Cyber Security
Learning Resource Hub

 

Global crises. Unprecedented digital disruption. The adversaries are getting smarter, and the problems just keep getting more complex. When it comes to cyber security, the challenges can seem so overwhelming, it's hard to know where to start. 

The Cost of Being Unprepared
Soon the cost of global cybercrime will reach
$11.4 million per minute.[1]


The Growing Cyber Talent Gap
It'll take over 4 million additional trained cyber professionals
to fill the current cyber talent gap.[2]

Ignoring the problems won’t make them go away. Whether you’re looking to assemble your cyber security dream team or just looking to reinforce your own skills, Learning Tree has you covered with expert insights on today’s most effective cyber strategies and skill-based training solutions.

How do you want to advance your cyber security goals today?

Discover how to assemble your cyber security dream team.

Go beyond certification with skill-based cyber training.

Gain insight with complimentary webinars from our cyber experts.

Inside the NICE Framework

 

What is the NICE Framework?
Why take a framework approach to cyber security?
How do I know if a framework approach would work for me?
Is the NICE Framework only for U.S. entities?
What does the NICE Framework consist of?

Cyber Training Aligned to the NICE Framework

Description
Conceptualizes, designs, procures, and/or builds secure Information Technology (IT) systems, with responsibility for aspects of system and/or network development.

Typical Roles/Skills for the Category
Authorizing Official/Designating Representative, Security Control Assessor, Secure Software Assessor, Enterprise Architect, Security Architect, Software Developer, Research & Development Specialist, Systems Requirements Planner, System Testing and Evaluation Specialist, Information Systems Security Developer, Systems Developer

Popular Training Aligned to Securely Provision
Fundamentals of Secure Software Development Training • Course 1825
Certified Information Systems Auditor (CISA) Training • Course 2040
Certified Authorization Professional (CAP) Certification and Training • Course 2061
CertNexus Certified Cyber Secure Coder Training • Course 2071

Explore Additional Securely Provision Training ›

Description
Provides the support, administration, and maintenance necessary to ensure effective and efficient Information Technology (IT) system performance and security.

Typical Roles/Skills for the Category
Database Administrator, System Administrator, Knowledge Manager, Data Analyst, Systems Security Analyst, Technical Support Specialist, Network Operations Specialist

Popular Training Aligned to Operate & Maintain
AWS Training: A Comprehensive Introduction to Amazon Web Services • Course 1205
Microsoft Azure Administrator (AZ-104) • Course 8542
Oracle Database 12c Administration Training • Course 2227
Administering a SQL Database Infrastructure Training (20764) • Course 8422
EC-Council Certified Security Analyst (ECSA) Certification Training ECSA v10 • Course 2024

Explore More Operate & Maintain Training ›

Description
Provides leadership, management, direction, or development and advocacy so the organization may effectively conduct cyber security work.

Typical Roles/Skills for the Category
Cyber Legal Advisor, Cyber Instructional Curriculum Developer, Cyber Instructor, Cyber Workforce Developer and Manager, Privacy Officer/Privacy Compliance Manager, Information Systems Security Manager, Communications Security (COMSEC) Manager, Cyber Policy and Strategy Planner, Executive Cyber Leadership, IT Investment/Portfolio Manager, Program Manager, IT Project Manager, Product Support Manager, IT Program Auditor

Popular Training Aligned to Oversee & Govern
Official (ISC)2® CISSP Training and Certification Prep (with Exam Voucher) • Course 2058
EC-Council Certified CISO Training CCISO v3 • Course 2026
Certified Information Privacy Professional (CIPP/US) • Course 2065
Certified Information Privacy Technologist (CIPT) Training • Course 2066
Certified Information Privacy Manager (CIPM) Training • Course 2067
Certified Information Systems Auditor (CISA) Training • Course 2040

Explore More Oversee & Govern Training ›

Description
Identifies, analyzes, and mitigates threats to internal Information Technology (IT) systems and/or networks. Performs highly-specialized review and evaluation of incoming cyber security information to determine its usefulness for intelligence.

Typical Roles/Skills for the Category
Cyber Defense Analyst, Cyber Defense Infrastructure Support Specialist, Cyber Defense Incident Responder, Vulnerability Assessment Analyst, Threat/Warning Analyst, Exploitation Analyst, All-Source Analyst, Mission Assessment Specialist, Multi-Disciplined Language Analyst, Target Developer, Target Network Analyst

Popular Training Aligned to Protect & Defend and Analyze
CyberSec First Responder Certification Training • Course 2070
Certified Ethical Hacker (CEH v10) Training • Course 2031
CompTIA PenTest+ Certification Training • Course 2049
System and Network Security Introduction Training • Course 468

Explore More Protect & Defend Training ›

Explore More Analyze Training 

Description
Performs highly-specialized review and evaluation of incoming cyber security information to determine its usefulness for intelligence. Provides specialized denial and deception operations and collection of cyber security information that may be used to develop intelligence.

Typical Roles/Skills for the Category
Threat/Warning Analyst, Exploitation Analyst, All-Source Analyst, Mission Assessment Specialist, Multi-Disciplined Language Analyst, Target Developer, Target Network Analyst, All Source-Collection Manager, All Source-Collection Requirements Manager, Cyber Intel Planner, Cyber Ops Planner, Partner Integration Planner, Cyber Operator

Popular Training Aligned to Collect & Operate and Analyze
CyberSec First Responder Certification Training • Course 2070
Certified Ethical Hacker (CEH v10) Training • Course 2031
CompTIA PenTest+ Certification Training • Course 2049
System and Network Security Introduction Training • Course 468
Social Engineering Training: Deceptions and Defenses • Course 2012
Implementing a Business Intelligence Solution • Course 901

Explore More Collect & Operate Training ›

Explore More Investigate Training ›

Cyber Certifications & Real-World Skills

Learning Tree's cyber security training curriculum includes the best cyber security certification programs on the market today for all levels of your organization. Our exam prep training provides more than just a path to certification success. Attendees gain real-world skills that can help them make a difference immediately back on the job.

With cyber security certification prep training from Learning Tree, you can expect:

  • Partner-authorized cyber course content (never grey market)
  • Highly-vetted, experienced, and certified cyber security instructors

 

Explore popular cyber security certification training below. 

Suffering from
Impostor Syndrome?

What happens when certifications can’t be backed up with real-world knowledge and skills — and what can security professionals do to avoid this pitfall?

Read the Blog

CertNexus is the global purveyor of vendor-neutral, emerging technology certifications, and micro-credentials for IT, business, and security professionals. CertNexus’ exams meet the most rigorous development standards possible, which outline a global framework for developing personnel certification programs to narrow the widening cyber security skills gap.

Internet of Things (IoT) Practitioner Training • Course 1276
CyberSec First Responder Certification Training • Course 2070
CertNexus Certified Cyber Secure Coder Training • Course 2071

The Information Systems Control Association® (ISACA®) is a global association that supports the adoption of industry-tested and globally accepted guidance for Information Systems (IS). Earning an ISACA certification validates your credentials as an IS expert in your field.

Certified Information Security Manager (CISM) Training & Certification • Course 2036
Certified Risk and Information Systems Control (CRISC) Training • Course 2037
Certified Governance of Enterprise IT (CGEIT) Training • Course 2038
Cybersecurity Nexus (CSX) Practitioner Training • Course 2039
Certified Information Systems Auditor (CISA) Training • Course 2040

Employers and IT pros can tap a hands-on, online cloud certification offered by Learning Tree International in partnership with Mission Critical Institute (MCI). In five online, 8-week courses delivered anytime anywhere—includes live online instruction--you or your employees conveniently prepare to become a Certified Cloud Risk Management Professional (CCRMP). The CCRMP is a 100% hands-on project-based, cloud security certification based on the NIST Risk Management Framework (RMF) and the Federal Risk and Authorization Management Program (FedRAMP).

Cybersecurity Risk Management Policy and Methods Review • Course 2095
Cybersecurity Risk Management Methodology • Course 2096
Cybersecurity Risk Management Practicum I • Course 2097
Cybersecurity Risk Management Practicum II • Course 2098
Cybersecurity Vulnerability Management • Course 2099

Upcoming Cyber Security Webinars

Cyber Security: Consumerism Masks
the Real Problems [Session 1]

When: Friday, Oct 30th • 9 am EDT
Duration: 1 hour

The "cyber security problem" continues to worsen dramatically despite spending tens of billions of dollars a year on software and tools. In contrast to this, many of the tools used by attackers are free, or very low cost! In this webinar we will provide some perspectives on this predicament as well as some important approaches worth considering.

Register

Cyber Security: Consumerism Masks
the Real Problems [Session 2]

When: Friday, Oct 30th • 12 pm EDT
Duration: 1 hour

The "cyber security problem" continues to worsen dramatically despite spending tens of billions of dollars a year on software and tools. In contrast to this, many of the tools used by attackers are free, or very low cost! In this webinar we will provide some perspectives on this predicament as well as some important approaches worth considering.

Register

 

Custom Learning Paths for Your Team or Organization?

Consider leveraging our online skill assessments + guided learning paths  + our content library to customize a program tailored to your current cyber security initiatives and challenges. We can even apply before/after skills assessments to measure the impact of skill advancement for visible ROI. Call, live chat, or use the form below to contact us for details.

Preferred method of contact?


Sources:

[1] RiskIQ

[2] (ISC)² Cybersecurity Workforce Study

Chat Now

Please Choose a Language

Canada - English

Canada - Français