Your network security requirements are unique. Join a program that’s been specifically designed to strengthen your team’s capabilities.Learn About Our Courses
GTK Cyber is a prominent name in security education. We’ve created a program that teaches applied data science for security professionals. Our founders and teachers are industry experts who are passionate about enriching the careers of network security specialists and data analysts.
We partner with enterprises to bring training to the workplace. We provide a hands-on learning experience that emphasizes the fundamentals of data analysis and the philosophies that comprise these disciplines. We prepare our students to have a successful career in a progressive industry.
Charles is a solutions-focused Senior Technical Executive and Data Scientist with 20+ years of success across the technology, data science, Fintech, education, and cybersecurity industries. His expertise includes data visualization, analytics, network security, information assurance, strategic planning, big data, business intelligence, software development, and program management. He has delivered presentations at major industry conferences, is a published author, and PMC chair for the Apache Drill project. Mr. Givre holds a Masters in Middle Eastern Studies from Brandeis University, as well as a Bachelor’s of Science in Computer Science and Bachelor’s of Music, both from the University of Arizona.
Austin Taylor has an extensive background in defensive and offensive cyber operations and has performed incident response for some of the world’s top Fortune-ranked companies. His expertise includes penetration testing, data science, threat hunting, and User and Entity Behavioral Analytics (UEBA). He has taught data science courses for the last three years and is the author of “How to Build a World-Class Monitoring System for Home, Small Office, or Enterprise Networks.”
Joshua oversees the daily business operations for GTK Cyber. He holds a Master of Business Administration from the University of Baltimore Merrick School of Business and a Juris Doctor from the University of Maryland School of Law. He is a licensed attorney in Maryland. Joshua has performed in-person and video training seminars and written a myriad of articles in various law journals. He works in human resources and handles civil rights matters.
Becky works closely with GTK’s business partners in development, client relations, marketing strategies, and logistics in order to ensure high quality solutions to clients. She earned her Bachelors in Business Administration from the College of Charleston and was qualified as a mediator by the University of Maryland School of Law. Prior to joining GTK, Becky demonstrated professional experience in the fields of academia, pharmaceutical, and financial security. She has served on the board of LifeBridge Health Advisory Committee and has an active role in local programs involving domestic violence abuse, safety, and health/wellbeing.
Brian Genz, CISSP, serves as a Senior Instructor with GTK Cyber and leads the Threat and Vulnerability Management team within Splunk Global Security. Prior to leading the red team at Splunk, he led security orchestration, automation and response (SOAR) efforts with Splunk Phantom at a Fortune 100 financial company. He has experience in the defense intelligence, manufacturing, and financial sectors and has worked on red, blue, and purple teams in the areas of incident response, digital forensics, vulnerability management, and security architecture consulting. Degrees and certifications include MBA, MS in Information Technology Management, GREM, GNFA, GCFA, and GCIH. Brian has presented at multiple industry conferences, including the DEFCON AI Village, the Conference on Applied Machine Learning for Information Security (CAMLIS), Derby Con, Circle City Con, Cyphercon, the ISSA International Conference, ISACA Milwaukee, Infragard, and others. He has served as adjunct faculty at Wayne State University and Milwaukee Area Technical College.
What differentiates GTK Cyber from other data science and cybersecurity courses is the focus on thought processes rather than simply learning software. Technology and software become obsolete, regularly. Our philosophy ensures that students gain an enhanced grasp on the principles behind the software. This method makes professionals more proficient and effective in their positions. It gives them the power to apply those processes and methodology to any software.
In addition to security training, we also provide machine learning — the exciting and cutting-edge study of algorithms and statistical models. You’ll gain proficiency in pairing the right algorithms with the best tools. Our program includes training in object-oriented programming, data science, and risk minimization. Our infrastructure platform and online programming lab allow hands-on, real world training that professionals will immediately implement into their daily work.
Your network security requirements are unique. Therefore, it’s essential (and more efficient) to engage in a program that’s been specifically designed for your team. Our approach to education is modular. This means that we’ll customize your curriculum based on your specific needs and network vulnerabilities. Our students are chief technology and security officers who want better tools for their team members and staff.
Strengthen the capabilities and knowledge of your team with the comprehensive education of GTK Cyber.
Thank you for reaching out. We'll be in touch soon!