CISSP continuing education
Certified Information Systems Security Professional. The gold-standard generalist security credential, covering 8 domains from security architecture to software development security.
3 years
Between full re-certifications.
120 CPE
Roughly 40 CPE per year.
32
Opportunities that map to CISSP.
Opportunities that count
32 results mapped to CISSP, ranked by what's coming up next.
Join us for a deep dive into Systems Security Certified Practitioner (SSCP), the security operations and network security credential from ISC2, creator of the CISSP. As organizations continue to pursue digital transformation initiatives, the threat landscape is always expanding. Yet cybersecurity leadership talent is scarce. That’s where SSCP from ISC2 comes in — to help fill the gap. Once certified, the opportunities for certified professionals are near limitless. The SSCP is ideal for IT administrators, managers, directors and network security professionals responsible for the hands-on operational security of their organization’s critical assets. It shows you have the advanced technical skills and knowledge to implement, monitor and administer IT infrastructure using security best practices, policies and procedures. In this 60-minute live virtual session, you’ll learn: - If SSCP is right for you - How Official ISC2 Training flexes with your learning style - What to expect on exam day - How to become endorsed and maintain your certification Plus! Get answers to your SSCP questions during the Q&A section. Register now and begin your SSCP certification journey today!
Artificial intelligence is rapidly reshaping the cybersecurity landscape, giving attackers new ways to automate, scale, and personalize cyberattacks while providing defenders powerful tools to detect and respond faster than ever. Join Steve Piper, CEO of CyberEdge and Editor-in-Chief of Security Buzz, as he explores how AI is being used on both sides of the threat equation and what this escalating arms race means for organizations. Attendees will learn how AI-driven threats such as advanced phishing, deepfakes, and automated malware are changing attacker tactics, as well as how security teams can leverage AI for threat detection, response, and risk reduction. The session will highlight practical considerations for preparing defenses as AI continues to transform the future of cybersecurity.
Ransomware remains one of the most disruptive and costly threats facing enterprises today, and preparation is critical to minimizing its impact. Join Steve Piper, CEO of CyberEdge and Editor-in-Chief of Security Buzz, as he discusses how security teams can build ransomware readiness before an attack occurs, rather than reacting under pressure once systems are locked and operations are disrupted. Attendees will learn how to assess ransomware preparedness, close common gaps in visibility and response, and ensure backup, recovery, and communication plans are tested and trusted. The session will also explore how security, IT, legal, public relations, and executive teams can align ahead of time to reduce downtime, contain damage, and maintain control during a high-pressure ransomware event.
The cybersecurity landscape continues to evolve at a rapid pace, driven by emerging technologies, shifting attacker tactics, and changing business priorities. Join Steve Piper, CEO of CyberEdge and Editor-in-Chief of Security Buzz, as he explores five key cybersecurity predictions that are expected to significantly influence how organizations manage risk and defend against threats as 2027 approaches. Attendees will gain insight into anticipated developments across areas such as AI-driven attacks and defenses, ransomware evolution, regulatory pressures, workforce challenges, and security architecture trends. The session will focus on what these predictions mean in practical terms and how security leaders can begin preparing today to stay ahead of tomorrow’s threats and build more resilient, future-ready cybersecurity strategies.
As cyber threats grow more sophisticated, choosing the right security tools is critical for reducing risk and staying resilient. Join Steve Piper, CEO of CyberEdge and Editor-in-Chief of Security Buzz, as he examines the technologies every organization should consider as part of a modern cyber defense strategy. Learn which tools are most effective at protecting endpoints, identities, cloud environments, and data—based on current threat trends and real-world adoption. Steve will discuss how to evaluate tools, avoid stack sprawl, and align investments with business priorities. Attendees will leave with practical guidance for building a streamlined, future-ready security toolkit. CPE Credit 1 Group A CPE Credit
Join us for a deep dive into Certified Secure Software Lifecycle Professional (CSSLP), the software security credential from ISC2, creator of the CISSP. As organizations continue to pursue digital transformation initiatives, the threat landscape is always expanding. Yet cybersecurity leadership talent is scarce. That’s where CSSLP from ISC2 comes in — to help fill the gap. Once certified, the opportunities for certified professionals are near limitless. The CSSLP is ideal for software development and security professionals responsible for applying best practices to each phase of the Software Development Lifecycle (SDLC). It shows your expertise and ability to incorporate security practices - authentication, authorization and auditing - into each phase of Software Development Lifecycle. In this 60-minute live virtual session, you’ll learn: - If CSSLP is right for you - How Official ISC2 Training flexes with your learning style - What to expect on exam day - How to become endorsed and maintain your certification Plus! Get answers to your CSSLP questions during the Q&A section. Register now and begin your CSSLP certification journey today! CPE Credit 1 Group A CPE Credit
Cybersecurity is one of the fastest-growing and most in-demand fields—but breaking in can feel overwhelming. This crash course is designed for aspiring and early-career security professionals who want a clear, practical introduction to the cybersecurity industry. Join Steve Piper, CEO of CyberEdge and Editor-in-Chief of Security Buzz, as he covers important topics that every cybersecurity newcomer ought to know, including: • Size and growth of the security industry • Useful vocabulary terms and buzz words • Five types of cyberthreat actors • Modern cyberthreats and tactics • Categories of security defenses • Common security job roles • Security industry ecosystem CPE Credit 1 Group A CPE Credit
This webinar will cover why enterprises need to start planning their transition to Post-Quantum Cryptography (PQC) to safeguard their sensitive information against future adversaries. We will delve into the latest NIST PQC standards, discuss key considerations for cryptographic inventory and agility, and outline actionable steps for assessing risk, prioritizing systems and implementing hybrid approaches. Attendees will gain insights and an understanding of how to approach building a PQC readiness program for their organization. Join Sponsor Google Cloud Security and Host ISC2 on May 21, 2026 at 1:00 p.m. Eastern/10:00 am Pacific to learn more! CPE Credit 1 Group A CPE Credit
An end-to-end walkthrough of modern Zero Trust design: identity-aware proxies, micro-segmentation, continuous authorization, and how to evolve a legacy perimeter network without a forklift rewrite.
How appsec teams at high-velocity orgs run lightweight threat modeling during planning. Includes the STRIDE-per-element worksheet template and three real case studies.
A leader's view of AI governance: model risk classification, vendor due diligence, the EU AI Act in practice, and a sample policy template you can adapt.
A 2-hour scenario walking through cloud-to-cloud lateral movement (IAM role chaining, service confusion), with mirrored red-team objectives and blue-team detections.
Know one we're missing?
Submit any webinar, course, or training URL. We'll classify it with Claude and queue it for review.
ImportantRecertHero is an independent aggregator. Credit estimates are guidance only — always verify with your certifying body.