ON-DEMAND TRAINING:  
Build your risk-based vulnerability program
Contact Us
Talk to an Expert
Request a demo

Earn (ISC)² Credit With Kenna Education

Jan 26, 2021
Kenna Security

Share with Your Network

We’re all too familiar with the shortage of cybersecurity talent. That’s why it’s fortunate that there are a number of educational paths to becoming a security professional and advancing one’s career in security. Included in that number is obtaining a security certification, such as the Certified Information Systems Systems Security Professional (CISSP) certification or another certification from (ISC)². 

To help practitioners with these certifications and their ongoing education, beginning in December 2020, Kenna was added to the short list of partner organizations whose educational content offers (ISC)² CPE credit. 

What’s (ISC)² certification and why is CPE credit important? 

(ISC)² is described as, “an international, nonprofit membership association for information security leaders.” The organization is designed to help members and associates keep abreast of current cyber trends, further hone their expertise, and earn Continuing Professional Education (CPE) credits. Their certification programs, such as CISSP, are the industry standard. Now, CISSP-certified practitioners can look to Kenna to get the CPE credits they need to maintain their certifications. 

If you’re not already familiar with (ISC)² and their certification programs, here a few additional resources:

Kenna makes CPE credits easy

To earn CPE credits through Kenna Security’s educational content, all you have to do is look for the (ISC)² logo, and add your (ISC)² number when you sign up to attend one of our qualified events. We take it from there and submit your information to (ISC)² for credit. The process from sign-up to credit received can take a few weeks so patience is encouraged. However, there are quite a few options to get started with: 

Kenna Security virtual events:

Our virtual Kenna Katalyst training on how to set-up your very own risk-based vulnerability management program will net 1 hour of CPE credit. Sign up for the on-demand training today

Kenna Security webinars:

Head to our webinars page and look for the (ISC)² logo on the webinar image card (and/or a note about CPE accreditation in the copy). 

Kenna Security podcasts:

Through our blog page, you can find links to our Security Science podcasts. For those podcasts that qualify, you will find a registration form where you can submit your information and (ISC)² number. 

Share with Your Network

Vulnerability Management is Difficult

Join us for an on-demand educational series designed to shift your vulnerability management focus to risk, featuring six steps to set up your own program.

REGISTER NOW

Read the Latest Content

Risk-Based Vulnerability Management

Analysts Agree: Risk-Based Vulnerability Management a Priority for 2021

Taking a risk-based approach to vulnerability management has always been our priority, and lately the industry has followed suit. Now in a new blog listing Gartner’s Top 10 Security Projects for 2020-2021, it’s clear that Gartner thinks it should be a priority for you, too. For a sense of why RBVM is a top priority…

READ MORE
Vulnerability Management

11 Tips for Choosing a Vulnerability Management Solution

“These tips go to 11.” – Nigel Tufnel It can be daunting to choose between vulnerability management (VM) solutions when all vendors describe their offerings in very similar ways. So making the best choice for you means identifying what your organization needs, and ensuring the solutions you’re evaluating meet those needs. It’s safe to say…

READ MORE
Risk-Based Vulnerability Management

What is Modern Vulnerability Management?

Modern vulnerability management is an orderly, systematic, and data-driven approach to enterprise vulnerability management. It leverages full visibility into a technology stack to target the riskiest vulnerabilities, enabling companies to adhere to designated SLA’s, respond to threats rapidly, and have meaningful discussions about organizational risk tolerance. Got that? Let’s unpack it.  To understand what modern…

READ MORE
FacebookLinkedInTwitterYouTube

© 2021 Kenna Security. All Rights Reserved. Privacy Policy.