TrainingRegional
& Online Courses

GTK Cyber offers a comprehensive catalog of intermediate to advanced analytic courses for cybersecurity professionals, all with a cybersecurity focus. Our courses enable organizations to learn how to apply data science and machine learning to their toughest security problems, thereby reducing the need to procure expensive and complex tools.

Train in a Whole New Way

GTK Cyber provides a cutting-edge education. Our program gives you the power to pair the right methods with the best tools. We’ve pointed a laser focus on data science, machine learning and threat hunting. We use an infrastructure platform and an online programming lab that provides hands-on, real world training.

Course Location

Online
Regional
Show All

Course Type

Micro
Full
Show All
online & regional

full courseADS101 – Python Coding for Security Analysts

The ability to work directly with raw data is an extremely useful skill for analysts in any realm. The Python scripting language is a powerful tool for data analysis and manipulation. While the syntax for Python is relatively easy, learning how to apply Python to analysis can be challenging.

Learn More
online & regional

full courseData Science for Managers

Data Science is rapidly emerging as one of the most sought-after fields in industry today. In an oft-cited study by McKinsey & Co., the United States faces a shortage of 1.5 million managers and analysts with the skills to understand and make decisions based on the analysis of big data. GTK Cyber provides training aimed at stakeholders at all corporate levels.

Learn More
online & regional

full courseADS201 – Applied Data Science and Machine Learning for Artificial Intelligence and Cybersecurity

This interactive course will teach cybersecurity professionals how to use data science techniques to quickly manipulate and analyze network and security data and ultimately uncover valuable insights from this data. The course will cover the entire data science process from data preparation, feature engineering and selection, exploratory data analysis, data visualization, machine learning, model evaluation and optimization and finally, implementing at scale—all with a focus on security related problems.

Learn More
online & regional

full courseSQL For Data Analysis

Structured Query Language or SQL is one of the most useful means of data analysis that is no longer confined to relational databases. Many tools, including Spark, Flink, Drill, Cassandra and even ElasticSearch now support SQL queries. A solid understanding of SQL will expand the number of different data sources that an analyst can access.

Learn More
online & regional

micro-courseSecurity Data Visualization

Data visualization is a powerful technique to have in your analytic toolkit. This module will cover both the theory of data visualization as well as the actual process and coding of creating effective visualizations.

Learn More
online & regional

micro-courseRapid Data Exploration with Pandas

This workshop introduces the concept of vectorized computing, and how to create, manipulate and summarize single and multidimensional data using the Pandas module. We will also cover how to ingest common security data formats directly into vectorized data structures. Finally, we will cover basic statistical concepts.

Learn More
online & regional

full courseThreat Hunting With Data Science

Data Science is rapidly becoming a necessity within the threat hunting realm. Analysts must be able to identify anomalies, reduce false positives and train the machine to rapidly make decisions for them at scale. With the abundance of data and analyst time constraints, alert efficacy is more important than it has ever been.

Learn More
online & regional

micro-courseConceptual Overview of Machine Learning

Machine Learning (ML) is rapidly becoming one of the most valuable tools in a cyber warrior’s toolkit. However, it can be difficult to start in ML or apply it to security problems. This workshop offers a math-free overview of machine learning algorithms as well as their application to security problems. Additionally we will present several use cases of machine learning as applied to security problems.

Learn More
online & regional

full courseRapid Data Exploration With Open Source Tools

Data exploration is a key step in any analyst’s workflow. As data volume and variety continue to expand, the challenge of exploring security data is likewise growing exponentially. This course will teach analysts how to take advantage of the latest open source tools to rapidly explore and obtain value from a variety of security data sources.

Learn More
No Results

Train With Industry ExpertsMeet Our Instructors

Our instructors are field-tested specialists, not just educators. Our partners and students can rest assured that they are being trained by expert professionals who have worked directly as cybersecurity warriors for some of the most prestigious organizations in the world.

01
02
03
04

CEO, DATA SCIENTISTCharles Givre, CISSP

Read Charles's Bio

PRINCIPAL SOFTWARE ENGINEERPaul Rogers, MBA

Read Paul's Bio

From The GTK Cybersphere

Get the latest on the cybersecurity industry in the GTK Cybersphere. Read about new trends, industry advancements, career insights, or just check out what we’ve been up to.

Automated Advanced Analytics & Cybersecurity – An unexpected tool in the Cyber Arsenal

June 9, 2021

The Power of Prediction: Machine Learning for Ransomware Prevention

June 9, 2021

Welcome to GTK Cyber

November 11, 2020

See What People Are SayingClient Testimonials

“The first iteration of the course packed all relevant concepts and exercises in a fast-paced manner. That was personally valuable as a refresher due to my academic background with some touchpoints on machine learning.“

— Former Black Hat Student

“Good introduction into the topic of machine learning, plenty of hands-on experience with jupyter/python/pandas/etc. This fit exactly with what we are doing in our daily work so was directly applicable. Now I just need to find time to read the book suggestions.“

— Former Black Hat Student

“[The GTK Cyber course] was well organized and flowed nicely, all of the topics were relevant“

— Former Black Hat Student

“I found it informative and interesting.“

— Former Black Hat Student

“The Jupyter notebooks and answers were a big help.“

— Former Black Hat Student

“I enjoyed the class and learned quite a bit. I appreciated most the discussion on obtaining data and feature engineering. I also learned the most from parameter tuning. I felt the course was a great pace for me.“

— Former Black Hat Student

“[The course] was awesome!“

— Former Black Hat Student

“The content and focus on data science applications for security problems [was extremely helpful].“

— Former Black Hat Student

“We need more courses like these in cybersecurity!“

— Former Black Hat Student