GCHQ Certified Training

The GCHQ Certified Training (GCT) scheme provides a benchmark for cyber security training by assuring the quality of both content and its delivery.  Whether in our personal lives or at work, cyber security awareness is important for us all. 
 
The digital revolution presents huge advantages, but also brings new risks that we need to understand and tackle given our increasing dependence on cyberspace. There has never been a better time to invest in cyber security training.
 
The GCHQ Certified Training (GCT) scheme certifies two levels of cyber security skills training:
 
  • Awareness level — giving newcomers a thorough foundation in cyber security
  • Application level — in-depth courses for professional development  
Whether you are new to cyber security or you are an experienced security professional looking to enhance your skills, GCT can help you or your organisation find the right training.  GCT is designed to assure high quality cyber security training courses delivered by experienced training providers.  
 
  • GCHQ has developed exacting standards against which courses are rigorously assessed
  • the assessment criteria, written by GCHQ, are based on the IISP Skills Framework
  • the GCT certification process is carried out by APMG, the independent certification body approved by GCHQ to award certification and maintain the required high standards of assessment
The scheme offers UK cyber security professionals the opportunity to gain appropriate knowledge and skills through training. It is also useful for anyone seeking to improve or acquire cyber security skills, including those aspiring to certification under the NCSC Certified Professional Scheme
 
Training delivery is assessed by observation, and a trainer’s technical knowledge is explored through interviews. The quality management process of training providers is also inspected, ensuring course content and trainers’ knowledge is up to date.
 
Good cyber security training has an important role to play in countering the cyber threats that the UK faces on a daily basis.
 
For more information about GCT see the certified courses listed on the APMG website.
 
NCSC
 
You Might Also Read: 
 
GCHQ Approved: Ten Cyber Degree Courses:
 
 
 
« Five Things to Know About 5G
Banks Investing Serious Money In Blockchain »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Tufin

Tufin

Tufin enables organizations to automate their security policy visibility, risk management, provisioning and compliance across their multi-vendor, hybrid environment.

Chatham House

Chatham House

Chatham House is an independent policy institute based in London. Topics cover foreign affairs and defence including cyber security.

Nixon Peabody LLP

Nixon Peabody LLP

Nixon Peabody LLP is an international law firm with offices across the USA, Europe and Asia. Practice areas include Data Privacy and Cyber Security.

Hiscox

Hiscox

Hiscox offers cyber and data risks insurance to protect your business against the risks of holding data and using computer systems..

Cryptomathic

Cryptomathic

Cryptomathic is an expert on commercial crypto - we develop, deliver and support the most secure and efficient off-the-shelf and customised solutions.

App-Ray

App-Ray

App-Ray provides fully automated security analysis of mobile applications to find security issues, privacy breaches and data leaking potentials.

SIS Certifications (SIS CERT)

SIS Certifications (SIS CERT)

SIS Certifications is an ISO certification body serving more than 10,000 clients in over 15 countries worldwide.

ThreatSwitch

ThreatSwitch

ThreatSwitch a software platform for cleared federal contractors to get and stay compliant with NISPOM and Conforming Change 2.

BI.ZONE

BI.ZONE

BI.ZONE creates high-tech products and solutions to protect IT infrastructures and applications, and provides services from cyber intelligence and proactive defence to cybercrime investigation.

VirtualArmour

VirtualArmour

VirtualArmour is a managed security services provider with global reach and local attitude.

Madrona Venture Group

Madrona Venture Group

Madrona Venture Group invests in seed and early-stage technology companies in areas including cybersecurity.

Talion

Talion

Talion aim to reduce the complexity involved in securing your organisation and to give security teams unrivalled visibility into their security operations, so they can make optimal decisions, fast.

HORNE

HORNE

HORNE is a professional services firm supporting clients in public, private & government sectors nationwide.

HarfangLab

HarfangLab

HarfangLab develops a hunting software to boost detection and neutralization of cyberattacks against companies endpoints.

Binarly

Binarly

Binarly has developed an AI-powered platform to protect devices against emerging firmware threats.

c0c0n

c0c0n

c0c0n is the longest running conferences in the area of Information Security and Hacking, in India.