Continuing Professional Education (CPE) Opportunities & Requirements by Certifying Body - Security Boulevard

Continuing Professional Education (CPE) Opportunities & Requirements by Certifying Body

Six Ways You Can Earn CPEs with InfoSec Institute

To maintain your information security certification(s), you must earn a set amount of continuing education credits each year. Depending on what certification(s) you hold, these could be called CPEs, CPUs or even ECEs. It’s important to note credit qualifications, requirements and approval processes vary by certifying body. However, regardless of your certification type, many of these credits can be earned at no cost to you.

Here at InfoSec Institute, we provide a variety of opportunities to help you maintain your certifications and keep your skills fresh.

1. Contribute an Article to

Resources, the InfoSec Institute blog, features thousands of articles written by security pros, for security pros. This popular website boasts over 500k visits each month. By contributing an article of your own, you can earn continuing education credits and gain valuable exposure to other industry professionals. 

Submit Article Idea

2. Read an InfoSec Institute Whitepaper

We frequently author security-related whitepapers covering topics like incident response, security awareness training, security threats and more. Once you’ve read a whitepaper, submit a summary of the paper to your certifying body for credit consideration.

Read a Whitepaper

3. Watch an InfoSec Institute Webinar

Like whitepapers, webinars are a great way to earn continuing education credits. Visit our Resource Library to see our on-demand options. You can submit a request for a certificate of completion here.

Watch a Webinar

4. Mentor Others on

Organizations like ISACA award credit for helping others get certified. Our forum,, is home to thousands of other security pros looking for advice on how to achieve certification. Give back to the community and become a TechExams member (it’s free). You can learn more about eligible mentoring activities here.

Visit TechExams

5. Self Study (Read more...)

*** This is a Security Bloggers Network syndicated blog from InfoSec Resources authored by Megan Sawle. Read the original post at: