GCHQ Certified Training

The GCHQ Certified Training (GCT) scheme provides a benchmark for cyber security training by assuring the quality of both content and its delivery.  Whether in our personal lives or at work, cyber security awareness is important for us all. 
 
The digital revolution presents huge advantages, but also brings new risks that we need to understand and tackle given our increasing dependence on cyberspace. There has never been a better time to invest in cyber security training.
 
The GCHQ Certified Training (GCT) scheme certifies two levels of cyber security skills training:
 
  • Awareness level — giving newcomers a thorough foundation in cyber security
  • Application level — in-depth courses for professional development  
Whether you are new to cyber security or you are an experienced security professional looking to enhance your skills, GCT can help you or your organisation find the right training.  GCT is designed to assure high quality cyber security training courses delivered by experienced training providers.  
 
  • GCHQ has developed exacting standards against which courses are rigorously assessed
  • the assessment criteria, written by GCHQ, are based on the IISP Skills Framework
  • the GCT certification process is carried out by APMG, the independent certification body approved by GCHQ to award certification and maintain the required high standards of assessment
The scheme offers UK cyber security professionals the opportunity to gain appropriate knowledge and skills through training. It is also useful for anyone seeking to improve or acquire cyber security skills, including those aspiring to certification under the NCSC Certified Professional Scheme
 
Training delivery is assessed by observation, and a trainer’s technical knowledge is explored through interviews. The quality management process of training providers is also inspected, ensuring course content and trainers’ knowledge is up to date.
 
Good cyber security training has an important role to play in countering the cyber threats that the UK faces on a daily basis.
 
For more information about GCT see the certified courses listed on the APMG website.
 
NCSC
 
You Might Also Read: 
 
GCHQ Approved: Ten Cyber Degree Courses:
 
 
 
« Five Things to Know About 5G
Banks Investing Serious Money In Blockchain »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

LogmeOnce

LogmeOnce

LogmeOnce provides users with solution to multiple Password problems, Single Sign-On (SSO), and Identity Management.

Post-Quantum

Post-Quantum

Post-Quantum offer a unique, patented quantum-resistant encryption algorithm that can be applied to existing products and networks.

herdProtect

herdProtect

herdProtect is a second line of defense malware scanning platform powered by 68 anti-malware engines in the cloud.

Appvisory

Appvisory

Appvisory by MediaTest Digital is the leading Mobile Application Management-Software in Europe and enables enterprises to work secure on smartphones and tablets.

Hysolate

Hysolate

Hysolate has transformed the endpoint, making it the secure and productive environment it was meant to be.

redGuardian

redGuardian

redGuardian is a DDoS mitigation solution available both as a BGP-based service and as an on-premise platform.

Tactical Network Systems (TNS)

Tactical Network Systems (TNS)

Tactical Network Solutions helps you discover hidden attack vectors in IoT and connected devices before someone else does.

Silent Sector

Silent Sector

Silent Sector is a cybersecurity services company that specializes in providing a wide range of managed security services.

Cyber Dacians

Cyber Dacians

Cyber Dacians offers Information and Cyber Security Consulting Services. We help you to test the effectiveness of your security defenses and build a secure infrastructure.

Schneider Downs

Schneider Downs

Schneider Downs & Co. provides accounting, tax and business advisory services through innovative thought leaders who deliver their expertise to meet the individual needs of each client.

Match Systems

Match Systems

Match Systems provides blockchain investigations, KYC, KYT, AML, Due Diligence and compliance services.

Leostream

Leostream

Leostream's Remote Desktop Access Platform enables seamless work-from-anywhere flexibility while maintaining security and constant visibility of users.

Beacon Technology

Beacon Technology

Beacon Technology offers a comprehensive platform consisting of XDR, VMDR, and Breach and Attack simulation tools.

EK3 Technologies

EK3 Technologies

EK3 Technologies mission is to provide comprehensive cybersecurity and IT solutions that allow our clients to focus on sustaining their business.

Stack Overflow

Stack Overflow

Founded in 2008, Stack Overflow’s public platform is used by nearly everyone who codes to learn, share their knowledge, collaborate, and build their careers.

Lithuanian Cyber Command (LTCYBERCOM)

Lithuanian Cyber Command (LTCYBERCOM)

The Lithuanian Cyber Command is responsible for planning and execution of operations in cyberspace and installation of strategic and operational communications and information systems.