SBN

CERT-CSIH: Earning PDUs

Earning PDUs, or Professional Development Units, is necessary to meet the renewal requirements of the Computer Security Incident Handler certification (CERT-CSIH, or just CSIH). It also keeps you abreast of the latest processes and technologies associated with computer security incident-handling activities. These activities often involve detecting the incident and responding immediately to eliminate a threat altogether or mitigate its impact. The latest recovery techniques are also applied to recover a loss. This certification was designed by the Software Engineering Institute, or SEI.

Put plainly, a PDU is a quantifying unit that measures development and learning activities related to incident handling. It also shows that a candidate is committed to maintaining and expanding their technical abilities and skills.

In this article, you will be able to know how CERT-CSIH PDUs can be earned, what CERT-CSIH PDU guidelines are and how CERT-CSIH PDUs are calculated.

How Can I Earn CERT-CSIH PDUs?

You can earn CERT-CSIH PDUs by participating in numerous renewal activities associated with incident handling. The SEI requires candidates to participate in professional growth activities to expand their skills. For this purpose, the SEI divides renewal activities into four categories, with each category containing a certain number of PDUs. The following sections describe each of the four categories.

Authoring Activities

Becoming an author is worth it, even when you burn the midnight oil to write and get your work published. Whether you are an author or co-author of something which has been published, it will make you capable of earning PDUs. You can earn a maximum of 30 PDUs per renewal period by taking part in authoring activities:

  • You can earn 20 PDUs by authoring or co-authoring a book or a test book regarding computer security, provided the book is published within your renewal cycle
  • You can earn 10 PDUs per (Read more...)

*** This is a Security Bloggers Network syndicated blog from InfoSec Resources authored by Chris Sienko. Read the original post at: http://feedproxy.google.com/~r/infosecResources/~3/r-Oi_B1DI7M/