Your network security requirements are unique. Join a program that’s been specifically designed to strengthen your team’s capabilities.Learn About Our Courses
GTK Cyber is a prominent name in security education. We’ve created a program that teaches applied data science for security professionals. Our founders and teachers are industry experts who are passionate about enriching the careers of network security specialists and data analysts.
We partner with enterprises to bring training to the workplace. We provide a hands-on learning experience that emphasizes the fundamentals of data analysis and the philosophies that comprise these disciplines. We prepare our students to have a successful career in a progressive industry.
Charles is a solutions-focused Senior Technical Executive and Data Scientist with 20+ years of success across the technology, data science, Fintech, education, and cybersecurity industries. His expertise includes data visualization, analytics, network security, information assurance, strategic planning, big data, business intelligence, software development, and program management. He has delivered presentations at major industry conferences, is a published author, and PMC chair for the Apache Drill project. Mr. Givre holds a Masters in Middle Eastern Studies from Brandeis University, as well as a Bachelor’s of Science in Computer Science and Bachelor’s of Music, both from the University of Arizona.
Austin Taylor has an extensive background in defensive and offensive cyber operations and has performed incident response for some of the world’s top Fortune-ranked companies. His expertise includes penetration testing, data science, threat hunting, and User and Entity Behavioral Analytics (UEBA). He has taught data science courses for the last three years and is the author of “How to Build a World-Class Monitoring System for Home, Small Office, or Enterprise Networks.”
Joshua oversees the daily business operations for GTK Cyber. He holds a Master of Business Administration from the University of Baltimore Merrick School of Business and a Juris Doctor from the University of Maryland School of Law. He is a licensed attorney in Maryland. Joshua has performed in-person and video training seminars and written a myriad of articles in various law journals. He works in human resources and handles civil rights matters.
Becky works closely with GTK’s business partners in development, client relations, marketing strategies, and logistics in order to ensure high quality solutions to clients. She earned her Bachelors in Business Administration from the College of Charleston and was qualified as a mediator by the University of Maryland School of Law. Prior to joining GTK, Becky demonstrated professional experience in the fields of academia, pharmaceutical, and financial security. She has served on the board of LifeBridge Health Advisory Committee and has an active role in local programs involving domestic violence abuse, safety, and health/wellbeing.
Brian leads the red team for Splunk Global Security. Previously, he led SOAR efforts with Splunk Phantom at a Fortune 100 financial company. He also serves as an intelligence officer in the U.S. Army Reserve with a focus on cybersecurity, and has experience in the defense intelligence, manufacturing, and financial sectors. He worked on red, blue, and purple teams in incident response, digital forensics, vulnerability management, and security architecture consulting. He holds an MBA, an MS in IT Management, and multiple industry certifications. Brian has presented at DEFCON AI Village, CAMLIS, Derby Con, Circle City Con, Cyphercon, and ISACA, and served as adjunct faculty at WSU and MATC.
Paul Rogers is an Apache Drill PMC member and co-author of Learning Apache Drill. Paul helps our clients incorporate Drill into their technology stack. Drill gives clients the ability to add a SQL query capability on top of multiple file formats and storage systems. Paul is an experienced systems engineer specializing in BI, query engines and distributed systems. His recent experience was at MapR on Apche Drill, at Cloudera on Apache Impala, and at a major log analysis vendor. Paul was a co-founder of Actuate, an early BI-tools vendor, and was architect of the Eclipse BIRT project. Paul's other relevant experience includes Informix, Oracle and several smaller database-related companies.
Brennan is the Head of Data Science for SIRT, Goldman Sachs, and a self-proclaimed data nerd. He has been working in the financial industry for the past 10+ years and is striving to save the world with a little help from our machine friends. He has held cyber security, data scientist, and leadership roles at JP Morgan Chase, the Federal Reserve Bank of New York, Bloomberg, and Goldman Sachs. Brennan holds a masters' degree in Business Analytics from New York University and participates in the data science community with his non-profit pro-bono work at DataKind. Brennan has previous experience as a data science instructor in both R and Python, has published in 2600 Magazine, and has presented at both data science and cybersecurity conferences.
What differentiates GTK Cyber from other data science and cybersecurity courses is the focus on thought processes rather than simply learning software. Technology and software become obsolete, regularly. Our philosophy ensures that students gain an enhanced grasp on the principles behind the software. This method makes professionals more proficient and effective in their positions. It gives them the power to apply those processes and methodology to any software.
In addition to security training, we also provide machine learning — the exciting and cutting-edge study of algorithms and statistical models. You’ll gain proficiency in pairing the right algorithms with the best tools. Our program includes training in object-oriented programming, data science, and risk minimization. Our infrastructure platform and online programming lab allow hands-on, real world training that professionals will immediately implement into their daily work.
Your network security requirements are unique. Therefore, it’s essential (and more efficient) to engage in a program that’s been specifically designed for your team. Our approach to education is modular. This means that we’ll customize your curriculum based on your specific needs and network vulnerabilities. Our students are chief technology and security officers who want better tools for their team members and staff.
Strengthen the capabilities and knowledge of your team with the comprehensive education of GTK Cyber.