Enhance Your Credentials
with Learning Tree Certifications

Earn Certifications with Learning Tree

30+ Cyber Security Courses and 40+ Certifications
Aligned with the NICE Framework

30+ Hands-On
Cyber Security Courses
Aligned with the NICE Framework

DOWNLOAD BROCHURE »

Cyber Security Knowledge Center – news, offers and FREE learning resources

VIEW CYBER RESOURCES »

Based on the National Cybersecurity Workforce Framework as defined by the National Initiative for Cybersecurity Education (NICE)

Learning Tree offers Cyber Security Specialist and Expert Certifications that align with the National Cybersecurity Workforce Framework. Your Cyber Security Workforce will receive the most effective hands-on training available to achieve certifications specific to their job role, and fully protect your organization from cyber threats.

 

About the NICE Framework

The NICE National Cybersecurity Workforce Framework organizes and defines all Cyber Security Workforce specialty areas/job roles, and the Knowledge, Skills and Abilities (KSAs) required for each area/role into several high-level categories. See below.

Interactive National Cybersecurity Workforce
Framework Categories

Securely
Provision
Operate &
Maintain
Protect &
Defend
Investigate
Analyze
Oversight
& Dev't

Securely Provision

IT Systems Development: Specialty areas concerned with conceptualizing, designing, and building secure IT systems, with responsibility for some aspect of the systems' development.

Information Assurance Auditor

Maps to NICE: Information Assurance Compliance

KSAs* required for job roles:
Oversees, evaluates, and supports the documentation, validation, and accreditation processes necessary to assure that new IT systems meet the organization's information assurance and security requirements. Ensures appropriate treatment of risk, compliance, and assurance from internal and external perspectives.

Specialist Certification Path

Expert Certification Path

  • Advanced Security Auditing • Course 2047 — COMING SOON!

*KSAs: Knowledge, Skills, Abilities

Software Security Engineer

Maps to NICE: Software Security Engineering

KSAs* required for job roles:
Develops and writes/codes new (or modifies existing) computer applications, software, or specialized utility programs following software assurance best practices.

Specialist Certification Path

Expert Certification Path

*KSAs: Knowledge, Skills, Abilities

Systems Developer

Maps to NICE: Systems Development

KSAs* required for job roles:
Works on the development phases of the systems development lifecycle.

Specialist Certification Path

Expert Certification Path

  • Cyber Security: Secure System Development • Course 3675 — COMING SOON!

*KSAs: Knowledge, Skills, Abilities

Systems Planner

Maps to NICE: System Requirements Planning

KSAs* required for job roles:
Consults with customers to gather and evaluate functional requirements and translates these requirements into technical solutions. Provides guidance to customers about applicability of information systems to meet business needs.

Specialist Certification Path

Expert Certification Path

*KSAs: Knowledge, Skills, Abilities

Operate & Maintain

IT Systems Support: Specialty areas responsible for providing the support, administration, and maintenance necessary to ensure effective and efficient IT system performance and security.

Help Desk Administrator

Maps to NICE: Customer Service and Technical Support

KSAs* required for job roles:
Addresses problems, installs, configures, troubleshoots, and provides maintenance and training in response to customer requirements or inquiries (e.g., tiered-level customer support).

Specialist Certification Path

Expert Certification Path

*KSAs: Knowledge, Skills, Abilities

SQL Server Data Administrator

Maps to NICE: Data Administration

KSAs* required for job roles:
Develops and administers databases and/or data management systems that allow for the storage, query, and utilization of data.

Specialist Certification Path

Expert Certification Path

*KSAs: Knowledge, Skills, Abilities

Oracle Server Data Administrator

Maps to NICE: Data Administration

KSAs* required for job roles:
Develops and administers databases and/or data management systems that allow for the storage, query, and utilization of data.

Specialist Certification Path

Expert Certification Path

*KSAs: Knowledge, Skills, Abilities

Network Engineer

Maps to NICE: Network Services

KSAs* required for job roles:
Installs, configures, tests, operates, maintains, and manages networks and their firewalls, including hardware (e.g., hubs, bridges, switches, multiplexers, routers, cables, proxy servers, and protective distributor systems) and software that permit the sharing and transmission of all spectrum transmissions of information to support the security of information and information systems.

Specialist Certification Path

Expert Certification Path

*KSAs: Knowledge, Skills, Abilities

Windows System Administrator

Maps to NICE: System Administration

KSAs* required for job roles:
Installs, configures, troubleshoots, and maintains server configurations (hardware and software) to ensure their confidentiality, integrity, and availability. Also manages accounts, firewalls, and patches. Responsible for access control, passwords, and account creation and administration.

Specialist Certification Path

Expert Certification Path

*KSAs: Knowledge, Skills, Abilities

Linux System Administrator

Maps to NICE: System Administration

KSAs* required for job roles:
Installs, configures, troubleshoots, and maintains server configurations (hardware and software) to ensure their confidentiality, integrity, and availability. Also manages accounts, firewalls, and patches. Responsible for access control, passwords, and account creation and administration.

Specialist Certification Path

Expert Certification Path

*KSAs: Knowledge, Skills, Abilities

Systems Security Analyst

Maps to NICE: Systems Security Analysis

KSAs* required for job roles:
Conducts the integration/testing, operations, and maintenance of systems security.

Specialist Certification Path

Expert Certification Path

*KSAs: Knowledge, Skills, Abilities

Protect & Defend

Threat Analysis: Specialty areas responsible for the identification, analysis, and mitigation of threats to internal IT systems or networks.

Network Defense Analyst

Maps to NICE: Computer Network Defense Analysis

KSAs* required for job roles:
Uses defensive measures and information collected from a variety of sources to identify, analyze, and report events that occur or might occur within the network in order to protect information, information systems, and networks from threats.

Specialist Certification Path

Expert Certification Path

*KSAs: Knowledge, Skills, Abilities

Network Infrastructure Defender

Maps to NICE: Computer Network Defense Infrastructure Support

KSAs* required for job roles:
Tests, implements, deploys, maintains, reviews and administers the infrastructure hardware and software that are required to effectively manage the computer network defense service provider network and resources. Monitors network to actively remediate unauthorized activities.

Specialist Certification Path

Expert Certification Path

*KSAs: Knowledge, Skills, Abilities

Incident Responder

Maps to NICE: Incident Response

KSAs* required for job roles:
Responds to crisis or urgent situations within the pertinent domain to mitigate immediate and potential threats. Uses mitigation, preparedness, and response and recovery approaches, as needed, to maximize survival of life, preservation of property, and information security. Investigates and analyzes all relevant response activities.

Specialist Certification Path

Expert Certification Path

  • Detecting Breaches & DDoS • Course 2037 — COMING SOON!

*KSAs: Knowledge, Skills, Abilities

Security and Vulnerability Assessor

Maps to NICE: Vulnerability Assessment and Management

KSAs* required for job roles:
Conducts assessments of threats and vulnerabilities, determines deviations from acceptable configurations, enterprise or local policy, assesses the level of risk, and develops and/or recommends appropriate mitigation countermeasures in operational and non-operational situations.

Specialist Certification Path

Expert Certification Path

*KSAs: Knowledge, Skills, Abilities

Investigate

Cyber Investigation: Specialty areas responsible for the investigation of cyber events and/or crimes of IT systems, networks, and digital evidence.

Digital Forensics Investigator

Maps to NICE: Digital Forensics

KSAs* required for job roles:
Collects, processes, preserves, analyzes, and presents computer-related evidence in support of network vulnerability mitigation, and/or criminal, fraud, counterintelligence or law enforcement investigations.

Specialist Certification Path

Expert Certification Path

  • Advanced Investigations and Malware Analysis • Course 2038 — COMING SOON!

*KSAs: Knowledge, Skills, Abilities

Cyber Security Investigator

Maps to NICE: Investigation

KSAs* required for job roles:
Applies tactics, techniques, and procedures for a full range of investigative tools and processes to include but not limited to interview and interrogation techniques, surveillance, counter surveillance, and surveillance detection, and appropriately balances the benefits of prosecution versus intelligence gathering.

Specialist Certification Path

Expert Certification Path

  • Advanced Investigations and Malware Analysis • Course 2038 — COMING SOON!

*KSAs: Knowledge, Skills, Abilities

Analyze

Information Analysis: Specialty areas responsible for highly specialized review and evaluation of incoming cybersecurity information to determine its usefulness for intelligence.

Activity-Based Intelligence Analyst

Maps to NICE: All Source Intelligence

KSAs* required for job roles:
Analyzes threat information from multiple sources, disciplines, and agencies across the Intelligence Community. Synthesizes and places intelligence information in context; draws insights about the possible implications.

Specialist Certification Path

Expert Certification Path

*KSAs: Knowledge, Skills, Abilities

Exploitation Analyst

Maps to NICE: Exploitation Analysis

KSAs* required for job roles:
Analyzes collected information to identify vulnerabilities and potential for exploitation.

Specialist Certification Path

Expert Certification Path

  • Exploitation Analysis • Course 2041 — COMING SOON!

*KSAs: Knowledge, Skills, Abilities

Cyber Threat Analyst

Maps to NICE: Threat Analysis

KSAs* required for job roles:
Identifies and assesses the capabilities and activities of cyber criminals or foreign intelligence entities; produces findings to help initialize or support law enforcement and counterintelligence investigations or activities.

Specialist Certification Path

Expert Certification Path

  • Malware Analysis / Reverse Engineer • Course 2035 — COMING SOON!

*KSAs: Knowledge, Skills, Abilities

Oversight & Development

Cyber Security Leadership: Specialty areas providing leadership, management, direction, and/or development and advocacy so that all individuals and the organization may effectively conduct cybersecurity work.

Information Systems Security Officer (ISSO)

Maps to NICE: Information Systems Security Operations

KSAs* required for job roles:
Oversees the information assurance program of an information system in or outside the network environment; may include procurement duties (e.g., ISSO).

Specialist Certification Path

Expert Certification Path

*KSAs: Knowledge, Skills, Abilities

Chief Information Security Officer (CISO)

Maps to NICE: Security Program Management

KSAs* required for job roles:
Manages information security (e.g., information security) implications within the organization, specific program, or other area of responsibility, to include strategic, personnel, infrastructure, policy enforcement, emergency planning, security awareness, and other resources (e.g., CISO).

Specialist Certification Path

Expert Certification Path

  • Preparing for the CISM Exam • Course 2036 — COMING SOON!

*KSAs: Knowledge, Skills, Abilities

 

 

If you have any questions or would like to learn more,
please call 1-888-THE-TREE (843-8733)

Specialist Certification

  • Successful completion of TWO Specified Courses.
  • Successful completion of Certification Exams associated with the Specified Courses.

Expert Certification

  • Successful completion of a THIRD Specified Course.
  • Successful completion of the Certified Exam associated with the Specified Course.

CERTIFICATION EXAMS ARE FREE!

Learning Tree's Cyber Security training has exceeded my expectations. I've already recommended courses to my colleagues, and I plan to earn my certification very soon."

– J. Meyer, Developer/Admin,
Reading Municipal Light Dept.

Call us at 1.888.843.8733 or Contact us

Do you mean "{{response.correctedQuery}}" ?

Please enter the word or phrase you wish to search.

Sorry, no results were found for your query.

Please check your spelling and try your search again.

Course
Scheduling Tool

My Learning Tree
LOGIN / CREATE

Login to My Learning Tree

Forgot Username or Password

Learning Tree International | 13650 Dulles Technology Drive, Suite 400 | Herndon, VA 20171-6156 | 1-888-843-8733
© Learning Tree International, Inc. All trademarks are owned by their respective owners. click here for details.

Choose Your Country: