chat
expand_more

Earn Your CPE Credits with Abnormal

Earn your continuing education credits with ISC2 by viewing cybersecurity content from Abnormal Security.
June 13, 2024

Earning a cybersecurity certification is one of the best ways to accelerate your career, validating your experience and unlocking a variety of exclusive resources and networking opportunities. For information security professionals, the Certified Information Security Systems Professional, or CISSP, is one of the most sought-after professional certifications.

Since it was first introduced in 1994 by ISC2, an international, nonprofit membership association and arguably the world’s leading cybersecurity professional organization, more than 140,000 professionals have completed the certification. But once you complete the certification, your work isn’t done!

ISC2 requires its members to continue expanding their skill sets each year by acquiring continuing education credits. Abnormal has proudly partnered with ISC2 to provide opportunities to do so for the past two years, and we’re excited to announce that we’re continuing this initiative as an official CPE Partner.

Earn Your ISC2 CPE Credits in Email Security and AI

Much of our content is available for continuing education credits, as each asset or webinar provides insight into the latest trends and evolving threat landscape.

Check out one of our most recent content assets to get started earning your credits today.

The Convergence of Cybersecurity and AI

The Impact of AI on Email Security

The Evolving Threat Landscape: Moving Beyond Inbound Email Attacks

Once you watch the webinar or read the report, you can fill out this form to receive your ISC2 credits.

We look forward to continuing to provide you with opportunities to earn your credits! Keep an eye on our events page and our Resource Center for additional ways to learn with Abnormal.

Earn Your CPE Credits with Abnormal

See Abnormal in Action

Get a Demo

Get the Latest Email Security Insights

Subscribe to our newsletter to receive updates on the latest attacks and new trends in the email threat landscape.

Discover How It All Works

See How Abnormal AI Protects Humans

Related Posts

B HTML and Java Script Phishing
Explore real phishing attacks that use HTML and JavaScript to bypass defenses and learn what makes these emails so hard to detect.
Read More
B Custom Phishing Kits Blog
Brand-specific phishing kits are replacing generic templates. Learn how these custom phishing kits enable sophisticated impersonation attacks.
Read More
B Healthcare
Discover how healthcare security leaders are defending against AI-powered threats. Learn why identity and email are the new frontlines—and what it takes to protect the human element.
Read More
10 Questions to Evaluate CES Cover
Explore 10 key questions to evaluate cloud email security solutions and uncover how AI-native behavioral intelligence can stop today’s most advanced email threats.
Read More
B Scattered Spider
Attacks rarely come through the front door anymore, and today’s actors use normal-sounding communications from legitimate suppliers as entry points. Behavioural AI can spot wider anomalies that legacy defences miss.
Read More
Reclaim the Inbox Cover pptx
Email overload is draining focus, frustrating employees, and distracting from real threats. See how Abnormal restores productivity by removing graymail at scale.
Read More