Cyber SecurityPeople-first. Technology-enabled.

 

Global crises. Unprecedented digital disruption. The adversaries are getting smarter, and the problems just keep getting more complex. When it comes to cyber security, the challenges can seem so overwhelming, it's hard to know where to start. 

The Cost of Being Unprepared
Soon the cost of global cybercrime will reach
$11.4 million per minute.[1]


The Growing Cyber Talent Gap
It'll take over 4 million additional trained cyber professionals
to fill the current cyber talent gap.[2]

Ignoring the problems won’t make them go away. Whether you’re looking to assemble your cyber security dream team or just looking to reinforce your own skills, Learning Tree has you covered with expert insights on today’s most effective cyber strategies and skill-based training solutions.

How do you want to advance your cyber security goals today?

Discover how to assemble your cyber security dream team.

Go beyond certification with skill-based cyber training.

Gain insight with complimentary webinars from our cyber experts.

Inside the NICE Framework

 

What is the NICE Framework?
Why take a framework approach to cyber security?
How do I know if a framework approach would work for me?
Is the NICE Framework only for U.S. entities?
What does the NICE Framework consist of?

Cyber Training Aligned to the NICE Framework

Description
Conceptualises, designs, procures, and/or builds secure Information Technology (IT) systems, with responsibility for aspects of system and/or network development.

Typical Roles/Skills for the Category
Authorising Official/Designating Representative, Security Control Assessor, Secure Software Assessor, Enterprise Architect, Security Architect, Software Developer, Research & Development Specialist, Systems Requirements Planner, System Testing and Evaluation Specialist, Information Systems Security Developer, Systems Developer

Popular Training Aligned to Securely Provision
Certified Information Systems Auditor (CISA) Training • Kurs 2040
Certified Authorisation Professional (CAP) Certification and Training • Kurs 2061

Explore Additional Securely Provision Training ›

Operate & Maintain

Description
Provides the support, administration, and maintenance necessary to ensure effective and efficient Information Technology (IT) system performance and security.

Typical Roles/Skills for the Category
Database Administrator, System Administrator, Knowledge Manager, Data Analyst, Systems Security Analyst, Technical Support Specialist, Network Operations Specialist

Popular Training Aligned to Operate & Maintain
AWS Training: A Comprehensive Introduction to Amazon Web Services • Kurs 1205
Microsoft Azure Administrator (AZ-104) • Kurs 8542

Explore More Operate & Maintain Training ›

Description
Provides leadership, management, direction, or development and advocacy so the organisation may effectively conduct cyber security work.

Typical Roles/Skills for the Category
Cyber Legal Advisor, Cyber Instructional Curriculum Developer, Cyber Instructor, Cyber Workforce Developer and Manager, Privacy Officer/Privacy Compliance Manager, Information Systems Security Manager, Communications Security (COMSEC) Manager, Cyber Policy and Strategy Planner, Executive Cyber Leadership, IT Investment/Portfolio Manager, Program Manager, IT Project Manager, Product Support Manager, IT Program Auditor

Popular Training Aligned to Oversee & Govern
Official (ISC)2® CISSP Training and Certification Prep (with Exam Voucher) • Kurs 2058
Certified Information Systems Auditor (CISA) Training • Kurs 2040

Explore More Oversee & Govern Training ›

Description
Identifies, analyses, and mitigates threats to internal Information Technology (IT) systems and/or networks. Performs highly-specialised review and evaluation of incoming cyber security information to determine its usefulness for intelligence.

Typical Roles/Skills for the Category
Cyber Defense Analyst, Cyber Defense Infrastructure Support Specialist, Cyber Defense Incident Responder, Vulnerability Assessment Analyst, Threat/Warning Analyst, Exploitation Analyst, All-Source Analyst, Mission Assessment Specialist, Multi-Disciplined Language Analyst, Target Developer, Target Network Analyst

Popular Training Aligned to Protect & Defend and Analyse
CyberSec First Responder Certification Training • Kurs 2070
Certified Ethical Hacker (CEH v11) Training • Kurs 2031
System and Network Security Introduction Training • Kurs 468

Explore More Protect & Defend Training ›

Explore More Analyse Training ›

Description
Performs highly-specialised review and evaluation of incoming cyber security information to determine its usefulness for intelligence. Provides specialised denial and deception operations and collection of cyber security information that may be used to develop intelligence.

Typical Roles/Skills for the Category
Threat/Warning Analyst, Exploitation Analyst, All-Source Analyst, Mission Assessment Specialist, Multi-Disciplined Language Analyst, Target Developer, Target Network Analyst, All Source-Collection Manager, All Source-Collection Requirements Manager, Cyber Intel Planner, Cyber Ops Planner, Partner Integration Planner, Cyber Operator

Popular Training Aligned to Collect & Operate and Analyse
CyberSec First Responder Certification Training • Kurs 2070
Certified Ethical Hacker (CEH v11) Training • Kurs 2031
System and Network Security Introduction Training • Kurs 468
Social Engineering Training: Deceptions and Defences • Kurs 2012
Implementing a Business Intelligence Solution • Kurs 901

Explore More Collect & Operate Training ›

Explore More Investigate Training ›

Cyber Certifications & Real-World Skills

Learning Tree's cyber security training curriculum includes the best cyber security certification programs on the market today for all levels of your organisation. Our exam prep training provides more than just a path to certification success. Attendees gain real-world skills that can help them make a difference immediately back on the job.

With cyber security certification prep training from Learning Tree, you can expect:

  • Partner-authorised cyber course content (never grey market)
  • Highly-vetted, experienced, and certified cyber security instructors

 

Explore popular cyber security certification training below. 

Suffering from
Impostor Syndrome?

What happens when certifications can’t be backed up with real-world knowledge and skills — and what can security professionals do to avoid this pitfall?

Read the Blog

CertNexus is the global purveyor of vendor-neutral, emerging technology certifications, and micro-credentials for IT, business, and security professionals. CertNexus’ exams meet the most rigorous development standards possible, which outline a global framework for developing personnel certification programs to narrow the widening cyber security skills gap.

CyberSec First Responder Certification Training • Kurs 2070

With over 2 million CompTIA-certified IT professionals worldwide, CompTIA is the clear leader in IT certifications. And with certifications covering IT security, networking, cloud technologies, and more, CompTIA certifications can boost your skills and credentials no matter where you are in your career.

CompTIA A+ Certification Training • Kurs 445
CompTIA Security+ Certification Training • Kurs 446
CompTIA Network+ Certification Training • Kurs 2708
CompTIA Cybersecurity Analyst CySA+ Certification Training • Kurs 2047
CompTIA Advanced Security Practitioner (CASP+) Certification Training • Kurs 2046
Introduction to Cloud Computing Training • Kurs 1200

Earn CompTIA CEUs to Maintain Certification

The International Council of E-Commerce Consultants, or EC-Council, is a global leader in cyber security certification, with over 150,000 EC-Council certified IT professionals worldwide. With certification ranging from ethical hacking, security analysis, and network defense, EC-Council certifications are a standard-bearer in the IT security world. Learning Tree’s EC-Council courses will provide you the training needed to earn these certifications.

Certified Ethical Hacker (CEH v11) Training • Kurs 2031
Certified Network Defender (CND) Certification Training • Kurs 2032
EC-Council Certified Application Security Engineer (CASE) .NET • Kurs 2028

The Information Systems Control Association® (ISACA®) is a global association that supports the adoption of industry-tested and globally accepted guidance for Information Systems (IS). Earning an ISACA certification validates your credentials as an IS expert in your field.

Certified Information Security Manager (CISM) Training & Certification • Kurs 2036
Certified Risk and Information Systems Control (CRISC) Training • Kurs 2037
Certified Information Systems Auditor (CISA) Training • Kurs 2040

 

Custom Learning Paths for Your Team or Organisation?

Consider leveraging our online skill assessments + guided learning paths  + our content library to customise a program tailored to your current cyber security initiatives and challenges. We can even apply before/after skills assessments to measure the impact of skill advancement for visible ROI. Combined with our FlexVoucher procurement options, this is a powerful option to address your war for talent in the cyber security space. Call, live chat, or use the form below to contact us for details.

Preferred method of contact?