chat
expand_more

Earn Your CPE Credits with Abnormal

Earn your continuing education credits with ISC2 by viewing cybersecurity content from Abnormal Security.
June 13, 2024

Earning a cybersecurity certification is one of the best ways to accelerate your career, validating your experience and unlocking a variety of exclusive resources and networking opportunities. For information security professionals, the Certified Information Security Systems Professional, or CISSP, is one of the most sought-after professional certifications.

Since it was first introduced in 1994 by ISC2, an international, nonprofit membership association and arguably the world’s leading cybersecurity professional organization, more than 140,000 professionals have completed the certification. But once you complete the certification, your work isn’t done!

ISC2 requires its members to continue expanding their skill sets each year by acquiring continuing education credits. Abnormal has proudly partnered with ISC2 to provide opportunities to do so for the past two years, and we’re excited to announce that we’re continuing this initiative as an official CPE Partner.

Earn Your ISC2 CPE Credits in Email Security and AI

Much of our content is available for continuing education credits, as each asset or webinar provides insight into the latest trends and evolving threat landscape.

Check out one of our most recent content assets to get started earning your credits today.

The Convergence of Cybersecurity and AI

The Impact of AI on Email Security

The Evolving Threat Landscape: Moving Beyond Inbound Email Attacks

Once you watch the webinar or read the report, you can fill out this form to receive your ISC2 credits.

We look forward to continuing to provide you with opportunities to earn your credits! Keep an eye on our events page and our Resource Center for additional ways to learn with Abnormal.

Earn Your CPE Credits with Abnormal

See Abnormal in Action

Get the Latest Email Security Insights

Subscribe to our newsletter to receive updates on the latest attacks and new trends in the email threat landscape.

Discover How It All Works

See How Abnormal AI Protects Humans

Related Posts

B FBI IC3 2024 Report Blog
The 2024 FBI IC3 Report confirms BEC remains a top cyber threat, driving billions in losses alongside crypto-enabled investment scams.
Read More
B Byte Dance Live Panel Blog
With live session hijacking, OTP interception, and dynamic targeting, the ByteDance Live Panel phishing-as-a-service kit gives attackers the upper hand against traditional defenses.
Read More
B MKT849 Open graphs for Fed Ramp Authorization news Blog
Discover what Abnormal AI’s FedRAMP Moderate Authorization means for the public sector.
Read More
B 1500x1500 Open Graph Images AI Innovation Blog
Learn how Abnormal leverages the latest AI developer tools to slash engineering time and streamline internal operations.
Read More
B DKIM Replay Google Phishing Attack
Threat actors used DKIM replay to send Google-branded phishing emails that passed authentication checks. Here’s how the attack worked and why it’s hard to catch.
Read More
B 1500x1500 MKT834 Abnormal AI Blog
Discover why Abnormal Security is rebranding to Abnormal AI as the company continues its mission to protect humans from cybercrime.
Read More