Cyber Security
People-first. Technology-enabled.

 

Global crises. Unprecedented digital disruption. The adversaries are getting smarter, and the problems just keep getting more complex. When it comes to cyber security, the challenges can seem so overwhelming, it's hard to know where to start. 

The Cost of Being Unprepared
Soon the cost of global cybercrime will reach
$11.4 million per minute.[1]


The Growing Cyber Talent Gap
It'll take over 4 million additional trained cyber professionals
to fill the current cyber talent gap.[2]

Ignoring the problems won’t make them go away. Whether you’re looking to assemble your cyber security dream team or just looking to reinforce your own skills, Learning Tree has you covered with expert insights on today’s most effective cyber strategies and skill-based training solutions.

How do you want to advance your cyber security goals today?

Discover how to assemble your cyber security dream team.

Go beyond certification with skill-based cyber training.

Gain insight with complimentary webinars from our cyber experts.

Inside the NICE Framework

 

What is the NICE Framework?
Why take a framework approach to cyber security?
How do I know if a framework approach would work for me?
Is the NICE Framework only for U.S. entities?
What does the NICE Framework consist of?

Cyber Training Aligned to the NICE Framework

Description
Conceptualises, designs, procures, and/or builds secure Information Technology (IT) systems, with responsibility for aspects of system and/or network development.

Typical Roles/Skills for the Category
Authorising Official/Designating Representative, Security Control Assessor, Secure Software Assessor, Enterprise Architect, Security Architect, Software Developer, Research & Development Specialist, Systems Requirements Planner, System Testing and Evaluation Specialist, Information Systems Security Developer, Systems Developer

Popular Training Aligned to Securely Provision
Certified Information Systems Auditor (CISA) Training • Kurs 2040
CertNexus Certified Cyber Secure Coder Training • Kurs 2071
Certified Authorisation Professional (CAP) Certification and Training • Kurs 2061

Explore Additional Securely Provision Training ›

Operate & Maintain

Description
Provides the support, administration, and maintenance necessary to ensure effective and efficient Information Technology (IT) system performance and security.

Typical Roles/Skills for the Category
Database Administrator, System Administrator, Knowledge Manager, Data Analyst, Systems Security Analyst, Technical Support Specialist, Network Operations Specialist

Popular Training Aligned to Operate & Maintain
AWS Training: A Comprehensive Introduction to Amazon Web Services • Kurs 1205
Microsoft Azure Administrator (AZ-104) • Kurs 8542
Administration av Oracle Database 12c • Kurs 2227
Administering a SQL Database Infrastructure Training (20764) • Kurs 8422

Explore More Operate & Maintain Training ›

Description
Provides leadership, management, direction, or development and advocacy so the organisation may effectively conduct cyber security work.

Typical Roles/Skills for the Category
Cyber Legal Advisor, Cyber Instructional Curriculum Developer, Cyber Instructor, Cyber Workforce Developer and Manager, Privacy Officer/Privacy Compliance Manager, Information Systems Security Manager, Communications Security (COMSEC) Manager, Cyber Policy and Strategy Planner, Executive Cyber Leadership, IT Investment/Portfolio Manager, Program Manager, IT Project Manager, Product Support Manager, IT Program Auditor

Popular Training Aligned to Oversee & Govern
Official (ISC)2® CISSP Training and Certification Prep (with Exam Voucher) • Kurs 2058
Certified Information Systems Auditor (CISA) Training • Kurs 2040

Explore More Oversee & Govern Training ›

Description
Identifies, analyses, and mitigates threats to internal Information Technology (IT) systems and/or networks. Performs highly-specialised review and evaluation of incoming cyber security information to determine its usefulness for intelligence.

Typical Roles/Skills for the Category
Cyber Defense Analyst, Cyber Defense Infrastructure Support Specialist, Cyber Defense Incident Responder, Vulnerability Assessment Analyst, Threat/Warning Analyst, Exploitation Analyst, All-Source Analyst, Mission Assessment Specialist, Multi-Disciplined Language Analyst, Target Developer, Target Network Analyst

Popular Training Aligned to Protect & Defend and Analyse
CyberSec First Responder Certification Training • Kurs 2070
Certified Ethical Hacker (CEH v10) Training • Kurs 2031
Introduktion till system- och nätverkssäkerhet • Kurs 468

Explore More Protect & Defend Training ›

Explore More Analyse Training ›

Description
Performs highly-specialised review and evaluation of incoming cyber security information to determine its usefulness for intelligence. Provides specialised denial and deception operations and collection of cyber security information that may be used to develop intelligence.

Typical Roles/Skills for the Category
Threat/Warning Analyst, Exploitation Analyst, All-Source Analyst, Mission Assessment Specialist, Multi-Disciplined Language Analyst, Target Developer, Target Network Analyst, All Source-Collection Manager, All Source-Collection Requirements Manager, Cyber Intel Planner, Cyber Ops Planner, Partner Integration Planner, Cyber Operator

Popular Training Aligned to Collect & Operate and Analyse
CyberSec First Responder Certification Training • Kurs 2070
Certified Ethical Hacker (CEH v10) Training • Kurs 2031
Introduktion till system- och nätverkssäkerhet • Kurs 468
Social Engineering Training: Deceptions and Defences • Kurs 2012
Implementing a Business Intelligence Solution • Kurs 901

Explore More Collect & Operate Training ›

Explore More Investigate Training ›

Cyber Certifications & Real-World Skills

Learning Tree's cyber security training curriculum includes the best cyber security certification programs on the market today for all levels of your organisation. Our exam prep training provides more than just a path to certification success. Attendees gain real-world skills that can help them make a difference immediately back on the job.

With cyber security certification prep training from Learning Tree, you can expect:

  • Partner-authorised cyber course content (never grey market)
  • Highly-vetted, experienced, and certified cyber security instructors

 

Explore popular cyber security certification training below. 

Suffering from
Impostor Syndrome?

What happens when certifications can’t be backed up with real-world knowledge and skills — and what can security professionals do to avoid this pitfall?

Read the Blog

CertNexus is the global purveyor of vendor-neutral, emerging technology certifications, and micro-credentials for IT, business, and security professionals. CertNexus’ exams meet the most rigorous development standards possible, which outline a global framework for developing personnel certification programs to narrow the widening cyber security skills gap.

Internet of Things (IoT) Practitioner Training • Kurs 1276
CyberSec First Responder Certification Training • Kurs 2070
CertNexus Certified Cyber Secure Coder Training • Kurs 2071

With over 2 million CompTIA-certified IT professionals worldwide, CompTIA is the clear leader in IT certifications. And with certifications covering IT security, networking, cloud technologies, and more, CompTIA certifications can boost your skills and credentials no matter where you are in your career.

CompTIA A+ Certification Training • Kurs 445
CompTIA Security+ Certification Training • Kurs 446
CompTIA Network+ Certification Training • Kurs 2708
CompTIA Cybersecurity Analyst CySA+ Certification Training • Kurs 2047
CompTIA Advanced Security Practitioner (CASP+) Certification Training • Kurs 2046
Introduction to Cloud Computing Training • Kurs 1200

Earn CompTIA CEUs to Maintain Certification

The International Council of E-Commerce Consultants, or EC-Council, is a global leader in cyber security certification, with over 150,000 EC-Council certified IT professionals worldwide. With certification ranging from ethical hacking, security analysis, and network defense, EC-Council certifications are a standard-bearer in the IT security world. Learning Tree’s EC-Council courses will provide you the training needed to earn these certifications.

Certified Ethical Hacker (CEH v10) Training • Kurs 2031
Advanced Penetration Testing: LPT (Master) Certification Training • Kurs 2033
Certified Network Defender (CND) Certification Training • Kurs 2032
EC-Council Certified Application Security Engineer (CASE) Java • Kurs 2027
EC-Council Certified Application Security Engineer (CASE) .NET • Kurs 2028

The Information Systems Control Association® (ISACA®) is a global association that supports the adoption of industry-tested and globally accepted guidance for Information Systems (IS). Earning an ISACA certification validates your credentials as an IS expert in your field.

Certified Information Security Manager (CISM) Training & Certification • Kurs 2036
Certified Risk and Information Systems Control (CRISC) Training • Kurs 2037
Certified Information Systems Auditor (CISA) Training • Kurs 2040

Upcoming Cyber Security Webinars

Matching Cyber Security Jobs to Skills:
A Step to Bridge the Skills Gap [Session 1]

When: Wednesday, okt 21st • 3 pm CEST
Duration: 1 hour

Increasingly, there is a discrepancy between the cyber security job descriptions being created and the skills that are available in the talent market. Join Jeff Felice, President of CertNexus, to learn how the cyber skill gap can be closed by better aligning job roles with the NICE Cybersecurity Workforce Framework.

Register

Matching Cyber Security Jobs to Skills:
A Step to Bridge the Skills Gap [Session 2]

When: Wednesday, okt 21st • 6 pm CEST
Duration: 1 hour

Increasingly, there is a discrepancy between the cyber security job descriptions being created and the skills that are available in the talent market. Join Jeff Felice, President of CertNexus, to learn how the cyber skill gap can be closed by better aligning job roles with the NICE Cybersecurity Workforce Framework.

Register

The Cyber Skills Gap: Reality or
Really Overhyped? [Session 1]

When: Wednesday, okt 28th • 2 pm CET
Duration: 1 hour

The (ISC)² Cybersecurity Workforce Study cites a startling cyber skills gap, with the most recent study pointing to a shortfall of more than 4 million professionals. But is it really as bad as it sounds? Join Cyber Expert & Learning Tree Curriculum Dean Aaron Kraus for this live webinar to break down what that skills gap number truly means and identify strategies to help close the gap.

Register

The Cyber Skills Gap: Reality or
Really Overhyped? [Session 2]

When: Wednesday, okt 28th • 5 pm CET
Duration: 1 hour

The (ISC)² Cybersecurity Workforce Study cites a startling cyber skills gap, with the most recent study pointing to a shortfall of more than 4 million professionals. But is it really as bad as it sounds? Join Cyber Expert & Learning Tree Curriculum Dean Aaron Kraus for this live webinar to break down what that skills gap number truly means and identify strategies to help close the gap.

Register

Cyber Security: Consumerism Masks
the Real Problems [Session 1]

When: Friday, okt 30th • 2 pm CET
Duration: 1 hour

The "cyber security problem" continues to worsen dramatically despite spending tens of billions of dollars a year on software and tools. In contrast to this, many of the tools used by attackers are free, or very low cost! In this webinar we will provide some perspectives on this predicament as well as some important approaches worth considering.

Register

Cyber Security: Consumerism Masks
the Real Problems [Session 2]

When: Friday, okt 30th • 5 pm CET
Duration: 1 hour

The "cyber security problem" continues to worsen dramatically despite spending tens of billions of dollars a year on software and tools. In contrast to this, many of the tools used by attackers are free, or very low cost! In this webinar we will provide some perspectives on this predicament as well as some important approaches worth considering.

Register

 

Custom Learning Paths for Your Team or Organisation?

Consider leveraging our online skill assessments + guided learning paths  + our content library to customise a program tailored to your current cyber security initiatives and challenges. We can even apply before/after skills assessments to measure the impact of skill advancement for visible ROI. Combined with our FlexVoucher procurement options, this is a powerful option to address your war for talent in the cyber security space. Call, live chat, or use the form below to contact us for details.

Preferred method of contact?


Please Choose a Language

Canada - English

Canada - Français