GCHQ Certified Training

The GCHQ Certified Training (GCT) scheme provides a benchmark for cyber security training by assuring the quality of both content and its delivery.  Whether in our personal lives or at work, cyber security awareness is important for us all. 
 
The digital revolution presents huge advantages, but also brings new risks that we need to understand and tackle given our increasing dependence on cyberspace. There has never been a better time to invest in cyber security training.
 
The GCHQ Certified Training (GCT) scheme certifies two levels of cyber security skills training:
 
  • Awareness level — giving newcomers a thorough foundation in cyber security
  • Application level — in-depth courses for professional development  
Whether you are new to cyber security or you are an experienced security professional looking to enhance your skills, GCT can help you or your organisation find the right training.  GCT is designed to assure high quality cyber security training courses delivered by experienced training providers.  
 
  • GCHQ has developed exacting standards against which courses are rigorously assessed
  • the assessment criteria, written by GCHQ, are based on the IISP Skills Framework
  • the GCT certification process is carried out by APMG, the independent certification body approved by GCHQ to award certification and maintain the required high standards of assessment
The scheme offers UK cyber security professionals the opportunity to gain appropriate knowledge and skills through training. It is also useful for anyone seeking to improve or acquire cyber security skills, including those aspiring to certification under the NCSC Certified Professional Scheme
 
Training delivery is assessed by observation, and a trainer’s technical knowledge is explored through interviews. The quality management process of training providers is also inspected, ensuring course content and trainers’ knowledge is up to date.
 
Good cyber security training has an important role to play in countering the cyber threats that the UK faces on a daily basis.
 
For more information about GCT see the certified courses listed on the APMG website.
 
NCSC
 
You Might Also Read: 
 
GCHQ Approved: Ten Cyber Degree Courses:
 
 
 
« Five Things to Know About 5G
Banks Investing Serious Money In Blockchain »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

CGI Group

CGI Group

CGI is a leading IT and business process services provider. Services include IT consulting, Systems Integration, Application Development, Infrastructure, Business Processes, Digital IP.

CERT-SE

CERT-SE

CERT-SE is the national and governmental Computer Security Incident Response Team of Sweden.

Cyber Security Centre - University of Hertfordshire

Cyber Security Centre - University of Hertfordshire

The Cyber Security Centre provides training, teaching and research in the fast paced topics of cyber security and digital forensics.

NESEC

NESEC

NESEC is a specialist in information security consulting services and solutions.

DirectDefense

DirectDefense

DirectDefense is an information security services and managed services provider.

ZenMate

ZenMate

ZenMate is a Virtual Private Network services provider offering secure encrypted access to the internet.

Echoworx

Echoworx

Echoworx primary and exclusive focus is providing organizations with secure email services.

Bangladesh Computer Council (BCC)

Bangladesh Computer Council (BCC)

Bangladesh Computer Council (BCC) is a government body providing support for ICT related activities including formulating national ICT strategy and policy.

Redborder

Redborder

Redborder is an Open Source network visibility, data analytics, and cybersecurity Big Data solution that is scalable up to the needs of enterprise networks and service providers.

Cyberarch Consulting

Cyberarch Consulting

Cyberarch is a security-focused consulting firm. We provide services specializing in information security, digital forensics, penetration testing and cyber security training.

Italtel

Italtel

Italtel is a multinational ICT company that combines networks and communications services with the ability to innovate and develop solutions for digital transformation.

SAIFE

SAIFE

SAIFE has adapted a Software Defined Perimeter approach and paired it with a Zero Trust model that defines access by the user, their device, and where they are located.

CYOSS

CYOSS

CYOSS, an ESG Group company, is a specialist in Cyber Security and Data Analytics. We focus on the opportunities of a networked world and make security risks manageable.

Coffee Cup Solutions

Coffee Cup Solutions

We offer a full spectrum of IT Services, from our UK based Helpdesk to IT Consultancy and Cyber Security. Our team has the skills and experience to develop, deliver and manage IT for your business.

OrbiSky Systems

OrbiSky Systems

OrbiSky Systems is a British tech startup specializing in data management and cybersecurity solutions.

RealmOne

RealmOne

RealmOne addresses the most challenging issues in the realms of defense and cyberspace, adapting to the continuously changing demands of our national security customers.