GCHQ Certified Training

The GCHQ Certified Training (GCT) scheme provides a benchmark for cyber security training by assuring the quality of both content and its delivery.  Whether in our personal lives or at work, cyber security awareness is important for us all. 
 
The digital revolution presents huge advantages, but also brings new risks that we need to understand and tackle given our increasing dependence on cyberspace. There has never been a better time to invest in cyber security training.
 
The GCHQ Certified Training (GCT) scheme certifies two levels of cyber security skills training:
 
  • Awareness level — giving newcomers a thorough foundation in cyber security
  • Application level — in-depth courses for professional development  
Whether you are new to cyber security or you are an experienced security professional looking to enhance your skills, GCT can help you or your organisation find the right training.  GCT is designed to assure high quality cyber security training courses delivered by experienced training providers.  
 
  • GCHQ has developed exacting standards against which courses are rigorously assessed
  • the assessment criteria, written by GCHQ, are based on the IISP Skills Framework
  • the GCT certification process is carried out by APMG, the independent certification body approved by GCHQ to award certification and maintain the required high standards of assessment
The scheme offers UK cyber security professionals the opportunity to gain appropriate knowledge and skills through training. It is also useful for anyone seeking to improve or acquire cyber security skills, including those aspiring to certification under the NCSC Certified Professional Scheme
 
Training delivery is assessed by observation, and a trainer’s technical knowledge is explored through interviews. The quality management process of training providers is also inspected, ensuring course content and trainers’ knowledge is up to date.
 
Good cyber security training has an important role to play in countering the cyber threats that the UK faces on a daily basis.
 
For more information about GCT see the certified courses listed on the APMG website.
 
NCSC
 
You Might Also Read: 
 
GCHQ Approved: Ten Cyber Degree Courses:
 
 
 
« Five Things to Know About 5G
Banks Investing Serious Money In Blockchain »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

SCADAhacker

SCADAhacker

SCADAhacker provides mission critical information relating to industrial security of SCADA, DCS and other Industrial Control Systems.

CyberPolicy

CyberPolicy

CyberPolicy is a cyber protection solution for small businesses. It combines three important components against cyber threats - Cyber Plan, Cybersecurity and Cyber Insurance.

Truth Technologies Inc (TTI)

Truth Technologies Inc (TTI)

TTI is a premier provider of worldwide anti-money laundering, anti-fraud, customer identification, and compliance products and services.

Cyber DriveWare

Cyber DriveWare

DriveWare analyzes new traffic in the I/O layer and blocks malware and cyber attacks which organizations have no means to protect against.

Saviynt

Saviynt

Saviynt is a leading provider of Cloud Security and Identity Governance solutions.

SecuTech Solutions

SecuTech Solutions

SecuTech is a global leader in providing strong authentication and software licensing management solutions.

RIGCERT

RIGCERT

RIGCERT provides training, audit and certification services for multiple fields including Information Security.

Bureau Veritas

Bureau Veritas

Bureau Veritas are a world leader in Testing, Inspection and Certification. We provide certification and training services in areas including cybersecurity and data protection.

Ukrainian Special Systems (USS)

Ukrainian Special Systems (USS)

Ukrainian Special Systems (USS) is a state-owned commercial enterprise providing confidential communication, trust services and services in the field of information protection.

Risk Ledger

Risk Ledger

Risk Ledger is improving the security of the global supply chain ecosystem, reducing the number of data breaches experienced through supply chain attacks by companies and consumers alike.

Inetum

Inetum

Inetum (formerly Gfi Informatique) is an agile IT services providing digital services and solutions, and a global group that helps companies and institutions to get the most out of digital flow.

Zephyr Project

Zephyr Project

The Zephyr Project strives to deliver the best-in-class RTOS for connected resource-constrained devices, built to be secure and safe.

Sydeco

Sydeco

Sydeco offer a complete range of products that secure computer and industrial networks, servers, programs and data against any type of computer attack.

BlackFog

BlackFog

BlackFog is a leader in device data privacy, data security and ransomware prevention. Our behavioral analysis and anti data exfiltration technology stops hackers before they even get started.

MajorKey Technologies

MajorKey Technologies

MajorKey improves security performance by reducing user friction and business risk, empowering your people, and protecting your IP.

Endari

Endari

Endari specializes in building cybersecurity maturity within the operational DNA of early-stage startups and SMBs.