GCHQ Certified Training

The GCHQ Certified Training (GCT) scheme provides a benchmark for cyber security training by assuring the quality of both content and its delivery.  Whether in our personal lives or at work, cyber security awareness is important for us all. 
 
The digital revolution presents huge advantages, but also brings new risks that we need to understand and tackle given our increasing dependence on cyberspace. There has never been a better time to invest in cyber security training.
 
The GCHQ Certified Training (GCT) scheme certifies two levels of cyber security skills training:
 
  • Awareness level — giving newcomers a thorough foundation in cyber security
  • Application level — in-depth courses for professional development  
Whether you are new to cyber security or you are an experienced security professional looking to enhance your skills, GCT can help you or your organisation find the right training.  GCT is designed to assure high quality cyber security training courses delivered by experienced training providers.  
 
  • GCHQ has developed exacting standards against which courses are rigorously assessed
  • the assessment criteria, written by GCHQ, are based on the IISP Skills Framework
  • the GCT certification process is carried out by APMG, the independent certification body approved by GCHQ to award certification and maintain the required high standards of assessment
The scheme offers UK cyber security professionals the opportunity to gain appropriate knowledge and skills through training. It is also useful for anyone seeking to improve or acquire cyber security skills, including those aspiring to certification under the NCSC Certified Professional Scheme
 
Training delivery is assessed by observation, and a trainer’s technical knowledge is explored through interviews. The quality management process of training providers is also inspected, ensuring course content and trainers’ knowledge is up to date.
 
Good cyber security training has an important role to play in countering the cyber threats that the UK faces on a daily basis.
 
For more information about GCT see the certified courses listed on the APMG website.
 
NCSC
 
You Might Also Read: 
 
GCHQ Approved: Ten Cyber Degree Courses:
 
 
 
« Five Things to Know About 5G
Banks Investing Serious Money In Blockchain »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

OPSWAT

OPSWAT

OPSWAT is a software company that provides solutions to secure and manage IT infrastructure.

Compumatica

Compumatica

Compumatica is a leading European ICT security manufacturer for cybersecurity and encryption products. Solutions include network security, SCADA/ICS security, Mobile/BYOD and email encryption.

Lynx Technology Partners

Lynx Technology Partners

Lynx Technology Partners is a full service, full life-cycle risk-based security consulting firm.

Bl4ckswan

Bl4ckswan

Bl4ckswan is a Management Consulting firm specialized in the delivery of information security and compliance services.

URS Certification

URS Certification

United Registrar of Systems (URS Certification) is an independent certification body operating in more than 30 countries within the multinational URS Holdings.

Tracepoint

Tracepoint

Tracepoint provide full-service cyber incident response, remediation and recovery solutions for the most time-sensitive situation your company may ever face.

BlackFog

BlackFog

BlackFog is a leader in device data privacy, data security and ransomware prevention. Our behavioral analysis and anti data exfiltration technology stops hackers before they even get started.

Cynalytica

Cynalytica

Cynalytica deliver pioneering cybersecurity and machine analytics technologies that help protect critical infrastructure, securely enable Industry 4.0 and help accelerate digital transformation.

Material Security

Material Security

Material is solving one of the most fundamental problems in security: protecting the data sitting in mailboxes.

Third Point Ventures

Third Point Ventures

Third Point brings deep technical expertise, a strong network of relationships, and decades of investing experience to add value to our partners throughout their journey from idea to IPO and beyond.

Aptum

Aptum

Aptum is a global hybrid multi-cloud managed service provider delivering complex and high-performance cloud solutions with an integrated secure network.

Dutch Research Council (NWO)

Dutch Research Council (NWO)

The Dutch Research Council (NWO) is one of the most important science-funding bodies in the Netherlands and ensures quality and innovation in science.

Zama

Zama

Zama - pioneering homomorphic encryption. We believe people shouldn't care about privacy. Not because it doesn't matter, but because it shouldn't be an issue!

Custom Computer Specialist (CCS)

Custom Computer Specialist (CCS)

CCS offers an extensive range of services including cybersecurity solutions, consulting, implementation, and support to help our clients maximize the value derived from IT investments.

Cyber Defense International (CDI)

Cyber Defense International (CDI)

At CDI, we utilize decades of experience in designing and building large-scale cybersecurity programs, creating tailored solutions and services that protect businesses from cyber threats.

Monokee

Monokee

Monokee offers a solution that seamlessly integrates powerful Identity and Access Management (IAM) capabilities with a low/no code identity orchestrator.