Cyber Security
Learning Resource Hub

 

Global crises. Unprecedented digital disruption. The adversaries are getting smarter, and the problems just keep getting more complex. When it comes to cyber security, the challenges can seem so overwhelming, it's hard to know where to start. 

The Cost of Being Unprepared
Soon the cost of global cybercrime will reach
$11.4 million per minute.[1]


The Growing Cyber Talent Gap
It'll take over 4 million additional trained cyber professionals
to fill the current cyber talent gap.[2]

Ignoring the problems won’t make them go away. Whether you’re looking to assemble your cyber security dream team or just looking to reinforce your own skills, Learning Tree has you covered with expert insights on today’s most effective cyber strategies and skill-based training solutions.

How do you want to advance your cyber security goals today?

Discover how to assemble your cyber security dream team.

Go beyond certification with skill-based cyber training.

Gain insight with complimentary webinars from our cyber experts.

Inside the NICE Framework

 

What is the NICE Framework?
Why take a framework approach to cyber security?
How do I know if a framework approach would work for me?
Is the NICE Framework only for U.S. entities?
What does the NICE Framework consist of?

Cyber Training Aligned to the NICE Framework

Description
Conceptualises, designs, procures, and/or builds secure Information Technology (IT) systems, with responsibility for aspects of system and/or network development.

Typical Roles/Skills for the Category
Authorising Official/Designating Representative, Security Control Assessor, Secure Software Assessor, Enterprise Architect, Security Architect, Software Developer, Research & Development Specialist, Systems Requirements Planner, System Testing and Evaluation Specialist, Information Systems Security Developer, Systems Developer

Popular Training Aligned to Securely Provision
Certified Information Systems Auditor (CISA) Training • Course 2040
CertNexus Certified Cyber Secure Coder Training • Course 2071
Certified Authorization Professional (CAP) Certification and Training • Course 2061

Explore Additional Securely Provision Training ›

Description
Provides the support, administration, and maintenance necessary to ensure effective and efficient Information Technology (IT) system performance and security.

Typical Roles/Skills for the Category
Database Administrator, System Administrator, Knowledge Manager, Data Analyst, Systems Security Analyst, Technical Support Specialist, Network Operations Specialist

Popular Training Aligned to Operate & Maintain
AWS Training: A Comprehensive Introduction to Amazon Web Services • Course 1205
Microsoft Azure Administrator (AZ-104) • Course 8542
Oracle Database 12c Administration Training • Course 2227
Administering a SQL Database Infrastructure Training (20764) • Course 8422
EC-Council Certified Security Analyst (ECSA) Certification Training ECSA v10 • Course 2024

Explore More Operate & Maintain Training ›

Description
Provides leadership, management, direction, or development and advocacy so the organisation may effectively conduct cyber security work.

Typical Roles/Skills for the Category
Cyber Legal Advisor, Cyber Instructional Curriculum Developer, Cyber Instructor, Cyber Workforce Developer and Manager, Privacy Officer/Privacy Compliance Manager, Information Systems Security Manager, Communications Security (COMSEC) Manager, Cyber Policy and Strategy Planner, Executive Cyber Leadership, IT Investment/Portfolio Manager, Program Manager, IT Project Manager, Product Support Manager, IT Program Auditor

Popular Training Aligned to Oversee & Govern
Official (ISC)2® CISSP Training and Certification Prep (with Exam Voucher) • Course 2058
EC-Council Certified CISO Training CCISO v3 • Course 2026
Certified Information Privacy Technologist (CIPT) Training • Course 2066
Certified Information Privacy Manager (CIPM) Training • Course 2067
Certified Information Systems Auditor (CISA) Training • Course 2040

Explore More Oversee & Govern Training ›

Description
Identifies, analyses, and mitigates threats to internal Information Technology (IT) systems and/or networks. Performs highly-specialised review and evaluation of incoming cyber security information to determine its usefulness for intelligence.

Typical Roles/Skills for the Category
Cyber Defense Analyst, Cyber Defense Infrastructure Support Specialist, Cyber Defense Incident Responder, Vulnerability Assessment Analyst, Threat/Warning Analyst, Exploitation Analyst, All-Source Analyst, Mission Assessment Specialist, Multi-Disciplined Language Analyst, Target Developer, Target Network Analyst

Popular Training Aligned to Protect & Defend and Analyse
CyberSec First Responder Certification Training • Course 2070
Certified Ethical Hacker (CEH v10) Training • Course 2031
CompTIA PenTest+ Certification Training • Course 2049
System and Network Security Introduction — NCSC Certified Training • Course 468

Explore More Protect & Defend Training ›

Explore More Analyse Training ›

Description
Performs highly-specialised review and evaluation of incoming cyber security information to determine its usefulness for intelligence. Provides specialised denial and deception operations and collection of cyber security information that may be used to develop intelligence.

Typical Roles/Skills for the Category
Threat/Warning Analyst, Exploitation Analyst, All-Source Analyst, Mission Assessment Specialist, Multi-Disciplined Language Analyst, Target Developer, Target Network Analyst, All Source-Collection Manager, All Source-Collection Requirements Manager, Cyber Intel Planner, Cyber Ops Planner, Partner Integration Planner, Cyber Operator

Popular Training Aligned to Collect & Operate and Analyse
CyberSec First Responder Certification Training • Course 2070
Certified Ethical Hacker (CEH v10) Training • Course 2031
CompTIA PenTest+ Certification Training • Course 2049
System and Network Security Introduction — NCSC Certified Training • Course 468
Social Engineering Training: Deceptions and Defences • Course 2012
Implementing a Business Intelligence Solution • Course 901

Explore More Collect & Operate Training ›

Explore More Investigate Training ›

Cyber Certifications & Real-World Skills

Learning Tree's cyber security training curriculum includes the best cyber security certification programs on the market today for all levels of your organisation. Our exam prep training provides more than just a path to certification success. Attendees gain real-world skills that can help them make a difference immediately back on the job.

With cyber security certification prep training from Learning Tree, you can expect:

  • Partner-authorised cyber course content (never grey market)
  • Highly-vetted, experienced, and certified cyber security instructors

 

Explore popular cyber security certification training below. 

Suffering from
Impostor Syndrome?

What happens when certifications can’t be backed up with real-world knowledge and skills — and what can security professionals do to avoid this pitfall?

Read the Blog

CertNexus is the global purveyor of vendor-neutral, emerging technology certifications, and micro-credentials for IT, business, and security professionals. CertNexus’ exams meet the most rigorous development standards possible, which outline a global framework for developing personnel certification programs to narrow the widening cyber security skills gap.

Internet of Things (IoT) Practitioner Training • Course 1276
CyberSec First Responder Certification Training • Course 2070
CertNexus Certified Cyber Secure Coder Training • Course 2071

The Information Systems Control Association® (ISACA®) is a global association that supports the adoption of industry-tested and globally accepted guidance for Information Systems (IS). Earning an ISACA certification validates your credentials as an IS expert in your field.

Certified Information Security Manager (CISM) Training & Certification • Course 2036
Certified Risk and Information Systems Control (CRISC) Training • Course 2037
Certified Governance of Enterprise IT (CGEIT) Training • Course 2038
Cybersecurity Nexus (CSX) Practitioner Training • Course 2039
Certified Information Systems Auditor (CISA) Training • Course 2040

The UK Government has identified a significant shortage of skilled cyber security professionals and the National Cyber Security Centre (NCSC) is working with other government departments to address this issue. With the abundance of cyber security training courses on offer, it can be difficult to identify highly competent trainers and good quality courses. Our NCSC Certified Training Courses address this issue – providing you with a choice of rigorously-assessed training courses, giving you the confidence you will receive training that is consistent with industry best practice.

The NCSC validates:

  • High quality, relevant training that is consistent with industry best practice
  • Course materials mapped to the Industry respected IISP Skills Framework
  • Course content, instructor skills and knowledge, and course administration assessed against the exacting standards of APMG International and NCSC

On successful completion of the end-of-class, multiple choice exam, you receive an APMG-International certificate and digital badge based on your NCSC Certified Training Course.

Learning Tree has developed a learning path of 5 NCSC Certified Application Level Courses mapped to the IISP Skills Framework:

 

 

Custom Learning Paths for Your Team or Organisation?

Consider leveraging our online skill assessments + guided learning paths + our content library to customise a program tailored to your current cyber security initiatives and challenges. We can even apply before/after skills assessments to measure the impact of skill advancement for visible ROI. Combined with our FlexVoucher procurement options, this is a powerful option to address your war for talent in the cyber security space. Call, live chat, or use the form below to contact us for details.

Preferred method of contact?


Sources:

[1] RiskIQ

[2] (ISC)² Cybersecurity Workforce Study

Please Choose a Language

Canada - English

Canada - Français