Earn (ISC)² Credit With Kenna Education

Jan 26, 2021
Kenna Security

Share with Your Network

We’re all too familiar with the shortage of cybersecurity talent. That’s why it’s fortunate that there are a number of educational paths to becoming a security professional and advancing one’s career in security. Included in that number is obtaining a security certification, such as the Certified Information Systems Systems Security Professional (CISSP) certification or another certification from (ISC)². 

To help practitioners with these certifications and their ongoing education, beginning in December 2020, Kenna was added to the short list of partner organizations whose educational content offers (ISC)² CPE credit. 

What’s (ISC)² certification and why is CPE credit important? 

(ISC)² is described as, “an international, nonprofit membership association for information security leaders.” The organization is designed to help members and associates keep abreast of current cyber trends, further hone their expertise, and earn Continuing Professional Education (CPE) credits. Their certification programs, such as CISSP, are the industry standard. Now, CISSP-certified practitioners can look to Kenna to get the CPE credits they need to maintain their certifications. 

If you’re not already familiar with (ISC)² and their certification programs, here a few additional resources:

Kenna makes CPE credits easy

To earn CPE credits through Kenna Security’s educational content, all you have to do is look for the (ISC)² logo, and add your (ISC)² number when you sign up to attend one of our qualified events. We take it from there and submit your information to (ISC)² for credit. The process from sign-up to credit received can take a few weeks so patience is encouraged. However, there are quite a few options to get started with: 

Kenna Security virtual events:

Our virtual Kenna Katalyst training on how to set-up your very own risk-based vulnerability management program will net 1 hour of CPE credit. Sign up for the on-demand training today

Kenna Security webinars:

Head to our webinars page and look for the (ISC)² logo on the webinar image card (and/or a note about CPE accreditation in the copy). 

Kenna Security podcasts:

Through our blog page, you can find links to our Security Science podcasts. For those podcasts that qualify, you will find a registration form where you can submit your information and (ISC)² number. 

 

Vulnerability Management is Difficult

Join us for an on-demand educational series designed to shift your vulnerability management focus to risk, featuring six steps to set up your own program.

REGISTER NOW

Read the Latest Content

Threat Intelligence

18+ Threat Intel Feeds Power Modern Vulnerability Management

You need lots of threat intelligence feeds to cover all of the threat and vulnerability data categories in the world. Learn about the threat intel feeds...
READ MORE
Data Science

Ask Us About Our Data Science

In vulnerability management, data deluge is a recurring problem. Learn what data science is and how it can help your company.
READ MORE
Risk-Based Vulnerability Management

What is Modern Vulnerability Management?

Modern vulnerability management is an orderly, systematic, and data-driven approach to enterprise vulnerability management.
READ MORE
FacebookLinkedInTwitterYouTube

© 2022 Kenna Security. All Rights Reserved. Privacy Policy.