• Home
  • Why GTK?
  • Training
    • Micro-Courses
    • Custom Courses
    • Regional & Online Courses
  • Enterprise-Level Consulting
  • Our Team
    • Charles Givre
    • Joshua Friedman
    • Curtis Lambert
    • Becky Reeves
    • Scott Kerlin
    • Brian Genz
    • Paul Rogers
    • Brennan Lodge
    • Avi Weinberg
  • Resources
    • Jupyter Notebook
    • Griffon
    • Training Request Letter
    • The Cybersphere
  • Upcoming Events
  • Our Partners
  • Certification

Resources

Home / Resources

Over our many years of teaching cyber data science, we realized that a key element of delivering a successful class is having a consistently reliable technical platform for our students to use. Depending on the client’s request and the courses delivered, GTK has developed two unique and proprietary platforms which we use in our courses.

Griffon Virtual Machine for Data Science

Cloud-Based JupyterHub

Training Request Letter

The Cybersphere (blog)

Get Started Today.

Become a GTK Cyber partner and strengthen your team’s capabilities and knowledge with comprehensive and customized cybersecurity training.

  • This field is for validation purposes and should be left unchanged.
Logo

FASTER. BETTER. SMARTER.

We develop cybersecurity training programs that are as unique as your network security requirements. Our programs emphasize the fundamentals of data analysis and the philosophies that comprise these disciplines.

Menu

  • Hands-On Learning
  • Enterprise-Level Consulting
  • Our Partners
  • Upcoming Events

Training

  • Regional & Online Courses
  • Custom Courses
  • Micro-Courses

Resources

  • Jupyter
  • Griffon
  • Blog

Contact

  • 855-GTK-CYBER
  • Email Us

GTKcyber is proud to support the efforts of Women in Cybersecurity.

Privacy Policy