chat
expand_more

Earn Your CPE Credits with Abnormal

You can now earn CPE credits by viewing our cybersecurity on-demand webinars, which will provide insight into the latest trends and help you develop new skillsets.
March 25, 2022

Earning a cybersecurity certification is one of the best ways to accelerate your career, validating your experience and unlocking a variety of exclusive resources and networking opportunities. For information security professionals, the Certified Information Security Systems Professional, or CISSP, is one of the most sought-after professional certifications. Since it was first introduced in 1994 by (ISC)², an international, nonprofit membership association and arguably the world’s leading cybersecurity professional organization, more than 140,000 professionals have completed the certification.


Those who complete the certification program must continue expanding their skillset with continuing education credits. Abnormal is proud to partner with (ISC)² to provide opportunities for you to complete those credits as an official CPE Partner.

Earn (ISC)² CPE Credits in Email Security

To maintain your (ISC)² certification, you must earn a certain number CPE credits each year, and now Abnormal can help. You can now earn CPE credits by viewing our cybersecurity on-demand webinars, which will provide insight into the latest trends and help you develop new skillsets.

Check out one of our most recent webinars to start earning CPE credits today.

CISO Fireside Chats

The Email Threat Landscape

Threat Intelligence

Once you watch the webinar, fill out this form to receive your CPE credits.

We look forward to continuing to provide you opportunities to earn your credits for (ISC)². Keep an eye on our events page for updates on upcoming opportunities to learn with Abnormal.

Earn Your CPE Credits with Abnormal

See Abnormal in Action

Get a Demo

Get the Latest Email Security Insights

Subscribe to our newsletter to receive updates on the latest attacks and new trends in the email threat landscape.

 

See the Abnormal Solution to the Email Security Problem

Protect your organization from the full spectrum of email attacks with Abnormal.

 
Integrates Insights Reporting 09 08 22

Related Posts

B 1500x1500 Adobe Acrobat Sign Attack Blog
Attackers attempt to steal sensitive information using a fraudulent electronic signature request for a nonexistent NDA and branded phishing pages.
Read More
B 4 15 24 RBAC
Discover how a security-driven RBAC design pattern allows Abnormal customers to maximize their user setup with minimum hurdles.
Read More
B 4 10 24 Zoom
Learn about the techniques cybercriminals use to steal Zoom accounts, including phishing, information stealers, and credential stuffing.
Read More
Social Images for next Cyber Savvy Blog
Explore how Alex Green, the CISO of Delta Dental, safeguards over 80 million customers against modern cyber threats, and gain valuable insights into the cybersecurity landscape.
Read More
B Images for EDB Blog from Sanjay
Abnormal is excited to announce the establishment of a strategic partnership with the Singapore Economic Development Board (EDB).
Read More
B Automotive Data Blog
Research reveals the automotive industry has become a popular target for business email compromise and vendor email compromise attacks. Learn why.
Read More