A guide to cyber security certification and training

Cyber security skills are in demand from every organisation, but what training and certification is needed?

It’s no secret that the tech sector is facing a skills shortage - it has done so for many years and cyber security continues to be one of the most sought-after skills in the UK. Businesses have never faced a cyber threat landscape more threatening which means more people are required to step into the trenches and fight the good fight.

Getting a foot into the door of a cyber career can come with a few hurdles, though. Prospective cyber security professionals need time and commitment to learn the trade, educate themselves in the field’s minutiae, and secure the all-important certifications to make their CVs pop.

There are a multitude of paths people can take to get into cyber and the learning resources on offer increase every year, trying to streamline the process for anyone interested in a career. But regardless of the route taken, everyone who wants a way in almost always needs a few certifications under their belt. It’s not a simple case of checking boxes, these certifications or ‘certs’ indicate to prospective employers that you know the right things to operate in today’s cyber landscape, but also demonstrate the incredible commitment required to pass them.

Responsible for Information training

When it comes to cyber security training, the government has understood how important it is to get small organisations on board with this important education. It has highlighted that it is eager to aid those working in all sizes of private and public sector organisations to get to know their responsibilities when it comes to data protection.

As part of this initiative to raise awareness of cyber security, it is allowing all workers to take part in a free digital learning course covering everything they require to understand how to protect and handle data, both while working remotely and in the office. It advises what an information asset owner is as well as what employees should look out for when identifying online threats.

The two-hour course was developed for businesses working in the civil sector but is suitable for any organisation that would like its employees to have a basic understanding of cyber security. The content can be accessed from the Gov.UK website.

Training for HR, procurement and legal & accounting

The government has developed a series of in-depth training courses for both public sector and private businesses that need a little more intensive development. Its specialised security courses and training schemes are aimed at businesses in niche sectors, such as HR, procurement, and legal and accounting to help those working in such industries understand how their job roles are affected by cyber security.

Related Resource

Security awareness training strategies for account takeover protection

Why you need an inside-the-perimeter strategy for internal threats

Security awareness training strategies for account takeover protection - whitepaper from MimecastDownload now

Just like the government's other schemes, they comprise modules designed to be completed in an employee's own time rather than at set intervals. However, they're not likely to take away from your leisure time, with each very quick to finish.

They may not provide as much detail as third party, fully-certified training courses, but they provide the background to many of the issues employees are coming up against and cover most bases for businesses without a big budget.

Certified Information Systems Auditor

ISACA's Certified Information Systems Auditor (CISA) certification is an IT professionals certification that aims to build upon an interest in information systems auditing, control and security.

Those obtaining the certification are recognised worldwide for their competencies to manage vulnerabilities and ensure compliance of systems. During the certification, they gain the knowledge, skills and experience to come up with security and compliance solutions to enterprises that require their organisation to be protected against cyber security threats.

Certified Information Security Manager

The Certified Information Security Manager (CISM) certification is also offered by ISACA. IT security professionals with this certificate can demonstrate their understanding of the relationship between an information security program and broader business goals and objectives.

It shows prospective employers the professional has not only information security expertise but also knowledge and experience in the development and management of an information security program.

Certified in Risk and Information Systems Control

The third ISACA qualification on our list, CRISC certified professionals can help enterprises understand business risk and have the technical knowledge to implement appropriate IS controls.

CRISC certified employees can build a better understanding of the impact of IT risk and how it relates to the overall organisation.

CompTIA Security+

This certification from CompTIA covers network security, compliance and operation security, threats and vulnerabilities as well as application, data and host security. Also included are access control, identity management, and cryptography.

Systems Security Certified Practitioner

The International Information Systems Security Certification Consortium, known as (ISC)2, offers the Systems Security Certified Practitioner (SSCP) certification is aimed at IT professionals with proven technical skills and practical security knowledge in hands-on operational IT roles.

It indicates a practitioner's technical ability to tackle the operational demands and responsibilities of security practitioners, including authentication, security testing, intrusion detection/prevention, incident response and recovery, attacks and countermeasures, cryptography, malicious code countermeasures, and more.

Related Resource

Best practices for implementing security awareness training

How to develop a security awareness programme that will actually change behaviour

Download now

Certified Information Systems Security Professional

Another certification from (ISC)2, the Certified Information Systems Security Professional (CISSP) certification is great for professionals with proven deep technical and managerial competence, skills, experience and credibility to design, engineer, implement and manage their overall information security program to protect organisations from sophisticated attacks.

Certified Ethical Hacker 

There's even a qualification, certified by the International Council of Electronic Commerce Consultants (EC-Council), available to white hat hackers. Dubbed the Certified Ethical Hacker (CEH), recipients must demonstrate the capacity to identify weaknesses and vulnerabilities in target computer systems. White hat hackers and pen-testers alike have a crucial role to play in businesses' cyber security defences, and qualified individuals are often employed to probe target systems and test for any gaps that may emerge. 

Computer Hacking Forensic Investigator

Also organised by the EC-Council, the Computer Hacking Forensic Investigator (CHFI) certification validates professionals that have the skills to detect a hack and obtain the evidence needed to report the crime and prosecute the cyber criminal in a court of law.

The certification strives to stay vendor-neutral, and focuses on forensic analysis, proving a viable training pathway for those with a foot in the law enforcement door.

ISO 27001

The ISO 27001 certification (part of the tier ISO 27000 family) is an international standard that offers the procedures and practices for keeping an organisation's IT assets secure.

This certification predominately concerns information security, as opposed to explicitly being cyber security-oriented, and comprises the various systems, guidelines and certifications needed to help a business analyse its processes.  

Prior to ISO 27001 there were a host of separate services for handling all aspects of information security and managing risk, which naturally produced inefficiencies. The development of this standard in the 90s, however, meant the disparate processes could be brought under the umbrella of a single standard, with various components of a business managed in a single system.

ISO 27701

One of the most recent security certifications is the ISO 27701, which effectively serves as a privacy-based extension of the ISO 27001. The aim of this separate standard is to boost existing information security procedures with additional privacy-focused requirements.

This was only published in August 2019 and may form the basis for future GDPR standards given its preoccupation with systems that handle and protect the personal data that's processed as part of normal business functions. 

GDPR training

GDPR is an area which has also seen certifications crop up due to the significance placed on data protection by businesses since its enactment in 2018. The UK government is considering a shake up to the rules set out by the Data Protection Act 2018 but GDPR’s unforgiving penalties - up to 4% of global annual turnover, or 20 million, whichever is higher - mean expertise in the area is paramount in today’s business environment. Responsibility will still lie with the board, but cyber security experts need to be aware of what’s expected from them.

One company offering GDPR training is Assuredata. The introductory courses, which are endorsed by both the Cloud Industry Forum and the Federation Against Software Theft (FAST), aim to raise awareness of GDPR requirements and remove confusion, particularly with regard to those in the cloud industry. More information can be found here.

Featured Resources

How virtual desktop infrastructure enables digital transformation

Challenges and benefits of VDI

Free download

The Okta digital trust index

Exploring the human edge of trust

Free download

Optimising workload placement in your hybrid cloud

Deliver increased IT agility with the cloud

Free Download

Modernise endpoint protection and leave your legacy challenges behind

The risk of keeping your legacy endpoint security tools

Download now


Russia's "politically motivated" REvil raid could be used as leverage, experts warn

Russia's "politically motivated" REvil raid could be used as leverage, experts warn

17 Jan 2022
Meta files lawsuit to uncover hackers targeting Facebook, WhatsApp

Meta files lawsuit to uncover hackers targeting Facebook, WhatsApp

21 Dec 2021
Five things to consider before choosing an MFA solution

Five things to consider before choosing an MFA solution

17 Dec 2021
Australia and US sign CLOUD Act data-sharing deal to support criminal investigations
cyber crime

Australia and US sign CLOUD Act data-sharing deal to support criminal investigations

16 Dec 2021

Most Popular

How to move Microsoft's Windows 11 from a hard drive to an SSD
Microsoft Windows

How to move Microsoft's Windows 11 from a hard drive to an SSD

4 Jan 2022
Microsoft Exchange servers break thanks to 'Y2K22' bug
email delivery

Microsoft Exchange servers break thanks to 'Y2K22' bug

4 Jan 2022
Hired by machines: Exploring recruitment's machine-driven future

Hired by machines: Exploring recruitment's machine-driven future

8 Jan 2022