chat
expand_more

Earn Your CPE Credits with Abnormal

Earn your continuing education credits with ISC2 by viewing cybersecurity content from Abnormal Security.
June 13, 2024

Earning a cybersecurity certification is one of the best ways to accelerate your career, validating your experience and unlocking a variety of exclusive resources and networking opportunities. For information security professionals, the Certified Information Security Systems Professional, or CISSP, is one of the most sought-after professional certifications.

Since it was first introduced in 1994 by ISC2, an international, nonprofit membership association and arguably the world’s leading cybersecurity professional organization, more than 140,000 professionals have completed the certification. But once you complete the certification, your work isn’t done!

ISC2 requires its members to continue expanding their skill sets each year by acquiring continuing education credits. Abnormal has proudly partnered with ISC2 to provide opportunities to do so for the past two years, and we’re excited to announce that we’re continuing this initiative as an official CPE Partner.

Earn Your ISC2 CPE Credits in Email Security and AI

Much of our content is available for continuing education credits, as each asset or webinar provides insight into the latest trends and evolving threat landscape.

Check out one of our most recent content assets to get started earning your credits today.

The Convergence of Cybersecurity and AI

The Impact of AI on Email Security

The Evolving Threat Landscape: Moving Beyond Inbound Email Attacks

Once you watch the webinar or read the report, you can fill out this form to receive your ISC2 credits.

We look forward to continuing to provide you with opportunities to earn your credits! Keep an eye on our events page and our Resource Center for additional ways to learn with Abnormal.

Earn Your CPE Credits with Abnormal

See Abnormal in Action

Get a Demo

Get the Latest Email Security Insights

Subscribe to our newsletter to receive updates on the latest attacks and new trends in the email threat landscape.

Discover How It All Works

See How Abnormal AI Protects Humans

Related Posts

B VEC Employee Engagement Threat Report Blog 1
New research reveals that employees engage with 44% of read vendor email compromise attacks. See which industries and roles are most vulnerable to this threat.
Read More
B 1500x1500 MKT889c Forrester Wave
Abnormal AI received the highest scores possible in the Innovation and Roadmap criteria, the top score in the Strategy category, and above-average customer feedback.
Read More
B SEG 5 27 25
Traditional secure email gateways once defined email security. Today, they’re struggling to catch the final—and most dangerous—1% of attacks.
Read More
Cover pptx
Discover how Abnormal Security leverages AI tools like Cursor and Model Context Protocol (MCP) in production to accelerate development.
Read More
B Convergence
Explore key takeaways from Season 4 of Convergence, covering how malicious AI is reshaping cybercrime, why human behavior remains a core vulnerability, and what evolving AI policy means for defenders.
Read More
B Social Engineering
Today’s targeted cyber attacks are so formidable that legacy defences can’t stop them, and even savvy professionals are being fooled. These examples show how sophisticated they’ve become.
Read More