certified Practitioner: Risk ManagementSystems Security Certified Practitioner: Incident Response and Recovery

300-206 Implementing Cisco Edge Network Security Solutions (SENSS)Mentoring Assets (1)

Mentoring 300-206 Implementing Cisco Edge Network Security Solutions (SENSS)Test Preps (1)

TestPrep 300-206 Implementing Cisco Edge Network Security Solutions (SENSS)Courses (9)

SENSS 1.0: Secure Design PrinciplesSENSS 1.0: Deploying Cisco IOS Control and Management Plane Security ControlsSENSS 1.0: Deploying Cisco Traffic Telemetry MethodsSENSS 1.0: Deploying Cisco IOS Layer 2 and Layer 3 Data Plane Security ControlsSENSS 1.0: NAT Deployment on Cisco IOS Software and Cisco ASASENSS 1.0: Firewall Threat Controls and Basic Cisco ASA Policy ConfigurationSENSS 1.0: Deploying Advanced Cisco ASA Access PoliciesSENSS 1.0: Deploying Reputation and Identity-Based Cisco ASA Access Policies

By CertificationCert

ExamLearning

Asset Product Title

Exhibit 1 to Addendum 3

31

DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

By CertificationCert

ExamLearning

Asset Product TitleSENSS 1.0: Threat Controls Deployment on Cisco IOS Software

300-207 Implementing Cisco Threat Control Solutions (SITCS)Mentoring Assets (1)

Mentoring 300-207 Implementing Cisco Threat Control Solutions (SITCS)Test Preps (1)

TestPrep 300-207 Implementing Cisco Threat Control Solutions (SITCS)Courses (8)

Cisco SITCS 1.0: Cisco ASA (CX) NGFW Services ICisco SITCS 1.0: Cisco ASA (CX) NGFW Services IICisco SITCS 1.0: Cisco Web Security ApplianceCisco SITCS 1.0: Configuring Cisco Web Security ApplianceCisco SITCS 1.0: Cisco Cloud Web SecurityCisco SITCS 1.0: Cisco Email Security ApplianceCisco SITCS 1.0: Cisco Intrusion Prevention Systems ICisco SITCS 1.0: Cisco Intrusion Prevention Systems II

300-208 Implementing Cisco Secure Access Solutions (SISAS)Mentoring Assets (1)

Mentoring 300-208 Implementing Cisco Secure Access Solutions (SISAS)Test Preps (1)

TestPrep 300-208 Implementing Cisco Secure Access Solutions (SISAS)Courses (6)

Cisco SISAS 1.0: Identity Services Overview and 802.1XCisco SISAS 1.0: EAP and Logging into Cisco Identity Services Engine (ISE)Cisco SISAS 1.0: Cisco ISE TechnologiesCisco SISAS 1.0: Certificate-based Authentication and AuthorizationCisco SISAS 1.0: Cisco TrustSec, MACsec, and WebAuth AccessCisco SISAS 1.0: Endpoint Access Control Enhancements and Troubleshooting

300-209 Cisco SIMOSMentoring Assets (1)

Mentoring 300-209 Implementing Cisco Secure Mobility Solutions (SIMOS)Test Preps (1)

TestPrep 300-209 Implementing Cisco Secure Mobility Solutions (SIMOS)Courses (7)

SIMOS 1.0: Fundamentals of VPN Technologies and CryptographySIMOS 1.0: Deploying Secure Site-to-Site Connectivity Solutions (Part 1)SIMOS 1.0: Deploying Secure Site-to-Site Connectivity Solutions (Part 2)SIMOS 1.0: Deploying Cisco IOS Site-to-Site FlexVPN SolutionsSIMOS 1.0: Deploying Clientless SSL VPNsSIMOS 1.0: Clientless SSL VPNs, Endpoint Security, and Dynamic Access PoliciesSIMOS 1.0: Deploying Cisco AnyConnect VPNs

SY0-401 CompTIA Security+Mentoring Assets (1)

Mentoring SY0-401 CompTIA Security+Test Preps (1)

Exhibit 1 to Addendum 3

32

DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

By CertificationCert

ExamLearning

Asset Product TitleTestPrep SY0-401 CompTIA Security+

Courses (10)CompTIA Security+ SY0-401: Control Fundamentals and Security ThreatsCompTIA Security+ SY0-401: Network Protocols, Attacks, and DefensesCompTIA Security+ SY0-401: Creating Secure NetworksCompTIA Security+ SY0-401: Vulnerability Assessment and Penetration TestingCompTIA Security+ SY0-401: Authentication, Biometrics, and Security ControlsCompTIA Security+ SY0-401: Securing a Networked EnvironmentCompTIA Security+ SY0-401: Remote Access, Mobile, and Wireless SecurityCompTIA Security+ SY0-401: Cryptographic Methods and Public Key InfrastructuresCompTIA Security+ SY0-401: Securing Applications, Virtualization, and the CloudCompTIA Security+ SY0-401: Continuity, Disaster Recovery, and Computer Forensics

CAS-002 CompTIA Advanced Security Practitioner (CASP)Mentoring Assets (1)

Mentoring CAS-002 CompTIA Advanced Security PractitionerTest Preps (1)

TestPrep CAS-002 CompTIA Advanced Security PractitionerCourses (9)

CompTIA CASP CAS-002: Cryptography and Enterprise Storage ConcernsCompTIA CASP CAS-002: Advanced Network Design, Management, and ControlsCompTIA CASP CAS-002: Security Controls for HostsCompTIA CASP CAS-002: Application Vulnerabilities and Security ControlsCompTIA CASP CAS-002: Industry Influences, Risk Planning, Strategy, and ControlCompTIA CASP CAS-002: Privacy Policies & Procedures and Incident RecoveryCompTIA CASP CAS-002: Research, Analysis and AssessmentCompTIA CASP CAS-002: Integration of Computing, Communications, and DisciplinesCompTIA CASP CAS-002: Technical Integration of Enterprise Components

MB0-001 CompTIA Mobility+Mentoring Assets (1)

Mentoring MB0-001 CompTIA Mobility+Test Preps (1)

TestPrep MB0-001 CompTIA Mobility+Courses (7)

CompTIA Mobility+ MB0-001: Over The Air TechnologiesCompTIA Mobility+ MB0-001: Network InfrastructureCompTIA Mobility+ MB0-001: Mobile Device Management 1CompTIA Mobility+ MB0-001: Mobile Device Management 2CompTIA Mobility+ MB0-001: SecurityCompTIA Mobility+ MB0-001: Troubleshooting 1CompTIA Mobility+ MB0-001: Troubleshooting 2

Certified Ethical Hacker (CEH) v8Mentoring Assets (1)

Mentoring 312-50 Certified Ethical Hacker (CEH)Test Preps (1)

Exhibit 1 to Addendum 3

33

DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

By CertificationCert

ExamLearning

Asset Product TitleTestPrep 312-50 Certified Ethical Hacker (CEH)

Courses (16)Certified Ethical Hacker (CEH) v8: Hacking and Penetration TestingCertified Ethical Hacker (CEH) v8: Footprinting and ReconnaissanceCertified Ethical Hacker (CEH) v8: Network ScanningCertified Ethical Hacker (CEH) v8: Enumeration and CryptographyCertified Ethical Hacker (CEH) v8: System HackingCertified Ethical Hacker (CEH) v8: MalwareCertified Ethical Hacker (CEH) v8: SniffingCertified Ethical Hacker (CEH) v8: Social EngineeringCertified Ethical Hacker (CEH) v8: Denial of Service and Session HijackingCertified Ethical Hacker (CEH) v8: Hacking Web ServersCertified Ethical Hacker (CEH) v8: Hacking Web ApplicationsCertified Ethical Hacker (CEH) v8: SQL InjectionCertified Ethical Hacker (CEH) v8: Hacking Wireless NetworksCertified Ethical Hacker (CEH) v8: Hacking Mobile PlatformsCertified Ethical Hacker (CEH) v8: Evading IDS, Firewalls, and HoneypotsCertified Ethical Hacker (CEH) v8: Buffer Overflow

Certified Information Systems Auditor (CISA)Mentoring Assets (1)

Mentoring Certified Information Systems Auditor (CISA)Test Preps (1)

TestPrep Certified Information Systems Auditor (CISA)Courses (11)

CISA Domain: The Process of Auditing Information Systems - Part 1CISA Domain: The Process of Auditing Information Systems - Part 2CISA Domain: Governance and Management of IT - Part 1CISA Domain: Governance and Management of IT - Part 2CISA Domain: IS Acquisition, Development, and Implementation - Part 1CISA Domain: IS Acquisition, Development and Implementation - Part 2CISA Domain: IS Operations, Maintenance and Support - Part 1CISA Domain: IS Operations, Maintenance, and Support - Part 2CISA Domain: Protection of Information Assets - Part 1CISA Domain: Protection of Information Assets - Part 2CISA Domain: IS Acquisition, Development and Implementation - Part 3

Certified Information Security Manager (CISM)Mentoring Assets (1)

Mentoring Certified Information Security Manager (CISM)Test Preps (1)

TestPrep Certified Information Security Manager (CISM)Courses (12)

CISM: Information Security Governance (Part 1)CISM: Information Security Governance (Part 2)CISM: Information Security Governance (Part 3)

Exhibit 1 to Addendum 3

34

DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

By CertificationCert

ExamLearning

Asset Product TitleCISM: Information Risk Management and Compliance (Part 1)CISM: Information Risk Management and Compliance (Part 2)CISM: Information Security Program Development and Management (Part 1)CISM: Information Security Program Development and Management (Part 2)CISM: Information Security Program Development and Management (Part 3)CISM: Information Security Program Development and Management (Part 4)CISM: Information Security Program Development and Management (Part 5)CISM: Information Security Incident Management (Part 1)CISM: Information Security Incident Management (Part 2)

98-367: Security FundamentalsMentoring Assets (1)

Mentoring 98-367 MTA Security FundamentalsTest Preps (1)

TestPrep 98-367 Microsoft Security FundamentalsCourses (4)

Microsoft Security Fundamentals: Security LayersMicrosoft Security Fundamentals: Operating System SecurityMicrosoft Security Fundamentals: Network SecurityMicrosoft Security Fundamentals: Security Software

Certified Cloud Security ProfessionalCourses (6)

Cloud System Architecture - Concepts and DesignCloud Data SecurityCloud System Security - Platform and InfrastructureCloud Application SecurityCloud Service - Operations ManagementCloud Service - Legal and Compliance

Asset ID Presenter Title73937 Apress 10 Dont's on Your Digital Devices: The Non-Techie's Survival Guide to Cyber Security

and Privacy56001 IT Governance 21st Century Chinese Cyberwarfare59145 McGraw-

Hill/Osborne24 Deadly Sins of Software Security: Programming Flaws and How to Fix Them

37066 Springer 802.11 Wireless Networks: Security and Analysis44508 No Starch Press A Bug Hunter's Diary: A Guided Tour Through the Wilds of Software Security16192 Springer A Classical Introduction to Cryptography: Applications for Communications Security78766 Syngress

PublishingA Machine Learning Approach to Phishing Detection and Defense

51886 OpenTask Accelerated Windows Malware Analysis with Memory Dumps16193 Springer Access Control Systems: Security; Identity Management and Trust Models

Video and Books Assets

Exhibit 1 to Addendum 3

35

DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

By CertificationCert

ExamLearning

Asset Product Title69814 Jones and

Bartlett LearningAccess Control; Authentication; and Public Key Infrastructure; Second Edition

88817 Syngress Publishing

Adaptive Security for the Internet of Things: Research; Standards; and Practices36908 Auerbach

PublicationsAdaptive Security Management Architecture

70706 Apress Advanced API Security93278 McGraw-

Hill/OsborneAdvanced Malware Analysis

77166 McGraw-Hill/Osborne

Advanced Persistent Threat Hacking: The Art and Science of Hacking Any Organization59340 IGI Global Advanced RFID Systems; Security; and Applications53405 IGI Global Advanced Security and Privacy for RFID Technologies74399 EMC An Approach Toward Security Learning54071 Apress Android Apps Security76681 Springer Android Malware75477 No Starch Press Android Security Internals: An In-Depth Guide to Android's Security Architecture47284 Auerbach

PublicationsAndroid Security: Attacks and Defenses

61782 Auerbach Publications

Anonymous Communication Networks: Protecting Privacy on the Web41426 ISACA Apache Web Services Server: Audit/Assurance Program37513 IGI Global Applied Cryptography for Cyber Security and Defense: Information Encryption and

Cyphering82382 John Wiley &

SonsApplied Cryptography: Protocols; Algorithms; and Source Code in C; 20th Anniversary Edition

26832 Oracle Press Applied Oracle Security: Developing Secure Database and Middleware Environments30510 Auerbach

PublicationsArchitecting Secure Software Systems

9697 Auerbach Publications

Assessing and Managing Security Risk in IT Systems94351 IT Governance Assessing Information Security: Strategies; Tactics; Logic and Framework; Second

Edition46422 Auerbach

PublicationsAsset Protection Through Security Awareness

44303 John Wiley & Sons

Auditing Cloud Computing: A Security and Privacy Guide76676 Springer Automatic Malware Analysis: An Emulator Based Approach34749 Wrox Press Beginning ASP.NET Security11780 Wrox Press Beginning Cryptography in Java91953 Academic Press Bent Functions: Results and Applications to Cryptography61757 CRC Press Biometric Technology: Authentication; Biocryptography; and Cloud-Based Architecture50802 Apress BizTalk 2010 EDI for Health Care: HIPAA Compliant 837 Solutions77615 No Starch Press Black Hat Python: Python Programming for Hackers and Pentesters20554 John Wiley &

SonsBlackjacking: Security Threats to BlackBerry Devices; PDAs; and Cell Phones in the Enterprise

Exhibit 1 to Addendum 3

36

DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

By CertificationCert

ExamLearning

Asset Product Title76747 Springer Bluetooth Security Attacks: Comparative Analysis; Attacks; and Countermeasures52618 Cambridge

University PressBody Area Networks: Safety; Security; and Sustainability

76759 Springer Botnets91947 Syngress

PublishingBreaking into Information Security: Crafting a Custom Career Path to Get the Job You Really Want

93182 IT Governance Build a Security Culture26398 Auerbach

PublicationsBuilding an Effective Information Security Policy Architecture

67000 Syngress Publishing

Building an Information Security Awareness Program: Defending against Social Engineering Hacks and Technical Threats

78134 Syngress Publishing

Building an Intelligence-Led Security Program64341 Apress Building the Infrastructure for Cloud Security: A Solutions View43927 ISACA Business Continuity Management Audit/Assurance Program53601 Joe Barrett C# Programming: Debugging and Security – Basic Encryption53600 Joe Barrett C# Programming: Debugging and Security – Global Assembly Cache53603 Joe Barrett C# Programming: Debugging and Security – Hashing53602 Joe Barrett C# Programming: Debugging and Security – Managing Certificates53599 Joe Barrett C# Programming: Debugging and Security – Strongnaming53605 Joe Barrett C# Programming: Debugging and Security – Symmetric vs. Asymmetric53607 Joe Barrett C# Programming: Debugging and Security – Using Regex53608 Joe Barrett C# Programming: Debugging and Security – Validation Connection Streams53568 Joe Barrett C# Programming: Diagnostic and Debugging – Compiler Directives53571 Joe Barrett C# Programming: Diagnostic and Debugging – Creating Performance Counters53569 Joe Barrett C# Programming: Diagnostic and Debugging – Tracing53570 Joe Barrett C# Programming: Diagnostic and Debugging – Working with Trace Switches53581 Joe Barrett C# Programming: Diagnostic and Debugging – Writing to Event Logs62605 John Wiley &

SonsCarry On: Sound Advice from Schneier on Security

72700 Sybex CASP CompTIA Advanced Security Practitioner Study Guide; Second Edition (Exam CAS-002)

72504 McGraw-Hill/Osborne

CCFP Certified Cyber Forensics Professional All-in-One Exam Guide65466 McGraw-

Hill/OsborneCEH Certified Ethical Hacker All-in-One Exam Guide; Second Edition

72502 McGraw-Hill/Osborne

CEH Certified Ethical Hacker Practice Exams; Second Edition44144 McGraw-

Hill/OsborneCEH Certified Ethical Hacker: All-in-One Exam Guide

63487 Sybex CEHv8: Certified Ethical Hacker Version 8 Study Guide37723 IGI Global Certification and Security in Health-Related Web Applications: Concepts and Solutions40279 Emereo

PublishingCertification Exam Preparation Course in a Book for Passing the GSEC: The How To Pass on Your First Try Certification Study Guide; Second Edition

90241 Dan Lachance Certified Cloud Security Professional (CCSP) – Cryptography: Asset Security

Exhibit 1 to Addendum 3

37

DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

By CertificationCert

ExamLearning

Asset Product Title90321 Dan Lachance Certified Cloud Security Professional (CCSP): Access Control – Physical and Virtual90301 Dan Lachance Certified Cloud Security Professional (CCSP): APIs90305 Dan Lachance Certified Cloud Security Professional (CCSP): Application Management90254 Dan Lachance Certified Cloud Security Professional (CCSP): Architectural Security90303 Dan Lachance Certified Cloud Security Professional (CCSP): Architecture90242 Dan Lachance Certified Cloud Security Professional (CCSP): Asset Access Control90243 Dan Lachance

Certified Cloud Security Professional (CCSP): Asset Removal and Storage Media Sanitization

90352 Dan Lachance Certified Cloud Security Professional (CCSP): Audit Controls - Internal and External90355 Dan Lachance Certified Cloud Security Professional (CCSP): Audit Reporting and Standards90353 Dan Lachance Certified Cloud Security Professional (CCSP): Audit Requirements; Scope; and Reporting90289 Dan Lachance Certified Cloud Security Professional (CCSP): Auditing90304 Dan Lachance Certified Cloud Security Professional (CCSP): Business Requirements90365 Dan Lachance Certified Cloud Security Professional (CCSP): Business Requirements90291 Dan Lachance Certified Cloud Security Professional (CCSP): Business Requirements and Risk90275 Dan Lachance Certified Cloud Security Professional (CCSP): Chain of Custody and Non-repudiation90248 Dan Lachance Certified Cloud Security Professional (CCSP): Cloud - Data Life Cycle90364 Dan Lachance Certified Cloud Security Professional (CCSP): Cloud - Risk Assessment90298 Dan Lachance Certified Cloud Security Professional (CCSP): Cloud Application Development90300 Dan Lachance Certified Cloud Security Professional (CCSP): Cloud Application Security Testing90236 Dan Lachance Certified Cloud Security Professional (CCSP): Cloud Computing Activities90234 Dan Lachance Certified Cloud Security Professional (CCSP): Cloud Computing Characteristics90232 Dan Lachance Certified Cloud Security Professional (CCSP): Cloud Computing Definitions90235 Dan Lachance Certified Cloud Security Professional (CCSP): Cloud Computing Infrastructure90233 Dan Lachance Certified Cloud Security Professional (CCSP): Cloud Computing Participants90237 Dan Lachance Certified Cloud Security Professional (CCSP): Cloud Computing Service Capabilities90240 Dan Lachance Certified Cloud Security Professional (CCSP): Cloud Cross-cutting Aspects90239 Dan Lachance Certified Cloud Security Professional (CCSP): Cloud Deployment Models90290 Dan Lachance Certified Cloud Security Professional (CCSP): Cloud Environment BC and DR90251 Dan Lachance Certified Cloud Security Professional (CCSP): Cloud Functional Security90244 Dan Lachance Certified Cloud Security Professional (CCSP): Cloud Network Security90359 Dan Lachance Certified Cloud Security Professional (CCSP): Cloud Server Provider (CSP) Risk Management90252 Dan Lachance Certified Cloud Security Professional (CCSP): Cloud Service Certification Assessment90249 Dan Lachance Certified Cloud Security Professional (CCSP): Cloud Service Continuity90250 Dan Lachance Certified Cloud Security Professional (CCSP): Cloud Service Investment90238 Dan Lachance Certified Cloud Security Professional (CCSP): Cloud Service Types (the Cloud Stack)90296 Dan Lachance Certified Cloud Security Professional (CCSP): Common Dangers and Potential Pitfalls90343 Dan Lachance Certified Cloud Security Professional (CCSP): Communications Management

Exhibit 1 to Addendum 3

38

DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

By CertificationCert

ExamLearning

Asset Product Title90368 Dan Lachance Certified Cloud Security Professional (CCSP): Compliance Assurance90279 Dan Lachance Certified Cloud Security Professional (CCSP): Compute Service90366 Dan Lachance

Certified Cloud Security Professional (CCSP): Contract and Vendor Management and Assessment

90310 Dan Lachance Certified Cloud Security Professional (CCSP): Cryptography90272 Dan Lachance Certified Cloud Security Professional (CCSP): Data Archiving90276 Dan Lachance Certified Cloud Security Professional (CCSP): Data Asset Security90256 Dan Lachance

Certified Cloud Security Professional (CCSP): Data Asset Security and Associated Technologies

90268 Dan Lachance Certified Cloud Security Professional (CCSP): Data Controls and Application90271 Dan Lachance Certified Cloud Security Professional (CCSP): Data Deletion90266 Dan Lachance Certified Cloud Security Professional (CCSP): Data Discovery Implementation90255 Dan Lachance Certified Cloud Security Professional (CCSP): Data Lifecycle Stages90360 Dan Lachance Certified Cloud Security Professional (CCSP): Data Ownership and Responsibility90270 Dan Lachance Certified Cloud Security Professional (CCSP): Data Retention Policy90269 Dan Lachance Certified Cloud Security Professional (CCSP): Data Rights Objects and Management90286 Dan Lachance Certified Cloud Security Professional (CCSP): DataCenter Protection – Physical90285 Dan Lachance Certified Cloud Security Professional (CCSP): Defence90350 Dan Lachance Certified Cloud Security Professional (CCSP): Defining and Categorizing PII90348 Dan Lachance Certified Cloud Security Professional (CCSP): eDiscovery90264 Dan Lachance Certified Cloud Security Professional (CCSP): Emerging Data Protection Technologies90260 Dan Lachance Certified Cloud Security Professional (CCSP): Encryption of Data Assets90333 Dan Lachance

Certified Cloud Security Professional (CCSP): Event Logging – Management and Reporting

90334 Dan LachanceCertified Cloud Security Professional (CCSP): Event Logging – Management and Reporting

90274 Dan Lachance Certified Cloud Security Professional (CCSP): Event Logging; Storage; and Analysis90273 Dan Lachance Certified Cloud Security Professional (CCSP): Event Sources90313 Dan Lachance Certified Cloud Security Professional (CCSP): Federation and Identity Provision90342 Dan Lachance

Certified Cloud Security Professional (CCSP): Forensic Data Collection and Management

90349 Dan Lachance Certified Cloud Security Professional (CCSP): Forensic Requirement90299 Dan Lachance Certified Cloud Security Professional (CCSP): Functional Testing90356 Dan Lachance Certified Cloud Security Professional (CCSP): Gap Analysis and Planning90337 Dan Lachance Certified Cloud Security Professional (CCSP): Guest Operating System Installation90320 Dan Lachance

Certified Cloud Security Professional (CCSP): Hardware and Virtualization Configuration

90319 Dan Lachance Certified Cloud Security Professional (CCSP): Hardware Configuration and Security90330 Dan Lachance Certified Cloud Security Professional (CCSP): Hardware Monitoring90331 Dan Lachance

Certified Cloud Security Professional (CCSP): Host Configuration – Backup and Restore

90325 Dan Lachance Certified Cloud Security Professional (CCSP): Host Management

Exhibit 1 to Addendum 3

39

DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

By CertificationCert

ExamLearning

Asset Product Title90293 Dan Lachance Certified Cloud Security Professional (CCSP): Implementation90358 Dan Lachance Certified Cloud Security Professional (CCSP): Information Management Controls90357 Dan Lachance Certified Cloud Security Professional (CCSP): Information Management Systems90246 Dan Lachance Certified Cloud Security Professional (CCSP): Infrastructure and Data Threats90345 Dan Lachance Certified Cloud Security Professional (CCSP): International Legislation Conflict90351 Dan Lachance Certified Cloud Security Professional (CCSP): International Regulation variations90311 Dan Lachance Certified Cloud Security Professional (CCSP): Isolation90261 Dan Lachance Certified Cloud Security Professional (CCSP): Key Management90306 Dan Lachance Certified Cloud Security Professional (CCSP): Known Common Vulnerabilities90347 Dan Lachance Certified Cloud Security Professional (CCSP): Legal Control90346 Dan Lachance Certified Cloud Security Professional (CCSP): Legal Risks90317 Dan Lachance

Certified Cloud Security Professional (CCSP): Logical Aspect Design and Risk Assessment

90335 Dan Lachance Certified Cloud Security Professional (CCSP): Management Plane90262 Dan Lachance Certified Cloud Security Professional (CCSP): Masking of Data90315 Dan Lachance Certified Cloud Security Professional (CCSP): Multi-Factor Authentication90278 Dan Lachance Certified Cloud Security Professional (CCSP): Network and Communications Service90322 Dan Lachance Certified Cloud Security Professional (CCSP): Network Configuration90323 Dan Lachance Certified Cloud Security Professional (CCSP): Network Configuration90332 Dan Lachance Certified Cloud Security Professional (CCSP): Network Security Management90328 Dan Lachance

Certified Cloud Security Professional (CCSP): Operating System – Update and Patching

90327 Dan Lachance Certified Cloud Security Professional (CCSP): Operating System Baseline90324 Dan Lachance Certified Cloud Security Professional (CCSP): Operating System Security90344 Dan Lachance Certified Cloud Security Professional (CCSP): Operations Security90329 Dan Lachance Certified Cloud Security Professional (CCSP): Performance Monitoring90265 Dan Lachance

Certified Cloud Security Professional (CCSP): Personally Identifiable Information (PII) Law

90318 Dan Lachance Certified Cloud Security Professional (CCSP): Physical and Environmental Design90341 Dan Lachance Certified Cloud Security Professional (CCSP): Physical and Logical Risk Management90277 Dan Lachance Certified Cloud Security Professional (CCSP): Physical Architecture90247 Dan Lachance Certified Cloud Security Professional (CCSP): Platform-specific Security90253 Dan Lachance Certified Cloud Security Professional (CCSP): Product Certification90288 Dan Lachance Certified Cloud Security Professional (CCSP): Protecting Access – System and Data90287 Dan Lachance Certified Cloud Security Professional (CCSP): Protection – Systems (Physical and Virtualized)90297 Dan Lachance Certified Cloud Security Professional (CCSP): Published Security Issues90338 Dan Lachance

Certified Cloud Security Professional (CCSP): Regulatory Control and Standards Adoption

90339 Dan LachanceCertified Cloud Security Professional (CCSP): Regulatory Control and Standards Adoption

90340 Dan LachanceCertified Cloud Security Professional (CCSP): Regulatory Control and Standards Adoption

90326 Dan Lachance Certified Cloud Security Professional (CCSP): Remote Access

Exhibit 1 to Addendum 3

40

DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

By CertificationCert

ExamLearning

Asset Product Title90282 Dan Lachance Certified Cloud Security Professional (CCSP): Risk90362 Dan Lachance Certified Cloud Security Professional (CCSP): Risk Frameworks90361 Dan Lachance Certified Cloud Security Professional (CCSP): Risk Management90363 Dan Lachance Certified Cloud Security Professional (CCSP): Risk Management Metrics90307 Dan Lachance Certified Cloud Security Professional (CCSP): Risks90245 Dan Lachance Certified Cloud Security Professional (CCSP): Securing the Virtualized Environment90309 Dan Lachance Certified Cloud Security Professional (CCSP): Security Devices90267 Dan Lachance Certified Cloud Security Professional (CCSP): Sensitive Data Classification90314 Dan Lachance Certified Cloud Security Professional (CCSP): Single Sign-On/Off (SSO)90316 Dan Lachance Certified Cloud Security Professional (CCSP): Specify Application Security90294 Dan Lachance Certified Cloud Security Professional (CCSP): Specify infrastructural security90281 Dan Lachance Certified Cloud Security Professional (CCSP): Storage Service90258 Dan Lachance Certified Cloud Security Professional (CCSP): Storage Type Threat90259 Dan Lachance Certified Cloud Security Professional (CCSP): Storage Type Threat Mitigation90257 Dan Lachance Certified Cloud Security Professional (CCSP): Storage Types90292 Dan Lachance Certified Cloud Security Professional (CCSP): Strategy and Planning90302 Dan Lachance Certified Cloud Security Professional (CCSP): Supply-Chain & Community90367 Dan Lachance Certified Cloud Security Professional (CCSP): Supply-chain Management90283 Dan Lachance Certified Cloud Security Professional (CCSP): Threat and Attack90308 Dan Lachance Certified Cloud Security Professional (CCSP): Threat Modeling and QoS90263 Dan Lachance Certified Cloud Security Professional (CCSP): Tokenization of Data90295 Dan Lachance Certified Cloud Security Professional (CCSP): Training and Awareness90312 Dan Lachance Certified Cloud Security Professional (CCSP): Virtualization90354 Dan Lachance Certified Cloud Security Professional (CCSP): Virtualization - Auditing Challenges90284 Dan Lachance Certified Cloud Security Professional (CCSP): Virtualization Vulnerabilities90280 Dan Lachance Certified Cloud Security Professional (CCSP): Virtualized Infrastructure90336 Dan Lachance Certified Cloud Security Professional (CCSP): Virtualized Infrastructure Construction43844 Emereo

PublishingCertified Exam Preparation Course in a Book for Passing the GCIH: The How to Pass on Your First Try Certification Study Guide; 2nd Edition

40276 Emereo Publishing

CGEIT Exam Preparation: The How To Pass on Your First Try Certification Guide93237 EMC Challenges and Best Practices in KBA Schemes77169 McGraw-

Hill/OsborneCHFI: Computer Hacking Forensic Investigator Certification All-in-One Exam Guide

63491 John Wiley & Sons

Chinese Cybersecurity and Defense51967 Auerbach

PublicationsCIO's Guide to Security Incident Management

50527 McGraw-Hill/Osborne

CISSP All-in-One Exam Guide; Sixth Edition46519 SSI Logic CISSP Exam Prep: Questions; Answers & Explanations49565 John Wiley &

SonsCISSP For Dummies; 4th Edition

50528 McGraw-Hill/Osborne

CISSP Practice Exams; Second Edition

Exhibit 1 to Addendum 3

41

DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

By CertificationCert

ExamLearning

Asset Product Title86040 McGraw-

Hill/OsborneCISSP Practice Exams; Third Edition

85978 Syngress Publishing

CISSP Study Guide; 3rd Edition47313 Syngress

PublishingCISSP Study Guide; Second Edition

46742 Sybex CISSP: Certified Information Systems Security Professional Study Guide; Sixth Edition39951 ISACA Cloud Computing Management Audit/Assurance Program32102 Auerbach

PublicationsCloud Computing: Implementation; Management; and Security

37795 IT Governance Cloud Security and Governance: Who's on Your Cloud?34770 John Wiley &

SonsCloud Security: A Comprehensive Guide to Secure Cloud Computing

88819 Syngress Publishing

Cloud Storage Security: A Practical Guide40613 John Wiley &

SonsCMS Security Handbook: The Comprehensive Guide for WordPress; Joomla!; Drupal; and Plone

35747 ISACA COBIT Mapping: Mapping FFIEC with COBIT 4.141433 ISACA COBIT Mapping: Mapping of CMMI for Development V1.2 with COBIT 4.126407 Auerbach

PublicationsComplete Guide to Security and Privacy Metrics: Measuring Regulatory Compliance; Operational Resilience; and ROI

67850 Glen E. Clarke CompTIA CASP CAS-002: Access Control Lists68014 Dan Lachance CompTIA CASP CAS-002: Active Directory67899 Dan LaChance CompTIA CASP CAS-002: ActiveX68008 Dan Lachance CompTIA CASP CAS-002: Advanced Authentication68009 Dan Lachance CompTIA CASP CAS-002: Advanced Authorization67848 Glen E. Clarke CompTIA CASP CAS-002: Advanced Configuration of Network Devices67902 Dan LaChance CompTIA CASP CAS-002: AJAX67969 Steven Crawford CompTIA CASP CAS-002: Assessment; Sandboxing; and Debugging67937 Glen E. Clarke CompTIA CASP CAS-002: Asset Control & Data Ownership and Handling68010 Dan Lachance CompTIA CASP CAS-002: Attestation and Identity Propagation67935 Glen E. Clarke CompTIA CASP CAS-002: Auditing and Continuous Monitoring67851 Glen E. Clarke CompTIA CASP CAS-002: Baselining of Networking and Security Components67955 Steven Crawford CompTIA CASP CAS-002: Benchmarks and Baselines67948 Steven Crawford CompTIA CASP CAS-002: Best Practices & New Technologies for Security Systems67875 Glen E. Clarke CompTIA CASP CAS-002: BIOS and Unified Extensible Firmware Interface67971 Steven Crawford CompTIA CASP CAS-002: Black Box; White Box; and Gray Box Testing67858 Glen E. Clarke CompTIA CASP CAS-002: Building Automation; Physical; and Industrial Controls67924 Glen E. Clarke CompTIA CASP CAS-002: Business Continuity Planning67944 Glen E. Clarke CompTIA CASP CAS-002: Chain of Custody67817 Steven Crawford CompTIA CASP CAS-002: Chain of Trust and Root of Trust

Exhibit 1 to Addendum 3

42

DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

By CertificationCert

ExamLearning

Asset Product Title67984 Dan LaChance CompTIA CASP CAS-002: Change Management; Operations; and Maintenance67914 Glen E. Clarke CompTIA CASP CAS-002: CIA Aggregate Scores67913 Glen E. Clarke CompTIA CASP CAS-002: CIA Decisions; Requirements; and Policies67887 Dan LaChance CompTIA CASP CAS-002: Clickjacking67949 Steven Crawford CompTIA CASP CAS-002: Client-Side Attacks; Vulnerabilities; and Threats67897 Dan LaChance CompTIA CASP CAS-002: Client-Side Processing vs. Server-Side Processing67994 Dan LaChance CompTIA CASP CAS-002: Cloud and Virtualization Considerations and Options67853 Glen E. Clarke CompTIA CASP CAS-002: Cloud Managed Networks67814 Steven Crawford CompTIA CASP CAS-002: Code Signing and Digital Signatures67978 Dan LaChance CompTIA CASP CAS-002: Collaboration and Guidance67982 Dan LaChance CompTIA CASP CAS-002: Collaboration Sites67867 Glen E. Clarke CompTIA CASP CAS-002: Command Shell Restrictions67985 Dan LaChance CompTIA CASP CAS-002: Commissioning; Reuse; and Disposal67849 Glen E. Clarke CompTIA CASP CAS-002: Complex Network Security Solutions for Data Flow67952 Steven Crawford CompTIA CASP CAS-002: Computer Emergency Response Team67979 Dan LaChance CompTIA CASP CAS-002: Conferencing and Messaging Solutions67946 Glen E. Clarke CompTIA CASP CAS-002: Continuity of Operation Plan67923 Glen E. Clarke CompTIA CASP CAS-002: Continuous Improvement and Monitoring67953 Steven Crawford CompTIA CASP CAS-002: Conventions; Threat Actors; & Threat Intelligence67957 Steven Crawford CompTIA CASP CAS-002: Cost Benefit Analysis68005 Dan Lachance CompTIA CASP CAS-002: CRM; ERP; and GRC67886 Dan LaChance CompTIA CASP CAS-002: Cross-Site Request Forgery67885 Dan LaChance CompTIA CASP CAS-002: Cross-Site Scripting67821 Steven Crawford

CompTIA CASP CAS-002: Cryptographic Applications Implementations and Key Escrow

67997 Dan LaChance CompTIA CASP CAS-002: Data Aggregation and Isolation67863 Glen E. Clarke CompTIA CASP CAS-002: Data Loss Prevention and Patch Management67940 Glen E. Clarke CompTIA CASP CAS-002: Data Recovery and Reconstitution67936 Glen E. Clarke CompTIA CASP CAS-002: Data Retention; Legal Holds; and Data Recovery67827 Steven Crawford CompTIA CASP CAS-002: Data Warehousing and Archiving67846 Glen E. Clarke CompTIA CASP CAS-002: Database Activity Monitor67974 Dan LaChance CompTIA CASP CAS-002: Database and Network Administrators67868 Glen E. Clarke CompTIA CASP CAS-002: Dedicated Interfaces and Out-of-Band NICs67833 Steven Crawford CompTIA CASP CAS-002: Deduplication and Dynamic Disk Pools67980 Dan LaChance CompTIA CASP CAS-002: Desktop Sharing; Remote Assistance; and Presence67938 Glen E. Clarke CompTIA CASP CAS-002: Detection and Collection67989 Dan LaChance CompTIA CASP CAS-002: Device Tracking Technologies

Exhibit 1 to Addendum 3

43

DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

By CertificationCert

ExamLearning

Asset Product Title68007 Dan Lachance CompTIA CASP CAS-002: DNS; CMDB; and CMS67824 Steven Crawford CompTIA CASP CAS-002: DRM; Watermarking; and GPG67835 Dan LaChance CompTIA CASP CAS-002: Encryption Types67861 Glen E. Clarke CompTIA CASP CAS-002: Endpoint Security Software67951 Steven Crawford CompTIA CASP CAS-002: End-User Cloud Storage and Business Integration67922 Glen E. Clarke CompTIA CASP CAS-002: Enterprise Security Architecture Frameworks67815 Steven Crawford CompTIA CASP CAS-002: Entropy; Diffusion; and Confusion67890 Dan LaChance CompTIA CASP CAS-002: Error & Exception Handling and Privilege Escalation68006 Dan LaChance CompTIA CASP CAS-002: ESB; SOA; and Directory Services67960 Steven Crawford CompTIA CASP CAS-002: Existing Security Controls67967 Steven Crawford CompTIA CASP CAS-002: Exploitation Tools67915 Glen E. Clarke CompTIA CASP CAS-002: Extreme Planning and Worst Case Scenarios67977 Dan LaChance CompTIA CASP CAS-002: Facilities and Physical Security Managers68011 Dan Lachance CompTIA CASP CAS-002: Federation67901 Dan LaChance CompTIA CASP CAS-002: Flash67945 Glen E. Clarke CompTIA CASP CAS-002: Forensic Analysis of a Compromised System67891 Dan LaChance CompTIA CASP CAS-002: Fuzzing and Fault Injection67873 Glen E. Clarke CompTIA CASP CAS-002: Hash Matching in Cloud Environments67864 Glen E. Clarke CompTIA CASP CAS-002: Host Based Firewalls and Log Monitoring67903 Dan LaChance CompTIA CASP CAS-002: HTML567976 Dan LaChance CompTIA CASP CAS-002: Human Resources and Emergency Response67857 Glen E. Clarke CompTIA CASP CAS-002: HVAC Controllers and Sensors67929 Glen E. Clarke CompTIA CASP CAS-002: IA; ISA; MOU; and SLA67910 Glen E. Clarke CompTIA CASP CAS-002: Impact of De-Perimeterization67822 Steven Crawford CompTIA CASP CAS-002: Implications of Cryptographic Methods and Design67933 Glen E. Clarke CompTIA CASP CAS-002: Incident Response and Forensic Tasks67895 Dan LaChance CompTIA CASP CAS-002: Industry-Accepted Application Security Frameworks67844 Glen E. Clarke CompTIA CASP CAS-002: INE; SIEM; and HSM67912 Glen E. Clarke CompTIA CASP CAS-002: Information Classification67884 Dan LaChance CompTIA CASP CAS-002: Insecure Direct Object References 67876 Glen E. Clarke CompTIA CASP CAS-002: Integrity Measurement Architecture67911 Glen E. Clarke CompTIA CASP CAS-002: Internal and External Influences67942 Glen E. Clarke CompTIA CASP CAS-002: Internal and External Violations67993 Dan LaChance CompTIA CASP CAS-002: Interoperability Issues67859 Glen E. Clarke CompTIA CASP CAS-002: IP Video and A/V Controls67838 Glen E. Clarke CompTIA CASP CAS-002: IPv6 and Associated Transitional Technologies 67829 Steven Crawford CompTIA CASP CAS-002: iSCSI and FCoE

Exhibit 1 to Addendum 3

44

DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

By CertificationCert

ExamLearning

Asset Product Title67819 Steven Crawford CompTIA CASP CAS-002: Issuance and Object Support67925 Glen E. Clarke CompTIA CASP CAS-002: IT Governance67900 Dan LaChance CompTIA CASP CAS-002: Java Applets67905 Dan LaChance CompTIA CASP CAS-002: JavaScript and State Management67965 Steven Crawford CompTIA CASP CAS-002: Judgment Calls67811 Steven Crawford CompTIA CASP CAS-002: Key Stretching and Hashing67927 Glen E. Clarke CompTIA CASP CAS-002: Legal Compliance and Advocacy67964 Steven Crawford CompTIA CASP CAS-002: Lessons Learned and After-Action Reports68013 Dan Lachance CompTIA CASP CAS-002: Lightweight Direct Access Protocol67918 Glen E. Clarke CompTIA CASP CAS-002: Likelihood of Threat67878 Glen E. Clarke CompTIA CASP CAS-002: Live VM Migration68002 Dan Lachance CompTIA CASP CAS-002: Logical and Physical Deployment Diagrams67834 Steven Crawford CompTIA CASP CAS-002: LUN Masking and HBA Allocation67917 Glen E. Clarke CompTIA CASP CAS-002: Magnitude of Impact67869 Glen E. Clarke CompTIA CASP CAS-002: Management and Data Interfaces67975 Dan LaChance CompTIA CASP CAS-002: Management and Finance67893 Dan LaChance CompTIA CASP CAS-002: Memory Leaks & Buffer and Integer Overflows68000 Dan Lachance CompTIA CASP CAS-002: Mergers; Acquisitions; and Divestitures67841 Glen E. Clarke CompTIA CASP CAS-002: Mesh Networks67958 Steven Crawford CompTIA CASP CAS-002: Metrics Collection and Analysis67939 Glen E. Clarke CompTIA CASP CAS-002: Mitigation67831 Steven Crawford CompTIA CASP CAS-002: Multipath and Offsite or Multisite Replication67828 Steven Crawford CompTIA CASP CAS-002: NAS; SAN; and vSAN67856 Glen E. Clarke CompTIA CASP CAS-002: Network Access Control67966 Steven Crawford CompTIA CASP CAS-002: Network Analysis Tools67840 Glen E. Clarke CompTIA CASP CAS-002: Network Authentication Methods and 802.1x67852 Glen E. Clarke CompTIA CASP CAS-002: Network Management and Monitoring Tools68001 Dan Lachance CompTIA CASP CAS-002: Network Secure Segmentation and Delegation67847 Glen E. Clarke CompTIA CASP CAS-002: Networking and Security Components67907 Glen E. Clarke CompTIA CASP CAS-002: New or Changing Models and Strategies67830 Steven Crawford CompTIA CASP CAS-002: NFS and CIFS67843 Glen E. Clarke CompTIA CASP CAS-002: NIPS and NIDS67990 Dan LaChance CompTIA CASP CAS-002: Object Tracking and Containment Technologies67930 Glen E. Clarke CompTIA CASP CAS-002: OLA; NDA; and BPA67947 Glen E. Clarke CompTIA CASP CAS-002: Order of Volatility67983 Dan LaChance CompTIA CASP CAS-002: Over-the-Air Technologies67968 Steven Crawford CompTIA CASP CAS-002: Passive Reconnaissance and Intelligence Gathering Tools

Exhibit 1 to Addendum 3

45

DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

By CertificationCert

ExamLearning

Asset Product Title67970 Steven Crawford CompTIA CASP CAS-002: Penetration Testing67962 Steven Crawford CompTIA CASP CAS-002: Performance; Latency; Scalability; and Capability67870 Dan LeChance CompTIA CASP CAS-002: Peripheral Restrictions67926 Glen E. Clarke CompTIA CASP CAS-002: Policies; Processes; and Procedures for Change67931 Glen E. Clarke CompTIA CASP CAS-002: Privacy Principles and PII67879 Glen E. Clarke CompTIA CASP CAS-002: Privilege Elevation and Data Remnants67956 Steven Crawford CompTIA CASP CAS-002: Prototypes and Testing67812 Steven Crawford CompTIA CASP CAS-002: Pseudo Number Generation and Perfect Forward Secrecy67928 Glen E. Clarke CompTIA CASP CAS-002: RA; SOA; and BIA67894 Dan LaChance CompTIA CASP CAS-002: Race Conditions; Resource Exhaustion; and Geo-Tagging68012 Dan Lachance CompTIA CASP CAS-002: RADIUS67972 Steven Crawford CompTIA CASP CAS-002: Reconnaissance; Fingerprinting; and Social Engineering67837 Glen E. Clarke CompTIA CASP CAS-002: Remote Desktop Protocol and Virtual Network Computing67881 Glen E. Clarke CompTIA CASP CAS-002: Remote Desktop Services and App-V 67998 Dan LaChance CompTIA CASP CAS-002: Resources Provisioning and De-Provisioning67941 Glen E. Clarke CompTIA CASP CAS-002: Response and Disclosure67919 Glen E. Clarke CompTIA CASP CAS-002: Return on Investment and Total Cost of Ownership67961 Steven Crawford CompTIA CASP CAS-002: Reverse Engineering Solutions67954 Steven Crawford CompTIA CASP CAS-002: RFPs; RFQs; FRIs; and Agreements67920 Glen E. Clarke CompTIA CASP CAS-002: Risk Appetite Strategies67906 Glen E. Clarke CompTIA CASP CAS-002: Risk Management67921 Glen E. Clarke CompTIA CASP CAS-002: Risk Management Processes67973 Dan LaChance CompTIA CASP CAS-002: Sales Staff and Programmers67872 Glen E. Clarke CompTIA CASP CAS-002: Sandboxing and Content Filtering in Cloud Environments67860 Glen E. Clarke CompTIA CASP CAS-002: SCADA and Industrial Control Systems67874 Glen E. Clarke CompTIA CASP CAS-002: Secure Boot and Measured Launch67898 Dan LaChance CompTIA CASP CAS-002: Secure Coding Standards67991 Dan LaChance CompTIA CASP CAS-002: Secure Data Flows to Meet Changing Business Needs68003 Dan Lachance CompTIA CASP CAS-002: Secure Infrastructure Design67996 Dan LaChance CompTIA CASP CAS-002: Secure Use of On-demand Cloud Computing67999 Dan LaChance CompTIA CASP CAS-002: Securing Virtual Environments67871 Dan LeChance CompTIA CASP CAS-002: Securing Virtualized Servers67908 Glen E. Clarke CompTIA CASP CAS-002: Security Concerns of Integrating Diverse Industries67866 Glen E. Clarke CompTIA CASP CAS-002: Security Group Policy Implementations67987 Dan LaChance CompTIA CASP CAS-002: Security Requirements Traceability Matrix

Exhibit 1 to Addendum 3

46

DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

By CertificationCert

ExamLearning

Asset Product Title67986 Dan LaChance CompTIA CASP CAS-002: Security System Development Life Cycle67855 Glen E. Clarke CompTIA CASP CAS-002: Security Zones67889 Dan LaChance CompTIA CASP CAS-002: Session Management and Input Validation67832 Steven Crawford CompTIA CASP CAS-002: Snapshots67904 Dan LaChance CompTIA CASP CAS-002: SOAP67854 Glen E. Clarke CompTIA CASP CAS-002: Software-Defined Network67888 Dan LaChance CompTIA CASP CAS-002: SQL Injection67825 Steven Crawford CompTIA CASP CAS-002: SSL; SSH; S/MIME67865 Glen E. Clarke CompTIA CASP CAS-002: Standard Operating Environment Configuration Baselines67992 Dan LaChance CompTIA CASP CAS-002: Standards67820 Steven Crawford CompTIA CASP CAS-002: Steganography68004 Dan Lachance CompTIA CASP CAS-002: Storage Integration67892 Dan LaChance CompTIA CASP CAS-002: Storage of Sensitive Data67823 Steven Crawford

CompTIA CASP CAS-002: Strength vs. Performance vs. Feasibility to Implement vs. Interoperability

67916 Glen E. Clarke CompTIA CASP CAS-002: System Specific Risk Analysis67943 Glen E. Clarke CompTIA CASP CAS-002: System; Audit; and Review Logs67981 Dan LaChance CompTIA CASP CAS-002: Telephony67988 Dan LaChance CompTIA CASP CAS-002: Testing and Agile; Waterfall; and Spiral Methodologies67816 Steven Crawford CompTIA CASP CAS-002: The CIA Triad and Non-Repudiation67880 Glen E. Clarke CompTIA CASP CAS-002: The Virtual Desktop Infrastructure67909 Glen E. Clarke CompTIA CASP CAS-002: Third Party Information Security67882 Glen E. Clarke CompTIA CASP CAS-002: TPM; VTPM; and HSM67934 Glen E. Clarke CompTIA CASP CAS-002: Training and Awareness and Employment Termination67813 Steven Crawford CompTIA CASP CAS-002: Transport and Data at Rest Encryption67839 Glen E. Clarke CompTIA CASP CAS-002: Transport Encryption67959 Steven Crawford CompTIA CASP CAS-002: Trend Data and Cyber Defense67862 Glen E. Clarke CompTIA CASP CAS-002: Trusted OS67842 Glen E. Clarke CompTIA CASP CAS-002: Unified Threat Management67963 Steven Crawford CompTIA CASP CAS-002: Usability; Maintainability; Availability; and Recovery67932 Dan LeChance CompTIA CASP CAS-002: User Policies67826 Steven Crawford CompTIA CASP CAS-002: Virtual and Cloud Storage67836 Glen E. Clarke CompTIA CASP CAS-002: Virtual Private Networks67877 Glen E. Clarke CompTIA CASP CAS-002: VM Escape67995 Dan LaChance CompTIA CASP CAS-002: Vulnerabilities Associated with Virtual Machines67845 Glen E. Clarke CompTIA CASP CAS-002: Web and NextGen Firewalls67883 Dan LaChance CompTIA CASP CAS-002: Web Application Security Design Considerations

Exhibit 1 to Addendum 3

47

DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

By CertificationCert

ExamLearning

Asset Product Title67896 Dan Lachance CompTIA CASP CAS-002: Web Services Security67818 Steven Crawford CompTIA CASP CAS-002: Wild Cards; OCSP; and CRL67950 Steven Crawford CompTIA CASP CAS-002: Zero Day Mitigation and Emergent Threats72503 McGraw-

Hill/OsborneCompTIA Mobility+ Certification All-in-One Exam Guide (Exam MB0-001)

77170 McGraw-Hill/Osborne

CompTIA Security+ All-in-One Exam Guide; Fourth Edition (Exam SY0-401)72500 McGraw-

Hill/OsborneCompTIA Security+ Certification Practice Exams; Second Edition (Exam SY0-401)

72501 McGraw-Hill/Osborne

CompTIA Security+ Certification Study Guide; Second Edition (Exam SY0-401)72714 Sybex CompTIA Security+ Deluxe Study Guide: SY0-40163498 Sybex CompTIA Security+ Review Guide; Third Edition (Exam SY0-401)63499 Sybex CompTIA Security+ Study Guide; Sixth Edition (SY0-401)81712 Cengage Course

TechnologyCompTIA Security+ SY0-401 In Depth

81713 Cengage Course Technology

CompTIA Security+ SY0-401 Q&A

66954 GTSLearning CompTIA Security+: Official Study Guide; Student Edition (Exam SY0-401)72508 McGraw-

Hill/OsborneComputer Forensics and Digital Investigation with EnCase Forensic v7

69834 Jones and Bartlett Learning

Computer Forensics; Second Edition

47607 McGraw-Hill/Osborne

Computer Incident Response Planning Handbook: Executable Plans for Protecting Information at Risk

51951 Auerbach Publications

Core Software Security: Security at the Source37523 IGI Global Corporate Hacking and Technology-Driven Crime: Social Dynamics and Implications51915 Auerbach

PublicationsCorporate Security in the Asia-Pacific Region: Crisis; Crime; Fraud; and Misconduct

44326 John Wiley & Sons

COSO Enterprise Risk Management: Establishing Effective Governance; Risk; and Compliance; Second Edition

43480 ISACA Creating a Culture of Security69887 IGI Global Crisis Management: Concepts; Methodologies; Tools and Applications51960 Auerbach

PublicationsCritical Infrastructure System Security and Resiliency

69801 Laxmi Publications

Cryptography and Network Security: A Practical Approach62169 Cambridge

University PressCryptography and Secure Communication

23395 IGI Global Cryptography and Security Services: Mechanisms and Applications16133 Syngress

PublishingCryptography for Developers

8302 John Wiley & Sons

Cryptography For Dummies84020 Dan Lachance Cryptography Fundamentals: Apply Cryptographic Modes and Algorithms

Exhibit 1 to Addendum 3

48

DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

By CertificationCert

ExamLearning

Asset Product Title83980 Dan Lachance Cryptography Fundamentals: Applying Non-repudiation to Cryptography84002 Dan Lachance Cryptography Fundamentals: Applying the DES/3DES Block Algorithm83993 Dan Lachance Cryptography Fundamentals: Creating or Generating Keys83979 Dan Lachance Cryptography Fundamentals: Defining Cryptography Authentication84006 Dan Lachance Cryptography Fundamentals: Defining the RSA Algorithm83974 Dan Lachance Cryptography Fundamentals: Defining Why Cryptography is Difficult84000 Dan Lachance Cryptography Fundamentals: Describing Counter (CTR)84018 Dan Lachance Cryptography Fundamentals: Describing Cryptanalysis83973 Dan Lachance Cryptography Fundamentals: Describing Cryptographic Terminology83987 Dan Lachance Cryptography Fundamentals: Describing Digital Signatures83995 Dan Lachance Cryptography Fundamentals: Describing Electronic Codebook (ECB)83976 Dan Lachance Cryptography Fundamentals: Describing Export Controls and Limits on Cryptography84009 Dan Lachance Cryptography Fundamentals: Describing HMAC83977 Dan Lachance Cryptography Fundamentals: Describing How Cryptography Provides Confidentiality84012 Dan Lachance Cryptography Fundamentals: Describing Key Escrow84011 Dan Lachance Cryptography Fundamentals: Describing Key Exchange84010 Dan Lachance Cryptography Fundamentals: Describing Key Management84007 Dan Lachance Cryptography Fundamentals: Describing MD5; SHA1; and SHA384019 Dan Lachance Cryptography Fundamentals: Describing Side-channel Attacks83982 Dan Lachance Cryptography Fundamentals: Describing Substitution Ciphers84003 Dan Lachance Cryptography Fundamentals: Describing the Blowfish Block Algorithm84005 Dan Lachance Cryptography Fundamentals: Describing the ElGamal Algorithm84004 Dan Lachance Cryptography Fundamentals: Describing the RC4 Streaming Algorithm83988 Dan Lachance Cryptography Fundamentals: Distinguishing between Block and Key Sizes83990 Dan Lachance Cryptography Fundamentals: Formatting the Output83985 Dan Lachance Cryptography Fundamentals: Hiding Data Using Steganography83994 Dan Lachance Cryptography Fundamentals: Identify the Cryptographic Algorithm to Use84017 Dan Lachance Cryptography Fundamentals: Identifying Algorithm and Key Strengths83992 Dan Lachance Cryptography Fundamentals: Identifying and Using Entropy83972 Dan Lachance Cryptography Fundamentals: Identifying Historical Use of Cryptography84013 Dan Lachance Cryptography Fundamentals: Identifying Secure Communications Over HTTPS83975 Dan Lachance Cryptography Fundamentals: Identifying the Current State of Cryptography83971 Dan Lachance Cryptography Fundamentals: Introducing Cryptography83978 Dan Lachance Cryptography Fundamentals: Recognizing the Need for Data Integrity83981 Dan Lachance Cryptography Fundamentals: Using a One-time Pad83996 Dan Lachance Cryptography Fundamentals: Using Cipher Block Chaining (CBC)83998 Dan Lachance Cryptography Fundamentals: Using Cipher Feedback (CFB)84015 Dan Lachance Cryptography Fundamentals: Using GPG with E-mail83991 Dan Lachance Cryptography Fundamentals: Using Nonces and the Initialization Vector83986 Dan Lachance Cryptography Fundamentals: Using One-way Hashes83999 Dan Lachance Cryptography Fundamentals: Using Output Feedback (OFB)83989 Dan Lachance Cryptography Fundamentals: Using Padding

Exhibit 1 to Addendum 3

49

DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

By CertificationCert

ExamLearning

Asset Product Title83997 Dan Lachance Cryptography Fundamentals: Using Propagating Cipher Block Chaining (PCBC)84008 Dan Lachance Cryptography Fundamentals: Using SHA283983 Dan Lachance Cryptography Fundamentals: Using Symmetric Algorithms84001 Dan Lachance Cryptography Fundamentals: Using the AES Block Algorithm83984 Dan Lachance Cryptography Fundamentals: Working with Asymmetric Algorithms84016 Dan Lachance Cryptography Fundamentals: Working with Disk Encryption84014 Dan Lachance Cryptography Fundamentals: Working with the Secure Shell (SSH)4303 Oxford University

PressCryptography: A Very Short Introduction

73406 Syngress Publishing

CSA Guide to Cloud Computing: Implementing Cloud Privacy and Security77389 Neil McIsaac CSSLP: Accounting77409 Neil McIsaac CSSLP: Agile77477 Glen E. Clarke CSSLP: Anti-tampering Techniques77431 Neil McIsaac CSSLP: Applicable Methods to Address Core Security Concepts77426 Neil McIsaac CSSLP: Attack Surface Evaluation77484 Glen E. Clarke CSSLP: Attack Surface Validation77388 Neil McIsaac CSSLP: Authentication and Authorization Part 178944 Neil McIsaac CSSLP: Authentication and Authorization Part 277442 Neil McIsaac CSSLP: Authentication and Identity Management77387 Neil McIsaac CSSLP: Availability77538 Glen E. Clarke CSSLP: Backup; Recovery; and Archiving77530 Glen E. Clarke CSSLP: Bootstrapping77483 Glen E. Clarke CSSLP: Bug Tracking77474 Glen E. Clarke CSSLP: Build Environment77555 Chuck Easttom CSSLP: Chain of Custody77537 Glen E. Clarke CSSLP: Change Management77440 Neil McIsaac CSSLP: Cloud Architectures77476 Glen E. Clarke CSSLP: Code Analysis77562 Chuck Easttom CSSLP: Code Escrow and Data Exports77542 Chuck Easttom CSSLP: Code Reuse Plan Best Practice77552 Chuck Easttom CSSLP: Code Testing and Verification77396 Neil McIsaac CSSLP: Complete Mediation77525 Glen E. Clarke CSSLP: Completion Criteria77458 Glen E. Clarke CSSLP: Concurrency77385 Neil McIsaac CSSLP: Confidentiality77459 Glen E. Clarke CSSLP: Configuration77532 Glen E. Clarke CSSLP: Configuration Management Process77531 Glen E. Clarke CSSLP: Configuration Management Roles and Plan77470 Glen E. Clarke CSSLP: Configuration Parameter Management77520 Glen E. Clarke CSSLP: Continuous Testing77563 Chuck Easttom CSSLP: Contracts77547 Chuck Easttom CSSLP: Contractual Integrity Controls

Exhibit 1 to Addendum 3

50

DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

By CertificationCert

ExamLearning

Asset Product Title77428 Neil McIsaac CSSLP: Control Identification and Prioritization77522 Glen E. Clarke CSSLP: Corrective Action77443 Neil McIsaac CSSLP: Credential Management77518 Glen E. Clarke CSSLP: Cryptographic Validation77460 Glen E. Clarke CSSLP: Cryptology77457 Glen E. Clarke CSSLP: CWE77412 Neil McIsaac CSSLP: Data Classification (Part 1)77413 Neil McIsaac CSSLP: Data Classification (Part 2)77417 Neil McIsaac CSSLP: Data Lifecycle77446 Neil McIsaac CSSLP: Data Loss Prevention77414 Neil McIsaac CSSLP: Data Ownership77416 Neil McIsaac CSSLP: Data Types77450 Neil McIsaac CSSLP: Database Security77454 Neil McIsaac CSSLP: Declarative Security77393 Neil McIsaac CSSLP: Defense in Depth77419 Neil McIsaac CSSLP: Deployment Environment77423 Neil McIsaac CSSLP: Deployment Requirements77429 Neil McIsaac CSSLP: Design and Architecture Technical Review77448 Neil McIsaac CSSLP: Digital Rights Management (DRM)77435 Neil McIsaac CSSLP: Distributed Computing77395 Neil McIsaac CSSLP: Economy of Mechanism77453 Neil McIsaac CSSLP: Embedded Systems77482 Glen E. Clarke CSSLP: Environment77462 Glen E. Clarke CSSLP: Error Handling77466 Glen E. Clarke CSSLP: Exception Management77411 Neil McIsaac CSSLP: External Requirements77394 Neil McIsaac CSSLP: Fail-Safe77517 Glen E. Clarke CSSLP: Failure Testing77444 Neil McIsaac CSSLP: Flow Control77479 Glen E. Clarke CSSLP: Functional Testing77514 Glen E. Clarke CSSLP: Fuzzing77521 Glen E. Clarke CSSLP: Impact Assessment77535 Glen E. Clarke CSSLP: Incident Management77529 Glen E. Clarke CSSLP: Independent Testing77463 Glen E. Clarke CSSLP: Input Validation77439 Neil McIsaac CSSLP: Integrating with Existing Architectures77386 Neil McIsaac CSSLP: Integrity77543 Chuck Easttom CSSLP: Intellectual Property77433 Neil McIsaac CSSLP: Interconnectivity77434 Neil McIsaac CSSLP: Interfaces77410 Neil McIsaac CSSLP: Internal Requirements77415 Neil McIsaac CSSLP: Labeling77398 Neil McIsaac CSSLP: Least Common Mechanism77391 Neil McIsaac CSSLP: Least Privilege

Exhibit 1 to Addendum 3

51

DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

By CertificationCert

ExamLearning

Asset Product Title77405 Neil McIsaac CSSLP: Legal77544 Chuck Easttom CSSLP: Legal Compliance77401 Neil McIsaac CSSLP: Leveraging Existing Components77445 Neil McIsaac CSSLP: Logging77464 Glen E. Clarke CSSLP: Logging and Auditing77549 Chuck Easttom CSSLP: Managed Services Controls77425 Neil McIsaac CSSLP: Management Requirements77469 Glen E. Clarke CSSLP: Memory Management77441 Neil McIsaac CSSLP: Mobile Applications77534 Glen E. Clarke CSSLP: Monitoring77560 Chuck Easttom CSSLP: Monitoring and Incident Management77480 Glen E. Clarke CSSLP: Nonfunctional Testing77390 Neil McIsaac CSSLP: Non-Repudiation77420 Neil McIsaac CSSLP: Objects; Activities; and Actions77397 Neil McIsaac CSSLP: Open Design77452 Neil McIsaac CSSLP: Operating Systems77424 Neil McIsaac CSSLP: Operations Requirements77461 Glen E. Clarke CSSLP: Output Sanitization77456 Glen E. Clarke CSSLP: OWASP Top 1077475 Glen E. Clarke CSSLP: Peer-based Code Review77513 Glen E. Clarke CSSLP: Penetration77438 Neil McIsaac CSSLP: Pervasive and Ubiquitous Computing77527 Glen E. Clarke CSSLP: Post-release Plan77524 Glen E. Clarke CSSLP: Pre-release Testing Process77403 Neil McIsaac CSSLP: Privacy Considerations77536 Glen E. Clarke CSSLP: Problem Management77559 Chuck Easttom CSSLP: Product Deployment and Sustainment Controls77455 Glen E. Clarke CSSLP: Programmatic Security77451 Neil McIsaac CSSLP: Programming Language Environment77399 Neil McIsaac CSSLP: Psychological Acceptability77556 Chuck Easttom CSSLP: Publishing and Dissemination Controls77519 Glen E. Clarke CSSLP: Regression Testing77404 Neil McIsaac CSSLP: Regulations and Compliance77533 Glen E. Clarke CSSLP: Release Management77437 Neil McIsaac CSSLP: Rich Internet Applications77526 Glen E. Clarke CSSLP: Risk Acceptance77430 Neil McIsaac CSSLP: Risk Assessment for Code Reuse77541 Chuck Easttom CSSLP: Risk Assessment for Code Reuse77407 Neil McIsaac CSSLP: Risk Management77418 Neil McIsaac CSSLP: Role and User Definitions77467 Glen E. Clarke CSSLP: Safe APIs77472 Glen E. Clarke CSSLP: Sandboxing77515 Glen E. Clarke CSSLP: Scanning77432 Neil McIsaac CSSLP: Security Design Principles

Exhibit 1 to Addendum 3

52

DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

By CertificationCert

ExamLearning

Asset Product Title77481 Glen E. Clarke CSSLP: Security Testing77553 Chuck Easttom CSSLP: Security Testing Controls77392 Neil McIsaac CSSLP: Separation of Duties77422 Neil McIsaac CSSLP: Sequencing and Timing Requirements77550 Chuck Easttom CSSLP: Service-level Agreements77436 Neil McIsaac CSSLP: Service-Oriented Architecture77465 Glen E. Clarke CSSLP: Session Management77516 Glen E. Clarke CSSLP: Simulation Testing77558 Chuck Easttom CSSLP: Software Authenticity and Integrity77540 Glen E. Clarke CSSLP: Software Disposal Execution77539 Glen E. Clarke CSSLP: Software Disposal Planning77554 Chuck Easttom CSSLP: Software Requirements Verification and Validation77473 Glen E. Clarke CSSLP: Source Code and Versioning77406 Neil McIsaac CSSLP: Standards77512 Glen E. Clarke CSSLP: Standards77545 Chuck Easttom CSSLP: Supplier Prequalification77546 Chuck Easttom CSSLP: Supplier Sourcing Challenges77557 Chuck Easttom CSSLP: System-of-Systems Integration77551 Chuck Easttom CSSLP: Technical Controls77523 Glen E. Clarke CSSLP: Test Data Lifecycle Management77478 Glen E. Clarke CSSLP: Testing Artifacts77402 Neil McIsaac CSSLP: The Privacy Principle77427 Neil McIsaac CSSLP: Threat Modeling and Documentation77471 Glen E. Clarke CSSLP: Tokenizing77449 Neil McIsaac CSSLP: Trusted Computing77468 Glen E. Clarke CSSLP: Type Safety77528 Glen E. Clarke CSSLP: Validation and Verification77548 Chuck Easttom CSSLP: Vendor Technical Integrity Controls77447 Neil McIsaac CSSLP: Virtualization77561 Chuck Easttom CSSLP: Vulnerability Management; Tracking; and Resolution77408 Neil McIsaac CSSLP: Waterfall77400 Neil McIsaac CSSLP: Weakest Link59134 McGraw-

Hill/OsborneCSSLP® Certification All-in-One Exam Guide

70001 Syngress Publishing

Cyber Crime and Cyber Terrorism Investigator's Handbook73961 IT Governance Cyber Essentials: A Pocket Guide77730 Syngress

PublishingCyber Reconnaissance; Surveillance and Defense

33409 IGI Global Cyber Security and Global Information Assurance: Threat Analysis and Response Solutions

64435 Gower Publishing Limited

Cyber Security Management: A Governance; Risk and Compliance Framework

14695 IGI Global Cyber Terrorism: Political and Economic Implications

Exhibit 1 to Addendum 3

53

DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

By CertificationCert

ExamLearning

Asset Product Title63511 John Wiley &

SonsCyber Threat!: How to Manage the Growing Risk of Cyber Attacks

81639 Praeger Cyber Warfare: A Reference Handbook62616 John Wiley &

SonsCybercrime and Cyberwarfare

69831 Jones and Bartlett Learning

Cyberethics: Morality and Law in Cyberspace; Fifth Edition

69957 Springer Cyberpatterns: Unifying Design Patterns with Security and Attack Patterns72721 John Wiley &

SonsCybersecurity for Executives: A Practical Guide

83473 IGI Global Cybersecurity Policies and Strategies for Cyberwarfare Prevention74144 CRC Press Cyber-Security: Protecting Critical Infrastructures from Cyber Attack and Cyber Warfare47165 Auerbach

PublicationsCybersecurity: Public Sector Threats and Responses

69065 IT Governance Cyberwar; Cyberterror; Cybercrime and Cyberactivism: An In-depth Guide to the Role of Security Standards in the Cybersecurity Environment. 2nd Edition

34419 IT Governance CyberWar; CyberTerror; CyberCrime: A Guide to the Role of Standards in an Environment of Change and Danger

69824 Jones and Bartlett Learning

Cyberwarfare: Information Operations in a Connected World

45396 Cisco Press Data Center Fundamentals: Understand Data Center Network Design and Infrastructure Architecture; Including Load Balancing; SSL; and Security

26411 Auerbach Publications

Data Mining for Intelligence; Fraud & Criminal Detection: Advanced Analytics & Information Sharing Technologies

47179 Auerbach Publications

Data Mining Tools for Malware Detection94352 IT Governance Data Protection and the Cloud: Are the Risks Too Great?32112 Auerbach

PublicationsData Protection: Governance; Risk Management; and Compliance

76761 Springer Data Security Breaches and Privacy in Europe62619 John Wiley &

SonsData-Driven Security: Analysis; Visualization and Dashboards

87659 Charles Robinson Defensive Programming in Android - Exercise: Accessing the Network87583 Charles Robinson Defensive Programming in Android - Exercise: Code Defensively in Java87633 Charles Robinson Defensive Programming in Android - Exercise: Creating Exceptions and Assertions87626

Charles Robinson Defensive Programming in Android: Activity Instrumentation

87582Charles Robinson Defensive Programming in Android: Altered Loop Variables

87619Charles Robinson Defensive Programming in Android: Assertion Classes

87629Charles Robinson Defensive Programming in Android: Assertion Overview

87639Charles Robinson Defensive Programming in Android: Atomic and Nonatomic

87596Charles Robinson Defensive Programming in Android: Avoiding Duplicated Code

87569Charles Robinson Defensive Programming in Android: Best Practice Writing Methods

Exhibit 1 to Addendum 3

54

DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

By CertificationCert

ExamLearning

Asset Product Title87655

Charles Robinson Defensive Programming in Android: Caching Data

87657Charles Robinson Defensive Programming in Android: Checking Network Connectivity

87587Charles Robinson Defensive Programming in Android: Comments

87637Charles Robinson Defensive Programming in Android: Comparing Objects

87576Charles Robinson Defensive Programming in Android: Constants in Java

87650Charles Robinson Defensive Programming in Android: Creating APKs

87611Charles Robinson Defensive Programming in Android: Creating Custom Exception Classes

87651Charles Robinson Defensive Programming in Android: Creating JARs

87634Charles Robinson Defensive Programming in Android: Defensive Initialization

87598Charles Robinson Defensive Programming in Android: Dependency Management with Gradle

87597Charles Robinson Defensive Programming in Android: Dependency Management with Maven

87606 Charles Robinson Defensive Programming in Android: Design by Contract87605 Charles Robinson Defensive Programming in Android: Design by Contract in Android87604

Charles Robinson Defensive Programming in Android: Design By Contract in Java

87612Charles Robinson Defensive Programming in Android: Displaying Errors in Apps

87644Charles Robinson Defensive Programming in Android: Enum Constructors

87646Charles Robinson Defensive Programming in Android: Enums and Abstract Methods

87645Charles Robinson Defensive Programming in Android: Enums and Interfaces

87625Charles Robinson Defensive Programming in Android: Espresso Test Classes

87609Charles Robinson Defensive Programming in Android: Exception Stack Traces

87581Charles Robinson Defensive Programming in Android: For Loops

87570Charles Robinson Defensive Programming in Android: General Rules for Naming Methods

87579Charles Robinson Defensive Programming in Android: If Statements

87648Charles Robinson Defensive Programming in Android: Importing Packages

87658Charles Robinson Defensive Programming in Android: Input and Output Encoding

87617Charles Robinson Defensive Programming in Android: Instrumentation

87630Charles Robinson Defensive Programming in Android: Java Assert Statements

Exhibit 1 to Addendum 3

55

DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

By CertificationCert

ExamLearning

Asset Product Title87560

Charles Robinson Defensive Programming in Android: Making Assumptions about User Input

87620Charles Robinson Defensive Programming in Android: Mock Object Classes

87641Charles Robinson Defensive Programming in Android: Mutable and Immutable Classes

87572Charles Robinson Defensive Programming in Android: Naming Callback Methods

87585Charles Robinson Defensive Programming in Android: Naming Classes in Java

87577Charles Robinson Defensive Programming in Android: Naming Constants

87571Charles Robinson Defensive Programming in Android: Naming Getter Methods

87635Charles Robinson Defensive Programming in Android: Null Checking

87574Charles Robinson Defensive Programming in Android: Overloading Methods

87649Charles Robinson Defensive Programming in Android: Package Scopes

87628Charles Robinson Defensive Programming in Android: Performing Actions

87631Charles Robinson

Defensive Programming in Android: Precondition; Postcondition; and Invariant Assertions

87565Charles Robinson Defensive Programming in Android: Preventing Format String Attacks

87568Charles Robinson Defensive Programming in Android: Preventing SQL Injection Attacks

87654Charles Robinson Defensive Programming in Android: Progress Reporting

87561Charles Robinson Defensive Programming in Android: Receiving File Input Data

87562Charles Robinson Defensive Programming in Android: Receiving URL Input Data

87595Charles Robinson Defensive Programming in Android: Refactoring

87614Charles Robinson Defensive Programming in Android: Releasing Resources

87578Charles Robinson Defensive Programming in Android: Resource Files

87567Charles Robinson

Defensive Programming in Android: Restricting WebView Navigation Based on User Input

87621Charles Robinson Defensive Programming in Android: Running Tests

87624Charles Robinson Defensive Programming in Android: Setting up the Android Testing Support API

87573Charles Robinson Defensive Programming in Android: Simplifying App Code Using Method Naming

87593Charles Robinson Defensive Programming in Android: Singularly Focused Classes

87594Charles Robinson Defensive Programming in Android: Singularly Focused Methods

Exhibit 1 to Addendum 3

56

DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

By CertificationCert

ExamLearning

Asset Product Title87600

Charles Robinson Defensive Programming in Android: Specifying Contracts Using Comments

87588Charles Robinson Defensive Programming in Android: SQLite Prepared Statements

87638Charles Robinson Defensive Programming in Android: Switch and Case Statements

87575Charles Robinson Defensive Programming in Android: Taking Advantage of Constants

87589Charles Robinson Defensive Programming in Android: Taking advantage of Indentation and Whitespace

87618Charles Robinson Defensive Programming in Android: Test Case Classes

87610Charles Robinson Defensive Programming in Android: Testing For Errors

87592Charles Robinson Defensive Programming in Android: The benefits of simple code

87615Charles Robinson Defensive Programming in Android: The Benefits of Unit Testing

87584Charles Robinson Defensive Programming in Android: The Benefits of Using Standards

87640Charles Robinson Defensive Programming in Android: The Final Keyword

87656Charles Robinson Defensive Programming in Android: Transferring Large Files

87623Charles Robinson Defensive Programming in Android: UI Automation Testing Overview

87627Charles Robinson Defensive Programming in Android: UI Components

87599Charles Robinson Defensive Programming in Android: Understanding Design by Contract

87607Charles Robinson Defensive Programming in Android: Understanding Errors and Exceptions

87608Charles Robinson Defensive Programming in Android: Understanding Exception Classes

87652Charles Robinson Defensive Programming in Android: User Experience During Network Access

87632Charles Robinson Defensive Programming in Android: Using Annotations Defensively

87653Charles Robinson Defensive Programming in Android: Using AsyncTask

87642Charles Robinson Defensive Programming in Android: Using Basic Enums

87643Charles Robinson Defensive Programming in Android: Using Enums for Defensive Programming

87590Charles Robinson Defensive Programming in Android: Using Indentation Styles

87647Charles Robinson Defensive Programming in Android: Using Packages and Classes

87636Charles Robinson Defensive Programming in Android: Using Setters

87616Charles Robinson Defensive Programming in Android: Using the Android JUnit Testing API

Exhibit 1 to Addendum 3

57

DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

By CertificationCert

ExamLearning

Asset Product Title87591

Charles Robinson Defensive Programming in Android: Using Whitespace

87566Charles Robinson Defensive Programming in Android: Validating Input to a WebView Object

87563Charles Robinson Defensive Programming in Android: Validating User Input

87564Charles Robinson Defensive Programming in Android: Validating User Input in Real-time

87586Charles Robinson Defensive Programming in Android: Variable Naming

87580Charles Robinson Defensive Programming in Android: While Loops

87603Charles Robinson Defensive Programming in Android: Working with Invariants

87602Charles Robinson Defensive Programming in Android: Working with Postconditions

87601Charles Robinson Defensive Programming in Android: Working with Preconditions

87622Charles Robinson Defensive Programming in Android: Working with Test Results

87613Charles Robinson Defensive Programming in Android: Working with Underlying Errors

82775 Chuck EasttomDefensive Programming in JavaScript and HTML5: Anticipating Errors in JavaScript and HTML5

82783 Chuck Easttom Defensive Programming in JavaScript and HTML5: APIs and Third-party Risks82786 Chuck Easttom Defensive Programming in JavaScript and HTML5: Browser and Plugin Issues82785 Chuck Easttom Defensive Programming in JavaScript and HTML5: Client Trust Issues and JavaScript82776 Chuck Easttom Defensive Programming in JavaScript and HTML5: Creating Clean Testable Code82762 Chuck Easttom

Defensive Programming in JavaScript and HTML5: Cross-Browser Testing for JavaScript and HTML5

82796 Chuck EasttomDefensive Programming in JavaScript and HTML5: Cross-Origin Resource Sharing and HTML5

82757 Chuck EasttomDefensive Programming in JavaScript and HTML5: Cross-Origin Resource Sharing Policy

82778 Chuck EasttomDefensive Programming in JavaScript and HTML5: Cross-Site Scripting and Cross-Site Request Forgery

82765 Chuck EasttomDefensive Programming in JavaScript and HTML5: Defensible Methods in JavaScript and HTML5

82754 Chuck EasttomDefensive Programming in JavaScript and HTML5: Defensive Coding for JavaScript and HTML5

82777 Chuck EasttomDefensive Programming in JavaScript and HTML5: DOM Issues in JavaScript and HTML5

82782 Chuck Easttom Defensive Programming in JavaScript and HTML5: DOM Manipulation82779 Chuck Easttom Defensive Programming in JavaScript and HTML5: DOM-based XSS82772 Chuck Easttom

Defensive Programming in JavaScript and HTML5: Error Codes and Messages in JavaScript and HTML5

82770 Chuck EasttomDefensive Programming in JavaScript and HTML5: Error Handling in JavaScript and HTML5

Exhibit 1 to Addendum 3

58

DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

By CertificationCert

ExamLearning

Asset Product Title82758 Chuck Easttom Defensive Programming in JavaScript and HTML5: Event Handlers and Untrusted Data82773 Chuck Easttom

Defensive Programming in JavaScript and HTML5: Global Objects in JavaScript and HTML5

82774 Chuck EasttomDefensive Programming in JavaScript and HTML5: Handling Errors Locally in JavaScript and HTML5

82797 Chuck Easttom Defensive Programming in JavaScript and HTML5: HTML5 Media82769 Chuck Easttom

Defensive Programming in JavaScript and HTML5: If and Switch Statements in JavaScript and HTML5

82781 Chuck EasttomDefensive Programming in JavaScript and HTML5: Information and Trust Issues in JavaScript and HTML5

82791 Chuck Easttom Defensive Programming in JavaScript and HTML5: Introduction to JSON82761 Chuck Easttom Defensive Programming in JavaScript and HTML5: Introduction to Testing82784 Chuck Easttom Defensive Programming in JavaScript and HTML5: JavaScript and CSS82794 Chuck Easttom Defensive Programming in JavaScript and HTML5: JSON Data and Eval82793 Chuck Easttom Defensive Programming in JavaScript and HTML5: JSON Input Validation82792 Chuck Easttom Defensive Programming in JavaScript and HTML5: JSON Risks82766 Chuck Easttom

Defensive Programming in JavaScript and HTML5: Parameters and Return Values in JavaScript and HTML5

82752 Chuck EasttomDefensive Programming in JavaScript and HTML5: Potential Software Risks in JavaScript and HTML5

82755 Chuck EasttomDefensive Programming in JavaScript and HTML5: Preventive Planning in JavaScript and HTML5

82787 Chuck Easttom Defensive Programming in JavaScript and HTML5: Sandbox Implementation Risks82800 Chuck Easttom Defensive Programming in JavaScript and HTML5: Securing HTML5 Elements82801 Chuck Easttom Defensive Programming in JavaScript and HTML5: Securing JavaScript and HTML582789 Chuck Easttom Defensive Programming in JavaScript and HTML5: Securing JavaScript Code82760 Chuck Easttom

Defensive Programming in JavaScript and HTML5: Securing Web Messaging in JavaScript and HTML5

82759 Chuck EasttomDefensive Programming in JavaScript and HTML5: Securing Web Storage in JavaScript and HTML5

82780 Chuck Easttom Defensive Programming in JavaScript and HTML5: Social Jacking82788 Chuck Easttom Defensive Programming in JavaScript and HTML5: SVG Exploits and JavaScript82764 Chuck Easttom

Defensive Programming in JavaScript and HTML5: Unit Tests for JavaScript and HTML5

82756 Chuck EasttomDefensive Programming in JavaScript and HTML5: Using Escape in HTML5 and JavaScript

82768 Chuck EasttomDefensive Programming in JavaScript and HTML5: Using Null Values in JavaScript and HTML5

82771 Chuck EasttomDefensive Programming in JavaScript and HTML5: Utilizing Exceptions in JavaScript and HTML5

82767 Chuck Easttom Defensive Programming in JavaScript and HTML5: Variables in JavaScript and HTML582798 Chuck Easttom Defensive Programming in JavaScript and HTML5: Web Workers and HTML582753 Chuck Easttom

Defensive Programming in JavaScript and HTML5: Why Do Risks Exist in JavaScript and HTML5?

Exhibit 1 to Addendum 3

59

DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

By CertificationCert

ExamLearning

Asset Product Title82763 Chuck Easttom

Defensive Programming in JavaScript and HTML5: Writing Testable Code for JavaScript and HTML5

37223 Butterworth-Heinemann

Design and Evaluation of Physical Protection Systems; Second Edition77367 Syngress

PublishingDesigning and Building a Security Operations Center

9147 John Wiley & Sons

Designing Security Architecture Solutions77365 Syngress

PublishingDetecting and Combating Malicious Email

51921 Auerbach Publications

Digital Forensics for Handheld Devices41850 Syngress

PublishingDigital Forensics with Open Source Tools

49592 Blackwell Digital Media Law; Second Edition66997 Butterworth-

HeinemannDigital Video Surveillance and Security; Second Edition

37207 Morgan Kaufmann Publishers

Disappearing Cryptography: Information Hiding: Steganography & Watermarking; Third Edition

76755 Springer Disclosure of Security Vulnerabilities76690 Springer Distributed Denial of Service Attack and Defense61772 Auerbach

PublicationsDoing Security: The Discipline of Information Security Management

32202 Syngress Publishing

E-discovery: Creating and Managing an Enterprisewide Program: A Technical Guide to Digital Investigation and Litigation Support

47324 Syngress Publishing

Effective Physical Security; Fourth Edition76763 Springer Electronic Identity92022 Jones and

Bartlett LearningElementary Information Security; 2nd edition

58863 Syngress Publishing

Eleventh Hour CISSP: Study Guide; Second Edition56009 IT Governance Email Security: A Pocket Guide67007 Morgan

Kaufmann Publishers

Emerging Trends in ICT Security

60621 IGI Global Enabling the New Era of Cloud Computing: Data Security; Transfer; and Management76712 Springer Energy-Efficient Area Coverage for Intruder Detection in Sensor Networks90755 Apress Enterprise Cybersecurity: How to Build a Successful Cyberdefense Program Against

Advanced Threats39339 IGI Global Enterprise IT Governance; Business Value and Performance Measurement35387 Apress Enterprise Mac Security: Mac OS X Snow Leopard69625 EMC Envisioning Precise Risk Models Through Big Data Analytics63176 Andy Alfred

Essentials of Developing Windows Store Apps Using C#: Deploying an App for the Enterprise

63169 Andy AlfredEssentials of Developing Windows Store Apps Using C#: How the WebAuthenticationBroker works

63171 Andy AlfredEssentials of Developing Windows Store Apps Using C#: How Web Authentication Broker in Single Sign on mode

Exhibit 1 to Addendum 3

60

DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

By CertificationCert

ExamLearning

Asset Product Title63146 Andy Alfred

Essentials of Developing Windows Store Apps Using C#: Storing and Retrieving User Credentials

63148 Andy AlfredEssentials of Developing Windows Store Apps Using C#: The Application Tab in Manifest Designer

63150 Andy AlfredEssentials of Developing Windows Store Apps Using C#: The Capabilities Tab in Manifest Designer

63152 Andy AlfredEssentials of Developing Windows Store Apps Using C#: The Content URIs Tab in Manifest Designer

63151 Andy AlfredEssentials of Developing Windows Store Apps Using C#: The Declarations Tab in Manifest Designer

63153 Andy AlfredEssentials of Developing Windows Store Apps Using C#: The Packaging Tab in Manifest Designer

63149 Andy AlfredEssentials of Developing Windows Store Apps Using C#: The Visual Assets Tab in Manifest Designer

63136 Andy AlfredEssentials of Developing Windows Store Apps Using C#: Understanding Certification and Submission

63135 Andy AlfredEssentials of Developing Windows Store Apps Using C#: Understanding the Windows.Security.Web namespace

63172 Andy AlfredEssentials of Developing Windows Store Apps Using C#: Using the WebAuthenticationBroker in Single Sign on (sso) Mode

63170 Andy AlfredEssentials of Developing Windows Store Apps Using C#: Using the WebAuthenticationBroker to connect to an online identity provider

63177 Andy AlfredEssentials of Developing Windows Store Apps Using C#: Windows Store App Certification Requirements

63147 Andy AlfredEssentials of Developing Windows Store Apps Using C#: Working with the Package Manifest in Visual Studio 2013

63134 Andy AlfredEssentials of Developing Windows Store Apps Using C#: Working with User Credentials

61791 Auerbach Publications

Ethical Hacking and Penetration Testing Guide8306 John Wiley &

SonsFirewalls For Dummies; 2nd Edition

82437 John Wiley & Sons (UK)

Forensic Radio Survey Techniques for Cell Site Analysis

83137 Jamie Campbell Foundations of iOS Security: Attacking User Passcodes83165 Jamie Campbell Foundations of iOS Security: Carrying Out a Fuzz Test83149 Jamie Campbell Foundations of iOS Security: Collecting and Verifying Signing Information83159 Wesley Miller Foundations of iOS Security: Creating a Configuration Profile78946 Wesley Miller Foundations of iOS Security: Displaying iOS Signing Info and Entitlements83150 Jamie Campbell Foundations of iOS Security: Enforcing Signatures on Processes83163 Wesley Miller Foundations of iOS Security: Enrolling Devices by Downloading Enrollment Profiles83162 Wesley Miller Foundations of iOS Security: Enrolling Devices using Profile Manager Web Portal83167 Jamie Campbell Foundations of iOS Security: Exploiting Bug Classes83166 Wesley Miller Foundations of iOS Security: Fuzzing MobileSafari78947 Wesley Miller Foundations of iOS Security: Fuzzing Safari

Exhibit 1 to Addendum 3

61

DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

By CertificationCert

ExamLearning

Asset Product Title83147 Wesley Miller Foundations of iOS Security: Getting Familiar with Application Signing83134 Jamie Campbell Foundations of iOS Security: Getting Familiar with File Protection Classes83136 Jamie Campbell Foundations of iOS Security: Getting Familiar with Keybags83135 Jamie Campbell Foundations of iOS Security: Getting Familiar with Keychain Protection Classes83133 Jamie Campbell Foundations of iOS Security: Getting Familiar with the Data Protection API83148 Wesley Miller Foundations of iOS Security: Listing Application Entitlements83128 Jamie Campbell Foundations of iOS Security: Overview of Apple Store Security83144 Jamie Campbell Foundations of iOS Security: Overview of Code Signing in iOS83164 Jamie Campbell Foundations of iOS Security: Overview of Fuzzing iOS Applications83153 Jamie Campbell Foundations of iOS Security: Overview of iOS Sandbox83170 Jamie Campbell Foundations of iOS Security: Overview of Return-Oriented Programming83138 Wesley Miller Foundations of iOS Security: Overview on iOS Network Security83151 Jamie Campbell Foundations of iOS Security: Preventing Changes on Signed Pages83132 Jamie Campbell Foundations of iOS Security: Protecting Processes and Code Segments83161 Wesley Miller Foundations of iOS Security: Setting Up the OS X Server Profile Manager83152 Jamie Campbell Foundations of iOS Security: Understanding Dynamic Code Signing83156 Jamie Campbell Foundations of iOS Security: Understanding How Sandboxing Impacts the App Store83130 Jamie Campbell Foundations of iOS Security: Understanding iOS Attack Surface83129 Jamie Campbell Foundations of iOS Security: Understanding Possible Security Threats83146 Jamie Campbell Foundations of iOS Security: Understanding Provisioning83154 Wesley Miller Foundations of iOS Security: Understanding Sandboxing and Runtime Security83155 Wesley Miller Foundations of iOS Security: Understanding Sandboxing with Extensions83169 Jamie Campbell Foundations of iOS Security: Understanding TCMalloc83171 Jamie Campbell Foundations of iOS Security: Understanding the ARM Systems Call Convention83172 Jamie Campbell Foundations of iOS Security: Understanding the iOS ARM Calling Convention83168 Jamie Campbell Foundations of iOS Security: Understanding the iOS System Allocator83145 Jamie Campbell Foundations of iOS Security: Understanding the Mandatory Access Control Framework83160 Wesley Miller Foundations of iOS Security: Updating and Removing Configuration Profiles83131 Jamie Campbell Foundations of iOS Security: Using Code Signing and Data Execution Prevention

Exhibit 1 to Addendum 3

62

DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

By CertificationCert

ExamLearning

Asset Product Title83143 Wesley Miller Foundations of iOS Security: Working with AirDrop Security83141 Wesley Miller Foundations of iOS Security: Working with Bluetooth Connections83157 Jamie Campbell Foundations of iOS Security: Working with Mobile Configuration Profiles83142 Wesley Miller Foundations of iOS Security: Working with Single Sign-on Authentication83158 Jamie Campbell Foundations of iOS Security: Working with the Apple Configurator83139 Wesley Miller Foundations of iOS Security: Working with Virtual Private Networks83140 Wesley Miller Foundations of iOS Security: Working with Wi-Fi Networks25530 Apress Foundations of Security: What Every Programmer Needs to Know69815 Jones and

Bartlett LearningFundamentals of Information Systems Security; Second Edition

27206 Artech House Fuzzing for Software Security Testing and Quality Assurance6922 Premier Press Getting Started with HIPAA40278 Emereo

PublishingGIAC Security Leadership Certification (GSLC) Exam Preparation: The How To Pass on Your First Try Certification Study Guide

77761 Syngress Publishing

Google Earth Forensics: Using Google Earth Geo-Location in Digital Forensic Investigations

32363 Syngress Publishing

Google Hacking for Penetration Testers; Volume 253292 IT Governance Governance and Internal Controls for Cutting Edge IT35790 IGI Global Governance of Picture Archiving and Communications Systems: Data Security and

Quality Management of Filmless Radiology74150 Auerbach

PublicationsGovernance; Risk; and Compliance for PKI Operations

77172 McGraw-Hill/Osborne

Gray Hat Hacking The Ethical Hacker's Handbook; Fourth Edition31690 No Starch Press Gray Hat Python: Python Programming for Hackers and Reverse Engineers51310 Sybex Group Policy: Fundamentals; Security; and the Managed Desktop; Second Edition59129 McGraw-

Hill/OsborneGSEC GIAC Security Essentials Certification All-in-One Exam Guide

76971 Springer Guide to Computer Network Security; Second Edition16135 Syngress

PublishingHack the Stack: Using Snort and Ethereal to Master the 8 Layers of an Insecure Network

69818 Jones and Bartlett Learning

Hacker Techniques; Tools; and Incident Handling; Second Edition

78669 Syngress Publishing

Hacking and Penetration Testing with Low Power Devices72523 McGraw-

Hill/OsborneHacking Exposed Computer Forensics; Second Edition

59135 McGraw-Hill/Osborne

Hacking Exposed Unified Communications & VoIP Security Secrets & Solutions; Second Edition

86041 McGraw-Hill/Osborne

Hacking Exposed Wireless: Wireless Security Secrets & Solutions; Third Edition34819 John Wiley &

SonsHacking For Dummies; 3rd Edition

62640 John Wiley & Sons

Hacking Point of Sale: Payment Application Secrets; Threats; and Solutions

Exhibit 1 to Addendum 3

63

DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

By CertificationCert

ExamLearning

Asset Product Title29434 No Starch Press Hacking VoIP: Protocols; Attacks; and Countermeasures88814 Syngress

PublishingHacking Web Intelligence: Open Source Intelligence and Web Reconnaissance Concepts and Techniques

26193 Cengage Charles River Media

Hacking Web Services

76765 Springer Handbook of Biometric Anti-Spoofing: Trusted Biometrics Under Spoofing Attacks47356 Butterworth-

HeinemannHandbook of Loss Prevention and Crime Prevention; Fifth Edition

91935 IGI Global Handbook of Research on Civil Society and National Security in the Era of Cyber Warfare

73011 IGI Global Handbook of Research on Digital Crime; Cyberspace Security; and Information Assurance

28382 IGI Global Handbook of Research on Information Security and Assurance83467 IGI Global Handbook of Research on Redesigning the Future of Internet Architectures83472 IGI Global Handbook of Research on Security Considerations in Cloud Computing73013 IGI Global Handbook of Research on Threat Detection and Countermeasures in Network Security18658 IGI Global Handbook of Research on Wireless Security51922 Auerbach

PublicationsHandbook of Surveillance Technologies; Third Edition

77173 McGraw-Hill/Osborne

Healthcare Information Security and Privacy30962 Springer High Availability and Disaster Recovery: Concepts; Design; Implementation67003 Morgan

Kaufmann Publishers

High-Performance Embedded Computing; Second Edition: Applications in Cyber-Physical Systems and Mobile Computing

51966 Auerbach Publications

HIPAA and PCI Audits: Secrets to Getting GREAT Results81726 Butterworth-

HeinemannHospital and Healthcare Security; Sixth Edition

26431 Auerbach Publications

How to Achieve 27001 Certification: An Example of Applied Compliance Management78765 Syngress

PublishingHow to Attack and Defend Your Website

25455 Syngress Publishing

How to Cheat at Configuring Open Source Security Tools25450 Syngress

PublishingHow to Cheat at VoIP Security

30507 Auerbach Publications

How to Complete a Risk Assessment in 5 Days or Less78689 Syngress

PublishingHow to Defeat Advanced Malware: New Tools for Protection and Forensics

78688 Syngress Publishing

How to Define and Build an Effective Cyber Threat Intelligence Capability26432 Auerbach

PublicationsHow to Develop and Implement a Security Master Plan

52006 Auerbach Publications

Identity in a Digital World: What It Is and How to Protect It101143 Michael Shannon IINS: 802.1Q and Inter-VLAN Routing101142 Michael Shannon IINS: 802.1Q Tagging

Exhibit 1 to Addendum 3

64

DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

By CertificationCert

ExamLearning

Asset Product Title104442 Michael Shannon IINS: 802.1X Authentication and Authorization104440 Michael Shannon IINS: 802.1X Components104441 Michael Shannon IINS: 802.1X Message Flow101042 Michael Shannon IINS: AAA Protocols101044 Michael Shannon IINS: AAA Servers101149 Michael Shannon IINS: ACL Examples (Part 1)101150 Michael Shannon IINS: ACL Examples (Part 2)101151 Michael Shannon IINS: ACL Examples (Part 3)101148 Michael Shannon IINS: ACL Overview101152 Michael Shannon IINS: ACLs on Switches100724 Michael Shannon IINS: Advanced Persistent Threats101360 Michael Shannon IINS: Antispyware Software101359 Michael Shannon IINS: Antivirus Software101157 Michael Shannon IINS: ARP Cache Poisoning101184 Michael Shannon IINS: ARP Overview100910 Michael Shannon IINS: Assets; Vulnerabilities; Threats100943 Michael Shannon IINS: Asymmetric Encryption Algorithms101075 Michael Shannon IINS: Authenticating Routing Protocols (Part 1)101076 Michael Shannon IINS: Authenticating Routing Protocols (Part 2)101271 Michael Shannon IINS: Authentication101335 Michael Shannon IINS: Authentication in Basic Clientless SSL VPN100953 Michael Shannon IINS: Authentication Using Certificates101050 Michael Shannon IINS: Authentication Using External Servers100945 Michael Shannon IINS: Authentication with Asymmetric Encryption101040 Michael Shannon IINS: Authentication; Authorization; and Accounting (AAA)101049 Michael Shannon IINS: Authorization with Role-based CLI101070 Michael Shannon IINS: Banner Messages101337 Michael Shannon IINS: Basic Access Control Using Web ACLs101322 Michael Shannon IINS: Basic AnyConnect SSL VPN Configuration Tasks101317 Michael Shannon IINS: Basic Cisco AnyConnect SSL VPN101334 Michael Shannon IINS: Basic Cisco Clientless SSL VPN101338 Michael Shannon IINS: Basic Clientless SSL VPN Configuration Tasks101349 Michael Shannon IINS: Blacklisting; AMP; and IPS100720 Michael Shannon IINS: Buffer Overflow Attacks101269 Michael Shannon IINS: Bulk Encryption Algorithms104444 Michael Shannon IINS: BYOD Onboarding101261 Michael Shannon IINS: C3PL Configuration Procedure101147 Michael Shannon IINS: CDP100952 Michael Shannon IINS: Certificate Enrollment100954 Michael Shannon IINS: Certificate Revocation and Revocation Checks101364 Michael Shannon IINS: Cisco AMP for Endpoints101365 Michael Shannon IINS: Cisco AMP for Endpoints Components101361 Michael Shannon IINS: Cisco AnyConnect Secure Mobility Client v4.0101318 Michael Shannon IINS: Cisco AnyConnect SSL VPN Solution Components

Exhibit 1 to Addendum 3

65

DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

By CertificationCert

ExamLearning

Asset Product Title101207 Michael Shannon IINS: Cisco ASA 5500-X Platforms101209 Michael Shannon IINS: Cisco ASA Firewall Features101239 Michael Shannon IINS: Cisco ASA Modular Policy Framework Overview101362 Michael Shannon IINS: Cisco ASA Posture Module101319 Michael Shannon IINS: Cisco ASA SSL Server Authentication101208 Michael Shannon IINS: Cisco ASAv Virtual Adaptive Security Appliance101330 Michael Shannon IINS: Cisco Clientless SSL VPN101332 Michael Shannon IINS: Cisco Clientless SSL VPN Resource Access Methods101331 Michael Shannon IINS: Cisco Clientless SSL VPN Use Cases101378 Michael Shannon IINS: Cisco Cloud Web Security Features and Benefits101366 Michael Shannon IINS: Cisco Collective Security Intelligence Cloud101252 Michael Shannon IINS: Cisco Common Classification Policy Language101377 Michael Shannon IINS: Cisco CWS Overview101369 Michael Shannon IINS: Cisco ESA GUI Management101347 Michael Shannon IINS: Cisco FireSIGHT Capabilities101249 Michael Shannon IINS: Cisco IOS Zone-based Policy Firewall101363 Michael Shannon IINS: Cisco ISE Posture Module104452 Michael Shannon IINS: Cisco TrustSec Benefits104445 Michael Shannon IINS: Cisco TrustSec Overview101373 Michael Shannon IINS: Cisco WSA Access Policies101374 Michael Shannon IINS: Cisco WSA Data Security Enforcement101376 Michael Shannon IINS: Cisco WSA GUI Management101375 Michael Shannon IINS: Cisco WSA Management and Reporting Capabilities101372 Michael Shannon IINS: Cisco WSA Overview101255 Michael Shannon IINS: Class Map Considerations100912 Michael Shannon IINS: Classifying Assets100914 Michael Shannon IINS: Classifying Countermeasures100913 Michael Shannon IINS: Classifying Vulnerabilities101333 Michael Shannon IINS: Clientless SSL VPN Portal101336 Michael Shannon IINS: Clientless SSL VPN URL Entry and Bookmarks100938 Michael Shannon IINS: Comparing Hashing Algorithms100942 Michael Shannon IINS: Comparing Symmetric Encryption Algorithms101045 Michael Shannon IINS: Comparison of ACS and ISE100919 Michael Shannon IINS: Compliance Regulations100926 Michael Shannon IINS: Components of a Comprehensive Security Policy100944 Michael Shannon IINS: Confidentiality with Asymmetric Encryption101064 Michael Shannon IINS: Configuration Management Protocol Options101240 Michael Shannon IINS: Configuration Tasks101223 Michael Shannon IINS: Configure Dynamic NAT on Cisco ASA101233 Michael Shannon IINS: Configure Interface Access Rules (Part 1)101234 Michael Shannon IINS: Configure Interface Access Rules (Part 2)101235 Michael Shannon IINS: Configure Interface Access Rules (Part 3)101299 Michael Shannon IINS: Configure IPsec Crypto Maps101224 Michael Shannon IINS: Configure PAT on Cisco ASA

Exhibit 1 to Addendum 3

66

DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

By CertificationCert

ExamLearning

Asset Product Title101225 Michael Shannon IINS: Configure Policy NAT on Cisco ASA101222 Michael Shannon IINS: Configure Static NAT on Cisco ASA101298 Michael Shannon IINS: Configure Symmetric Peer Crypto ACLs101294 Michael Shannon IINS: Configure Transform Sets101215 Michael Shannon IINS: Configuring Cisco ASA Interface Parameters101159 Michael Shannon IINS: Configuring Port Security (Part 1)101160 Michael Shannon IINS: Configuring Port Security (Part 2)101290 Michael Shannon IINS: Configuring Site-to-Site IPsec VPN101304 Michael Shannon IINS: Configuring Site-to-Site VPN on Cisco ASA101046 Michael Shannon IINS: Configuring SSH Access to an IOS Device101352 Michael Shannon IINS: Connection Data and Summaries101355 Michael Shannon IINS: Considerations for Sensor Placement in the Network104437 Michael Shannon IINS: Context-aware Policy Enforcement Options101072 Michael Shannon IINS: Control Plane Policing101073 Michael Shannon IINS: Control Plane Protection (Part 1)101074 Michael Shannon IINS: Control Plane Protection (Part 2)101237 Michael Shannon IINS: Create a Service Object Group101241 Michael Shannon IINS: Create a Service Policy Rule101297 Michael Shannon IINS: Create Crypto ACLs Using Extended ACLs100940 Michael Shannon IINS: Cryptanalysis101296 Michael Shannon IINS: Crypto ACL Function101272 Michael Shannon IINS: Cryptographic Algorithms in Ipsec100937 Michael Shannon IINS: Cryptographic Authentication Use Case100936 Michael Shannon IINS: Cryptographic Authentication Using Hash Technology101267 Michael Shannon IINS: Cryptographic VPNs100933 Michael Shannon IINS: Cryptology Overview101185 Michael Shannon IINS: DAI in Action101270 Michael Shannon IINS: Data Integrity100714 Michael Shannon IINS: DDoS Attacks100921 Michael Shannon IINS: Defense in Depth100923 Michael Shannon IINS: Defense in Depth: Artichoke100922 Michael Shannon IINS: Defense in Depth: Onion101182 Michael Shannon IINS: DHCP Attacks – DHCP Starvation101181 Michael Shannon IINS: DHCP Overview101183 Michael Shannon IINS: DHCP Snooping100947 Michael Shannon IINS: Digital Signature Process101054 Michael Shannon IINS: Digitally Signed Images101099 Michael Shannon IINS: Discovery 1: Cryptographic Technologies (Part 1)101100 Michael Shannon IINS: Discovery 1: Cryptographic Technologies (Part 2)101101 Michael Shannon IINS: Discovery 1: Cryptographic Technologies (Part 3)101102 Michael Shannon IINS: Discovery 1: Cryptographic Technologies (Part 4)101103 Michael Shannon IINS: Discovery 1: Cryptographic Technologies (Part 5)101242 Michael Shannon IINS: Discovery 10: Access Control Using the ASA (Part 1)101243 Michael Shannon IINS: Discovery 10: Access Control Using the ASA (Part 2)

Exhibit 1 to Addendum 3

67

DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

By CertificationCert

ExamLearning

Asset Product Title101244 Michael Shannon IINS: Discovery 10: Access Control Using the ASA (Part 3)101245 Michael Shannon IINS: Discovery 10: Access Control Using the ASA (Part 4)101246 Michael Shannon IINS: Discovery 10: Access Control Using the ASA (Part 5)101247 Michael Shannon IINS: Discovery 10: Access Control Using the ASA (Part 6)101248 Michael Shannon IINS: Discovery 10: Access Control Using the ASA (Part 7)101264 Michael Shannon IINS: Discovery 11: Cisco IOS Zone-based Firewall (Part 1)101265 Michael Shannon IINS: Discovery 11: Cisco IOS Zone-based Firewall (Part 2)101266 Michael Shannon IINS: Discovery 11: Cisco IOS Zone-based Firewall (Part 3)101286 Michael Shannon IINS: Discovery 12: Explore IPsec Technologies (Part 1)101287 Michael Shannon IINS: Discovery 12: Explore IPsec Technologies (Part 2)101288 Michael Shannon IINS: Discovery 12: Explore IPsec Technologies (Part 3)101306 Michael Shannon IINS: Discovery 13: IOS-based Site-to-Site VPN (Part 1)101307 Michael Shannon IINS: Discovery 13: IOS-based Site-to-Site VPN (Part 2)101308 Michael Shannon IINS: Discovery 13: IOS-based Site-to-Site VPN (Part 3)101309 Michael Shannon IINS: Discovery 13: IOS-based Site-to-Site VPN (Part 4)101310 Michael Shannon IINS: Discovery 14: ASA-based Site-to-Site VPN (Part 1)101311 Michael Shannon IINS: Discovery 14: ASA-based Site-to-Site VPN (Part 2)101312 Michael Shannon IINS: Discovery 14: ASA-based Site-to-Site VPN (Part 3)101313 Michael Shannon IINS: Discovery 14: ASA-based Site-to-Site VPN (Part 4)101314 Michael Shannon IINS: Discovery 14: ASA-based Site-to-Site VPN (Part 5)101323 Michael Shannon IINS: Discovery 15: Remote Access VPN (Part 1)101324 Michael Shannon IINS: Discovery 15: Remote Access VPN (Part 2)101325 Michael Shannon IINS: Discovery 15: Remote Access VPN (Part 3)101326 Michael Shannon IINS: Discovery 15: Remote Access VPN (Part 4)101327 Michael Shannon IINS: Discovery 15: Remote Access VPN (Part 5)101328 Michael Shannon IINS: Discovery 15: Remote Access VPN (Part 6)101329 Michael Shannon IINS: Discovery 15: Remote Access VPN (Part 7)101339 Michael Shannon IINS: Discovery 16: Clientless Remote Access VPN (Part 1)101340 Michael Shannon IINS: Discovery 16: Clientless Remote Access VPN (Part 2)101341 Michael Shannon IINS: Discovery 16: Clientless Remote Access VPN (Part 3)101104 Michael Shannon IINS: Discovery 2: Configure and Verify AAA (Part 1)101105 Michael Shannon IINS: Discovery 2: Configure and Verify AAA (Part 2)101106 Michael Shannon IINS: Discovery 2: Configure and Verify AAA (Part 3)101107 Michael Shannon IINS: Discovery 2: Configure and Verify AAA (Part 3)101108 Michael Shannon IINS: Discovery 2: Configure and Verify AAA (Part 5)101109 Michael Shannon IINS: Discovery 3: Configure Management Protocols (Part 1)101110 Michael Shannon IINS: Discovery 3: Configure Management Protocols (Part 2)101111 Michael Shannon IINS: Discovery 3: Configure Management Protocols (Part 3)101112 Michael Shannon IINS: Discovery 3: Configure Management Protocols (Part 4)101113 Michael Shannon IINS: Discovery 3: Configure Management Protocols (Part 5)101114 Michael Shannon IINS: Discovery 3: Configure Management Protocols (Part 6)101115 Michael Shannon IINS: Discovery 4: Securing Routing Protocols (Part 1)101116 Michael Shannon IINS: Discovery 4: Securing Routing Protocols (Part 2)101117 Michael Shannon IINS: Discovery 4: Securing Routing Protocols (Part 3)

Exhibit 1 to Addendum 3

68

DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

By CertificationCert

ExamLearning

Asset Product Title101118 Michael Shannon IINS: Discovery 4: Securing Routing Protocols (Part 4)101119 Michael Shannon IINS: Discovery 4: Securing Routing Protocols (Part 5)101120 Michael Shannon IINS: Discovery 4: Securing Routing Protocols (Part 6)101168 Michael Shannon IINS: Discovery 5: VLAN Security and ACLs (Part 1)101169 Michael Shannon IINS: Discovery 5: VLAN Security and ACLs (Part 2)101170 Michael Shannon IINS: Discovery 5: VLAN Security and ACLs (Part 3)101171 Michael Shannon IINS: Discovery 5: VLAN Security and ACLs (Part 4)101172 Michael Shannon IINS: Discovery 5: VLAN Security and ACLs (Part 5)101173 Michael Shannon IINS: Discovery 5: VLAN Security and ACLs (Part 6)101174 Michael Shannon IINS: Discovery 6: Port Security and PVLAN Edge (Part 1)101175 Michael Shannon IINS: Discovery 6: Port Security and PVLAN Edge (Part 2)101176 Michael Shannon IINS: Discovery 6: Port Security and PVLAN Edge (Part 3)101177 Michael Shannon IINS: Discovery 6: Port Security and PVLAN Edge (Part 4)101186 Michael Shannon IINS: Discovery 7: Securing DHCP; ARP; and STP (Part 1)101187 Michael Shannon IINS: Discovery 7: Securing DHCP; ARP; and STP (Part 2)101188 Michael Shannon IINS: Discovery 7: Securing DHCP; ARP; and STP (Part 3)101189 Michael Shannon IINS: Discovery 7: Securing DHCP; ARP; and STP (Part 4)101199 Michael Shannon IINS: Discovery 8: Explore Firewall Technologies (Part 1)101200 Michael Shannon IINS: Discovery 8: Explore Firewall Technologies (Part 2)101201 Michael Shannon IINS: Discovery 8: Explore Firewall Technologies (Part 3)101202 Michael Shannon IINS: Discovery 8: Explore Firewall Technologies (Part 4)101203 Michael Shannon IINS: Discovery 8: Explore Firewall Technologies (Part 5)101204 Michael Shannon IINS: Discovery 8: Explore Firewall Technologies (Part 6)101205 Michael Shannon IINS: Discovery 8: Explore Firewall Technologies (Part 7)101206 Michael Shannon IINS: Discovery 8: Explore Firewall Technologies (Part 8)101227 Michael Shannon IINS: Discovery 9: Cisco ASA Interfaces and NAT (Part 1)101228 Michael Shannon IINS: Discovery 9: Cisco ASA Interfaces and NAT (Part 2)101229 Michael Shannon IINS: Discovery 9: Cisco ASA Interfaces and NAT (Part 3)101230 Michael Shannon IINS: Discovery 9: Cisco ASA Interfaces and NAT (Part 4)101231 Michael Shannon IINS: Discovery 9: Cisco ASA Interfaces and NAT (Part 5)101145 Michael Shannon IINS: Double-tagging VLAN Hopping Attack101351 Michael Shannon IINS: Dynamic File Analysis101078 Michael Shannon IINS: EIGRP Route Authentication Process101368 Michael Shannon IINS: E-mail Message Flow101367 Michael Shannon IINS: E-mail Security Threats101357 Michael Shannon IINS: Endpoint Security Overview104450 Michael Shannon IINS: Enforcement Using SGACLs104451 Michael Shannon IINS: Enforcement Using SGFW101291 Michael Shannon IINS: Ensure That ACLs Are Compatible with IPsec101279 Michael Shannon IINS: ESP101136 Michael Shannon IINS: Ethernet Switching Overview101379 Michael Shannon IINS: Example Modular Network Architecture for Enterprise101067 Michael Shannon IINS: Example SNMP v3 Configuration101062 Michael Shannon IINS: Example Syslog Configuration

Exhibit 1 to Addendum 3

69

DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

By CertificationCert

ExamLearning

Asset Product Title101350 Michael Shannon IINS: FireSIGHT Discovery and Awareness101191 Michael Shannon IINS: Firewall Characteristics100728 Michael Shannon IINS: Firewall Overview101190 Michael Shannon IINS: Firewalls and Security Zones101043 Michael Shannon IINS: Functional Differences between RADIUS and TACACS+100726 Michael Shannon IINS: Hacking Tools100935 Michael Shannon IINS: Hashing Use Case101253 Michael Shannon IINS: Hierarchical Policies101212 Michael Shannon IINS: High Availability; Failover; and Clustering101065 Michael Shannon IINS: HTTPS Configuration and Operation101381 Michael Shannon IINS: Identity Management Overview101345 Michael Shannon IINS: IDS and IPS Actions101274 Michael Shannon IINS: IKE Phase 1101275 Michael Shannon IINS: IKE Phase 1: First Exchange101276 Michael Shannon IINS: IKE Phase 1: Second Exchange101277 Michael Shannon IINS: IKE Phase 1: Third Exchange101281 Michael Shannon IINS: IKE Phase 2101292 Michael Shannon IINS: IKE Policy Negotiation101284 Michael Shannon IINS: IKE Version 2101048 Michael Shannon IINS: Implementing Local Authentication and Authorization101370 Michael Shannon IINS: Incoming Mail Processing Overview104448 Michael Shannon IINS: Inline SGT Transport100930 Michael Shannon IINS: Inside; Outside; and DMZ101232 Michael Shannon IINS: Interface Access Rules101217 Michael Shannon IINS: Interface Configuration101273 Michael Shannon IINS: Internet Key Exchange100931 Michael Shannon IINS: Intranet; Extranet; and Internet101055 Michael Shannon IINS: IOS Resilient Configuration101262 Michael Shannon IINS: IOS Zone-based Firewall Configuration (Part 1)101263 Michael Shannon IINS: IOS Zone-based Firewall Configuration (Part 2)100731 Michael Shannon IINS: IPS Functionality100730 Michael Shannon IINS: IPS Overview101342 Michael Shannon IINS: IPS vs. IDS101282 Michael Shannon IINS: IPsec Configuration101285 Michael Shannon IINS: IPsec For IPv6101278 Michael Shannon IINS: IPsec Protocols101268 Michael Shannon IINS: IPsec Security Services101305 Michael Shannon IINS: IPsec Site-to-Site VPN Wizard104439 Michael Shannon IINS: ISE Features104438 Michael Shannon IINS: ISE Overview100956 Michael Shannon IINS: Key Management Components101041 Michael Shannon IINS: Local and Centralized AAA101068 Michael Shannon IINS: Locking Down Management Access with ACLs101198 Michael Shannon IINS: Logging

Exhibit 1 to Addendum 3

70

DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

By CertificationCert

ExamLearning

Asset Product Title101156 Michael Shannon IINS: MAC Spoofing101214 Michael Shannon IINS: Management Access Configuration100721 Michael Shannon IINS: Man-in-the-middle Attack (Part 1)100722 Michael Shannon IINS: Man-in-the-middle Attack (Part 2)101063 Michael Shannon IINS: Memory and CPU Threshold Notifications101210 Michael Shannon IINS: Modes of Deployment101254 Michael Shannon IINS: Modular; Object-oriented Configuration101302 Michael Shannon IINS: Monitoring IPsec Phase 1 SA101220 Michael Shannon IINS: NAT Deployment Modes101219 Michael Shannon IINS: NAT Example101221 Michael Shannon IINS: NAT on Cisco ASA101218 Michael Shannon IINS: NAT Overview100727 Michael Shannon IINS: Network Security Myths100909 Michael Shannon IINS: Network Security Objectives101197 Michael Shannon IINS: Next-Generation Firewalls101058 Michael Shannon IINS: NTP Authentication101059 Michael Shannon IINS: NTP Configuration Example101057 Michael Shannon IINS: NTP Overview101236 Michael Shannon IINS: Object Groups101135 Michael Shannon IINS: OSI Layer Dependencies101077 Michael Shannon IINS: OSPF Route Authentication101069 Michael Shannon IINS: Other Password Considerations101371 Michael Shannon IINS: Outgoing Mail Processing Overview100934 Michael Shannon IINS: Overview of Cryptographic Hashes100946 Michael Shannon IINS: Overview of Digital Signatures101047 Michael Shannon IINS: Overview of IOS Authorization with Privilege Levels101358 Michael Shannon IINS: Overview of Personal Firewalls101213 Michael Shannon IINS: Overview of the Cisco ASA CLI Command Set101192 Michael Shannon IINS: Packet Filters101346 Michael Shannon IINS: Packet Fragmentation Evasion Technique101153 Michael Shannon IINS: PACLs101196 Michael Shannon IINS: Pairing a Proxy Server with a Stateful Firewall100718 Michael Shannon IINS: Password Attacks100717 Michael Shannon IINS: Pharming100716 Michael Shannon IINS: Phishing100949 Michael Shannon IINS: PKI Terminology and Components101257 Michael Shannon IINS: Policy Map Actions101256 Michael Shannon IINS: Policy Map Considerations101158 Michael Shannon IINS: Port Security101179 Michael Shannon IINS: PortFast; BPDU Guard; and Root Guard101165 Michael Shannon IINS: Private VLAN Edge Overview101163 Michael Shannon IINS: Private VLANs101348 Michael Shannon IINS: Protection Across the Entire Attack Continuum101195 Michael Shannon IINS: Proxy Servers

Exhibit 1 to Addendum 3

71

DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

By CertificationCert

ExamLearning

Asset Product Title100950 Michael Shannon IINS: Public Key Cryptography Standards100729 Michael Shannon IINS: Purpose of Firewalls101166 Michael Shannon IINS: PVLAN Edge Configuration101164 Michael Shannon IINS: PVLAN Port Types100916 Michael Shannon IINS: Quantitative Risk Analysis: Example100719 Michael Shannon IINS: Reconnaissance Attacks100928 Michael Shannon IINS: Responsibilities for the Security Policy100915 Michael Shannon IINS: Risk Analysis100917 Michael Shannon IINS: Risk Analysis in Action: Risk Scores100911 Michael Shannon IINS: Risk: Motivation Meets Opportunity101380 Michael Shannon IINS: Secure Modular Network Design Principles101315 Michael Shannon IINS: Secure Sockets Layer and Transport Layer Security100920 Michael Shannon IINS: Security Architecture Design Guidelines100929 Michael Shannon IINS: Security Awareness101211 Michael Shannon IINS: Security Contexts101344 Michael Shannon IINS: Security Control Decision Classifications104446 Michael Shannon IINS: Security Group Tags and MACsec101216 Michael Shannon IINS: Security Levels in Action101354 Michael Shannon IINS: Sensor Deployment Modes101353 Michael Shannon IINS: Sensor Placement Considerations104447 Michael Shannon IINS: SGT Classification104449 Michael Shannon IINS: SGT Exchange Protocol101303 Michael Shannon IINS: show crypto ipsec sa101301 Michael Shannon IINS: show crypto map Command101293 Michael Shannon IINS: Site-to-Site IPsec Configuration – Phase 1101289 Michael Shannon IINS: Site-to-Site Tunnel Negotiation Process101066 Michael Shannon IINS: SNMPv3 Operation100715 Michael Shannon IINS: Social Engineering101356 Michael Shannon IINS: SPAN for Passive Mode Deployment101316 Michael Shannon IINS: SSL Cryptography101320 Michael Shannon IINS: SSL VPN Client Authentication101321 Michael Shannon IINS: SSL VPN Clients IP Address Assignment100927 Michael Shannon IINS: Standards; Guidelines; and Procedures101193 Michael Shannon IINS: Stateful Firewalls101194 Michael Shannon IINS: Stateful Firewalls and FTP101180 Michael Shannon IINS: STP Attack Mitigation101178 Michael Shannon IINS: STP Overview101283 Michael Shannon IINS: Suite B Cryptographic Standard100941 Michael Shannon IINS: Symmetric Encryption Algorithms101060 Michael Shannon IINS: Syslog Overview101061 Michael Shannon IINS: Syslog Severity Levels101343 Michael Shannon IINS: Terms Fundamental to IPS104443 Michael Shannon IINS: The BYOD Challenge Overview101071 Michael Shannon IINS: The Control Plane

Exhibit 1 to Addendum 3

72

DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

By CertificationCert

ExamLearning

Asset Product Title100932 Michael Shannon IINS: The Functional Planes of the Network101052 Michael Shannon IINS: The IOS File System100939 Michael Shannon IINS: The Process of Encryption100713 Michael Shannon IINS: Threatscape101295 Michael Shannon IINS: Transform Set Negotiation100918 Michael Shannon IINS: Trends in Regulatory Compliance101146 Michael Shannon IINS: Trunk Configuration and Attack Mitigation101141 Michael Shannon IINS: Trunks100948 Michael Shannon IINS: Trusted Third-party Example101280 Michael Shannon IINS: Tunnel Mode and Transport Mode100723 Michael Shannon IINS: Types of Malicious Software100955 Michael Shannon IINS: Use Case – SSL/TLS101238 Michael Shannon IINS: Use Object Groups with Access Rules101154 Michael Shannon IINS: VACLs101053 Michael Shannon IINS: Validating IOS Images Using MD5100725 Michael Shannon IINS: Vectors of Data Loss and Exfiltration101226 Michael Shannon IINS: Verify NAT Operations101056 Michael Shannon IINS: Verifying and Restoring IOS Resilient Configuration101161 Michael Shannon IINS: Verifying Port Security Configuration (Part 1)101162 Michael Shannon IINS: Verifying Port Security Configuration (Part 2)101167 Michael Shannon IINS: Verifying PVLAN Edge Configuration101300 Michael Shannon IINS: Verifying the IPsec Configuration101155 Michael Shannon IINS: Verifying VACL Configuration101139 Michael Shannon IINS: VLAN Configuration101138 Michael Shannon IINS: VLAN Example101144 Michael Shannon IINS: VLAN Hopping Attack101137 Michael Shannon IINS: VLAN Overview101140 Michael Shannon IINS: VLAN Verification100925 Michael Shannon IINS: Who Uses the Security Policy?100924 Michael Shannon IINS: Why Do You Need a Security Policy?100951 Michael Shannon IINS: X.509v3 Certificate Fields101259 Michael Shannon IINS: Zone-based Policy Firewall Rules101260 Michael Shannon IINS: Zone-based Policy Firewall Rules for Self Zone101251 Michael Shannon IINS: Zone-based Topology Examples101258 Michael Shannon IINS: Zones and Zone Pair Assignments101250 Michael Shannon IINS: Zones and Zone Pairs77192 EMC Impact Of Cloud Computing On IT Governance40694 John Wiley &

SonsImplementing SSL/TLS Using Cryptography and PKI

82854 ISACA Implementing the NIST Cybersecurity Framework72509 McGraw-

Hill/OsborneIncident Response & Computer Forensics; Third Edition

77754 Syngress Publishing

Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid; SCADA; and other Industrial Control Systems; Second Edition

34549 Springer Information Assurance

Exhibit 1 to Addendum 3

73

DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

By CertificationCert

ExamLearning

Asset Product Title59308 IGI Global Information Assurance and Security Technologies for Risk Assessment and Threat

Management: Advances26436 Auerbach

PublicationsInformation Assurance Architecture

72511 McGraw-Hill/Osborne

Information Assurance Handbook: Effective Computer Security and Risk Management Strategies

7095 Butterworth-Heinemann

Information Assurance: Managing Organizational IT Security Risks81728 Butterworth-

HeinemannInformation Governance and Security: Protecting and Managing Your Company's Proprietary Information

73421 Syngress Publishing

Information Hiding in Speech Signals for Secure Communication29596 John Wiley &

SonsInformation Nation: Seven Keys to Information Management Compliance

69893 IGI Global Information Quality and Governance for Business Intelligence64603 BCS Information Risk Management: A Practitioner's Guide77762 Syngress

PublishingInformation Security Analytics: Finding Security Insights; Patterns; and Anomalies in Big Data

62644 John Wiley & Sons

Information Security and IT Risk Management72600 IGI Global Information Security in Diverse Computing Environments36392 ISACA Information Security Management Audit/Assurance Program47188 Auerbach

PublicationsInformation Security Management Handbook; Sixth Edition; Volume 5

51962 Auerbach Publications

Information Security Management Handbook; Sixth Edition; Volume 736951 Auerbach

PublicationsInformation Security Risk Analysis; Third Edition

47319 Syngress Publishing

Information Security Risk Assessment Toolkit: Practical Assessments Through Data Collection and Data Analysis

36118 IT Governance Information Security Risk Management for ISO27001/ISO1779993177 IT Governance Information Security: A Practical Guide35183 John Wiley &

SonsInformation Technology Risk Management in Enterprise Environments: A Review of Industry Practices and a Practical Guide to Risk Management Teams

63594 John Wiley & Sons

Information Warfare; 2nd Edition31244 IGI Global Innovative Automatic Identification and Location-Based Services: Form Bar Codes to

Chip Implants76673 Springer Innovative Technologies for Dependable OTS-Based Critcal Systems73407 Butterworth-

HeinemannIntegrated Security Systems Design: A Complete Reference for Building Enterprise-Wide Digital Security Systems; Second Edition

26443 Auerbach Publications

Intelligent Network Video: Understanding Modern Video Surveillance Systems51030 Academic Press Intelligent Systems for Security Informatics36954 Auerbach

PublicationsInternet Searches for Vetting; Investigations; and Open-Source Intelligence

43523 Cengage Learning

Internet Security You Can Afford: The Untangle Internet Gateway74139 Auerbach

PublicationsIntroduction to Certificateless Cryptography

77013 Springer Introduction to Cryptography with Maple

Exhibit 1 to Addendum 3

74

DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

By CertificationCert

ExamLearning

Asset Product Title66998 Syngress

PublishingIntroduction to Information Security: A Strategic-Based Approach

77024 Springer Introduction to Public Key Infrastructures51068 Butterworth-

HeinemannIntroduction to Security; Ninth Edition

51925 Auerbach Publications

Introduction to Surveillance Studies76688 Springer Intrusion Detection for IP-Based Multimedia Communications over Wireless Networks47297 Auerbach

PublicationsIntrusions: How Hackers Get In and the Evidence They Leave Behind

46450 IGI Global Investigating Cyber Law and Cyber Ethics: Issues; Impacts and Practices40214 Apress iOS Forensic Analysis for iPhone; iPad; and iPod Touch46155 John Wiley &

SonsiOS Hacker's Handbook

40086 McGraw-Hill/Osborne

iPad & iPhone Administrators Guide: Enterprise Deployment Strategies and Security Solutions

41867 Syngress Publishing

iPhone and iOS Forensics: Investigation; Analysis and Mobile Security for Apple iPhone; iPad; and iOS Devices

49459 ISACA IPv6 Security Audit/Assurance Program45388 Cisco Press IPv6 Security: Information Assurance for the Next-Generation Internet Protocol41212 IT Governance ISO14001 Step by Step: A Practical Guide56021 IT Governance ISO22301: A Pocket Guide36126 IT Governance ISO27001 in a Windows Environment: The Best Practice Handbook for a Microsoft

Windows Environment; Second Edition73960 IT Governance ISO27001 in a Windows® Environment: The Best Practice Handbook for a Microsoft®

Windows Environment; 3rd Edition30808 ISACA IT Assurance Guide: Using COBIT26448 Auerbach

PublicationsIT Auditing and Sarbanes-Oxley Compliance: Key Strategies for Business Improvement

30809 ISACA IT Control Objectives for BASEL II: The Importance of Governance and Risk Management for Compliance

43478 ISACA IT Control Objectives for Cloud Computing: Controls and Assurance in the Cloud30810 ISACA IT Control Objectives for Sarbanes-Oxley: The Role of IT in the Design and

Implementation of Internal Control Over Financial Reporting; 2nd Edition82855 ISACA IT Control Objectives for Sarbanes-Oxley: Using COBIT 5 in the Design and

Implementation of Internal Controls over Financial Reporting; 3rd Edition90875 Kogan Page IT Governance: An International Guide to Data Security and ISO27001/ISO27002; 6th

Edition56013 IT Governance IT Induction and Information Security Awareness: A Pocket Guide45816 ISACA IT Risk Management Audit/Assurance Program40089 McGraw-

Hill/OsborneIT Security Metrics: A Practical Framework for Measuring Security & Protecting Data

37797 IT Governance IT Strategic and Operational Controls45813 ISACA IT Tactical Management Audit/Assurance Program30811 ISACA ITAF: A Professional Practices Framework for IT Assurance69913 IGI Global Judiciary-Friendly Forensics of Software Copyright Infringement25436 Syngress

PublishingJuniper Networks Secure Access SSL VPN Configuration Guide

Exhibit 1 to Addendum 3

75

DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

By CertificationCert

ExamLearning

Asset Product Title69821 Jones and

Bartlett LearningLegal Issues in Information Security; Second Edition

56027 EMC Leveraging Big Data to Battle Cyber Threats: A New Security Paradigm51022 Syngress

PublishingLogging and Log Management: The Authoritative Guide to Understanding the Concepts Surrounding Logging and Log Management

51195 John Wiley & Sons (UK)

LTE Security; Second Edition40737 John Wiley &

SonsMac Security Bible

51199 John Wiley & Sons (UK)

Machine Learning in Image Steganalysis51968 Auerbach

PublicationsMalicious Code and Your Enterprise: What It Is and How to Stop It

40131 Syngress Publishing

Managed Code Rootkits: Hooking into Runtime Environments41543 TSO; Ltd Management of Risk: Guidance for Practitioners36966 Auerbach

PublicationsManaging an Information Security and Privacy Awareness and Training Program; Second Edition

32239 Syngress Publishing

Managing Catastrophic Loss of Sensitive Data: A Guide for IT and Security Professionals

73136 EMC Managing Data Protection for a Better Night’s Sleep34443 IT Governance Managing Information Risk: A Director's Guide94353 IT Governance Managing Information Security Breaches: Studies from Real Life; Second Edition81725 Butterworth-

HeinemannManaging Online Risk: Apps; Mobile; and Social Media Security

51883 Apress Managing Risk and Information Security: Protect to Enable51970 Auerbach

PublicationsManaging Risk and Security in Outsourcing IT Services: Onshore; Offshore and the Cloud

69822 Jones and Bartlett Learning

Managing Risk in Information Systems; Second Edition

73433 Butterworth-Heinemann

Measuring and Managing Information Risk: A Fair Approach14080 Syngress

PublishingMetasploit Toolkit: For Penetration Testing; Exploit Development; and Vulnerability Research

43618 No Starch Press Metasploit: The Penetration Tester's Guide40133 Syngress

PublishingMetrics and Methods for Security Risk Management

45810 ISACA Microsoft Exchange Server 2010 Audit/Assurance Program45241 Fair Trade DX Microsoft Office 365 Security Essentials61512 Joe Barrett Microsoft SharePoint Server 2013: App Permission Request Scopes61511 Joe Barrett Microsoft SharePoint Server 2013: App Permissions61510 Joe Barrett Microsoft SharePoint Server 2013: Authenticating a User from a Client Application61506 Joe Barrett Microsoft SharePoint Server 2013: Create a Custom Membership Provider61507 Joe Barrett Microsoft SharePoint Server 2013: Create a Custom Role Provider61509 Joe Barrett Microsoft SharePoint Server 2013: Create a Custom Sign-in Page61500 Joe Barrett Microsoft SharePoint Server 2013: Create Custom Permissions

Exhibit 1 to Addendum 3

76

DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

By CertificationCert

ExamLearning

Asset Product Title61499 Joe Barrett Microsoft SharePoint Server 2013: Create Role Definitions61504 Joe Barrett Microsoft SharePoint Server 2013: Custom Claim Providers61502 Joe Barrett Microsoft SharePoint Server 2013: Enabling Anonymous Access61503 Joe Barrett Microsoft SharePoint Server 2013: Implement Impersonation61501 Joe Barrett Microsoft SharePoint Server 2013: Maintain Permissions61505 Joe Barrett Microsoft SharePoint Server 2013: Package and Deploy a Custom Claims Provider61508 Joe Barrett

Microsoft SharePoint Server 2013: Package and Deploy a Custom Membership Provider

61516 Joe Barrett Microsoft SharePoint Server 2013: SharePoint App TokenHelper Class61514 Joe Barrett Microsoft SharePoint Server 2013: Specifying Permissions for Corporate Catalog Apps61513 Joe Barrett Microsoft SharePoint Server 2013: Specifying Permissions for Office Store Apps61515 Joe Barrett Microsoft SharePoint Server 2013: Specifying Permissions for Remote Apps43479 ISACA Microsoft SQL Server Database Audit/Assurance Program69439 Mitchel Sellers Microsoft Visual Studio 2013 with C#: Asymmetric Key Pairs in Windows Store Apps69448 Mitchel Sellers

Microsoft Visual Studio 2013 with C#: Asynchronous Strategies for Windows Store Apps

69444 Mitchel SellersMicrosoft Visual Studio 2013 with C#: Basic Background File Transfer in Windows Store Apps

69437 Mitchel Sellers Microsoft Visual Studio 2013 with C#: Certificate Requests in Windows Store Apps69454 Mitchel Sellers

Microsoft Visual Studio 2013 with C#: Consuming a WinMD Component in a Windows Store App

69443 Mitchel SellersMicrosoft Visual Studio 2013 with C#: Creating a Background Task in Windows Store Apps

69453 Mitchel Sellers Microsoft Visual Studio 2013 with C#: Creating a WinMD Component in C#69432 Mitchel Sellers Microsoft Visual Studio 2013 with C#: Creating Hash Values in Windows Store Apps69440 Mitchel Sellers

Microsoft Visual Studio 2013 with C#: Encryption with a Public Key in Windows Store Apps

69435 Mitchel SellersMicrosoft Visual Studio 2013 with C#: Implementing Symmetric Decryption with Windows Store Apps

69434 Mitchel SellersMicrosoft Visual Studio 2013 with C#: Implementing Symmetric Encryption with Windows Store Apps

69438 Mitchel Sellers Microsoft Visual Studio 2013 with C#: Installing a Certificate with Windows Store Apps69452 Mitchel Sellers Microsoft Visual Studio 2013 with C#: Introducing WinMD Components69447 Mitchel Sellers

Microsoft Visual Studio 2013 with C#: Lock Screen Access to Windows Store App Background Tasks

69433 Mitchel SellersMicrosoft Visual Studio 2013 with C#: Obtaining Symmetric Keys in Windows Store Apps

69445 Mitchel SellersMicrosoft Visual Studio 2013 with C#: Optimizing Background Transfers in Windows Store Apps

69442 Mitchel SellersMicrosoft Visual Studio 2013 with C#: Overview of Background Tasks in Windows Store Apps

69446 Mitchel SellersMicrosoft Visual Studio 2013 with C#: Updating a Windows Store App Tile with a Background Task

Exhibit 1 to Addendum 3

77

DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

By CertificationCert

ExamLearning

Asset Product Title69449 Mitchel Sellers Microsoft Visual Studio 2013 with C#: Using Data Parallelism in Windows Store Apps69450 Mitchel Sellers Microsoft Visual Studio 2013 with C#: Using Task Parallelism in Windows Store Apps69436 Mitchel Sellers Microsoft Visual Studio 2013: Overview of Certificates in Windows Store Apps69431 Mitchel Sellers Microsoft Visual Studio 2013: Overview of Encryption in Windows Store Apps43253 Sybex Microsoft Windows Security: Essentials93277 McGraw-

Hill/OsborneMike Meyers' CompTIA Security+ Certification Guide (Exam SY0-401)

72499 McGraw-Hill/Osborne

Mike Meyers’ CompTIA Security+ Certification Passport; Fourth Edition (Exam SY0-401)

35970 McGraw-Hill/Osborne

Mobile Application Security41428 ISACA Mobile Computing Security Audit/Assurance Program85986 Syngress

PublishingMobile Data Loss Prevention

44392 John Wiley & Sons

Mobile Device Security for Dummies34445 IT Governance Mobile Security: A Pocket Guide24416 John Wiley &

SonsModern Cryptanalysis: Techniques for Advanced Code Breaking

77026 Springer Modern Cryptography Primer: Theoretical Foundations and Practical Applications39950 ISACA Monitoring Internal Control Systems and IT: A Primer for Business Executives;

Managers and Auditors on How to Embrace and Advance Best Practices22316 Cambridge

University PressMulti-application Smart Cards: Technology and Applications

69914 IGI Global Multidisciplinary Perspectives in Cryptology and Information Security61776 Auerbach

PublicationsMultilevel Security for Relational Databases

31950 John Wiley & Sons

Network Access Control for Dummies30152 Packt Publishing Network Administration with FreeBSD 7: Building; Securing; and Maintaining Networks

with the FreeBSD Operating System80730 John Wiley &

SonsNetwork Attacks & Exploitation: A Framework

76711 Springer Network Hardening: An Automated Approach to Improving Network Security76766 Springer Network Science and Cybersecurity91934 IGI Global Network Security Attacks and Countermeasures57135 IGI Global Network Security Technologies: Design and Applications69817 Jones and

Bartlett LearningNetwork Security; Firewalls and VPNs; Second Edition

47281 Auerbach Publications

New Directions of Modern Cryptography83474 IGI Global New Threats and Countermeasures in Digital Crime and Cyber Terrorism88834 IGI Global Next Generation Wireless Network Security and Privacy47266 Auerbach

PublicationsNoiseless Steganography: The Key to Covert Communications

Exhibit 1 to Addendum 3

78

DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

By CertificationCert

ExamLearning

Asset Product Title94359 IT Governance Once More Unto the Breach: Managing Information Security in an Uncertain World;

Second Edition73434 Butterworth-

HeinemannOnline Security for the Business Traveler

30150 Packt Publishing Openfire Administration: A Practical Step-by-Step Guide to Rolling Out a Secure Instant Messaging Service Over Your Network

91942 Syngress Publishing

Operating System Forensics78684 Syngress

PublishingOptimizing IEEE 802.11i Resource and Security Essentials: For Mobile and Stationary Devices

15395 Oracle Press Oracle E-Business Suite Security26461 Auerbach

PublicationsOracle Identity Management: Governance; Risk; and Compliance Architecture; Third Edition

36113 IT Governance Outsourcing IT: A Governance Guide87533 Hilton Giesenow OWASP Top 10: Authenticating with External Logins in ASP.NET MVC76600 OpenTask Pattern-Oriented Memory Forensics: A Pattern Language Approach78679 Syngress

PublishingPCI Compliance: Understand and Implement Effective PCI Data Security Standard Compliance; Fourth Edition

43948 IT Governance PCI DSS: A Practical Guide to Implementing and Maintaining Compliance; Third Edition69068 IT Governance Penetration Testing Services Procurement Guide47049 IT Governance Penetration Testing: Protecting Networks and Systems61778 Auerbach

PublicationsPersonal Mobile Devices in the Enterprise: Security and Privacy Concerns

76730 Springer Pervasive Wireless Environments: Detecting and Localizing User Spoofing14138 No Starch Press PGP & GPG: Email for the Practical Paranoid82506 John Wiley &

SonsPhishing Dark Waters: The Offensive and Defensive Sides of Malicious Emails

13609 Digital Press Physical Security for IT81563 Cambridge

University PressPhysical-Layer Security: From Information Theory to Security Engineering

61756 Auerbach Publications

Practical Cryptography: Algorithms and Implementations Using C++77623 Apress Practical Hadoop Security62680 John Wiley &

SonsPractical Reverse Engineering: x86; x64; ARM; Windows Kernel; Reversing Tools; and Obfuscation

77187 McGraw-Hill/Osborne

Principles of Computer Security Lab Manual; Fourth Edition49814 Springer Privacy and Security for Cloud Computing36978 Auerbach

PublicationsPrivate Security and the Investigative Process; Third Edition

53255 Apress Pro ASP.NET Web API Security: Securing ASP.NET Web API40195 Apress Pro PHP Security: From Application Security Principles to the Implementation of XSS

Defenses; Second Edition69069 IT Governance Procuring Penetration Testing Services33956 Cengage

LearningProtecting Games: A Security Handbook for Game Developers and Publishers

7373 Auerbach Publications

Public Key Infrastructure: Building Trusted Applications and Web Services

Exhibit 1 to Addendum 3

79

DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

By CertificationCert

ExamLearning

Asset Product Title66988 Syngress

PublishingPython Forensics

50908 IT Governance Resilient Thinking: Protecting Organisations in the 21st Century51969 Auerbach

PublicationsResponsive Security: Be Ready to Be Secure

31038 Springer RFID Security: Techniques; Protocols and System-On-Chip Design51053 Butterworth-

HeinemannRisk Analysis and the Security Survey; Fourth Edition

82381 John Wiley & Sons

Risk Centric Threat Modeling: Process for Attack Simulation and Threat Analysis82856 ISACA Risk Scenarios: Using COBIT 5 for Risk11268 John Wiley &

SonsRisks; Controls; and Security: Concepts and Applications; 1st Edition

27197 Artech House Role-Based Access Control; Second Edition80705 John Wiley &

SonsSafeguarding Critical E-Documents: Implementing a Program for Securing Confidential Information Assets

25440 Syngress Publishing

Sarbanes-Oxley IT Compliance Using Open Source Tools; Second Edition82534 John Wiley &

SonsSecrets and Lies: Digital Security in a Networked World; 15th Anniversary Edition

36986 Auerbach Publications

Secure and Resilient Software Development52002 Auerbach

PublicationsSecure Data Provenance and Inference Control with Semantic Web

61794 Auerbach Publications

Secure Development for Mobile Apps: How to Design and Code Secure Mobile Applications with PHP and JavaScript

36987 Auerbach Publications

Secure Java: For Web Application Development84449 Chris Keenan Secure Programming for .NET: .NET Framework Security84452 Chris Keenan Secure Programming for .NET: .NET Security Namespaces84460 Chris Keenan Secure Programming for .NET: ASP.NET Code Access Security84450 Chris Keenan Secure Programming for .NET: Authentication in .NET84464 Chris Keenan Secure Programming for .NET: CAS Configuration84469 Chris Keenan Secure Programming for .NET: Common Threats to .NET84473 Chris Keenan Secure Programming for .NET: Creating a Secure .NET Application84467 Chris Keenan Secure Programming for .NET: Encrypting and Decrypting Data in .NET84457 Chris Keenan Secure Programming for .NET: GenericPrincipal and GenericIdentity Objects84459 Chris Keenan Secure Programming for .NET: Imperative Security Checks84458 Chris Keenan Secure Programming for .NET: Impersonation in .NET84463 Chris Keenan Secure Programming for .NET: Link Demands and CAS84453 Chris Keenan Secure Programming for .NET: Microsoft Secure Development Lifecycle (SDL)84454 Chris Keenan Secure Programming for .NET: Permissions and Role-based Security84456 Chris Keenan Secure Programming for .NET: Replacing Principal Objects84451 Chris Keenan Secure Programming for .NET: Secure Coding in .NET84471 Chris Keenan Secure Programming for .NET: Securing ASP.NET Web Forms84472 Chris Keenan Secure Programming for .NET: Securing Data Access in .NET84470 Chris Keenan Secure Programming for .NET: Security Tools for .NET84461 Chris Keenan Secure Programming for .NET: Security-Transparent Code in .NET

Exhibit 1 to Addendum 3

80

DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

By CertificationCert

ExamLearning

Asset Product Title84465 Chris Keenan Secure Programming for .NET: The .NET Cryptography Model84468 Chris Keenan Secure Programming for .NET: Using Hash Codes for Data Integrity in .NET84466 Chris Keenan Secure Programming for .NET: Using Keys for Encryption in .NET84462 Chris Keenan Secure Programming for .NET: Working with Partially Trusted Code in .NET84455 Chris Keenan Secure Programming for .NET: Working with the WindowsPrincipal Object36988 Auerbach

PublicationsSecure Semantic Service-Oriented Systems

47388 Jones and Bartlett Learning

Secure Software Design

69621 EMC Secured Cloud Computing78988 EMC Securely Enabling Mobility & BYOD in Organizations50156 IT Governance Securing Cloud Services: A Pragmatic Approach to Security Architecture in the Cloud97762 Dan Lachance Securing Mobile Devices in the Enterprise - Exercise: Configuring Intune97746 Dan Lachance Securing Mobile Devices in the Enterprise - Exercise: Mitigating Threat for BYOD and COD Devices97721 Dan Lachance Securing Mobile Devices in the Enterprise - Exercise: Securing Back-end Systems97710 Dan Lachance Securing Mobile Devices in the Enterprise: Application Hardening97741 Dan Lachance Securing Mobile Devices in the Enterprise: Application Wrapper Overview97477 Dan Lachance Securing Mobile Devices in the Enterprise: Assessing Mobile Threats97483 Dan Lachance Securing Mobile Devices in the Enterprise: Asymmetric Encryption Overview97709 Dan Lachance Securing Mobile Devices in the Enterprise: Back-end Security Requirements97465 Dan Lachance Securing Mobile Devices in the Enterprise: Broken Cryptography97714 Dan Lachance Securing Mobile Devices in the Enterprise: Building a Demilitarized Zone97471 Dan Lachance Securing Mobile Devices in the Enterprise: Business Impacts of Exploits97739 Dan Lachance Securing Mobile Devices in the Enterprise: BYOD Container Usage Scenarios97738 Dan Lachance Securing Mobile Devices in the Enterprise: BYOD Containers97466 Dan Lachance Securing Mobile Devices in the Enterprise: Client-side Injection97740 Dan Lachance Securing Mobile Devices in the Enterprise: Configuring BYOD Containers97735 Dan Lachance Securing Mobile Devices in the Enterprise: Configuring Perfect Forward Secrecy97759 Dan Lachance Securing Mobile Devices in the Enterprise: Configuring the Microsoft Intune Connector Role97727 Dan Lachance Securing Mobile Devices in the Enterprise: Configuring Unmanaged Android Devices97728 Dan Lachance Securing Mobile Devices in the Enterprise: Configuring Unmanaged iOS Devices97729 Dan Lachance Securing Mobile Devices in the Enterprise: Configuring Unmanaged Windows Phone Devices97737 Dan Lachance Securing Mobile Devices in the Enterprise: Configuring Virtual Private Networks97749 Dan Lachance Securing Mobile Devices in the Enterprise: Creating a Microsoft Intune Account97708 Dan Lachance Securing Mobile Devices in the Enterprise: Creating Certificates97479 Dan Lachance Securing Mobile Devices in the Enterprise: Cryptography One-way Functions97478 Dan Lachance Securing Mobile Devices in the Enterprise: Cryptography Usage97755 Dan Lachance Securing Mobile Devices in the Enterprise: Deploy Enterprise Profiles in Microsoft Intune97473 Dan Lachance Securing Mobile Devices in the Enterprise: Device Authorization and Authentication Requirements97474 Dan Lachance Securing Mobile Devices in the Enterprise: Device Sensor; Jailbreak; & MDM System Requirements97707 Dan Lachance Securing Mobile Devices in the Enterprise: Digital Certificates Overview97704 Dan Lachance Securing Mobile Devices in the Enterprise: Digital Signing Overview97756 Dan Lachance Securing Mobile Devices in the Enterprise: Distribute Apps in Microsoft Intune

Exhibit 1 to Addendum 3

81

DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

By CertificationCert

ExamLearning

Asset Product Title97731 Dan Lachance Securing Mobile Devices in the Enterprise: Encrypting Cloud Data97753 Dan Lachance Securing Mobile Devices in the Enterprise: Enforcing Configurations in Microsoft Intune97751 Dan Lachance Securing Mobile Devices in the Enterprise: Enrolling Devices in Microsoft Intune97747 Dan Lachance Securing Mobile Devices in the Enterprise: Enterprise Mobile Device Security Challenges97748 Dan Lachance Securing Mobile Devices in the Enterprise: Enterprise Mobile Device Security Model Solution97732 Dan Lachance Securing Mobile Devices in the Enterprise: Exchange ActiveSync Functionality97754 Dan Lachance Securing Mobile Devices in the Enterprise: Handling Certificates in Microsoft Intune97480 Dan Lachance Securing Mobile Devices in the Enterprise: Hashing Overview97456 Dan Lachance Securing Mobile Devices in the Enterprise: Identifying Risks97468 Dan Lachance Securing Mobile Devices in the Enterprise: Improper Session Handling97713 Dan Lachance Securing Mobile Devices in the Enterprise: Infrastructure Security Requirements97461 Dan Lachance Securing Mobile Devices in the Enterprise: Insecure Data Storage97462 Dan Lachance Securing Mobile Devices in the Enterprise: Insufficient Transport Layer Protection97706 Dan Lachance Securing Mobile Devices in the Enterprise: Key Distribution97469 Dan Lachance Securing Mobile Devices in the Enterprise: Lack of Binary Protections97733 Dan Lachance Securing Mobile Devices in the Enterprise: Managing Devices with Exchange ActiveSync97744 Dan Lachance Securing Mobile Devices in the Enterprise: Microsoft Azure Rights Management Overview97743 Dan Lachance Securing Mobile Devices in the Enterprise: Mitigating Code Vulnerabilities in Apps97742 Dan Lachance Securing Mobile Devices in the Enterprise: Mitigating Malicious App Functionality97720 Dan Lachance Securing Mobile Devices in the Enterprise: Mobile Device Management Systems97453 Dan Lachance Securing Mobile Devices in the Enterprise: Mobile Device Overview97723 Dan Lachance Securing Mobile Devices in the Enterprise: Mobile Device Ownership Models97750 Dan Lachance Securing Mobile Devices in the Enterprise: Navigating Microsoft Intune97455 Dan Lachance Securing Mobile Devices in the Enterprise: Overview of Security97705 Dan Lachance Securing Mobile Devices in the Enterprise: Performing Digital Signing97703 Dan Lachance Securing Mobile Devices in the Enterprise: Performing Encryption97481 Dan Lachance Securing Mobile Devices in the Enterprise: Performing Hashing97464 Dan Lachance Securing Mobile Devices in the Enterprise: Poor Authorization and Authentication97761 Dan Lachance Securing Mobile Devices in the Enterprise: Preparing for iOS Mobile Device Enrollment97760 Dan Lachance Securing Mobile Devices in the Enterprise: Preparing for Windows Mobile Device Enrollment97757 Dan Lachance Securing Mobile Devices in the Enterprise: Protect Data in Microsoft Intune97745 Dan Lachance Securing Mobile Devices in the Enterprise: Protecting Content with Microsoft Azure RMS97719 Dan Lachance Securing Mobile Devices in the Enterprise: Protecting Data at Rest and in Transit97712 Dan Lachance Securing Mobile Devices in the Enterprise: Protecting the Transport Layer97722 Dan Lachance Securing Mobile Devices in the Enterprise: Requirements for the Mobile Enterprise97715 Dan Lachance Securing Mobile Devices in the Enterprise: Reverse Proxy Features97718 Dan Lachance Securing Mobile Devices in the Enterprise: Rights Management Systems97711 Dan Lachance Securing Mobile Devices in the Enterprise: Secure App Deployment97730 Dan Lachance Securing Mobile Devices in the Enterprise: Secure Cloud Storage97475 Dan Lachance Securing Mobile Devices in the Enterprise: Secure Device Connectivity and App Requirements97472 Dan Lachance Securing Mobile Devices in the Enterprise: Secure Device Data-handling Requirements97476 Dan Lachance Securing Mobile Devices in the Enterprise: Secure Device User Requirements97716 Dan Lachance Securing Mobile Devices in the Enterprise: Securing Directory Services and CA97717 Dan Lachance Securing Mobile Devices in the Enterprise: Securing E-mail Services

Exhibit 1 to Addendum 3

82

DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

By CertificationCert

ExamLearning

Asset Product Title97467 Dan Lachance Securing Mobile Devices in the Enterprise: Security Decisions via Untrusted Inputs97459 Dan Lachance Securing Mobile Devices in the Enterprise: Sensitive Data Storage and Transport97457 Dan Lachance Securing Mobile Devices in the Enterprise: Sensitive Mobile Assets97458 Dan Lachance Securing Mobile Devices in the Enterprise: Sensitive Usage of Mobile Devices97734 Dan Lachance Securing Mobile Devices in the Enterprise: Short-lived Session Keys97482 Dan Lachance Securing Mobile Devices in the Enterprise: Symmetric Encryption Overview97758 Dan Lachance Securing Mobile Devices in the Enterprise: System Center Configuration Manager Overview97752 Dan Lachance Securing Mobile Devices in the Enterprise: Targeting Devices in Microsoft Intune97470 Dan Lachance Securing Mobile Devices in the Enterprise: Technical Impacts of Exploits97454 Dan Lachance Securing Mobile Devices in the Enterprise: The Mobile Security Landscape97463 Dan Lachance Securing Mobile Devices in the Enterprise: Unintended Data Leakage97725 Dan Lachance Securing Mobile Devices in the Enterprise: Unmanaged Company-owned Devices97726 Dan Lachance Securing Mobile Devices in the Enterprise: Unmanaged Device User Policies97724 Dan Lachance Securing Mobile Devices in the Enterprise: Unmanaged Devices in a Small Organization97736 Dan Lachance Securing Mobile Devices in the Enterprise: Virtual Private Networking Overview97460 Dan Lachance Securing Mobile Devices in the Enterprise: Weak Server-side Controls63345 ISACA Securing Mobile Devices Using COBIT 5 for Information Security74138 Auerbach

PublicationsSecuring Systems: Applied Security Architecture and Threat Models

41880 Syngress Publishing

Securing the Cloud: Cloud Computer Security Techniques and Tactics51947 Auerbach

PublicationsSecuring the Cloud: Security Strategies for the Ubiquitous Data Center

37288 Syngress Publishing

Securing the Smart Grid: Next Generation Power Grid Security

84415 Aaron Sampson Securing User Accounts: Account Change Risks84361 Aaron Sampson Securing User Accounts: Account Protocols84387 Aaron Sampson Securing User Accounts: Account Verification84381 Aaron Sampson Securing User Accounts: Asymmetric Key Credentials84416 Aaron Sampson Securing User Accounts: At-risk Account Attributes84374 Aaron Sampson Securing User Accounts: Authentication and Identification84379 Aaron Sampson Securing User Accounts: Authentication Credentials Overview84376 Aaron Sampson Securing User Accounts: Authentication Types84350 Aaron Sampson Securing User Accounts: Authenticity84377 Aaron Sampson Securing User Accounts: Authorization84383 Aaron Sampson Securing User Accounts: Biometric Credentials84421 Aaron Sampson Securing User Accounts: Collecting Attack Evidence

Exhibit 1 to Addendum 3

83

DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

By CertificationCert

ExamLearning

Asset Product Title84403 Aaron Sampson Securing User Accounts: Common Logon Attacks84352 Aaron Sampson Securing User Accounts: Confidentiality84419 Aaron Sampson Securing User Accounts: Confirming Account Changes84356 Aaron Sampson Securing User Accounts: CSRF84420 Aaron Sampson Securing User Accounts: Dealing with Compromised Systems84364 Aaron Sampson Securing User Accounts: Defense in Depth84373 Aaron Sampson Securing User Accounts: Determining Appropriate User Account Policies84400 Aaron Sampson Securing User Accounts: Development Best Practices84370 Aaron Sampson Securing User Accounts: Disabling Unused Accounts84389 Aaron Sampson Securing User Accounts: Enabling Two-Step Verification84395 Aaron Sampson Securing User Accounts: Enforcing Password History Policies84362 Aaron Sampson Securing User Accounts: Event Logging84418 Aaron Sampson Securing User Accounts: Implementing Account Change Notifications84413 Aaron Sampson Securing User Accounts: Implementing Verification Questions84349 Aaron Sampson Securing User Accounts: Importance of User Account Security84351 Aaron Sampson Securing User Accounts: Integrity84368 Aaron Sampson Securing User Accounts: Limiting Logon Attempts84404 Aaron Sampson Securing User Accounts: Logon Fraud Detection and Prevention84402 Aaron Sampson Securing User Accounts: Managing Simultaneous Sessions84367 Aaron Sampson Securing User Accounts: Naming Conventions84360 Aaron Sampson Securing User Accounts: Network Protocols84422 Aaron Sampson Securing User Accounts: Neutralizing Attacks84411 Aaron Sampson Securing User Accounts: Overview of Password Reset84405 Aaron Sampson Securing User Accounts: Overview of the Logoff Feature84399 Aaron Sampson Securing User Accounts: Overview of the Logon Feature84396 Aaron Sampson Securing User Accounts: Password Age Policies

Exhibit 1 to Addendum 3

84

DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

By CertificationCert

ExamLearning

Asset Product Title84392 Aaron Sampson Securing User Accounts: Password Complexity Requirements84380 Aaron Sampson Securing User Accounts: Password Credentials84393 Aaron Sampson Securing User Accounts: Password Field Security84410 Aaron Sampson Securing User Accounts: Password Hashing Best Practices84414 Aaron Sampson Securing User Accounts: Password Hints84409 Aaron Sampson Securing User Accounts: Password Storage Best Practices84391 Aaron Sampson Securing User Accounts: Password Strength Criteria84394 Aaron Sampson Securing User Accounts: Password Strength Feedback84417 Aaron Sampson Securing User Accounts: Password Verification for Changes84359 Aaron Sampson Securing User Accounts: Patches and Updates84366 Aaron Sampson Securing User Accounts: Permissions Categories84390 Aaron Sampson Securing User Accounts: Preventing Username Enumeration84363 Aaron Sampson Securing User Accounts: Principle of Least Privilege84365 Aaron Sampson Securing User Accounts: Privilege Management84397 Aaron Sampson Securing User Accounts: Protecting against Password Hacking84385 Aaron Sampson Securing User Accounts: Registration Basics84407 Aaron Sampson Securing User Accounts: Remote Logoff84423 Aaron Sampson Securing User Accounts: Securing Account Access and Mitigating Risk84408 Aaron Sampson Securing User Accounts: Securing Logoff Against CSRF84398 Aaron Sampson Securing User Accounts: Securing User Account Registration84353 Aaron Sampson Securing User Accounts: Security Attack Motives84354 Aaron Sampson Securing User Accounts: Security Attack Phases84406 Aaron Sampson Securing User Accounts: Session Expiry84369 Aaron Sampson Securing User Accounts: Setting Account Expiry Dates84372 Aaron Sampson Securing User Accounts: Setting Machine Restrictions84371 Aaron Sampson Securing User Accounts: Setting Time Restrictions

Exhibit 1 to Addendum 3

85

DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

By CertificationCert

ExamLearning

Asset Product Title84384 Aaron Sampson Securing User Accounts: Ticket-based Hybrid Authentication84412 Aaron Sampson Securing User Accounts: Timed Password Reset84375 Aaron Sampson Securing User Accounts: User Authentication Components84378 Aaron Sampson Securing User Accounts: User Logon Process84386 Aaron Sampson Securing User Accounts: Username Best Practices84355 Aaron Sampson Securing User Accounts: Username Enumeration84388 Aaron Sampson Securing User Accounts: Using CAPTCHA84401 Aaron Sampson Securing User Accounts: Using SSL for Logon Security84358 Aaron Sampson Securing User Accounts: Vulnerability Scanning84357 Aaron Sampson Securing User Accounts: Web Server Password Cracking77747 Syngress

PublishingSecuring VoIP: Keeping Your VoIP Network Safe

74511 In Easy Steps Securing your PC90830 Mercury Learning Security & Management (2014 Conf. Proceedings)47366 Butterworth-

HeinemannSecurity and Loss Prevention: An Introduction; 5th Edition

47303 Auerbach Publications

Security and Privacy in Smart Grids76620 Springer Security and Privacy in Social Networks47269 Auerbach

PublicationsSecurity and Safety Requirements for Software-Intensive Systems

64608 BCS Security Architect: Careers in IT Service Management88818 Syngress

PublishingSecurity Controls Evaluation;Testing and Assessment Handbook

47195 Auerbach Publications

Security De-Engineering: Solving the Problems in Information Risk Management49831 IGI Global Security Engineering for Cloud Computing: Approaches and Tools25211 John Wiley &

SonsSecurity Engineering: A Guide to Building Dependable Distributed Systems; Second Edition

73435 Butterworth-Heinemann

Security for Business Professionals: How to Plan; Implement; and Manage Your Company's Security Program

76684 Springer Security for Cloud Storage Systems76710 Springer Security for Multi-hop Wireless Networks35699 Springer Security for Web Services and Service-Oriented Architectures76680 Springer Security for Wireless Implantable Medical Devices47270 Auerbach

PublicationsSecurity for Wireless Sensor Networks using Identity-Based Cryptography

34543 Springer Security in Computing Systems25704 World Scientific

Publishing CoSecurity in Distributed and Networking Systems: Computer and Network Security; Vol. 1

43498 Springer Security in Embedded Devices

Exhibit 1 to Addendum 3

86

DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

By CertificationCert

ExamLearning

Asset Product Title82535 John Wiley &

SonsSecurity Intelligence: A Practitioner's Guide to Solving Enterprise Security Challenges

30499 Auerbach Publications

Security of Mobile Communications69823 Jones and

Bartlett LearningSecurity Policies and Implementation Issues; Second Edition

70002 Butterworth-Heinemann

Security Risk Assessment: Managing Physical and Operational Security43285 John Wiley &

SonsSecurity Risk Management Body of Knowledge

41881 Syngress Publishing

Security Risk Management: Building an Information Security Risk Management Program from the Ground up

68270 Chandos Publishing

Security Risks in Social Media Technologies: Safe Practices in Public Service Applications

26472 Auerbach Publications

Security Software Development: Assessing and Managing Security Risks97659 Jones and

Bartlett LearningSecurity Strategies in Linux Platforms and Applications; 2nd edition

34428 IT Governance Security Testing Handbook for Banking Applications30842 ISACA Security; Audit and Control Features Oracle E-Business Suite: A Technical and Risk

Management Reference Guide; 2nd Edition30843 ISACA Security; Audit and Control Features PeopleSoft: A Technical and Risk Management

Reference Guide; 2nd Edition64561 IGI Global Security; Privacy; Trust; and Resource Management in Mobile and Wireless

Communications69912 IGI Global Security; Trust; and Regulatory Aspects of Cloud Computing in Business Environments37233 Syngress

PublishingSeven Deadliest USB Attacks

36363 Syngress Publishing

Seven Deadliest Web Application Attacks54046 Syngress

PublishingSimple Steps to Data Encryption: A Practical Guide to Secure Computing

91948 Syngress Publishing

Smart Grid Security: Innovative Solutions for a Modernized Grid72510 McGraw-

Hill/OsborneSocial Engineering in IT Security: Tools; Tactics; and Techniques

66989 Syngress Publishing

Social Engineering Penetration Testing: Executing Social Engineering Pen Tests; Assessments and Defense

41429 ISACA Social Media Audit/Assurance Program97515 Kogan Page Social Media Risk and Governance: Managing Enterprise Risk10712 Syngress

PublishingSockets; Shellcode; Porting & Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals

39329 IGI Global Software Engineering for Secure Systems: Industrial and Research Perspectives49261 Syngress

PublishingSQL Injection Attacks and Defense; Second Edition

44153 McGraw-Hill/Osborne

SSCP Systems Security Certified Practitioner: All-in-One Exam Guide91488 Dan Lachance SSystems Security Certified Practitioner: (ISC)2 Code of Ethics83275 EMC Storage Security Design - A Method to Help Embrace Cloud Computing

Exhibit 1 to Addendum 3

87

DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

By CertificationCert

ExamLearning

Asset Product Title37289 Academic Press Straight Through Processing for Financial Services: The Complete Guide65223 The MIT Press Surveillance or Security? The Risks Posed by New Wiretapping Technologies37727 IGI Global Surveillance Technologies and Early Warning Systems: Data Mining Applications for

Risk Detection37800 IT Governance Swanson on Internal Auditing: Raising the Bar69813 Jones and

Bartlett LearningSystem Forensics; Investigation and Response; Second Edition

28338 MC Press System i Disaster Recovery Planning91569 Dan Lachance Systems Security Certified Practitioner: Access Control and Monitoring91570 Dan Lachance Systems Security Certified Practitioner: Access Control Standards and Protocols91560 Dan Lachance Systems Security Certified Practitioner: Administration and Validation91601 Dan Lachance Systems Security Certified Practitioner: Application Vulnerabilities91590 Dan Lachance Systems Security Certified Practitioner: Application White Listing91548 Dan Lachance Systems Security Certified Practitioner: Applying Hashing91549 Dan Lachance Systems Security Certified Practitioner: Applying Salting91557 Dan Lachance Systems Security Certified Practitioner: Appropriate Use91602 Dan Lachance Systems Security Certified Practitioner: Architecture and Design Vulnerabilities91486 Dan Lachance Systems Security Certified Practitioner: Attribute-based Access Control91522 Dan Lachance Systems Security Certified Practitioner: Audit Findings91470 Dan Lachance Systems Security Certified Practitioner: Authentication Overview91477 Dan Lachance Systems Security Certified Practitioner: Authorization91540 Dan Lachance Systems Security Certified Practitioner: Chain of Custody91600 Dan Lachance Systems Security Certified Practitioner: Cloud Security Outsourcing Requirements91597 Dan Lachance Systems Security Certified Practitioner: Cloud Virtualization91566 Dan Lachance Systems Security Certified Practitioner: Common Ports and Protocols91531 Dan Lachance Systems Security Certified Practitioner: Communicating Findings91568 Dan Lachance Systems Security Certified Practitioner: Communications Network Attacks and Countermeasures91502 Dan Lachance Systems Security Certified Practitioner: Compensating Controls91511 Dan Lachance Systems Security Certified Practitioner: Configuration Management Plan Implementation91606 Dan Lachance Systems Security Certified Practitioner: Continuity and Resilience91567 Dan Lachance Systems Security Certified Practitioner: Converged Communications91501 Dan Lachance Systems Security Certified Practitioner: Corrective Controls91507 Dan Lachance Systems Security Certified Practitioner: Data Asset Management91553 Dan Lachance Systems Security Certified Practitioner: Data Sensitivity91599 Dan Lachance Systems Security Certified Practitioner: Data Storage and Transmission91500 Dan Lachance Systems Security Certified Practitioner: Detective Controls91487 Dan Lachance Systems Security Certified Practitioner: Determining Appropriate Access Controls91498 Dan Lachance Systems Security Certified Practitioner: Deterrent Controls91473 Dan Lachance Systems Security Certified Practitioner: Device Authentication91551 Dan Lachance Systems Security Certified Practitioner: Digital Signatures91484 Dan Lachance Systems Security Certified Practitioner: Discretionary Access Control91542 Dan Lachance Systems Security Certified Practitioner: Emergency Response Plans and Procedures91591 Dan Lachance Systems Security Certified Practitioner: Endpoint Encryption

Exhibit 1 to Addendum 3

88

DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

By CertificationCert

ExamLearning

Asset Product Title91555 Dan Lachance Systems Security Certified Practitioner: End-user Training91481 Dan Lachance Systems Security Certified Practitioner: Entitlement91530 Dan Lachance Systems Security Certified Practitioner: Event Data Analysis91525 Dan Lachance Systems Security Certified Practitioner: Events of Interest91539 Dan Lachance Systems Security Certified Practitioner: Evidence Handling91576 Dan Lachance Systems Security Certified Practitioner: Firewalls and Proxies91538 Dan Lachance Systems Security Certified Practitioner: First Responder91505 Dan Lachance Systems Security Certified Practitioner: Hardware Asset Management91588 Dan Lachance Systems Security Certified Practitioner: HIDS91589 Dan Lachance Systems Security Certified Practitioner: Host-based Firewalls91604 Dan Lachance Systems Security Certified Practitioner: Hypervisor91586 Dan Lachance Systems Security Certified Practitioner: Identifying Malicious Activity91556 Dan Lachance Systems Security Certified Practitioner: Implementation Variation91545 Dan Lachance Systems Security Certified Practitioner: Implementing Backup and Redundancy Options91537 Dan Lachance Systems Security Certified Practitioner: Implementing Countermeasures91563 Dan Lachance Systems Security Certified Practitioner: Implementing Cryptographic Systems91503 Dan Lachance Systems Security Certified Practitioner: Implementing Operational Security Controls91562 Dan Lachance Systems Security Certified Practitioner: Implementing Secure Protocols91533 Dan Lachance Systems Security Certified Practitioner: Incident Discovery91534 Dan Lachance Systems Security Certified Practitioner: Incident Escalation91536 Dan Lachance Systems Security Certified Practitioner: Incident Response91543 Dan Lachance Systems Security Certified Practitioner: Interim Processing Strategies91524 Dan Lachance Systems Security Certified Practitioner: Interpreting Scanning and Testing Results91598 Dan Lachance Systems Security Certified Practitioner: Legal and Privacy Concerns91504 Dan Lachance Systems Security Certified Practitioner: Lifecycle Asset Management91526 Dan Lachance Systems Security Certified Practitioner: Logging91480 Dan Lachance Systems Security Certified Practitioner: Maintenance91587 Dan Lachance Systems Security Certified Practitioner: Malicious Activity Countermeasures91584 Dan Lachance Systems Security Certified Practitioner: Malicious Code91585 Dan Lachance Systems Security Certified Practitioner: Malicious Code Countermeasures91510 Dan Lachance Systems Security Certified Practitioner: Managerial Controls91482 Dan Lachance Systems Security Certified Practitioner: Mandatory Access Control91593 Dan Lachance Systems Security Certified Practitioner: Mobile Device Management91532 Dan Lachance Systems Security Certified Practitioner: Monitoring and Analyzing Risk91572 Dan Lachance Systems Security Certified Practitioner: Network Access Attacks and Countermeasures91577 Dan Lachance Systems Security Certified Practitioner: Network Intrusion Detection and Prevention Systems91565 Dan Lachance Systems Security Certified Practitioner: Network Topographies and Relationships91483 Dan Lachance Systems Security Certified Practitioner: Non-discretionary Access Control91552 Dan Lachance Systems Security Certified Practitioner: Non-repudiation91474 Dan Lachance Systems Security Certified Practitioner: One-way Trust Relationships91595 Dan Lachance Systems Security Certified Practitioner: Operation Models91509 Dan Lachance Systems Security Certified Practitioner: Operational Controls91489 Dan Lachance Systems Security Certified Practitioner: Organizational Code of Ethics91564 Dan Lachance Systems Security Certified Practitioner: OSI and TCP/IP Models

Exhibit 1 to Addendum 3

89

DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

By CertificationCert

ExamLearning

Asset Product Title91516 Dan Lachance Systems Security Certified Practitioner: Participating in Physical Security Operations91517 Dan Lachance Systems Security Certified Practitioner: Participating in Security Administration91515 Dan Lachance Systems Security Certified Practitioner: Participating in Security Awareness and Training91523 Dan Lachance Systems Security Certified Practitioner: Participating in Security Testing and Evaluation91514 Dan Lachance Systems Security Certified Practitioner: Patch Management91573 Dan Lachance Systems Security Certified Practitioner: Plane Separation91541 Dan Lachance Systems Security Certified Practitioner: Preservation of Scene91499 Dan Lachance Systems Security Certified Practitioner: Preventative Controls91478 Dan Lachance Systems Security Certified Practitioner: Proofing91479 Dan Lachance Systems Security Certified Practitioner: Provisioning91559 Dan Lachance Systems Security Certified Practitioner: Public Key Infrastructure91554 Dan Lachance Systems Security Certified Practitioner: Regulatory Requirements91571 Dan Lachance Systems Security Certified Practitioner: Remote Access Operation and Configuration91535 Dan Lachance Systems Security Certified Practitioner: Reporting and Feedback Loops91547 Dan Lachance Systems Security Certified Practitioner: Responding to Incidents91544 Dan Lachance Systems Security Certified Practitioner: Restoration Planning91520 Dan Lachance Systems Security Certified Practitioner: Risk Assessment91519 Dan Lachance Systems Security Certified Practitioner: Risk Management Concepts91521 Dan Lachance Systems Security Certified Practitioner: Risk Treatment91518 Dan Lachance Systems Security Certified Practitioner: Risk Visibility and Reporting91485 Dan Lachance Systems Security Certified Practitioner: Role-based Access Control91578 Dan Lachance Systems Security Certified Practitioner: Routers and Switches91594 Dan Lachance Systems Security Certified Practitioner: Secure Browsing91575 Dan Lachance Systems Security Certified Practitioner: Secure Device Management91583 Dan Lachance Systems Security Certified Practitioner: Securing Networks and Communications91609 Dan Lachance Systems Security Certified Practitioner: Securing Systems and Applications91528 Dan Lachance Systems Security Certified Practitioner: Security Analytics; Metrics and Trends91512 Dan Lachance Systems Security Certified Practitioner: Security Impact Assessment91574 Dan Lachance Systems Security Certified Practitioner: Segmentation91596 Dan Lachance Systems Security Certified Practitioner: Service Models91608 Dan Lachance Systems Security Certified Practitioner: Shared Storage91472 Dan Lachance Systems Security Certified Practitioner: Single Sign-on91471 Dan Lachance Systems Security Certified Practitioner: Single/Multifactor Authentication91506 Dan Lachance Systems Security Certified Practitioner: Software Asset Management91603 Dan Lachance Systems Security Certified Practitioner: Software-defined Networking91527 Dan Lachance Systems Security Certified Practitioner: Source Systems91550 Dan Lachance Systems Security Certified Practitioner: Symmetric and Asymmetric Encryption91513 Dan Lachance Systems Security Certified Practitioner: System Architecture and Interoperability91508 Dan Lachance Systems Security Certified Practitioner: Technical Controls91546 Dan Lachance Systems Security Certified Practitioner: Testing and Drills91579 Dan Lachance Systems Security Certified Practitioner: Traffic-shaping Devices91476 Dan Lachance Systems Security Certified Practitioner: Transitive Trust91592 Dan Lachance Systems Security Certified Practitioner: Trusted Platform Module91475 Dan Lachance Systems Security Certified Practitioner: Two-way Trust Relationships

Exhibit 1 to Addendum 3

90

DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

By CertificationCert

ExamLearning

Asset Product Title91493 Dan Lachance Systems Security Certified Practitioner: Understanding Accountability91492 Dan Lachance Systems Security Certified Practitioner: Understanding Availability91490 Dan Lachance Systems Security Certified Practitioner: Understanding Confidentiality91491 Dan Lachance Systems Security Certified Practitioner: Understanding Integrity91496 Dan Lachance Systems Security Certified Practitioner: Understanding Least Privilege91495 Dan Lachance Systems Security Certified Practitioner: Understanding Non-repudiation91494 Dan Lachance Systems Security Certified Practitioner: Understanding Privacy91497 Dan Lachance Systems Security Certified Practitioner: Understanding Separation of Duties91605 Dan Lachance Systems Security Certified Practitioner: Virtual Appliances91607 Dan Lachance Systems Security Certified Practitioner: Virtual Environment Attacks and Countermeasures91529 Dan Lachance Systems Security Certified Practitioner: Visualization91561 Dan Lachance Systems Security Certified Practitioner: Web of Trust91581 Dan Lachance Systems Security Certified Practitioner: Wireless Security Devices91582 Dan Lachance Systems Security Certified Practitioner: Wireless Technologies Attacks and Countermeasures91580 Dan Lachance Systems Security Certified Practitioner: Wireless Transmission Security1065 Computing

McGraw-HillTCP/IP: Architecture; Protocols; and Implementation with IPv6 and IP Security

6019 John Wiley & Sons

The Art of Deception: Controlling the Human Element of Security63748 John Wiley &

SonsThe Art of Memory Forensics: Detecting Malware and Threats in Windows; Linux; and Mac Memory

78129 Syngress Publishing

The Basics of Digital Forensics: The Primer for Getting Started in Digital Forensics; Second Edition

44730 Syngress Publishing

The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy

66986 Syngress Publishing

The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice; Second Edition

58875 Syngress Publishing

The Basics of IT Audit: Purposes; Processes; and Practical Information25442 Syngress

PublishingThe Best Damn IT Security Management Book Period

73967 No Starch Press The Book of PF: A No-Nonsense Guide to the OpenBSD Firewall; 3rd Edition35748 ISACA The Business Case Guide: Using Val IT 2.074135 Auerbach

PublicationsThe Chief Information Security Officer: Roles and Responsibilities

88816 Syngress Publishing

The Cloud Security Ecosystem: Technical; Legal; Business and Management Issues35342 Cisco Press The Complete Cisco VPN Configuration Guide32022 John Wiley &

SonsThe CSSLP Prep Guide: Mastering the Certified Secure Software Lifecycle Professional

51917 Auerbach Publications

The Definitive Guide to Complying with the HIPAA/HITECH Privacy and Security Rules49761 John Wiley &

SonsThe Future of Privacy and IT Security

11213 John Wiley & Sons

The GSEC Prep Guide: Mastering SANS GIAC Security Essentials47323 Syngress

PublishingThe Hacker's Guide to OS X: Exploiting OS X from the Root Up

72526 Apress The InfoSec Handbook: An Introduction to Information Security

Exhibit 1 to Addendum 3

91

DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

By CertificationCert

ExamLearning

Asset Product Title32217 Syngress

PublishingThe IT Regulatory and Standards Compliance Handbook: How to Survive Information Systems Audit and Assessments

17101 John Wiley & Sons

The Joy of SOX: Why Sarbanes-Oxley and Service-Oriented Architecture May Be the Best Thing That Ever Happened to You

78462 Apress The Manager’s Guide to Web Application Security: A Concise Guide to the Weaker Side of the Web

80674 John Wiley & Sons

The Mobile Application Hacker's Handbook82556 John Wiley &

SonsThe Network Security Test Lab: A Step-by-Step Guide

3959 Auerbach Publications

The Privacy Papers: Managing Technology; Consumer; Employee; and Legislative Actions

63772 John Wiley & Sons

The Realities of Securing Big Data34359 ISACA The Risk IT Framework37005 Auerbach

PublicationsThe Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments; Second Edition

99321 No Starch Press The Smart Girl's Guide to Privacy47716 No Starch Press The Tangled Web: A Guide to Securing Modern Web Applications93180 IT Governance The Tao of Open Source Intelligence54377 IGI Global Theory and Practice of Cryptography Solutions for Secure Information Systems62717 John Wiley &

SonsThreat Modeling: Designing for Security

84155Charles Robinson TOGAF 9.1: Architectural Artifacts

84156Charles Robinson TOGAF 9.1: Architectural Deliverables

84166Charles Robinson TOGAF 9.1: Architecture Board

84165Charles Robinson TOGAF 9.1: Architecture Capability

84138Charles Robinson TOGAF 9.1: Architecture Change Management (H)

84167Charles Robinson TOGAF 9.1: Architecture Compliance

84168Charles Robinson TOGAF 9.1: Architecture Contracts

84169Charles Robinson TOGAF 9.1: Architecture Governance

84170Charles Robinson TOGAF 9.1: Architecture Maturity Models

84159Charles Robinson TOGAF 9.1: Architecture Partitioning

84145Charles Robinson TOGAF 9.1: Architecture Patterns

84143Charles Robinson TOGAF 9.1: Architecture Principles

84160Charles Robinson TOGAF 9.1: Architecture Repository

84171Charles Robinson TOGAF 9.1: Architecture Skills Framework

Exhibit 1 to Addendum 3

92

DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

By CertificationCert

ExamLearning

Asset Product Title84157

Charles Robinson TOGAF 9.1: Building Blocks

84146Charles Robinson TOGAF 9.1: Business Scenarios

84150Charles Robinson TOGAF 9.1: Business Transformation Readiness Assessment

84152Charles Robinson TOGAF 9.1: Capability-Based Planning

84154Charles Robinson TOGAF 9.1: Content Metamodel

84158Charles Robinson TOGAF 9.1: Enterprise Continuum

84162Charles Robinson TOGAF 9.1: Foundation Architecture

84147Charles Robinson TOGAF 9.1: Gap Analysis

84137Charles Robinson TOGAF 9.1: Implementation Governance (G)

84163Charles Robinson TOGAF 9.1: Integrated Information Infrastructure Reference Model

84149Charles Robinson TOGAF 9.1: Interoperability

84153Charles Robinson TOGAF 9.1: Introduction

84164Charles Robinson TOGAF 9.1: Introduction

84140Charles Robinson TOGAF 9.1: Iteration and Landscape

84148Charles Robinson TOGAF 9.1: Migration

84139Charles Robinson TOGAF 9.1: Requirements Management

84151Charles Robinson TOGAF 9.1: Risk Management

84141Charles Robinson TOGAF 9.1: Security

84142Charles Robinson TOGAF 9.1: SOA

84144Charles Robinson TOGAF 9.1: Stakeholder Management

84161Charles Robinson TOGAF 9.1: Tools

74143 CRC Press Touchless Fingerprint Biometrics59654 Cambridge

University PressTrust; Computing; and Society

47151 Newnes Trusted Platform Module Basics: Using TPM in Embedded Systems93179 IT Governance Two-Factor Authentication52918 John Wiley &

SonsUnderstanding and Conducting Information Systems Auditing

80664 John Wiley & Sons (UK)

Understanding Bitcoin: Cryptography; Engineering and Economics

Exhibit 1 to Addendum 3

93

DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

By CertificationCert

ExamLearning

Asset Product Title26486 Auerbach

PublicationsUnderstanding Surveillance Technologies: Spy Devices; Privacy; History; & Applications; Revised and Expanded Second Edition

62722 John Wiley & Sons

Unmasking the Social Engineer: The Human Element of Security51287 John Wiley &

SonsVehicle Safety Communications: Protocols; Security; and Privacy

51017 Syngress Publishing

Violent Python: A Cookbook for Hackers; Forensic Analysts; Penetration Testers and Security Engineers

37234 Syngress Publishing

Virtualization and Forensics: A Digital Forensic Investigator's Guide to Virtual Environments

32213 Syngress Publishing

Virtualization for Security: Including Sandboxing; Disaster Recovery; High Availability; Forensic Analysis; and Honeypotting

51288 Sybex Virtualization Security: Protecting Virtualized Environments35752 Cengage

LearningVMware ESXi: Planning; Implementation; and Security

45817 ISACA Voice Over Internet Protocol (VoIP) Audit/Assurance Program35322 Cisco Press Voice over IP Security51293 John Wiley &

SonsWeb Application Defender's Cookbook: Battling Hackers and Protecting Users

41893 Syngress Publishing

Web Application Obfuscation: '-/WAFs..dEvasion..dFilters//alert (/Obfuscation/)-'94363 IT Governance Web Application Security is a Stack: How to CYA (Cover Your Apps) Completely44154 McGraw-

Hill/OsborneWeb Application Security: A Beginner's Guide

40873 John Wiley & Sons

Web Commerce Security: Design and Development51953 Auerbach

PublicationsWeb Security: A WhiteHat Perspective

34038 IGI Global Web Services Security Development and Architecture: Theoretical and Practical Issues74410 EMC What Is The Power Of RecoverPoint?84474 Dan Lachance What's New in CISSP 2015: Exam Update Overview84476 Dan Lachance What's New in CISSP 2015: New Testing Domains84477 Dan Lachance What's New in CISSP 2015: New Testing Topics84475 Dan Lachance What's New in CISSP 2015: Previous Testing Domains53996 Syngress

PublishingWindows 2012 Server Network Security: Securing Your Windows Network Systems and Infrastructure

36393 ISACA Windows Active Directory Audit/Assurance Program67001 Syngress

PublishingWindows Forensic Analysis Toolkit; Fourth Edition: Advanced Analysis Techniques for Windows 8

51903 Auerbach Publications

Windows Networking Tools: The Complete Guide to Management; Troubleshooting; and Security

87559 Hilton Giesenow Windows PowerShell Desired State Configuration: Configure a Pull Server and 2 Nodes87551 Hilton Giesenow

Windows PowerShell Desired State Configuration: Configuring Clients to Connect to a Pull Server

87556 Hilton GiesenowWindows PowerShell Desired State Configuration: Configuring Multiple Servers and Role Types

87557 Hilton Giesenow Windows PowerShell Desired State Configuration: Configuring Similar Sets of Servers

Exhibit 1 to Addendum 3

94

DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

By CertificationCert

ExamLearning

Asset Product Title87548 Hilton Giesenow Windows PowerShell Desired State Configuration: Configuring the LCM in Pull Mode87546 Hilton Giesenow Windows PowerShell Desired State Configuration: Configuring the LCM in Push Mode87538 Hilton Giesenow Windows PowerShell Desired State Configuration: Creating a MOF Using a DSC Script87550 Hilton Giesenow Windows PowerShell Desired State Configuration: Creating an HTTP Pull Server87549 Hilton Giesenow Windows PowerShell Desired State Configuration: Creating an SMB Pull Server87558 Hilton Giesenow Windows PowerShell Desired State Configuration: Dealing with Credentials87555 Hilton Giesenow Windows PowerShell Desired State Configuration: Dealing with Parameters87554 Hilton Giesenow

Windows PowerShell Desired State Configuration: Deploying Resources to Clients via an HTTP Pull Server

87537 Hilton GiesenowWindows PowerShell Desired State Configuration: Examining and Deploying a MOF File

87539 Hilton Giesenow Windows PowerShell Desired State Configuration: Examining DSC Resources87535 Hilton Giesenow

Windows PowerShell Desired State Configuration: Examining System Configuration Prior to DSC

87553 Hilton GiesenowWindows PowerShell Desired State Configuration: Finding; Retrieving; and Using New Resources

87544 Hilton Giesenow Windows PowerShell Desired State Configuration: Local Configuration Manager87543 Hilton Giesenow Windows PowerShell Desired State Configuration: Logging with DSC87536 Hilton Giesenow Windows PowerShell Desired State Configuration: Preparing your Environment for DSC87545 Hilton Giesenow Windows PowerShell Desired State Configuration: Pull and Push Configuration Modes87547 Hilton Giesenow Windows PowerShell Desired State Configuration: Querying Node Status87552 Hilton Giesenow Windows PowerShell Desired State Configuration: Securing an HTTP Pull Server87540 Hilton Giesenow Windows PowerShell Desired State Configuration: Using Standard Resources87534 Hilton Giesenow Windows PowerShell Desired State Configuration: What is Desired State Configuration87542 Hilton Giesenow

Windows PowerShell Desired State Configuration: Working with Distributed Dependencies

87541 Hilton Giesenow Windows PowerShell Desired State Configuration: Working with Local Dependencies41894 Syngress

PublishingWindows Registry Forensics: Advanced Digital Forensic Analysis of the Windows Registry

53997 Syngress Publishing

Windows Server 2012 Security from End to Edge and Beyond: Architecting; Designing; Planning; and Deploying Windows Server 2012 Security Solutions

92023 Jones and Bartlett Learning

Wireless and Mobile Device Security

52938 John Wiley & Sons (UK)

Wireless Mobile Internet Security; Second Edition

Exhibit 1 to Addendum 3

95

DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

By CertificationCert

ExamLearning

Asset Product Title14081 Syngress

PublishingWireshark & Ethereal Network Protocol Analyzer Toolkit; Jay Beale's Open Source Security Series

25446 Syngress Publishing

XSS Attacks: Cross Site Scripting Exploits and Defense56583 Syngress

PublishingX-Ways Forensics Practitioner’s Guide

30165 Packt Publishing Zenoss Core Network and System Monitoring: A Step-by-Step Guide to Configuring; Using; and Adapting the Free Open-Source Network Monitoring System

Exhibit 1 to Addendum 3

96

DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Defensive Programming in C/C++Defensive Coding Fundamentals for C/C++Defensive Coding for C/C++

Defensive Programming in C#Defensive Coding Fundamentals for C#Defensive Coding for C#

Defensive Programming in JavaScript and HTML5Defensive Coding Fundamentals for JavaScript and HTML5Defensive Coding for JavaScript and HTML5

Defensive Programming in iOSThinking Defensively about Functions, Methods, and InputManaging Network InteractionErrors, Exceptions, and TestingProtecting Data in iOS Apps

CompTIA Security+ SY0-401CompTIA Security+ SY0-401: Control Fundamentals and Security ThreatsCompTIA Security+ SY0-401: Network Protocols, Attacks, and DefensesCompTIA Security+ SY0-401: Creating Secure NetworksCompTIA Security+ SY0-401: Vulnerability Assessment and Penetration TestingCompTIA Security+ SY0-401: Authentication, Biometrics, and Security ControlsCompTIA Security+ SY0-401: Securing a Networked EnvironmentCompTIA Security+ SY0-401: Remote Access, Mobile, and Wireless SecurityCompTIA Security+ SY0-401: Cryptographic Methods and Public Key InfrastructuresCompTIA Security+ SY0-401: Securing Applications, Virtualization, and the CloudCompTIA Security+ SY0-401: Continuity, Disaster Recovery, and Computer Forensics

CompTIA Mobility+ MB0-001CompTIA Mobility+ MB0-001: Over The Air TechnologiesCompTIA Mobility+ MB0-001: Network InfrastructureCompTIA Mobility+ MB0-001: Mobile Device Management 1CompTIA Mobility+ MB0-001: Mobile Device Management 2CompTIA Mobility+ MB0-001: SecurityCompTIA Mobility+ MB0-001: Troubleshooting 1CompTIA Mobility+ MB0-001: Troubleshooting 2

Certified Internet Security Auditor (CISA)CISA Domain: The Process of Auditing Information Systems - Part 1CISA Domain: The Process of Auditing Information Systems - Part 2CISA Domain: Governance and Management of IT - Part 1CISA Domain: Governance and Management of IT - Part 2CISA Domain: IS Acquisition, Development, and Implementation - Part 1CISA Domain: IS Acquisition, Development and Implementation - Part 2CISA Domain: IS Operations, Maintenance and Support - Part 1CISA Domain: IS Operations, Maintenance, and Support - Part 2CISA Domain: Protection of Information Assets - Part 1

By SeriesSeries Course Title

Exhibit 1 to Addendum 3

97

DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

By SeriesSeries Course Title

CISA Domain: Protection of Information Assets - Part 2CISA Domain: IS Acquisition, Development and Implementation - Part 3

Certified Ethical Hacker (CEH) v8Certified Ethical Hacker (CEH) v8: Hacking and Penetration TestingCertified Ethical Hacker (CEH) v8: Footprinting and ReconnaissanceCertified Ethical Hacker (CEH) v8: Network ScanningCertified Ethical Hacker (CEH) v8: Enumeration and CryptographyCertified Ethical Hacker (CEH) v8: System HackingCertified Ethical Hacker (CEH) v8: MalwareCertified Ethical Hacker (CEH) v8: SniffingCertified Ethical Hacker (CEH) v8: Social EngineeringCertified Ethical Hacker (CEH) v8: Denial of Service and Session HijackingCertified Ethical Hacker (CEH) v8: Hacking Web ServersCertified Ethical Hacker (CEH) v8: Hacking Web ApplicationsCertified Ethical Hacker (CEH) v8: SQL InjectionCertified Ethical Hacker (CEH) v8: Hacking Wireless NetworksCertified Ethical Hacker (CEH) v8: Hacking Mobile PlatformsCertified Ethical Hacker (CEH) v8: Evading IDS, Firewalls, and HoneypotsCertified Ethical Hacker (CEH) v8: Buffer Overflow

Certified Information Security Manager (CISM)CISM: Information Security Governance (Part 1)CISM: Information Security Governance (Part 2)CISM: Information Security Governance (Part 3)CISM: Information Risk Management and Compliance (Part 1)CISM: Information Risk Management and Compliance (Part 2)CISM: Information Security Program Development and Management (Part 1)CISM: Information Security Program Development and Management (Part 2)CISM: Information Security Program Development and Management (Part 3)CISM: Information Security Program Development and Management (Part 4)CISM: Information Security Program Development and Management (Part 5)CISM: Information Security Incident Management (Part 1)CISM: Information Security Incident Management (Part 2)

CompTIA Advanced Security Practitioner CAS-002CompTIA CASP CAS-002: Cryptography and Enterprise Storage ConcernsCompTIA CASP CAS-002: Advanced Network Design, Management, and ControlsCompTIA CASP CAS-002: Security Controls for HostsCompTIA CASP CAS-002: Application Vulnerabilities and Security ControlsCompTIA CASP CAS-002: Industry Influences, Risk Planning, Strategy, and ControlCompTIA CASP CAS-002: Privacy Policies & Procedures and Incident RecoveryCompTIA CASP CAS-002: Research, Analysis and AssessmentCompTIA CASP CAS-002: Integration of Computing, Communications, and DisciplinesCompTIA CASP CAS-002: Technical Integration of Enterprise Components

Microsoft Security FundamentalsMicrosoft Security Fundamentals: Security Layers

Exhibit 1 to Addendum 3

98

DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

By SeriesSeries Course Title

Microsoft Security Fundamentals: Operating System SecurityMicrosoft Security Fundamentals: Network SecurityMicrosoft Security Fundamentals: Security Software

Certified Secure Software Lifecycle Professional (CSSLP)CSSLP: Secure Software ConceptsCSSLP: Secure Software RequirementsCSSLP: Secure Software DesignCSSLP: Secure Software Implementation and CodingCSSLP: Secure Software TestingCSSLP: Software Acceptance, Deployment, Operations, Maintenance, and DisposalCSSLP: Supply Chain and Software Acquisition

OWASP Top 10Introduction to OWASP and the Top 10OWASP Mitigations for .NET

Foundations of Android SecurityAndroid Architecture, Protection, and Development Best PracticesAndroid Security Vulnerabilities, Testing, and Enterprise Considerations

Foundations of iOS SecurityiOS Security Architecture and Application Data ProtectionSecuring Against Threats, Securing for Enterprise, and Jailbreaking Devices

Cryptography FundamentalsCryptography Fundamentals: Defining CryptographyCryptography Fundamentals: Applying Cryptography

Securing User AccountsSecuring User Accounts: Fundamental Security ConceptsSecuring User Accounts: Authorization, Registration, and PasswordsSecuring User Accounts: Logon, Logoff, Account Changes, and Attack Mitigation

What's New in CISSP 2015Changes to CISSP 2015

IINS 2.0: Implementing Cisco IOS Network SecurityCisco IINS 2.0: Introducing Networking Security FundamentalsCisco IINS 2.0: Security Policies and StrategiesCisco IINS 2.0: Cisco Network Foundation ProtectionCisco IINS 2.0: Securing the Management Plane and AAA ConfigurationCisco IINS 2.0: Securing the Data Plane on Cisco SwitchesCisco IINS 2.0: Securing the Data Plane in IPv6 EnvironmentsCisco IINS 2.0: Threat Control, Mitigation, and FirewallsCisco IINS 2.0: Implementing Firewall PoliciesCisco IINS 2.0: Implementing IPSCisco IINS 2.0: VPN Technologies and Public Key InfrastructureCisco IINS 2.0: IPsec Fundamentals and VPNs

Cisco SENSS 1.0SENSS 1.0: Secure Design PrinciplesSENSS 1.0: Deploying Cisco IOS Control and Management Plane Security Controls

Exhibit 1 to Addendum 3

99

DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

By SeriesSeries Course Title

SENSS 1.0: Deploying Cisco Traffic Telemetry MethodsSENSS 1.0: Deploying Cisco IOS Layer 2 and Layer 3 Data Plane Security ControlsSENSS 1.0: NAT Deployment on Cisco IOS Software and Cisco ASASENSS 1.0: Firewall Threat Controls and Basic Cisco ASA Policy ConfigurationSENSS 1.0: Deploying Advanced Cisco ASA Access PoliciesSENSS 1.0: Deploying Reputation and Identity-Based Cisco ASA Access PoliciesSENSS 1.0: Threat Controls Deployment on Cisco IOS Software

Cisco SITCS 1.0: Implementing Cisco Threat Control SolutionsCisco SITCS 1.0: Cisco ASA (CX) NGFW Services ICisco SITCS 1.0: Cisco ASA (CX) NGFW Services IICisco SITCS 1.0: Cisco Web Security ApplianceCisco SITCS 1.0: Configuring Cisco Web Security ApplianceCisco SITCS 1.0: Cisco Cloud Web SecurityCisco SITCS 1.0: Cisco Email Security ApplianceCisco SITCS 1.0: Cisco Intrusion Prevention Systems ICisco SITCS 1.0: Cisco Intrusion Prevention Systems IICisco SITCS 1.0: Configuring Cisco Email Security

Implementing Cisco Secure Access Solutions (SISAS) 1.0Cisco SISAS 1.0: Identity Services Overview and 802.1XCisco SISAS 1.0: EAP and Logging into Cisco Identity Services Engine (ISE)Cisco SISAS 1.0: Cisco ISE TechnologiesCisco SISAS 1.0: Certificate-based Authentication and AuthorizationCisco SISAS 1.0: Cisco TrustSec, MACsec, and WebAuth AccessCisco SISAS 1.0: Endpoint Access Control Enhancements and Troubleshooting

SIMOS 1.0: Implementing Cisco Secure Mobility SolutionsSIMOS 1.0: Fundamentals of VPN Technologies and CryptographySIMOS 1.0: Deploying Secure Site-to-Site Connectivity Solutions (Part 1)SIMOS 1.0: Deploying Secure Site-to-Site Connectivity Solutions (Part 2)SIMOS 1.0: Deploying Cisco IOS Site-to-Site FlexVPN SolutionsSIMOS 1.0: Deploying Clientless SSL VPNsSIMOS 1.0: Deploying Cisco AnyConnect VPNsSIMOS 1.0: Clientless SSL VPNs, Endpoint Security, and Dynamic Access Policies

Certified Information Systems Security Professional (CISSP)CISSP: Security Principles, Governance, and GuidelinesCISSP: Risk ManagementCISSP: Asset SecurityCISSP: Security Engineering Part 1CISSP: Security Engineering Part 2CISSP: Communication & Network Security DesignCISSP: Identity and Access ManagementCISSP: Security Assessment and TestingCISSP: Security Operations Part 1CISSP: Security Operations Part 2CISSP: Security Operations Part 3

Exhibit 1 to Addendum 3

100

DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

By SeriesSeries Course Title

CISSP: Software Development SecurityTOGAF 9.1

TOGAF Fundamentals - Enterprise Architecture BasicsTOGAF Fundamentals - Content Framework and Capability Basics

Information Security for End UsersIntroduction to Information SecurityUsing your Desktop Computer and Mobile Devices SafelyUsing E-mail, the Internet, and Social Media Safely in a Corporate Environment

Certified Cloud Security Professional (CCSP)Cloud System Architecture Concepts and DesignCloud Data SecurityCloud System Security - Platform and InfrastructureCloud Application SecurityCloud Service Opera ons ManagementCloud Service Legal and Compliance

IT Security for End UsersIT Security for End Users: IT Security FundamentalsIT Security for End Users: Using Corporate Devices SecurelyIT Security for End Users: Secure Corporate Communications and Networking

OracleOracle Database 12c: High Availability and Database ManagementOracle Database 12c – Administration: The Network Environment and User SecurityOracle Database 11g Release 2: Storage Structures and User SecurityOracle Database 11g: Securing Domain and Data in Oracle Secure BackupOracle Database 11g: Database SecurityOracle Database 11g: Basic User and Strong AuthenticationOracle Database 11g: Enterprise User Security and Proxy AuthenticationOracle Database 11g Release 2: Oracle Partitioning and Security FeaturesOracle Database 11g Release 2: Oracle Scheduler and Secure BackupOracle SOA Suite 11g: SOA Security and Adoption Planning

Defensive Programming in AndroidDefensive Programming in Android: Input and MethodsDefensive Programming in Android: Using StandardsDefensive Programming in Android: Errors, Exceptions, and TestingDefensive Programming in Android: Network Access and Java Defensive Techniques

Additional Titles

Exhibit 1 to Addendum 3

101

DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

By SeriesSeries Course Title

Access Control in Windows Server 2008 R2Advanced Windows Store Apps with C# in Visual Studio 2013: Security & OptimizingApplication Design and Security in SharePoint 2010Authentication, Authorization, and App DeploymentCisco DESGN 2.1: Defining Network SecurityCisco DESGN 2.1: Security Solutions for the NetworkCompTIA A+ 220-802: Security and Data DisposalCompTIA Network+ N10-006: Network SecurityConfiguring Web Services and Security in Windows Server 2008Designing Data Security and High Availability in Microsoft Windows Server 2008E-mail and Security in LinuxExchange Server 2010 SP1: Transport Rules, Message Compliance and SecurityICND1 2.0: Managing Network Device SecurityLinux SecurityMicrosoft Advanced Windows Store App Development with HTML5: Data and SecurityMicrosoft Exchange Server 2013 - Core Solutions: Access ControlMicrosoft SharePoint Server 2013 - Core Solutions: Security and TaxonomyMicrosoft SharePoint Server 2013 - Developing Core Solutions: Implement SecurityMicrosoft SQL Server 2012: Security ManagementMicrosoft Windows 8.1 - Configuring: Remote Management and SecurityMicrosoft Windows 8.1 - Supporting Windows 8.1: Data Storage and SecurityMicrosoft Windows 8.1 - Supporting Windows 8.1: Recovery and Endpoint SecurityMicrosoft Windows Server 2012 R2 - Administration: File Services and EncryptionMicrosoft Windows Server 2012 R2 - Installing and Configuring: SecurityMicrosoft Windows Server 2012 R2: Server Infrastructure - IPAM and VPNMicrosoft Windows Server 2012 R2: Server Infrastructure - Network ProtectionMicrosoft Windows Store App Essentials with HTML5: SecurityNetwork Access Security in Windows Server 2008Patch Management and Securing and Monitoring Servers in Windows Server 2008Programmatically Working with Permissions and BCS in SharePoint 2010Programming in C#: Debugging and Security Implementation

Exhibit 1 to Addendum 3

102

DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

By SeriesSeries Course Title

Protecting Windows 7 Against Malware and Vulnerabilities

Securing .NET ProgrammingSecuring and Deploying WPF Applications with Visual Basic 2010Securing and Managing a WCF 4 Application with C# 2010Securing and Managing a WCF 4 Application with Visual Basic 2010SharePoint 2010 SP1: Authentication and Web Application Security ConfigurationSharepoint 2010 SP1: Designing SecuritySQL Server 2008 R2: Security ManagementVMware vSphere 5 - Part 2: vSphere SecurityWindows PowerShell Desired State Configuration Fundamentals

Exhibit 1 to Addendum 3

103

DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Business Professional Foundations KnowledgeCenter The Business Professional Foundations KnowledgeCenter includes the following roadmaps To focus on personal workplace skills, start hereCommunication Basics

Business Writing: Know Your Readers and Your PurposeBusiness Writing: How to Write Clearly and ConciselyBusiness Writing: Editing and ProofreadingUsing E-mail and Instant Messaging EffectivelyAddressing and Redistributing E-mailManaging Your E-mailEssential Skills for Professional Telephone Calls

Business CommunicationInterpersonal Communication that Builds TrustCommunication Methods that Make Sense – and Make Your PointBeing a Receptive Communication PartnerCommunication Challenges: Navigating Choppy Waters

Listening Essentials: The Basics of ListeningListening Essentials: Improving Your Listening SkillsBasic Presentation Skills: Planning a PresentationBasic Presentation Skills: Creating a PresentationBasic Presentation Skills: Delivering a PresentationThe Impact of Situation and Style When Communicating with Diplomacy and TactStrategies for Communicating with Tact and DiplomacyDelivering a Difficult Message with Diplomacy and TactProfessional Networking Essentials: Finding Opportunities To Make ConnectionsProfessional Networking Essentials: Developing Confidence

Critical ThinkingIntroduction to Workplace EthicsDeveloping a Code of Ethical ConductEthical Decision-making in the WorkplaceFraming the ProblemGenerating and Evaluating AlternativesSmart Selection, Planned ImplementationComing to Terms with AssumptionsGetting Your Arms around ArgumentsDrawing Conclusions with Confidence

Conflict and Anger ManagementOwning Your EmotionsBuilding Self-Management SkillsBeing Aware of the Emotions of OthersApplying Emotional Intelligence at WorkPreventing Unhealthy Workplace ConflictWorking Out and Through ConflictAdapting Your Conflict StyleAnger Management Essentials: Understanding AngerAnger Management Essentials: Managing and Controlling Anger

Personal DevelopmentTime Management: Too Much to Do and Too Little TimeTime Management: Quit Making Excuses and Make Time InsteadTime Management: Ready, Set…FOCUS!

Exhibit 1 to Addendum 3

104

DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Business Professional Foundations KnowledgeCenter The Business Professional Foundations KnowledgeCenter includes the following roadmaps

Optimizing Your Work/Life Balance: Analyzing Your Life BalanceOptimizing Your Work/Life Balance: Maintaining Your Life BalanceOptimizing Your Work/Life Balance: Taking Control of Your StressBuilding TrustRebuilding TrustAmerican Work Culture and ValuesKey Aspects of the American Work EnvironmentCommunicating Successfully in the American WorkplaceSucceeding in the American WorkplaceThe Value of Peer RelationshipsDeveloping Strategic Peer Relationships in Your OrganizationForming Peer Relationships and Alliances at WorkCampus to Corporate: Meeting New ExpectationsCampus to Corporate: Developing a Professional ImageDeveloping Your Reputation of Professionalism with Business EtiquetteProfessionalism, Business Etiquette, and Personal AccountabilityCommunicating with Professionalism and EtiquetteUsing Business Etiquette to Build Professional Relationships

Leading Organizational ChangeThe Keys to Sustainable ChangePlanning for ChangeImplementing and Sustaining ChangeInstituting a Quality Improvement Program

Optimizing Your Performance on a TeamBeing an Effective Team MemberEstablishing Team Goals and ResponsibilitiesElements of a Cohesive TeamEffective Team CommunicationUsing Feedback to Improve Team Performance

Business Grammar BasicsBusiness Grammar: Parts of SpeechBusiness Grammar: Working with WordsBusiness Grammar: The Mechanics of WritingBusiness Grammar: PunctuationBusiness Grammar: Sentence ConstructionBusiness Grammar: Common Usage Errors

Fundamentals of Working with Difficult PeopleWorking with Difficult People: Identifying Difficult PeopleWorking with Difficult People: How to Work with Aggressive PeopleWorking with Difficult People: How to Work with Negative PeopleWorking with Difficult People: How to Work with ProcrastinatorsWorking with Difficult People: How to Work with Manipulative PeopleWorking with Difficult People: How to Work with Self-serving PeopleWorking with Difficult People: Dealing with Micromanagers

Interviewing strategies (for interviewee)Preparing for an Internal InterviewMaking a Positive Impression in an Internal Interview

Perseverance and ResilenceDeveloping Character for Perseverance and Resilience

Exhibit 1 to Addendum 3

105

DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Business Professional Foundations KnowledgeCenter The Business Professional Foundations KnowledgeCenter includes the following roadmaps

Achieving Goals through Perseverance and ResilienceBouncing Back with Perseverance and Resilience

DecisivenessDeveloping Character for DecisivenessOvercoming the Barriers to Decisiveness

Personal Productivity ImprovementPersonal Productivity Improvement: Managing Your WorkspacePersonal Productivity: Self-organization and Overcoming ProcrastinationPersonal Productivity Improvement: Managing Tasks and Maximizing Productivity

To focus on specific professional skills, start here Roadmap Title Course TitleProject Management

Managing Projects within Organizations (PMBOK® Guide Fifth Edition)Project Management Overview (PMBOK® Guide Fifth Edition)Creating and Designing a ProjectGet Your Project off the GroundPlan a Bulletproof ProjectLead Your Project like a ProComplete Your Project On-time and On-budget

Customer Service FundamentalsCustomer Service Fundamentals: Building Rapport in Customer RelationshipsCustomer Service in the FieldCustomer Service over the PhoneInternal Customer ServiceCustomer Service Confrontation and ConflictShaping the Direction of Customer Service in Your Organization

Microsoft Office 2010Office 2010 New Core FeaturesNew Messaging and Collaboration Features in Office 2010Office 2010 Web Apps and New Publisher and Mobile FeaturesWord 2010, Excel 2010, and the New Office 2010 InterfaceOutlook 2010 and Collaboration in Office 2010New Features for PowerPoint, Publisher, and Access in Office 2010SharePoint 2010 New Features for End Users

Microsoft Office 2013Performing Basic Tasks in Word 2013Creating Workbooks, Worksheets, and Data in Excel 2013Working with E-mail in Outlook 2013 Creating Presentations in PowerPoint 2013Navigating, Lists, Libraries, Alerts, and Document Sets in SharePoint 2013Getting Started with Microsoft OneNote 2013

Basic Business MathBasic Business Math: Using Whole Numbers and DecimalsBasic Business Math: Percentages and RatiosBasic Business Math: Averages and EquationsBasic Business Math: Charts and Graphs

Public Speaking Strategies

Exhibit 1 to Addendum 3

106

DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Business Professional Foundations KnowledgeCenter The Business Professional Foundations KnowledgeCenter includes the following roadmaps

Public Speaking Strategies: Preparing Effective SpeechesPublic Speaking Strategies: Confident Public Speaking

Performance under PressureDeveloping the Right Attitude for Performing under PressureTaking Action for Performing under PressurePerforming with Others under Pressure

Writing Under PressureWriting under Pressure: Preparing for SuccessWriting under Pressure: The Writing Process

To focus on management and leadership fundamentals, start here Roadmap Title Course TitleLeadership Essentials

Leadership Essentials: Motivating EmployeesLeadership Essentials: Communicating VisionLeadership Essentials: Building Your Influence as a LeaderLeadership Essentials: Leading with Emotional IntelligenceLeadership Essentials: Leading Business ExecutionLeadership Essentials: Leading InnovationLeadership Essentials: Leading ChangeLeadership Essentials: Creating Your Own Leadership Development Plan

Getting Results Without AuthorityGetting Results without Authority: Building Relationships and Credibility Getting Results without Authority: Persuasive Communication Getting Results without Direct Authority: Reciprocity Getting Results without Direct Authority: Influencing Your Boss

First Time Manager EssentialsFirst Time Manager: Understanding a Manager's RoleFirst Time Manager: ChallengesFirst Time Manager: Meeting Expectations

Accounting FundamentalsBasic Accounting Principles and FrameworkThe Accounting Equation and Financial StatementsThe Accounting Cycle and Accrual AccountingAccounting Transactions and Books of AccountTrial Balance & Adjusting EntriesThe Income StatementThe Balance SheetThe Cash Flow StatementAccounting for Companies' Stock Transactions and Dividends

Additional AssetsBusiness Impact Series Course Title

Building Trust IncrementallyPrioritizing Personal and Professional ResponsibilitiesManaging the Stress of Organizational ChangeListening to Improve Conversations Personal Conflict StylesThe Dangers of Multitasking

Exhibit 1 to Addendum 3

107

DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Business Professional Foundations KnowledgeCenter The Business Professional Foundations KnowledgeCenter includes the following roadmaps

Perseverance: Flexibility in ActionRebuilding TrustDo You Share Your Organization’s Values?Handling Difficult Questions as a PresenterCoping with Aggressive Behavior in the WorkplaceBeyond Change: Working with AgilityPeer Political StylesMaking Yourself ApproachableWriting for BusinessBlame Backfires – Conquer Negative ThinkingEffective Critical Analysis of Business ReportsPlaying the Devil's Advocate in Decision MakingMediating Project Team ConflictEffective Body Language in NegotiationsPlanning for Interruptions Helps with ProcrastinationFacilitating Work-related Conflict DiscussionsCriticism in ContextPreparing for Your Performance AppraisalMaking Meetings WorkConquering Career StagnationCommunicating with a Cross-cultural AudienceManaging Projects without Direct AuthorityManaging Scope on a ProjectAnticipating and Solving Problems as a Project ChampionSelling to Key PlayersListening to Your CustomersAre you listening to your customers (Role of VOC in Six Sigma)Broadening Your Learning Horizons

Challenge Series Course TitleUncovering the Root ProblemDemonstrating Accountability in a Crisis SituationSetting and Managing PrioritiesCritical ThinkingManaging GoalsEffective ListeningCreating Work/Life BalanceDeveloping Your CareerListening with SkillSolving Problems: Process, Tools, and TechniquesManaging Conflict Coping with Conflicting PrioritiesGiving Feedback to CoworkersSetting GoalsBuilding and Managing Upward RelationshipsDeveloping Your Customer FocusContributing in a Team EnvironmentReacting to Co-workers Who Try Taking AdvantageOffice Politics - What Will You Do?

Exhibit 1 to Addendum 3

108

DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Business Professional Foundations KnowledgeCenter The Business Professional Foundations KnowledgeCenter includes the following roadmaps

Choosing the Right Team CulturePersevering through SetbacksPlanning Your Career Emotional Intelligence at WorkThe Ethics EnigmaSelf DevelopmentCreativity: Developing and Communicating IdeasThe Fruits of Integrity: Building Trust at WorkAsserting yourself in the WorkplaceGetting Ready to PresentBuilding Better Relationships through UnderstandingBuilding Peer Relationships Getting Time Under Control Contributing to Organizational AgilityWritten CommunicationTargeting Personal LearningApplying Your Best ThinkingMeeting the Challenge of Workplace ConflictDecisions: Making the Right Move

Feature Topic MonthlyFeatured Topic SubjectLeveraging Social and Communication SkillsCommunicating with Diplomacy and TactCommunicating Professionally in PersonAssessing Your Work/Life Balance

ArchiveProblem Solving: The FundamentalsProblem Solving: Determining and Building Your StrengthsProblem Solving: Digging DeeperDecision Making: The FundamentalsDecision Making: Tools and TechniquesDecision Making: Making Tough Decisions

Critical Thinking Essentials: What Is Critical Thinking?Critical Thinking Essentials: Applying Critical Thinking Skills

What is Emotional Intelligence?Improving Your Emotional Intelligence Skills: Self-awareness and Self-managementUsing Emotional Intelligence on the Job

Workplace Conflict: Recognizing and Responding to ConflictWorkplace Conflict: Strategies for Resolving Conflicts

Targeted BooksPublisher Title

A & C Black Dictionary of Business, Fourth EditionAMACOM The New Manager's Tool Kit: 21 Things You Need to Know to Hit the Ground Running

Exhibit 1 to Addendum 3

109

DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Business Professional Foundations KnowledgeCenter The Business Professional Foundations KnowledgeCenter includes the following roadmaps AMACOM Customer Service Training 101, Second EditionAMACOM Results Without Authority: Controlling a Project When the Team Doesn’t Report to You, Second EditionAMACOM Innovation at Work: 55 Activities to Spark Your Team’s CreativityCambridge University Press Business Ethics as Practice: Ethics as the Everyday Business of BusinessCareer Press Don’t Take the Last Donut: New Rules of Business EtiquetteCenter for Creative Leadership Feedback to Managers: A Guide to Reviewing and Selecting Multirater Instruments for Leadership Development, Fourth EditionGower Publishing Limited Creating Healthy Workplaces: Stress Reduction, Improved Well-being, and Organizational EffectivenessEmerald Group Publishing Advances in Strategic Management: Finance and StrategyJohn Wiley & Sons Communication in the WorkplaceJohn Wiley & Sons Office 2007 BibleJohn Wiley & Sons Outlook 2010 All-in-One For DummiesJohn Wiley & Sons Effective Project Management: Traditional, Agile, Extreme, 7th EditionJohn Wiley & Sons The Personal Business Plan: A Blueprint for Running Your Life Jossey-Bass So Smart But...: How Intelligent People Lose Credibility: and How They Can Get it BackJossey-Bass The 85% Solution: How Personal Accountability Guarantees Success: No Nonsense, No ExcusesKogan Page Make Your Brain Work: How to Maximize Your Efficiency, Productivity and EffectivenessKogan Page How to Organize Yourself: Creating Success, Fourth Edition Marshall Cavendish Surviving Office Politics: Succeeding in the Competitive JungleTaylor and Francis Managing Cultural Differences: Global Leadership Strategies for Cross-Cultural Business Success, Eighth Edition

Exhibit 1 to Addendum 3

110

DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D