Earning Continuing Professional Education (CPE) credits is mandatory to keep your CGEIT certification active and alive. CPE policy is designed to ensure that you have an adequate level of proficiency and current knowledge in the realm of enterprise’s IT governance. The CGEIT CPE policy requires that you attain CPE credits over an annual and 3-year certification period. In this article, we will delve into greater detail about everything you need to know regarding earning, tracking, and reporting CPE credits.
How Do I Earn CGEIT CPEs?
ISACA offers several opportunities to earn CPEs by participating in numerous qualifying activities, including meetings, seminars, presentations, workshops, and so on. These qualifying activities incorporate managerial and technical training that must be applicable to the IT governance realm. Managerial training is related to the management of IT governance. Below, we will discuss the qualifying activities and limits, each of which has been approved by the CGEIT Certification Committee.
ISACA’s Professional Education Activities and Meetings (No Limit)—These activities include ISACA’s chapter meetings and programs, seminars, workshops, conferences, and related programs. Earning CPEs depends on the number of hours in which a CGEIT professional participates. You will earn a minimum of 1 credit hour by participating in ISACA’s chapter meetings regardless of the actual duration. Important: you must have proof of attendance for chapter meetings and programs because these activities aren’t currently reported to the ISACA’s database.
Non-ISACA’s Professional Activities and Meetings (No Limit)—These activities include in-house training, workshops, conferences, seminars, university courses, and professional meetings. In fact, these activities aren’t sponsored by ISACA. If you complete a university course, you will attain 15 CPEs Per Semester and 10 CPEs Per Quarter-Credit-Hour.
Self-study Courses (No Limit)—Self-study courses are structured courses designed for self-study. Upon completion, the course provider must issue a certification of (Read more...)
*** This is a Security Bloggers Network syndicated blog from InfoSec Resources authored by Fakhar Imam. Read the original post at: http://feedproxy.google.com/~r/infosecResources/~3/B28oKnLyYeg/