Earning CCSP CPE Credits

Whether a member or associate, earning CCSP Continuing Professional Education (CPE) credits is indispensable for every candidate who wishes to keep their CCSP certification active and alive.

The CCSP certification requires every student to recertify every three years. To this end, certification holders need to earn 30 CPE credits per year for a total of 90 CPE credits throughout their three-year certification cycle, as well as paying an Annual Maintenance Fee (AMF) of $100.

The following sections will take a deep dive into topics that are necessary to know for earning CCSP CPE credits.

What are Group A and Group B CPE Credits?

Understanding Group A and Group B CPE Credits is a prerequisite for performing in CPE activities. Group A CPE credits involve Domain-related activities, meaning that these activities must be related to specific domains of your CCSP credential. Some examples of Group A activities are listed below:

  • Read a whitepaper, book or magazine
  • Publish a whitepaper, book or article
  • Attend a seminar, presentation, conference or an educational course

Group B CPE credits are related to general professional development activities that are not applied directly to the CCSP domains. These activities are helpful in enhancing your education, knowledge, professional skills, or competency outside of domains associated with CCSP credential. Examples are given below:

  • Attend a seminar, presentation, conference, or an educational course
  • Gear up for a presentation or teach on a topic related to professional development

How Can I Earn CCSP CPEs?

You can earn CCSP CPEs by participating in various (ISC)2 CPE activities. These activities are available to meet your CCSP CPE requirements for the 3-year certification cycle. Below are the categories of CPE activities:

  • CPE credits offered by (ISC)2
  • Unique work experience
  • Contribution to the profession
  • Education
  • Professional development (Group B only)
  • Volunteer Service

CPE (Read more...)

*** This is a Security Bloggers Network syndicated blog from InfoSec Resources authored by Fakhar Imam. Read the original post at: