![[Featured thumbnail] Is Your Resume Too Long?](https://images.ctfassets.net/wp1lcwdav1p1/7DIjUnQ0HnD51HWooWONQ3/4512c4575473079137f887184a4424d7/isyourresumetoolong__2_.png?w=330&h=216&q=60&fit=fill&f=faces&fm=jpg&fl=progressive)
How Many Pages Should a Resume Be? [VIDEO]
How many pages should a resume be? The answer depends on experience level and career goals. This video breaks down when to stick to one page, when two pages make sense, and why three pages are rarely needed—so every application stays focused and impactful.
March 19, 2026
Article
![[Featured Image] A project manager reads earned value management results as they sit at a table with a laptop and designs, with two team members looking at designs in the background.](https://images.ctfassets.net/wp1lcwdav1p1/3MBOwzd0izwgWd7Pn7EoIe/048a3e37ce96263a3571ae74c90088ad/GettyImages-909223794.jpg?w=330&h=216&q=60&fit=fill&f=faces&fm=jpg&fl=progressive)
![[Featured image]: Two people put coins in a piggy bank to demonstrate how understanding the time value of money impacts budgeting decisions.](https://images.ctfassets.net/wp1lcwdav1p1/5GrZZDHALv9hLPryGrDvBw/f625c54f4559dda57291263725c8a6fa/GettyImages-2257408084__1_.jpg?w=330&h=216&q=60&fit=fill&f=faces&fm=jpg&fl=progressive)
![[Featured Image] An instructor leads a discussion about ISO 27001, answering questions from learners about its role as a global standard and how it impacts ISMS.](https://images.ctfassets.net/wp1lcwdav1p1/28oaitEvCr28Eh9j4iCv2E/b702a510dfb0a554af0f88f9c5e26a58/GettyImages-2173548140.jpg?w=330&h=216&q=60&fit=fill&f=faces&fm=jpg&fl=progressive)
![[Featured Image] Two learners work together to build their accounting skills as part of their educational pathway while studying in a classroom.](https://images.ctfassets.net/wp1lcwdav1p1/4LNTk328FYK6QAX4vFzzgT/7c5873b3ed8d29d43b97a2b216d93347/GettyImages-2177286417.jpg?w=330&h=216&q=60&fit=fill&f=faces&fm=jpg&fl=progressive)
![[Featured Image] An information security manager leads a meeting to highlight the company’s current cybersecurity measures and discuss strategies for detecting vulnerabilities and responding to incidents.](https://images.ctfassets.net/wp1lcwdav1p1/5JinPEmMzzJ7wBf9qVIdQG/ab1a605789b6794821a114904514e253/GettyImages-2169143036.jpg?w=330&h=216&q=60&fit=fill&f=faces&fm=jpg&fl=progressive)