GTK Cyber provides a cutting-edge education. Our program gives you the power to pair the right methods with the best tools. We’ve pointed a laser focus on data science, machine learning and threat hunting. We use an infrastructure platform and an online programming lab that provides hands-on, real world training.
TrainingRegional
& Online Courses
GTK Cyber offers a comprehensive catalog of intermediate to advanced analytic courses for cybersecurity professionals, all with a cybersecurity focus. Our courses enable organizations to learn how to apply data science and machine learning to their toughest security problems, thereby reducing the need to procure expensive and complex tools.
Train in a Whole New Way
Course Location
Course Type
full courseADS101 – Python Coding for Security Analysts
The ability to work directly with raw data is an extremely useful skill for analysts in any realm. The Python scripting language is a powerful tool for data analysis and manipulation. While the syntax for Python is relatively easy, learning how to apply Python to analysis can be challenging.
Learn Morefull courseData Science for Managers
Data Science is rapidly emerging as one of the most sought-after fields in industry today. In an oft-cited study by McKinsey & Co., the United States faces a shortage of 1.5 million managers and analysts with the skills to understand and make decisions based on the analysis of big data. GTK Cyber provides training aimed at stakeholders at all corporate levels.
Learn Morefull courseADS201 – Applied Data Science and Machine Learning for Artificial Intelligence and Cybersecurity
This interactive course will teach cybersecurity professionals how to use data science techniques to quickly manipulate and analyze network and security data and ultimately uncover valuable insights from this data. The course will cover the entire data science process from data preparation, feature engineering and selection, exploratory data analysis, data visualization, machine learning, model evaluation and optimization and finally, implementing at scale—all with a focus on security related problems.
Learn Morefull courseSQL For Data Analysis
Structured Query Language or SQL is one of the most useful means of data analysis that is no longer confined to relational databases. Many tools, including Spark, Flink, Drill, Cassandra and even ElasticSearch now support SQL queries. A solid understanding of SQL will expand the number of different data sources that an analyst can access.
Learn Moremicro-courseSecurity Data Visualization
Data visualization is a powerful technique to have in your analytic toolkit. This module will cover both the theory of data visualization as well as the actual process and coding of creating effective visualizations.
Learn Moremicro-courseRapid Data Exploration with Pandas
This workshop introduces the concept of vectorized computing, and how to create, manipulate and summarize single and multidimensional data using the Pandas module. We will also cover how to ingest common security data formats directly into vectorized data structures. Finally, we will cover basic statistical concepts.
Learn Morefull courseThreat Hunting With Data Science
Data Science is rapidly becoming a necessity within the threat hunting realm. Analysts must be able to identify anomalies, reduce false positives and train the machine to rapidly make decisions for them at scale. With the abundance of data and analyst time constraints, alert efficacy is more important than it has ever been.
Learn Moremicro-courseConceptual Overview of Machine Learning
Machine Learning (ML) is rapidly becoming one of the most valuable tools in a cyber warrior’s toolkit. However, it can be difficult to start in ML or apply it to security problems. This workshop offers a math-free overview of machine learning algorithms as well as their application to security problems. Additionally we will present several use cases of machine learning as applied to security problems.
Learn Morefull courseRapid Data Exploration With Open Source Tools
Data exploration is a key step in any analyst’s workflow. As data volume and variety continue to expand, the challenge of exploring security data is likewise growing exponentially. This course will teach analysts how to take advantage of the latest open source tools to rapidly explore and obtain value from a variety of security data sources.
Learn MoreTrain With Industry ExpertsMeet Our Instructors
Our instructors are field-tested specialists, not just educators. Our partners and students can rest assured that they are being trained by expert professionals who have worked directly as cybersecurity warriors for some of the most prestigious organizations in the world.
From The GTK Cybersphere
Get the latest on the cybersecurity industry in the GTK Cybersphere. Read about new trends, industry advancements, career insights, or just check out what we’ve been up to.