CySA+: Earning CEUs

Introduction

CySA+-certified professionals must keep their CompTIA Cybersecurity Analysts (CySA+) certification up to date. Continuing Education Units (CEUs) are a metric that are used to measure how far long a candidate maintains his or her CySA+-certified status. 

Earning CEUs is necessary to keep your certification current. The CySA+ certification requires you to earn at least 60 CEUs to meet your renewal requirements. CompTIA offers the Continuing Education (CE) program to simultaneously keep your skills up to date while validating your expertise. The CE program helps you to participate in various CE activities to earn CEUs and thus validate your CySA+ certification.

In this article, you will take a deep dive into CySA+ renewal requirements, CySA+ activity options, ways to calculate CEUs and submission of all activities.

What are the CySA+ renewal requirements?

The CySA+ certification is valid for three years from the day a candidate passes the exam. Thereafter, he or she will have to renew a certification by participating in various Continuing Education (CE) approved activities. Below are some requirements that must be met by these approved activities:

  • Time: The activities must be completed within the three-year renewal cycle
  • Relevance: At least 50% of the activity content must be related to one or more of the CySA+ exam objectives
  • Documentation: The candidate is required to submit all documentation on time to attain CEUs

If a candidate doesn’t meet the activity requirements, their certification will expire or deactivate unless they retake the exam to regain the active-certification status. Paying an annual fee of $50 or a three-year fee of $150 is necessary to retake the CySA+ exam.

What are some activity options for CySA+ renewal?

As previously mentioned, the CompTIA CE program offers a variety of activity types to earn CEUs. Each activity incorporates a specific number of CEUs (Read more...)

*** This is a Security Bloggers Network syndicated blog from Infosec Resources authored by Fakhar Imam. Read the original post at: http://feedproxy.google.com/~r/infosecResources/~3/OmrmSnwY1ZU/