New Course Pipeline

We are on a mission to fill the cyber skills gap in Europe and beyond. We will be launching a suite of 12 more certification courses fully aligned with the job roles, functions and competencies outlined in the official European Cyber Skills Framework from ENISA the European Union Cyber Security Agency.
Curriculum Aligned with EU Cyber Skills Framework
100%
Success rate
30+
Years of experience
15K+
Students trained

Register Your Interest

Closing Cyber Skills Gap

We are closing the cyber skills gap by providing courses specifically  based around the job roles and competencies outlined in the ECSF European Cyber Skills Framework

ECSF - European Cyber Skills Framework

State of the Art Online Academy

Hybrid Training - On Demand and Live Sessions

Certified Cyber Security Risk Manager

Role:
Cyber Security Risk Manager

Alternative Titles: 
Information Security Risk Analyst, Cybersecurity Risk Assurance Consultant, Cybersecurity Risk Assessor, Cybersecurity Impact Analyst, Cyber Risk Manager, Cyber Security Risk Officer

Mission: Continuously manages (identifies, analyses, assesses, estimates, mitigates) the cybersecurity-related risks of ICT infrastructures, systems and services by planning, applying, reporting and communicating risk analysis, assessment and treatment. Establishes a risk management strategy for the organisation and ensures that risks remain at an acceptable level for the organisation by selecting mitigation actions and controls.
Certified Chief Information Security Officer

Role:
CISO Chief Information Security Officer

Alternative Titles:
Cybersecurity Programme Director, Information Security Officer (ISO), Information Security Manager, Head of Information Security, IT/ICT Security Officer, Cybersecurity Programme Director, Information Security Officer (ISO), Information Security Manager, Head of Information Security
IT/ICT Security OfficerCybersecurity Programme Director, Information Security Officer (ISO), Information Security Manager, Head of Information Security, IT/ICT Security Officer, Cybersecurity Programme Director, Information Security Officer (ISO), Information Security Manager, Head of Information Security, IT/ICT Security Officer

Mission:
 Defines, maintains and communicates the cybersecurity vision, strategy, policies and procedures. Manages the implementation of the cybersecurity policy across the organisation. Assures information exchange with external authorities and professional bodies.
Certified Cyber Compliance Officer

Role: Cyber Legal, Policy and Compliance Officer


Alternative Titles:
Data Protection Officer (DPO), Privacy Protection Officer, Cyber Law Consultant, Cyber Legal Advisor, Information Governance Officer, Data Compliance Officer
Cybersecurity Legal Officer, IT/ICT Compliance Manager, Governance Risk Compliance (GRC) Consultant, Data Protection Officer (DPO), Privacy Protection Officer, Cyber Law Consultant, Cyber Legal Advisor, Information Governance Officer, Data Compliance Officer, Cybersecurity Legal Officer, IT/ICT Compliance Manager, Governance Risk Compliance (GRC) Consultant

Mission: Oversees and assures compliance with cybersecurity- and data-related legal, regulatory frameworks and policies in line with the organisation’s strategy and legal requirements. Contributes to the organisation’s data protection related actions. Provides legal advice in the development of the organisation’s cybersecurity governance processes and recommended remediation strategies/solutions to ensure compliance.
Certified Digital Risk Tester

Role:
Penetration Tester

Alternative Titles: 
Pentester, Ethical Hacker, Vulnerability Analyst, Cybersecurity Tester, Offensive Cybersecurity Expert, Defensive Cybersecurity Expert, Red Team Expert, Red Teamer

Mission: Plans, designs, implements and executes penetration testing activities and attack scenarios to evaluate the effectiveness of deployed or planned security measures. Identifies vulnerabilities or failures on technical and organisational controls that affect the confidentiality, integrity and availability of ICT products (e.g. systems, hardware, software and services).
Certified Cyber Incident Responder

Role:
Cyber Incident Responder

Alternative Titles:
Cyber Incident Handler, Cyber Crisis Expert, Incident Response Engineer, Security Operations Center (SOC) Analyst, Cyber Fighter /Defender, Security Operation Analyst (SOC Analyst), Cybersecurity SIEM Manager, Cyber Incident Handler, Cyber Crisis Expert, Incident Response Engineer

Mission: Monitors and assesses systems’ cybersecurity state. Analyses, evaluates and mitigates the impact of cybersecurity incidents. Identifies cyber incidents root causes and malicious actors. According to the organisation’s Incident Response Plan, restores systems’ and processes’ functionalities to an operational state, collecting evidences and documenting actions taken.
Certified Cyber Security Implementor
Role:
Cyber Security Implementor

Alternative Titles:
Information Security Implementer, Cybersecurity Solutions Expert, Cybersecurity Developer, Cybersecurity Engineer, Development Security & Operations (DevSecOps) Engineer, Information Security Implementer, Cybersecurity Solutions Expert, Cybersecurity Developer, Cybersecurity Engineer

Mission: Provides cybersecurity-related technical development, integration, testing, implementation, operation, maintenance, monitoring and support of cybersecurity solutions. Ensures adherence to specifications and conformance requirements, assures sound performance and resolves technical issues required in the organisation’s cybersecurity-related solutions (systems, assets, software, controls and services), infrastructures and products.
Certified Digital Forensics Investigator
Role:
Digital Forensics Investigator

Alternative Titles:
Digital Forensics Analyst, Cybersecurity & Forensic Specialist, Computer Forensics Consultant

Mission: Connects artefacts to natural persons, captures, recovers, identifies and preserves data, including manifestations, inputs, outputs and processes of digital systems under investigation. Provides analysis, reconstruction and interpretation of the digital evidence based on a qualitative opinion. Presents an unbiased qualitative view without interpreting the resultant findings.
Certified Cyber Security Auditor

Alternative Titles:
Information Security Auditor (IT or Legal Auditor), Governance Risk Compliance (GRC) Auditor, Cybersecurity Audit Manager, Cybersecurity Procedures and Processes Auditor, Information Security Risk and Compliance Auditor, Data Protection Assessment Analyst

Mission: Conducts independent reviews to assess the effectiveness of processes and controls and the overall compliance with the organisation's legal and regulatory frameworks policies. Evaluates, tests and verifies cybersecurity-related products (systems, hardware, software and services), functions and policies ensuring, compliance with guidelines, standards and regulations.
Certified Cyber Threat Intelligence Specialist

Alternative Titles:
Cyber Intelligence Analyst, Cyber Threat Modeller

Mission: Manages cyber threat intelligence life cycle including cyber threat information collection, analysis and production of actionable intelligence and dissemination to security stakeholders and the CTI community, at a tactical, operational and strategic level. Identifies and monitors the Tactics, Techniques and Procedures (TTPs) used by cyber threat actors and their trends, track threat actors’ activities and observe how non-cyber events can influence cyber-related actions
Certified Digital Security Architect

Alternative Titles:
Cybersecurity Solutions Architect, Cybersecurity Designer, Data Security Architect

Mission: Designs solutions based on security-by-design and privacy-by-design principles. Creates and continuously improves architectural models and develops appropriate architectural documentation and specifications. Coordinate secure development, integration and maintenance of cybersecurity components in line with standards and other related requirements.
Certified Cyber Security Educator

Alternative Titles:
Cybersecurity Awareness Specialist, Cybersecurity Trainer, Faculty in Cybersecurity (Professor, Lecturer)

Mission: Designs, develops and conducts awareness, training and educational programmes in cybersecurity and data protection-related topics. Uses appropriate teaching and training methods, techniques and instruments to communicate and enhance the cybersecurity culture, capabilities, knowledge and skills of human resources. Promotes the importance of cybersecurity and consolidates it into the organisation.
Certified Cyber Security Researcher

Alternative Titles:
Cybersecurity Research Engineer, Chief Research Officer (CRO) in cybersecurity, Senior Research Officer in cybersecurity, Research and Development (R&D) Officer in cybersecurity, Scientific Staff in cybersecurity, Research and Innovation Officer/Expert in cybersecurity, Research Fellow in cybersecurity

Mission: Conducts fundamental/basic and applied research and facilitates innovation in the cybersecurity domain through cooperation with other stakeholders. Analyses trends and scientific findings in cybersecurity.

bootstrap your career now!

Innovatiing 

Be the first to know about new courses and discounts: Subscribe to our Newsletter

Our New EU Cyber Academy App is Coming Soon!
EU Cyber Academy App Launching!
Testimonials

What our learners say

The 'Cyber Security for SMEs' training course transformed how I approach cyber threats. I now have the knowledge and practical tools to develop a strong security culture within my business, mitigating risks effectively. Highly recommended for SME owners!
HANNAH FITZSIMONS
"The 'Cyber Security for SMEs' training course exceeded my expectations. It provided me with actionable steps to protect my business from cyber threats, and the practical insights I gained have made a significant impact on our overall security posture. I highly recommend this course to all SME owners looking to safeguard their organisations."
eoin Murphy