DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Exhibit 1 to Addendum 3

New Horizons IT - Complete Collection Solution Area Curriculum Series Course Title SOFTWARE DEVELOPMENT Microsoft Web Applications Microsoft Visual Studio 2013: Windows Store App Essentials - HTML5 and JavaScript Store App Essentials with HTML5: Overview Microsoft Windows Store App Essentials with HTML5: The UI and Layout Controls Microsoft Windows Store App Essentials with HTML5: PLM and Contracts Microsoft Windows Store App Essentials with HTML5: Navigation, Contacts, Tiles Microsoft Windows Store App Essentials with HTML5: Input Devices and User Touch Microsoft Windows Store App Essentials with HTML5: Managing Data Microsoft Windows Store App Essentials with HTML5: Security Microsoft Windows Store App Essentials with HTML5: Deployment Microsoft Visual Studio 2012: Programming in HTML5 with JavaScript and CSS3 Microsoft Visual Studio 2012: Introduction to HTML5 and CSS3 Microsoft Visual Studio 2012: HTML5 and JavaScript Microsoft Visual Studio 2012: Advanced HTML5 and JavaScript Microsoft Visual Studio 2012: HTML5 APIs and Local Storage Microsoft Visual Studio 2012: HTML5, CSS3, and Adaptive UIs Microsoft Visual Studio 2012: HTML5 Graphics and Animation Microsoft Visual Studio 2012: Consuming and Transmitting Data with HTML5 Microsoft Visual Studio 2012: Utilizing the HTML5 WebSocket API and Web Workers Microsoft Azure and Web Services Working With Local Data Access Technologies Querying and Manipulating Data with the Entity Framework Creating and Consuming WCF Web Services WCF Instancing and Concurrency and WCF Data Services Creating and Consuming Web API Services Data Access and Services with Microsoft Azure Preparing and Packaging Applications For Deployment Web Application and Services Deployment Web API Essentials Web API Essentials Web API Advanced Microsoft Azure Microsoft Azure: Introduction Microsoft Azure: Networks and Storage Microsoft Azure: Publishing and Caching Microsoft Azure: Implementing Infrastructure Solutions Microsoft Azure - Implementing Infrastructure Solutions: Virtual Networks Microsoft Azure - Implementing Infrastructure Solutions: Virtual Machines Microsoft Azure - Implementing Infrastructure Solutions: Implementing Websites Microsoft Azure - Implementing Infrastructure Solutions: Storage and PaaS Cloud Microsoft Azure - Implementing Infrastructure Solutions: Data Services Microsoft Azure - Implementing Infrastructure Solutions: CDNs and Automation Microsoft Azure - Implementing Infrastructure Solutions: Active Directory Web Development Technologies Introduction to Ajax Development Ajax Basics Ajax API Essentials Ajax Applications and Server Communication Ajax Ajax: Requesting Data and Retrieving Responses CQRS Theory Introduction to CQRS Java 2 Programming Java SE7 Fundamentals Java SE7 Fundamentals: Introduction to Java Java SE7 Fundamentals: Variables, Operators, and Objects Java SE7 Fundamentals: Decision Constructs, Arrays, and Loops Java SE7 Fundamentals: Overloading, Validation, and Object-Oriented Concepts Java SE7 Fundamentals: Handling Errors and Deploying Applications Java SE 7 New Features Java SE7 New Features: Java Language and Technology Enhancements Java SE7 New Features: I/O, Network, and Desktop Enhancements Java SE7 Professional Java SE7 Professional: Syntax and Class Design Java SE7 Professional: Generics, Errors, and I/O Java SE7 Professional: File I/O, Concurrency, JDBC, and Localization Introduction to Java EE 6 Introduction to Java EE 6 Developing Applications Using Java Spring Java Spring: Spring Application Basics Java Spring: Annotation Configuration and Java Configuration in Spring Java Spring: Creating Web Applications Using Spring MVC Java Spring: Working with Data in Spring Java Spring: Aspect-Oriented Programming Using Spring AOP Java Spring: Adding Security Using the Spring Security Project Java Hibernate Getting Started with Java Hibernate Customized Mapping and Basic Querying in Java Hibernate Advanced Querying in Java Hibernate Java SE 8 Fundamentals Java SE 8 Fundamentals: Introduction to Java Java SE 8 Fundamentals: Classes and Objects Java SE 8 Fundamentals: Methods, Encapsulation, and Conditionals Java SE 8 Fundamentals: Data Manipulation and Inheritance

1 DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Exhibit 1 to Addendum 3

New Horizons IT - Complete Collection Solution Area Curriculum Series Course Title Java SE 8 Fundamentals: Interfaces, Exceptions, and Deployment Java SE 8 Programming Java SE 8 Programming: Encapsulation, Polymorphism, and Abstraction Java SE 8 Programming: Interfaces, Lambda Expressions, Collections, and Generics Java SE 8 Programming: Inheritance, Interfaces, Exceptions, and Deployment Java SE 8 Programming: Date/Time API, I/O and File I/O (NIO.2), and Concurrency Java SE 8 Programming: Concurrency, Parallelism, the JDBC API, and Localization Defensive Programming in Java Defensive Programming in Java: Fundamentals Working with Java SE 7 Programming Apps with Java SE 7 Working with Java SE 6 Programming Apps with Java SE 6 Microsoft .NET Software Development Tools Microsoft .NET Framework 4: Windows Application Development with Visual C# 2010 Creating Windows Applications with C# 2010 Creating User Interfaces for Windows Applications with C# 2010 Windows Applications Content Creation and Management with C# 2010 Windows Applications Databinding with C# 2010 Customizing and Managing Multithreaded Applications with C# 2010 Securing and Deploying WPF Applications with C# 2010 Web Applications Development with Microsoft .NET Framework 4 using Visual Basic 2010

Microsoft .NET Framework 4.0: Web Applications with Visual Studio 2010 and Visual Basic 2010 Microsoft .NET Framework 4.0: Web Form Controls with VB 2010 Microsoft .NET Framework 4.0: Data Integration with VB 2010 Microsoft .NET Framework 4.0: Client-Side Scripting and AJAX with VB 2010 Microsoft .NET Framework 4.0: ASP.NET MVC 2 with VB 2010

Microsoft .NET Framework 4.0: Configuring and Deploying Web Applications with VB 2010

Microsoft .NET Framework 4: Debugging, Tracing and Monitoring Web Applications with VB 2010

Microsoft .NET Framework 4.0: Web Application Optimization and Customization with VB 2010 Microsoft .NET Framework 4: Web Application Development with Visual C# 2010

Microsoft .NET Framework 4: Web Applications with Visual Studio 2010 and Visual C# 2010 Microsoft.NET Framework 4: Web Form Controls with C# 2010 Microsoft .NET Framework 4: Data Integration with C# 2010 Microsoft .NET Framework 4: Client-Side Scripting and AJAX with C# 2010 Microsoft .NET Framework 4: ASP.NET MVC 2 with C# 2010 Microsoft .NET Framework 4: Configuring and Deploying Web Applications with C# 2010

Microsoft .NET Framework 4: Debugging, Tracing and Monitoring Web Applications with C# 2010

Microsoft .NET Framework 4: Web Application Optimization and Customization with C# 2010 Windows Communication Foundation Development in C# with Microsoft .NET Framework (70-513) Getting Started with WCF 4 Using C# 2010 WCF 4 Contracts, Behaviors, and Data Management Using C# 2010 Securing and Managing a WCF 4 Application with C# 2010 Discovery, Routing, and RESTful Services in WCF 4 Applications with C# 2010 Accessing Data with Microsoft .NET Framework for C# Developers (70- 516) Getting Started with ADO.NET 4 Connections and Commands Using C# 2010 Managing ADO.NET 4 Connections and Commands with C# 2010 Getting Started with ADO.NET 4 DataSets Using C# 2010 Viewing and Navigating Data with ADO.NET 4 DataSets Using C# 2010 Updating ADO.NET DataSets with C# 2010 Synchronizing Data and Managing ADO.NET 4 Applications with C# 2010 Working with the ADO.NET Entity Framework 4 Using C# 2010 Using LINQ and XML with ADO.NET 4 and C# 2010 Microsoft .NET Framework 4: Windows Communication Foundation with Visual Basic 2010 Getting Started with WCF 4 using VB 2010 WCF 4 Contracts, Behaviors, and Data Management Using Visual Basic 2010 Securing and Managing a WCF 4 Application with Visual Basic 2010 Discovery, Routing, and RESTful Services in WCF 4 Applications with VB 2010 Microsoft .NET Framework 4: Accessing Data with Visual Basic 2010 Getting Started with ADO.NET 4 Connections and Commands Using Visual Basic 2010 Managing ADO.NET 4 Connections and Commands with Visual Basic 2010 Getting Started with ADO.NET 4 DataSets using Visual Basic 2010 Updating ADO.NET DataSets with Visual Basic 2010 Viewing and Navigating Data with ADO.NET 4 DataSets using Visual Basic 2010 Synchronizing Data and Managing ADO.NET 4 Applications with Visual Basic 2010 Working with the ADO.NET Entity Framework 4 using Visual Basic 2010 Using LINQ and XML with ADO.NET 4 and Visual Basic 2010 Microsoft .NET Framework 4: Windows Application Development with Visual Basic 2010 Windows Application Development with Visual Basic 2010 Creating User Interfaces for Windows Applications with Visual Basic 2010 Windows Applications Content Creation and Management with Visual Basic 2010 Windows Applications Databinding with Visual Basic 2010 Customizing and Managing Multithreaded Applications with Visual Basic 2010 Securing and Deploying WPF Applications with Visual Basic 2010 Microsoft .NET: An Overview .NET Overview: Windows, Web, and the Cloud Essentials of Developing Windows Store Apps Using C# Getting Familiar With Windows 8.1 UI and Layout

2 DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Exhibit 1 to Addendum 3

New Horizons IT - Complete Collection Solution Area Curriculum Series Course Title Working With Data and Files Navigation and Layout in Windows Store Apps Working With Charms and Contracts

Working With The App Bar, Semantic Zoom, User Input, and Process Lifetime Management Authentication, Authorization, and App Deployment Microsoft .NET Framework: WPF with XAML and C# WPF Fundamentals with XAML and C# Architecture N-Tier/REST Architecture N-Tier/REST: Designing and Building Applications F# Fundamentals Getting Started with F# Secure Programming for .NET Securing .NET Programming Visual Studio Code Cross-platform Code Editor Visual Studio Code Cross-platform Code Editor: Basics Generic Languages Developing With Python Python Language Basics Applications of Python Advanced Python Software Development Fundamentals with Visual Studio Introduction to Programming Programming Basics Beginning Windows Applications Ruby On Rails Ruby on Rails - Fundamentals Ruby on Rails - Database Fundamentals Databases in Ruby on Rails: Advanced Concepts Web APIs with Ruby on Rails Ruby on Rails for .NET Developers Working with Databases in Ruby on Rails Ruby Programming Getting Started with Ruby Working with Ruby Advanced Ruby Features Working with Clojure Clojure Fundamentals Data and State Management in Clojure Optimizing Clojure Projects Clojure Data-Driven and Web Application Fundamentals Introduction to R Programming Introduction to R Programming Programming with ANSI C ANSI C Language Fundamentals Iterations, Functions and Pointers in ANSI C Data Structures and File Management in ANSI C Optimizing and Debugging ANSI C Programs Introduction to Swift Programming Swift Language Basics Using Swift Advanced Language Features Introduction to Scala Scala Introduction Asynchronous Programming with Clojure Asynchronous Programming with Clojure's core.async Library Ruby on Rails 4.2 Introduction to Rails Introduction to Models Introduction to Views Advanced Rails Examining Rails APIs C/C++ Programming C++11 Programming Essentials C++11: Programming Fundamentals C++11: Programming Techniques C++11: Programming with Boost C++11: Advanced Techniques and C++14 Preview Programming in C++ Programming in C++: Working with Classes Programming in C++: Arrays, Pointers, and STL Programming in C++: STL I/O and Headers, Templates, and Namespaces Programming in C++: Structure and Data Types Programming in C++: Program Structure and Exceptions Programming in C++: Tools and Techniques Software Programming Fundamentals Software Programming Fundamentals Getting Started with Software Programming Introduction to Software Program Design Software Program Control Flow Fundamentals Software Programming Fundamentals Software Programming Fundamentals: Design and Development Best Practices Software Programming Fundamentals: Source Coding Best Practices Software Programming Fundamentals: Software Security Best Practices Software Programming Fundamentals: Best Practices for Maintaining Code Software Design

3 DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Exhibit 1 to Addendum 3

New Horizons IT - Complete Collection Solution Area Curriculum Series Course Title Object-oriented Design Beginning Object-Oriented Design Service Oriented Architecture SOA Fundamentals SOLID Principles of Object-oriented Design Introduction to SOLID SOLID Fundamentals JIRA Fundamentals Leveraging the JIRA Platform for Development Projects Software Development Principles Agile Software Development Introducing Agile Software Development Planning an Agile Software Development Project Managing Agile Software Development Agile Programming and Testing Advanced Scrum Advanced Scrum: Developing the Product and Sprint Backlogs Advanced Scrum: Integrating and Customizing Scrum Advanced Scrum: Addressing Sprint Execution Challenges Software Practices (SCRUM) Software Practices (SCRUM): SCRUM Roles Software Practices (SCRUM): SCRUM Meetings User Experience (UX) Design Foundations UX Design Foundations: Design Principles and Strategies UX Design Foundations: Techniques and Tools UX Design Foundations: Navigation, Layout, and Content Software Practices: Waterfall The Waterfall Software Development Model Agile Software Testing Agile Software Testing: Methodologies and Testing Approaches Agile Software Testing: Techniques and Tools Software Testing Foundations Software Testing Foundations Fundamentals of Software Testing Testing Throughout the Software Life Cycle Static Techniques and Test Design in Software Testing Black-Box Software Testing Techniques White-Box Software Testing Techniques Software Test Management Configuration Management, Risks, and Incidents in Software Testing Tool Support in Software Testing Microsoft Visual Studio Team Foundation Server 2013 Administration Microsoft Team Foundation Server 2013: Installation and Configuration Microsoft Team Foundation Server 2013: Customization for Team Use Microsoft Team Foundation Server 2013: Managing an Implementation Microsoft Team Foundation Server 2013: Clients, Workspaces, and Version Control Selenium Automated Web Testing Selenium Automated Web Testing Fundamentals Advanced Features of Selenium Automated Web Testing Selenium and Java Selenium and C# Selenium and Python Testing with JUnit JUnit Fundamentals Working with JUnit Tests Software Testing with Visual Studio Software Testing with Visual Studio: Create and Configure Test Plans Software Testing with Visual Studio: Manage Test Cases Software Testing with Visual Studio: Manage Test Execution Part 1 Software Testing with Visual Studio: Manage Test Execution Part 2 Debugging Fundamentals Introduction to Debugging Visual Studio 2013 Debugging Debugging Tools Software Debugging in Windows Software Testing Fundamentals Creating Software Tests Managing, Troubleshooting, and Automating Software Tests Using Cucumber Cucumber Fundamentals Software Testing Foundations Software Testing Foundations: Testing throughout the Software Life Cycle Software Testing Foundations: Static, Dynamic, Black-box, and White-box Testing Software Testing Foundations: Test Planning, Management, and Tool Support Testing Android Apps with Genymotion Genymotion: Testing Android Apps Testing Social Media Applications Ensuring Social Media and Application Quality Microsoft Windows Store Apps Microsoft Advanced Windows Store App Development using HTML5 and JavaScript Microsoft Advanced Windows Store Apps with HTML5: Enhancing Performance Microsoft Advanced Windows Store Apps with HTML5: Animations and Custom Controls Microsoft Advanced Windows Store App Development with HTML5: Media and Devices Microsoft Advanced Windows Store App Development with HTML5: User Interaction Microsoft Advanced Windows Store App Development with HTML5: Data and Security

4 DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Exhibit 1 to Addendum 3

New Horizons IT - Complete Collection Solution Area Curriculum Series Course Title

Microsoft Advanced Windows Store App Development with HTML5: Localize and Deploy Advanced Windows Store App Development Using C# and XAML Advanced Windows Store Apps with C# in Visual Studio 2013: Data Management Advanced Windows Store Apps with C# in Visual Studio 2013: The UI, Printing, WNS Advanced Windows Store Apps with C# in Visual Studio 2013: Media and Devices Advanced Windows Store Apps with C# in Visual Studio 2013: Security & Optimizing Advanced Windows Store Apps with C# in Visual Studio 2013: Testing & Deployment ASP.NET MVC Web Application Development Getting Started with ASP.NET MVC Web Applications in Visual Studio 2013 Designing the User Experience in ASP.NET MVC Web Applications Working with ASP.NET MVC Models ASP.NET MVC Databases and the Entity Framework Developing the User Experience in ASP.NET MVC Designing ASP.NET MVC Application Architecture Implementing ASP.NET Authentication and Authorization Debugging ASP.NET MVC Web Applications Configuring and Deploying an ASP.NET MVC Application Optimizing and Protecting Application Data Working with ASP.NET MVC 5 Creating and Securing MVC 5 Applications Using MVC 5 with EF6, Web API 2, SignalR, and Azure Microsoft C# Programming in C# Programming in C#: Managing Program Flow Programming in C#: Creating and Using Types Programming in C#: Debugging and Security Implementation Programming in C#: Implementing Data Access Eclipse Fundamentals of Eclipse Introduction to Eclipse Using Eclipse Microsoft LINQ Microsoft LINQ Getting Started with LINQ Microsoft Enterprise Library Microsoft Enterprise Library Microsoft Enterprise Library Microsoft ORM NHibernate NHibernate Essentials NHibernate Advanced Techniques Microsoft Entity Framework Getting Started With Entity Framework Advanced Entity Framework Algorithms Introduction to Algorithms and Data Structures Introduction to Algorithms and Data Structures Mobile Application Development Programming Cross-Platform Applications in Visual Studio with Xamarin Xamarin Android and iOS Projects in Cross-Platform Solutions in Visual Studio Cross-Platform Shared Code and Xamarin.Forms in Visual Studio New Features in Android 5.x Lollipop For Developers Android Lollipop New Features For Developers Developing Apple Watch Applications Developing Basic Apple Watch Applications Developing Advanced Apple Watch Applications Ionic Framework Exploring the Basic Features of the Ionic Framework Exploring the Advanced Features of the Ionic Framework PhoneGap PhoneGap: Exploring Basic Features PhoneGap: Exploring Advanced Features Android For .NET Developers Introduction to Xamarin for .NET Advanced Topics 1 Android OS Other Approaches to Development Android User Interface Elements Advanced Topics 2 Windows Embedded Windows Embedded 8.1 Industry Windows Embedded 8.1 Industry Configuration Management Git Fundamentals Beginner Git Advanced Git Defensive Programming Defensive Programming in C/C++ Defensive Coding Fundamentals for C/C++ Defensive Coding for C/C++ Defensive Programming in C# Defensive Coding Fundamentals for C# Defensive Coding for C# Defensive Programming in JavaScript and HTML5

5 DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Exhibit 1 to Addendum 3

New Horizons IT - Complete Collection Solution Area Curriculum Series Course Title Defensive Coding Fundamentals for JavaScript and HTML5 Defensive Coding for JavaScript and HTML5 Defensive Programming in iOS Thinking Defensively about Functions, Methods, and Input Managing Network Interaction Errors, Exceptions, and Testing Protecting Data in iOS Apps Defensive Programming in Android Defensive Programming in Android: Input and Methods Defensive Programming in Android: Using Standards Defensive Programming in Android: Errors, Exceptions, and Testing Defensive Programming in Android: Network Access and Java Defensive Techniques Apache Maven Fundamentals Getting Started with Maven Go Go Programming Fundamentals Programming in Go Mentoring Assets Mentoring Assets Mentoring 1Z0-851 Java Standard Edition 6 Programmer Mentoring 70-515 VB - TS: Web Applications Development with .NET 4 Mentoring 70-513 C# - TS: Windows Communication Foundation with .NET 4 Mentoring 70-515 C# - TS: Web Applications Development with .NET 4 Mentoring 70-516 C# - TS: Accessing Data with Microsoft .NET Framework 4 Mentoring 70-511 C# - TS: Windows Applications Development with .NET 4 Mentoring 70-513 VB - TS: Windows Communication Foundation with .NET 4 Mentoring 70-516 VB - TS: Accessing Data with Microsoft .NET Framework 4 Mentoring 70-511 VB - TS: Windows Applications Development with .NET 4 Mentoring 1Z0-804 Java SE 7 Programmer II Mentoring 70-480 Programming in HTML5 with JavaScript and CSS3 Mentoring BH0-010 Certified Tester Foundation Level Mentoring 70-481 Developing Windows Store Apps using HTML5 and JavaScript Mentoring 70-482 Advanced Windows Store App Development, HTML5 and JavaScript Mentoring 70-483 Programming in C# Mentoring 98-361 Software Development Fundamentals Mentoring 70-484 Essentials of Developing Windows Store Apps Using C# Mentoring 70-486 Developing ASP.NET MVC Web Applications Mentoring 70-485 Advanced Windows Store App Development Using C# Mentoring 70-487 Developing Microsoft Azure and Web Services Mentoring 1Z0-808 Java SE Programmer 8 Mentoring Software Testing Fundamentals Mentoring 1Z0-809 Java SE 8 Programmer II Mentoring JIRA Fundamentals Mentoring Selenium Fundamentals Mentoring 1Z0-803 Java SE 7 Programmer I Test Preps Test Preps TestPrep 70-515 VB - TS: Web Applications Development with .NET 4 TestPrep 70-515 C# - TS: Web Applications Development with .NET 4 TestPrep 70-513 C# - TS: Windows Communication Foundation with .NET 4 TestPrep 70-516 C# - TS: Accessing Data with Microsoft .NET Framework 4 TestPrep 70-511 C# - TS: Windows Applications Development with .NET 4 TestPrep 70-513 VB - TS: Windows Communication Foundation with .NET 4 TestPrep 1Z0-803 Java SE 7 Programmer I TestPrep 70-511 VB - TS: Windows Applications Development with .NET 4 TestPrep 1Z0-804 Java SE 7 Programmer II TestPrep 70-480 Programming in HTML5 with JavaScript and CSS3 TestPrep BH0-010 Certified Tester Foundation Level TestPrep 70-481 Developing Windows Store Apps using HTML5 and JavaScript TestPrep 70-482 Advanced Windows Store App Development, HTML5 and JavaScript TestPrep 70-483 Programming in C# TestPrep 70-484 Essentials of Developing Windows Store Apps Using C# TestPrep 98-361 Software Development Fundamentals TestPrep 70-485 Advanced Windows Store App Development Using C# TestPrep 70-486 Developing ASP.NET MVC Web Applications TestPrep 70-487 Developing Microsoft Azure and Web Services TestPrep 1Z0-808 Java SE 8 Programmer I TestPrep 98-379 Software Testing Fundamentals TestPrep 70-516 VB - TS: Accessing Data with Microsoft .NET Framework 4 OPERATING SYSTEMS AND SERVER TECHNOLOGIES CompTIA A+ CompTIA A+ Exam 1 CompTIA A+ Exam 220-901: BIOS and Startup CompTIA A+ Exam 220-901: Motherboards CompTIA A+ Exam 220-901: RAM CompTIA A+ Exam 220-901: Storage Solutions CompTIA A+ Exam 220-901: CPUs CompTIA A+ Exam 220-901: Connectors and Connections CompTIA A+ 220-801 CompTIA A+ 220-801: BIOS and Motherboards CompTIA A+ 220-801: Memory, Expansion Cards and Storage Devices CompTIA A+ 220-801: CPUs, Connections, and Power Supplies CompTIA A+ 220-801: Configurations, Displays, Connectors, & Peripherals CompTIA A+ 220-801: Network Cabling, IP Addressing, Ports, and Protocols

6 DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Exhibit 1 to Addendum 3

New Horizons IT - Complete Collection Solution Area Curriculum Series Course Title CompTIA A+ 220-801: Networking Technologies CompTIA A+ 220-801: Networking Devices and Tools CompTIA A+ 220-801: Laptops CompTIA A+ 220-801: Printers CompTIA A+ 220-801: Operational Procedures CompTIA A+ 220-802 CompTIA A+ 220-802: Introducing Microsoft Windows CompTIA A+ 220-802: Installing and Configuring Windows CompTIA A+ 220-802: Optimizing Windows CompTIA A+ 220-802: Managing Windows CompTIA A+ 220-802: Security and Data Disposal CompTIA A+ 220-802: Mobile Devices CompTIA A+ 220-802: System Troubleshooting CompTIA A+ 220-802: General Troubleshooting CompTIA Server+ CompTIA Server+ 2009 CompTIA Server+ 2009: System Hardware CompTIA Server+ 2009: System Software CompTIA Server+ 2009: Server Functions and Network Essentials CompTIA Server+ 2009: Storage CompTIA Server+ 2009: IT Environment CompTIA Server+ 2009: Disaster Recovery CompTIA Server+ 2009: Troubleshooting CompTIA Server+ 2009: Network and Storage Troubleshooting CompTIA Server+ 2014 CompTIA Server+ SK0-004: Server Architecture CompTIA Server+ SK0-004: Server Administration I CompTIA Server+ SK0-004: Server Administration II CompTIA Server+ SK0-004: Storage CompTIA Server+ SK0-004: Security CompTIA Server+ SK0-004: Networking and Disaster Recovery CompTIA Server+ SK0-004: Troubleshooting I CompTIA Server+ SK0-004: Troubleshooting II CompTIA Linux+ CompTIA Linux+ 2014 Powered By LPI: LX0-103 CompTIA Linux+ 2014 Powered By LPI: LX0-103: System Architecture CompTIA Linux+ 2014 Powered By LPI: LX0-103: Installation and Package Management CompTIA Linux+ 2014 Powered By LPI: LX0-103: GNU and Unix Commands CompTIA Linux+ 2014 Powered By LPI: LX0-103: Advanced GNU and Unix Commands CompTIA Linux+ 2014 Powered By LPI: LX0-103: Devices and Filesystems CompTIA Linux+ 2014 Powered By LPI: LX0-104 CompTIA Linux+ 2014 Powered By LPI: LX0-104 Scripting and Administrative Tasks CompTIA Linux+ 2014 Powered By LPI: LX0-104 Essential System Services CompTIA Linux+ 2014 Powered By LPI: LX0-104 Networking Fundamentals CompTIA Linux+ 2014 Powered By LPI: LX0-104 Security, Data, and Accessibility Microsoft SharePoint Server 2013 Microsoft Sharepoint Server 2013: Core Solutions Microsoft SharePoint Server 2013 - Core Solutions: Information Architecture Microsoft SharePoint Server 2013 - Core Solutions: Logical and Physical Design Microsoft SharePoint Server 2013 - Core Solutions: Installation Microsoft SharePoint Server 2013 - Core Solutions: Web and Service Applications Microsoft SharePoint Server 2013 - Core Solutions: Authentication Microsoft SharePoint Server 2013 - Core Solutions: Security and Taxonomy Microsoft SharePoint Server 2013 - Core Solutions: User Profiles and Search Microsoft SharePoint Server 2013 - Core Solutions: Maintenance and Monitoring Microsoft SharePoint Server 2013 - Developing Core Solutions Microsoft SharePoint Server 2013 - Developing Core Solutions: Planning Sites Microsoft SharePoint Server 2013 - Developing Core Solutions: Implement Security Microsoft SharePoint Server 2013 - Developing Core Solutions: Managing Data Microsoft SharePoint Server 2013 - Developing Core Solutions: Manage Solutions Microsoft SharePoint Server 2013 - Developing Core Solutions: User Experience Microsoft SharePoint Server 2013 - Developing Core Solutions: Business Processes Microsoft SharePoint Server 2013 - Developing Core Solutions: Create Office Apps Microsoft SharePoint Server 2013: Designing Advanced Solutions Microsoft SharePoint Server 2013 - Designing Advanced Solutions: Upgrading Microsoft SharePoint Server 2013 - Designing Advanced Solutions: Continuity Microsoft SharePoint Server 2013 - Designing Advanced Solutions: Search Services Microsoft SharePoint Server 2013 - Designing Advanced Solutions: Content Support Microsoft SharePoint Server 2013 - Designing Advanced Solutions: Applications Microsoft SharePoint Server 2013 - Designing Advanced Solutions: Support Service Microsoft SharePoint Server 2013 - Designing Advanced Solutions: Solutions Microsoft SharePoint Server 2010 Designing and Developing Microsoft SharePoint 2010 Applications Data Access and Storage in SharePoint 2010 Development Models and Methods in SharePoint 2010 Presentation Layers and Components in SharePoint 2010 AJAX, the SharePoint Ribbon, and Content Type Development in SharePoint 2010 Custom Branding and Navigation for SharePoint 2010 Application Design and Security in SharePoint 2010 Performance Analysis and Debugging in SharePoint 2010 Integration and Data Capture Methodologies with SharePoint 2010 Information Architecture and Workflow Solutions in SharePoint 2010 Regional Settings and Configuration in SharePoint 2010 Microsoft SharePoint 2010: Application Development Customizing the SharePoint 2010 User Interface Programmatically

7 DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Exhibit 1 to Addendum 3

New Horizons IT - Complete Collection Solution Area Curriculum Series Course Title Developing SharePoint 2010 Web Parts and Controls Developing Business Logic Using SharePoint 2010 Workflows and ECM Programmatically Working with Permissions and BCS in SharePoint 2010 Working With SharePoint 2010 Data SharePoint Server 2010 Object Model SharePoint 2010 Features and Solutions SharePoint 2010 Site Branding Extending SharePoint 2010 Search and Document Namespaces Stabilizing and Deploying SharePoint 2010 Components Microsoft SharePoint 2010 SP1: Administration Sharepoint 2010 SP1: Designing the Physical Architecture SharePoint 2010 SP1: Logical Design and Sandbox Solutions SharePoint 2010 SP1: Deployment Topology and Availability SharePoint 2010 SP1: Planning Service Applications and Component Strategy Sharepoint 2010 SP1: Planning a SharePoint 2010 SP1 Upgrade Sharepoint 2010 SP1: Designing Security SharePoint 2010 SP1: Maintenance and Provisioning Sharepoint 2010 SP1: Backing Up, Restoring, and Monitoring Sharepoint 2010 SP1: Planning for Search SharePoint 2010 SP1: Content Management, Social Computing, and Collaboration Microsoft SharePoint Server 2010 SP1: Configuring Sharepoint 2010 SP1: Installation and Configuration Sharepoint 2010 SP1: Core Configuration Sharepoint 2010 SP1: Upgrading to SharePoint 2010 SP1 Sharepoint 2010 SP1: Configuring and Administering Search Sharepoint 2010 SP1: Configuring Web Applications SharePoint 2010 SP1: Authentication and Web Application Security Configuration Sharepoint 2010 SP1: Configuring Site Collections Sharepoint 2010 SP1: Managing Features and Solutions SharePoint 2010 SP1: Operational Health SharePoint 2010 SP1: Performance SharePoint Online Microsoft System Center Essentials Microsoft System Center Essentials: installation and Configuration Installing and Configuring System Center Essentials 2010 Managing Computers, Devices, and Updates in System Center Essentials 2010 Monitoring and Using Reports in System Center Essentials 2010 Virtualization Management in Essentials 2010 Backing up, Restoring, and Troubleshooting Essentials 2010 Microsoft Windows 8 Microsoft Windows 8.1: Supporting Windows 8.1 Microsoft Windows 8.1 - Supporting Windows 8.1: Installation and Applications Microsoft Windows 8.1 - Supporting Windows 8.1: Cloud Applications and Settings Microsoft Windows 8.1 - Supporting Windows 8.1: Networking and Remote Access Microsoft Windows 8.1 - Supporting Windows 8.1: Data Storage and Security Microsoft Windows 8.1 - Supporting Windows 8.1: Hardware and Mobile Devices Microsoft Windows 8.1 - Supporting Windows 8.1: Recovery and Endpoint Security Microsoft Windows 8.1 - Supporting Windows 8.1: Intune and Public Cloud Services Microsoft Windows 8.1 - Supporting Windows 8.1: Using MDOP Microsoft Windows 8.1: Configuration Microsoft Windows 8.1 - Configuring: Installing and Upgrading to Windows 8.1 Microsoft Windows 8.1 - Configuring: Hardware and Applications Microsoft Windows 8.1 - Configuring: Network Configuration Microsoft Windows 8.1 - Configuring: Remote Management and Security Microsoft Windows 8.1 - Configuring: Resource Access Microsoft Windows 8.1 - Configuring: Remote Access and Mobile Devices Microsoft Windows 8.1 - Configuring: Windows Clients Microsoft Windows 8.1 - Configuring: File and System Recovery Microsoft Windows: Deploying Windows Devices and Enterprise Apps Microsoft Windows - Deploying Windows Devices and Apps: Assessment Strategies Microsoft Windows - Deploying Windows Devices and Enterprise Apps: Compatibility Microsoft Windows - Deploying Windows Devices and Enterprise Apps: Images & PXE Microsoft Windows - Deploying Windows Devices and Enterprise Apps: MDT and LTI Microsoft Windows - Deploying Windows Devices and Enterprise Apps: ZTI and SCCM Microsoft Windows - Deploying Windows Devices and Enterprise Apps: Activation Microsoft Windows: Managing Enterprise Devices and Apps Microsoft Windows - Managing Enterprise Devices and Apps: Desktops and Devices Microsoft Windows - Managing Enterprise Devices and Apps: Preparing SCCM Microsoft Windows - Managing Enterprise Devices and Apps: Client Management Microsoft Windows - Managing Enterprise Devices and Apps: Inventory and Assets Microsoft Windows - Managing Enterprise Devices and Apps: Managing Applications Microsoft Windows - Managing Enterprise Devices and Apps: Software Updates Microsoft Windows - Managing Enterprise Devices and Apps: Compliance Microsoft Windows - Managing Enterprise Devices and Apps: Site Management Microsoft Windows 7 Microsoft Windows 7: First Look for IT Professionals Microsoft Windows 7: First Look for IT Professionals Microsoft Windows 7: Configuration Installing, Upgrading, and Migrating to Windows 7 Deploying Windows 7 Configuring Hardware and Applications in Windows 7 Configuring Network Connectivity in Windows 7 Configuring Access to Resources in Windows 7 Configuring Mobile Computing in Windows 7 Monitoring, Backing Up, and Restoring Windows 7 Systems

8 DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Exhibit 1 to Addendum 3

New Horizons IT - Complete Collection Solution Area Curriculum Series Course Title Microsoft Windows 7: Enterprise Desktop Administrator Planning for Windows 7 Deployment Determining Application Compatibility for Windows 7 Creating a Standard Image to Deploy Windows 7 Deploying Windows 7 Using WDS and USMT Deploying Windows 7 Using Lite-Touch Installation Deploying Windows 7 Using Zero-Touch Installation Designing Windows 7 Client Configuration Troubleshooting Windows 7 Client Configuration Designing Application and Update Deployments for Windows 7 Microsoft Windows 7: Enterprise Desktop Support Technician Identifying and Resolving Windows 7 Application Issues Management and Maintenance of Windows 7 Client Systems Troubleshooting Logon and Resource Access Issues in Windows 7 Resolving Windows 7 Network Connectivity Issues Troubleshooting IE8 and Encryption Issues in Windows 7 Protecting Windows 7 Against Malware and Vulnerabilities Microsoft Exchange Server 2013 Microsoft Exchange Server 2013: Advanced Solutions Microsoft Exchange Server 2013 - Advanced Solutions: Availability Microsoft Exchange Server 2013 - Advanced Solutions: Site-resilience Solutions Microsoft Exchange Server 2013 - Advanced Solutions: Advanced Security Microsoft Exchange Server 2013 - Advanced Solutions: Compliance and Discovery Microsoft Exchange Server 2013 - Advanced Solutions: Migration and Federation Microsoft Exchange Server 2013 - Advanced Solutions: Troubleshooting Microsoft Exchange Server 2013 - Advanced Solutions: Unified Messaging Microsoft Windows Server 2012 Microsoft Windows Server 2012 R2: Installing and Configuring Microsoft Windows Server 2012 R2 - Installing and Configuring: Servers Microsoft Windows Server 2012 R2 - Installing and Configuring: Storage Microsoft Windows Server 2012 R2 - Installing and Configuring: Print Services Microsoft Windows Server 2012 R2 - Installing and Configuring: Hyper - V Microsoft Windows Server 2012 R2 - Installing and Configuring: Networking Microsoft Windows Server 2012 R2 - Installing and Configuring: DNS Microsoft Windows Server 2012 R2 - Installing and Configuring: Active Directory Microsoft Windows Server 2012 R2 - Installing and Configuring: AD Groups & GPOs Microsoft Windows Server 2012 R2 - Installing and Configuring: Security Microsoft Windows Server 2012 R2: Administration Microsoft Windows Server 2012 R2 - Administration: Deploying and Managing WDS Microsoft Windows Server 2012 R2 - Administration: Updating and Monitoring Microsoft Windows Server 2012 R2 - Administration: File Services and Encryption Microsoft Windows Server 2012 R2 - Administration: Network Services and Access Microsoft Windows Server 2012 R2 - Administration: RADIUS, NPS, and NAP Microsoft Windows Server 2012 R2 - Administration: Service Accounts and Policies Microsoft Windows Server 2012 R2 - Administration: Managing Active Directory Microsoft Windows Server 2012 R2 - Administration: Group Policy Processing Microsoft Windows Server 2012 R2 - Administration: Managing GPOs and Preferences Microsoft Windows Server 2012 R2: Configuring Advanced Services Microsoft Windows Server 2012 R2 - Configuring Advanced Services: HA Microsoft Windows Server 2012 R2 - Configuring Advanced Services: VMs and DR Microsoft Windows Server 2012 R2 - Configuring Advanced Services: Storage Microsoft Windows Server 2012 R2 - Configuring Advanced Services: DAC Microsoft Windows Server 2012 R2 - Configuring Advanced Services: DHCP & DNS Microsoft Windows Server 2012 R2 - Configuring Advanced Services: AD Domains Microsoft Windows Server 2012 R2 - Configuring Advanced Services: AD Replication Microsoft Windows Server 2012 R2 - Configuring Advanced Services: PKI Microsoft Windows Server 2012 R2 - Configuring Advanced Services: Federation Microsoft Windows Server 2012 R2: Implementing an Advanced Infrastructure Microsoft Windows Server 2012 R2 - Advanced Infrastructure: Updates Microsoft Windows Server 2012 R2 - Advanced Infrastructure: VM hosts and guests Microsoft Windows Server 2012 R2 - Advanced Infrastructure: Storage and Networks Microsoft Windows Server 2012 R2 - Advanced Infrastructure: VM Administration Microsoft Windows Server 2012 R2 - Advanced Infrastructure: Clustering and NLB Microsoft Windows Server 2012 R2 - Advanced Infrastructure: Business Continuity Microsoft Windows Server 2012 R2 - Advanced Infrastructure: Monitoring Microsoft Windows Server 2012 R2 - Advanced Infrastructure: Certificate Services Microsoft Windows Server 2012 R2 - Advanced Infrastructure: AD RMS and AD FS Microsoft Windows Server 2012 R2: Designing and Implementing an Infrastructure Microsoft Windows Server 2012 R2: Server Infrastructure - AD Design Microsoft Windows Server 2012 R2: Server Infrastructure - AD DS Microsoft Windows Server 2012 R2: Server Infrastructure - OU and Group Policy Microsoft Windows Server 2012 R2: Server Infrastructure – Server Deployment Microsoft Windows Server 2012 R2: Server Infrastructure - DHCP Design Microsoft Windows Server 2012 R2: Server Infrastructure - DNS, File and Storage Microsoft Windows Server 2012 R2: Server Infrastructure - IPAM and VPN Microsoft Windows Server 2012 R2: Server Infrastructure – DirectAccess Microsoft Windows Server 2012 R2: Server Infrastructure - Network Protection Microsoft Windows Server 2012 R2: Server Infrastructure - Implement NPS and WAP Microsoft Windows Server 2008 Microsoft Windows Server 2008: Configuring Active Directory The Active Directory Infrastructure in Windows Server 2008 Additional Active Directory Server Roles in Windows Server 2008 Active Directory Objects in Windows Server 2008 Group Policy Objects Strategy in Windows Server 2008 Configuring DNS in Windows Server 2008

9 DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Exhibit 1 to Addendum 3

New Horizons IT - Complete Collection Solution Area Curriculum Series Course Title Active Directory Certificate Services in Windows Server 2008 Communications and Security in Windows Server 2008 Monitoring, Backups, and Recovery in Windows Server 2008 Microsoft Windows Server 2008: Configuring Network Infrastructure Configure IP Addressing and Windows Services in Windows Server 2008 Configure, Manage, and Maintain IP Services in Windows Server 2008 Name Resolution in Windows Server 2008 DNS Zones and Replication in Windows Server 2008 Configure Network Access in Windows Server 2008 Network Access Security in Windows Server 2008 Configure File and Print Services in Windows Server 2008 Monitor Network Infrastructure in Windows Server 2008 Microsoft Windows Server 2008: Configuring Applications Infrastructure Deploying Windows Server 2008 Servers Configuring Windows Server 2008 Availability Configure Terminal Services in Windows 2008 Terminal Services Resource Access in Windows 2008 Configuring Windows Server Hyper-V and Virtual Machines Configuring Web Services and Security in Windows Server 2008 Managing IIS in Windows Server 2008 Configuring Web Service Protocols in Windows Server 2008 Configuring Network Application Services in Windows Server 2008 Microsoft Windows Server 2008: Server Administration Planning Windows Server 2008 Deployment Planning Active Directory and Group Policy for Windows Server 2008 Windows Server 2008 Management and Delegation Managing File Servers and Data Provisioning in Windows Server 2008 Windows Server 2008 Application Server Management and Application Provisioning Windows Server 2008 Application Servers and Services Patch Management and Securing and Monitoring Servers in Windows Server 2008 Certificate Services, SANs, and High Availability in Windows Server 2008 Accessing Windows Networks Remotely in Windows Server 2008 Windows Server 2008 Backup and Recovery Microsoft Windows Server 2008: Enterprise Administration Planning Name Resolution and IP Addressing in Microsoft Windows Server 2008 Network Access in Microsoft Windows Server 2008 Application Access and Delivery in Microsoft Windows Server 2008 Server and Application Virtualization in Microsoft Windows Server 2008 Designing the Active Directory Infrastructure in Microsoft Windows Server 2008 Active Directory Administration in Microsoft Windows Server 2008 Existing Infrastructures and Branch Deployments in Microsoft Windows Server 2008 The Certificate Services Infrastructure in Microsoft Windows Server 2008 Software Updates and Compliance Management in Microsoft Windows Server 2008 Designing Data Security and High Availability in Microsoft Windows Server 2008 Microsoft Windows 2008: Update to R2 Active Directory Domain Services in Windows Server 2008 R2 Management Improvements in Windows Server 2008 R2 Improvements to Role Services in Windows Server 2008 R2 Access Control in Windows Server 2008 R2 Microsoft Exchange Server Microsoft Exchange Server 2013: Core Solutions Microsoft Exchange Server 2013 - Core Solutions: Deployment Microsoft Exchange Server 2013 - Core Solutions: Mailbox Server Management Microsoft Exchange Server 2013 - Core Solutions: Client Access Servers Microsoft Exchange Server 2013 - Core Solutions: Configuring Mobile Connectivity Microsoft Exchange Server 2013 - Core Solutions: Message Transport Microsoft Exchange Server 2013 - Core Solutions: Access Control Microsoft Exchange Server 2013 - Core Solutions: High Availability and DR Microsoft Exchange Server 2013 - Core Solutions: Monitoring and Troubleshooting Microsoft Exchange Server 2010 SP1: Configuring Exchange Server 2010 SP1: Planning for Exchange Server Exchange Server 2010 SP1: Installation and Configuration Exchange Server 2010 SP1: Administrative Tools Exchange Server 2010 SP1: Mailbox Server Administration Exchange Server 2010 SP1: Public Folders and Messaging Records Management Exchange Server 2010 SP1: Message Transport Exchange Server 2010 SP1: Transport Rules, Message Compliance and Security Exchange Server 2010 SP1: Client Access Exchange Server 2010 SP1: High Availability Exchange Server 2010 SP1: Backup and Recovery Exchange Server 2010 SP1: Monitoring Mail Flow and Performance Microsoft Hyper-V Microsoft Windows Server 2008 R2: Server Virtualization with Hyper-V Microsoft Windows Server 2008 R2 Hyper-V: Introduction and Planning Overview Microsoft Windows Server 2008 R2 Hyper-V: Installing Hyper-V Microsoft Windows Server 2008 R2 Hyper-V: Manage & Optimize the Hyper-V Server Microsoft Windows Server 2008 R2 Hyper-V: Networking and Remote Administration Microsoft Windows Server 2008 R2 Hyper-V: Migration, Creation, and Management Microsoft Windows Server 2008 R2 Hyper-V: Deploying VMs Using Templates Microsoft Windows Server 2008 R2 Hyper-V: High Availability and Recoverability Microsoft Windows Server 2008 R2 Hyper-V: Implementing Remote Desktop Services Microsoft Windows Server 2008 R2 Hyper-V: Remote Desktop Virtualization Roles Microsoft Windows Server 2008 R2 Hyper-V: Monitoring and Managing Environments UNIX Essentials Unix OS Fundamentals

10 DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Exhibit 1 to Addendum 3

New Horizons IT - Complete Collection Solution Area Curriculum Series Course Title Unix OS Fundamentals: An Introduction to Unix Unix OS Fundamentals: Managing Files and Directories Unix OS Fundamentals: Security Unix OS Fundamentals: Network Administration Linux Professional Institute Linux Professional Institute: Advanced Level Linux Professional (LPIC-2) Exam 201 Linux User Notification and Device Management E-mail and Security in Linux Linux Kernel Compilation and Linux Startup Linux File Sharing and Filesystem Management Linux Network Configuration Managing Resource Utilization in Linux Linux Professional Institute: Advanced Level Linux Professional (LPIC-2) Exam 202 Linux Network Services Linux System Maintenance and Hardware Configuration Linux Security Linux System Troubleshooting Booting Linux and Installing Applications from Source VMware VMware: Datacenter Virtualization with vSphere 5 - Part 2 VMware vSphere 5 - Part 2: VSphere Clustering VMware vSphere 5 - Part 2: High Availability and Fault Tolerance VMware vSphere 5 - Part 2: Processor and Resource Management VMware vSphere 5 - Part 2: DRS, Resource Pools, and vApps VMware vSphere 5 - Part 2: Logging and Performance VMware vSphere 5 - Part 2: vSphere Security VMware vSphere 5 - Part 2: Securing Hosts, Internal Components, Certificate Use VMware vSphere 5 - Part 2: Host Profiles, Update Manager, and Auto Deploy VMware vSphere 5 - Part 2: vCenter Server Appliance Deployments and Upgrades VMware vSphere 5 - Part 2: Upgrading Hosts and Virtual Machines VMware: Datacenter Virtualization Design and Optimization with vSphere 5 VMware vSphere 5 – Datacenter Design: Introducing vSphere Design Fundamentals

VMware vSphere 5 – Datacenter Design: Creating vSphere Conceptual and Logical Designs VMware vSphere 5 – Datacenter Design: vSphere Network and Storage Design VMware vSphere 5 - Datacenter Design VMs, Management, and Implementation VMware vSphere 6 Install, Configure, Manage: Part 2 VMware vSphere 6 Install, Configure, Manage - Part 2: vSphere 6 Clustering VMware vSphere 6 Install, Configure, Manage - Part 2: vSphere 6 DRS VMware vSphere 6 Install, Configure, Manage - Part 2: vSphere 6 Monitoring VMware vSphere 6 Install, Configure, Manage - Part 2: vSphere 6 Design VMware vSphere 6 Install, Configure, Manage - Part 2: vSphere 6 Updating VMware vSphere 6 Install, Configure, Manage - Part 2: vSphere 6 Upgrading VMware vSphere 6 Install, Configure, Manage: Part 1 VMware vSphere 6 Install, Configure, Manage - Part 1: vSphere 6 Overview VMware vSphere 6 Install, Configure, Manage - Part 1: vSphere Installation VMware vSphere 6 Install, Configure, Manage - Part 1: Virtual Networks VMware vSphere 6 Install, Configure, Manage - Part 1: Storage and VMs VMware Workstation 11 Fundamentals Installing and Configuring VMware Workstation 11 Creating and Configuring Virtual Machines in VMware Workstation 11 Managing Virtual Machine Devices and Resources in VMware Workstation 11 VMware Workstation 11 Networking and Remote Connectivity VMware NSX Network Virtualization VMware NSX Network Virtualization: Physical Infrastructure Requirements VMware NSX Network Virtualization: Configuring vSphere Networking VMware NSX Network Virtualization: NSX Network Services VMware Overview VMware Desktop Virtualization Overview VMware Data Center Virtualization Overview VMware Business Mobility Solutions VMware Cloud Services Solutions VMware: Datacenter Virtualization with vSphere 5 - Part 1 VMware vSphere 5 - Part 1: Introduction to Virtualization VMware vSphere 5 - Part 1: vCenter Server Installation VMware vSphere 5 - Part 1: vSphere Client and vCenter Server Configuration VMware vSphere 5 - Part 1: ESXi Installation and Configuration VMware vSphere 5 – Part 1: vCenter Server Inventory VMware vSphere 5 - Part 1: vCenter Server Administration VMware vSphere 5 - Part 1: vCenter Server Management VMware vSphere 5 - Part 1: Creating Virtual Machines VMware vSphere 5 - Part 1: Configuring and Managing Virtual Machines VMware vSphere 5 - Part 1: An Overview of Virtual Network Creation VMware vSphere 5 - Part 1: Configuring and Managing Virtual Networks VMware vSphere 5 - Part 1: Introduction to vSphere Storage Concepts VMware vSphere 5 – Part 1: Storage Configuration and Management Office 365 Managing Identities and Requirements in Office 365 Office 365 Configuration Office 365 Deployment Managing Office 365 Cloud Identities, Synchronization, and Clients Office 365 Federated Identities (Single Sign-On) Monitoring and Troubleshooting Office 365 Usage Enabling Office 365 Services Office 365 Services: Managing Clients and End-User Devices

11 DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Exhibit 1 to Addendum 3

New Horizons IT - Complete Collection Solution Area Curriculum Series Course Title Office 365 Services: SharePoint Online Site Collections Office 365 Services: Planning for Exchange Online and Lync Online Office 365 Services: Configuring Exchange Online and Lync Online Windows PowerShell Microsoft PowerShell and Exchange Server Microsoft PowerShell and Exchange Server: Getting Started Microsoft PowerShell and Exchange Server: Managing Mailboxes Microsoft PowerShell and Exchange Server: Distribution Groups and Databases Microsoft PowerShell and SharePoint Microsoft PowerShell and SharePoint: Getting Started Microsoft PowerShell and SharePoint: Managing Sites Microsoft PowerShell and SQL Server Microsoft PowerShell and SQL Server: Introduction Microsoft PowerShell and SQL Server: Database Management Microsoft PowerShell for Windows Microsoft PowerShell for Windows: Getting Started with PowerShell Microsoft PowerShell for Windows: Aliases, Providers, and Objects Microsoft PowerShell for Windows: Remoting and Modules Windows Powershell Desired State Configuration Windows PowerShell Desired State Configuration Fundamentals Advanced PowerShell Desired State Configuration Advanced PowerShell Desired State Configuration: Writing Custom Resources Advanced PowerShell Desired State Configuration: Advanced Configuration Microsoft Lync Server 2013 Microsoft Lync Server 2013 Microsoft Lync Server 2013: Administration and Data Resiliency Overview Microsoft Lync Server 2013: Configuration and Maintenance Microsoft Windows 10 Microsoft Windows 10: Exploring the Technical Preview First Encounters with Windows 10 Microsoft Windows 10 End User First Look Microsoft Windows 10 First Look: Interface and New Features Microsoft Windows 10 First Look: Configuration Microsoft Windows 10: Configuring Windows Devices Introduction to Windows 10 Deploy Windows 10 with New and Traditional Tools Configure Devices and Disks in Windows 10 Configure Networking and Remote Connections in Windows 10 Maintain Windows 10 and Configure Virtualization Technologies in Windows 10 Configure Authentication and Secure Identities for Windows 10 Threat Resistance Technologies in Windows 10 Data Protection in Windows 10 Install and Manage Windows 10 Applications and Universal Windows Apps Manage Windows 10 Devices Microsoft Internet Information Services 8.5 Microsoft Internet Information Services Installing and Configuring a Microsoft IIS Server Service DevOps Working with Chef Working with Chef: Fundamentals DevOps Fundamentals DevOps Fundamentals: Tools, Technologies, and Infrastructures Using Using Docker: Benefits and Installation Using Docker: Dockerizing Applications Using Docker: Customizing and Clustering Using Puppet Using Puppet: Implementation and Benefits Using Puppet: Configuration and Programming Using Vagrant Using Vagrant: Introduction Using Vagrant: Configuration Red Hat Linux Red Hat Certified System Administrator RHEL 7 Red Hat Certified System Administrator: The Environment Red Hat Certified System Administrator: The Command Line Red Hat Certified System Administrator: Administration and Permissions Red Hat Certified System Administrator: Scripting and Scheduling Red Hat Certified System Administrator: Processes, Networking, and Logging Red Hat Certified System Administrator: Advanced Networking Red Hat Certified System Administrator: Remote Connections and Access Red Hat Certified System Administrator: File Systems and Device Management Red Hat Certified System Administrator: Boot Process and Installation Red Hat Certified System Administrator: Introduction to Virtualization Red Hat Certified System Administrator: SELinux and Troubleshooting Microsoft Mobility and Device Fundamentals Windows Devices and Mobility Fundamentals Device Configuration and Data Access Data Management and Device Security Cloud Services and Enterprise Mobility Getting Started with Ubuntu Introduction to Ubuntu Essential Tools for Ubuntu Software Development

12 DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Exhibit 1 to Addendum 3

New Horizons IT - Complete Collection Solution Area Curriculum Series Course Title Working with Jenkins Working with Jenkins: Fundamentals Windows Server 2016 Microsoft Windows Server 2016 (First Look) Microsoft Windows Server 2016 (First Look): Active Directory and Networking Microsoft Windows Nano Server First Look Microsoft Windows Nano Server: Nano Server First Look Mentoring Assets Mentoring Assets Mentoring 70-640 TS: Windows Server 2008 Active Directory, Configuring Mentoring 70-642 TS: Windows Server 2008 Network Infrastructure, Configuring Mentoring 70-646 PRO: Windows Server 2008, Server Administrator Mentoring 70-647 Pro: Windows Server 2008, Enterprise Administrator Mentoring 70-680 TS: Windows 7, Configuring Mentoring 70-686 PRO: Windows 7, Enterprise Desktop Administrator Mentoring SK0-003 Server+ Mentoring 70-685 PRO: Windows 7, Enterprise Desktop Support Technician Mentoring 70-668 PRO: Microsoft SharePoint 2010, Administrator Mentoring 70-667 TS: Microsoft SharePoint 2010, Configuring Mentoring LX0-101 Linux+ Powered by LPI Exam 1 Mentoring LX0-102 Linux+ Powered by LPI Exam 2 Mentoring 70-662 TS: Microsoft Exchange Server 2010, Configuring Mentoring VMware: Datacenter Virtualization with vSphere 5 - Part 2 Mentoring 220-801 CompTIA A+ Mentoring 220-802 CompTIA A+ Mentoring 70-687 Configuring Windows 8.1 Mentoring 70-410 Installing and Configuring Windows Server 2012 Mentoring 70-461 Querying Microsoft SQL Server 2012 Mentoring 70-411 Administering Windows Server 2012 Mentoring 70-412 Configuring Advanced Windows Server 2012 Services Mentoring 70-688 Mentoring 70-341 Core Solutions of Microsoft Exchange Server 2013 Mentoring 70-331 Core Solutions of Microsoft SharePoint Server 2013 Mentoring 70-332 Advanced Solutions of Microsoft SharePoint Server 2013 Mentoring 70-342 Advanced Solutions of Microsoft Exchange Server 2013 Mentoring 70-346 Managing Office 365 Identities and Requirements Mentoring N10-006 CompTIA Network+ Mentoring 70-347 Enabling Office 365 Services Mentoring LX0-104 CompTIA Linux+ Powered by LPI Exam 2 Mentoring 70-695 Deploying Windows Devices and Enterprise Apps Mentoring 70-696 Managing Enterprise Devices and Apps Mentoring 98-368 Mobility and Device Fundamentals Mentoring 220-902 CompTIA A+ Mentoring 220-901 CompTIA A+ Mentoring 70-697 Configuring Windows Devices Mentoring VMware Certified Professional 5, Data Center Virtualization (VCP5-DCV) Test Preps Test Preps TestPrep 70-640 TS: Windows Server 2008 Active Directory, Configuring TestPrep 70-642 TS: Windows Server 2008 Network Infrastructure, Configuring TestPrep 70-680 TS: Windows 7, Configuring TestPrep SK0-003 Server+ TestPrep 70-686 PRO: Windows 7, Enterprise Desktop Administrator TestPrep 70-685 PRO: Windows 7, Enterprise Desktop Support Technician TestPrep 70-647 PRO: Windows Server 2008, Enterprise Administrator TestPrep 70-646 PRO: Windows Server 2008, Server Administrator TestPrep 70-667 TS: Microsoft SharePoint 2010, Configuring TestPrep 70-668 PRO: Microsoft SharePoint 2010, Administrator TestPrep LX0-101 Linux+ Powered by LPI Exam 1 TestPrep LX0-102 Linux+ Powered by LPI Exam 2 TestPrep 70-662 TS: Microsoft Exchange Server 2010, Configuring TestPrep 220-801 CompTIA A+ TestPrep 220-802 CompTIA A+ TestPrep 70-688 Supporting Windows 8.1 TestPrep 70-411 Administering Windows Server 2012 TestPrep 70-410 Installing and Configuring Windows Server 2012 TestPrep 70-412 Configuring Advanced Windows Server 2012 Services TestPrep 70-687 Configuring Windows 8.1 TestPrep 70-341 Core Solutions of Microsoft Exchange Server 2013 TestPrep 70-331 Core Solutions of Microsoft SharePoint Server 2013 TestPrep 70-414 Implementing an Advanced Server Infrastructure TestPrep 70-332 Advanced Solutions of Microsoft SharePoint Server 2013 TestPrep 70-346 Managing Office 365 Identities and Requirements TestPrep 70-342 Advanced Solutions of Microsoft Exchange Server 2013 TestPrep 70-347 Enabling Office 365 Services TestPrep SK0-004 CompTIA Server+ TestPrep LX0-103 CompTIA Linux+ Powered by LPI Exam 1 TestPrep LX0-104 CompTIA Linux+ Powered by LPI Exam 2 TestPrep 70-696 Managing Enterprise Devices and Apps TestPrep 70-695 Deploying Windows Devices and Enterprise Apps TestPrep 98-368 Mobility and Device Fundamentals TestPrep 220-901 CompTIA A+ TestPrep 220-902 CompTIA A+ TestPrep 70-697 Configuring Windows Devices INTERNET AND NETWORK TECHNOLOGIES

13 DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Exhibit 1 to Addendum 3

New Horizons IT - Complete Collection Solution Area Curriculum Series Course Title Social Networking Yammer for Business Users Yammer for Business Users: Using Yammer Getting the Most from Social Networking Social Networking Fundamentals Social Networking Services, Strategy, and Management CompTIA Networking, Internetworking, and Security Technologies CompTIA Security+ SY0-401 CompTIA Security+ SY0-401: Control Fundamentals and Security Threats CompTIA Security+ SY0-401: Network Protocols, Attacks, and Defenses CompTIA Security+ SY0-401: Creating Secure Networks CompTIA Security+ SY0-401: Vulnerability Assessment and Penetration Testing CompTIA Security+ SY0-401: Authentication, Biometrics, and Security Controls CompTIA Security+ SY0-401: Securing a Networked Environment CompTIA Security+ SY0-401: Remote Access, Mobile, and Wireless Security CompTIA Security+ SY0-401: Cryptographic Methods and Public Key Infrastructures CompTIA Security+ SY0-401: Securing Applications, Virtualization, and the Cloud CompTIA Security+ SY0-401: Continuity, Disaster Recovery, and Computer Forensics CompTIA Network+ N10-006 CompTIA Network+ N10-006: Network Architecture Part 1 CompTIA Network+ N10-006: Network Architecture Part 2 CompTIA Network+ N10-006: Network Operations Part 1 CompTIA Network+ N10-006: Network Operations Part 2 CompTIA Network+ N10-006: Network Security CompTIA Network+ N10-006: Troubleshooting Part 1 CompTIA Network+ N10-006: Troubleshooting Part 2 CompTIA Network+ N10-006: Industry Standards, Practices, and Network Theory CompTIA Mobility+ MB0-001 CompTIA Mobility+ MB0-001: Over The Air Technologies CompTIA Mobility+ MB0-001: Network Infrastructure CompTIA Mobility+ MB0-001: Mobile Device Management 1 CompTIA Mobility+ MB0-001: Mobile Device Management 2 CompTIA Mobility+ MB0-001: Security CompTIA Mobility+ MB0-001: Troubleshooting 1 CompTIA Mobility+ MB0-001: Troubleshooting 2 Wireless Internet of Things Introduction Internet of Things Applications Internet of Things Hardware Networking and Telecommunications Fundamentals Networking Fundamentals Networking Fundamentals: Configuring Wired and Wireless Networks and Firewalls Networking Fundamentals: Remote Connections, Shares, and Mac OSX Networking Security Solutions Certified Internet Security Auditor (CISA) CISA Domain: The Process of Auditing Information Systems - Part 1 CISA Domain: The Process of Auditing Information Systems - Part 2 CISA Domain: Governance and Management of IT - Part 1 CISA Domain: Governance and Management of IT - Part 2 CISA Domain: IS Acquisition, Development, and Implementation - Part 1 CISA Domain: IS Acquisition, Development and Implementation - Part 2 CISA Domain: IS Operations, Maintenance and Support - Part 1 CISA Domain: IS Operations, Maintenance, and Support - Part 2 CISA Domain: Protection of Information Assets - Part 1 CISA Domain: Protection of Information Assets - Part 2 CISA Domain: IS Acquisition, Development and Implementation - Part 3 Certified Ethical Hacker (CEH) Certified Ethical Hacker (CEH): Hacking and Penetration Testing Certified Ethical Hacker (CEH): Footprinting and Reconnaissance Certified Ethical Hacker (CEH): Network Scanning Certified Ethical Hacker (CEH): Enumeration and Cryptography Certified Ethical Hacker (CEH): System Hacking Certified Ethical Hacker (CEH): Malware Certified Ethical Hacker (CEH): Sniffing Certified Ethical Hacker (CEH): Social Engineering Certified Ethical Hacker (CEH): Denial of Service and Session Hijacking Certified Ethical Hacker (CEH): Hacking Web Servers Certified Ethical Hacker (CEH): Hacking Web Applications Certified Ethical Hacker (CEH): SQL Injection Certified Ethical Hacker (CEH): Hacking Wireless Networks Certified Ethical Hacker (CEH): Hacking Mobile Platforms Certified Ethical Hacker (CEH): Evading IDS, Firewalls, and Honeypots Certified Ethical Hacker (CEH): Buffer Overflow Certified Information Security Manager (CISM) CISM: Information Security Governance (Part 1) CISM: Information Security Governance (Part 2) CISM: Information Security Governance (Part 3) CISM: Information Risk Management and Compliance (Part 1) CISM: Information Risk Management and Compliance (Part 2) CISM: Information Security Program Development and Management (Part 1) CISM: Information Security Program Development and Management (Part 2) CISM: Information Security Program Development and Management (Part 3) CISM: Information Security Program Development and Management (Part 4) CISM: Information Security Program Development and Management (Part 5) CISM: Information Security Incident Management (Part 1)

14 DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Exhibit 1 to Addendum 3

New Horizons IT - Complete Collection Solution Area Curriculum Series Course Title CISM: Information Security Incident Management (Part 2) CompTIA Advanced Security Practitioner CAS-002 CompTIA CASP CAS-002: Cryptography and Enterprise Storage Concerns CompTIA CASP CAS-002: Advanced Network Design, Management, and Controls CompTIA CASP CAS-002: Security Controls for Hosts CompTIA CASP CAS-002: Application Vulnerabilities and Security Controls CompTIA CASP CAS-002: Industry Influences, Risk Planning, Strategy, and Control CompTIA CASP CAS-002: Privacy Policies & Procedures and Incident Recovery CompTIA CASP CAS-002: Research, Analysis and Assessment CompTIA CASP CAS-002: Integration of Computing, Communications, and Disciplines CompTIA CASP CAS-002: Technical Integration of Enterprise Components Microsoft Security Fundamentals Microsoft Security Fundamentals: Security Layers Microsoft Security Fundamentals: Operating System Security Microsoft Security Fundamentals: Network Security Microsoft Security Fundamentals: Security Software Certified Secure Software Lifecycle Professional (CSSLP) CSSLP: Secure Software Concepts CSSLP: Secure Software Requirements CSSLP: Secure Software Design CSSLP: Secure Software Implementation and Coding CSSLP: Secure Software Testing CSSLP: Software Acceptance, Deployment, Operations, Maintenance, and Disposal CSSLP: Supply Chain and Software Acquisition OWASP Top 10 Introduction to OWASP and the Top 10 OWASP Mitigations for .NET Foundations of Android Security Android Architecture, Protection, and Development Best Practices Android Security Vulnerabilities, Testing, and Enterprise Considerations Foundations of iOS Security iOS Security Architecture and Application Data Protection Securing Against Threats, Securing for Enterprise, and Jailbreaking Devices Cryptography Fundamentals Cryptography Fundamentals: Defining Cryptography Cryptography Fundamentals: Applying Cryptography Systems Security Certified Practitioner Systems Security Certified Practitioner: Access Controls Systems Security Certified Practitioner: Security Operations Systems Security Certified Practitioner: Security Administration Systems Security Certified Practitioner: Risk Management Systems Security Certified Practitioner: Incident Response and Recovery Securing User Accounts Securing User Accounts: Fundamental Security Concepts Securing User Accounts: Logon, Logoff, Account Changes, and Attack Mitigation Securing User Accounts: Authorization, Registration, and Passwords What's New in CISSP 2015 Changes to CISSP 2015 Cisco IINS 2.0: Implementing Cisco IOS Network Security Cisco IINS 2.0: Introducing Networking Security Fundamentals Cisco IINS 2.0: Security Policies and Strategies Cisco IINS 2.0: Cisco Network Foundation Protection Cisco IINS 2.0: Securing the Management Plane and AAA Configuration Cisco IINS 2.0: Securing the Data Plane on Cisco Switches Cisco IINS 2.0: Securing the Data Plane in IPv6 Environments Cisco IINS 2.0: Threat Control, Mitigation, and Firewalls Cisco IINS 2.0: Implementing Firewall Policies Cisco IINS 2.0: Implementing IPS Cisco IINS 2.0: VPN Technologies and Public Key Infrastructure Cisco IINS 2.0: IPsec Fundamentals and VPNs DESGN 2.1: Designing for Cisco Internetwork Solutions Cisco DESGN 2.1: Network Design Methodology Overview Cisco DESGN 2.1: Structuring and Modularizing the Network Cisco DESGN 2.1: Designing Basic Campus and Data Center Networks Cisco DESGN 2.1: Identifying WAN Technology Considerations Cisco DESGN 2.1: Designing the Enterprise WAN and Branch Cisco DESGN 2.1: Designing IP Addressing Cisco DESGN 2.1: Selecting Routing Protocols Cisco DESGN 2.1: Defining Network Security Cisco DESGN 2.1: Security Solutions for the Network Cisco DESGN 2.1: Integrating Voice and Video Architectures Cisco DESGN 2.1: Voice and Video Technology Requirements Cisco DESGN 2.1: Design Considerations for Basic Wireless Networking ICND1 2.0: Interconnecting Cisco Networking Devices Part 1 ICND1 2.0: Networking, Communications, and LANs ICND1 2.0: Operating Cisco IOS Software ICND1 2.0: Switch Operations ICND1 2.0: Ethernet Operations ICND1 2.0: Understanding IPv4 Addresses ICND1 2.0: Address Blocks and VLSM ICND1 2.0: The Transport Layer and Router Configuration ICND1 2.0: Packet Delivery and Static Routing ICND1 2.0: Access Control Lists and Network Address Translation ICND1 2.0: Managing Network Device Security

15 DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Exhibit 1 to Addendum 3

New Horizons IT - Complete Collection Solution Area Curriculum Series Course Title ICND1 2.0: VLANs and DHCP ICND1 2.0: WANs and Dynamic Routing Protocols ICND1 2.0: IPv6 ICND2 2.0: Interconnecting Cisco Networking Devices Part 2 ICND2 2.0: VLANs and Spanning-Tree ICND2 2.0: EtherChannel and Layer 3 Redundancy ICND2 2.0: Troubleshooting Basic Connectivity ICND2 2.0: Implementing an EIGRP Based Solution ICND2 2.0: An Overview of OSPF ICND2 2.0: Implementing a Scalable, Multiarea Network, OSPF Based Solution ICND2 2.0: Wan Technology Overview and Serial Connections ICND2 2.0: Establishing a WAN Connection Using Frame Relay ICND2 2.0: VPN Solutions and GRE Tunnels ICND2 2.0: Network Device Management Cisco SENSS 1.0 SENSS 1.0: Secure Design Principles SENSS 1.0: Deploying Cisco IOS Control and Management Plane Security Controls SENSS 1.0: Deploying Cisco Traffic Telemetry Methods SENSS 1.0: Deploying Cisco IOS Layer 2 and Layer 3 Data Plane Security Controls SENSS 1.0: NAT Deployment on Cisco IOS Software and Cisco ASA SENSS 1.0: Firewall Threat Controls and Basic Cisco ASA Policy Configuration SENSS 1.0: Deploying Advanced Cisco ASA Access Policies SENSS 1.0: Deploying Reputation and Identity-Based Cisco ASA Access Policies SENSS 1.0: Threat Controls Deployment on Cisco IOS Software ROUTE 2.0: Implementing Cisco IP Routing Cisco ROUTE 2.0: Basic Network and Routing Concepts Cisco ROUTE 2.0: Understanding the RIP and EIGRP Routing Protocols Cisco ROUTE 2.0: EIGRP Topology Table and Optimizing EIGRP Behavior Cisco ROUTE 2.0: Configuring EIGRP for IPv6 and Named EIGRP Cisco ROUTE 2.0: Establishing OSPF Neighbor Relationships Cisco ROUTE 2.0: Link-State Database and Optimizing OSPF Behavior Cisco ROUTE 2.0: Configuring OSPFv3 Cisco ROUTE 2.0: Configuring Routing Protocol Redistribution Cisco ROUTE 2.0: Redistribution Using Distribute and Prefix Lists Cisco ROUTE 2.0: Path Control Implementation Cisco ROUTE 2.0: Enterprise Internet Connectivity I Cisco ROUTE 2.0: Implementing Basic BGP Operations Cisco ROUTE 2.0: BGP Path Manipulation, Control, and BGP in the IPv6 Environment Cisco ROUTE 2.0: Routers and Routing Protocol Hardening Cisco ROUTE 2.0: Redistribution Using Route Maps and Tags Cisco ROUTE 2.0: Enterprise Internet Connectivity II Cisco ROUTE 2.0: Optimizing and Tuning OSPF Cisco ROUTE 2.0: Network Principles and Layer 2 Technologies Cisco ROUTE 2.0: Layer 3 Technologies Cisco ROUTE 2.0: VPN Technologies Cisco ROUTE 2.0: Securing Access Cisco ROUTE 2.0: Infrastructure Services SWITCH 2.0: Implementing Cisco IP Switched Networks Cisco SWITCH 2.0: Basic Concepts and Network Design Cisco SWITCH 2.0: Campus Network Architecture I Cisco SWITCH 2.0: Campus Network Architecture II Cisco SWITCH 2.0: Spanning Tree Implementation Cisco SWITCH 2.0: Spanning Tree Implementation II Cisco SWITCH 2.0: Inter-VLAN Routing Cisco SWITCH 2.0: High-Availability Networks Cisco SWITCH 2.0: Layer 3 Redundancy with HSRP Cisco SWITCH 2.0: Campus Network Security I Cisco SWITCH 2.0: Campus Network Security II Cisco SWITCH 2.0: STP Tuning and PVST and RSTP Implementation Cisco SWITCH 2.0: Configuring Layer 3 Redundancy with VRRP and GLBP Cisco SWITCH 2.0: Campus Network Security III TSHOOT 2.0: Troubleshooting and Maintaining Cisco IP Networks Cisco TSHOOT 2.0: Tools and Methodologies of Troubleshooting Cisco TSHOOT 2.0: Troubleshooting IPv4 and IPv6 Addressing and Routing Cisco TSHOOT 2.0: Troubleshooting OSPF Cisco TSHOOT 2.0: Troubleshooting EIGRP and BGP Cisco TSHOOT 2.0: Troubleshooting RIPv2 Cisco TSHOOT 2.0: Troubleshooting RIPng Cisco TSHOOT 2.0: Troubleshooting Redistribution Cisco TSHOOT 2.0: Troubleshooting Layer 2 Switching and Inter-VLAN Routing Cisco TSHOOT 2.0: Troubleshooting FHRP Cisco TSHOOT 2.0: Troubleshooting Security Issues Cisco TSHOOT 2.0: Troubleshooting Router Features Cisco SITCS 1.0: Implementing Cisco Threat Control Solutions Cisco SITCS 1.0: Cisco ASA (CX) NGFW Services I Cisco SITCS 1.0: Cisco ASA (CX) NGFW Services II Cisco SITCS 1.0: Cisco Web Security Appliance Cisco SITCS 1.0: Configuring Cisco Web Security Appliance Cisco SITCS 1.0: Cisco Cloud Web Security Cisco SITCS 1.0: Cisco Email Security Appliance Cisco SITCS 1.0: Cisco Intrusion Prevention Systems I Cisco SITCS 1.0: Cisco Intrusion Prevention Systems II Cisco SITCS 1.0: Configuring Cisco Email Security Implementing Cisco Secure Access Solutions (SISAS) 1.0 Cisco SISAS 1.0: Identity Services Overview and 802.1X

16 DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Exhibit 1 to Addendum 3

New Horizons IT - Complete Collection Solution Area Curriculum Series Course Title Cisco SISAS 1.0: EAP and Logging into Cisco Identity Services Engine (ISE) Cisco SISAS 1.0: Cisco ISE Technologies Cisco SISAS 1.0: Certificate-based Authentication and Authorization Cisco SISAS 1.0: Cisco TrustSec, MACsec, and WebAuth Access Cisco SISAS 1.0: Endpoint Access Control Enhancements and Troubleshooting CICD 1.0: Implementing Cisco Collaboration Devices CICD 1.0: Cisco Unified Communications Solutions CICD 1.0: Characteristics of Cisco Unified Communications Solutions CICD 1.0: Cisco Unified Communications Manager Administrator Interfaces CICD 1.0: Cisco UCM End-user Interfaces and Call Flows and Call Legs CICD 1.0: Component Impact on Call Flows in Unified Communications Manager CICD 1.0: Cisco UCM and Cisco UCM Express End-users CICD 1.0: Cisco UCM and Cisco UCM Express Endpoints CICD 1.0: Cisco UCM and Cisco UCM Express Endpoint Implementation Options CICD 1.0: Understanding Telephony Features CICD 1.0: Telephony Feature Implementation and Mobility Options CICD 1.0: Unity Connection and End User and Mailbox Requirements CICD 1.0: Unity Connection End User Implementation and IM and Presence Service CICD 1.0: Supporting End Users and Understanding Cisco UCM Reports CICD 1.0: Cisco UCM Call Detail Records and Reporting and Monitoring Tools DCICN 1.0: Introducing Cisco Data Center Networking DCICN 1.0 - Ethernet Networks DCICN 1.0 - Simple Networks DCICN 1.0 - Switched Networks DCICN 1.0 - VLANs and Trunks DCICN 1.0 - Redundant Switched Topology DCICN 1.0 - IPv4 and the Routing Process DCICN 1.0 - IPv6 and Packet Delivery DCICN 1.0 - Routing and ACLs on Cisco Nexus Switches SIMOS 1.0: Implementing Cisco Secure Mobility Solutions SIMOS 1.0: Fundamentals of VPN Technologies and Cryptography SIMOS 1.0: Deploying Secure Site-to-Site Connectivity Solutions (Part 1) SIMOS 1.0: Deploying Secure Site-to-Site Connectivity Solutions (Part 2) SIMOS 1.0: Deploying Cisco IOS Site-to-Site FlexVPN Solutions SIMOS 1.0: Deploying Clientless SSL VPNs SIMOS 1.0: Deploying Cisco AnyConnect VPNs SIMOS 1.0: Clientless SSL VPNs, Endpoint Security, and Dynamic Access Policies Certified Information Systems Security Professional (CISSP) CISSP: Security Principles, Governance, and Guidelines CISSP: Risk Management CISSP: Asset Security CISSP: Security Engineering Part 1 CISSP: Security Engineering Part 2 CISSP: Communication & Network Security Design CISSP: Identity and Access Management CISSP: Security Assessment and Testing CISSP: Security Operations Part 1 CISSP: Security Operations Part 2 CISSP: Security Operations Part 3 CISSP: Software Development Security DCICT 1.0: Introducing Cisco Data Center Technologies Cisco DCICT 1.0 - Cisco Data Center Layers and the Nexus 7000 Series Switch Cisco DCICT 1.0 - Reviewing the Cisco Nexus 5000, 2000, and MDS Product Families Cisco DCICT 1.0 - Monitoring the Cisco Nexus 7000 and 5000 Series Switches Cisco DCICT 1.0 - Describing vPCs, Cisco FabricPath, and OTV in the DataCenter Cisco DCICT 1.0 - Virtualizing Network Devices and FEX Operations Cisco DCICT 1.0 - Virtualizing Storage and Servers Cisco DCICT 1.0 - Using the Cisco Nexus 1000V Series Switch Cisco DCICT 1.0 - Comparing Storage Connectivity Options in the Data Center Cisco DCICT 1.0 - Fibre Channel Storage and Cisco MDS 9000 Series Configuration Cisco DCICT 1.0 - Cisco Data Center Unified Fabric Cisco DCICT 1.0 - The Cisco UCS Series Product Family Cisco DCICT 1.0 - RAID Options and B-Series Blades and Cluster Options Cisco DCICT 1.0 - UCS Management Operations Implementing Cisco Video Network Devices, Part 2 CIVND2 1.0: Cisco Business Video Collaboration CIVND2 1.0: Cisco Business Video Solutions CIVND2 1.0: Installation and Configuration of Cisco IP Phones and Cisco Jabber CIVND2 1.0: Troubleshooting Cisco IP Phone, Cisco Jabber and Endpoint Issues CIVND2 1.0: Describing Cisco TelePresence and Endpoints CIVND2 1.0: Configuring Cisco TelePresence TC CIVND2 1.0: Troubleshooting Cisco TelePresence Endpoints CIVND2 1.0: Configuring and Monitoring Cisco Conferencing and DMPs Implementing Cisco IP Telephony and Video, Part 1 Introduction to Cisco Unified Communications Manager Introduction to Single-site On-cluster Calling Call Routing Implementation Path Selection, Dial-Peers and H.323 and SIP Gateways Cisco Unified Border Element and Media Resources Cisco Audio and Video Conferencing using TelePresence Overview of QoS in a Packet Switched Network Cisco Service Provider Next-Gen Networks Part 1 Networking Functions Protocol Suites and the Internet Layer of IP Managing IPv4 and IPv6 Addressing

17 DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Exhibit 1 to Addendum 3

New Horizons IT - Complete Collection Solution Area Curriculum Series Course Title The TCP/IP Transport Layer and Internet Security Threats IPv4 Subnetting and VLSM Ethernet Fundamentals Switching Fundamentals Operating and Securing a Cisco Switch Switching Infrastructure Connectivity Switch Troubleshooting and Routing Fundamentals IOS XR Routers and Distance Vector Routing EIGRP Configuration and Router Security WAN Connectivity Service Provider Edge Technologies IP Addressing Solutions with NAT and DHCP PPP and SONET in the WAN VPN Technologies Cisco Device Management Monitoring Network Traffic, Behavior and Administration Implementing Cisco Video Network Video Conferencing and Streaming Fundamentals Video Compression Technologies Video Conferencing and Protocol Video Endpoints Cisco TelePresence Endpoint Environmental Requirements and Configuration Implementing Cisco IP Telephony & Video, Part 2 CUCM v10 Video and Dynamic Routing Using ILS and GDPR Cisco Unified Communications Manager v10 Multisite Deployment Solutions Cisco Unified Communications Manager v10 Globalized Call Routing and PSTN Backup Cisco Unified Communications Manager v10 URI Dialing, MGCP Fallback, and SRST CUCM v10 Bandwidth Management Tools and MOH Solutions Designing for Cisco Internetwork Solutions Designing Wide Area Networks Branch Office and Datacenter Design Campus Network Design Fundamentals Network Design Methodologies Building a Modular Network Design Designing a Highly Available Campus Network Designing a Secure Network and Edge Connectivity Designing Routed Networks with EIGRP and OSPF Designing Routed Networks with IS-IS and BGP Supporting QoS and Wireless in a Network Design Designing a Network for Collaboration and Introducing IP Addressing Designing IPv4 and IPv6 Addressing Plans Managing IP Addresses and Introducing SDN Network Management and Security Software Defined Networking Essentials Software Defined Networking Fundamentals Juniper Networks Junos Essentials Juniper Networks Junos Essentials: Networking Fundamentals Juniper Networks Junos Essentials: Junos OS Fundamentals Juniper Networks Junos Essentials: Configuration Basics Juniper Networks Junos Essentials: Monitoring and Maintenance Juniper Networks Junos Essentials: Routing Fundamentals Juniper Networks Junos Essentials: Routing Policy & Firewall Filters EMC EMC Information Storage and Management (ISM) v2 EMC ISM v2: Data Center Environment EMC ISM v2: RAID and Intelligent Storage Systems EMC ISM v2: FC SAN, IP SAN, and FCoE EMC ISM v2: NAS, Object-based Storage, and Unified Storage EMC ISM v2: Business Continuity, Backup, Replication, and Archiving EMC ISM v2: Remote Replication and Cloud Computing EMC ISM v2: Securing the Storage Infrastructure EMC ISM v2: Managing the Storage Infrastructure Cloud Computing Microsoft System Center 2012 R2: Monitoring and Operating a Private Cloud Microsoft System Center 2012 R2 – Monitor and Operate: Monitoring Cloud Services Microsoft System Center 2012 R2 – Monitor and Operate: Private Cloud Overview Microsoft System Center 2012 R2 – Monitor and Operate: Deploying Cloud Services Microsoft System Center 2012 R2 – Monitor and Operate: Service Management Microsoft System Center 2012 R2 – Monitor and Operate: Problem Management Microsoft System Center 2012 R2 – Monitor and Operate: Backup and Recovery Microsoft System Center 2012 R2 – Monitor and Operate: Compliance Microsoft System Center 2012 R2 – Monitor and Operate: SLAs Widgets & Dashboards CompTIA Cloud+ CompTIA Cloud+ CV0-001: Cloud Fundamentals CompTIA Cloud+ CV0-001: Virtualization CompTIA Cloud+ CV0-001: Data Center Infrastructure CompTIA Cloud+ CV0-001: Cloud Management CompTIA Cloud+ CV0-001: Cloud Security CompTIA Cloud+ CV0-001: Managing Cloud Systems Microsoft System Center 2012 R2: Configuring and Deploying a Private Cloud Microsoft System Center 2012 R2 – Configure and Deploy: VMM Overview Microsoft System Center 2012 R2 – Configure and Deploy: Extending & Maintaining Microsoft System Center 2012 R2 – Configure and Deploy: Application Delivery Microsoft System Center 2012 R2 – Configure and Deploy: Building Private Clouds Microsoft System Center 2012 R2 – Configure and Deploy: Monitoring

18 DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Exhibit 1 to Addendum 3

New Horizons IT - Complete Collection Solution Area Curriculum Series Course Title Microsoft System Center 2012 R2 – Configure and Deploy: Service Management Microsoft System Center 2012 R2 – Configure and Deploy: DPM Microsoft System Center 2012 R2 – Configure and Deploy: Automation Managing Citrix XenDesktop 7 Solutions Administrating XenDesktop 7.5 and Hypervisor Management Managing XenDesktop 7.5 Desktops and Applications Configuring Citrix XenDesktop 7.6 Components Managing a Citrix XenDesktop 7.6 Environment OpenStack Fundamentals Implementing OpenStack Configuring OpenStack Virtualizing Enterprise Desktops and Apps Virtualizing Enterprise Desktops and Apps: Plan App Virtualization and Use MAP Virtualizing Enterprise Desktops and Apps: App-V Clients and App Sequencing Virtualizing Enterprise Desktops and Apps: VM-based and Session-based RDS Virtualizing Enterprise Desktops and Apps: RemoteApps Virtualizing Enterprise Desktops and Apps: Plan for Resilient Virtualized Apps Certified Cloud Security Professional (CCSP) Cloud System Architecture – Concepts and Design Cloud Data Security Cloud System Security - Platform and Infrastructure Cloud Application Security Cloud Service – Operations Management Cloud Service – Legal and Compliance Microsoft Hyper-V 2016 First Look Microsoft Hyper-V 2016: First Look Cloud Computing for the Business User Cloud Computing for the Business User: Concepts and Moving to the Cloud Architecting on Amazon Web Services Architecting on Amazon Web Services: IAM and Object Storage Architecting on Amazon Web Services: Elastic Compute Cloud (EC2) Overview Architecting on Amazon Web Services: Elastic Compute Cloud (EC2) Auto Scaling Architecting on Amazon Web Services: Databases and Application Services Architecting on Amazon Web Services: Networking and Best Practice Advanced Architecting on Amazon Web Services Advanced Architecting on Amazon Web Services: HA and Business Continuity Advanced Architecting on Amazon Web Services: Costing Advanced Architecting on Amazon Web Services: Deployment Management Advanced Architecting on Amazon Web Services: Cloud Migration and Architecture Advanced Architecting on Amazon Web Services: Data Storage Architecture Advanced Architecting on Amazon Web Services: Security Architecture Advanced Architecting on Amazon Web Services: Scalability and Elasticity Cloud Computing Technology Fundamentals Cloud Computing Fundamentals: Virtualization and Data Centers Cloud Computing Fundamentals: Overview Cloud Computing Fundamentals: Storing and Managing Cloud Data Cloud Computing Fundamentals: Migrating to the Cloud Cloud Computing Fundamentals: Identity, Presence, and Privacy Cloud Computing Fundamentals: Cloud Security Microsoft SCCM 2012: Administering and Deploying Overview & Prerequisite Setup for System Center Configuration Manager 2012 R2 Basic SCCM Maintenance and Managing Operating System Deployment Deploying Applications and Software Updates Administering System Center Configuration Manager 2012 R2 SCCM 2012 R2 Performance and Health Monitoring SCCM 2012 R2 Boundaries and Security Considerations SCCM 2012 R2 Compliance Settings and Managing Clients Managing Inventory and Reporting Mentoring Assets Mentoring Assets Mentoring Certified Information Systems Security Professional (CISSP) Mentoring 640-461 Intro Cisco Voice and Unified Communications Admin (ICOMM) Mentoring 642-437 Implementing CUC Voice over IP and QoS (CVOICE) Mentoring 642-447 Implementing CUCM, Part 1 (CIPT1) Mentoring 642-457 Implementing CUCM, Part 2 (CIPT2) Mentoring 642-467 Integrating Cisco Unified Communications Applications (CAPPS) Mentoring 642-427 Troubleshooting Cisco Unified Communications (TVOICE) Mentoring Certified Information Systems Auditor (CISA) Mentoring Systems Security Certified Practitioner (SSCP) Mentoring Certified Information Security Manager (CISM) Mentoring E10-001 Information Storage and Management Mentoring 100-101 Interconnecting Cisco Networking Devices Part 1 (ICND1) Mentoring 200-101 Interconnecting Cisco Networking Devices Part 2 (ICND2) Mentoring 200-120 Cisco Certified Network Associate (CCNA) Mentoring 312-50 Certified Ethical Hacker (CEH) Mentoring SY0-401 CompTIA Security+ Mentoring 300-115 Implementing Cisco IP Switched Networks (SWITCH) Mentoring 300-101 Implementing Cisco IP Routing (ROUTE) Mentoring 300-135 Troubleshooting and Maintaining Cisco IP Networks (TSHOOT) Mentoring 300-206 Implementing Cisco Edge Network Security Solutions (SENSS) Mentoring 70-246 Monitoring and Operating a Private Cloud, System Center 2012 Mentoring 70-247 Configuring and Deploying a Private Cloud, System Center 2012 Mentoring CV0-001 CompTIA Cloud+ Mentoring N10-006 CompTIA Network+ Mentoring 300-207 Implementing Cisco Threat Control Solutions (SITCS)

19 DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Exhibit 1 to Addendum 3

New Horizons IT - Complete Collection Solution Area Curriculum Series Course Title Mentoring 300-208 Implementing Cisco Secure Access Solutions (SISAS) Mentoring CAS-002 CompTIA Advanced Security Practitioner Mentoring 300-209 Implementing Cisco Secure Mobility Solutions (SIMOS) Mentoring LX0-103 CompTIA Linux+ Powered by LPI Exam 1 Mentoring SK0-004 CompTIA Server+ Mentoring 640-911 Introducing Cisco Data Center Networking (DCICN) Mentoring 640-916 Introducing Cisco Data Center Technologies (DCICT) Mentoring 98-367 MTA Security Fundamentals Mentoring MB0-001 CompTIA Mobility+ Mentoring 210-060 Implementing Cisco Collaboration Devices (CICD) Mentoring 210-065 Implementing Cisco Video Network Devices (CIVND) Mentoring 210-260 Implementing Cisco Network Security (IINS) Mentoring 300-070 Implementing Cisco IP Telephony & Video, Part 1 (CIPTV1) Mentoring 640-875 Building Cisco Service Provider Next Generation Networks Mentoring N10-005 Network+ Test Preps Test Preps TestPrep 640-461 Intro Cisco Voice and Unified Communications Admin (ICOMM) TestPrep Certified Information Systems Security Professional (CISSP) TestPrep Certified Information Security Manager (CISM) TestPrep E10-001 Information Storage and Management TestPrep 100-101 Interconnecting Cisco Networking Devices Part 1 (ICND1) TestPrep 200-101 Interconnecting Cisco Networking Devices Part 2 (ICND2) TestPrep 200-120 Cisco Certified Network Associate (CCNA) TestPrep 312-50 Certified Ethical Hacker (CEH) TestPrep SY0-401 CompTIA Security+ TestPrep 300-101 Implementing Cisco IP Routing (ROUTE) TestPrep 300-115 Implementing Cisco IP Switched Networks (SWITCH) TestPrep 300-206 Implementing Cisco Edge Network Security Solutions (SENSS) TestPrep CV0-001 CompTIA Cloud+ TestPrep 70-246 Monitoring and Operating a Private Cloud, System Center 2012 TestPrep N10-006 CompTIA Network+ TestPrep 70-247 Configuring and Deploying a Private Cloud, System Center 2012 TestPrep 300-135 Troubleshooting and Maintaining Cisco IP Networks (TSHOOT) TestPrep 300-208 Implementing Cisco Secure Access Solutions (SISAS) TestPrep 300-207 Implementing Cisco Threat Control Solutions (SITCS) TestPrep CAS-002 CompTIA Advanced Security Practitioner TestPrep 300-209 Implementing Cisco Secure Mobility Solutions (SIMOS) TestPrep 640-916 Introducing Cisco Data Center Technologies (DCICT) TestPrep 640-911 Introducing Cisco Data Center Networking (DCICN) TestPrep MB0-001 CompTIA Mobility+ TestPrep Certified Information Systems Security Professional (CISSP) TestPrep 98-367 Microsoft Security Fundamentals TestPrep Systems Security Certified Practitioner (SSCP) TestPrep 98-369 Cloud Fundamentals TestPrep 70-694 Virtualizing Enterprise Desktops and Apps TestPrep 210-060 Implementing Cisco Collaboration Devices (CICD) TestPrep 210-065 Implementing Cisco Video Network Devices (CICD) TestPrep 210-260 Implementing Cisco Network Security (IINS) TestPrep Systems Security Certified Practitioner (SSCP) TestPrep Certified Information Systems Auditor (CISA) TestPrep N10-005 Network+ ENTERPRISE DATABASE SYSTEMS Oracle 12c Oracle Database 12c: New Features for Administrators Oracle Database 12c: Enterprise Manager Cloud Control and Creating CDB and PDB Oracle Database 12c: Managing CDB and PDB, and Data Optimization Oracle Database 12c: Using Automatic Data Optimization, Storage, and Archiving Oracle Database 12c: Managing Security Oracle Database 12c: High Availability and Database Management Oracle Database 12c: Tuning SQL and Using ADDM Oracle Database 12c: Resource Manager, Online Operations, and ADR Oracle Database 12c: Transporting Databases and Managing Data Oracle Database 12c: Install and Upgrade Oracle Database 12c – Install and Upgrade: Database Architecture Oracle Database 12c – Install and Upgrade: Installation Oracle Database 12c – Install and Upgrade: Upgrading Oracle Database 12c: Administration Oracle Database 12c - Administration: Database Architecture and Management Tools Oracle Database 12c – Administration: Manage the Database Instance Oracle Database 12c – Administration: The Network Environment and User Security Oracle Database 12c – Administration: Storage structures and Undo Data Oracle Database 12c – Administration: Data Concurrency and Auditing Oracle Database 12c – Administration: Backup, Recover, and Move Data Oracle Database 12c – Administration: Maintenance and Performance Tuning Oracle Database 12c – Administration: Resource Manager, Scheduler, and Support Oracle Database 12c: Backup and Recovery Oracle Database 12c - Backup and Recovery: Configuring for Recoverability Oracle Database 12c - Backup and Recovery: Performing and Managing Backups Oracle Database 12c - Backup and Recovery: Failure and Recovery Concepts Oracle Database 12c - Backup and Recovery: Perform Recovery and Secure Backup Oracle Database 12c - Backup and Recovery: Using Flashback Technologies Oracle Database 12c - Backup and Recovery: Transporting Data and Performing PITR Oracle Database 12c - Backup and Recovery: Duplicating Databases and Tuning RMAN Oracle Database 12c: Introduction to SQL

20 DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Exhibit 1 to Addendum 3

New Horizons IT - Complete Collection Solution Area Curriculum Series Course Title Oracle Database 12c - Introduction to SQL: Relational Database and SQL Developer Oracle Database 12c - Introduction to SQL: SQL*Plus and SELECT Statement Oracle Database 12c - Introduction to SQL: Restrict, Sort, and Customize Output Oracle Database 12c - Introduction to SQL: Data Conversion and Aggregating Data Oracle Database 12c - Introduction to SQL: Working with Joins and Subqueries Oracle Database 12c - Introduction to SQL: Data Manipulation Language Oracle Database 12c - Introduction to SQL: Working with SET Operators and DDL Oracle Database 12c: Performance Tuning Oracle 12c Performance Tuning: Introduction Oracle 12c Performance Tuning: Automatic Workload Repository Oracle 12c Performance Tuning: Metrics and Monitoring Oracle 12c Performance Tuning: Application Monitoring and SQL Diagnostics Oracle 12c Performance Tuning: Tuning Problem SQL Statements Oracle 12c Performance Tuning: Measuring and Maintaining SQL Performance Oracle Database 12c: RAC Administration Oracle Database 12c RAC Administration: Introduction to Oracle RAC Oracle Database 12c RAC Administration: Installing, Configuring, and Patching Oracle Database 12c RAC Administration: Day-to-Day Administration Oracle Database 12c RAC Administration: Backup and Recovery Oracle Database 12c RAC Administration: Global Resource Management Oracle Database 12c RAC Administration: Monitoring and Tuning Oracle 11g Oracle Database 11g: SQL Tuning Oracle Database 11g: Architecture, SQL Tuning, and Optimization Oracle Database 11g: Indexes, Access Paths, and Join Operations Oracle Database 11g: Execution Plans and Star Transformations Oracle Database 11g: Optimizer Statistics, Hints, and Cursor Sharing Oracle Database 11g: Application Tracing and Automatic SQL Tuning Oracle Database 11g: Secure Backup Oracle Database 11g: Configuring OSB and Security Oracle Database 11g: Securing Domain and Data in Oracle Secure Backup Oracle Database 11g: RMAN and Oracle Secure Backup Oracle Database 11g: Managing Backups and Infrastructure Oracle Database 11g: Tape Vaulting, Duplication, and Tuning Oracle Database 11g: RAC Administration Oracle Database 11g: Installation of Clusterware and RAC Oracle Database 11g: RAC Database and Oracle Clusterware Administration Oracle Database 11g: RAC Performance Tuning Oracle Database 11g: Configure, Manage, and Use Services in RAC Oracle Database 11g: Diagnosing Oracle Clusterware and Node Management Oracle Database 11g: High Availability in RAC Oracle Database 11g: Security Oracle Database 11g: Introduction to Database Security and Solutions Oracle Database 11g: Database Security Oracle Database 11g: Database Auditing Oracle Database 11g: Basic User and Strong Authentication Oracle Database 11g: Enterprise User Security and Proxy Authentication Oracle Database 11g: Privileges, Roles, and Application Contexts Oracle Database 11g: Virtual Private Database Oracle Database 11g: Oracle Label Security and the Data Masking Pack Oracle Database 11g: Encryption Concepts Oracle Database 11g: Transparent Data Encryption Oracle Database 11g: Oracle Net Services and Listener Security Oracle Database 11g: Firewalls, Oracle Connection Manager, and SQL*Plus Security Oracle Database 11g: New Features for Administrators Release 2 Oracle Database 11g Release 2: Installation and Oracle Restart Oracle Database 11g Release 2: ASM, Storage and Partitioning Enhancements Oracle Database 11g Release 2: Oracle Partitioning and Security Features Oracle Database 11g Release 2: Using Change Management Solutions Oracle Database 11g Release 2: Intelligent Infrastructure Enhancements Oracle Database 11g Release 2: Diagnosability Enhancements Oracle Database 11g Release 2: SQL Monitoring and Performance Enhancements Oracle Database 11g Release 2: Application Performance Enhancements Oracle Database 11g Release 2: Backup, Recover, Archive, and Repair Data Oracle Database 11g Release 2: Oracle Scheduler and Secure Backup Oracle Database 11g: Administration Workshop I Release 2 Oracle Database 11g Release 2: Database Architecture and Installation Oracle Database 11g Release 2: Database Creation and Instance Management Oracle Database 11g Release 2: The ASM Instance and Network Connectivity Oracle Database 11g Release 2: Storage Structures and User Security Oracle Database 11g Release 2: Managing Concurrency, Undo, and Auditing Oracle Database 11g Release 2: Managing Database Maintenance and Performance Oracle Database 11g Release 2: Backup and Recovery Oracle Database 11g Release 2: Moving Data and Oracle Support Oracle Database 11g: Administration Workshop II Release 2 Oracle Database 11g Release 2: Database Architecture and Recovery Operations Oracle Database 11g Release 2: The RMAN Catalog and Creating Backups Oracle Database 11g Release 2: Performing Restore and Recovery Tasks Oracle Database 11g Release 2: Using, Monitoring and Tuning RMAN Oracle Database 11g Release 2: Database Diagnostics and Flashback Technologies Oracle Database 11g Release 2: Managing Database Memory and Performance Oracle Database 11g Release 2: Managing Database Resources and the Scheduler Oracle Database 11g Release 2: Managing Database Space and Duplication Oracle SOA Suite 11g Oracle SOA Suite 11g: Introduction to SOA

21 DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Exhibit 1 to Addendum 3

New Horizons IT - Complete Collection Solution Area Curriculum Series Course Title Oracle SOA Suite 11g: SOA Governance and Service Design Oracle SOA Suite 11g: SOA Composite Applications Oracle SOA Suite 11g: Mediator and BPEL Components Oracle SOA Suite 11g: Human Task and Business Rules Components Oracle SOA Suite 11g: SOA Security and Adoption Planning Microsoft SQL Server 2014 Microsoft SQL Server 2014: Designing Database Solutions Microsoft SQL Server 2014 - Designing Solutions: Planning Infrastructure Microsoft SQL Server 2014 - Designing Solutions: Private Clouds Microsoft SQL Server 2014 - Designing Solutions: Windows Azure SQL Database Microsoft SQL Server 2014 - Designing Solutions: High Availability Microsoft SQL Server 2014 - Designing Solutions: Clustering and AlwaysOn Microsoft SQL Server 2014 - Designing Solutions: Backup and Recovery Microsoft SQL Server 2014: Designing Business Intelligence Solutions Microsoft SQL Server 2014 - Designing BI Solutions: BI Infrastructure Design Microsoft SQL Server 2014 - Designing BI Solutions: Extract, Transform, and Load Microsoft SQL Server 2014 - Designing BI Solutions: Data Models Microsoft SQL Server 2014 - Designing BI Solutions: Reporting Services Microsoft SQL Server 2014 - Designing BI Solutions: SharePoint Integration Microsoft SQL Server 2014 - Designing BI Solutions: MDX Queries and Performance Microsoft SQL Server 2014 - Designing BI Solutions: Availability and Recovery Microsoft SQL Server 2014: Implementing Data Models and Reports Microsoft SQL Server 2014: Design and Install Analysis Services and Tools Microsoft SQL Server 2014: Designing Multidimensional Models and Data Sources Microsoft SQL Server: Implement and Configure Cubes Microsoft SQL Server 2014: Design and Implement Dimensions Microsoft SQL Server: Implement Partitions and Custom Logic Microsoft SQL Server 2014: MDX Queries, Process Models, and Deploy Databases Microsoft SQL Server 2014: Manage, Maintain, and Troubleshoot SSAS Microsoft SQL Server 2014: Create and Manage Tabular Data Models Microsoft SQL Server 2014: Design Reports and Create Data Sources and Datasets Microsoft SQL Server 2014: Report Formatting and Interactivity Microsoft SQL Server 2014: Manage Reporting Services Microsoft SQL Server 2014: Process Report and Create Subscriptions and Schedules Microsoft SQL Server 2012 Microsoft SQL Server 2012: Querying Microsoft SQL Server 2012: Creating Database Objects Microsoft SQL Server 2012: Querying Basics and Modifying Data Microsoft SQL Server 2012: Manipulate Data Using Operators and Functions Microsoft SQL Server 2012: Creating Functions and Triggers Microsoft SQL Server 2012: Creating Programming Objects and Optimizing Queries Microsoft SQL Server 2012: Managing XML Data Microsoft SQL Server 2012: Database Administration Microsoft SQL Server 2012: Installation and Upgrade Microsoft SQL Server 2012: Instance Configuration and Database Creation Microsoft SQL Server 2012: Managing Databases and Automating Tasks Microsoft SQL Server 2012: Security Management Microsoft SQL Server 2012: Managing Database Data Microsoft SQL Server 2012: Managing Indexes, Full-Text Search and Partitions Microsoft SQL Server 2012: Backing Up and Restoring Databases Microsoft SQL Server 2012: Database Monitoring and Performance Tuning Microsoft SQL Server 2012: Configuring High Availability Microsoft SQL Server: Developing Databases Microsoft SQL Server 2012 – Developing Databases: Implementing Tables and Views Microsoft SQL Server 2012 – Developing Databases: Implementing Indexes Microsoft SQL Server 2012 – Developing Databases: Stored Procedures Microsoft SQL Server 2012 – Developing Databases: CLR Integration Microsoft SQL Server 2012 – Developing Databases: Working with Data Microsoft SQL Server 2012 – Developing Databases: Working with XML Data Microsoft SQL Server 2012 – Developing Databases: Tuning and Optimizing Queries Microsoft SQL Server 2012 – Developing Databases: Managing and Troubleshooting Microsoft SQL Server 2014 - Developing Databases: New Features Microsoft SQL Server 2012: Implementing a Data Warehouse Microsoft SQL Server 2012 – Implementing a Data Warehouse: Design and Deployment Microsoft SQL Server 2012 – Implementing a Data Warehouse: Create Basic Packages Microsoft SQL Server 2012 – Implementing a Data Warehouse: ETL Solutions Microsoft SQL Server 2012 – Implementing a Data Warehouse: Enhancing Packages Microsoft SQL Server 2012 – Implementing a Data Warehouse: Custom Components Microsoft SQL Server 2012 – Implementing a Data Warehouse: Installing SSIS Microsoft SQL Server 2012 – Implementing a Data Warehouse: Troubleshooting Microsoft SQL Server 2012 – Implementing a Data Warehouse: DQS and MDS Solutions Microsoft SQL Server 2008 Microsoft SQL Server 2008: Business Intelligence Development and Maintenance Implementing SQL Server 2008 Integration Services Configuring SQL Server 2008 Integration Services Packages Deploying SQL Server 2008 Integration Services Packages Implementing SQL Server 2008 Reporting Services Solutions Deploying and Delivering SQL Server 2008 Reporting Services Reports Maintaining SQL Server 2008 Reporting Services Implementing SQL Server 2008 Analysis Services Solutions Querying Cubes and Working with Data Mining in SSAS Managing SQL Server 2008 Analysis Services Solutions Managing SSIS Packages in SQL Server 2008 Microsoft SQL Server 2008 R2: Implementation and Maintenance SQL Server 2008 R2: Installation

22 DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Exhibit 1 to Addendum 3

New Horizons IT - Complete Collection Solution Area Curriculum Series Course Title SQL Server 2008 R2: Instance and Database Configuration SQL Server 2008 R2: Security Management SQL Server 2008 R2: Database Management SQL Server 2008 R2: Data Management SQL Server 2008 R2: Database Monitoring and Performance SQL Server 2008 R2: Backups, Restores, and Database Snapshots SQL Server 2008 R2: High Availability Microsoft SQL Server 2008 R2: Database Development SQL Server 2008 R2: Creating and Implementing Database Objects SQL Server 2008 R2: Creating and Altering Partitions SQL Server 2008 R2: Running Queries and Manipulating Data SQL Server 2008 R2: Performing Advanced Query Techniques SQL Server 2008 R2: Implementing Programming Objects SQL Server 2008 R2: Querying and Managing XML Data SQL Server 2008 R2: Messaging, Full-Text Search, Scripts, and Track Changes SQL Server 2008 R2: Gathering Performance Data MySQL MySQL Essentials MySQL: Database Concepts, Design, and Installation MySQL: Querying Data Using the SELECT Statement MySQL: Using the Data Manipulation and Definition Statements MySQL: General Syntax, Advanced Queries, and Stored Programs MySQL: Advanced Routines, Optimization, and DCL MySQL: Storage Engines, Advanced Indexing, and Maintenance MySQL: Administration, Transactions, Optimization, Scaling, Backup, and Recovery MySQL: Performance Monitoring, Database Health and Integrity, and Security Big Data Big Data Fundamentals The Big Data Technology Wave Big Data Opportunities and Challenges Apache Spark Fundamentals Programming and Deploying Apache Spark Applications Apache Hadoop and MapReduce Essentials Apache Hadoop MapReduce Essentials Hadoop Ecosystem Ecosystem for Hadoop Installation of Hadoop Data Repository with HDFS and HBase Data Repository with Flume Data Repository with Sqoop Data Refinery with YARN and MapReduce Data Factory with Hive Data Factory with Pig Data Factory with Oozie and Hue Data Flow for the Hadoop Ecosystem Hadoop Operations Designing Hadoop Clusters Hadoop in the Cloud Deploying Hadoop Clusters Hadoop Cluster Availability Operating Hadoop Clusters Capacity Management for Hadoop Clusters Performance Tuning of Hadoop Clusters Big Data – The Corporate Leadership Perspective Big Data Corporate Leadership Perspective Big Data – The Engineering Perspective Big Data Engineering Perspectives Big Data – The Legal Perspective Big Data - The Legal Perspective Big Data - The Marketing Perspective Big Data Marketing Perspective Big Data – The Strategic Planning Perspective Big Data Strategic Planning Apache Spark Advanced Topics Spark Core Spark Streaming MLlib, GraphX, and R Apache Kafka Apache Kafka Operations Apache Kafka Development Business Intelligence Microsoft SQL Server Data Warehousing and Business Intelligence Introduction Microsoft SQL Server Data Warehousing and Business Intelligence Overview Business Intelligence with QlikView Business Intelligence with QlikView Data Science Data Science Fundamentals in R Fundamental Methods for Data Science in R Machine Learning Examples for Data Science in R No SQL MongoDB MongoDB: Concepts, Installation, and Querying MongoDB: Indexing, Replication, and Security NoSQL

23 DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Exhibit 1 to Addendum 3

New Horizons IT - Complete Collection Solution Area Curriculum Series Course Title NoSQL Concepts and Background NoSQL Models and Applications Programming with NoSQL In Depth with NoSQL RavenDB Fundamentals RavenDB Overview RavenDB Integration Apache Cassandra An Overview of Apache Cassandra Apache HBase Fundamentals Apache HBase Fundamentals: Installation, Architecture, and Data Modeling Apache HBase Fundamentals: Access Data through the Shell and Client API Apache HBase Fundamentals: Advanced API, Administration, and MapReduce Data Visualization Data Visualization with Tableau Tableau Visualization Tableau Charts, Maps, and Dashboards Data Visualization Essentials Data Visualization: Essentials Database Fundamentals Database Fundamentals SQL Server Database Fundamentals: Design Principles and Data Manipulation SQL Server Database Fundamentals: Creating, Optimizing, and Securing Databases Operational Intelligence Operational Intelligence Fundamentals with Splunk Splunk Fundamentals Using Your Data with Splunk Splunk Administration Splunk Visualizations and Dashboards Indexers, Clusters, and Advanced Search Mentoring Assets Mentoring Assets Mentoring 1Z0-047 Oracle Database SQL Expert Mentoring 1Z0-050 Oracle Database 11g: New Features for Administrators Mentoring 1Z0-052 Oracle Database 11g: Administration I Mentoring 1Z0-053 Oracle Database 11g: Administration II Mentoring 70-432 TS: Microsoft SQL Server 2008, Implementation and Maintenance Mentoring 70-433 TS: Microsoft SQL Server 2008, Database Development Mentoring 70-462 Administering Microsoft SQL Server 2012 Databases Mentoring 70-463 Implementing a Data Warehouse with Microsoft SQL Server 2012 Mentoring 70-464 Developing Microsoft SQL Server 2012 Databases Mentoring 70-413 Designing and Implementing a Server Infrastructure Mentoring 1Z0-060 Upgrade to Oracle Database 12c Mentoring 1Z0-062 Oracle Database 12c: Installation and Administration Mentoring 70-414 Implementing an Advanced Server Infrastructure Test Preps Test Preps TestPrep 1Z0-050 Oracle Database 11g: New Features for Administrators TestPrep 1Z0-052 Oracle Database 11g: Administration I TestPrep 70-432 TS: Microsoft SQL Server 2008, Implementation and Maintenance TestPrep 70-433 TS: Microsoft SQL Server 2008, Database Development TestPrep 1Z0-053 Oracle Database 11g: Administration II TestPrep 70-462 Administering Microsoft SQL Server 2012 Databases TestPrep 70-461 Querying Microsoft SQL Server 2012 TestPrep 70-463 Implementing a Data Warehouse with Microsoft SQL Server 2012 TestPrep 70-464 Developing Microsoft SQL Server Databases TestPrep 1Z0-060 Upgrade to Oracle Database 12c TestPrep 70-413 Designing and Implementing a Server Infrastructure TestPrep 1Z0-062 Oracle Database 12c: Installation and Administration TestPrep 1Z0-047 Oracle Database SQL Expert ENTERPRISE RESOURCE PLANNING SYSTEMS SAP Overview of SAP for Project Teams Overview of SAP Solutions Financial Accounting with SAP SAP Logistics Modules SAP ERP Architecture SAP Administration SAP Project Planning and Implementation SAP NetWeaver Platform SAP Business Suite 7 for End Users SAP Enterprise Resource Planning (ERP) SAP Customer Relationship Management (CRM) SAP Product Lifecycle Management SAP Supply Chain Management SAP Supplier Relationship Management SAP Business One for End Users SAP Business One - Introduction for End Users SAP Business Objects Business Intelligence SAP BusinessObjects: Overview SAP BusinessObjects: Crystal Reports SAP BusinessObjects: Web Intelligence SAP BusinessObjects: Dashboards and Analytics SAP BusinessObjects: InfoView SAP BusinessObjects: Business Intelligence

24 DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Exhibit 1 to Addendum 3

New Horizons IT - Complete Collection Solution Area Curriculum Series Course Title Microsoft Dynamics Microsoft Dynamics CRM 2013: Applications Application Skills in Microsoft Dynamics CRM 2013 Sales Automation in Microsoft Dynamics CRM 2013 Marketing Automation in Microsoft Dynamics CRM 2013 Customer Service Automation in Microsoft Dynamics CRM 2013 Microsoft Dynamics CRM 2013: Customization and Configuration Microsoft Dynamics CRM 2013 - Customization and Configuration: Introduction Microsoft Dynamics CRM 2013 - Customization and Configuration: Entities Microsoft Dynamics CRM 2013 - Customization and Configuration: Relationships Business Intelligence with Microsoft Dynamics CRM 2013 Microsoft Dynamics CRM 2013: Forms, Marketing, Contacts, and Processes TOGAF TOGAF 9.1 TOGAF Fundamentals - Enterprise Architecture Basics TOGAF Fundamentals - Content Framework and Capability Basics Salesforce Creating Employee Apps with Force.com Creating Apps Reporting and User Management Developing Applications in Force.com Intermediate Programming in Force.com Basic Programming in Force.com WEB DESIGN Web Development HTML5 Introduction to HTML5 HTML5 Layout HTML5 Forms HTML5 APIs and Media HTML5 and CSS3 HTML5 Layout with CSS3 HTML5 and Advanced CSS3 HTML5 and JavaScript HTML5 Graphics and Canvas Advanced HTML5 Advanced Features of JavaScript, CSS3 and HTML5 XML Essentials XML Language Basics Manipulating XML with the XML DOM and Ajax XML Transformation Using XSLT and XSL-FO Querying XML Data with XPath and XQuery Web Services and XML Drupal 8 Drupal 8 First Look JSON Fundamentals JSON Essentials Web Site Design - Principles Responsive Web Design Responsive Web Design: Flexible Grids, Images, and Media Queries Responsive Web Design: Flexible Data and UIs, Devices, Process and Performance WordPress WordPress Introduction and Basic Configuration WordPress Networking and Security WordPress Advanced Themes and Administration Web Design Essentials Web Design Basics Web Design Enhancements Adobe Adobe Reader X Adobe Reader X Adobe AIR 3 Adobe Air 3 for Flash CS5.5 Developers Adobe InDesign CS5 Adobe InDesign CS5: Fundamentals Adobe Acrobat Pro X1 Adobe Acrobat Pro XI Fundamentals Adobe Captivate 7 Adobe Captivate 7 Fundamentals Adobe Captivate 7 Editing Project Files Adobe Dreamweaver CC Adobe Dreamweaver CC - Essentials Adobe Flash Professional CC Adobe Flash Professional CC - Introduction and Basic Tools Adobe Flash Professional CC - Working with ActionScript Adobe Flash Professional CC - Additional Tools and Features Adobe CC Overview New Features Adobe CC Overview of New Features Adobe ColdFusion 10 Adobe ColdFusion 10 Fundamentals Adobe Captivate 8 Fundamentals Adobe Captivate 8: Getting Started Adobe Captivate 8: Media and Interactivity Adobe Acrobat DC Adobe Acrobat DC Fundamentals

25 DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Exhibit 1 to Addendum 3

New Horizons IT - Complete Collection Solution Area Curriculum Series Course Title Working with Adobe Acrobat DC Adobe Dreamweaver CC 2015 Adobe Dreamweaver CC 2015 Fundamentals Basic Coding with Adobe Dreamweaver CC 2015 The Adobe Dreamweaver CC 2015 Interface Adobe Dreamweaver CC 2015 Browsers and HTML Adobe Dreamweaver CC 2015 Web Design Adobe Flash Professional CC 2015 Adobe Flash Professional CC 2015 Fundamentals Drawing with Adobe Flash Professional CC 2015 Adobe Flash Professional CC 2015 Tools Adobe Flash Professional CC 2015 Animations Adobe Flash Professional CC 2015 Programming Adobe Illustrator CC 2015 Adobe Illustrator CC 2015 Introduction and New Features Adobe Illustrator CC 2015 Fundamentals Drawing in Adobe Illustrator CC 2015 Working with Text in Adobe Illustrator CC 2015 Adobe Illustrator CC 2015 Tools Adobe Illustrator CC 2015 Working with the Pen Tools and Objects Adobe Illustrator CC 2015 Gradients and Bitmap Images Adobe Illustrator CC 2015 Advanced Tools and Effects Adobe InDesign CC 2015 Adobe InDesign CC 2015 Fundamentals Adobe InDesign CC 2015 Basic Navigation and Tools Working with Images and Exporting Files in Adobe InDesign CC 2015 Working with Objects and Editing Tools in Adobe InDesign CC 2015 Working with Text in Adobe InDesign CC 2015 Working with Pages in Adobe InDesign CC 2015 Adobe Photoshop CC 2015 Adobe Photoshop CC 2015: File Types and Color Editing Adobe Photoshop CC 2015 Basics Adobe Photoshop CC 2015 Enhancement Tools and Techniques Adobe Photoshop CC 2015 Cloning and Editing Adobe Photoshop CC 2015 Paths and Techniques Adobe Photoshop CC 2015: Selection Tools and Techniques Adobe Photoshop CC 2015: Layers and Type Adobe Premiere Elements 13 Adobe Premiere Elements 13 Essentials Adobe Premiere Pro CC 2015 Adobe Premiere Pro CC 2015 Fundamentals Adobe Premiere Pro CC 2015 Panels and Effects Adobe Premiere Pro CC 2015 Movies and Application Extensibility Adobe Edge Animate CC Adobe Edge Animate CC: Exploring the Interface Scripting and Web Languages JavaScript - JsRender JsRender Fundamentals Advanced JsRender Features JavaScript Single Page Apps JavaScript SPA: Getting Started with SPA in Visual Studio 2013 JavaScript SPA: SPA Views and Routes JavaScript SPA: Durandal Modules and Lifecycle events JavaScript SPA: Adding Views and Handling View Navigation in Durandal JavaScript SPA: Connecting to and Managing Data JavaScript SPA: Working with Rich Application Data JavaScript SPA: Managing Application Data JavaScript SPA: Working With Validation Building Apps with jQuery Mobile jQuery Mobile – App Basics, UI Controls and Navigation jQuery Mobile – Forms, Lists, Sets and Tables Optimizing jQuery Mobile Apps Integrating jQuery Mobile with PhoneGap Developing with Kendo UI Kendo UI: Installation and Overview Kendo UI: HTML Helpers for ASP.NET MVC Kendo UI: Mobile API JavaScript - Ember.js JavaScript - Ember.js Fundamentals JavaScript - Knockout Knockout Fundamentals Configuring Forms with Knockout Working with Knockout Advanced Knockout Techniques JavaScript Essentials JavaScript Essentials: Getting Started JavaScript Essentials: Language Features JavaScript Essentials: JavaScript In Depth JavaScript Essentials: Basic Browser Interaction JavaScript Essentials: Date and Math Functions JavaScript Essentials: Working with Strings JavaScript Essentials: Working with Page Elements JavaScript Essentials: Dynamic Content and HTML5 JavaScript Essentials: Dynamic JavaScript Code JavaScript Essentials: Input and the Mouse

26 DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Exhibit 1 to Addendum 3

New Horizons IT - Complete Collection Solution Area Curriculum Series Course Title Angular JS Getting Started with AngularJS Working with Directives in AngularJS Services in AngularJS Testing in AngularJS AngularJS Controllers and Directives JavaScript Sencha JavaScript Sencha: Ext JS JavaScript Sencha: Sencha Touch TypeScript Essentials TypeScript Essentials: Getting Started TypeScript Essentials: Advanced TypeScript Underscore.js Underscore.js: Collection Functions and Function Functions Underscore.js: Array, Object, and Utility Functions Javascript: Backbone.js Getting Started with Backbone.js Complex Application Development with Backbone.js CSS3, Sass and Less Creating Styles with CSS3 and Styling Text Styling Page Elements using CSS3 Navigation Elements and Animations with CSS3 Forms, Positioning, and Layout with CSS3 Advanced Options, Responsive Web Design, and Management with CSS3 Extending CSS3 with Sass and Less Introduction to Bootstrap Bootstrap Introduction Bootstrap Elements jQuery jQuery: Basic Setup and Features jQuery: Using Essential Features and Functions jQuery: Advanced Features and Functions Building Web Applications with Node.js Node.js Fundamentals Node.js: Files, Data Stores, Networked, and WebSocket Applications Node.js: Express Applications and the MEAN Stack Optimizing and Securing Node.js Applications Node.js: Debugging, Testing, Deploying, and Maintaining Node Applications Application Development with Node.js and the .NET Framework Working with Node.js and .NET Edge.js, Node.js, and ASP.NET MVC Azure, Node.js, and SQL Server Advanced AngularJS Working with Data in AngularJS AngularJS Security Considerations AngularJS and TypeScript AngularUI Companion Frameworks AngularUI Utilities and Modules AngularJS Fundamentals Controllers and Directives Services and Routing Testing AngularJS Animation and Internationalization Beginning AngularJS Introduction to Directives Building Apps with MEAN Stack Developing and Deploying Web Applications with MEAN.js Securing, Testing, and Deploying MEAN Applications Automating Web Development Tasks with Gulp.js Introducing Gulp.js to Web Development Web Building and Testing with Gulp.js Web Services Apache Web Services Fundamentals of Apache Web Services Apache Web Services Advanced Web Application Frameworks Building Dynamic Web Sites with LAMP Stack Creating a LAMP Stack Building Dynamic Web Sites with MySQL and PHP Mentoring Assets Mentoring Assets Mentoring VBScript Fundamentals Test Preps Test Preps TestPrep 70-486 Developing ASP.NET MVC Web Applications BUSINESS SKILLS FOR THE IT PROFESSIONAL IT Business IT Infrastructure Library (ITIL®) 2011 Edition Foundation Syllabus ITIL® 2011 Edition Foundation: ITIL® and the Service Lifecycle ITIL® 2011 Edition Foundation: Service Strategy Fundamentals ITIL® 2011 Edition Foundation: Service Strategy Processes ITIL® 2011 Edition Foundation: Service Design Fundamentals ITIL® 2011 Edition Foundation: Service Design Processes ITIL® 2011 Edition Foundation: Service Transition Processes and Policies ITIL® 2011 Edition Foundation: Introduction to Service Operation

27 DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Exhibit 1 to Addendum 3

New Horizons IT - Complete Collection Solution Area Curriculum Series Course Title ITIL® 2011 Edition Foundation: Service Operation Processes ITIL® 2011 Edition Foundation: Continual Service Improvement ITIL® 2011 Edition Intermediate Level: Operational Support & Analysis (OSA) ITIL® 2011 Edition OSA: Introduction to Operational Support and Analysis ITIL® 2011 Edition OSA: Introduction to Event Management ITIL® 2011 Edition OSA: Introduction to Incident Management ITIL® 2011 Edition OSA: Incident Management Interactions ITIL® 2011 Edition OSA: Introduction to Request Fulfillment ITIL® 2011 Edition OSA: Request Fulfillment Process Interfaces and Challenges ITIL® 2011 Edition OSA: Introduction to Problem Management ITIL® 2011 Edition OSA: Problem Management Process Interfaces and Challenges ITIL® 2011 Edition OSA: Introduction to Access Management ITIL® 2011 Edition OSA: Introduction to the Service Desk ITIL® 2011 Edition OSA: Service Desk Metrics and Outsourcing ITIL® 2011 Edition OSA: Introduction to Functions ITIL® 2011 Edition OSA: Function Activities ITIL® 2011 Edition OSA: Technology and Implementation Considerations ITIL® 2011 Edition Overview ITIL® 2011 Edition Overview: Creating a Service Culture ITIL® 2011 Edition Overview: Introduction to the ITIL® Framework ITIL® 2011 Edition Overview: Certification and Benefits Technical Management Essentials Transitioning from Technical Professional to Management Strategies for Transitioning to Technical Management Managing Technical Professionals Customer Service Representative, Professionalism The Customer Service Representative (CSR) Support Center Services and Work Environment Team and Customer Relationships Customer Service Representative, Skills Customer Interactions Communication Skills Conflict, Stress, and Time Management Customer Service Representative, Process Customer Service Processes and Procedures Quality in a Support Center Support Center Tools, Technologies and Metrics Dealing with Irrational Customers and Escalating Complaints Writing Skills for Technical Professionals Writing for Technical Professionals: Preparation and Planning Writing for Technical Professionals: Effective Writing Techniques IT Strategy Essentials IT Strategy Essentials: Business and IT Strategy Alignment IT Strategy Essentials: Creating an IT Strategy Plan IT Strategy Essentials: Implementing an IT Strategy Final Exam: IT Strategy Essentials IT Security for End Users IT Security for End Users: IT Security Fundamentals IT Security for End Users: Using Corporate Devices Securely IT Security for End Users: Secure Corporate Communications and Networking Test Preps Test Preps TestPrep ITIL Foundation Mentoring Mentoring Mentoring ITIL Foundation PROJECT EFFECTIVENESS Project Management Curriculum Project Management for Non-Project Managers Managing Projects with No Direct Authority Ensuring Management Buy-in on a Project Managing Conflict in Project Teams Managing Scope on a Project Weighing the Costs of Project Change Managing Vendor Relationships Anticipating and Solving Problems as a Project Champion Addressing Stakeholder Conflicts Portfolios, Programs, and Projects: What's the Difference? Controlling Project Cost Project Management Essentials Project Management Essentials (PMBOK® Guide - Fifth Edition-aligned) Managing Projects within Organizations (PMBOK® Guide Fifth Edition) Project Management Overview (PMBOK® Guide Fifth Edition) Project Management Process Groups (PMBOK® Guide Fifth Edition) Project Integration Management (PMBOK® Guide - Fifth Edition-aligned) Integrated Initiation and Planning (PMBOK® Guide Fifth Edition) Direct, Monitor, and Control Project Work (PMBOK® Guide Fifth Edition) Controlling Changes and Closing a Project (PMBOK® Guide Fifth Edition) Capturing, Analyzing, and Managing Lessons Learned Strategic Alignment and Benefits Realization Project Scope Management (PMBOK® Guide - Fifth Edition-aligned) Project Requirements and Defining Scope (PMBOK® Guide Fifth Edition) Creating the Work Breakdown Structure (PMBOK® Guide Fifth Edition) Monitoring and Controlling Project Scope (PMBOK® Guide Fifth Edition) Project Time Management (PMBOK® Guide - Fifth Edition-aligned)

28 DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Exhibit 1 to Addendum 3

New Horizons IT - Complete Collection Solution Area Curriculum Series Course Title Defining and Sequencing Project Activities (PMBOK® Guide Fifth Edition) Estimating Activity Resources and Durations (PMBOK® Guide Fifth Edition) Developing and Controlling the Project Schedule (PMBOK® Guide Fifth Edition) Project Cost Management (PMBOK® Guide - Fifth Edition-aligned) Planning Project Costs (PMBOK® Guide Fifth Edition) Controlling Project Costs (PMBOK® Guide Fifth Edition) Project Quality Management (PMBOK® Guide - Fifth Edition-aligned) Plan Quality Management (PMBOK® Guide Fifth Edition) Quality Assurance and Quality Control (PMBOK® Guide Fifth Edition) Quality Management for Continuous Improvement Project Human Resource Management (PMBOK® Guide - Fifth Edition-aligned) Planning Project Human Resources (PMBOK® Guide Fifth Edition) Managing Project Human Resources (PMBOK® Guide Fifth Edition) Project Communications Management (PMBOK® Guide - Fifth Edition-aligned) Plan and Manage Project Communications (PMBOK® Guide Fifth Edition) Control Project Communications (PMBOK® Guide Fifth Edition) Project Risk Management (PMBOK® Guide - Fifth Edition-aligned) Risk Management Planning (PMBOK® Guide Fifth Edition) Identifying Project Risks (PMBOK® Guide Fifth Edition) Performing Risk Analysis (PMBOK® Guide Fifth Edition) Risk Response and Control (PMBOK® Guide Fifth Edition) Project Procurement Management (PMBOK® Guide - Fifth Edition-aligned) Planning Project Procurement Management (PMBOK® Guide Fifth Edition) Managing Procurements (PMBOK® Guide Fifth Edition) Project Stakeholder Management (PMBOK® Guide - Fifth Edition-aligned) Project Stakeholder Management (PMBOK® Guide Fifth Edition) Managing and Controlling Stakeholder Engagement (PMBOK® Guide Fifth Edition) Program Management (PMI® Second Edition-aligned) Introduction to Program Management Program Life Cycle and Benefits Management Code of Ethics and Professional Conduct (PMI® Standard-aligned) The Role of Ethics in Project Management Core PMI® Values and Ethical Standards IT Project Management Essentials IT Project Management Essentials: Introduction to IT Project Management IT Project Management Essentials: Initiating and Planning IT Projects IT Project Management Essentials: Executing IT Projects IT Project Management Essentials: Monitoring and Controlling IT Projects IT Project Management Essentials: Managing Risks in an IT Project IT Project Management Essentials: Testing Deliverables and Closing IT Projects Managing Software Project Outsourcing Managing Software Project Outsourcing: Preparing to Manage an Outsourced Project Managing Software Project Outsourcing: Developing a Vendor Contract Managing Software Project Outsourcing: Working with the Outsourced Team Managing Software Project Outsourcing: Dealing with Risks Agile Practitioner - (PMI-ACP & ScrumMaster aligned) Core PMI® Values and Ethical Standards Agile Project Management Fundamentals (PMI_ACP Certification aligned) Agile Principles, Methodologies, and Mindset Agile Planning Planning and Monitoring Iterations in Agile Projects Engaging Agile Stakeholders and Leading Agile Teams Core PMI® Values and Ethical Standards PRINCE2®: 2009 Foundation Overview of Project Management (PRINCE2®: 2009-aligned) Project Organization, Planning and Risk (PRINCE2: 2009-aligned) Project Quality, Change and Progress (PRINCE2: 2009-aligned) Starting Up, Initiating and Directing a Project (PRINCE2: 2009-aligned) Controlling, Managing and Closing a Project (PRINCE2®: 2009-aligned) Tailoring PRINCE2 to a Project Environment (PRINCE2®: 2009-aligned) PRINCE2®: Practitioner PRINCE2® Practitioner Exam Information Mentoring Assets Mentoring PRINCE2: Foundation Mentoring Project Management Professional (PMP) PMBOK Guide 5th Edition Aligned Mentoring Certified Associate in Project Management (CAPM) PMBOK Guide 5th Ed. Mentoring PRINCE2: Practitioner Project Management for Everyone Get Your Project off the Ground Plan a Bulletproof Project Lead Your Project Like a Pro Complete Your Project On-time and On-budget Test Preps TestPrep PRINCE2®: Foundation TestPrep Project Management Professional PMBOK 5th Ed (valid until 12Jan2016) TestPrep Certified Associate in Project Management (CAPM) PMBOK Guide 5th Ed. TestPrep Project Management Professional PMBOK 5th Ed (Jan 2016 update) TestPrep PRINCE2®: Practitioner Team Building Curriculum Optimizing Your Performance On a Team Being an Effective Team Member Establishing Team Goals and Responsibilities Elements of a Cohesive Team Effective Team Communication Using Feedback to Improve Team Performance

29 DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Exhibit 1 to Addendum 3

New Horizons IT - Complete Collection Solution Area Curriculum Series Course Title Power and Politics in Matrixed Teams Leading Teams Leading Teams: Launching a Successful Team Leading Teams: Establishing Goals, Roles, and Guidelines Leading Teams: Developing the Team and its Culture Leading Teams: Building Trust and Commitment Leading Teams: Fostering Effective Communication and Collaboration Leading Teams: Motivating and Optimizing Performance Leading Teams: Dealing with Conflict Leading Teams: Managing Virtual Teams Building Trust Incrementally Inspiring Your Team Support Your Leader Choosing the Right Team Culture Managing Communications in a Virtual Team Building and Leading Teams Meeting Team Performance Challenges Business Analysis BABOK® v3: Business Analysis Key Concepts Introduction to Business Analysis Business Analysis Planning and Monitoring Business Analysis Elicitation and Collaboration Business Analysis and Requirements Life Cycle Management Business Analysis and Strategy Analysis Business Analysis and RADD: Requirements Definition Business Analysis and RADD: Design Definition Business Analysis and Solution Evaluation BABOK® v3: Business Analysis Techniques Analytical Techniques Used for Business Analysis Activities and Tools Used for Business Analysis Documentation and Criteria Used for Business Analysis BABOK® v3: Business Analysis Competencies Business Analysis Competencies: Personal Skills Business Analysis Competencies: Professional Effectiveness Business Analysis Perspectives Certified Business Analysis Professional (CBAP™) - BABOK® Guide V2.0 aligned Introduction to Business Analysis and Essential Competencies Introduction to Business Analysis Planning Planning Business Analysis Communication and Monitoring Business Analysis Requirements Elicitation Business Analysis Requirements Management and Communication Business Analysis: Enterprise Analysis Business Analysis: Introduction to Requirements Analysis Business Analysis: Verify and Validate Requirements Business Analysis: Solution Assessment and Validation Final Exam: Certified Business Analysis Professional (CBAP) - BABOK V2.0 aligned

30 DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Exhibit 1 to Addendum 3

By Certification Cert Learning Product Title Exam Asset Certified Information Systems Security Professional (CISSP) Mentoring Assets (1) Mentoring Certified Information Systems Security Professional (CISSP)

Test Preps (1) TestPrep Certified Information Systems Security Professional (CISSP)

Courses (12) CISSP: Security Principles, Governance, and Guidelines CISSP: Risk Management CISSP: Asset Security CISSP: Security Engineering Part 1 CISSP: Security Engineering Part 2 CISSP: Communication & Network Security Design CISSP: Identity and Access Management CISSP: Security Assessment and Testing CISSP: Security Operations Part 1 CISSP: Security Operations Part 2 CISSP: Security Operations Part 3 CISSP: Software Development Security

Systems Security Certified Practitioner (SSCP) Mentoring Assets (1) Mentoring Systems Security Certified Practitioner (SSCP)

Test Preps (1) TestPrep Systems Security Certified Practitioner (SSCP) Courses (6) Systems Security Certified Practitioner: Access Controls Systems Security Certified Practitioner: Security Operations Systems Security Certified Practitioner: Security Administration Systems Security Certified Practitioner: Risk Management

Systems Security Certified Practitioner: Incident Response and Recovery 300-206 Implementing Cisco Edge Network Security Solutions (SENSS) Mentoring Assets (1) Mentoring 300-206 Implementing Cisco Edge Network Security Solutions (SENSS)

Test Preps (1) TestPrep 300-206 Implementing Cisco Edge Network Security Solutions (SENSS)

Courses (9) SENSS 1.0: Secure Design Principles SENSS 1.0: Deploying Cisco IOS Control and Management Plane Security Controls SENSS 1.0: Deploying Cisco Traffic Telemetry Methods SENSS 1.0: Deploying Cisco IOS Layer 2 and Layer 3 Data Plane Security Controls SENSS 1.0: NAT Deployment on Cisco IOS Software and Cisco ASA SENSS 1.0: Firewall Threat Controls and Basic Cisco ASA Policy Configuration SENSS 1.0: Deploying Advanced Cisco ASA Access Policies SENSS 1.0: Deploying Reputation and Identity-Based Cisco ASA Access Policies

31 DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Exhibit 1 to Addendum 3

By Certification Cert Learning Product Title Exam Asset SENSS 1.0: Threat Controls Deployment on Cisco IOS Software

300-207 Implementing Cisco Threat Control Solutions (SITCS) Mentoring Assets (1) Mentoring 300-207 Implementing Cisco Threat Control Solutions (SITCS)

Test Preps (1) TestPrep 300-207 Implementing Cisco Threat Control Solutions (SITCS)

Courses (8) Cisco SITCS 1.0: Cisco ASA (CX) NGFW Services I Cisco SITCS 1.0: Cisco ASA (CX) NGFW Services II Cisco SITCS 1.0: Cisco Web Security Appliance Cisco SITCS 1.0: Configuring Cisco Web Security Appliance Cisco SITCS 1.0: Cisco Cloud Web Security Cisco SITCS 1.0: Cisco Email Security Appliance Cisco SITCS 1.0: Cisco Intrusion Prevention Systems I Cisco SITCS 1.0: Cisco Intrusion Prevention Systems II

300-208 Implementing Cisco Secure Access Solutions (SISAS) Mentoring Assets (1) Mentoring 300-208 Implementing Cisco Secure Access Solutions (SISAS)

Test Preps (1) TestPrep 300-208 Implementing Cisco Secure Access Solutions (SISAS)

Courses (6) Cisco SISAS 1.0: Identity Services Overview and 802.1X Cisco SISAS 1.0: EAP and Logging into Cisco Identity Services Engine (ISE) Cisco SISAS 1.0: Cisco ISE Technologies Cisco SISAS 1.0: Certificate-based Authentication and Authorization Cisco SISAS 1.0: Cisco TrustSec, MACsec, and WebAuth Access Cisco SISAS 1.0: Endpoint Access Control Enhancements and Troubleshooting

300-209 Cisco SIMOS Mentoring Assets (1) Mentoring 300-209 Implementing Cisco Secure Mobility Solutions (SIMOS)

Test Preps (1) TestPrep 300-209 Implementing Cisco Secure Mobility Solutions (SIMOS)

Courses (7) SIMOS 1.0: Fundamentals of VPN Technologies and Cryptography SIMOS 1.0: Deploying Secure Site-to-Site Connectivity Solutions (Part 1) SIMOS 1.0: Deploying Secure Site-to-Site Connectivity Solutions (Part 2) SIMOS 1.0: Deploying Cisco IOS Site-to-Site FlexVPN Solutions SIMOS 1.0: Deploying Clientless SSL VPNs SIMOS 1.0: Clientless SSL VPNs, Endpoint Security, and Dynamic Access Policies SIMOS 1.0: Deploying Cisco AnyConnect VPNs

SY0-401 CompTIA Security+ Mentoring Assets (1) Mentoring SY0-401 CompTIA Security+

Test Preps (1)

32 DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Exhibit 1 to Addendum 3

By Certification Cert Learning Product Title Exam Asset TestPrep SY0-401 CompTIA Security+

Courses (10) CompTIA Security+ SY0-401: Control Fundamentals and Security Threats CompTIA Security+ SY0-401: Network Protocols, Attacks, and Defenses CompTIA Security+ SY0-401: Creating Secure Networks CompTIA Security+ SY0-401: Vulnerability Assessment and Penetration Testing CompTIA Security+ SY0-401: Authentication, Biometrics, and Security Controls CompTIA Security+ SY0-401: Securing a Networked Environment CompTIA Security+ SY0-401: Remote Access, Mobile, and Wireless Security CompTIA Security+ SY0-401: Cryptographic Methods and Public Key Infrastructures CompTIA Security+ SY0-401: Securing Applications, Virtualization, and the Cloud CompTIA Security+ SY0-401: Continuity, Disaster Recovery, and Computer Forensics

CAS-002 CompTIA Advanced Security Practitioner (CASP) Mentoring Assets (1) Mentoring CAS-002 CompTIA Advanced Security Practitioner

Test Preps (1) TestPrep CAS-002 CompTIA Advanced Security Practitioner

Courses (9) CompTIA CASP CAS-002: Cryptography and Enterprise Storage Concerns CompTIA CASP CAS-002: Advanced Network Design, Management, and Controls CompTIA CASP CAS-002: Security Controls for Hosts CompTIA CASP CAS-002: Application Vulnerabilities and Security Controls CompTIA CASP CAS-002: Industry Influences, Risk Planning, Strategy, and Control CompTIA CASP CAS-002: Privacy Policies & Procedures and Incident Recovery CompTIA CASP CAS-002: Research, Analysis and Assessment CompTIA CASP CAS-002: Integration of Computing, Communications, and Disciplines CompTIA CASP CAS-002: Technical Integration of Enterprise Components

MB0-001 CompTIA Mobility+ Mentoring Assets (1) Mentoring MB0-001 CompTIA Mobility+

Test Preps (1) TestPrep MB0-001 CompTIA Mobility+

Courses (7) CompTIA Mobility+ MB0-001: Over The Air Technologies CompTIA Mobility+ MB0-001: Network Infrastructure CompTIA Mobility+ MB0-001: Mobile Device Management 1 CompTIA Mobility+ MB0-001: Mobile Device Management 2 CompTIA Mobility+ MB0-001: Security CompTIA Mobility+ MB0-001: Troubleshooting 1 CompTIA Mobility+ MB0-001: Troubleshooting 2

Certified Ethical Hacker (CEH) v8 Mentoring Assets (1) Mentoring 312-50 Certified Ethical Hacker (CEH)

Test Preps (1)

33 DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Exhibit 1 to Addendum 3

By Certification Cert Learning Product Title Exam Asset TestPrep 312-50 Certified Ethical Hacker (CEH)

Courses (16) Certified Ethical Hacker (CEH) v8: Hacking and Penetration Testing Certified Ethical Hacker (CEH) v8: Footprinting and Reconnaissance Certified Ethical Hacker (CEH) v8: Network Scanning Certified Ethical Hacker (CEH) v8: Enumeration and Cryptography Certified Ethical Hacker (CEH) v8: System Hacking Certified Ethical Hacker (CEH) v8: Malware Certified Ethical Hacker (CEH) v8: Sniffing Certified Ethical Hacker (CEH) v8: Social Engineering Certified Ethical Hacker (CEH) v8: Denial of Service and Session Hijacking Certified Ethical Hacker (CEH) v8: Hacking Web Servers Certified Ethical Hacker (CEH) v8: Hacking Web Applications Certified Ethical Hacker (CEH) v8: SQL Injection Certified Ethical Hacker (CEH) v8: Hacking Wireless Networks Certified Ethical Hacker (CEH) v8: Hacking Mobile Platforms Certified Ethical Hacker (CEH) v8: Evading IDS, Firewalls, and Honeypots Certified Ethical Hacker (CEH) v8: Buffer Overflow

Certified Information Systems Auditor (CISA) Mentoring Assets (1) Mentoring Certified Information Systems Auditor (CISA)

Test Preps (1) TestPrep Certified Information Systems Auditor (CISA)

Courses (11) CISA Domain: The Process of Auditing Information Systems - Part 1 CISA Domain: The Process of Auditing Information Systems - Part 2 CISA Domain: Governance and Management of IT - Part 1 CISA Domain: Governance and Management of IT - Part 2 CISA Domain: IS Acquisition, Development, and Implementation - Part 1 CISA Domain: IS Acquisition, Development and Implementation - Part 2 CISA Domain: IS Operations, Maintenance and Support - Part 1 CISA Domain: IS Operations, Maintenance, and Support - Part 2 CISA Domain: Protection of Information Assets - Part 1 CISA Domain: Protection of Information Assets - Part 2 CISA Domain: IS Acquisition, Development and Implementation - Part 3

Certified Information Security Manager (CISM) Mentoring Assets (1) Mentoring Certified Information Security Manager (CISM)

Test Preps (1) TestPrep Certified Information Security Manager (CISM)

Courses (12) CISM: Information Security Governance (Part 1) CISM: Information Security Governance (Part 2) CISM: Information Security Governance (Part 3)

34 DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Exhibit 1 to Addendum 3

By Certification Cert Learning Product Title Exam Asset CISM: Information Risk Management and Compliance (Part 1) CISM: Information Risk Management and Compliance (Part 2) CISM: Information Security Program Development and Management (Part 1) CISM: Information Security Program Development and Management (Part 2) CISM: Information Security Program Development and Management (Part 3) CISM: Information Security Program Development and Management (Part 4) CISM: Information Security Program Development and Management (Part 5) CISM: Information Security Incident Management (Part 1) CISM: Information Security Incident Management (Part 2)

98-367: Security Fundamentals Mentoring Assets (1) Mentoring 98-367 MTA Security Fundamentals

Test Preps (1) TestPrep 98-367 Microsoft Security Fundamentals

Courses (4) Microsoft Security Fundamentals: Security Layers Microsoft Security Fundamentals: Operating System Security Microsoft Security Fundamentals: Network Security Microsoft Security Fundamentals: Security Software

Certified Cloud Security Professional Courses (6) Cloud System Architecture - Concepts and Design Cloud Data Security Cloud System Security - Platform and Infrastructure Cloud Application Security Cloud Service - Operations Management Cloud Service - Legal and Compliance

Video and Books Assets

Asset ID Presenter Title 73937 Apress 10 Dont's on Your Digital Devices: The Non-Techie's Survival Guide to Cyber Security and Privacy 56001 IT Governance 21st Century Chinese Cyberwarfare 59145 McGraw- 24 Deadly Sins of Software Security: Programming Flaws and How to Fix Them Hill/Osborne 37066 Springer 802.11 Wireless Networks: Security and Analysis 44508 No Starch Press A Bug Hunter's Diary: A Guided Tour Through the Wilds of Software Security

16192 Springer A Classical Introduction to Cryptography: Applications for Communications Security

78766 Syngress A Machine Learning Approach to Phishing Detection and Defense Publishing 51886 OpenTask Accelerated Windows Malware Analysis with Memory Dumps 16193 Springer Access Control Systems: Security; Identity Management and Trust Models

35 DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Exhibit 1 to Addendum 3

By Certification Cert Learning Product Title Exam Asset 69814 Jones and Access Control; Authentication; and Public Key Infrastructure; Second Edition Bartlett Learning

88817 Syngress Adaptive Security for the Internet of Things: Research; Standards; and Practices Publishing 36908 Auerbach Adaptive Security Management Architecture Publications 70706 Apress Advanced API Security 93278 McGraw- Advanced Malware Analysis Hill/Osborne 77166 McGraw- Advanced Persistent Threat Hacking: The Art and Science of Hacking Any Organization Hill/Osborne 59340 IGI Global Advanced RFID Systems; Security; and Applications 53405 IGI Global Advanced Security and Privacy for RFID Technologies 74399 EMC An Approach Toward Security Learning 54071 Apress Android Apps Security 76681 Springer Android Malware 75477 No Starch Press Android Security Internals: An In-Depth Guide to Android's Security Architecture

47284 Auerbach Android Security: Attacks and Defenses Publications 61782 Auerbach Anonymous Communication Networks: Protecting Privacy on the Web Publications 41426 ISACA Apache Web Services Server: Audit/Assurance Program 37513 IGI Global Applied Cryptography for Cyber Security and Defense: Information Encryption and Cyphering 82382 John Wiley & Applied Cryptography: Protocols; Algorithms; and Source Code in C; 20th Anniversary Sons Edition 26832 Oracle Press Applied Oracle Security: Developing Secure Database and Middleware Environments

30510 Auerbach Architecting Secure Software Systems Publications 9697 Auerbach Assessing and Managing Security Risk in IT Systems Publications 94351 IT Governance Assessing Information Security: Strategies; Tactics; Logic and Framework; Second Edition 46422 Auerbach Asset Protection Through Security Awareness Publications 44303 John Wiley & Auditing Cloud Computing: A Security and Privacy Guide Sons 76676 Springer Automatic Malware Analysis: An Emulator Based Approach 34749 Wrox Press Beginning ASP.NET Security 11780 Wrox Press Beginning Cryptography in Java 91953 Academic Press Bent Functions: Results and Applications to Cryptography

61757 CRC Press Biometric Technology: Authentication; Biocryptography; and Cloud-Based Architecture

50802 Apress BizTalk 2010 EDI for Health Care: HIPAA Compliant 837 Solutions 77615 No Starch Press Black Hat Python: Python Programming for Hackers and Pentesters

20554 John Wiley & Blackjacking: Security Threats to BlackBerry Devices; PDAs; and Cell Phones in the Sons Enterprise

36 DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Exhibit 1 to Addendum 3

By Certification Cert Learning Product Title Exam Asset 76747 Springer Bluetooth Security Attacks: Comparative Analysis; Attacks; and Countermeasures

52618 Cambridge Body Area Networks: Safety; Security; and Sustainability University Press

76759 Springer Botnets 91947 Syngress Breaking into Information Security: Crafting a Custom Career Path to Get the Job You Publishing Really Want 93182 IT Governance Build a Security Culture 26398 Auerbach Building an Effective Information Security Policy Architecture Publications 67000 Syngress Building an Information Security Awareness Program: Defending against Social Publishing Engineering Hacks and Technical Threats 78134 Syngress Building an Intelligence-Led Security Program Publishing 64341 Apress Building the Infrastructure for Cloud Security: A Solutions View 43927 ISACA Business Continuity Management Audit/Assurance Program 53601 Joe Barrett C# Programming: Debugging and Security – Basic Encryption 53600 Joe Barrett C# Programming: Debugging and Security – Global Assembly Cache 53603 Joe Barrett C# Programming: Debugging and Security – Hashing 53602 Joe Barrett C# Programming: Debugging and Security – Managing Certificates 53599 Joe Barrett C# Programming: Debugging and Security – Strongnaming 53605 Joe Barrett C# Programming: Debugging and Security – Symmetric vs. Asymmetric 53607 Joe Barrett C# Programming: Debugging and Security – Using Regex 53608 Joe Barrett C# Programming: Debugging and Security – Validation Connection Streams 53568 Joe Barrett C# Programming: Diagnostic and Debugging – Compiler Directives

53571 Joe Barrett C# Programming: Diagnostic and Debugging – Creating Performance Counters 53569 Joe Barrett C# Programming: Diagnostic and Debugging – Tracing 53570 Joe Barrett C# Programming: Diagnostic and Debugging – Working with Trace Switches 53581 Joe Barrett C# Programming: Diagnostic and Debugging – Writing to Event Logs 62605 John Wiley & Carry On: Sound Advice from Schneier on Security Sons 72700 Sybex CASP CompTIA Advanced Security Practitioner Study Guide; Second Edition (Exam CAS-002) 72504 McGraw- CCFP Certified Cyber Forensics Professional All-in-One Exam Guide Hill/Osborne 65466 McGraw- CEH Certified Ethical Hacker All-in-One Exam Guide; Second Edition Hill/Osborne 72502 McGraw- CEH Certified Ethical Hacker Practice Exams; Second Edition Hill/Osborne 44144 McGraw- CEH Certified Ethical Hacker: All-in-One Exam Guide Hill/Osborne 63487 Sybex CEHv8: Certified Ethical Hacker Version 8 Study Guide 37723 IGI Global Certification and Security in Health-Related Web Applications: Concepts and Solutions

40279 Emereo Certification Exam Preparation Course in a Book for Passing the GSEC: The How To Publishing Pass on Your First Try Certification Study Guide; Second Edition 90241 Dan Lachance Certified Cloud Security Professional (CCSP) – Cryptography: Asset Security

37 DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Exhibit 1 to Addendum 3

By Certification Cert Learning Product Title Exam Asset

90321 Dan Lachance Certified Cloud Security Professional (CCSP): Access Control – Physical and Virtual 90301 Dan Lachance Certified Cloud Security Professional (CCSP): APIs 90305 Dan Lachance Certified Cloud Security Professional (CCSP): Application Management 90254 Dan Lachance Certified Cloud Security Professional (CCSP): Architectural Security 90303 Dan Lachance Certified Cloud Security Professional (CCSP): Architecture 90242 Dan Lachance Certified Cloud Security Professional (CCSP): Asset Access Control Certified Cloud Security Professional (CCSP): Asset Removal and Storage Media 90243 Dan Lachance Sanitization 90352 Dan Lachance Certified Cloud Security Professional (CCSP): Audit Controls - Internal and External 90355 Dan Lachance Certified Cloud Security Professional (CCSP): Audit Reporting and Standards 90353 Dan Lachance Certified Cloud Security Professional (CCSP): Audit Requirements; Scope; and Reporting 90289 Dan Lachance Certified Cloud Security Professional (CCSP): Auditing 90304 Dan Lachance Certified Cloud Security Professional (CCSP): Business Requirements 90365 Dan Lachance Certified Cloud Security Professional (CCSP): Business Requirements 90291 Dan Lachance Certified Cloud Security Professional (CCSP): Business Requirements and Risk

90275 Dan Lachance Certified Cloud Security Professional (CCSP): Chain of Custody and Non-repudiation 90248 Dan Lachance Certified Cloud Security Professional (CCSP): Cloud - Data Life Cycle 90364 Dan Lachance Certified Cloud Security Professional (CCSP): Cloud - Risk Assessment

90298 Dan Lachance Certified Cloud Security Professional (CCSP): Cloud Application Development

90300 Dan Lachance Certified Cloud Security Professional (CCSP): Cloud Application Security Testing 90236 Dan Lachance Certified Cloud Security Professional (CCSP): Cloud Computing Activities

90234 Dan Lachance Certified Cloud Security Professional (CCSP): Cloud Computing Characteristics 90232 Dan Lachance Certified Cloud Security Professional (CCSP): Cloud Computing Definitions

90235 Dan Lachance Certified Cloud Security Professional (CCSP): Cloud Computing Infrastructure 90233 Dan Lachance Certified Cloud Security Professional (CCSP): Cloud Computing Participants

90237 Dan Lachance Certified Cloud Security Professional (CCSP): Cloud Computing Service Capabilities 90240 Dan Lachance Certified Cloud Security Professional (CCSP): Cloud Cross-cutting Aspects 90239 Dan Lachance Certified Cloud Security Professional (CCSP): Cloud Deployment Models 90290 Dan Lachance Certified Cloud Security Professional (CCSP): Cloud Environment BC and DR 90251 Dan Lachance Certified Cloud Security Professional (CCSP): Cloud Functional Security 90244 Dan Lachance Certified Cloud Security Professional (CCSP): Cloud Network Security 90359 Dan Lachance Certified Cloud Security Professional (CCSP): Cloud Server Provider (CSP) Risk Management

90252 Dan Lachance Certified Cloud Security Professional (CCSP): Cloud Service Certification Assessment 90249 Dan Lachance Certified Cloud Security Professional (CCSP): Cloud Service Continuity 90250 Dan Lachance Certified Cloud Security Professional (CCSP): Cloud Service Investment

90238 Dan Lachance Certified Cloud Security Professional (CCSP): Cloud Service Types (the Cloud Stack)

90296 Dan Lachance Certified Cloud Security Professional (CCSP): Common Dangers and Potential Pitfalls 90343 Dan Lachance Certified Cloud Security Professional (CCSP): Communications Management

38 DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Exhibit 1 to Addendum 3

By Certification Cert Learning Product Title Exam Asset 90368 Dan Lachance Certified Cloud Security Professional (CCSP): Compliance Assurance 90279 Dan Lachance Certified Cloud Security Professional (CCSP): Compute Service Certified Cloud Security Professional (CCSP): Contract and Vendor Management and 90366 Dan Lachance Assessment 90310 Dan Lachance Certified Cloud Security Professional (CCSP): Cryptography 90272 Dan Lachance Certified Cloud Security Professional (CCSP): Data Archiving 90276 Dan Lachance Certified Cloud Security Professional (CCSP): Data Asset Security Certified Cloud Security Professional (CCSP): Data Asset Security and Associated 90256 Dan Lachance Technologies 90268 Dan Lachance Certified Cloud Security Professional (CCSP): Data Controls and Application 90271 Dan Lachance Certified Cloud Security Professional (CCSP): Data Deletion

90266 Dan Lachance Certified Cloud Security Professional (CCSP): Data Discovery Implementation 90255 Dan Lachance Certified Cloud Security Professional (CCSP): Data Lifecycle Stages 90360 Dan Lachance Certified Cloud Security Professional (CCSP): Data Ownership and Responsibility 90270 Dan Lachance Certified Cloud Security Professional (CCSP): Data Retention Policy

90269 Dan Lachance Certified Cloud Security Professional (CCSP): Data Rights Objects and Management 90286 Dan Lachance Certified Cloud Security Professional (CCSP): DataCenter Protection – Physical 90285 Dan Lachance Certified Cloud Security Professional (CCSP): Defence 90350 Dan Lachance Certified Cloud Security Professional (CCSP): Defining and Categorizing PII 90348 Dan Lachance Certified Cloud Security Professional (CCSP): eDiscovery 90264 Dan Lachance Certified Cloud Security Professional (CCSP): Emerging Data Protection Technologies 90260 Dan Lachance Certified Cloud Security Professional (CCSP): Encryption of Data Assets Certified Cloud Security Professional (CCSP): Event Logging – Management and 90333 Dan Lachance Reporting Certified Cloud Security Professional (CCSP): Event Logging – Management and 90334 Dan Lachance Reporting

90274 Dan Lachance Certified Cloud Security Professional (CCSP): Event Logging; Storage; and Analysis 90273 Dan Lachance Certified Cloud Security Professional (CCSP): Event Sources

90313 Dan Lachance Certified Cloud Security Professional (CCSP): Federation and Identity Provision Certified Cloud Security Professional (CCSP): Forensic Data Collection and 90342 Dan Lachance Management 90349 Dan Lachance Certified Cloud Security Professional (CCSP): Forensic Requirement 90299 Dan Lachance Certified Cloud Security Professional (CCSP): Functional Testing 90356 Dan Lachance Certified Cloud Security Professional (CCSP): Gap Analysis and Planning

90337 Dan Lachance Certified Cloud Security Professional (CCSP): Guest Operating System Installation Certified Cloud Security Professional (CCSP): Hardware and Virtualization 90320 Dan Lachance Configuration

90319 Dan Lachance Certified Cloud Security Professional (CCSP): Hardware Configuration and Security 90330 Dan Lachance Certified Cloud Security Professional (CCSP): Hardware Monitoring Certified Cloud Security Professional (CCSP): Host Configuration – Backup and 90331 Dan Lachance Restore 90325 Dan Lachance Certified Cloud Security Professional (CCSP): Host Management

39 DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Exhibit 1 to Addendum 3

By Certification Cert Learning Product Title Exam Asset 90293 Dan Lachance Certified Cloud Security Professional (CCSP): Implementation 90358 Dan Lachance Certified Cloud Security Professional (CCSP): Information Management Controls 90357 Dan Lachance Certified Cloud Security Professional (CCSP): Information Management Systems

90246 Dan Lachance Certified Cloud Security Professional (CCSP): Infrastructure and Data Threats 90345 Dan Lachance Certified Cloud Security Professional (CCSP): International Legislation Conflict 90351 Dan Lachance Certified Cloud Security Professional (CCSP): International Regulation variations 90311 Dan Lachance Certified Cloud Security Professional (CCSP): Isolation 90261 Dan Lachance Certified Cloud Security Professional (CCSP): Key Management

90306 Dan Lachance Certified Cloud Security Professional (CCSP): Known Common Vulnerabilities 90347 Dan Lachance Certified Cloud Security Professional (CCSP): Legal Control 90346 Dan Lachance Certified Cloud Security Professional (CCSP): Legal Risks Certified Cloud Security Professional (CCSP): Logical Aspect Design and Risk 90317 Dan Lachance Assessment 90335 Dan Lachance Certified Cloud Security Professional (CCSP): Management Plane 90262 Dan Lachance Certified Cloud Security Professional (CCSP): Masking of Data 90315 Dan Lachance Certified Cloud Security Professional (CCSP): Multi-Factor Authentication

90278 Dan Lachance Certified Cloud Security Professional (CCSP): Network and Communications Service 90322 Dan Lachance Certified Cloud Security Professional (CCSP): Network Configuration 90323 Dan Lachance Certified Cloud Security Professional (CCSP): Network Configuration 90332 Dan Lachance Certified Cloud Security Professional (CCSP): Network Security Management Certified Cloud Security Professional (CCSP): Operating System – Update and 90328 Dan Lachance Patching 90327 Dan Lachance Certified Cloud Security Professional (CCSP): Operating System Baseline 90324 Dan Lachance Certified Cloud Security Professional (CCSP): Operating System Security 90344 Dan Lachance Certified Cloud Security Professional (CCSP): Operations Security 90329 Dan Lachance Certified Cloud Security Professional (CCSP): Performance Monitoring Certified Cloud Security Professional (CCSP): Personally Identifiable Information (PII) 90265 Dan Lachance Law

90318 Dan Lachance Certified Cloud Security Professional (CCSP): Physical and Environmental Design

90341 Dan Lachance Certified Cloud Security Professional (CCSP): Physical and Logical Risk Management 90277 Dan Lachance Certified Cloud Security Professional (CCSP): Physical Architecture 90247 Dan Lachance Certified Cloud Security Professional (CCSP): Platform-specific Security 90253 Dan Lachance Certified Cloud Security Professional (CCSP): Product Certification 90288 Dan Lachance Certified Cloud Security Professional (CCSP): Protecting Access – System and Data 90287 Dan Lachance Certified Cloud Security Professional (CCSP): Protection – Systems (Physical and Virtualized) 90297 Dan Lachance Certified Cloud Security Professional (CCSP): Published Security Issues Certified Cloud Security Professional (CCSP): Regulatory Control and Standards 90338 Dan Lachance Adoption Certified Cloud Security Professional (CCSP): Regulatory Control and Standards 90339 Dan Lachance Adoption Certified Cloud Security Professional (CCSP): Regulatory Control and Standards 90340 Dan Lachance Adoption 90326 Dan Lachance Certified Cloud Security Professional (CCSP): Remote Access

40 DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Exhibit 1 to Addendum 3

By Certification Cert Learning Product Title Exam Asset 90282 Dan Lachance Certified Cloud Security Professional (CCSP): Risk 90362 Dan Lachance Certified Cloud Security Professional (CCSP): Risk Frameworks 90361 Dan Lachance Certified Cloud Security Professional (CCSP): Risk Management 90363 Dan Lachance Certified Cloud Security Professional (CCSP): Risk Management Metrics 90307 Dan Lachance Certified Cloud Security Professional (CCSP): Risks

90245 Dan Lachance Certified Cloud Security Professional (CCSP): Securing the Virtualized Environment 90309 Dan Lachance Certified Cloud Security Professional (CCSP): Security Devices 90267 Dan Lachance Certified Cloud Security Professional (CCSP): Sensitive Data Classification 90314 Dan Lachance Certified Cloud Security Professional (CCSP): Single Sign-On/Off (SSO) 90316 Dan Lachance Certified Cloud Security Professional (CCSP): Specify Application Security 90294 Dan Lachance Certified Cloud Security Professional (CCSP): Specify infrastructural security 90281 Dan Lachance Certified Cloud Security Professional (CCSP): Storage Service 90258 Dan Lachance Certified Cloud Security Professional (CCSP): Storage Type Threat 90259 Dan Lachance Certified Cloud Security Professional (CCSP): Storage Type Threat Mitigation 90257 Dan Lachance Certified Cloud Security Professional (CCSP): Storage Types 90292 Dan Lachance Certified Cloud Security Professional (CCSP): Strategy and Planning 90302 Dan Lachance Certified Cloud Security Professional (CCSP): Supply-Chain & Community 90367 Dan Lachance Certified Cloud Security Professional (CCSP): Supply-chain Management 90283 Dan Lachance Certified Cloud Security Professional (CCSP): Threat and Attack 90308 Dan Lachance Certified Cloud Security Professional (CCSP): Threat Modeling and QoS 90263 Dan Lachance Certified Cloud Security Professional (CCSP): Tokenization of Data 90295 Dan Lachance Certified Cloud Security Professional (CCSP): Training and Awareness 90312 Dan Lachance Certified Cloud Security Professional (CCSP): Virtualization 90354 Dan Lachance Certified Cloud Security Professional (CCSP): Virtualization - Auditing Challenges 90284 Dan Lachance Certified Cloud Security Professional (CCSP): Virtualization Vulnerabilities 90280 Dan Lachance Certified Cloud Security Professional (CCSP): Virtualized Infrastructure

90336 Dan Lachance Certified Cloud Security Professional (CCSP): Virtualized Infrastructure Construction 43844 Emereo Certified Exam Preparation Course in a Book for Passing the GCIH: The How to Pass Publishing on Your First Try Certification Study Guide; 2nd Edition 40276 Emereo CGEIT Exam Preparation: The How To Pass on Your First Try Certification Guide Publishing 93237 EMC Challenges and Best Practices in KBA Schemes 77169 McGraw- CHFI: Computer Hacking Forensic Investigator Certification All-in-One Exam Guide Hill/Osborne 63491 John Wiley & Chinese Cybersecurity and Defense Sons 51967 Auerbach CIO's Guide to Security Incident Management Publications 50527 McGraw- CISSP All-in-One Exam Guide; Sixth Edition Hill/Osborne 46519 SSI Logic CISSP Exam Prep: Questions; Answers & Explanations 49565 John Wiley & CISSP For Dummies; 4th Edition Sons 50528 McGraw- CISSP Practice Exams; Second Edition Hill/Osborne

41 DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Exhibit 1 to Addendum 3

By Certification Cert Learning Product Title Exam Asset 86040 McGraw- CISSP Practice Exams; Third Edition Hill/Osborne 85978 Syngress CISSP Study Guide; 3rd Edition Publishing 47313 Syngress CISSP Study Guide; Second Edition Publishing 46742 Sybex CISSP: Certified Information Systems Security Professional Study Guide; Sixth Edition

39951 ISACA Cloud Computing Management Audit/Assurance Program 32102 Auerbach Cloud Computing: Implementation; Management; and Security Publications 37795 IT Governance Cloud Security and Governance: Who's on Your Cloud? 34770 John Wiley & Cloud Security: A Comprehensive Guide to Secure Cloud Computing Sons 88819 Syngress Cloud Storage Security: A Practical Guide Publishing 40613 John Wiley & CMS Security Handbook: The Comprehensive Guide for WordPress; Joomla!; Drupal; Sons and Plone 35747 ISACA COBIT Mapping: Mapping FFIEC with COBIT 4.1 41433 ISACA COBIT Mapping: Mapping of CMMI for Development V1.2 with COBIT 4.1 26407 Auerbach Complete Guide to Security and Privacy Metrics: Measuring Regulatory Compliance; Publications Operational Resilience; and ROI 67850 Glen E. Clarke CompTIA CASP CAS-002: Access Control Lists 68014 Dan Lachance CompTIA CASP CAS-002: Active Directory 67899 Dan LaChance CompTIA CASP CAS-002: ActiveX 68008 Dan Lachance CompTIA CASP CAS-002: Advanced Authentication 68009 Dan Lachance CompTIA CASP CAS-002: Advanced Authorization 67848 Glen E. Clarke CompTIA CASP CAS-002: Advanced Configuration of Network Devices 67902 Dan LaChance CompTIA CASP CAS-002: AJAX

67969 Steven Crawford CompTIA CASP CAS-002: Assessment; Sandboxing; and Debugging 67937 Glen E. Clarke CompTIA CASP CAS-002: Asset Control & Data Ownership and Handling 68010 Dan Lachance CompTIA CASP CAS-002: Attestation and Identity Propagation 67935 Glen E. Clarke CompTIA CASP CAS-002: Auditing and Continuous Monitoring

67851 Glen E. Clarke CompTIA CASP CAS-002: Baselining of Networking and Security Components

67955 Steven Crawford CompTIA CASP CAS-002: Benchmarks and Baselines

67948 Steven Crawford CompTIA CASP CAS-002: Best Practices & New Technologies for Security Systems 67875 Glen E. Clarke CompTIA CASP CAS-002: BIOS and Unified Extensible Firmware Interface

67971 Steven Crawford CompTIA CASP CAS-002: Black Box; White Box; and Gray Box Testing

67858 Glen E. Clarke CompTIA CASP CAS-002: Building Automation; Physical; and Industrial Controls 67924 Glen E. Clarke CompTIA CASP CAS-002: Business Continuity Planning 67944 Glen E. Clarke CompTIA CASP CAS-002: Chain of Custody

67817 Steven Crawford CompTIA CASP CAS-002: Chain of Trust and Root of Trust

42 DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Exhibit 1 to Addendum 3

By Certification Cert Learning Product Title Exam Asset

67984 Dan LaChance CompTIA CASP CAS-002: Change Management; Operations; and Maintenance 67914 Glen E. Clarke CompTIA CASP CAS-002: CIA Aggregate Scores 67913 Glen E. Clarke CompTIA CASP CAS-002: CIA Decisions; Requirements; and Policies 67887 Dan LaChance CompTIA CASP CAS-002: Clickjacking

67949 Steven Crawford CompTIA CASP CAS-002: Client-Side Attacks; Vulnerabilities; and Threats

67897 Dan LaChance CompTIA CASP CAS-002: Client-Side Processing vs. Server-Side Processing

67994 Dan LaChance CompTIA CASP CAS-002: Cloud and Virtualization Considerations and Options 67853 Glen E. Clarke CompTIA CASP CAS-002: Cloud Managed Networks

67814 Steven Crawford CompTIA CASP CAS-002: Code Signing and Digital Signatures 67978 Dan LaChance CompTIA CASP CAS-002: Collaboration and Guidance 67982 Dan LaChance CompTIA CASP CAS-002: Collaboration Sites 67867 Glen E. Clarke CompTIA CASP CAS-002: Command Shell Restrictions 67985 Dan LaChance CompTIA CASP CAS-002: Commissioning; Reuse; and Disposal 67849 Glen E. Clarke CompTIA CASP CAS-002: Complex Network Security Solutions for Data Flow

67952 Steven Crawford CompTIA CASP CAS-002: Computer Emergency Response Team 67979 Dan LaChance CompTIA CASP CAS-002: Conferencing and Messaging Solutions 67946 Glen E. Clarke CompTIA CASP CAS-002: Continuity of Operation Plan 67923 Glen E. Clarke CompTIA CASP CAS-002: Continuous Improvement and Monitoring

67953 Steven Crawford CompTIA CASP CAS-002: Conventions; Threat Actors; & Threat Intelligence

67957 Steven Crawford CompTIA CASP CAS-002: Cost Benefit Analysis 68005 Dan Lachance CompTIA CASP CAS-002: CRM; ERP; and GRC 67886 Dan LaChance CompTIA CASP CAS-002: Cross-Site Request Forgery 67885 Dan LaChance CompTIA CASP CAS-002: Cross-Site Scripting CompTIA CASP CAS-002: Cryptographic Applications Implementations and Key 67821 Steven Crawford Escrow 67997 Dan LaChance CompTIA CASP CAS-002: Data Aggregation and Isolation 67863 Glen E. Clarke CompTIA CASP CAS-002: Data Loss Prevention and Patch Management 67940 Glen E. Clarke CompTIA CASP CAS-002: Data Recovery and Reconstitution 67936 Glen E. Clarke CompTIA CASP CAS-002: Data Retention; Legal Holds; and Data Recovery

67827 Steven Crawford CompTIA CASP CAS-002: Data Warehousing and Archiving 67846 Glen E. Clarke CompTIA CASP CAS-002: Database Activity Monitor 67974 Dan LaChance CompTIA CASP CAS-002: Database and Network Administrators 67868 Glen E. Clarke CompTIA CASP CAS-002: Dedicated Interfaces and Out-of-Band NICs

67833 Steven Crawford CompTIA CASP CAS-002: Deduplication and Dynamic Disk Pools

67980 Dan LaChance CompTIA CASP CAS-002: Desktop Sharing; Remote Assistance; and Presence 67938 Glen E. Clarke CompTIA CASP CAS-002: Detection and Collection 67989 Dan LaChance CompTIA CASP CAS-002: Device Tracking Technologies

43 DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Exhibit 1 to Addendum 3

By Certification Cert Learning Product Title Exam Asset 68007 Dan Lachance CompTIA CASP CAS-002: DNS; CMDB; and CMS

67824 Steven Crawford CompTIA CASP CAS-002: DRM; Watermarking; and GPG 67835 Dan LaChance CompTIA CASP CAS-002: Encryption Types 67861 Glen E. Clarke CompTIA CASP CAS-002: Endpoint Security Software

67951 Steven Crawford CompTIA CASP CAS-002: End-User Cloud Storage and Business Integration 67922 Glen E. Clarke CompTIA CASP CAS-002: Enterprise Security Architecture Frameworks

67815 Steven Crawford CompTIA CASP CAS-002: Entropy; Diffusion; and Confusion

67890 Dan LaChance CompTIA CASP CAS-002: Error & Exception Handling and Privilege Escalation 68006 Dan LaChance CompTIA CASP CAS-002: ESB; SOA; and Directory Services

67960 Steven Crawford CompTIA CASP CAS-002: Existing Security Controls

67967 Steven Crawford CompTIA CASP CAS-002: Exploitation Tools 67915 Glen E. Clarke CompTIA CASP CAS-002: Extreme Planning and Worst Case Scenarios 67977 Dan LaChance CompTIA CASP CAS-002: Facilities and Physical Security Managers 68011 Dan Lachance CompTIA CASP CAS-002: Federation 67901 Dan LaChance CompTIA CASP CAS-002: Flash 67945 Glen E. Clarke CompTIA CASP CAS-002: Forensic Analysis of a Compromised System 67891 Dan LaChance CompTIA CASP CAS-002: Fuzzing and Fault Injection 67873 Glen E. Clarke CompTIA CASP CAS-002: Hash Matching in Cloud Environments 67864 Glen E. Clarke CompTIA CASP CAS-002: Host Based Firewalls and Log Monitoring 67903 Dan LaChance CompTIA CASP CAS-002: HTML5 67976 Dan LaChance CompTIA CASP CAS-002: Human Resources and Emergency Response 67857 Glen E. Clarke CompTIA CASP CAS-002: HVAC Controllers and Sensors 67929 Glen E. Clarke CompTIA CASP CAS-002: IA; ISA; MOU; and SLA 67910 Glen E. Clarke CompTIA CASP CAS-002: Impact of De-Perimeterization

67822 Steven Crawford CompTIA CASP CAS-002: Implications of Cryptographic Methods and Design 67933 Glen E. Clarke CompTIA CASP CAS-002: Incident Response and Forensic Tasks

67895 Dan LaChance CompTIA CASP CAS-002: Industry-Accepted Application Security Frameworks 67844 Glen E. Clarke CompTIA CASP CAS-002: INE; SIEM; and HSM 67912 Glen E. Clarke CompTIA CASP CAS-002: Information Classification 67884 Dan LaChance CompTIA CASP CAS-002: Insecure Direct Object References 67876 Glen E. Clarke CompTIA CASP CAS-002: Integrity Measurement Architecture 67911 Glen E. Clarke CompTIA CASP CAS-002: Internal and External Influences 67942 Glen E. Clarke CompTIA CASP CAS-002: Internal and External Violations 67993 Dan LaChance CompTIA CASP CAS-002: Interoperability Issues 67859 Glen E. Clarke CompTIA CASP CAS-002: IP Video and A/V Controls 67838 Glen E. Clarke CompTIA CASP CAS-002: IPv6 and Associated Transitional Technologies

67829 Steven Crawford CompTIA CASP CAS-002: iSCSI and FCoE

44 DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Exhibit 1 to Addendum 3

By Certification Cert Learning Product Title Exam Asset

67819 Steven Crawford CompTIA CASP CAS-002: Issuance and Object Support 67925 Glen E. Clarke CompTIA CASP CAS-002: IT Governance 67900 Dan LaChance CompTIA CASP CAS-002: Java Applets 67905 Dan LaChance CompTIA CASP CAS-002: JavaScript and State Management

67965 Steven Crawford CompTIA CASP CAS-002: Judgment Calls

67811 Steven Crawford CompTIA CASP CAS-002: Key Stretching and Hashing 67927 Glen E. Clarke CompTIA CASP CAS-002: Legal Compliance and Advocacy

67964 Steven Crawford CompTIA CASP CAS-002: Lessons Learned and After-Action Reports 68013 Dan Lachance CompTIA CASP CAS-002: Lightweight Direct Access Protocol 67918 Glen E. Clarke CompTIA CASP CAS-002: Likelihood of Threat 67878 Glen E. Clarke CompTIA CASP CAS-002: Live VM Migration 68002 Dan Lachance CompTIA CASP CAS-002: Logical and Physical Deployment Diagrams

67834 Steven Crawford CompTIA CASP CAS-002: LUN Masking and HBA Allocation 67917 Glen E. Clarke CompTIA CASP CAS-002: Magnitude of Impact 67869 Glen E. Clarke CompTIA CASP CAS-002: Management and Data Interfaces 67975 Dan LaChance CompTIA CASP CAS-002: Management and Finance 67893 Dan LaChance CompTIA CASP CAS-002: Memory Leaks & Buffer and Integer Overflows 68000 Dan Lachance CompTIA CASP CAS-002: Mergers; Acquisitions; and Divestitures 67841 Glen E. Clarke CompTIA CASP CAS-002: Mesh Networks

67958 Steven Crawford CompTIA CASP CAS-002: Metrics Collection and Analysis 67939 Glen E. Clarke CompTIA CASP CAS-002: Mitigation

67831 Steven Crawford CompTIA CASP CAS-002: Multipath and Offsite or Multisite Replication

67828 Steven Crawford CompTIA CASP CAS-002: NAS; SAN; and vSAN 67856 Glen E. Clarke CompTIA CASP CAS-002: Network Access Control

67966 Steven Crawford CompTIA CASP CAS-002: Network Analysis Tools 67840 Glen E. Clarke CompTIA CASP CAS-002: Network Authentication Methods and 802.1x 67852 Glen E. Clarke CompTIA CASP CAS-002: Network Management and Monitoring Tools 68001 Dan Lachance CompTIA CASP CAS-002: Network Secure Segmentation and Delegation 67847 Glen E. Clarke CompTIA CASP CAS-002: Networking and Security Components 67907 Glen E. Clarke CompTIA CASP CAS-002: New or Changing Models and Strategies

67830 Steven Crawford CompTIA CASP CAS-002: NFS and CIFS 67843 Glen E. Clarke CompTIA CASP CAS-002: NIPS and NIDS 67990 Dan LaChance CompTIA CASP CAS-002: Object Tracking and Containment Technologies 67930 Glen E. Clarke CompTIA CASP CAS-002: OLA; NDA; and BPA 67947 Glen E. Clarke CompTIA CASP CAS-002: Order of Volatility 67983 Dan LaChance CompTIA CASP CAS-002: Over-the-Air Technologies

67968 Steven Crawford CompTIA CASP CAS-002: Passive Reconnaissance and Intelligence Gathering Tools

45 DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Exhibit 1 to Addendum 3

By Certification Cert Learning Product Title Exam Asset

67970 Steven Crawford CompTIA CASP CAS-002: Penetration Testing

67962 Steven Crawford CompTIA CASP CAS-002: Performance; Latency; Scalability; and Capability 67870 Dan LeChance CompTIA CASP CAS-002: Peripheral Restrictions 67926 Glen E. Clarke CompTIA CASP CAS-002: Policies; Processes; and Procedures for Change 67931 Glen E. Clarke CompTIA CASP CAS-002: Privacy Principles and PII 67879 Glen E. Clarke CompTIA CASP CAS-002: Privilege Elevation and Data Remnants

67956 Steven Crawford CompTIA CASP CAS-002: Prototypes and Testing

67812 Steven Crawford CompTIA CASP CAS-002: Pseudo Number Generation and Perfect Forward Secrecy 67928 Glen E. Clarke CompTIA CASP CAS-002: RA; SOA; and BIA

67894 Dan LaChance CompTIA CASP CAS-002: Race Conditions; Resource Exhaustion; and Geo-Tagging 68012 Dan Lachance CompTIA CASP CAS-002: RADIUS

67972 Steven Crawford CompTIA CASP CAS-002: Reconnaissance; Fingerprinting; and Social Engineering

67837 Glen E. Clarke CompTIA CASP CAS-002: Remote Desktop Protocol and Virtual Network Computing 67881 Glen E. Clarke CompTIA CASP CAS-002: Remote Desktop Services and App-V 67998 Dan LaChance CompTIA CASP CAS-002: Resources Provisioning and De-Provisioning 67941 Glen E. Clarke CompTIA CASP CAS-002: Response and Disclosure

67919 Glen E. Clarke CompTIA CASP CAS-002: Return on Investment and Total Cost of Ownership

67961 Steven Crawford CompTIA CASP CAS-002: Reverse Engineering Solutions

67954 Steven Crawford CompTIA CASP CAS-002: RFPs; RFQs; FRIs; and Agreements 67920 Glen E. Clarke CompTIA CASP CAS-002: Risk Appetite Strategies 67906 Glen E. Clarke CompTIA CASP CAS-002: Risk Management 67921 Glen E. Clarke CompTIA CASP CAS-002: Risk Management Processes 67973 Dan LaChance CompTIA CASP CAS-002: Sales Staff and Programmers

67872 Glen E. Clarke CompTIA CASP CAS-002: Sandboxing and Content Filtering in Cloud Environments 67860 Glen E. Clarke CompTIA CASP CAS-002: SCADA and Industrial Control Systems 67874 Glen E. Clarke CompTIA CASP CAS-002: Secure Boot and Measured Launch 67898 Dan LaChance CompTIA CASP CAS-002: Secure Coding Standards

67991 Dan LaChance CompTIA CASP CAS-002: Secure Data Flows to Meet Changing Business Needs 68003 Dan Lachance CompTIA CASP CAS-002: Secure Infrastructure Design 67996 Dan LaChance CompTIA CASP CAS-002: Secure Use of On-demand Cloud Computing 67999 Dan LaChance CompTIA CASP CAS-002: Securing Virtual Environments 67871 Dan LeChance CompTIA CASP CAS-002: Securing Virtualized Servers

67908 Glen E. Clarke CompTIA CASP CAS-002: Security Concerns of Integrating Diverse Industries 67866 Glen E. Clarke CompTIA CASP CAS-002: Security Group Policy Implementations 67987 Dan LaChance CompTIA CASP CAS-002: Security Requirements Traceability Matrix

46 DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Exhibit 1 to Addendum 3

By Certification Cert Learning Product Title Exam Asset 67986 Dan LaChance CompTIA CASP CAS-002: Security System Development Life Cycle 67855 Glen E. Clarke CompTIA CASP CAS-002: Security Zones 67889 Dan LaChance CompTIA CASP CAS-002: Session Management and Input Validation

67832 Steven Crawford CompTIA CASP CAS-002: Snapshots 67904 Dan LaChance CompTIA CASP CAS-002: SOAP 67854 Glen E. Clarke CompTIA CASP CAS-002: Software-Defined Network 67888 Dan LaChance CompTIA CASP CAS-002: SQL Injection

67825 Steven Crawford CompTIA CASP CAS-002: SSL; SSH; S/MIME

67865 Glen E. Clarke CompTIA CASP CAS-002: Standard Operating Environment Configuration Baselines 67992 Dan LaChance CompTIA CASP CAS-002: Standards

67820 Steven Crawford CompTIA CASP CAS-002: Steganography 68004 Dan Lachance CompTIA CASP CAS-002: Storage Integration 67892 Dan LaChance CompTIA CASP CAS-002: Storage of Sensitive Data CompTIA CASP CAS-002: Strength vs. Performance vs. Feasibility to Implement vs. 67823 Steven Crawford Interoperability 67916 Glen E. Clarke CompTIA CASP CAS-002: System Specific Risk Analysis 67943 Glen E. Clarke CompTIA CASP CAS-002: System; Audit; and Review Logs 67981 Dan LaChance CompTIA CASP CAS-002: Telephony

67988 Dan LaChance CompTIA CASP CAS-002: Testing and Agile; Waterfall; and Spiral Methodologies

67816 Steven Crawford CompTIA CASP CAS-002: The CIA Triad and Non-Repudiation 67880 Glen E. Clarke CompTIA CASP CAS-002: The Virtual Desktop Infrastructure 67909 Glen E. Clarke CompTIA CASP CAS-002: Third Party Information Security 67882 Glen E. Clarke CompTIA CASP CAS-002: TPM; VTPM; and HSM

67934 Glen E. Clarke CompTIA CASP CAS-002: Training and Awareness and Employment Termination

67813 Steven Crawford CompTIA CASP CAS-002: Transport and Data at Rest Encryption 67839 Glen E. Clarke CompTIA CASP CAS-002: Transport Encryption

67959 Steven Crawford CompTIA CASP CAS-002: Trend Data and Cyber Defense 67862 Glen E. Clarke CompTIA CASP CAS-002: Trusted OS 67842 Glen E. Clarke CompTIA CASP CAS-002: Unified Threat Management

67963 Steven Crawford CompTIA CASP CAS-002: Usability; Maintainability; Availability; and Recovery 67932 Dan LeChance CompTIA CASP CAS-002: User Policies

67826 Steven Crawford CompTIA CASP CAS-002: Virtual and Cloud Storage 67836 Glen E. Clarke CompTIA CASP CAS-002: Virtual Private Networks 67877 Glen E. Clarke CompTIA CASP CAS-002: VM Escape 67995 Dan LaChance CompTIA CASP CAS-002: Vulnerabilities Associated with Virtual Machines 67845 Glen E. Clarke CompTIA CASP CAS-002: Web and NextGen Firewalls 67883 Dan LaChance CompTIA CASP CAS-002: Web Application Security Design Considerations

47 DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Exhibit 1 to Addendum 3

By Certification Cert Learning Product Title Exam Asset 67896 Dan Lachance CompTIA CASP CAS-002: Web Services Security

67818 Steven Crawford CompTIA CASP CAS-002: Wild Cards; OCSP; and CRL

67950 Steven Crawford CompTIA CASP CAS-002: Zero Day Mitigation and Emergent Threats 72503 McGraw- CompTIA Mobility+ Certification All-in-One Exam Guide (Exam MB0-001) Hill/Osborne 77170 McGraw- CompTIA Security+ All-in-One Exam Guide; Fourth Edition (Exam SY0-401) Hill/Osborne 72500 McGraw- CompTIA Security+ Certification Practice Exams; Second Edition (Exam SY0-401) Hill/Osborne 72501 McGraw- CompTIA Security+ Certification Study Guide; Second Edition (Exam SY0-401) Hill/Osborne 72714 Sybex CompTIA Security+ Deluxe Study Guide: SY0-401 63498 Sybex CompTIA Security+ Review Guide; Third Edition (Exam SY0-401) 63499 Sybex CompTIA Security+ Study Guide; Sixth Edition (SY0-401) 81712 Cengage Course CompTIA Security+ SY0-401 In Depth Technology

81713 Cengage Course CompTIA Security+ SY0-401 Q&A Technology

66954 GTSLearning CompTIA Security+: Official Study Guide; Student Edition (Exam SY0-401) 72508 McGraw- Computer Forensics and Digital Investigation with EnCase Forensic v7 Hill/Osborne 69834 Jones and Computer Forensics; Second Edition Bartlett Learning

47607 McGraw- Computer Incident Response Planning Handbook: Executable Plans for Protecting Hill/Osborne Information at Risk 51951 Auerbach Core Software Security: Security at the Source Publications 37523 IGI Global Corporate Hacking and Technology-Driven Crime: Social Dynamics and Implications

51915 Auerbach Corporate Security in the Asia-Pacific Region: Crisis; Crime; Fraud; and Misconduct Publications 44326 John Wiley & COSO Enterprise Risk Management: Establishing Effective Governance; Risk; and Sons Compliance; Second Edition 43480 ISACA Creating a Culture of Security 69887 IGI Global Crisis Management: Concepts; Methodologies; Tools and Applications 51960 Auerbach Critical Infrastructure System Security and Resiliency Publications 69801 Laxmi Cryptography and Network Security: A Practical Approach Publications 62169 Cambridge Cryptography and Secure Communication University Press

23395 IGI Global Cryptography and Security Services: Mechanisms and Applications 16133 Syngress Cryptography for Developers Publishing 8302 John Wiley & Cryptography For Dummies Sons 84020 Dan Lachance Cryptography Fundamentals: Apply Cryptographic Modes and Algorithms

48 DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Exhibit 1 to Addendum 3

By Certification Cert Learning Product Title Exam Asset 83980 Dan Lachance Cryptography Fundamentals: Applying Non-repudiation to Cryptography 84002 Dan Lachance Cryptography Fundamentals: Applying the DES/3DES Block Algorithm 83993 Dan Lachance Cryptography Fundamentals: Creating or Generating Keys 83979 Dan Lachance Cryptography Fundamentals: Defining Cryptography Authentication 84006 Dan Lachance Cryptography Fundamentals: Defining the RSA Algorithm 83974 Dan Lachance Cryptography Fundamentals: Defining Why Cryptography is Difficult 84000 Dan Lachance Cryptography Fundamentals: Describing Counter (CTR) 84018 Dan Lachance Cryptography Fundamentals: Describing Cryptanalysis 83973 Dan Lachance Cryptography Fundamentals: Describing Cryptographic Terminology 83987 Dan Lachance Cryptography Fundamentals: Describing Digital Signatures 83995 Dan Lachance Cryptography Fundamentals: Describing Electronic Codebook (ECB)

83976 Dan Lachance Cryptography Fundamentals: Describing Export Controls and Limits on Cryptography 84009 Dan Lachance Cryptography Fundamentals: Describing HMAC

83977 Dan Lachance Cryptography Fundamentals: Describing How Cryptography Provides Confidentiality 84012 Dan Lachance Cryptography Fundamentals: Describing Key Escrow 84011 Dan Lachance Cryptography Fundamentals: Describing Key Exchange 84010 Dan Lachance Cryptography Fundamentals: Describing Key Management 84007 Dan Lachance Cryptography Fundamentals: Describing MD5; SHA1; and SHA3 84019 Dan Lachance Cryptography Fundamentals: Describing Side-channel Attacks 83982 Dan Lachance Cryptography Fundamentals: Describing Substitution Ciphers 84003 Dan Lachance Cryptography Fundamentals: Describing the Blowfish Block Algorithm 84005 Dan Lachance Cryptography Fundamentals: Describing the ElGamal Algorithm 84004 Dan Lachance Cryptography Fundamentals: Describing the RC4 Streaming Algorithm 83988 Dan Lachance Cryptography Fundamentals: Distinguishing between Block and Key Sizes 83990 Dan Lachance Cryptography Fundamentals: Formatting the Output 83985 Dan Lachance Cryptography Fundamentals: Hiding Data Using Steganography 83994 Dan Lachance Cryptography Fundamentals: Identify the Cryptographic Algorithm to Use 84017 Dan Lachance Cryptography Fundamentals: Identifying Algorithm and Key Strengths 83992 Dan Lachance Cryptography Fundamentals: Identifying and Using Entropy 83972 Dan Lachance Cryptography Fundamentals: Identifying Historical Use of Cryptography

84013 Dan Lachance Cryptography Fundamentals: Identifying Secure Communications Over HTTPS 83975 Dan Lachance Cryptography Fundamentals: Identifying the Current State of Cryptography 83971 Dan Lachance Cryptography Fundamentals: Introducing Cryptography 83978 Dan Lachance Cryptography Fundamentals: Recognizing the Need for Data Integrity 83981 Dan Lachance Cryptography Fundamentals: Using a One-time Pad 83996 Dan Lachance Cryptography Fundamentals: Using Cipher Block Chaining (CBC) 83998 Dan Lachance Cryptography Fundamentals: Using Cipher Feedback (CFB) 84015 Dan Lachance Cryptography Fundamentals: Using GPG with E-mail 83991 Dan Lachance Cryptography Fundamentals: Using Nonces and the Initialization Vector 83986 Dan Lachance Cryptography Fundamentals: Using One-way Hashes 83999 Dan Lachance Cryptography Fundamentals: Using Output Feedback (OFB) 83989 Dan Lachance Cryptography Fundamentals: Using Padding

49 DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Exhibit 1 to Addendum 3

By Certification Cert Learning Product Title Exam Asset

83997 Dan Lachance Cryptography Fundamentals: Using Propagating Cipher Block Chaining (PCBC) 84008 Dan Lachance Cryptography Fundamentals: Using SHA2 83983 Dan Lachance Cryptography Fundamentals: Using Symmetric Algorithms 84001 Dan Lachance Cryptography Fundamentals: Using the AES Block Algorithm 83984 Dan Lachance Cryptography Fundamentals: Working with Asymmetric Algorithms 84016 Dan Lachance Cryptography Fundamentals: Working with Disk Encryption 84014 Dan Lachance Cryptography Fundamentals: Working with the Secure Shell (SSH) 4303 Oxford University Cryptography: A Very Short Introduction Press

73406 Syngress CSA Guide to Cloud Computing: Implementing Cloud Privacy and Security Publishing 77389 Neil McIsaac CSSLP: Accounting 77409 Neil McIsaac CSSLP: Agile 77477 Glen E. Clarke CSSLP: Anti-tampering Techniques 77431 Neil McIsaac CSSLP: Applicable Methods to Address Core Security Concepts 77426 Neil McIsaac CSSLP: Attack Surface Evaluation 77484 Glen E. Clarke CSSLP: Attack Surface Validation 77388 Neil McIsaac CSSLP: Authentication and Authorization Part 1 78944 Neil McIsaac CSSLP: Authentication and Authorization Part 2 77442 Neil McIsaac CSSLP: Authentication and Identity Management 77387 Neil McIsaac CSSLP: Availability 77538 Glen E. Clarke CSSLP: Backup; Recovery; and Archiving 77530 Glen E. Clarke CSSLP: Bootstrapping 77483 Glen E. Clarke CSSLP: Bug Tracking 77474 Glen E. Clarke CSSLP: Build Environment 77555 Chuck Easttom CSSLP: Chain of Custody 77537 Glen E. Clarke CSSLP: Change Management 77440 Neil McIsaac CSSLP: Cloud Architectures 77476 Glen E. Clarke CSSLP: Code Analysis 77562 Chuck Easttom CSSLP: Code Escrow and Data Exports 77542 Chuck Easttom CSSLP: Code Reuse Plan Best Practice 77552 Chuck Easttom CSSLP: Code Testing and Verification 77396 Neil McIsaac CSSLP: Complete Mediation 77525 Glen E. Clarke CSSLP: Completion Criteria 77458 Glen E. Clarke CSSLP: Concurrency 77385 Neil McIsaac CSSLP: Confidentiality 77459 Glen E. Clarke CSSLP: Configuration 77532 Glen E. Clarke CSSLP: Configuration Management Process 77531 Glen E. Clarke CSSLP: Configuration Management Roles and Plan 77470 Glen E. Clarke CSSLP: Configuration Parameter Management 77520 Glen E. Clarke CSSLP: Continuous Testing 77563 Chuck Easttom CSSLP: Contracts 77547 Chuck Easttom CSSLP: Contractual Integrity Controls

50 DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Exhibit 1 to Addendum 3

By Certification Cert Learning Product Title Exam Asset 77428 Neil McIsaac CSSLP: Control Identification and Prioritization 77522 Glen E. Clarke CSSLP: Corrective Action 77443 Neil McIsaac CSSLP: Credential Management 77518 Glen E. Clarke CSSLP: Cryptographic Validation 77460 Glen E. Clarke CSSLP: Cryptology 77457 Glen E. Clarke CSSLP: CWE 77412 Neil McIsaac CSSLP: Data Classification (Part 1) 77413 Neil McIsaac CSSLP: Data Classification (Part 2) 77417 Neil McIsaac CSSLP: Data Lifecycle 77446 Neil McIsaac CSSLP: Data Loss Prevention 77414 Neil McIsaac CSSLP: Data Ownership 77416 Neil McIsaac CSSLP: Data Types 77450 Neil McIsaac CSSLP: Database Security 77454 Neil McIsaac CSSLP: Declarative Security 77393 Neil McIsaac CSSLP: Defense in Depth 77419 Neil McIsaac CSSLP: Deployment Environment 77423 Neil McIsaac CSSLP: Deployment Requirements 77429 Neil McIsaac CSSLP: Design and Architecture Technical Review 77448 Neil McIsaac CSSLP: Digital Rights Management (DRM) 77435 Neil McIsaac CSSLP: Distributed Computing 77395 Neil McIsaac CSSLP: Economy of Mechanism 77453 Neil McIsaac CSSLP: Embedded Systems 77482 Glen E. Clarke CSSLP: Environment 77462 Glen E. Clarke CSSLP: Error Handling 77466 Glen E. Clarke CSSLP: Exception Management 77411 Neil McIsaac CSSLP: External Requirements 77394 Neil McIsaac CSSLP: Fail-Safe 77517 Glen E. Clarke CSSLP: Failure Testing 77444 Neil McIsaac CSSLP: Flow Control 77479 Glen E. Clarke CSSLP: Functional Testing 77514 Glen E. Clarke CSSLP: Fuzzing 77521 Glen E. Clarke CSSLP: Impact Assessment 77535 Glen E. Clarke CSSLP: Incident Management 77529 Glen E. Clarke CSSLP: Independent Testing 77463 Glen E. Clarke CSSLP: Input Validation 77439 Neil McIsaac CSSLP: Integrating with Existing Architectures 77386 Neil McIsaac CSSLP: Integrity 77543 Chuck Easttom CSSLP: Intellectual Property 77433 Neil McIsaac CSSLP: Interconnectivity 77434 Neil McIsaac CSSLP: Interfaces 77410 Neil McIsaac CSSLP: Internal Requirements 77415 Neil McIsaac CSSLP: Labeling 77398 Neil McIsaac CSSLP: Least Common Mechanism 77391 Neil McIsaac CSSLP: Least Privilege

51 DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Exhibit 1 to Addendum 3

By Certification Cert Learning Product Title Exam Asset 77405 Neil McIsaac CSSLP: Legal 77544 Chuck Easttom CSSLP: Legal Compliance 77401 Neil McIsaac CSSLP: Leveraging Existing Components 77445 Neil McIsaac CSSLP: Logging 77464 Glen E. Clarke CSSLP: Logging and Auditing 77549 Chuck Easttom CSSLP: Managed Services Controls 77425 Neil McIsaac CSSLP: Management Requirements 77469 Glen E. Clarke CSSLP: Memory Management 77441 Neil McIsaac CSSLP: Mobile Applications 77534 Glen E. Clarke CSSLP: Monitoring 77560 Chuck Easttom CSSLP: Monitoring and Incident Management 77480 Glen E. Clarke CSSLP: Nonfunctional Testing 77390 Neil McIsaac CSSLP: Non-Repudiation 77420 Neil McIsaac CSSLP: Objects; Activities; and Actions 77397 Neil McIsaac CSSLP: Open Design 77452 Neil McIsaac CSSLP: Operating Systems 77424 Neil McIsaac CSSLP: Operations Requirements 77461 Glen E. Clarke CSSLP: Output Sanitization 77456 Glen E. Clarke CSSLP: OWASP Top 10 77475 Glen E. Clarke CSSLP: Peer-based Code Review 77513 Glen E. Clarke CSSLP: Penetration 77438 Neil McIsaac CSSLP: Pervasive and Ubiquitous Computing 77527 Glen E. Clarke CSSLP: Post-release Plan 77524 Glen E. Clarke CSSLP: Pre-release Testing Process 77403 Neil McIsaac CSSLP: Privacy Considerations 77536 Glen E. Clarke CSSLP: Problem Management 77559 Chuck Easttom CSSLP: Product Deployment and Sustainment Controls 77455 Glen E. Clarke CSSLP: Programmatic Security 77451 Neil McIsaac CSSLP: Programming Language Environment 77399 Neil McIsaac CSSLP: Psychological Acceptability 77556 Chuck Easttom CSSLP: Publishing and Dissemination Controls 77519 Glen E. Clarke CSSLP: Regression Testing 77404 Neil McIsaac CSSLP: Regulations and Compliance 77533 Glen E. Clarke CSSLP: Release Management 77437 Neil McIsaac CSSLP: Rich Internet Applications 77526 Glen E. Clarke CSSLP: Risk Acceptance 77430 Neil McIsaac CSSLP: Risk Assessment for Code Reuse 77541 Chuck Easttom CSSLP: Risk Assessment for Code Reuse 77407 Neil McIsaac CSSLP: Risk Management 77418 Neil McIsaac CSSLP: Role and User Definitions 77467 Glen E. Clarke CSSLP: Safe APIs 77472 Glen E. Clarke CSSLP: Sandboxing 77515 Glen E. Clarke CSSLP: Scanning 77432 Neil McIsaac CSSLP: Security Design Principles

52 DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Exhibit 1 to Addendum 3

By Certification Cert Learning Product Title Exam Asset 77481 Glen E. Clarke CSSLP: Security Testing 77553 Chuck Easttom CSSLP: Security Testing Controls 77392 Neil McIsaac CSSLP: Separation of Duties 77422 Neil McIsaac CSSLP: Sequencing and Timing Requirements 77550 Chuck Easttom CSSLP: Service-level Agreements 77436 Neil McIsaac CSSLP: Service-Oriented Architecture 77465 Glen E. Clarke CSSLP: Session Management 77516 Glen E. Clarke CSSLP: Simulation Testing 77558 Chuck Easttom CSSLP: Software Authenticity and Integrity 77540 Glen E. Clarke CSSLP: Software Disposal Execution 77539 Glen E. Clarke CSSLP: Software Disposal Planning 77554 Chuck Easttom CSSLP: Software Requirements Verification and Validation 77473 Glen E. Clarke CSSLP: Source Code and Versioning 77406 Neil McIsaac CSSLP: Standards 77512 Glen E. Clarke CSSLP: Standards 77545 Chuck Easttom CSSLP: Supplier Prequalification 77546 Chuck Easttom CSSLP: Supplier Sourcing Challenges 77557 Chuck Easttom CSSLP: System-of-Systems Integration 77551 Chuck Easttom CSSLP: Technical Controls 77523 Glen E. Clarke CSSLP: Test Data Lifecycle Management 77478 Glen E. Clarke CSSLP: Testing Artifacts 77402 Neil McIsaac CSSLP: The Privacy Principle 77427 Neil McIsaac CSSLP: Threat Modeling and Documentation 77471 Glen E. Clarke CSSLP: Tokenizing 77449 Neil McIsaac CSSLP: Trusted Computing 77468 Glen E. Clarke CSSLP: Type Safety 77528 Glen E. Clarke CSSLP: Validation and Verification 77548 Chuck Easttom CSSLP: Vendor Technical Integrity Controls 77447 Neil McIsaac CSSLP: Virtualization 77561 Chuck Easttom CSSLP: Vulnerability Management; Tracking; and Resolution 77408 Neil McIsaac CSSLP: Waterfall 77400 Neil McIsaac CSSLP: Weakest Link 59134 McGraw- CSSLP® Certification All-in-One Exam Guide Hill/Osborne 70001 Syngress Cyber Crime and Cyber Terrorism Investigator's Handbook Publishing 73961 IT Governance Cyber Essentials: A Pocket Guide 77730 Syngress Cyber Reconnaissance; Surveillance and Defense Publishing 33409 IGI Global Cyber Security and Global Information Assurance: Threat Analysis and Response Solutions 64435 Gower Publishing Cyber Security Management: A Governance; Risk and Compliance Framework Limited

14695 IGI Global Cyber Terrorism: Political and Economic Implications

53 DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Exhibit 1 to Addendum 3

By Certification Cert Learning Product Title Exam Asset 63511 John Wiley & Cyber Threat!: How to Manage the Growing Risk of Cyber Attacks Sons 81639 Praeger Cyber Warfare: A Reference Handbook 62616 John Wiley & Cybercrime and Cyberwarfare Sons 69831 Jones and Cyberethics: Morality and Law in Cyberspace; Fifth Edition Bartlett Learning

69957 Springer Cyberpatterns: Unifying Design Patterns with Security and Attack Patterns 72721 John Wiley & Cybersecurity for Executives: A Practical Guide Sons 83473 IGI Global Cybersecurity Policies and Strategies for Cyberwarfare Prevention 74144 CRC Press Cyber-Security: Protecting Critical Infrastructures from Cyber Attack and Cyber Warfare

47165 Auerbach Cybersecurity: Public Sector Threats and Responses Publications 69065 IT Governance Cyberwar; Cyberterror; Cybercrime and Cyberactivism: An In-depth Guide to the Role of Security Standards in the Cybersecurity Environment. 2nd Edition 34419 IT Governance CyberWar; CyberTerror; CyberCrime: A Guide to the Role of Standards in an Environment of Change and Danger 69824 Jones and Cyberwarfare: Information Operations in a Connected World Bartlett Learning

45396 Cisco Press Data Center Fundamentals: Understand Data Center Network Design and Infrastructure Architecture; Including Load Balancing; SSL; and Security 26411 Auerbach Data Mining for Intelligence; Fraud & Criminal Detection: Advanced Analytics & Publications Information Sharing Technologies 47179 Auerbach Data Mining Tools for Malware Detection Publications 94352 IT Governance Data Protection and the Cloud: Are the Risks Too Great? 32112 Auerbach Data Protection: Governance; Risk Management; and Compliance Publications 76761 Springer Data Security Breaches and Privacy in Europe 62619 John Wiley & Data-Driven Security: Analysis; Visualization and Dashboards Sons 87659 Charles Robinson Defensive Programming in Android - Exercise: Accessing the Network 87583 Charles Robinson Defensive Programming in Android - Exercise: Code Defensively in Java 87633 Charles Robinson Defensive Programming in Android - Exercise: Creating Exceptions and Assertions Charles 87626 Robinson Defensive Programming in Android: Activity Instrumentation Charles 87582 Robinson Defensive Programming in Android: Altered Loop Variables Charles 87619 Robinson Defensive Programming in Android: Assertion Classes Charles 87629 Robinson Defensive Programming in Android: Assertion Overview Charles 87639 Robinson Defensive Programming in Android: Atomic and Nonatomic Charles 87596 Robinson Defensive Programming in Android: Avoiding Duplicated Code Charles 87569 Robinson Defensive Programming in Android: Best Practice Writing Methods

54 DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Exhibit 1 to Addendum 3

By Certification Cert Learning Product Title Exam Asset Charles 87655 Robinson Defensive Programming in Android: Caching Data Charles 87657 Robinson Defensive Programming in Android: Checking Network Connectivity Charles 87587 Robinson Defensive Programming in Android: Comments Charles 87637 Robinson Defensive Programming in Android: Comparing Objects Charles 87576 Robinson Defensive Programming in Android: Constants in Java Charles 87650 Robinson Defensive Programming in Android: Creating APKs Charles 87611 Robinson Defensive Programming in Android: Creating Custom Exception Classes Charles 87651 Robinson Defensive Programming in Android: Creating JARs Charles 87634 Robinson Defensive Programming in Android: Defensive Initialization Charles 87598 Robinson Defensive Programming in Android: Dependency Management with Gradle Charles 87597 Robinson Defensive Programming in Android: Dependency Management with Maven 87606 Charles Robinson Defensive Programming in Android: Design by Contract 87605 Charles Robinson Defensive Programming in Android: Design by Contract in Android Charles 87604 Robinson Defensive Programming in Android: Design By Contract in Java Charles 87612 Robinson Defensive Programming in Android: Displaying Errors in Apps Charles 87644 Robinson Defensive Programming in Android: Enum Constructors Charles 87646 Robinson Defensive Programming in Android: Enums and Abstract Methods Charles 87645 Robinson Defensive Programming in Android: Enums and Interfaces Charles 87625 Robinson Defensive Programming in Android: Espresso Test Classes Charles 87609 Robinson Defensive Programming in Android: Exception Stack Traces Charles 87581 Robinson Defensive Programming in Android: For Loops Charles 87570 Robinson Defensive Programming in Android: General Rules for Naming Methods Charles 87579 Robinson Defensive Programming in Android: If Statements Charles 87648 Robinson Defensive Programming in Android: Importing Packages Charles 87658 Robinson Defensive Programming in Android: Input and Output Encoding Charles 87617 Robinson Defensive Programming in Android: Instrumentation Charles 87630 Robinson Defensive Programming in Android: Java Assert Statements

55 DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Exhibit 1 to Addendum 3

By Certification Cert Learning Product Title Exam Asset Charles 87560 Robinson Defensive Programming in Android: Making Assumptions about User Input Charles 87620 Robinson Defensive Programming in Android: Mock Object Classes Charles 87641 Robinson Defensive Programming in Android: Mutable and Immutable Classes Charles 87572 Robinson Defensive Programming in Android: Naming Callback Methods Charles 87585 Robinson Defensive Programming in Android: Naming Classes in Java Charles 87577 Robinson Defensive Programming in Android: Naming Constants Charles 87571 Robinson Defensive Programming in Android: Naming Getter Methods Charles 87635 Robinson Defensive Programming in Android: Null Checking Charles 87574 Robinson Defensive Programming in Android: Overloading Methods Charles 87649 Robinson Defensive Programming in Android: Package Scopes Charles 87628 Robinson Defensive Programming in Android: Performing Actions Charles Defensive Programming in Android: Precondition; Postcondition; and Invariant 87631 Robinson Assertions Charles 87565 Robinson Defensive Programming in Android: Preventing Format String Attacks Charles 87568 Robinson Defensive Programming in Android: Preventing SQL Injection Attacks Charles 87654 Robinson Defensive Programming in Android: Progress Reporting Charles 87561 Robinson Defensive Programming in Android: Receiving File Input Data Charles 87562 Robinson Defensive Programming in Android: Receiving URL Input Data Charles 87595 Robinson Defensive Programming in Android: Refactoring Charles 87614 Robinson Defensive Programming in Android: Releasing Resources Charles 87578 Robinson Defensive Programming in Android: Resource Files Charles Defensive Programming in Android: Restricting WebView Navigation Based on User 87567 Robinson Input Charles 87621 Robinson Defensive Programming in Android: Running Tests Charles 87624 Robinson Defensive Programming in Android: Setting up the Android Testing Support API Charles 87573 Robinson Defensive Programming in Android: Simplifying App Code Using Method Naming Charles 87593 Robinson Defensive Programming in Android: Singularly Focused Classes Charles 87594 Robinson Defensive Programming in Android: Singularly Focused Methods

56 DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Exhibit 1 to Addendum 3

By Certification Cert Learning Product Title Exam Asset Charles 87600 Robinson Defensive Programming in Android: Specifying Contracts Using Comments Charles 87588 Robinson Defensive Programming in Android: SQLite Prepared Statements Charles 87638 Robinson Defensive Programming in Android: Switch and Case Statements Charles 87575 Robinson Defensive Programming in Android: Taking Advantage of Constants Charles 87589 Robinson Defensive Programming in Android: Taking advantage of Indentation and Whitespace Charles 87618 Robinson Defensive Programming in Android: Test Case Classes Charles 87610 Robinson Defensive Programming in Android: Testing For Errors Charles 87592 Robinson Defensive Programming in Android: The benefits of simple code Charles 87615 Robinson Defensive Programming in Android: The Benefits of Unit Testing Charles 87584 Robinson Defensive Programming in Android: The Benefits of Using Standards Charles 87640 Robinson Defensive Programming in Android: The Final Keyword Charles 87656 Robinson Defensive Programming in Android: Transferring Large Files Charles 87623 Robinson Defensive Programming in Android: UI Automation Testing Overview Charles 87627 Robinson Defensive Programming in Android: UI Components Charles 87599 Robinson Defensive Programming in Android: Understanding Design by Contract Charles 87607 Robinson Defensive Programming in Android: Understanding Errors and Exceptions Charles 87608 Robinson Defensive Programming in Android: Understanding Exception Classes Charles 87652 Robinson Defensive Programming in Android: User Experience During Network Access Charles 87632 Robinson Defensive Programming in Android: Using Annotations Defensively Charles 87653 Robinson Defensive Programming in Android: Using AsyncTask Charles 87642 Robinson Defensive Programming in Android: Using Basic Enums Charles 87643 Robinson Defensive Programming in Android: Using Enums for Defensive Programming Charles 87590 Robinson Defensive Programming in Android: Using Indentation Styles Charles 87647 Robinson Defensive Programming in Android: Using Packages and Classes Charles 87636 Robinson Defensive Programming in Android: Using Setters Charles 87616 Robinson Defensive Programming in Android: Using the Android JUnit Testing API

57 DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Exhibit 1 to Addendum 3

By Certification Cert Learning Product Title Exam Asset Charles 87591 Robinson Defensive Programming in Android: Using Whitespace Charles 87566 Robinson Defensive Programming in Android: Validating Input to a WebView Object Charles 87563 Robinson Defensive Programming in Android: Validating User Input Charles 87564 Robinson Defensive Programming in Android: Validating User Input in Real-time Charles 87586 Robinson Defensive Programming in Android: Variable Naming Charles 87580 Robinson Defensive Programming in Android: While Loops Charles 87603 Robinson Defensive Programming in Android: Working with Invariants Charles 87602 Robinson Defensive Programming in Android: Working with Postconditions Charles 87601 Robinson Defensive Programming in Android: Working with Preconditions Charles 87622 Robinson Defensive Programming in Android: Working with Test Results Charles 87613 Robinson Defensive Programming in Android: Working with Underlying Errors Defensive Programming in JavaScript and HTML5: Anticipating Errors in JavaScript 82775 Chuck Easttom and HTML5

82783 Chuck Easttom Defensive Programming in JavaScript and HTML5: APIs and Third-party Risks

82786 Chuck Easttom Defensive Programming in JavaScript and HTML5: Browser and Plugin Issues

82785 Chuck Easttom Defensive Programming in JavaScript and HTML5: Client Trust Issues and JavaScript

82776 Chuck Easttom Defensive Programming in JavaScript and HTML5: Creating Clean Testable Code Defensive Programming in JavaScript and HTML5: Cross-Browser Testing for 82762 Chuck Easttom JavaScript and HTML5 Defensive Programming in JavaScript and HTML5: Cross-Origin Resource Sharing and 82796 Chuck Easttom HTML5 Defensive Programming in JavaScript and HTML5: Cross-Origin Resource Sharing 82757 Chuck Easttom Policy Defensive Programming in JavaScript and HTML5: Cross-Site Scripting and Cross-Site 82778 Chuck Easttom Request Forgery Defensive Programming in JavaScript and HTML5: Defensible Methods in JavaScript 82765 Chuck Easttom and HTML5 Defensive Programming in JavaScript and HTML5: Defensive Coding for JavaScript 82754 Chuck Easttom and HTML5 Defensive Programming in JavaScript and HTML5: DOM Issues in JavaScript and 82777 Chuck Easttom HTML5 82782 Chuck Easttom Defensive Programming in JavaScript and HTML5: DOM Manipulation 82779 Chuck Easttom Defensive Programming in JavaScript and HTML5: DOM-based XSS Defensive Programming in JavaScript and HTML5: Error Codes and Messages in 82772 Chuck Easttom JavaScript and HTML5 Defensive Programming in JavaScript and HTML5: Error Handling in JavaScript and 82770 Chuck Easttom HTML5

58 DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Exhibit 1 to Addendum 3

By Certification Cert Learning Product Title Exam Asset

82758 Chuck Easttom Defensive Programming in JavaScript and HTML5: Event Handlers and Untrusted Data Defensive Programming in JavaScript and HTML5: Global Objects in JavaScript and 82773 Chuck Easttom HTML5 Defensive Programming in JavaScript and HTML5: Handling Errors Locally in 82774 Chuck Easttom JavaScript and HTML5 82797 Chuck Easttom Defensive Programming in JavaScript and HTML5: HTML5 Media Defensive Programming in JavaScript and HTML5: If and Switch Statements in 82769 Chuck Easttom JavaScript and HTML5 Defensive Programming in JavaScript and HTML5: Information and Trust Issues in 82781 Chuck Easttom JavaScript and HTML5 82791 Chuck Easttom Defensive Programming in JavaScript and HTML5: Introduction to JSON 82761 Chuck Easttom Defensive Programming in JavaScript and HTML5: Introduction to Testing 82784 Chuck Easttom Defensive Programming in JavaScript and HTML5: JavaScript and CSS 82794 Chuck Easttom Defensive Programming in JavaScript and HTML5: JSON Data and Eval 82793 Chuck Easttom Defensive Programming in JavaScript and HTML5: JSON Input Validation 82792 Chuck Easttom Defensive Programming in JavaScript and HTML5: JSON Risks Defensive Programming in JavaScript and HTML5: Parameters and Return Values in 82766 Chuck Easttom JavaScript and HTML5 Defensive Programming in JavaScript and HTML5: Potential Software Risks in 82752 Chuck Easttom JavaScript and HTML5 Defensive Programming in JavaScript and HTML5: Preventive Planning in JavaScript 82755 Chuck Easttom and HTML5

82787 Chuck Easttom Defensive Programming in JavaScript and HTML5: Sandbox Implementation Risks

82800 Chuck Easttom Defensive Programming in JavaScript and HTML5: Securing HTML5 Elements

82801 Chuck Easttom Defensive Programming in JavaScript and HTML5: Securing JavaScript and HTML5

82789 Chuck Easttom Defensive Programming in JavaScript and HTML5: Securing JavaScript Code Defensive Programming in JavaScript and HTML5: Securing Web Messaging in 82760 Chuck Easttom JavaScript and HTML5 Defensive Programming in JavaScript and HTML5: Securing Web Storage in 82759 Chuck Easttom JavaScript and HTML5 82780 Chuck Easttom Defensive Programming in JavaScript and HTML5: Social Jacking

82788 Chuck Easttom Defensive Programming in JavaScript and HTML5: SVG Exploits and JavaScript Defensive Programming in JavaScript and HTML5: Unit Tests for JavaScript and 82764 Chuck Easttom HTML5 Defensive Programming in JavaScript and HTML5: Using Escape in HTML5 and 82756 Chuck Easttom JavaScript Defensive Programming in JavaScript and HTML5: Using Null Values in JavaScript and 82768 Chuck Easttom HTML5 Defensive Programming in JavaScript and HTML5: Utilizing Exceptions in JavaScript 82771 Chuck Easttom and HTML5

82767 Chuck Easttom Defensive Programming in JavaScript and HTML5: Variables in JavaScript and HTML5 82798 Chuck Easttom Defensive Programming in JavaScript and HTML5: Web Workers and HTML5 Defensive Programming in JavaScript and HTML5: Why Do Risks Exist in JavaScript 82753 Chuck Easttom and HTML5?

59 DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Exhibit 1 to Addendum 3

By Certification Cert Learning Product Title Exam Asset Defensive Programming in JavaScript and HTML5: Writing Testable Code for 82763 Chuck Easttom JavaScript and HTML5 37223 Butterworth- Design and Evaluation of Physical Protection Systems; Second Edition Heinemann 77367 Syngress Designing and Building a Security Operations Center Publishing 9147 John Wiley & Designing Security Architecture Solutions Sons 77365 Syngress Detecting and Combating Malicious Email Publishing 51921 Auerbach Digital Forensics for Handheld Devices Publications 41850 Syngress Digital Forensics with Open Source Tools Publishing 49592 Blackwell Digital Media Law; Second Edition 66997 Butterworth- Digital Video Surveillance and Security; Second Edition Heinemann 37207 Morgan Disappearing Cryptography: Information Hiding: Steganography & Watermarking; Third Kaufmann Edition Publishers 76755 Springer Disclosure of Security Vulnerabilities 76690 Springer Distributed Denial of Service Attack and Defense 61772 Auerbach Doing Security: The Discipline of Information Security Management Publications 32202 Syngress E-discovery: Creating and Managing an Enterprisewide Program: A Technical Guide to Publishing Digital Investigation and Litigation Support 47324 Syngress Effective Physical Security; Fourth Edition Publishing 76763 Springer Electronic Identity 92022 Jones and Elementary Information Security; 2nd edition Bartlett Learning

58863 Syngress Eleventh Hour CISSP: Study Guide; Second Edition Publishing 56009 IT Governance Email Security: A Pocket Guide 67007 Morgan Emerging Trends in ICT Security Kaufmann Publishers 60621 IGI Global Enabling the New Era of Cloud Computing: Data Security; Transfer; and Management

76712 Springer Energy-Efficient Area Coverage for Intruder Detection in Sensor Networks 90755 Apress Enterprise Cybersecurity: How to Build a Successful Cyberdefense Program Against Advanced Threats 39339 IGI Global Enterprise IT Governance; Business Value and Performance Measurement 35387 Apress Enterprise Mac Security: Mac OS X Snow Leopard 69625 EMC Envisioning Precise Risk Models Through Big Data Analytics Essentials of Developing Windows Store Apps Using C#: Deploying an App for the 63176 Andy Alfred Enterprise Essentials of Developing Windows Store Apps Using C#: How the 63169 Andy Alfred WebAuthenticationBroker works Essentials of Developing Windows Store Apps Using C#: How Web Authentication 63171 Andy Alfred Broker in Single Sign on mode

60 DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Exhibit 1 to Addendum 3

By Certification Cert Learning Product Title Exam Asset Essentials of Developing Windows Store Apps Using C#: Storing and Retrieving User 63146 Andy Alfred Credentials Essentials of Developing Windows Store Apps Using C#: The Application Tab in 63148 Andy Alfred Manifest Designer Essentials of Developing Windows Store Apps Using C#: The Capabilities Tab in 63150 Andy Alfred Manifest Designer Essentials of Developing Windows Store Apps Using C#: The Content URIs Tab in 63152 Andy Alfred Manifest Designer Essentials of Developing Windows Store Apps Using C#: The Declarations Tab in 63151 Andy Alfred Manifest Designer Essentials of Developing Windows Store Apps Using C#: The Packaging Tab in 63153 Andy Alfred Manifest Designer Essentials of Developing Windows Store Apps Using C#: The Visual Assets Tab in 63149 Andy Alfred Manifest Designer Essentials of Developing Windows Store Apps Using C#: Understanding Certification 63136 Andy Alfred and Submission Essentials of Developing Windows Store Apps Using C#: Understanding the 63135 Andy Alfred Windows.Security.Web namespace Essentials of Developing Windows Store Apps Using C#: Using the 63172 Andy Alfred WebAuthenticationBroker in Single Sign on (sso) Mode Essentials of Developing Windows Store Apps Using C#: Using the 63170 Andy Alfred WebAuthenticationBroker to connect to an online identity provider Essentials of Developing Windows Store Apps Using C#: Windows Store App 63177 Andy Alfred Certification Requirements Essentials of Developing Windows Store Apps Using C#: Working with the Package 63147 Andy Alfred Manifest in Visual Studio 2013 Essentials of Developing Windows Store Apps Using C#: Working with User 63134 Andy Alfred Credentials 61791 Auerbach Ethical Hacking and Penetration Testing Guide Publications 8306 John Wiley & Firewalls For Dummies; 2nd Edition Sons 82437 John Wiley & Forensic Radio Survey Techniques for Cell Site Analysis Sons (UK)

83137 Jamie Campbell Foundations of iOS Security: Attacking User Passcodes

83165 Jamie Campbell Foundations of iOS Security: Carrying Out a Fuzz Test

83149 Jamie Campbell Foundations of iOS Security: Collecting and Verifying Signing Information 83159 Wesley Miller Foundations of iOS Security: Creating a Configuration Profile 78946 Wesley Miller Foundations of iOS Security: Displaying iOS Signing Info and Entitlements

83150 Jamie Campbell Foundations of iOS Security: Enforcing Signatures on Processes

83163 Wesley Miller Foundations of iOS Security: Enrolling Devices by Downloading Enrollment Profiles

83162 Wesley Miller Foundations of iOS Security: Enrolling Devices using Profile Manager Web Portal

83167 Jamie Campbell Foundations of iOS Security: Exploiting Bug Classes 83166 Wesley Miller Foundations of iOS Security: Fuzzing MobileSafari 78947 Wesley Miller Foundations of iOS Security: Fuzzing Safari

61 DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Exhibit 1 to Addendum 3

By Certification Cert Learning Product Title Exam Asset 83147 Wesley Miller Foundations of iOS Security: Getting Familiar with Application Signing

83134 Jamie Campbell Foundations of iOS Security: Getting Familiar with File Protection Classes

83136 Jamie Campbell Foundations of iOS Security: Getting Familiar with Keybags

83135 Jamie Campbell Foundations of iOS Security: Getting Familiar with Keychain Protection Classes

83133 Jamie Campbell Foundations of iOS Security: Getting Familiar with the Data Protection API 83148 Wesley Miller Foundations of iOS Security: Listing Application Entitlements

83128 Jamie Campbell Foundations of iOS Security: Overview of Apple Store Security

83144 Jamie Campbell Foundations of iOS Security: Overview of Code Signing in iOS

83164 Jamie Campbell Foundations of iOS Security: Overview of Fuzzing iOS Applications

83153 Jamie Campbell Foundations of iOS Security: Overview of iOS Sandbox

83170 Jamie Campbell Foundations of iOS Security: Overview of Return-Oriented Programming 83138 Wesley Miller Foundations of iOS Security: Overview on iOS Network Security

83151 Jamie Campbell Foundations of iOS Security: Preventing Changes on Signed Pages

83132 Jamie Campbell Foundations of iOS Security: Protecting Processes and Code Segments 83161 Wesley Miller Foundations of iOS Security: Setting Up the OS X Server Profile Manager

83152 Jamie Campbell Foundations of iOS Security: Understanding Dynamic Code Signing

83156 Jamie Campbell Foundations of iOS Security: Understanding How Sandboxing Impacts the App Store

83130 Jamie Campbell Foundations of iOS Security: Understanding iOS Attack Surface

83129 Jamie Campbell Foundations of iOS Security: Understanding Possible Security Threats

83146 Jamie Campbell Foundations of iOS Security: Understanding Provisioning

83154 Wesley Miller Foundations of iOS Security: Understanding Sandboxing and Runtime Security 83155 Wesley Miller Foundations of iOS Security: Understanding Sandboxing with Extensions

83169 Jamie Campbell Foundations of iOS Security: Understanding TCMalloc

83171 Jamie Campbell Foundations of iOS Security: Understanding the ARM Systems Call Convention

83172 Jamie Campbell Foundations of iOS Security: Understanding the iOS ARM Calling Convention

83168 Jamie Campbell Foundations of iOS Security: Understanding the iOS System Allocator

83145 Jamie Campbell Foundations of iOS Security: Understanding the Mandatory Access Control Framework 83160 Wesley Miller Foundations of iOS Security: Updating and Removing Configuration Profiles

83131 Jamie Campbell Foundations of iOS Security: Using Code Signing and Data Execution Prevention

62 DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Exhibit 1 to Addendum 3

By Certification Cert Learning Product Title Exam Asset 83143 Wesley Miller Foundations of iOS Security: Working with AirDrop Security 83141 Wesley Miller Foundations of iOS Security: Working with Bluetooth Connections

83157 Jamie Campbell Foundations of iOS Security: Working with Mobile Configuration Profiles 83142 Wesley Miller Foundations of iOS Security: Working with Single Sign-on Authentication

83158 Jamie Campbell Foundations of iOS Security: Working with the Apple Configurator 83139 Wesley Miller Foundations of iOS Security: Working with Virtual Private Networks 83140 Wesley Miller Foundations of iOS Security: Working with Wi-Fi Networks 25530 Apress Foundations of Security: What Every Programmer Needs to Know 69815 Jones and Fundamentals of Information Systems Security; Second Edition Bartlett Learning

27206 Artech House Fuzzing for Software Security Testing and Quality Assurance 6922 Premier Press Getting Started with HIPAA 40278 Emereo GIAC Security Leadership Certification (GSLC) Exam Preparation: The How To Pass Publishing on Your First Try Certification Study Guide 77761 Syngress Google Earth Forensics: Using Google Earth Geo-Location in Digital Forensic Publishing Investigations 32363 Syngress Google Hacking for Penetration Testers; Volume 2 Publishing 53292 IT Governance Governance and Internal Controls for Cutting Edge IT 35790 IGI Global Governance of Picture Archiving and Communications Systems: Data Security and Quality Management of Filmless Radiology 74150 Auerbach Governance; Risk; and Compliance for PKI Operations Publications 77172 McGraw- Gray Hat Hacking The Ethical Hacker's Handbook; Fourth Edition Hill/Osborne 31690 No Starch Press Gray Hat Python: Python Programming for Hackers and Reverse Engineers

51310 Sybex Group Policy: Fundamentals; Security; and the Managed Desktop; Second Edition

59129 McGraw- GSEC GIAC Security Essentials Certification All-in-One Exam Guide Hill/Osborne 76971 Springer Guide to Computer Network Security; Second Edition 16135 Syngress Hack the Stack: Using Snort and Ethereal to Master the 8 Layers of an Insecure Publishing Network 69818 Jones and Hacker Techniques; Tools; and Incident Handling; Second Edition Bartlett Learning

78669 Syngress Hacking and Penetration Testing with Low Power Devices Publishing 72523 McGraw- Hacking Exposed Computer Forensics; Second Edition Hill/Osborne 59135 McGraw- Hacking Exposed Unified Communications & VoIP Security Secrets & Solutions; Hill/Osborne Second Edition 86041 McGraw- Hacking Exposed Wireless: Wireless Security Secrets & Solutions; Third Edition Hill/Osborne 34819 John Wiley & Hacking For Dummies; 3rd Edition Sons 62640 John Wiley & Hacking Point of Sale: Payment Application Secrets; Threats; and Solutions Sons

63 DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Exhibit 1 to Addendum 3

By Certification Cert Learning Product Title Exam Asset 29434 No Starch Press Hacking VoIP: Protocols; Attacks; and Countermeasures

88814 Syngress Hacking Web Intelligence: Open Source Intelligence and Web Reconnaissance Publishing Concepts and Techniques 26193 Cengage Charles Hacking Web Services River Media

76765 Springer Handbook of Biometric Anti-Spoofing: Trusted Biometrics Under Spoofing Attacks

47356 Butterworth- Handbook of Loss Prevention and Crime Prevention; Fifth Edition Heinemann 91935 IGI Global Handbook of Research on Civil Society and National Security in the Era of Cyber Warfare 73011 IGI Global Handbook of Research on Digital Crime; Cyberspace Security; and Information Assurance 28382 IGI Global Handbook of Research on Information Security and Assurance 83467 IGI Global Handbook of Research on Redesigning the Future of Internet Architectures 83472 IGI Global Handbook of Research on Security Considerations in Cloud Computing 73013 IGI Global Handbook of Research on Threat Detection and Countermeasures in Network Security

18658 IGI Global Handbook of Research on Wireless Security 51922 Auerbach Handbook of Surveillance Technologies; Third Edition Publications 77173 McGraw- Healthcare Information Security and Privacy Hill/Osborne 30962 Springer High Availability and Disaster Recovery: Concepts; Design; Implementation 67003 Morgan High-Performance Embedded Computing; Second Edition: Applications in Cyber- Kaufmann Physical Systems and Mobile Computing Publishers 51966 Auerbach HIPAA and PCI Audits: Secrets to Getting GREAT Results Publications 81726 Butterworth- Hospital and Healthcare Security; Sixth Edition Heinemann 26431 Auerbach How to Achieve 27001 Certification: An Example of Applied Compliance Management Publications 78765 Syngress How to Attack and Defend Your Website Publishing 25455 Syngress How to Cheat at Configuring Open Source Security Tools Publishing 25450 Syngress How to Cheat at VoIP Security Publishing 30507 Auerbach How to Complete a Risk Assessment in 5 Days or Less Publications 78689 Syngress How to Defeat Advanced Malware: New Tools for Protection and Forensics Publishing 78688 Syngress How to Define and Build an Effective Cyber Threat Intelligence Capability Publishing 26432 Auerbach How to Develop and Implement a Security Master Plan Publications 52006 Auerbach Identity in a Digital World: What It Is and How to Protect It Publications 101143 Michael Shannon IINS: 802.1Q and Inter-VLAN Routing 101142 Michael Shannon IINS: 802.1Q Tagging

64 DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Exhibit 1 to Addendum 3

By Certification Cert Learning Product Title Exam Asset 104442 Michael Shannon IINS: 802.1X Authentication and Authorization 104440 Michael Shannon IINS: 802.1X Components 104441 Michael Shannon IINS: 802.1X Message Flow 101042 Michael Shannon IINS: AAA Protocols 101044 Michael Shannon IINS: AAA Servers 101149 Michael Shannon IINS: ACL Examples (Part 1) 101150 Michael Shannon IINS: ACL Examples (Part 2) 101151 Michael Shannon IINS: ACL Examples (Part 3) 101148 Michael Shannon IINS: ACL Overview 101152 Michael Shannon IINS: ACLs on Switches 100724 Michael Shannon IINS: Advanced Persistent Threats 101360 Michael Shannon IINS: Antispyware Software 101359 Michael Shannon IINS: Antivirus Software 101157 Michael Shannon IINS: ARP Cache Poisoning 101184 Michael Shannon IINS: ARP Overview 100910 Michael Shannon IINS: Assets; Vulnerabilities; Threats 100943 Michael Shannon IINS: Asymmetric Encryption Algorithms 101075 Michael Shannon IINS: Authenticating Routing Protocols (Part 1) 101076 Michael Shannon IINS: Authenticating Routing Protocols (Part 2) 101271 Michael Shannon IINS: Authentication 101335 Michael Shannon IINS: Authentication in Basic Clientless SSL VPN 100953 Michael Shannon IINS: Authentication Using Certificates 101050 Michael Shannon IINS: Authentication Using External Servers 100945 Michael Shannon IINS: Authentication with Asymmetric Encryption 101040 Michael Shannon IINS: Authentication; Authorization; and Accounting (AAA) 101049 Michael Shannon IINS: Authorization with Role-based CLI 101070 Michael Shannon IINS: Banner Messages 101337 Michael Shannon IINS: Basic Access Control Using Web ACLs 101322 Michael Shannon IINS: Basic AnyConnect SSL VPN Configuration Tasks 101317 Michael Shannon IINS: Basic Cisco AnyConnect SSL VPN 101334 Michael Shannon IINS: Basic Cisco Clientless SSL VPN 101338 Michael Shannon IINS: Basic Clientless SSL VPN Configuration Tasks 101349 Michael Shannon IINS: Blacklisting; AMP; and IPS 100720 Michael Shannon IINS: Buffer Overflow Attacks 101269 Michael Shannon IINS: Bulk Encryption Algorithms 104444 Michael Shannon IINS: BYOD Onboarding 101261 Michael Shannon IINS: C3PL Configuration Procedure 101147 Michael Shannon IINS: CDP 100952 Michael Shannon IINS: Certificate Enrollment 100954 Michael Shannon IINS: Certificate Revocation and Revocation Checks 101364 Michael Shannon IINS: Cisco AMP for Endpoints 101365 Michael Shannon IINS: Cisco AMP for Endpoints Components 101361 Michael Shannon IINS: Cisco AnyConnect Secure Mobility Client v4.0 101318 Michael Shannon IINS: Cisco AnyConnect SSL VPN Solution Components

65 DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Exhibit 1 to Addendum 3

By Certification Cert Learning Product Title Exam Asset 101207 Michael Shannon IINS: Cisco ASA 5500-X Platforms 101209 Michael Shannon IINS: Cisco ASA Firewall Features 101239 Michael Shannon IINS: Cisco ASA Modular Policy Framework Overview 101362 Michael Shannon IINS: Cisco ASA Posture Module 101319 Michael Shannon IINS: Cisco ASA SSL Server Authentication 101208 Michael Shannon IINS: Cisco ASAv Virtual Adaptive Security Appliance 101330 Michael Shannon IINS: Cisco Clientless SSL VPN 101332 Michael Shannon IINS: Cisco Clientless SSL VPN Resource Access Methods 101331 Michael Shannon IINS: Cisco Clientless SSL VPN Use Cases 101378 Michael Shannon IINS: Cisco Cloud Web Security Features and Benefits 101366 Michael Shannon IINS: Cisco Collective Security Intelligence Cloud 101252 Michael Shannon IINS: Cisco Common Classification Policy Language 101377 Michael Shannon IINS: Cisco CWS Overview 101369 Michael Shannon IINS: Cisco ESA GUI Management 101347 Michael Shannon IINS: Cisco FireSIGHT Capabilities 101249 Michael Shannon IINS: Cisco IOS Zone-based Policy Firewall 101363 Michael Shannon IINS: Cisco ISE Posture Module 104452 Michael Shannon IINS: Cisco TrustSec Benefits 104445 Michael Shannon IINS: Cisco TrustSec Overview 101373 Michael Shannon IINS: Cisco WSA Access Policies 101374 Michael Shannon IINS: Cisco WSA Data Security Enforcement 101376 Michael Shannon IINS: Cisco WSA GUI Management 101375 Michael Shannon IINS: Cisco WSA Management and Reporting Capabilities 101372 Michael Shannon IINS: Cisco WSA Overview 101255 Michael Shannon IINS: Class Map Considerations 100912 Michael Shannon IINS: Classifying Assets 100914 Michael Shannon IINS: Classifying Countermeasures 100913 Michael Shannon IINS: Classifying Vulnerabilities 101333 Michael Shannon IINS: Clientless SSL VPN Portal 101336 Michael Shannon IINS: Clientless SSL VPN URL Entry and Bookmarks 100938 Michael Shannon IINS: Comparing Hashing Algorithms 100942 Michael Shannon IINS: Comparing Symmetric Encryption Algorithms 101045 Michael Shannon IINS: Comparison of ACS and ISE 100919 Michael Shannon IINS: Compliance Regulations 100926 Michael Shannon IINS: Components of a Comprehensive Security Policy 100944 Michael Shannon IINS: Confidentiality with Asymmetric Encryption 101064 Michael Shannon IINS: Configuration Management Protocol Options 101240 Michael Shannon IINS: Configuration Tasks 101223 Michael Shannon IINS: Configure Dynamic NAT on Cisco ASA 101233 Michael Shannon IINS: Configure Interface Access Rules (Part 1) 101234 Michael Shannon IINS: Configure Interface Access Rules (Part 2) 101235 Michael Shannon IINS: Configure Interface Access Rules (Part 3) 101299 Michael Shannon IINS: Configure IPsec Crypto Maps 101224 Michael Shannon IINS: Configure PAT on Cisco ASA

66 DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Exhibit 1 to Addendum 3

By Certification Cert Learning Product Title Exam Asset 101225 Michael Shannon IINS: Configure Policy NAT on Cisco ASA 101222 Michael Shannon IINS: Configure Static NAT on Cisco ASA 101298 Michael Shannon IINS: Configure Symmetric Peer Crypto ACLs 101294 Michael Shannon IINS: Configure Transform Sets 101215 Michael Shannon IINS: Configuring Cisco ASA Interface Parameters 101159 Michael Shannon IINS: Configuring Port Security (Part 1) 101160 Michael Shannon IINS: Configuring Port Security (Part 2) 101290 Michael Shannon IINS: Configuring Site-to-Site IPsec VPN 101304 Michael Shannon IINS: Configuring Site-to-Site VPN on Cisco ASA 101046 Michael Shannon IINS: Configuring SSH Access to an IOS Device 101352 Michael Shannon IINS: Connection Data and Summaries 101355 Michael Shannon IINS: Considerations for Sensor Placement in the Network 104437 Michael Shannon IINS: Context-aware Policy Enforcement Options 101072 Michael Shannon IINS: Control Plane Policing 101073 Michael Shannon IINS: Control Plane Protection (Part 1) 101074 Michael Shannon IINS: Control Plane Protection (Part 2) 101237 Michael Shannon IINS: Create a Service Object Group 101241 Michael Shannon IINS: Create a Service Policy Rule 101297 Michael Shannon IINS: Create Crypto ACLs Using Extended ACLs 100940 Michael Shannon IINS: Cryptanalysis 101296 Michael Shannon IINS: Crypto ACL Function 101272 Michael Shannon IINS: Cryptographic Algorithms in Ipsec 100937 Michael Shannon IINS: Cryptographic Authentication Use Case 100936 Michael Shannon IINS: Cryptographic Authentication Using Hash Technology 101267 Michael Shannon IINS: Cryptographic VPNs 100933 Michael Shannon IINS: Cryptology Overview 101185 Michael Shannon IINS: DAI in Action 101270 Michael Shannon IINS: Data Integrity 100714 Michael Shannon IINS: DDoS Attacks 100921 Michael Shannon IINS: Defense in Depth 100923 Michael Shannon IINS: Defense in Depth: Artichoke 100922 Michael Shannon IINS: Defense in Depth: Onion 101182 Michael Shannon IINS: DHCP Attacks – DHCP Starvation 101181 Michael Shannon IINS: DHCP Overview 101183 Michael Shannon IINS: DHCP Snooping 100947 Michael Shannon IINS: Digital Signature Process 101054 Michael Shannon IINS: Digitally Signed Images 101099 Michael Shannon IINS: Discovery 1: Cryptographic Technologies (Part 1) 101100 Michael Shannon IINS: Discovery 1: Cryptographic Technologies (Part 2) 101101 Michael Shannon IINS: Discovery 1: Cryptographic Technologies (Part 3) 101102 Michael Shannon IINS: Discovery 1: Cryptographic Technologies (Part 4) 101103 Michael Shannon IINS: Discovery 1: Cryptographic Technologies (Part 5) 101242 Michael Shannon IINS: Discovery 10: Access Control Using the ASA (Part 1) 101243 Michael Shannon IINS: Discovery 10: Access Control Using the ASA (Part 2)

67 DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Exhibit 1 to Addendum 3

By Certification Cert Learning Product Title Exam Asset 101244 Michael Shannon IINS: Discovery 10: Access Control Using the ASA (Part 3) 101245 Michael Shannon IINS: Discovery 10: Access Control Using the ASA (Part 4) 101246 Michael Shannon IINS: Discovery 10: Access Control Using the ASA (Part 5) 101247 Michael Shannon IINS: Discovery 10: Access Control Using the ASA (Part 6) 101248 Michael Shannon IINS: Discovery 10: Access Control Using the ASA (Part 7) 101264 Michael Shannon IINS: Discovery 11: Cisco IOS Zone-based Firewall (Part 1) 101265 Michael Shannon IINS: Discovery 11: Cisco IOS Zone-based Firewall (Part 2) 101266 Michael Shannon IINS: Discovery 11: Cisco IOS Zone-based Firewall (Part 3) 101286 Michael Shannon IINS: Discovery 12: Explore IPsec Technologies (Part 1) 101287 Michael Shannon IINS: Discovery 12: Explore IPsec Technologies (Part 2) 101288 Michael Shannon IINS: Discovery 12: Explore IPsec Technologies (Part 3) 101306 Michael Shannon IINS: Discovery 13: IOS-based Site-to-Site VPN (Part 1) 101307 Michael Shannon IINS: Discovery 13: IOS-based Site-to-Site VPN (Part 2) 101308 Michael Shannon IINS: Discovery 13: IOS-based Site-to-Site VPN (Part 3) 101309 Michael Shannon IINS: Discovery 13: IOS-based Site-to-Site VPN (Part 4) 101310 Michael Shannon IINS: Discovery 14: ASA-based Site-to-Site VPN (Part 1) 101311 Michael Shannon IINS: Discovery 14: ASA-based Site-to-Site VPN (Part 2) 101312 Michael Shannon IINS: Discovery 14: ASA-based Site-to-Site VPN (Part 3) 101313 Michael Shannon IINS: Discovery 14: ASA-based Site-to-Site VPN (Part 4) 101314 Michael Shannon IINS: Discovery 14: ASA-based Site-to-Site VPN (Part 5) 101323 Michael Shannon IINS: Discovery 15: Remote Access VPN (Part 1) 101324 Michael Shannon IINS: Discovery 15: Remote Access VPN (Part 2) 101325 Michael Shannon IINS: Discovery 15: Remote Access VPN (Part 3) 101326 Michael Shannon IINS: Discovery 15: Remote Access VPN (Part 4) 101327 Michael Shannon IINS: Discovery 15: Remote Access VPN (Part 5) 101328 Michael Shannon IINS: Discovery 15: Remote Access VPN (Part 6) 101329 Michael Shannon IINS: Discovery 15: Remote Access VPN (Part 7) 101339 Michael Shannon IINS: Discovery 16: Clientless Remote Access VPN (Part 1) 101340 Michael Shannon IINS: Discovery 16: Clientless Remote Access VPN (Part 2) 101341 Michael Shannon IINS: Discovery 16: Clientless Remote Access VPN (Part 3) 101104 Michael Shannon IINS: Discovery 2: Configure and Verify AAA (Part 1) 101105 Michael Shannon IINS: Discovery 2: Configure and Verify AAA (Part 2) 101106 Michael Shannon IINS: Discovery 2: Configure and Verify AAA (Part 3) 101107 Michael Shannon IINS: Discovery 2: Configure and Verify AAA (Part 3) 101108 Michael Shannon IINS: Discovery 2: Configure and Verify AAA (Part 5) 101109 Michael Shannon IINS: Discovery 3: Configure Management Protocols (Part 1) 101110 Michael Shannon IINS: Discovery 3: Configure Management Protocols (Part 2) 101111 Michael Shannon IINS: Discovery 3: Configure Management Protocols (Part 3) 101112 Michael Shannon IINS: Discovery 3: Configure Management Protocols (Part 4) 101113 Michael Shannon IINS: Discovery 3: Configure Management Protocols (Part 5) 101114 Michael Shannon IINS: Discovery 3: Configure Management Protocols (Part 6) 101115 Michael Shannon IINS: Discovery 4: Securing Routing Protocols (Part 1) 101116 Michael Shannon IINS: Discovery 4: Securing Routing Protocols (Part 2) 101117 Michael Shannon IINS: Discovery 4: Securing Routing Protocols (Part 3)

68 DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Exhibit 1 to Addendum 3

By Certification Cert Learning Product Title Exam Asset 101118 Michael Shannon IINS: Discovery 4: Securing Routing Protocols (Part 4) 101119 Michael Shannon IINS: Discovery 4: Securing Routing Protocols (Part 5) 101120 Michael Shannon IINS: Discovery 4: Securing Routing Protocols (Part 6) 101168 Michael Shannon IINS: Discovery 5: VLAN Security and ACLs (Part 1) 101169 Michael Shannon IINS: Discovery 5: VLAN Security and ACLs (Part 2) 101170 Michael Shannon IINS: Discovery 5: VLAN Security and ACLs (Part 3) 101171 Michael Shannon IINS: Discovery 5: VLAN Security and ACLs (Part 4) 101172 Michael Shannon IINS: Discovery 5: VLAN Security and ACLs (Part 5) 101173 Michael Shannon IINS: Discovery 5: VLAN Security and ACLs (Part 6) 101174 Michael Shannon IINS: Discovery 6: Port Security and PVLAN Edge (Part 1) 101175 Michael Shannon IINS: Discovery 6: Port Security and PVLAN Edge (Part 2) 101176 Michael Shannon IINS: Discovery 6: Port Security and PVLAN Edge (Part 3) 101177 Michael Shannon IINS: Discovery 6: Port Security and PVLAN Edge (Part 4) 101186 Michael Shannon IINS: Discovery 7: Securing DHCP; ARP; and STP (Part 1) 101187 Michael Shannon IINS: Discovery 7: Securing DHCP; ARP; and STP (Part 2) 101188 Michael Shannon IINS: Discovery 7: Securing DHCP; ARP; and STP (Part 3) 101189 Michael Shannon IINS: Discovery 7: Securing DHCP; ARP; and STP (Part 4) 101199 Michael Shannon IINS: Discovery 8: Explore Firewall Technologies (Part 1) 101200 Michael Shannon IINS: Discovery 8: Explore Firewall Technologies (Part 2) 101201 Michael Shannon IINS: Discovery 8: Explore Firewall Technologies (Part 3) 101202 Michael Shannon IINS: Discovery 8: Explore Firewall Technologies (Part 4) 101203 Michael Shannon IINS: Discovery 8: Explore Firewall Technologies (Part 5) 101204 Michael Shannon IINS: Discovery 8: Explore Firewall Technologies (Part 6) 101205 Michael Shannon IINS: Discovery 8: Explore Firewall Technologies (Part 7) 101206 Michael Shannon IINS: Discovery 8: Explore Firewall Technologies (Part 8) 101227 Michael Shannon IINS: Discovery 9: Cisco ASA Interfaces and NAT (Part 1) 101228 Michael Shannon IINS: Discovery 9: Cisco ASA Interfaces and NAT (Part 2) 101229 Michael Shannon IINS: Discovery 9: Cisco ASA Interfaces and NAT (Part 3) 101230 Michael Shannon IINS: Discovery 9: Cisco ASA Interfaces and NAT (Part 4) 101231 Michael Shannon IINS: Discovery 9: Cisco ASA Interfaces and NAT (Part 5) 101145 Michael Shannon IINS: Double-tagging VLAN Hopping Attack 101351 Michael Shannon IINS: Dynamic File Analysis 101078 Michael Shannon IINS: EIGRP Route Authentication Process 101368 Michael Shannon IINS: E-mail Message Flow 101367 Michael Shannon IINS: E-mail Security Threats 101357 Michael Shannon IINS: Endpoint Security Overview 104450 Michael Shannon IINS: Enforcement Using SGACLs 104451 Michael Shannon IINS: Enforcement Using SGFW 101291 Michael Shannon IINS: Ensure That ACLs Are Compatible with IPsec 101279 Michael Shannon IINS: ESP 101136 Michael Shannon IINS: Ethernet Switching Overview 101379 Michael Shannon IINS: Example Modular Network Architecture for Enterprise 101067 Michael Shannon IINS: Example SNMP v3 Configuration 101062 Michael Shannon IINS: Example Syslog Configuration

69 DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Exhibit 1 to Addendum 3

By Certification Cert Learning Product Title Exam Asset 101350 Michael Shannon IINS: FireSIGHT Discovery and Awareness 101191 Michael Shannon IINS: Firewall Characteristics 100728 Michael Shannon IINS: Firewall Overview 101190 Michael Shannon IINS: Firewalls and Security Zones 101043 Michael Shannon IINS: Functional Differences between RADIUS and TACACS+ 100726 Michael Shannon IINS: Hacking Tools 100935 Michael Shannon IINS: Hashing Use Case 101253 Michael Shannon IINS: Hierarchical Policies 101212 Michael Shannon IINS: High Availability; Failover; and Clustering 101065 Michael Shannon IINS: HTTPS Configuration and Operation 101381 Michael Shannon IINS: Identity Management Overview 101345 Michael Shannon IINS: IDS and IPS Actions 101274 Michael Shannon IINS: IKE Phase 1 101275 Michael Shannon IINS: IKE Phase 1: First Exchange 101276 Michael Shannon IINS: IKE Phase 1: Second Exchange 101277 Michael Shannon IINS: IKE Phase 1: Third Exchange 101281 Michael Shannon IINS: IKE Phase 2 101292 Michael Shannon IINS: IKE Policy Negotiation 101284 Michael Shannon IINS: IKE Version 2 101048 Michael Shannon IINS: Implementing Local Authentication and Authorization 101370 Michael Shannon IINS: Incoming Mail Processing Overview 104448 Michael Shannon IINS: Inline SGT Transport 100930 Michael Shannon IINS: Inside; Outside; and DMZ 101232 Michael Shannon IINS: Interface Access Rules 101217 Michael Shannon IINS: Interface Configuration 101273 Michael Shannon IINS: Internet Key Exchange 100931 Michael Shannon IINS: Intranet; Extranet; and Internet 101055 Michael Shannon IINS: IOS Resilient Configuration 101262 Michael Shannon IINS: IOS Zone-based Firewall Configuration (Part 1) 101263 Michael Shannon IINS: IOS Zone-based Firewall Configuration (Part 2) 100731 Michael Shannon IINS: IPS Functionality 100730 Michael Shannon IINS: IPS Overview 101342 Michael Shannon IINS: IPS vs. IDS 101282 Michael Shannon IINS: IPsec Configuration 101285 Michael Shannon IINS: IPsec For IPv6 101278 Michael Shannon IINS: IPsec Protocols 101268 Michael Shannon IINS: IPsec Security Services 101305 Michael Shannon IINS: IPsec Site-to-Site VPN Wizard 104439 Michael Shannon IINS: ISE Features 104438 Michael Shannon IINS: ISE Overview 100956 Michael Shannon IINS: Key Management Components 101041 Michael Shannon IINS: Local and Centralized AAA 101068 Michael Shannon IINS: Locking Down Management Access with ACLs 101198 Michael Shannon IINS: Logging

70 DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Exhibit 1 to Addendum 3

By Certification Cert Learning Product Title Exam Asset 101156 Michael Shannon IINS: MAC Spoofing 101214 Michael Shannon IINS: Management Access Configuration 100721 Michael Shannon IINS: Man-in-the-middle Attack (Part 1) 100722 Michael Shannon IINS: Man-in-the-middle Attack (Part 2) 101063 Michael Shannon IINS: Memory and CPU Threshold Notifications 101210 Michael Shannon IINS: Modes of Deployment 101254 Michael Shannon IINS: Modular; Object-oriented Configuration 101302 Michael Shannon IINS: Monitoring IPsec Phase 1 SA 101220 Michael Shannon IINS: NAT Deployment Modes 101219 Michael Shannon IINS: NAT Example 101221 Michael Shannon IINS: NAT on Cisco ASA 101218 Michael Shannon IINS: NAT Overview 100727 Michael Shannon IINS: Network Security Myths 100909 Michael Shannon IINS: Network Security Objectives 101197 Michael Shannon IINS: Next-Generation Firewalls 101058 Michael Shannon IINS: NTP Authentication 101059 Michael Shannon IINS: NTP Configuration Example 101057 Michael Shannon IINS: NTP Overview 101236 Michael Shannon IINS: Object Groups 101135 Michael Shannon IINS: OSI Layer Dependencies 101077 Michael Shannon IINS: OSPF Route Authentication 101069 Michael Shannon IINS: Other Password Considerations 101371 Michael Shannon IINS: Outgoing Mail Processing Overview 100934 Michael Shannon IINS: Overview of Cryptographic Hashes 100946 Michael Shannon IINS: Overview of Digital Signatures 101047 Michael Shannon IINS: Overview of IOS Authorization with Privilege Levels 101358 Michael Shannon IINS: Overview of Personal Firewalls 101213 Michael Shannon IINS: Overview of the Cisco ASA CLI Command Set 101192 Michael Shannon IINS: Packet Filters 101346 Michael Shannon IINS: Packet Fragmentation Evasion Technique 101153 Michael Shannon IINS: PACLs 101196 Michael Shannon IINS: Pairing a Proxy Server with a Stateful Firewall 100718 Michael Shannon IINS: Password Attacks 100717 Michael Shannon IINS: Pharming 100716 Michael Shannon IINS: Phishing 100949 Michael Shannon IINS: PKI Terminology and Components 101257 Michael Shannon IINS: Policy Map Actions 101256 Michael Shannon IINS: Policy Map Considerations 101158 Michael Shannon IINS: Port Security 101179 Michael Shannon IINS: PortFast; BPDU Guard; and Root Guard 101165 Michael Shannon IINS: Private VLAN Edge Overview 101163 Michael Shannon IINS: Private VLANs 101348 Michael Shannon IINS: Protection Across the Entire Attack Continuum 101195 Michael Shannon IINS: Proxy Servers

71 DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Exhibit 1 to Addendum 3

By Certification Cert Learning Product Title Exam Asset 100950 Michael Shannon IINS: Public Key Cryptography Standards 100729 Michael Shannon IINS: Purpose of Firewalls 101166 Michael Shannon IINS: PVLAN Edge Configuration 101164 Michael Shannon IINS: PVLAN Port Types 100916 Michael Shannon IINS: Quantitative Risk Analysis: Example 100719 Michael Shannon IINS: Reconnaissance Attacks 100928 Michael Shannon IINS: Responsibilities for the Security Policy 100915 Michael Shannon IINS: Risk Analysis 100917 Michael Shannon IINS: Risk Analysis in Action: Risk Scores 100911 Michael Shannon IINS: Risk: Motivation Meets Opportunity 101380 Michael Shannon IINS: Secure Modular Network Design Principles 101315 Michael Shannon IINS: Secure Sockets Layer and Transport Layer Security 100920 Michael Shannon IINS: Security Architecture Design Guidelines 100929 Michael Shannon IINS: Security Awareness 101211 Michael Shannon IINS: Security Contexts 101344 Michael Shannon IINS: Security Control Decision Classifications 104446 Michael Shannon IINS: Security Group Tags and MACsec 101216 Michael Shannon IINS: Security Levels in Action 101354 Michael Shannon IINS: Sensor Deployment Modes 101353 Michael Shannon IINS: Sensor Placement Considerations 104447 Michael Shannon IINS: SGT Classification 104449 Michael Shannon IINS: SGT Exchange Protocol 101303 Michael Shannon IINS: show crypto ipsec sa 101301 Michael Shannon IINS: show crypto map Command 101293 Michael Shannon IINS: Site-to-Site IPsec Configuration – Phase 1 101289 Michael Shannon IINS: Site-to-Site Tunnel Negotiation Process 101066 Michael Shannon IINS: SNMPv3 Operation 100715 Michael Shannon IINS: Social Engineering 101356 Michael Shannon IINS: SPAN for Passive Mode Deployment 101316 Michael Shannon IINS: SSL Cryptography 101320 Michael Shannon IINS: SSL VPN Client Authentication 101321 Michael Shannon IINS: SSL VPN Clients IP Address Assignment 100927 Michael Shannon IINS: Standards; Guidelines; and Procedures 101193 Michael Shannon IINS: Stateful Firewalls 101194 Michael Shannon IINS: Stateful Firewalls and FTP 101180 Michael Shannon IINS: STP Attack Mitigation 101178 Michael Shannon IINS: STP Overview 101283 Michael Shannon IINS: Suite B Cryptographic Standard 100941 Michael Shannon IINS: Symmetric Encryption Algorithms 101060 Michael Shannon IINS: Syslog Overview 101061 Michael Shannon IINS: Syslog Severity Levels 101343 Michael Shannon IINS: Terms Fundamental to IPS 104443 Michael Shannon IINS: The BYOD Challenge Overview 101071 Michael Shannon IINS: The Control Plane

72 DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Exhibit 1 to Addendum 3

By Certification Cert Learning Product Title Exam Asset 100932 Michael Shannon IINS: The Functional Planes of the Network 101052 Michael Shannon IINS: The IOS File System 100939 Michael Shannon IINS: The Process of Encryption 100713 Michael Shannon IINS: Threatscape 101295 Michael Shannon IINS: Transform Set Negotiation 100918 Michael Shannon IINS: Trends in Regulatory Compliance 101146 Michael Shannon IINS: Trunk Configuration and Attack Mitigation 101141 Michael Shannon IINS: Trunks 100948 Michael Shannon IINS: Trusted Third-party Example 101280 Michael Shannon IINS: Tunnel Mode and Transport Mode 100723 Michael Shannon IINS: Types of Malicious Software 100955 Michael Shannon IINS: Use Case – SSL/TLS 101238 Michael Shannon IINS: Use Object Groups with Access Rules 101154 Michael Shannon IINS: VACLs 101053 Michael Shannon IINS: Validating IOS Images Using MD5 100725 Michael Shannon IINS: Vectors of Data Loss and Exfiltration 101226 Michael Shannon IINS: Verify NAT Operations 101056 Michael Shannon IINS: Verifying and Restoring IOS Resilient Configuration 101161 Michael Shannon IINS: Verifying Port Security Configuration (Part 1) 101162 Michael Shannon IINS: Verifying Port Security Configuration (Part 2) 101167 Michael Shannon IINS: Verifying PVLAN Edge Configuration 101300 Michael Shannon IINS: Verifying the IPsec Configuration 101155 Michael Shannon IINS: Verifying VACL Configuration 101139 Michael Shannon IINS: VLAN Configuration 101138 Michael Shannon IINS: VLAN Example 101144 Michael Shannon IINS: VLAN Hopping Attack 101137 Michael Shannon IINS: VLAN Overview 101140 Michael Shannon IINS: VLAN Verification 100925 Michael Shannon IINS: Who Uses the Security Policy? 100924 Michael Shannon IINS: Why Do You Need a Security Policy? 100951 Michael Shannon IINS: X.509v3 Certificate Fields 101259 Michael Shannon IINS: Zone-based Policy Firewall Rules 101260 Michael Shannon IINS: Zone-based Policy Firewall Rules for Self Zone 101251 Michael Shannon IINS: Zone-based Topology Examples 101258 Michael Shannon IINS: Zones and Zone Pair Assignments 101250 Michael Shannon IINS: Zones and Zone Pairs 77192 EMC Impact Of Cloud Computing On IT Governance 40694 John Wiley & Implementing SSL/TLS Using Cryptography and PKI Sons 82854 ISACA Implementing the NIST Cybersecurity Framework 72509 McGraw- Incident Response & Computer Forensics; Third Edition Hill/Osborne 77754 Syngress Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid; Publishing SCADA; and other Industrial Control Systems; Second Edition 34549 Springer Information Assurance

73 DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Exhibit 1 to Addendum 3

By Certification Cert Learning Product Title Exam Asset 59308 IGI Global Information Assurance and Security Technologies for Risk Assessment and Threat Management: Advances 26436 Auerbach Information Assurance Architecture Publications 72511 McGraw- Information Assurance Handbook: Effective Computer Security and Risk Management Hill/Osborne Strategies 7095 Butterworth- Information Assurance: Managing Organizational IT Security Risks Heinemann 81728 Butterworth- Information Governance and Security: Protecting and Managing Your Company's Heinemann Proprietary Information 73421 Syngress Information Hiding in Speech Signals for Secure Communication Publishing 29596 John Wiley & Information Nation: Seven Keys to Information Management Compliance Sons 69893 IGI Global Information Quality and Governance for Business Intelligence 64603 BCS Information Risk Management: A Practitioner's Guide 77762 Syngress Information Security Analytics: Finding Security Insights; Patterns; and Anomalies in Big Publishing Data 62644 John Wiley & Information Security and IT Risk Management Sons 72600 IGI Global Information Security in Diverse Computing Environments 36392 ISACA Information Security Management Audit/Assurance Program 47188 Auerbach Information Security Management Handbook; Sixth Edition; Volume 5 Publications 51962 Auerbach Information Security Management Handbook; Sixth Edition; Volume 7 Publications 36951 Auerbach Information Security Risk Analysis; Third Edition Publications 47319 Syngress Information Security Risk Assessment Toolkit: Practical Assessments Through Data Publishing Collection and Data Analysis 36118 IT Governance Information Security Risk Management for ISO27001/ISO17799 93177 IT Governance Information Security: A Practical Guide 35183 John Wiley & Information Technology Risk Management in Enterprise Environments: A Review of Sons Industry Practices and a Practical Guide to Risk Management Teams

63594 John Wiley & Information Warfare; 2nd Edition Sons 31244 IGI Global Innovative Automatic Identification and Location-Based Services: Form Bar Codes to Chip Implants 76673 Springer Innovative Technologies for Dependable OTS-Based Critcal Systems 73407 Butterworth- Integrated Security Systems Design: A Complete Reference for Building Enterprise- Heinemann Wide Digital Security Systems; Second Edition 26443 Auerbach Intelligent Network Video: Understanding Modern Video Surveillance Systems Publications 51030 Academic Press Intelligent Systems for Security Informatics

36954 Auerbach Internet Searches for Vetting; Investigations; and Open-Source Intelligence Publications 43523 Cengage Internet Security You Can Afford: The Untangle Internet Gateway Learning 74139 Auerbach Introduction to Certificateless Cryptography Publications 77013 Springer Introduction to Cryptography with Maple

74 DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Exhibit 1 to Addendum 3

By Certification Cert Learning Product Title Exam Asset 66998 Syngress Introduction to Information Security: A Strategic-Based Approach Publishing 77024 Springer Introduction to Public Key Infrastructures 51068 Butterworth- Introduction to Security; Ninth Edition Heinemann 51925 Auerbach Introduction to Surveillance Studies Publications 76688 Springer Intrusion Detection for IP-Based Multimedia Communications over Wireless Networks

47297 Auerbach Intrusions: How Hackers Get In and the Evidence They Leave Behind Publications 46450 IGI Global Investigating Cyber Law and Cyber Ethics: Issues; Impacts and Practices 40214 Apress iOS Forensic Analysis for iPhone; iPad; and iPod Touch 46155 John Wiley & iOS Hacker's Handbook Sons 40086 McGraw- iPad & iPhone Administrators Guide: Enterprise Deployment Strategies and Security Hill/Osborne Solutions 41867 Syngress iPhone and iOS Forensics: Investigation; Analysis and Mobile Security for Apple Publishing iPhone; iPad; and iOS Devices 49459 ISACA IPv6 Security Audit/Assurance Program 45388 Cisco Press IPv6 Security: Information Assurance for the Next-Generation Internet Protocol

41212 IT Governance ISO14001 Step by Step: A Practical Guide 56021 IT Governance ISO22301: A Pocket Guide 36126 IT Governance ISO27001 in a Windows Environment: The Best Practice Handbook for a Microsoft Windows Environment; Second Edition 73960 IT Governance ISO27001 in a Windows® Environment: The Best Practice Handbook for a Microsoft® Windows Environment; 3rd Edition 30808 ISACA IT Assurance Guide: Using COBIT 26448 Auerbach IT Auditing and Sarbanes-Oxley Compliance: Key Strategies for Business Improvement Publications 30809 ISACA IT Control Objectives for BASEL II: The Importance of Governance and Risk Management for Compliance 43478 ISACA IT Control Objectives for Cloud Computing: Controls and Assurance in the Cloud

30810 ISACA IT Control Objectives for Sarbanes-Oxley: The Role of IT in the Design and Implementation of Internal Control Over Financial Reporting; 2nd Edition 82855 ISACA IT Control Objectives for Sarbanes-Oxley: Using COBIT 5 in the Design and Implementation of Internal Controls over Financial Reporting; 3rd Edition 90875 Kogan Page IT Governance: An International Guide to Data Security and ISO27001/ISO27002; 6th Edition 56013 IT Governance IT Induction and Information Security Awareness: A Pocket Guide 45816 ISACA IT Risk Management Audit/Assurance Program 40089 McGraw- IT Security Metrics: A Practical Framework for Measuring Security & Protecting Data Hill/Osborne 37797 IT Governance IT Strategic and Operational Controls 45813 ISACA IT Tactical Management Audit/Assurance Program 30811 ISACA ITAF: A Professional Practices Framework for IT Assurance 69913 IGI Global Judiciary-Friendly Forensics of Software Copyright Infringement 25436 Syngress Juniper Networks Secure Access SSL VPN Configuration Guide Publishing

75 DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Exhibit 1 to Addendum 3

By Certification Cert Learning Product Title Exam Asset 69821 Jones and Legal Issues in Information Security; Second Edition Bartlett Learning

56027 EMC Leveraging Big Data to Battle Cyber Threats: A New Security Paradigm 51022 Syngress Logging and Log Management: The Authoritative Guide to Understanding the Concepts Publishing Surrounding Logging and Log Management 51195 John Wiley & LTE Security; Second Edition Sons (UK) 40737 John Wiley & Mac Security Bible Sons 51199 John Wiley & Machine Learning in Image Steganalysis Sons (UK) 51968 Auerbach Malicious Code and Your Enterprise: What It Is and How to Stop It Publications 40131 Syngress Managed Code Rootkits: Hooking into Runtime Environments Publishing 41543 TSO; Ltd Management of Risk: Guidance for Practitioners 36966 Auerbach Managing an Information Security and Privacy Awareness and Training Program; Publications Second Edition 32239 Syngress Managing Catastrophic Loss of Sensitive Data: A Guide for IT and Security Publishing Professionals 73136 EMC Managing Data Protection for a Better Night’s Sleep 34443 IT Governance Managing Information Risk: A Director's Guide 94353 IT Governance Managing Information Security Breaches: Studies from Real Life; Second Edition

81725 Butterworth- Managing Online Risk: Apps; Mobile; and Social Media Security Heinemann 51883 Apress Managing Risk and Information Security: Protect to Enable 51970 Auerbach Managing Risk and Security in Outsourcing IT Services: Onshore; Offshore and the Publications Cloud 69822 Jones and Managing Risk in Information Systems; Second Edition Bartlett Learning

73433 Butterworth- Measuring and Managing Information Risk: A Fair Approach Heinemann 14080 Syngress Metasploit Toolkit: For Penetration Testing; Exploit Development; and Vulnerability Publishing Research 43618 No Starch Press Metasploit: The Penetration Tester's Guide

40133 Syngress Metrics and Methods for Security Risk Management Publishing 45810 ISACA Microsoft Exchange Server 2010 Audit/Assurance Program 45241 Fair Trade DX Microsoft Office 365 Security Essentials 61512 Joe Barrett Microsoft SharePoint Server 2013: App Permission Request Scopes 61511 Joe Barrett Microsoft SharePoint Server 2013: App Permissions

61510 Joe Barrett Microsoft SharePoint Server 2013: Authenticating a User from a Client Application 61506 Joe Barrett Microsoft SharePoint Server 2013: Create a Custom Membership Provider 61507 Joe Barrett Microsoft SharePoint Server 2013: Create a Custom Role Provider 61509 Joe Barrett Microsoft SharePoint Server 2013: Create a Custom Sign-in Page 61500 Joe Barrett Microsoft SharePoint Server 2013: Create Custom Permissions

76 DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Exhibit 1 to Addendum 3

By Certification Cert Learning Product Title Exam Asset 61499 Joe Barrett Microsoft SharePoint Server 2013: Create Role Definitions 61504 Joe Barrett Microsoft SharePoint Server 2013: Custom Claim Providers 61502 Joe Barrett Microsoft SharePoint Server 2013: Enabling Anonymous Access 61503 Joe Barrett Microsoft SharePoint Server 2013: Implement Impersonation 61501 Joe Barrett Microsoft SharePoint Server 2013: Maintain Permissions

61505 Joe Barrett Microsoft SharePoint Server 2013: Package and Deploy a Custom Claims Provider Microsoft SharePoint Server 2013: Package and Deploy a Custom Membership 61508 Joe Barrett Provider 61516 Joe Barrett Microsoft SharePoint Server 2013: SharePoint App TokenHelper Class

61514 Joe Barrett Microsoft SharePoint Server 2013: Specifying Permissions for Corporate Catalog Apps

61513 Joe Barrett Microsoft SharePoint Server 2013: Specifying Permissions for Office Store Apps 61515 Joe Barrett Microsoft SharePoint Server 2013: Specifying Permissions for Remote Apps 43479 ISACA Microsoft SQL Server Database Audit/Assurance Program

69439 Mitchel Sellers Microsoft Visual Studio 2013 with C#: Asymmetric Key Pairs in Windows Store Apps Microsoft Visual Studio 2013 with C#: Asynchronous Strategies for Windows Store 69448 Mitchel Sellers Apps Microsoft Visual Studio 2013 with C#: Basic Background File Transfer in Windows Store 69444 Mitchel Sellers Apps

69437 Mitchel Sellers Microsoft Visual Studio 2013 with C#: Certificate Requests in Windows Store Apps Microsoft Visual Studio 2013 with C#: Consuming a WinMD Component in a Windows 69454 Mitchel Sellers Store App Microsoft Visual Studio 2013 with C#: Creating a Background Task in Windows Store 69443 Mitchel Sellers Apps 69453 Mitchel Sellers Microsoft Visual Studio 2013 with C#: Creating a WinMD Component in C#

69432 Mitchel Sellers Microsoft Visual Studio 2013 with C#: Creating Hash Values in Windows Store Apps Microsoft Visual Studio 2013 with C#: Encryption with a Public Key in Windows Store 69440 Mitchel Sellers Apps Microsoft Visual Studio 2013 with C#: Implementing Symmetric Decryption with 69435 Mitchel Sellers Windows Store Apps Microsoft Visual Studio 2013 with C#: Implementing Symmetric Encryption with 69434 Mitchel Sellers Windows Store Apps

69438 Mitchel Sellers Microsoft Visual Studio 2013 with C#: Installing a Certificate with Windows Store Apps 69452 Mitchel Sellers Microsoft Visual Studio 2013 with C#: Introducing WinMD Components Microsoft Visual Studio 2013 with C#: Lock Screen Access to Windows Store App 69447 Mitchel Sellers Background Tasks Microsoft Visual Studio 2013 with C#: Obtaining Symmetric Keys in Windows Store 69433 Mitchel Sellers Apps Microsoft Visual Studio 2013 with C#: Optimizing Background Transfers in Windows 69445 Mitchel Sellers Store Apps Microsoft Visual Studio 2013 with C#: Overview of Background Tasks in Windows Store 69442 Mitchel Sellers Apps Microsoft Visual Studio 2013 with C#: Updating a Windows Store App Tile with a 69446 Mitchel Sellers Background Task

77 DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Exhibit 1 to Addendum 3

By Certification Cert Learning Product Title Exam Asset

69449 Mitchel Sellers Microsoft Visual Studio 2013 with C#: Using Data Parallelism in Windows Store Apps

69450 Mitchel Sellers Microsoft Visual Studio 2013 with C#: Using Task Parallelism in Windows Store Apps

69436 Mitchel Sellers Microsoft Visual Studio 2013: Overview of Certificates in Windows Store Apps 69431 Mitchel Sellers Microsoft Visual Studio 2013: Overview of Encryption in Windows Store Apps 43253 Sybex Microsoft Windows Security: Essentials 93277 McGraw- Mike Meyers' CompTIA Security+ Certification Guide (Exam SY0-401) Hill/Osborne 72499 McGraw- Mike Meyers’ CompTIA Security+ Certification Passport; Fourth Edition (Exam SY0- Hill/Osborne 401) 35970 McGraw- Mobile Application Security Hill/Osborne 41428 ISACA Mobile Computing Security Audit/Assurance Program 85986 Syngress Mobile Data Loss Prevention Publishing 44392 John Wiley & Mobile Device Security for Dummies Sons 34445 IT Governance Mobile Security: A Pocket Guide 24416 John Wiley & Modern Cryptanalysis: Techniques for Advanced Code Breaking Sons 77026 Springer Modern Cryptography Primer: Theoretical Foundations and Practical Applications

39950 ISACA Monitoring Internal Control Systems and IT: A Primer for Business Executives; Managers and Auditors on How to Embrace and Advance Best Practices

22316 Cambridge Multi-application Smart Cards: Technology and Applications University Press

69914 IGI Global Multidisciplinary Perspectives in Cryptology and Information Security 61776 Auerbach Multilevel Security for Relational Databases Publications 31950 John Wiley & Network Access Control for Dummies Sons 30152 Packt Publishing Network Administration with FreeBSD 7: Building; Securing; and Maintaining Networks with the FreeBSD Operating System 80730 John Wiley & Network Attacks & Exploitation: A Framework Sons 76711 Springer Network Hardening: An Automated Approach to Improving Network Security 76766 Springer Network Science and Cybersecurity 91934 IGI Global Network Security Attacks and Countermeasures 57135 IGI Global Network Security Technologies: Design and Applications 69817 Jones and Network Security; Firewalls and VPNs; Second Edition Bartlett Learning

47281 Auerbach New Directions of Modern Cryptography Publications 83474 IGI Global New Threats and Countermeasures in Digital Crime and Cyber Terrorism 88834 IGI Global Next Generation Wireless Network Security and Privacy 47266 Auerbach Noiseless Steganography: The Key to Covert Communications Publications

78 DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Exhibit 1 to Addendum 3

By Certification Cert Learning Product Title Exam Asset 94359 IT Governance Once More Unto the Breach: Managing Information Security in an Uncertain World; Second Edition 73434 Butterworth- Online Security for the Business Traveler Heinemann 30150 Packt Publishing Openfire Administration: A Practical Step-by-Step Guide to Rolling Out a Secure Instant Messaging Service Over Your Network 91942 Syngress Operating System Forensics Publishing 78684 Syngress Optimizing IEEE 802.11i Resource and Security Essentials: For Mobile and Stationary Publishing Devices 15395 Oracle Press Oracle E-Business Suite Security 26461 Auerbach Oracle Identity Management: Governance; Risk; and Compliance Architecture; Third Publications Edition 36113 IT Governance Outsourcing IT: A Governance Guide

87533 Hilton Giesenow OWASP Top 10: Authenticating with External Logins in ASP.NET MVC 76600 OpenTask Pattern-Oriented Memory Forensics: A Pattern Language Approach 78679 Syngress PCI Compliance: Understand and Implement Effective PCI Data Security Standard Publishing Compliance; Fourth Edition 43948 IT Governance PCI DSS: A Practical Guide to Implementing and Maintaining Compliance; Third Edition

69068 IT Governance Penetration Testing Services Procurement Guide 47049 IT Governance Penetration Testing: Protecting Networks and Systems 61778 Auerbach Personal Mobile Devices in the Enterprise: Security and Privacy Concerns Publications 76730 Springer Pervasive Wireless Environments: Detecting and Localizing User Spoofing 14138 No Starch Press PGP & GPG: Email for the Practical Paranoid

82506 John Wiley & Phishing Dark Waters: The Offensive and Defensive Sides of Malicious Emails Sons 13609 Digital Press Physical Security for IT 81563 Cambridge Physical-Layer Security: From Information Theory to Security Engineering University Press

61756 Auerbach Practical Cryptography: Algorithms and Implementations Using C++ Publications 77623 Apress Practical Hadoop Security 62680 John Wiley & Practical Reverse Engineering: x86; x64; ARM; Windows Kernel; Reversing Tools; and Sons Obfuscation 77187 McGraw- Principles of Computer Security Lab Manual; Fourth Edition Hill/Osborne 49814 Springer Privacy and Security for Cloud Computing 36978 Auerbach Private Security and the Investigative Process; Third Edition Publications 53255 Apress Pro ASP.NET Web API Security: Securing ASP.NET Web API 40195 Apress Pro PHP Security: From Application Security Principles to the Implementation of XSS Defenses; Second Edition 69069 IT Governance Procuring Penetration Testing Services 33956 Cengage Protecting Games: A Security Handbook for Game Developers and Publishers Learning 7373 Auerbach Public Key Infrastructure: Building Trusted Applications and Web Services Publications

79 DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Exhibit 1 to Addendum 3

By Certification Cert Learning Product Title Exam Asset 66988 Syngress Python Forensics Publishing 50908 IT Governance Resilient Thinking: Protecting Organisations in the 21st Century 51969 Auerbach Responsive Security: Be Ready to Be Secure Publications 31038 Springer RFID Security: Techniques; Protocols and System-On-Chip Design 51053 Butterworth- Risk Analysis and the Security Survey; Fourth Edition Heinemann 82381 John Wiley & Risk Centric Threat Modeling: Process for Attack Simulation and Threat Analysis Sons 82856 ISACA Risk Scenarios: Using COBIT 5 for Risk 11268 John Wiley & Risks; Controls; and Security: Concepts and Applications; 1st Edition Sons 27197 Artech House Role-Based Access Control; Second Edition 80705 John Wiley & Safeguarding Critical E-Documents: Implementing a Program for Securing Confidential Sons Information Assets 25440 Syngress Sarbanes-Oxley IT Compliance Using Open Source Tools; Second Edition Publishing 82534 John Wiley & Secrets and Lies: Digital Security in a Networked World; 15th Anniversary Edition Sons 36986 Auerbach Secure and Resilient Software Development Publications 52002 Auerbach Secure Data Provenance and Inference Control with Semantic Web Publications 61794 Auerbach Secure Development for Mobile Apps: How to Design and Code Secure Mobile Publications Applications with PHP and JavaScript 36987 Auerbach Secure Java: For Web Application Development Publications 84449 Chris Keenan Secure Programming for .NET: .NET Framework Security 84452 Chris Keenan Secure Programming for .NET: .NET Security Namespaces 84460 Chris Keenan Secure Programming for .NET: ASP.NET Code Access Security 84450 Chris Keenan Secure Programming for .NET: Authentication in .NET 84464 Chris Keenan Secure Programming for .NET: CAS Configuration 84469 Chris Keenan Secure Programming for .NET: Common Threats to .NET 84473 Chris Keenan Secure Programming for .NET: Creating a Secure .NET Application 84467 Chris Keenan Secure Programming for .NET: Encrypting and Decrypting Data in .NET 84457 Chris Keenan Secure Programming for .NET: GenericPrincipal and GenericIdentity Objects 84459 Chris Keenan Secure Programming for .NET: Imperative Security Checks 84458 Chris Keenan Secure Programming for .NET: Impersonation in .NET 84463 Chris Keenan Secure Programming for .NET: Link Demands and CAS

84453 Chris Keenan Secure Programming for .NET: Microsoft Secure Development Lifecycle (SDL) 84454 Chris Keenan Secure Programming for .NET: Permissions and Role-based Security 84456 Chris Keenan Secure Programming for .NET: Replacing Principal Objects 84451 Chris Keenan Secure Programming for .NET: Secure Coding in .NET 84471 Chris Keenan Secure Programming for .NET: Securing ASP.NET Web Forms 84472 Chris Keenan Secure Programming for .NET: Securing Data Access in .NET 84470 Chris Keenan Secure Programming for .NET: Security Tools for .NET 84461 Chris Keenan Secure Programming for .NET: Security-Transparent Code in .NET

80 DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Exhibit 1 to Addendum 3

By Certification Cert Learning Product Title Exam Asset 84465 Chris Keenan Secure Programming for .NET: The .NET Cryptography Model 84468 Chris Keenan Secure Programming for .NET: Using Hash Codes for Data Integrity in .NET 84466 Chris Keenan Secure Programming for .NET: Using Keys for Encryption in .NET 84462 Chris Keenan Secure Programming for .NET: Working with Partially Trusted Code in .NET 84455 Chris Keenan Secure Programming for .NET: Working with the WindowsPrincipal Object 36988 Auerbach Secure Semantic Service-Oriented Systems Publications 47388 Jones and Secure Software Design Bartlett Learning

69621 EMC Secured Cloud Computing 78988 EMC Securely Enabling Mobility & BYOD in Organizations 50156 IT Governance Securing Cloud Services: A Pragmatic Approach to Security Architecture in the Cloud

97762 Dan Lachance Securing Mobile Devices in the Enterprise - Exercise: Configuring Intune 97746 Dan Lachance Securing Mobile Devices in the Enterprise - Exercise: Mitigating Threat for BYOD and COD Devices 97721 Dan Lachance Securing Mobile Devices in the Enterprise - Exercise: Securing Back-end Systems 97710 Dan Lachance Securing Mobile Devices in the Enterprise: Application Hardening 97741 Dan Lachance Securing Mobile Devices in the Enterprise: Application Wrapper Overview 97477 Dan Lachance Securing Mobile Devices in the Enterprise: Assessing Mobile Threats 97483 Dan Lachance Securing Mobile Devices in the Enterprise: Asymmetric Encryption Overview 97709 Dan Lachance Securing Mobile Devices in the Enterprise: Back-end Security Requirements 97465 Dan Lachance Securing Mobile Devices in the Enterprise: Broken Cryptography 97714 Dan Lachance Securing Mobile Devices in the Enterprise: Building a Demilitarized Zone 97471 Dan Lachance Securing Mobile Devices in the Enterprise: Business Impacts of Exploits 97739 Dan Lachance Securing Mobile Devices in the Enterprise: BYOD Container Usage Scenarios 97738 Dan Lachance Securing Mobile Devices in the Enterprise: BYOD Containers 97466 Dan Lachance Securing Mobile Devices in the Enterprise: Client-side Injection 97740 Dan Lachance Securing Mobile Devices in the Enterprise: Configuring BYOD Containers 97735 Dan Lachance Securing Mobile Devices in the Enterprise: Configuring Perfect Forward Secrecy 97759 Dan Lachance Securing Mobile Devices in the Enterprise: Configuring the Microsoft Intune Connector Role 97727 Dan Lachance Securing Mobile Devices in the Enterprise: Configuring Unmanaged Android Devices 97728 Dan Lachance Securing Mobile Devices in the Enterprise: Configuring Unmanaged iOS Devices 97729 Dan Lachance Securing Mobile Devices in the Enterprise: Configuring Unmanaged Windows Phone Devices 97737 Dan Lachance Securing Mobile Devices in the Enterprise: Configuring Virtual Private Networks 97749 Dan Lachance Securing Mobile Devices in the Enterprise: Creating a Microsoft Intune Account 97708 Dan Lachance Securing Mobile Devices in the Enterprise: Creating Certificates 97479 Dan Lachance Securing Mobile Devices in the Enterprise: Cryptography One-way Functions 97478 Dan Lachance Securing Mobile Devices in the Enterprise: Cryptography Usage 97755 Dan Lachance Securing Mobile Devices in the Enterprise: Deploy Enterprise Profiles in Microsoft Intune 97473 Dan Lachance Securing Mobile Devices in the Enterprise: Device Authorization and Authentication Requirements 97474 Dan Lachance Securing Mobile Devices in the Enterprise: Device Sensor; Jailbreak; & MDM System Requirements 97707 Dan Lachance Securing Mobile Devices in the Enterprise: Digital Certificates Overview 97704 Dan Lachance Securing Mobile Devices in the Enterprise: Digital Signing Overview 97756 Dan Lachance Securing Mobile Devices in the Enterprise: Distribute Apps in Microsoft Intune

81 DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Exhibit 1 to Addendum 3

By Certification Cert Learning Product Title Exam Asset 97731 Dan Lachance Securing Mobile Devices in the Enterprise: Encrypting Cloud Data 97753 Dan Lachance Securing Mobile Devices in the Enterprise: Enforcing Configurations in Microsoft Intune 97751 Dan Lachance Securing Mobile Devices in the Enterprise: Enrolling Devices in Microsoft Intune 97747 Dan Lachance Securing Mobile Devices in the Enterprise: Enterprise Mobile Device Security Challenges 97748 Dan Lachance Securing Mobile Devices in the Enterprise: Enterprise Mobile Device Security Model Solution 97732 Dan Lachance Securing Mobile Devices in the Enterprise: Exchange ActiveSync Functionality 97754 Dan Lachance Securing Mobile Devices in the Enterprise: Handling Certificates in Microsoft Intune 97480 Dan Lachance Securing Mobile Devices in the Enterprise: Hashing Overview 97456 Dan Lachance Securing Mobile Devices in the Enterprise: Identifying Risks 97468 Dan Lachance Securing Mobile Devices in the Enterprise: Improper Session Handling 97713 Dan Lachance Securing Mobile Devices in the Enterprise: Infrastructure Security Requirements 97461 Dan Lachance Securing Mobile Devices in the Enterprise: Insecure Data Storage 97462 Dan Lachance Securing Mobile Devices in the Enterprise: Insufficient Transport Layer Protection 97706 Dan Lachance Securing Mobile Devices in the Enterprise: Key Distribution 97469 Dan Lachance Securing Mobile Devices in the Enterprise: Lack of Binary Protections 97733 Dan Lachance Securing Mobile Devices in the Enterprise: Managing Devices with Exchange ActiveSync 97744 Dan Lachance Securing Mobile Devices in the Enterprise: Microsoft Azure Rights Management Overview 97743 Dan Lachance Securing Mobile Devices in the Enterprise: Mitigating Code Vulnerabilities in Apps 97742 Dan Lachance Securing Mobile Devices in the Enterprise: Mitigating Malicious App Functionality 97720 Dan Lachance Securing Mobile Devices in the Enterprise: Mobile Device Management Systems 97453 Dan Lachance Securing Mobile Devices in the Enterprise: Mobile Device Overview 97723 Dan Lachance Securing Mobile Devices in the Enterprise: Mobile Device Ownership Models 97750 Dan Lachance Securing Mobile Devices in the Enterprise: Navigating Microsoft Intune 97455 Dan Lachance Securing Mobile Devices in the Enterprise: Overview of Security 97705 Dan Lachance Securing Mobile Devices in the Enterprise: Performing Digital Signing 97703 Dan Lachance Securing Mobile Devices in the Enterprise: Performing Encryption 97481 Dan Lachance Securing Mobile Devices in the Enterprise: Performing Hashing 97464 Dan Lachance Securing Mobile Devices in the Enterprise: Poor Authorization and Authentication 97761 Dan Lachance Securing Mobile Devices in the Enterprise: Preparing for iOS Mobile Device Enrollment 97760 Dan Lachance Securing Mobile Devices in the Enterprise: Preparing for Windows Mobile Device Enrollment 97757 Dan Lachance Securing Mobile Devices in the Enterprise: Protect Data in Microsoft Intune 97745 Dan Lachance Securing Mobile Devices in the Enterprise: Protecting Content with Microsoft Azure RMS 97719 Dan Lachance Securing Mobile Devices in the Enterprise: Protecting Data at Rest and in Transit 97712 Dan Lachance Securing Mobile Devices in the Enterprise: Protecting the Transport Layer 97722 Dan Lachance Securing Mobile Devices in the Enterprise: Requirements for the Mobile Enterprise 97715 Dan Lachance Securing Mobile Devices in the Enterprise: Reverse Proxy Features 97718 Dan Lachance Securing Mobile Devices in the Enterprise: Rights Management Systems 97711 Dan Lachance Securing Mobile Devices in the Enterprise: Secure App Deployment 97730 Dan Lachance Securing Mobile Devices in the Enterprise: Secure Cloud Storage 97475 Dan Lachance Securing Mobile Devices in the Enterprise: Secure Device Connectivity and App Requirements 97472 Dan Lachance Securing Mobile Devices in the Enterprise: Secure Device Data-handling Requirements 97476 Dan Lachance Securing Mobile Devices in the Enterprise: Secure Device User Requirements 97716 Dan Lachance Securing Mobile Devices in the Enterprise: Securing Directory Services and CA 97717 Dan Lachance Securing Mobile Devices in the Enterprise: Securing E-mail Services

82 DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Exhibit 1 to Addendum 3

By Certification Cert Learning Product Title Exam Asset 97467 Dan Lachance Securing Mobile Devices in the Enterprise: Security Decisions via Untrusted Inputs 97459 Dan Lachance Securing Mobile Devices in the Enterprise: Sensitive Data Storage and Transport 97457 Dan Lachance Securing Mobile Devices in the Enterprise: Sensitive Mobile Assets 97458 Dan Lachance Securing Mobile Devices in the Enterprise: Sensitive Usage of Mobile Devices 97734 Dan Lachance Securing Mobile Devices in the Enterprise: Short-lived Session Keys 97482 Dan Lachance Securing Mobile Devices in the Enterprise: Symmetric Encryption Overview 97758 Dan Lachance Securing Mobile Devices in the Enterprise: System Center Configuration Manager Overview 97752 Dan Lachance Securing Mobile Devices in the Enterprise: Targeting Devices in Microsoft Intune 97470 Dan Lachance Securing Mobile Devices in the Enterprise: Technical Impacts of Exploits 97454 Dan Lachance Securing Mobile Devices in the Enterprise: The Mobile Security Landscape 97463 Dan Lachance Securing Mobile Devices in the Enterprise: Unintended Data Leakage 97725 Dan Lachance Securing Mobile Devices in the Enterprise: Unmanaged Company-owned Devices 97726 Dan Lachance Securing Mobile Devices in the Enterprise: Unmanaged Device User Policies 97724 Dan Lachance Securing Mobile Devices in the Enterprise: Unmanaged Devices in a Small Organization 97736 Dan Lachance Securing Mobile Devices in the Enterprise: Virtual Private Networking Overview 97460 Dan Lachance Securing Mobile Devices in the Enterprise: Weak Server-side Controls 63345 ISACA Securing Mobile Devices Using COBIT 5 for Information Security 74138 Auerbach Securing Systems: Applied Security Architecture and Threat Models Publications 41880 Syngress Securing the Cloud: Cloud Computer Security Techniques and Tactics Publishing 51947 Auerbach Securing the Cloud: Security Strategies for the Ubiquitous Data Center Publications 37288 Syngress Securing the Smart Grid: Next Generation Power Grid Security Publishing

84415 Aaron Sampson Securing User Accounts: Account Change Risks

84361 Aaron Sampson Securing User Accounts: Account Protocols

84387 Aaron Sampson Securing User Accounts: Account Verification

84381 Aaron Sampson Securing User Accounts: Asymmetric Key Credentials

84416 Aaron Sampson Securing User Accounts: At-risk Account Attributes

84374 Aaron Sampson Securing User Accounts: Authentication and Identification

84379 Aaron Sampson Securing User Accounts: Authentication Credentials Overview

84376 Aaron Sampson Securing User Accounts: Authentication Types

84350 Aaron Sampson Securing User Accounts: Authenticity

84377 Aaron Sampson Securing User Accounts: Authorization

84383 Aaron Sampson Securing User Accounts: Biometric Credentials

84421 Aaron Sampson Securing User Accounts: Collecting Attack Evidence

83 DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Exhibit 1 to Addendum 3

By Certification Cert Learning Product Title Exam Asset

84403 Aaron Sampson Securing User Accounts: Common Logon Attacks

84352 Aaron Sampson Securing User Accounts: Confidentiality

84419 Aaron Sampson Securing User Accounts: Confirming Account Changes

84356 Aaron Sampson Securing User Accounts: CSRF

84420 Aaron Sampson Securing User Accounts: Dealing with Compromised Systems

84364 Aaron Sampson Securing User Accounts: Defense in Depth

84373 Aaron Sampson Securing User Accounts: Determining Appropriate User Account Policies

84400 Aaron Sampson Securing User Accounts: Development Best Practices

84370 Aaron Sampson Securing User Accounts: Disabling Unused Accounts

84389 Aaron Sampson Securing User Accounts: Enabling Two-Step Verification

84395 Aaron Sampson Securing User Accounts: Enforcing Password History Policies

84362 Aaron Sampson Securing User Accounts: Event Logging

84418 Aaron Sampson Securing User Accounts: Implementing Account Change Notifications

84413 Aaron Sampson Securing User Accounts: Implementing Verification Questions

84349 Aaron Sampson Securing User Accounts: Importance of User Account Security

84351 Aaron Sampson Securing User Accounts: Integrity

84368 Aaron Sampson Securing User Accounts: Limiting Logon Attempts

84404 Aaron Sampson Securing User Accounts: Logon Fraud Detection and Prevention

84402 Aaron Sampson Securing User Accounts: Managing Simultaneous Sessions

84367 Aaron Sampson Securing User Accounts: Naming Conventions

84360 Aaron Sampson Securing User Accounts: Network Protocols

84422 Aaron Sampson Securing User Accounts: Neutralizing Attacks

84411 Aaron Sampson Securing User Accounts: Overview of Password Reset

84405 Aaron Sampson Securing User Accounts: Overview of the Logoff Feature

84399 Aaron Sampson Securing User Accounts: Overview of the Logon Feature

84396 Aaron Sampson Securing User Accounts: Password Age Policies

84 DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Exhibit 1 to Addendum 3

By Certification Cert Learning Product Title Exam Asset

84392 Aaron Sampson Securing User Accounts: Password Complexity Requirements

84380 Aaron Sampson Securing User Accounts: Password Credentials

84393 Aaron Sampson Securing User Accounts: Password Field Security

84410 Aaron Sampson Securing User Accounts: Password Hashing Best Practices

84414 Aaron Sampson Securing User Accounts: Password Hints

84409 Aaron Sampson Securing User Accounts: Password Storage Best Practices

84391 Aaron Sampson Securing User Accounts: Password Strength Criteria

84394 Aaron Sampson Securing User Accounts: Password Strength Feedback

84417 Aaron Sampson Securing User Accounts: Password Verification for Changes

84359 Aaron Sampson Securing User Accounts: Patches and Updates

84366 Aaron Sampson Securing User Accounts: Permissions Categories

84390 Aaron Sampson Securing User Accounts: Preventing Username Enumeration

84363 Aaron Sampson Securing User Accounts: Principle of Least Privilege

84365 Aaron Sampson Securing User Accounts: Privilege Management

84397 Aaron Sampson Securing User Accounts: Protecting against Password Hacking

84385 Aaron Sampson Securing User Accounts: Registration Basics

84407 Aaron Sampson Securing User Accounts: Remote Logoff

84423 Aaron Sampson Securing User Accounts: Securing Account Access and Mitigating Risk

84408 Aaron Sampson Securing User Accounts: Securing Logoff Against CSRF

84398 Aaron Sampson Securing User Accounts: Securing User Account Registration

84353 Aaron Sampson Securing User Accounts: Security Attack Motives

84354 Aaron Sampson Securing User Accounts: Security Attack Phases

84406 Aaron Sampson Securing User Accounts: Session Expiry

84369 Aaron Sampson Securing User Accounts: Setting Account Expiry Dates

84372 Aaron Sampson Securing User Accounts: Setting Machine Restrictions

84371 Aaron Sampson Securing User Accounts: Setting Time Restrictions

85 DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Exhibit 1 to Addendum 3

By Certification Cert Learning Product Title Exam Asset

84384 Aaron Sampson Securing User Accounts: Ticket-based Hybrid Authentication

84412 Aaron Sampson Securing User Accounts: Timed Password Reset

84375 Aaron Sampson Securing User Accounts: User Authentication Components

84378 Aaron Sampson Securing User Accounts: User Logon Process

84386 Aaron Sampson Securing User Accounts: Username Best Practices

84355 Aaron Sampson Securing User Accounts: Username Enumeration

84388 Aaron Sampson Securing User Accounts: Using CAPTCHA

84401 Aaron Sampson Securing User Accounts: Using SSL for Logon Security

84358 Aaron Sampson Securing User Accounts: Vulnerability Scanning

84357 Aaron Sampson Securing User Accounts: Web Server Password Cracking 77747 Syngress Securing VoIP: Keeping Your VoIP Network Safe Publishing 74511 In Easy Steps Securing your PC 90830 Mercury Learning Security & Management (2014 Conf. Proceedings)

47366 Butterworth- Security and Loss Prevention: An Introduction; 5th Edition Heinemann 47303 Auerbach Security and Privacy in Smart Grids Publications 76620 Springer Security and Privacy in Social Networks 47269 Auerbach Security and Safety Requirements for Software-Intensive Systems Publications 64608 BCS Security Architect: Careers in IT Service Management 88818 Syngress Security Controls Evaluation;Testing and Assessment Handbook Publishing 47195 Auerbach Security De-Engineering: Solving the Problems in Information Risk Management Publications 49831 IGI Global Security Engineering for Cloud Computing: Approaches and Tools 25211 John Wiley & Security Engineering: A Guide to Building Dependable Distributed Systems; Second Sons Edition 73435 Butterworth- Security for Business Professionals: How to Plan; Implement; and Manage Your Heinemann Company's Security Program 76684 Springer Security for Cloud Storage Systems 76710 Springer Security for Multi-hop Wireless Networks 35699 Springer Security for Web Services and Service-Oriented Architectures 76680 Springer Security for Wireless Implantable Medical Devices 47270 Auerbach Security for Wireless Sensor Networks using Identity-Based Cryptography Publications 34543 Springer Security in Computing Systems 25704 World Scientific Security in Distributed and Networking Systems: Computer and Network Security; Vol. Publishing Co 1 43498 Springer Security in Embedded Devices

86 DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Exhibit 1 to Addendum 3

By Certification Cert Learning Product Title Exam Asset 82535 John Wiley & Security Intelligence: A Practitioner's Guide to Solving Enterprise Security Challenges Sons 30499 Auerbach Security of Mobile Communications Publications 69823 Jones and Security Policies and Implementation Issues; Second Edition Bartlett Learning

70002 Butterworth- Security Risk Assessment: Managing Physical and Operational Security Heinemann 43285 John Wiley & Security Risk Management Body of Knowledge Sons 41881 Syngress Security Risk Management: Building an Information Security Risk Management Publishing Program from the Ground up 68270 Chandos Security Risks in Social Media Technologies: Safe Practices in Public Service Publishing Applications 26472 Auerbach Security Software Development: Assessing and Managing Security Risks Publications 97659 Jones and Security Strategies in Linux Platforms and Applications; 2nd edition Bartlett Learning

34428 IT Governance Security Testing Handbook for Banking Applications 30842 ISACA Security; Audit and Control Features Oracle E-Business Suite: A Technical and Risk Management Reference Guide; 2nd Edition 30843 ISACA Security; Audit and Control Features PeopleSoft: A Technical and Risk Management Reference Guide; 2nd Edition 64561 IGI Global Security; Privacy; Trust; and Resource Management in Mobile and Wireless Communications 69912 IGI Global Security; Trust; and Regulatory Aspects of Cloud Computing in Business Environments

37233 Syngress Seven Deadliest USB Attacks Publishing 36363 Syngress Seven Deadliest Web Application Attacks Publishing 54046 Syngress Simple Steps to Data Encryption: A Practical Guide to Secure Computing Publishing 91948 Syngress Smart Grid Security: Innovative Solutions for a Modernized Grid Publishing 72510 McGraw- Social Engineering in IT Security: Tools; Tactics; and Techniques Hill/Osborne 66989 Syngress Social Engineering Penetration Testing: Executing Social Engineering Pen Tests; Publishing Assessments and Defense 41429 ISACA Social Media Audit/Assurance Program 97515 Kogan Page Social Media Risk and Governance: Managing Enterprise Risk 10712 Syngress Sockets; Shellcode; Porting & Coding: Reverse Engineering Exploits and Tool Coding Publishing for Security Professionals 39329 IGI Global Software Engineering for Secure Systems: Industrial and Research Perspectives

49261 Syngress SQL Injection Attacks and Defense; Second Edition Publishing 44153 McGraw- SSCP Systems Security Certified Practitioner: All-in-One Exam Guide Hill/Osborne 91488 Dan Lachance SSystems Security Certified Practitioner: (ISC)2 Code of Ethics 83275 EMC Storage Security Design - A Method to Help Embrace Cloud Computing

87 DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Exhibit 1 to Addendum 3

By Certification Cert Learning Product Title Exam Asset 37289 Academic Press Straight Through Processing for Financial Services: The Complete Guide

65223 The MIT Press Surveillance or Security? The Risks Posed by New Wiretapping Technologies

37727 IGI Global Surveillance Technologies and Early Warning Systems: Data Mining Applications for Risk Detection 37800 IT Governance Swanson on Internal Auditing: Raising the Bar 69813 Jones and System Forensics; Investigation and Response; Second Edition Bartlett Learning

28338 MC Press System i Disaster Recovery Planning 91569 Dan Lachance Systems Security Certified Practitioner: Access Control and Monitoring 91570 Dan Lachance Systems Security Certified Practitioner: Access Control Standards and Protocols 91560 Dan Lachance Systems Security Certified Practitioner: Administration and Validation 91601 Dan Lachance Systems Security Certified Practitioner: Application Vulnerabilities 91590 Dan Lachance Systems Security Certified Practitioner: Application White Listing 91548 Dan Lachance Systems Security Certified Practitioner: Applying Hashing 91549 Dan Lachance Systems Security Certified Practitioner: Applying Salting 91557 Dan Lachance Systems Security Certified Practitioner: Appropriate Use 91602 Dan Lachance Systems Security Certified Practitioner: Architecture and Design Vulnerabilities 91486 Dan Lachance Systems Security Certified Practitioner: Attribute-based Access Control 91522 Dan Lachance Systems Security Certified Practitioner: Audit Findings 91470 Dan Lachance Systems Security Certified Practitioner: Authentication Overview 91477 Dan Lachance Systems Security Certified Practitioner: Authorization 91540 Dan Lachance Systems Security Certified Practitioner: Chain of Custody 91600 Dan Lachance Systems Security Certified Practitioner: Cloud Security Outsourcing Requirements 91597 Dan Lachance Systems Security Certified Practitioner: Cloud Virtualization 91566 Dan Lachance Systems Security Certified Practitioner: Common Ports and Protocols 91531 Dan Lachance Systems Security Certified Practitioner: Communicating Findings 91568 Dan Lachance Systems Security Certified Practitioner: Communications Network Attacks and Countermeasures 91502 Dan Lachance Systems Security Certified Practitioner: Compensating Controls 91511 Dan Lachance Systems Security Certified Practitioner: Configuration Management Plan Implementation 91606 Dan Lachance Systems Security Certified Practitioner: Continuity and Resilience 91567 Dan Lachance Systems Security Certified Practitioner: Converged Communications 91501 Dan Lachance Systems Security Certified Practitioner: Corrective Controls 91507 Dan Lachance Systems Security Certified Practitioner: Data Asset Management 91553 Dan Lachance Systems Security Certified Practitioner: Data Sensitivity 91599 Dan Lachance Systems Security Certified Practitioner: Data Storage and Transmission 91500 Dan Lachance Systems Security Certified Practitioner: Detective Controls 91487 Dan Lachance Systems Security Certified Practitioner: Determining Appropriate Access Controls 91498 Dan Lachance Systems Security Certified Practitioner: Deterrent Controls 91473 Dan Lachance Systems Security Certified Practitioner: Device Authentication 91551 Dan Lachance Systems Security Certified Practitioner: Digital Signatures 91484 Dan Lachance Systems Security Certified Practitioner: Discretionary Access Control 91542 Dan Lachance Systems Security Certified Practitioner: Emergency Response Plans and Procedures 91591 Dan Lachance Systems Security Certified Practitioner: Endpoint Encryption

88 DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Exhibit 1 to Addendum 3

By Certification Cert Learning Product Title Exam Asset 91555 Dan Lachance Systems Security Certified Practitioner: End-user Training 91481 Dan Lachance Systems Security Certified Practitioner: Entitlement 91530 Dan Lachance Systems Security Certified Practitioner: Event Data Analysis 91525 Dan Lachance Systems Security Certified Practitioner: Events of Interest 91539 Dan Lachance Systems Security Certified Practitioner: Evidence Handling 91576 Dan Lachance Systems Security Certified Practitioner: Firewalls and Proxies 91538 Dan Lachance Systems Security Certified Practitioner: First Responder 91505 Dan Lachance Systems Security Certified Practitioner: Hardware Asset Management 91588 Dan Lachance Systems Security Certified Practitioner: HIDS 91589 Dan Lachance Systems Security Certified Practitioner: Host-based Firewalls 91604 Dan Lachance Systems Security Certified Practitioner: Hypervisor 91586 Dan Lachance Systems Security Certified Practitioner: Identifying Malicious Activity 91556 Dan Lachance Systems Security Certified Practitioner: Implementation Variation 91545 Dan Lachance Systems Security Certified Practitioner: Implementing Backup and Redundancy Options 91537 Dan Lachance Systems Security Certified Practitioner: Implementing Countermeasures 91563 Dan Lachance Systems Security Certified Practitioner: Implementing Cryptographic Systems 91503 Dan Lachance Systems Security Certified Practitioner: Implementing Operational Security Controls 91562 Dan Lachance Systems Security Certified Practitioner: Implementing Secure Protocols 91533 Dan Lachance Systems Security Certified Practitioner: Incident Discovery 91534 Dan Lachance Systems Security Certified Practitioner: Incident Escalation 91536 Dan Lachance Systems Security Certified Practitioner: Incident Response 91543 Dan Lachance Systems Security Certified Practitioner: Interim Processing Strategies 91524 Dan Lachance Systems Security Certified Practitioner: Interpreting Scanning and Testing Results 91598 Dan Lachance Systems Security Certified Practitioner: Legal and Privacy Concerns 91504 Dan Lachance Systems Security Certified Practitioner: Lifecycle Asset Management 91526 Dan Lachance Systems Security Certified Practitioner: Logging 91480 Dan Lachance Systems Security Certified Practitioner: Maintenance 91587 Dan Lachance Systems Security Certified Practitioner: Malicious Activity Countermeasures 91584 Dan Lachance Systems Security Certified Practitioner: Malicious Code 91585 Dan Lachance Systems Security Certified Practitioner: Malicious Code Countermeasures 91510 Dan Lachance Systems Security Certified Practitioner: Managerial Controls 91482 Dan Lachance Systems Security Certified Practitioner: Mandatory Access Control 91593 Dan Lachance Systems Security Certified Practitioner: Mobile Device Management 91532 Dan Lachance Systems Security Certified Practitioner: Monitoring and Analyzing Risk 91572 Dan Lachance Systems Security Certified Practitioner: Network Access Attacks and Countermeasures 91577 Dan Lachance Systems Security Certified Practitioner: Network Intrusion Detection and Prevention Systems 91565 Dan Lachance Systems Security Certified Practitioner: Network Topographies and Relationships 91483 Dan Lachance Systems Security Certified Practitioner: Non-discretionary Access Control 91552 Dan Lachance Systems Security Certified Practitioner: Non-repudiation 91474 Dan Lachance Systems Security Certified Practitioner: One-way Trust Relationships 91595 Dan Lachance Systems Security Certified Practitioner: Operation Models 91509 Dan Lachance Systems Security Certified Practitioner: Operational Controls 91489 Dan Lachance Systems Security Certified Practitioner: Organizational Code of Ethics 91564 Dan Lachance Systems Security Certified Practitioner: OSI and TCP/IP Models

89 DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Exhibit 1 to Addendum 3

By Certification Cert Learning Product Title Exam Asset 91516 Dan Lachance Systems Security Certified Practitioner: Participating in Physical Security Operations 91517 Dan Lachance Systems Security Certified Practitioner: Participating in Security Administration 91515 Dan Lachance Systems Security Certified Practitioner: Participating in Security Awareness and Training 91523 Dan Lachance Systems Security Certified Practitioner: Participating in Security Testing and Evaluation 91514 Dan Lachance Systems Security Certified Practitioner: Patch Management 91573 Dan Lachance Systems Security Certified Practitioner: Plane Separation 91541 Dan Lachance Systems Security Certified Practitioner: Preservation of Scene 91499 Dan Lachance Systems Security Certified Practitioner: Preventative Controls 91478 Dan Lachance Systems Security Certified Practitioner: Proofing 91479 Dan Lachance Systems Security Certified Practitioner: Provisioning 91559 Dan Lachance Systems Security Certified Practitioner: Public Key Infrastructure 91554 Dan Lachance Systems Security Certified Practitioner: Regulatory Requirements 91571 Dan Lachance Systems Security Certified Practitioner: Remote Access Operation and Configuration 91535 Dan Lachance Systems Security Certified Practitioner: Reporting and Feedback Loops 91547 Dan Lachance Systems Security Certified Practitioner: Responding to Incidents 91544 Dan Lachance Systems Security Certified Practitioner: Restoration Planning 91520 Dan Lachance Systems Security Certified Practitioner: Risk Assessment 91519 Dan Lachance Systems Security Certified Practitioner: Risk Management Concepts 91521 Dan Lachance Systems Security Certified Practitioner: Risk Treatment 91518 Dan Lachance Systems Security Certified Practitioner: Risk Visibility and Reporting 91485 Dan Lachance Systems Security Certified Practitioner: Role-based Access Control 91578 Dan Lachance Systems Security Certified Practitioner: Routers and Switches 91594 Dan Lachance Systems Security Certified Practitioner: Secure Browsing 91575 Dan Lachance Systems Security Certified Practitioner: Secure Device Management 91583 Dan Lachance Systems Security Certified Practitioner: Securing Networks and Communications 91609 Dan Lachance Systems Security Certified Practitioner: Securing Systems and Applications 91528 Dan Lachance Systems Security Certified Practitioner: Security Analytics; Metrics and Trends 91512 Dan Lachance Systems Security Certified Practitioner: Security Impact Assessment 91574 Dan Lachance Systems Security Certified Practitioner: Segmentation 91596 Dan Lachance Systems Security Certified Practitioner: Service Models 91608 Dan Lachance Systems Security Certified Practitioner: Shared Storage 91472 Dan Lachance Systems Security Certified Practitioner: Single Sign-on 91471 Dan Lachance Systems Security Certified Practitioner: Single/Multifactor Authentication 91506 Dan Lachance Systems Security Certified Practitioner: Software Asset Management 91603 Dan Lachance Systems Security Certified Practitioner: Software-defined Networking 91527 Dan Lachance Systems Security Certified Practitioner: Source Systems 91550 Dan Lachance Systems Security Certified Practitioner: Symmetric and Asymmetric Encryption 91513 Dan Lachance Systems Security Certified Practitioner: System Architecture and Interoperability 91508 Dan Lachance Systems Security Certified Practitioner: Technical Controls 91546 Dan Lachance Systems Security Certified Practitioner: Testing and Drills 91579 Dan Lachance Systems Security Certified Practitioner: Traffic-shaping Devices 91476 Dan Lachance Systems Security Certified Practitioner: Transitive Trust 91592 Dan Lachance Systems Security Certified Practitioner: Trusted Platform Module 91475 Dan Lachance Systems Security Certified Practitioner: Two-way Trust Relationships

90 DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Exhibit 1 to Addendum 3

By Certification Cert Learning Product Title Exam Asset 91493 Dan Lachance Systems Security Certified Practitioner: Understanding Accountability 91492 Dan Lachance Systems Security Certified Practitioner: Understanding Availability 91490 Dan Lachance Systems Security Certified Practitioner: Understanding Confidentiality 91491 Dan Lachance Systems Security Certified Practitioner: Understanding Integrity 91496 Dan Lachance Systems Security Certified Practitioner: Understanding Least Privilege 91495 Dan Lachance Systems Security Certified Practitioner: Understanding Non-repudiation 91494 Dan Lachance Systems Security Certified Practitioner: Understanding Privacy 91497 Dan Lachance Systems Security Certified Practitioner: Understanding Separation of Duties 91605 Dan Lachance Systems Security Certified Practitioner: Virtual Appliances 91607 Dan Lachance Systems Security Certified Practitioner: Virtual Environment Attacks and Countermeasures 91529 Dan Lachance Systems Security Certified Practitioner: Visualization 91561 Dan Lachance Systems Security Certified Practitioner: Web of Trust 91581 Dan Lachance Systems Security Certified Practitioner: Wireless Security Devices 91582 Dan Lachance Systems Security Certified Practitioner: Wireless Technologies Attacks and Countermeasures 91580 Dan Lachance Systems Security Certified Practitioner: Wireless Transmission Security 1065 Computing TCP/IP: Architecture; Protocols; and Implementation with IPv6 and IP Security McGraw-Hill 6019 John Wiley & The Art of Deception: Controlling the Human Element of Security Sons 63748 John Wiley & The Art of Memory Forensics: Detecting Malware and Threats in Windows; Linux; and Sons Mac Memory 78129 Syngress The Basics of Digital Forensics: The Primer for Getting Started in Digital Forensics; Publishing Second Edition 44730 Syngress The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Publishing Testing Made Easy 66986 Syngress The Basics of Information Security: Understanding the Fundamentals of InfoSec in Publishing Theory and Practice; Second Edition 58875 Syngress The Basics of IT Audit: Purposes; Processes; and Practical Information Publishing 25442 Syngress The Best Damn IT Security Management Book Period Publishing 73967 No Starch Press The Book of PF: A No-Nonsense Guide to the OpenBSD Firewall; 3rd Edition

35748 ISACA The Business Case Guide: Using Val IT 2.0 74135 Auerbach The Chief Information Security Officer: Roles and Responsibilities Publications 88816 Syngress The Cloud Security Ecosystem: Technical; Legal; Business and Management Issues Publishing 35342 Cisco Press The Complete Cisco VPN Configuration Guide 32022 John Wiley & The CSSLP Prep Guide: Mastering the Certified Secure Software Lifecycle Professional Sons 51917 Auerbach The Definitive Guide to Complying with the HIPAA/HITECH Privacy and Security Rules Publications 49761 John Wiley & The Future of Privacy and IT Security Sons 11213 John Wiley & The GSEC Prep Guide: Mastering SANS GIAC Security Essentials Sons 47323 Syngress The Hacker's Guide to OS X: Exploiting OS X from the Root Up Publishing 72526 Apress The InfoSec Handbook: An Introduction to Information Security

91 DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Exhibit 1 to Addendum 3

By Certification Cert Learning Product Title Exam Asset 32217 Syngress The IT Regulatory and Standards Compliance Handbook: How to Survive Information Publishing Systems Audit and Assessments 17101 John Wiley & The Joy of SOX: Why Sarbanes-Oxley and Service-Oriented Architecture May Be the Sons Best Thing That Ever Happened to You 78462 Apress The Manager’s Guide to Web Application Security: A Concise Guide to the Weaker Side of the Web 80674 John Wiley & The Mobile Application Hacker's Handbook Sons 82556 John Wiley & The Network Security Test Lab: A Step-by-Step Guide Sons 3959 Auerbach The Privacy Papers: Managing Technology; Consumer; Employee; and Legislative Publications Actions 63772 John Wiley & The Realities of Securing Big Data Sons 34359 ISACA The Risk IT Framework 37005 Auerbach The Security Risk Assessment Handbook: A Complete Guide for Performing Security Publications Risk Assessments; Second Edition 99321 No Starch Press The Smart Girl's Guide to Privacy

47716 No Starch Press The Tangled Web: A Guide to Securing Modern Web Applications

93180 IT Governance The Tao of Open Source Intelligence 54377 IGI Global Theory and Practice of Cryptography Solutions for Secure Information Systems

62717 John Wiley & Threat Modeling: Designing for Security Sons Charles 84155 Robinson TOGAF 9.1: Architectural Artifacts Charles 84156 Robinson TOGAF 9.1: Architectural Deliverables Charles 84166 Robinson TOGAF 9.1: Architecture Board Charles 84165 Robinson TOGAF 9.1: Architecture Capability Charles 84138 Robinson TOGAF 9.1: Architecture Change Management (H) Charles 84167 Robinson TOGAF 9.1: Architecture Compliance Charles 84168 Robinson TOGAF 9.1: Architecture Contracts Charles 84169 Robinson TOGAF 9.1: Architecture Governance Charles 84170 Robinson TOGAF 9.1: Architecture Maturity Models Charles 84159 Robinson TOGAF 9.1: Architecture Partitioning Charles 84145 Robinson TOGAF 9.1: Architecture Patterns Charles 84143 Robinson TOGAF 9.1: Architecture Principles Charles 84160 Robinson TOGAF 9.1: Architecture Repository Charles 84171 Robinson TOGAF 9.1: Architecture Skills Framework

92 DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Exhibit 1 to Addendum 3

By Certification Cert Learning Product Title Exam Asset Charles 84157 Robinson TOGAF 9.1: Building Blocks Charles 84146 Robinson TOGAF 9.1: Business Scenarios Charles 84150 Robinson TOGAF 9.1: Business Transformation Readiness Assessment Charles 84152 Robinson TOGAF 9.1: Capability-Based Planning Charles 84154 Robinson TOGAF 9.1: Content Metamodel Charles 84158 Robinson TOGAF 9.1: Enterprise Continuum Charles 84162 Robinson TOGAF 9.1: Foundation Architecture Charles 84147 Robinson TOGAF 9.1: Gap Analysis Charles 84137 Robinson TOGAF 9.1: Implementation Governance (G) Charles 84163 Robinson TOGAF 9.1: Integrated Information Infrastructure Reference Model Charles 84149 Robinson TOGAF 9.1: Interoperability Charles 84153 Robinson TOGAF 9.1: Introduction Charles 84164 Robinson TOGAF 9.1: Introduction Charles 84140 Robinson TOGAF 9.1: Iteration and Landscape Charles 84148 Robinson TOGAF 9.1: Migration Charles 84139 Robinson TOGAF 9.1: Requirements Management Charles 84151 Robinson TOGAF 9.1: Risk Management Charles 84141 Robinson TOGAF 9.1: Security Charles 84142 Robinson TOGAF 9.1: SOA Charles 84144 Robinson TOGAF 9.1: Stakeholder Management Charles 84161 Robinson TOGAF 9.1: Tools 74143 CRC Press Touchless Fingerprint Biometrics 59654 Cambridge Trust; Computing; and Society University Press

47151 Newnes Trusted Platform Module Basics: Using TPM in Embedded Systems 93179 IT Governance Two-Factor Authentication 52918 John Wiley & Understanding and Conducting Information Systems Auditing Sons 80664 John Wiley & Understanding Bitcoin: Cryptography; Engineering and Economics Sons (UK)

93 DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Exhibit 1 to Addendum 3

By Certification Cert Learning Product Title Exam Asset 26486 Auerbach Understanding Surveillance Technologies: Spy Devices; Privacy; History; & Publications Applications; Revised and Expanded Second Edition 62722 John Wiley & Unmasking the Social Engineer: The Human Element of Security Sons 51287 John Wiley & Vehicle Safety Communications: Protocols; Security; and Privacy Sons 51017 Syngress Violent Python: A Cookbook for Hackers; Forensic Analysts; Penetration Testers and Publishing Security Engineers 37234 Syngress Virtualization and Forensics: A Digital Forensic Investigator's Guide to Virtual Publishing Environments 32213 Syngress Virtualization for Security: Including Sandboxing; Disaster Recovery; High Availability; Publishing Forensic Analysis; and Honeypotting 51288 Sybex Virtualization Security: Protecting Virtualized Environments 35752 Cengage VMware ESXi: Planning; Implementation; and Security Learning 45817 ISACA Voice Over Internet Protocol (VoIP) Audit/Assurance Program 35322 Cisco Press Voice over IP Security 51293 John Wiley & Web Application Defender's Cookbook: Battling Hackers and Protecting Users Sons 41893 Syngress Web Application Obfuscation: '-/WAFs..dEvasion..dFilters//alert (/Obfuscation/)-' Publishing 94363 IT Governance Web Application Security is a Stack: How to CYA (Cover Your Apps) Completely

44154 McGraw- Web Application Security: A Beginner's Guide Hill/Osborne 40873 John Wiley & Web Commerce Security: Design and Development Sons 51953 Auerbach Web Security: A WhiteHat Perspective Publications 34038 IGI Global Web Services Security Development and Architecture: Theoretical and Practical Issues

74410 EMC What Is The Power Of RecoverPoint? 84474 Dan Lachance What's New in CISSP 2015: Exam Update Overview 84476 Dan Lachance What's New in CISSP 2015: New Testing Domains 84477 Dan Lachance What's New in CISSP 2015: New Testing Topics 84475 Dan Lachance What's New in CISSP 2015: Previous Testing Domains 53996 Syngress Windows 2012 Server Network Security: Securing Your Windows Network Systems Publishing and Infrastructure 36393 ISACA Windows Active Directory Audit/Assurance Program 67001 Syngress Windows Forensic Analysis Toolkit; Fourth Edition: Advanced Analysis Techniques for Publishing Windows 8 51903 Auerbach Windows Networking Tools: The Complete Guide to Management; Troubleshooting; Publications and Security

87559 Hilton Giesenow Windows PowerShell Desired State Configuration: Configure a Pull Server and 2 Nodes Windows PowerShell Desired State Configuration: Configuring Clients to Connect to a 87551 Hilton Giesenow Pull Server Windows PowerShell Desired State Configuration: Configuring Multiple Servers and 87556 Hilton Giesenow Role Types

87557 Hilton Giesenow Windows PowerShell Desired State Configuration: Configuring Similar Sets of Servers

94 DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Exhibit 1 to Addendum 3

By Certification Cert Learning Product Title Exam Asset

87548 Hilton Giesenow Windows PowerShell Desired State Configuration: Configuring the LCM in Pull Mode

87546 Hilton Giesenow Windows PowerShell Desired State Configuration: Configuring the LCM in Push Mode

87538 Hilton Giesenow Windows PowerShell Desired State Configuration: Creating a MOF Using a DSC Script

87550 Hilton Giesenow Windows PowerShell Desired State Configuration: Creating an HTTP Pull Server

87549 Hilton Giesenow Windows PowerShell Desired State Configuration: Creating an SMB Pull Server

87558 Hilton Giesenow Windows PowerShell Desired State Configuration: Dealing with Credentials

87555 Hilton Giesenow Windows PowerShell Desired State Configuration: Dealing with Parameters Windows PowerShell Desired State Configuration: Deploying Resources to Clients via 87554 Hilton Giesenow an HTTP Pull Server Windows PowerShell Desired State Configuration: Examining and Deploying a MOF 87537 Hilton Giesenow File

87539 Hilton Giesenow Windows PowerShell Desired State Configuration: Examining DSC Resources Windows PowerShell Desired State Configuration: Examining System Configuration 87535 Hilton Giesenow Prior to DSC Windows PowerShell Desired State Configuration: Finding; Retrieving; and Using New 87553 Hilton Giesenow Resources

87544 Hilton Giesenow Windows PowerShell Desired State Configuration: Local Configuration Manager

87543 Hilton Giesenow Windows PowerShell Desired State Configuration: Logging with DSC

87536 Hilton Giesenow Windows PowerShell Desired State Configuration: Preparing your Environment for DSC

87545 Hilton Giesenow Windows PowerShell Desired State Configuration: Pull and Push Configuration Modes

87547 Hilton Giesenow Windows PowerShell Desired State Configuration: Querying Node Status

87552 Hilton Giesenow Windows PowerShell Desired State Configuration: Securing an HTTP Pull Server

87540 Hilton Giesenow Windows PowerShell Desired State Configuration: Using Standard Resources

87534 Hilton Giesenow Windows PowerShell Desired State Configuration: What is Desired State Configuration Windows PowerShell Desired State Configuration: Working with Distributed 87542 Hilton Giesenow Dependencies

87541 Hilton Giesenow Windows PowerShell Desired State Configuration: Working with Local Dependencies 41894 Syngress Windows Registry Forensics: Advanced Digital Forensic Analysis of the Windows Publishing Registry 53997 Syngress Windows Server 2012 Security from End to Edge and Beyond: Architecting; Designing; Publishing Planning; and Deploying Windows Server 2012 Security Solutions

92023 Jones and Wireless and Mobile Device Security Bartlett Learning

52938 John Wiley & Wireless Mobile Internet Security; Second Edition Sons (UK)

95 DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Exhibit 1 to Addendum 3

By Certification Cert Learning Product Title Exam Asset 14081 Syngress Wireshark & Ethereal Network Protocol Analyzer Toolkit; Jay Beale's Open Source Publishing Security Series 25446 Syngress XSS Attacks: Cross Site Scripting Exploits and Defense Publishing 56583 Syngress X-Ways Forensics Practitioner’s Guide Publishing 30165 Packt Publishing Zenoss Core Network and System Monitoring: A Step-by-Step Guide to Configuring; Using; and Adapting the Free Open-Source System

96 DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Exhibit 1 to Addendum 3

By Series Series Course Title

Defensive Programming in C/C++ Defensive Coding Fundamentals for C/C++ Defensive Coding for C/C++ Defensive Programming in C# Defensive Coding Fundamentals for C# Defensive Coding for C# Defensive Programming in JavaScript and HTML5 Defensive Coding Fundamentals for JavaScript and HTML5 Defensive Coding for JavaScript and HTML5 Defensive Programming in iOS Thinking Defensively about Functions, Methods, and Input Managing Network Interaction Errors, Exceptions, and Testing Protecting Data in iOS Apps CompTIA Security+ SY0-401 CompTIA Security+ SY0-401: Control Fundamentals and Security Threats CompTIA Security+ SY0-401: Network Protocols, Attacks, and Defenses CompTIA Security+ SY0-401: Creating Secure Networks CompTIA Security+ SY0-401: Vulnerability Assessment and Penetration Testing CompTIA Security+ SY0-401: Authentication, Biometrics, and Security Controls CompTIA Security+ SY0-401: Securing a Networked Environment CompTIA Security+ SY0-401: Remote Access, Mobile, and Wireless Security CompTIA Security+ SY0-401: Cryptographic Methods and Public Key Infrastructures CompTIA Security+ SY0-401: Securing Applications, Virtualization, and the Cloud CompTIA Security+ SY0-401: Continuity, Disaster Recovery, and Computer Forensics CompTIA Mobility+ MB0-001 CompTIA Mobility+ MB0-001: Over The Air Technologies CompTIA Mobility+ MB0-001: Network Infrastructure

CompTIA Mobility+ MB0-001: Mobile Device Management 1 CompTIA Mobility+ MB0-001: Mobile Device Management 2 CompTIA Mobility+ MB0-001: Security CompTIA Mobility+ MB0-001: Troubleshooting 1 CompTIA Mobility+ MB0-001: Troubleshooting 2 Certified Internet Security Auditor (CISA) CISA Domain: The Process of Auditing Information Systems - Part 1 CISA Domain: The Process of Auditing Information Systems - Part 2 CISA Domain: Governance and Management of IT - Part 1 CISA Domain: Governance and Management of IT - Part 2 CISA Domain: IS Acquisition, Development, and Implementation - Part 1 CISA Domain: IS Acquisition, Development and Implementation - Part 2 CISA Domain: IS Operations, Maintenance and Support - Part 1 CISA Domain: IS Operations, Maintenance, and Support - Part 2 CISA Domain: Protection of Information Assets - Part 1

97 DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Exhibit 1 to Addendum 3

By Series Series Course Title

CISA Domain: Protection of Information Assets - Part 2 CISA Domain: IS Acquisition, Development and Implementation - Part 3 Certified Ethical Hacker (CEH) v8 Certified Ethical Hacker (CEH) v8: Hacking and Penetration Testing Certified Ethical Hacker (CEH) v8: Footprinting and Reconnaissance Certified Ethical Hacker (CEH) v8: Network Scanning Certified Ethical Hacker (CEH) v8: Enumeration and Cryptography Certified Ethical Hacker (CEH) v8: System Hacking Certified Ethical Hacker (CEH) v8: Malware Certified Ethical Hacker (CEH) v8: Sniffing Certified Ethical Hacker (CEH) v8: Social Engineering Certified Ethical Hacker (CEH) v8: Denial of Service and Session Hijacking Certified Ethical Hacker (CEH) v8: Hacking Web Servers Certified Ethical Hacker (CEH) v8: Hacking Web Applications Certified Ethical Hacker (CEH) v8: SQL Injection Certified Ethical Hacker (CEH) v8: Hacking Wireless Networks Certified Ethical Hacker (CEH) v8: Hacking Mobile Platforms Certified Ethical Hacker (CEH) v8: Evading IDS, Firewalls, and Honeypots Certified Ethical Hacker (CEH) v8: Buffer Overflow Certified Information Security Manager (CISM) CISM: Information Security Governance (Part 1) CISM: Information Security Governance (Part 2) CISM: Information Security Governance (Part 3) CISM: Information Risk Management and Compliance (Part 1) CISM: Information Risk Management and Compliance (Part 2) CISM: Information Security Program Development and Management (Part 1) CISM: Information Security Program Development and Management (Part 2) CISM: Information Security Program Development and Management (Part 3) CISM: Information Security Program Development and Management (Part 4) CISM: Information Security Program Development and Management (Part 5) CISM: Information Security Incident Management (Part 1) CISM: Information Security Incident Management (Part 2) CompTIA Advanced Security Practitioner CAS-002 CompTIA CASP CAS-002: Cryptography and Enterprise Storage Concerns CompTIA CASP CAS-002: Advanced Network Design, Management, and Controls CompTIA CASP CAS-002: Security Controls for Hosts CompTIA CASP CAS-002: Application Vulnerabilities and Security Controls CompTIA CASP CAS-002: Industry Influences, Risk Planning, Strategy, and Control CompTIA CASP CAS-002: Privacy Policies & Procedures and Incident Recovery CompTIA CASP CAS-002: Research, Analysis and Assessment CompTIA CASP CAS-002: Integration of Computing, Communications, and Disciplines CompTIA CASP CAS-002: Technical Integration of Enterprise Components Microsoft Security Fundamentals Microsoft Security Fundamentals: Security Layers

98 DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Exhibit 1 to Addendum 3

By Series Series Course Title

Microsoft Security Fundamentals: Operating System Security Microsoft Security Fundamentals: Network Security Microsoft Security Fundamentals: Security Software Certified Secure Software Lifecycle Professional (CSSLP) CSSLP: Secure Software Concepts CSSLP: Secure Software Requirements CSSLP: Secure Software Design CSSLP: Secure Software Implementation and Coding CSSLP: Secure Software Testing CSSLP: Software Acceptance, Deployment, Operations, Maintenance, and Disposal CSSLP: Supply Chain and Software Acquisition OWASP Top 10 Introduction to OWASP and the Top 10 OWASP Mitigations for .NET Foundations of Android Security Android Architecture, Protection, and Development Best Practices Android Security Vulnerabilities, Testing, and Enterprise Considerations Foundations of iOS Security iOS Security Architecture and Application Data Protection Securing Against Threats, Securing for Enterprise, and Jailbreaking Devices Cryptography Fundamentals Cryptography Fundamentals: Defining Cryptography Cryptography Fundamentals: Applying Cryptography Securing User Accounts Securing User Accounts: Fundamental Security Concepts Securing User Accounts: Authorization, Registration, and Passwords Securing User Accounts: Logon, Logoff, Account Changes, and Attack Mitigation What's New in CISSP 2015 Changes to CISSP 2015 IINS 2.0: Implementing Cisco IOS Network Security Cisco IINS 2.0: Introducing Networking Security Fundamentals Cisco IINS 2.0: Security Policies and Strategies Cisco IINS 2.0: Cisco Network Foundation Protection Cisco IINS 2.0: Securing the Management Plane and AAA Configuration Cisco IINS 2.0: Securing the Data Plane on Cisco Switches Cisco IINS 2.0: Securing the Data Plane in IPv6 Environments Cisco IINS 2.0: Threat Control, Mitigation, and Firewalls Cisco IINS 2.0: Implementing Firewall Policies Cisco IINS 2.0: Implementing IPS Cisco IINS 2.0: VPN Technologies and Public Key Infrastructure Cisco IINS 2.0: IPsec Fundamentals and VPNs Cisco SENSS 1.0 SENSS 1.0: Secure Design Principles SENSS 1.0: Deploying Cisco IOS Control and Management Plane Security Controls

99 DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Exhibit 1 to Addendum 3

By Series Series Course Title

SENSS 1.0: Deploying Cisco Traffic Telemetry Methods SENSS 1.0: Deploying Cisco IOS Layer 2 and Layer 3 Data Plane Security Controls SENSS 1.0: NAT Deployment on Cisco IOS Software and Cisco ASA SENSS 1.0: Firewall Threat Controls and Basic Cisco ASA Policy Configuration SENSS 1.0: Deploying Advanced Cisco ASA Access Policies SENSS 1.0: Deploying Reputation and Identity-Based Cisco ASA Access Policies SENSS 1.0: Threat Controls Deployment on Cisco IOS Software Cisco SITCS 1.0: Implementing Cisco Threat Control Solutions Cisco SITCS 1.0: Cisco ASA (CX) NGFW Services I Cisco SITCS 1.0: Cisco ASA (CX) NGFW Services II Cisco SITCS 1.0: Cisco Web Security Appliance Cisco SITCS 1.0: Configuring Cisco Web Security Appliance Cisco SITCS 1.0: Cisco Cloud Web Security Cisco SITCS 1.0: Cisco Email Security Appliance Cisco SITCS 1.0: Cisco Intrusion Prevention Systems I Cisco SITCS 1.0: Cisco Intrusion Prevention Systems II Cisco SITCS 1.0: Configuring Cisco Email Security Implementing Cisco Secure Access Solutions (SISAS) 1.0 Cisco SISAS 1.0: Identity Services Overview and 802.1X Cisco SISAS 1.0: EAP and Logging into Cisco Identity Services Engine (ISE) Cisco SISAS 1.0: Cisco ISE Technologies Cisco SISAS 1.0: Certificate-based Authentication and Authorization Cisco SISAS 1.0: Cisco TrustSec, MACsec, and WebAuth Access Cisco SISAS 1.0: Endpoint Access Control Enhancements and Troubleshooting SIMOS 1.0: Implementing Cisco Secure Mobility Solutions SIMOS 1.0: Fundamentals of VPN Technologies and Cryptography SIMOS 1.0: Deploying Secure Site-to-Site Connectivity Solutions (Part 1) SIMOS 1.0: Deploying Secure Site-to-Site Connectivity Solutions (Part 2) SIMOS 1.0: Deploying Cisco IOS Site-to-Site FlexVPN Solutions SIMOS 1.0: Deploying Clientless SSL VPNs SIMOS 1.0: Deploying Cisco AnyConnect VPNs SIMOS 1.0: Clientless SSL VPNs, Endpoint Security, and Dynamic Access Policies Certified Information Systems Security Professional (CISSP) CISSP: Security Principles, Governance, and Guidelines CISSP: Risk Management CISSP: Asset Security CISSP: Security Engineering Part 1 CISSP: Security Engineering Part 2 CISSP: Communication & Network Security Design CISSP: Identity and Access Management CISSP: Security Assessment and Testing CISSP: Security Operations Part 1 CISSP: Security Operations Part 2 CISSP: Security Operations Part 3

100 DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Exhibit 1 to Addendum 3

By Series Series Course Title

CISSP: Software Development Security TOGAF 9.1 TOGAF Fundamentals - Enterprise Architecture Basics TOGAF Fundamentals - Content Framework and Capability Basics Information Security for End Users Introduction to Information Security Using your Desktop Computer and Mobile Devices Safely Using E-mail, the Internet, and Social Media Safely in a Corporate Environment

Certified Cloud Security Professional (CCSP) Cloud System Architecture Concepts and Design Cloud Data Security Cloud System Security - Platform and Infrastructure Cloud Application Security Cloud Service Operaons Management Cloud Service Legal and Compliance

IT Security for End Users IT Security for End Users: IT Security Fundamentals IT Security for End Users: Using Corporate Devices Securely IT Security for End Users: Secure Corporate Communications and Networking

Oracle Oracle Database 12c: High Availability and Database Management Oracle Database 12c – Administration: The Network Environment and User Security Oracle Database 11g Release 2: Storage Structures and User Security Oracle Database 11g: Securing Domain and Data in Oracle Secure Backup Oracle Database 11g: Database Security Oracle Database 11g: Basic User and Strong Authentication Oracle Database 11g: Enterprise User Security and Proxy Authentication Oracle Database 11g Release 2: Oracle Partitioning and Security Features Oracle Database 11g Release 2: Oracle Scheduler and Secure Backup

Oracle SOA Suite 11g: SOA Security and Adoption Planning

Defensive Programming in Android Defensive Programming in Android: Input and Methods

Defensive Programming in Android: Using Standards

Defensive Programming in Android: Errors, Exceptions, and Testing

Defensive Programming in Android: Network Access and Java Defensive Techniques

Additional Titles

101 DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Exhibit 1 to Addendum 3

By Series Series Course Title

Access Control in Windows Server 2008 R2

Advanced Windows Store Apps with C# in Visual Studio 2013: Security & Optimizing

Application Design and Security in SharePoint 2010 Authentication, Authorization, and App Deployment

Cisco DESGN 2.1: Defining Network Security

Cisco DESGN 2.1: Security Solutions for the Network CompTIA A+ 220-802: Security and Data Disposal CompTIA Network+ N10-006: Network Security Configuring Web Services and Security in Windows Server 2008 Designing Data Security and High Availability in Microsoft Windows Server 2008 E-mail and Security in Linux

Exchange Server 2010 SP1: Transport Rules, Message Compliance and Security

ICND1 2.0: Managing Network Device Security

Linux Security Microsoft Advanced Windows Store App Development with HTML5: Data and Security

Microsoft Exchange Server 2013 - Core Solutions: Access Control

Microsoft SharePoint Server 2013 - Core Solutions: Security and Taxonomy

Microsoft SharePoint Server 2013 - Developing Core Solutions: Implement Security

Microsoft SQL Server 2012: Security Management

Microsoft Windows 8.1 - Configuring: Remote Management and Security

Microsoft Windows 8.1 - Supporting Windows 8.1: Data Storage and Security

Microsoft Windows 8.1 - Supporting Windows 8.1: Recovery and Endpoint Security

Microsoft Windows Server 2012 R2 - Administration: File Services and Encryption Microsoft Windows Server 2012 R2 - Installing and Configuring: Security Microsoft Windows Server 2012 R2: Server Infrastructure - IPAM and VPN Microsoft Windows Server 2012 R2: Server Infrastructure - Network Protection

Microsoft Windows Store App Essentials with HTML5: Security

Network Access Security in Windows Server 2008 Patch Management and Securing and Monitoring Servers in Windows Server 2008

Programmatically Working with Permissions and BCS in SharePoint 2010

Programming in C#: Debugging and Security Implementation

102 DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Exhibit 1 to Addendum 3

By Series Series Course Title

Protecting Windows 7 Against Malware and Vulnerabilities

Securing .NET Programming Securing and Deploying WPF Applications with Visual Basic 2010

Securing and Managing a WCF 4 Application with C# 2010 Securing and Managing a WCF 4 Application with Visual Basic 2010

SharePoint 2010 SP1: Authentication and Web Application Security Configuration

Sharepoint 2010 SP1: Designing Security

SQL Server 2008 R2: Security Management VMware vSphere 5 - Part 2: vSphere Security Windows PowerShell Desired State Configuration Fundamentals

103 DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Exhibit 1 to Addendum 3

Business Professional Foundations KnowledgeCenter The Business Professional Foundations KnowledgeCenter includes the following roadmaps To focus on personal workplace skills, start here Communication Basics Business Writing: Know Your Readers and Your Purpose Business Writing: How to Write Clearly and Concisely Business Writing: Editing and Proofreading Using E-mail and Instant Messaging Effectively Addressing and Redistributing E-mail Managing Your E-mail Essential Skills for Professional Telephone Calls Business Communication Interpersonal Communication that Builds Trust Communication Methods that Make Sense – and Make Your Point Being a Receptive Communication Partner Communication Challenges: Navigating Choppy Waters

Listening Essentials: The Basics of Listening Listening Essentials: Improving Your Listening Skills Basic Presentation Skills: Planning a Presentation Basic Presentation Skills: Creating a Presentation Basic Presentation Skills: Delivering a Presentation The Impact of Situation and Style When Communicating with Diplomacy and Tact Strategies for Communicating with Tact and Diplomacy Delivering a Difficult Message with Diplomacy and Tact Professional Networking Essentials: Finding Opportunities To Make Connections Professional Networking Essentials: Developing Confidence Critical Thinking Introduction to Workplace Ethics Developing a Code of Ethical Conduct Ethical Decision-making in the Workplace Framing the Problem Generating and Evaluating Alternatives Smart Selection, Planned Implementation Coming to Terms with Assumptions Getting Your Arms around Arguments Drawing Conclusions with Confidence Conflict and Anger Management Owning Your Emotions Building Self-Management Skills Being Aware of the Emotions of Others Applying Emotional Intelligence at Work Preventing Unhealthy Workplace Conflict Working Out and Through Conflict Adapting Your Conflict Style Anger Management Essentials: Understanding Anger Anger Management Essentials: Managing and Controlling Anger Personal Development Time Management: Too Much to Do and Too Little Time Time Management: Quit Making Excuses and Make Time Instead Time Management: Ready, Set…FOCUS!

104 DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Exhibit 1 to Addendum 3

Business Professional Foundations KnowledgeCenter The Business Professional Foundations KnowledgeCenter includes the following roadmaps Optimizing Your Work/Life Balance: Analyzing Your Life Balance Optimizing Your Work/Life Balance: Maintaining Your Life Balance Optimizing Your Work/Life Balance: Taking Control of Your Stress Building Trust Rebuilding Trust American Work Culture and Values Key Aspects of the American Work Environment Communicating Successfully in the American Workplace Succeeding in the American Workplace The Value of Peer Relationships Developing Strategic Peer Relationships in Your Organization Forming Peer Relationships and Alliances at Work Campus to Corporate: Meeting New Expectations Campus to Corporate: Developing a Professional Image Developing Your Reputation of Professionalism with Business Etiquette Professionalism, Business Etiquette, and Personal Accountability Communicating with Professionalism and Etiquette Using Business Etiquette to Build Professional Relationships Leading Organizational Change The Keys to Sustainable Change Planning for Change Implementing and Sustaining Change Instituting a Quality Improvement Program Optimizing Your Performance on a Team Being an Effective Team Member Establishing Team Goals and Responsibilities Elements of a Cohesive Team Effective Team Communication Using Feedback to Improve Team Performance Business Grammar Basics Business Grammar: Parts of Speech Business Grammar: Working with Words Business Grammar: The Mechanics of Writing Business Grammar: Punctuation Business Grammar: Sentence Construction Business Grammar: Common Usage Errors Fundamentals of Working with Difficult People Working with Difficult People: Identifying Difficult People Working with Difficult People: How to Work with Aggressive People Working with Difficult People: How to Work with Negative People Working with Difficult People: How to Work with Procrastinators Working with Difficult People: How to Work with Manipulative People Working with Difficult People: How to Work with Self-serving People Working with Difficult People: Dealing with Micromanagers Interviewing strategies (for interviewee) Preparing for an Internal Interview Making a Positive Impression in an Internal Interview Perseverance and Resilence Developing Character for Perseverance and Resilience

105 DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Exhibit 1 to Addendum 3

Business Professional Foundations KnowledgeCenter The Business Professional Foundations KnowledgeCenter includes the following roadmaps Achieving Goals through Perseverance and Resilience Bouncing Back with Perseverance and Resilience Decisiveness Developing Character for Decisiveness Overcoming the Barriers to Decisiveness Personal Productivity Improvement Personal Productivity Improvement: Managing Your Workspace Personal Productivity: Self-organization and Overcoming Procrastination Personal Productivity Improvement: Managing Tasks and Maximizing Productivity

To focus on specific professional skills, start here Roadmap Title Course Title Project Management Managing Projects within Organizations (PMBOK® Guide Fifth Edition) Project Management Overview (PMBOK® Guide Fifth Edition) Creating and Designing a Project Get Your Project off the Ground Plan a Bulletproof Project Lead Your Project like a Pro Complete Your Project On-time and On-budget Customer Service Fundamentals Customer Service Fundamentals: Building Rapport in Customer Relationships Customer Service in the Field Customer Service over the Phone Internal Customer Service Customer Service Confrontation and Conflict Shaping the Direction of Customer Service in Your Organization Microsoft Office 2010 Office 2010 New Core Features New Messaging and Collaboration Features in Office 2010 Office 2010 Web Apps and New Publisher and Mobile Features Word 2010, Excel 2010, and the New Office 2010 Interface Outlook 2010 and Collaboration in Office 2010 New Features for PowerPoint, Publisher, and Access in Office 2010 SharePoint 2010 New Features for End Users Microsoft Office 2013 Performing Basic Tasks in Word 2013 Creating Workbooks, Worksheets, and Data in Excel 2013 Working with E-mail in Outlook 2013 Creating Presentations in PowerPoint 2013 Navigating, Lists, Libraries, Alerts, and Document Sets in SharePoint 2013 Getting Started with Microsoft OneNote 2013

Basic Business Math Basic Business Math: Using Whole Numbers and Decimals Basic Business Math: Percentages and Ratios Basic Business Math: Averages and Equations Basic Business Math: Charts and Graphs Public Speaking Strategies

106 DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Exhibit 1 to Addendum 3

Business Professional Foundations KnowledgeCenter The Business Professional Foundations KnowledgeCenter includes the following roadmaps Public Speaking Strategies: Preparing Effective Speeches Public Speaking Strategies: Confident Public Speaking Performance under Pressure Developing the Right Attitude for Performing under Pressure Taking Action for Performing under Pressure Performing with Others under Pressure Writing Under Pressure Writing under Pressure: Preparing for Success Writing under Pressure: The Writing Process

To focus on management and leadership fundamentals, start here Roadmap Title Course Title Leadership Essentials Leadership Essentials: Motivating Employees Leadership Essentials: Communicating Vision Leadership Essentials: Building Your Influence as a Leader Leadership Essentials: Leading with Emotional Intelligence Leadership Essentials: Leading Business Execution Leadership Essentials: Leading Innovation Leadership Essentials: Leading Change Leadership Essentials: Creating Your Own Leadership Development Plan Getting Results Without Authority Getting Results without Authority: Building Relationships and Credibility Getting Results without Authority: Persuasive Communication Getting Results without Direct Authority: Reciprocity Getting Results without Direct Authority: Influencing Your Boss First Time Manager Essentials First Time Manager: Understanding a Manager's Role First Time Manager: Challenges First Time Manager: Meeting Expectations Accounting Fundamentals Basic Accounting Principles and Framework The Accounting Equation and Financial Statements The Accounting Cycle and Accrual Accounting Accounting Transactions and Books of Account Trial Balance & Adjusting Entries The Income Statement The Balance Sheet The Cash Flow Statement Accounting for Companies' Stock Transactions and Dividends

Additional Assets Business Impact Series Course Title Building Trust Incrementally Prioritizing Personal and Professional Responsibilities Managing the Stress of Organizational Change Listening to Improve Conversations Personal Conflict Styles The Dangers of Multitasking

107 DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Exhibit 1 to Addendum 3

Business Professional Foundations KnowledgeCenter The Business Professional Foundations KnowledgeCenter includes the following roadmaps Perseverance: Flexibility in Action Rebuilding Trust Do You Share Your Organization’s Values? Handling Difficult Questions as a Presenter Coping with Aggressive Behavior in the Workplace Beyond Change: Working with Agility Peer Political Styles Making Yourself Approachable Writing for Business Blame Backfires – Conquer Negative Thinking Effective Critical Analysis of Business Reports Playing the Devil's Advocate in Decision Making Mediating Project Team Conflict Effective Body Language in Negotiations Planning for Interruptions Helps with Procrastination Facilitating Work-related Conflict Discussions Criticism in Context Preparing for Your Performance Appraisal Making Meetings Work Conquering Career Stagnation Communicating with a Cross-cultural Audience Managing Projects without Direct Authority Managing Scope on a Project Anticipating and Solving Problems as a Project Champion Selling to Key Players Listening to Your Customers Are you listening to your customers (Role of VOC in Six Sigma) Broadening Your Learning Horizons

Challenge Series Course Title Uncovering the Root Problem Demonstrating Accountability in a Crisis Situation Setting and Managing Priorities Critical Thinking Managing Goals Effective Listening Creating Work/Life Balance Developing Your Career Listening with Skill Solving Problems: Process, Tools, and Techniques Managing Conflict Coping with Conflicting Priorities Giving Feedback to Coworkers Setting Goals Building and Managing Upward Relationships Developing Your Customer Focus Contributing in a Team Environment Reacting to Co-workers Who Try Taking Advantage Office Politics - What Will You Do?

108 DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Exhibit 1 to Addendum 3

Business Professional Foundations KnowledgeCenter The Business Professional Foundations KnowledgeCenter includes the following roadmaps Choosing the Right Team Culture Persevering through Setbacks Planning Your Career Emotional Intelligence at Work The Ethics Enigma Self Development Creativity: Developing and Communicating Ideas The Fruits of Integrity: Building Trust at Work Asserting yourself in the Workplace Getting Ready to Present Building Better Relationships through Understanding Building Peer Relationships Getting Time Under Control Contributing to Organizational Agility Written Communication Targeting Personal Learning Applying Your Best Thinking Meeting the Challenge of Workplace Conflict Decisions: Making the Right Move

Feature Topic Monthly Featured Topic Subject Leveraging Social and Communication Skills Communicating with Diplomacy and Tact Communicating Professionally in Person Assessing Your Work/Life Balance

Archive Problem Solving: The Fundamentals Problem Solving: Determining and Building Your Strengths Problem Solving: Digging Deeper Decision Making: The Fundamentals Decision Making: Tools and Techniques Decision Making: Making Tough Decisions

Critical Thinking Essentials: What Is Critical Thinking? Critical Thinking Essentials: Applying Critical Thinking Skills

What is Emotional Intelligence? Improving Your Emotional Intelligence Skills: Self-awareness and Self-management Using Emotional Intelligence on the Job

Workplace Conflict: Recognizing and Responding to Conflict Workplace Conflict: Strategies for Resolving Conflicts

Targeted Books Publisher Title A & C Black Dictionary of Business, Fourth Edition AMACOM The New Manager's Tool Kit: 21 Things You Need to Know to Hit the Ground Running

109 DocuSign Envelope ID: EE9F5EEA-1255-4677-8681-9D29B7804A8D

Exhibit 1 to Addendum 3

Business Professional Foundations KnowledgeCenter The Business Professional Foundations KnowledgeCenter includes the following roadmaps

AMACOM Customer Service Training 101, Second Edition AMACOM Results Without Authority: Controlling a Project When the Team Doesn’t Report to You, Second Edition AMACOM Innovation at Work: 55 Activities to Spark Your Team’s Creativity Cambridge University Press Business Ethics as Practice: Ethics as the Everyday Business of Business Career Press Don’t Take the Last Donut: New Rules of Business Etiquette Center for Creative Leadership Feedback to Managers: A Guide to Reviewing and Selecting Multirater Instruments for Leadership Development, Fourth Edition Gower Publishing Limited Creating Healthy Workplaces: Stress Reduction, Improved Well-being, and Organizational Effectiveness Emerald Group Publishing Advances in Strategic Management: Finance and Strategy

John Wiley & Sons Communication in the Workplace John Wiley & Sons Office 2007 Bible John Wiley & Sons Outlook 2010 All-in-One For Dummies John Wiley & Sons Effective Project Management: Traditional, Agile, Extreme, 7th Edition John Wiley & Sons The Personal Business Plan: A Blueprint for Running Your Life Jossey-Bass So Smart But...: How Intelligent People Lose Credibility: and How They Can Get it Back Jossey-Bass The 85% Solution: How Personal Accountability Guarantees Success: No Nonsense, No Excuses Kogan Page Make Your Brain Work: How to Maximize Your Efficiency, Productivity and Effectiveness Kogan Page How to Organize Yourself: Creating Success, Fourth Edition Marshall Cavendish Surviving Office Politics: Succeeding in the Competitive Jungle Taylor and Francis Managing Cultural Differences: Global Leadership Strategies for Cross-Cultural Business Success, Eighth Edition

110