• Cyber Offense & Defense Courses

  • Incident Response for Business Professionals (IRBIZ)

    1 day
    This course covers incident response methods and procedures are taught in alignment with industry frameworks such as US-CERT’s NCISP (National Cyber Incident Response Plan), and Presidential Policy Directive (PPD) 41 on Cyber Incident Coordination Policy. It is ideal for candidates who have been tasked with managing compliance with state legislation and other regulatory requirements regarding incident response, and for executing standardized responses to such incidents. The course introduces procedures.

    Submit an Inquiry
  • ISACA CISM Exam Prep

    1 Day
    This official ISACA Certified Information Security Manager (CISM) self-study e-learning course is designed to develop expertise in information security governance, risk management, program development, and incident management. Recognised globally, CISM certification demonstrates a deep understanding of security operations, compliance, and enterprise-wide security strategy. Learners must book onto the QA ISACA CISM Exam Prep event to receive access to the e-learning materials.

    Submit an Inquiry
  • Mastering LLM Integration Security: Offensive & Defensive Tactics

    2 Days
    This intensive two-day course explores the security risks and challenges introduced by Large Language Models (LLMs) as they become embedded in modern digital systems. Through AI labs and real-world threat simulations, participants will develop the practical expertise to detect, exploit, and remediate vulnerabilities in AI-powered environments. The course uses a defence-by-offence methodology, helping learners build secure, reliable, and efficient LLM applications.

    Submit an Inquiry
  • Web Hacking Black Belt Edition

    5 Days
    This class teaches the audience a wealth of hacking techniques to compromise modern-day web applications, APIs and associated end-points. This class focuses on specific areas of appsec and on advanced vulnerability identification and exploitation techniques. The class allows attendees to learn and practice some neat, new and ridiculous hacks which affected real-life products and have found a mention in real bug-bounty programs.

    Submit an Inquiry

Subscribe to Newsletter

Enter your email address to register to our newsletter subscription delivered on regular basis! 

CONTACT US     ABOUT     PRIVACY   BLOG

© Copyright GTP Computrain, Limited 2025