GCT - GCHQ Certified Training

CESG

GCHQ Certified Training (GCT) helps individuals and organisations quickly identify high quality relevant cyber security training.

This product is available through

Pages

Why was GCT Introduced?

The UK Government has identified a significant shortage of skilled cyber security professionals and Government Communications Headquarters (GCHQ) is working with other government departments to address this issue. GCHQ is one of the three UK Intelligence and Security Agencies, along with MI5 and the Secret Intelligence Service (MI6) and provides assistance on the security of Government communications and electronic data.

With the abundance of cyber security training courses on offer, it can be difficult for customers to identify highly competent trainers and good quality courses. GCT addresses this issue – providing customers with a choice of rigorously assessed training providers, thus they can feel confident they’ll receive training that is consistent with industry best practice.

GCHQ has appointed APMG as the independent Certification Body for GCHQ-approved cyber security training courses, due to APMG’s track record for accrediting quality training providers.

APMG certifies the trainers, the course material and administration processes surrounding the course – forming a truly comprehensive assessment process.

What is the Benefit of Choosing a GCT Course?

  • Individuals and organizations can easily and quickly identify high quality, relevant training
  • The course materials have been rigorously assessed against the exacting standards of GCHQ
  • The quality of the trainers’ delivery and the course administration has been quality checked
  • GCT is based on the industry-respected IISP Skills Framework
  • GCT is invaluable for anyone seeking to acquire or improve their cyber security skills, including those seeking CESG Certified Professional status.

What is the Benefit of Certification for Training Providers?

  • Is a key market differentiator which sets courses apart from other cyber security training options
  • Inspires confidence in organisations and individuals that your course is of a high quality, with proof that your cyber security training has been assessed against GCHQ’s rigorous standards
  • Ensures your cyber security training meets high standards of both content and delivery.

How do I become a GCHQ Certified Training Provider?

For more information on how to achieve GCHQ certification for a course please email accreditationapplications@apmg-international.com or phone +44 (0) 1494 452450. Alternatively, click here to download our brochure.

Current GCT courses available:

Awareness Level

These courses provide an introduction, awareness and overview of the cyber security landscape.  Typically, they are applicable for those who are taking up a new cyber security role or wishing to enter the profession.

The current awareness level courses that have been certified are:

Training provider Course IISP SKILLS the course focuses on Additional IISP SKILLS COVERED
Bristol Management Centre Ltd Cyber & Information Security

A1, A3, A5, A6, A7, B1, B2, E3, F1, G1, H1

-

Cyber Management Alliance

Cyber Security & Privacy Essentials

A1, A2, A3, A4, A5, A6, A7, F1, F3

-

Cyber Management Alliance Cyber Incident Planning & Response (CIPR) F1, F2, H1 B1, F3
CybSafe Limited CybSafe 

C1, E1 

-

Explosive Learning Solutions

Cyber Awareness

B2

A2, E2

HS and TC ICS Manager Security Course A1, A5, B1, B2, E1, F1 -
JWC International E-Learning Maritime Cyber Security Awareness Course (MCSA) A1, A2, A5, B1, B2, F1 A3, A4, A6, A7
JWC International Maritime Cyber Security Awareness Course (MCSA) A1, A2, A5, B1, B2, E2, F1 A3, A4, A5, A7
JWC International Offshore Cyber Security Awareness (OCSA) A1, A2, A5, B1, B2, E2, F1 A3, A4, A5, A7, C2
PGI Strontium Cyber Security Fundamentals A1, A2, A3, A4, A5, A6, A7, B1, B2, C1, C2, D2, E1, E2, E3, F1, G1, H1 -
PGI Strontium Executive Cyber Awareness

A1,A2,A4,A5,B1,B2,C1,E1,E3, F1

H1,A7,C2,D1,D2,A3

QA

Certificate in Information Security Management Principles

A1, A2, A3, A5, A6, B1, B2, C1, C2, D1, D2, E1, E2, F1, G1

E3, F3

QA

CISSP

A1, A2, A5, A6, A7, B1, B2, C1, C2 D2, E1, E2, E3, F1, F2, H1, H2

-

QA Information Assurance Risk Managment (QAIARMHMG) A1, A2, A6, B1, B2, D1 -
QA Introduction To Accreditation (QAITA) A1, A2, A5, A6, B1, G1 -
QA Introduction to Digital Forensics  F3 -

Templar Executives

Cyber Security Awareness

A1, A2, A3, A4, A5, A6, A7, B1, B2, H1, D1

-

Templar Executives Cyber Security Awareness
E-Learning
A1, A2, A3, A4, A5, A6, A7, B1, B2 -
Templar Executives

Cyber Security for Audit Committees Awareness, Core skills

A1, A2, A3, A4, A5, A6, A7, B1, B2, G1, H1, H2 -

Templar Executives

Cyber Security for Information Asset Owners (IAOs)


A1, A2, A3, A4, A5, A6, A7, B1, B2, G1, H1, H2, F1

-

Templar Executives

Cyber Security for Senior Executives and Senior Information Risk Owners (SIROs)

A1, A2, A3, A4, A5, A6, A7, B1, B2, G1, H1, H2

F1

Templar Executives

Cyber Security - The Insider Threat

A1, A5, A6

A4, A3, A7, B1, B2, C1 

Templar Executives

Cyber Security for Non-Executive Directors (NEDs) and trustees

A1, A2, A4, A6, B1, B2

 

A3, A5, A7
 

Templar Executives

Cyber security for Chief Information Security Officers (CISOs)

A1, A2,  A5, A6, B1, C1, C2

A3, A4, A7, B2 

Templar Executives Information and Cyber Law A1, A3 ,A5 ,A6 ,A7 ,B1 ,B2 ,H1 -

The National Archives

Cyber Security for Information Asset Owners (IAOs)

A1, B1, B2, F1 

A6, A7

The National Archives Delivering Information Assurance Training A1, A6, A7, B1, B2, F1 -

The Open University

Introduction to Cyber Security

A1, A2, A3, B1, B2, C1, C2, D1, E1, E2, E3

I1

The SANS Institute

HMG Hacker Tools, Techniques, Exploits and Incident Handling

B1,C1,C2,D1,D2,E2,E3,F1,F2

A1,A5,A6

Ultima Risk Management Ltd

Certificate in Information Security Management Principles

B1,B2

-

Xyone Board Level Cyber Security Strategy Training A1, A3,B1,B2,H1 -
Xyone Mitigate A1, A2, A5, B1, E1 A3, A4, A6, A7, B2, C1, C2, E2, F7, H1, H2

IISP skills definitions are available here

 

Application Level

Application level courses are designed for specialists, professionals or practitioners within the cyber security field - providing detailed insights and understanding. These courses are most suitable for individuals already working within a cyber security role who wish to further their professional capability.

The current application level courses that have been certified are:

Training provider Course IISP SKILLS the course focuses on Additional IISP SKILLS COVERED
7Safe CSTA Ethical Hacking: Hands-On D2, E3 C1, F3

BluescreenIT

CompTIA Security+

C1, D1, D2, E1, E2

B1, B2, C2, E3, F1, F3, H1, H2

BluescreenIT CASP- Comptia Advanced Security A1, D1, D2, E2, E3, F1, F2, F3, H1  

Firebrand

Cyber Crime Foundation and Practitioner

A6, E1, F2, F3

C1

International CyberSecurity Institute (ICSI) Certified ISO 27001 Lead Implementer (ICSI|CLI) A1, A2, A3, A4, A5, A6, A7, B1, B2 C1, C2, E1, E3, F1, G1

IASME

Technical Cyber Auditing, Cyber Essentials Plus

D1,D2,G1

C1

Learning Tree International Ltd Cyber Security Risk Assessment & Management  B1, B2 A1, A2, E1, E2, E3
Learning Tree International Ltd System and Network Security Introduction E2, E3 A2, D1, E1, F1
Learning Tree International Ltd Defending the Perimeter from Cyber Attack E1, E2, E3 -
Learning Tree International Ltd Securing web applications, Services and Servers C2 B1
Learning Tree International Ltd

Penetration Testing – Tools and Techniques 

D2 -

PGI Strontium

Advanced Threat Methodology

D2, E3, F3

-

PGI Strontium

Incident Response for IT/ Operational Digital Forensics

F1, F3

-

PGI Strontium Open Source Intelligence E3 -
PGI Strontium SOC Analyst E1,E2,E3,F1,F2  -
QA Certified ISO27001 Practitioner A1, A2, A3, A4, A6, B1, B2, C2, D1, D2, E1, G1 -
QA The art of Hacking D2, E3, C2  -
Tranchulas Limited

Hands-On Penetration Testing and Ethical Hacking (CPTP)

D2, E3 -

Ultima Risk Management Ltd

Practitioner Certificate in Information Risk Management

B1, B2

-

Ultima Risk Management Ltd

Certificate in Implementing ISO 27001

A1, A2, A3, A4, A5, B1, B2, G1

-

IISP skills definitions are available here

 

Courseware:

Certified courseware must be used in conjunction with a GCT certified trainer and GCT certified quality management system to be recognised as GCHQ Certified Training.

The following courseware has been certified:

Training provider Course IISP SKILLS the course focuses on Additional IISP SKILLS COVERED
AXELOS  Resilia Awareness Learning Modules CBT E1, B2 -

Logical Operations

CyberSec First Responder: Threat Detection and Response (CFR)

B1, B2 C1, D1, D2, F1, F2, F3

A6, C2, E1, E3, G1
 

IISP skills definitions are available here

 

If you have any questions about GCT please do not hesitate to contact us by emailing accreditationapplications@apmg-international.com or calling us on +44 (0) 1494 452450.

Why choose apmg

  • APMG services focus on high-quality. 
     
  • APMG is accredited by the United Kingdom Accreditation Service (UKAS).
     
  • APMG has heritage in the cyber security field.
     
  • APMG is the only certification body providing GCHQ Certified Training assessments.

Benefits of GCT - GCHQ Certified Training

  • Individuals and organizations can easily and quickly identify high quality, relevant training
  • The course materials have been rigorously assessed against GCHQ standards
  • The quality of the trainers’ delivery and the course administration has been quality checked
  • GCT is invaluable for anyone seeking to acquire or improve their cyber security skills.

Share