Joint purple 3 FINAL

Earn Your CPE Credits with Abnormal

You can now earn CPE credits by viewing our cybersecurity on-demand webinars, which will provide insight into the latest trends and help you develop new skillsets.

March 25, 2022

Earning a cybersecurity certification is one of the best ways to accelerate your career, validating your experience and unlocking a variety of exclusive resources and networking opportunities. For information security professionals, the Certified Information Security Systems Professional, or CISSP, is one of the most sought-after professional certifications. Since it was first introduced in 1994 by (ISC)², an international, nonprofit membership association and arguably the world’s leading cybersecurity professional organization, more than 140,000 professionals have completed the certification.


Those who complete the certification program must continue expanding their skillset with continuing education credits. Abnormal is proud to partner with (ISC)² to provide opportunities for you to complete those credits as an official CPE Partner.

Earn (ISC)² CPE Credits in Email Security

To maintain your (ISC)² certification, you must earn a certain number CPE credits each year, and now Abnormal can help. You can now earn CPE credits by viewing our cybersecurity on-demand webinars, which will provide insight into the latest trends and help you develop new skillsets.

Check out one of our most recent webinars to start earning CPE credits today.

CISO Fireside Chats

The Email Threat Landscape

Threat Intelligence

Once you watch the webinar, fill out this form to receive your CPE credits.

We look forward to continuing to provide you opportunities to earn your credits for (ISC)². Keep an eye on our events page for updates on upcoming opportunities to learn with Abnormal.

Image

Prevent the Attacks That Matter Most

Get the Latest Email Security Insights

Subscribe to our newsletter to receive updates on the latest attacks and new trends in the email threat landscape.

0
Demo 2x 1

See the Abnormal Solution to the Email Security Problem

Protect your organization from the attacks that matter most with Abnormal Integrated Cloud Email Security.

Related Posts

B 10 3 22 Cobalt Terrapin Blog
Threat group Cobalt Terrapin uses sophisticated impersonation techniques with multiple steps to commit invoice fraud.
Read More
B 09 29 22 CISO Cybersecurity Awareness Month
October is here, which means Cybersecurity Awareness Month is officially in full swing! These five tips can help security leaders take full advantage of the month.
Read More
B Email Security Challenges Blog 09 26 22
Understanding common email security challenges caused by your legacy technology will help you determine the best solution to improve your security posture.
Read More
B 5 Crucial Tips
Retailers are a popular target for threat actors due to their wealth of customer data and availability of funds. Here are 5 cybersecurity tips to help retailers reduce their risk of attack.
Read More
B 3 Essential Elements
Legacy approaches to managing unwanted mail are neither practical nor scalable. Learn the 3 essential elements of modern, effective graymail management.
Read More
B Back to School
Discover how threat group Chiffon Herring leverages impersonation and spoofed email addresses to divert paychecks to mule accounts.
Read More
B 09 06 22 Rearchitecting a System Blog
We recently shared a look at how the Abnormal engineering team overhauled our Unwanted Mail service architecture to accommodate our rapid growth. Today, we’re diving into how the team migrated traffic to the new architecture—with zero downtime.
Read More
B Industry Leading CIS Os
Stay up to date on the latest cybersecurity trends, industry news, and best practices by following these 12 innovative and influential thought leaders on social media.
Read More
B Podcast Engineering 11 08 24 22
In episode 11 of Abnormal Engineering Stories, David Hagar, Director of Engineering and Abnormal Head of UK Engineering, continues his conversation with Zehan Wang, co-founder of Magic Pony.
Read More