Earning CPE Credits
Every student of security has to earn continuing Professional Education (CPE) credits to maintain their CISSP certification. They receive attendance certificates indicating the format, number, practice area and title of the CPE credits.
The requirements of CPE ensure that CISSP certification holders remain knowledgeable about the current industry developments. CPE requirements can be fulfilled by attending conference calls, seminars, webinars and industry conventions, and through self-study. You have to keep CPE certificates and attendance files and (ISC)2 management may verify the CPE credit compliances at any time.
It is a significant achievement to qualify and study for a CISSP. It is a difficult task to complete and one must feel proud of such accomplishment. However, once certification is obtained, a CISSP must earn credits by participating in CPE to remain competitive and in a good position in the organization.
CPE Policies and Guidelines
As per the CPE Policies and Guidelines, there are distinct instructions for necessary CPE activities and requirements in a year for a three-year certification cycle of CISSPs. Audit of the CPE requirements is done to make sure that the members are in a sound position to maintain the CISSP certifications.
There are clear overviews of the various activities that count for CPE credits. Therefore, you must follow proper CPE credit guidelines to accurately calculate your CPE credits. It is important to understand that, to enhance professional development, it is essential to know the types of CPE credits you require and which works can give you CPE Credits on your regular day-to-day performance. However, you may also earn CPE credits for engaging in exclusive activities or projects in your workplace outside of your regular job profile. These activities must expand your skills and knowledge base.
What are the General CPE Requirements for CISSPs?
To retain certifications, (Read more...)
*** This is a Security Bloggers Network syndicated blog from Infosec Resources authored by Aroosa Ashraf. Read the original post at: http://feedproxy.google.com/~r/infosecResources/~3/rlDWMTRrlkM/