Once you earn a Certified Cloud Security Professional (CCSP) certification, you become an (ISC)2 member and join a global community of approximately 125,000 cybersecurity professionals. However, you must maintain your CCSP certification to continue to receive benefits of your membership, keep yourself abreast of the latest industry trends and keep your skills and knowledge current.
In this article, you will learn about Group A and Group B Continuing Professional Education (CPE) credits, CCSP renewal requirements, CCSP CPE maintenance requirements, how to regain membership, how to retake the CCSP exam and the benefits of maintaining your CCSP certification.
Understanding Group A and Group B CPE Credits
Understanding of Group A and Group B CPE credits is a prerequisite to comprehending CPE credits altogether. Let’s look at them in a little more detail.
Group A CPE credits involve domain-related activities. That means that these activities must be related to specific domains of the respective credential (e.g., CCSP, CISSP, CSSLP, SSCP, CAP and so forth). Examples of Group A activities are listed below:
- Read a whitepaper, book or magazine
- Publish a whitepaper, book or article
- Attend a seminar, presentation, conference or an educational course
- Give a presentation or teach with regard to information security
- Take a higher academic course
- Volunteer for the public sector, government, or any other welfare organization
- Self-study related to a preparation for a certification exam or a project
- Perform a unique work-related project that isn’t a part of your typical work duties.
Group B CPE credits are related to general professional development activities that are not applied directly to your certification domains. These activities are helpful in enhancing your education, knowledge, professional skills or competency outside of domains associated with your respective certification. General professional development activities include professional development programs such as management courses (Read more...)
*** This is a Security Bloggers Network syndicated blog from InfoSec Resources authored by Fakhar Imam. Read the original post at: http://feedproxy.google.com/~r/infosecResources/~3/-k1njw4N_8Y/