Cyber SecurityLearning Resource Hub

 

Global crises. Unprecedented digital disruption. The adversaries are getting smarter, and the problems just keep getting more complex. When it comes to cyber security, the challenges can seem so overwhelming, it's hard to know where to start. 

The Cost of Being Unprepared
Soon the cost of global cybercrime will reach
$11.4 million per minute.[1]


The Growing Cyber Talent Gap
It'll take over 4 million additional trained cyber professionals
to fill the current cyber talent gap.[2]

Ignoring the problems won’t make them go away. Whether you’re looking to assemble your cyber security dream team or just looking to reinforce your own skills, Learning Tree has you covered with expert insights on today’s most effective cyber strategies and skill-based training solutions.

How do you want to advance your cyber security goals today?

Discover how to assemble your cyber security dream team.

Go beyond certification with skill-based cyber training.

Gain insight with complimentary webinars from our cyber experts.

Inside the NICE Framework

 

What is the NICE Framework?
Why take a framework approach to cyber security?
How do I know if a framework approach would work for me?
Is the NICE Framework only for U.S. entities?
What does the NICE Framework consist of?

Cyber Training Aligned to the NICE Framework

Description
Conceptualizes, designs, procures, and/or builds secure Information Technology (IT) systems, with responsibility for aspects of system and/or network development.

Typical Roles/Skills for the Category
Authorizing Official/Designating Representative, Security Control Assessor, Secure Software Assessor, Enterprise Architect, Security Architect, Software Developer, Research & Development Specialist, Systems Requirements Planner, System Testing and Evaluation Specialist, Information Systems Security Developer, Systems Developer

Popular Training Aligned to Securely Provision
Fundamentals of Secure Software Development Training • Course 1825
Certified Information Systems Auditor (CISA) Training • Course 2040
Certified Authorization Professional (CAP) Certification and Training • Course 2061

Explore Additional Securely Provision Training ›

Description
Provides the support, administration, and maintenance necessary to ensure effective and efficient Information Technology (IT) system performance and security.

Typical Roles/Skills for the Category
Database Administrator, System Administrator, Knowledge Manager, Data Analyst, Systems Security Analyst, Technical Support Specialist, Network Operations Specialist

Popular Training Aligned to Operate & Maintain
AWS Training: A Comprehensive Introduction to Amazon Web Services • Course 1205
Microsoft Azure Administrator (AZ-104) • Course 8542

Explore More Operate & Maintain Training ›

Description
Provides leadership, management, direction, or development and advocacy so the organization may effectively conduct cyber security work.

Typical Roles/Skills for the Category
Cyber Legal Advisor, Cyber Instructional Curriculum Developer, Cyber Instructor, Cyber Workforce Developer and Manager, Privacy Officer/Privacy Compliance Manager, Information Systems Security Manager, Communications Security (COMSEC) Manager, Cyber Policy and Strategy Planner, Executive Cyber Leadership, IT Investment/Portfolio Manager, Program Manager, IT Project Manager, Product Support Manager, IT Program Auditor

Popular Training Aligned to Oversee & Govern
Official (ISC)2® CISSP Training and Certification Prep (with Exam Voucher) • Course 2058
EC-Council Certified CISO Training CCISO v3 • Course 2026
Certified Information Privacy Professional (CIPP/US) • Course 2065
Certified Information Privacy Technologist (CIPT) Training • Course 2066
Certified Information Privacy Manager (CIPM) Training • Course 2067
Certified Information Systems Auditor (CISA) Training • Course 2040

Explore More Oversee & Govern Training ›

Description
Identifies, analyzes, and mitigates threats to internal Information Technology (IT) systems and/or networks. Performs highly-specialized review and evaluation of incoming cyber security information to determine its usefulness for intelligence.

Typical Roles/Skills for the Category
Cyber Defense Analyst, Cyber Defense Infrastructure Support Specialist, Cyber Defense Incident Responder, Vulnerability Assessment Analyst, Threat/Warning Analyst, Exploitation Analyst, All-Source Analyst, Mission Assessment Specialist, Multi-Disciplined Language Analyst, Target Developer, Target Network Analyst

Popular Training Aligned to Protect & Defend and Analyze
CyberSec First Responder Certification Training • Course 2070
Certified Ethical Hacker (CEH v11) Training • Course 2031
CompTIA PenTest+ Certification Training • Course 2049
System and Network Security Introduction Training • Course 468

Explore More Protect & Defend Training ›

Explore More Analyze Training ›

Description
Performs highly-specialized review and evaluation of incoming cyber security information to determine its usefulness for intelligence. Provides specialized denial and deception operations and collection of cyber security information that may be used to develop intelligence.

Typical Roles/Skills for the Category
Threat/Warning Analyst, Exploitation Analyst, All-Source Analyst, Mission Assessment Specialist, Multi-Disciplined Language Analyst, Target Developer, Target Network Analyst, All Source-Collection Manager, All Source-Collection Requirements Manager, Cyber Intel Planner, Cyber Ops Planner, Partner Integration Planner, Cyber Operator

Popular Training Aligned to Collect & Operate and Analyze
CyberSec First Responder Certification Training • Course 2070
Certified Ethical Hacker (CEH v11) Training • Course 2031
CompTIA PenTest+ Certification Training • Course 2049
System and Network Security Introduction Training • Course 468
Social Engineering Training: Deceptions and Defences • Course 2012
Implementing a Business Intelligence Solution • Course 901

Explore More Collect & Operate Training ›

Explore More Investigate Training ›

Cyber Certifications & Real-World Skills

Learning Tree's cyber security training curriculum includes the best cyber security certification programs on the market today for all levels of your organization. Our exam prep training provides more than just a path to certification success. Attendees gain real-world skills that can help them make a difference immediately back on the job.

With cyber security certification prep training from Learning Tree, you can expect:

  • Partner-authorized cyber course content (never grey market)
  • Highly-vetted, experienced, and certified cyber security instructors

 

Explore popular cyber security certification training below. 

Suffering from
Impostor Syndrome?

What happens when certifications can’t be backed up with real-world knowledge and skills — and what can security professionals do to avoid this pitfall?

Read the Blog

CertNexus is the global purveyor of vendor-neutral, emerging technology certifications, and micro-credentials for IT, business, and security professionals. CertNexus’ exams meet the most rigorous development standards possible, which outline a global framework for developing personnel certification programs to narrow the widening cyber security skills gap.

CyberSec First Responder Certification Training • Course 2070

The International Council of E-Commerce Consultants, or EC-Council, is a global leader in cyber security certification, with over 150,000 EC-Council certified IT professionals worldwide. With certification ranging from ethical hacking, security analysis, and network defense, EC-Council certifications are a standard-bearer in the IT security world. Learning Tree’s EC-Council courses will provide you the training needed to earn these certifications.

Certified Ethical Hacker (CEH v11) Training • Course 2031
Certified Network Defender (CND) Certification Training • Course 2032
CHFI Certification - Computer Hacking Forensic Investigator Training CHFI v10 • Course 2023
EC-Council Certified Incident Handler (ECIH) Training ECIH v2 • Course 2025
EC-Council Certified CISO Training CCISO v3 • Course 2026
EC-Council Certified Application Security Engineer (CASE) .NET • Course 2028

The Information Systems Control Association® (ISACA®) is a global association that supports the adoption of industry-tested and globally accepted guidance for Information Systems (IS). Earning an ISACA certification validates your credentials as an IS expert in your field.

Certified Information Security Manager (CISM) Training & Certification • Course 2036
Certified Risk and Information Systems Control (CRISC) Training • Course 2037
Certified Governance of Enterprise IT (CGEIT) Training • Course 2038
Cybersecurity Nexus (CSX) Practitioner Training • Course 2039
Certified Information Systems Auditor (CISA) Training • Course 2040

 

Custom Learning Paths for Your Team or Organization?

Consider leveraging our online skill assessments + guided learning paths  + our content library to customize a program tailored to your current cyber security initiatives and challenges. We can even apply before/after skills assessments to measure the impact of skill advancement for visible ROI. Call, live chat, or use the form below to contact us for details.

Preferred method of contact?


Sources:

[1] RiskIQ

[2] (ISC)² Cybersecurity Workforce Study

Chat With Us