chat
expand_more

Earn Your CPE Credits with Abnormal

Earn your continuing education credits with ISC2 by viewing cybersecurity content from Abnormal Security.
June 13, 2024

Earning a cybersecurity certification is one of the best ways to accelerate your career, validating your experience and unlocking a variety of exclusive resources and networking opportunities. For information security professionals, the Certified Information Security Systems Professional, or CISSP, is one of the most sought-after professional certifications.

Since it was first introduced in 1994 by ISC2, an international, nonprofit membership association and arguably the world’s leading cybersecurity professional organization, more than 140,000 professionals have completed the certification. But once you complete the certification, your work isn’t done!

ISC2 requires its members to continue expanding their skill sets each year by acquiring continuing education credits. Abnormal has proudly partnered with ISC2 to provide opportunities to do so for the past two years, and we’re excited to announce that we’re continuing this initiative as an official CPE Partner.

Earn Your ISC2 CPE Credits in Email Security and AI

Much of our content is available for continuing education credits, as each asset or webinar provides insight into the latest trends and evolving threat landscape.

Check out one of our most recent content assets to get started earning your credits today.

The Convergence of Cybersecurity and AI

The Impact of AI on Email Security

The Evolving Threat Landscape: Moving Beyond Inbound Email Attacks

Once you watch the webinar or read the report, you can fill out this form to receive your ISC2 credits.

We look forward to continuing to provide you with opportunities to earn your credits! Keep an eye on our events page and our Resource Center for additional ways to learn with Abnormal.

Earn Your CPE Credits with Abnormal

See Abnormal in Action

Get a Demo

Get the Latest Email Security Insights

Subscribe to our newsletter to receive updates on the latest attacks and new trends in the email threat landscape.

Discover How It All Works

See How Abnormal AI Protects Humans

Related Posts

B DKIM Replay Google Phishing Attack
Threat actors used DKIM replay to send Google-branded phishing emails that passed authentication checks. Here’s how the attack worked and why it’s hard to catch.
Read More
B 1500x1500 MKT834 Abnormal AI Blog
Discover why Abnormal Security is rebranding to Abnormal AI as the company continues its mission to protect humans from cybercrime.
Read More
B Pig Butchering
Learn about pig butchering fraud, a new threat to organizational security. Explore operational tactics, warning signs, and strategies to safeguard your business.
Read More
B Gamma Attack Story Blog
Attackers exploit Gamma in a multi-stage phishing attack using Cloudflare Turnstile and AiTM tactics to evade detection and steal Microsoft credentials.
Read More
B Proofpoint Customer Story 16
With Abnormal’s behavioral AI, a top healthcare solutions provider addressed gaps left by Proofpoint, automated workflows, and saved 335 SOC hours monthly.
Read More
B Phishing Australia
Attackers rely on the trust currency of corporate email to launch highly personalised phishing attacks. Luckily, a revolution in email security means humans are no longer the last line of defence.
Read More