• Courses By Category

  • Quantum Computing Fundamentals

    3 days
    As the field of quantum computing continues to evolve and advance, there is a growing need for professionals with the knowledge and skills to tackle the complex challenges and opportunities it presents. This comprehensive course is designed to provide participants with a thorough understanding of the fundamental principles and practical applications of quantum computing.

    Submit an Inquiry
  • Running Container-Enabled Microservices on AWS

    1 day
    This course teaches you how to: • Design a microservices-based architecture that uses containers. • Use Amazon ECS to run and scale a microservices-based application. • Integrate Amazon ECS with other AWS services. Intended Audience

    Submit an Inquiry
  • Running Containers on Amazon Elastic Kubernetes Service

    3 days
    In this course, you will learn to: Review and examine containers, Kubernetes and Amazon EKS fundamentals and the impact of containers on workflows. Build an Amazon EKS cluster by selecting the correct compute resources to support worker nodes. Secure your environment with AWS Identity and Access Management (IAM) authentication by creating an Amazon EKS service role for your cluster Deploy an application on the cluster.

    Submit an Inquiry
  • Secure Coding in PHP

    3 Days
    The course provides essential skills for PHP developers necessary to make their applications resistant to contemporary attacks through the Internet.

    Submit an Inquiry
  • Secure Coding Master Course for Banking and Finance

    5 Days
    <i>“Money makes the world go round....” </i>– remember? And yes: it is your responsibility to secure all that. As a fintech company you have to take up the challenge, and beat the bad guys with bomb-proof, secure applications! If there is a domain where security is critical, it is definitely fintech. Vulnerability is not an option if you want to stay a trusted and reliable vendor with systems and applications that certainly comply with PCI-DSS requirements.

    Submit an Inquiry
  • Secure Coding Master Course for Telecoms

    5 days
    Telecommunication is the foundation on which critical infrastructures are built – all modern technologies heavily rely on its security. The continued adoption of IP-based telecommunication and the exposure of telecom equipment opens additional paths for attackers, with a massive increase in security incidents against telecom systems.

    Submit an Inquiry
  • Securing Cisco Net with Snort Rule Writing Best Practices

    3 days
    The Securing Cisco Networks with Snort Rule Writing Best Practices (SSFRules) v2.1 training shows you how to write rules for Snort, an open-source intrusion detection and prevention system. Through a combination of expert-instruction and hands-on practice, this training provides you with the knowledge and skills to develop and test custom rules, standard and advanced rules-writing techniques, integrate OpenAppID into rules, rules filtering, rules tuning, and more.

    Submit an Inquiry
  • Securing Cisco Networks with Open Source Snort

    4 days
    The Securing Cisco Networks with Open Source Snort (SSFSNORT) v4 training shows you how to deploy a network intrusion detection system based on Snort. Through a combination of expert instruction and hands-on practice, you will learn how to install, configure, operate, and manage a Snort system. You will also explore rules writing with an overview of basic options, advanced rules writing, how to configure PulledPork, and how to use OpenAppID to provide protection of your network from malware.

    Submit an Inquiry
  • Security Engineering on AWS

    3 days
    In this course, you will learn how to: Assimilate and leverage the AWS shared security responsibility model Architect and build AWS application infrastructures that are protected against the most common security threats Protect data at rest and in transit with encryption Apply security checks and analyses in an automated and reproducible manner

    Submit an Inquiry
  • Security Testing

    3 Days
    After getting familiar with the vulnerabilities and the attack methods, participants learn about the general approach and the methodology for security testing, and the techniques that can be applied to reveal specific vulnerabilities. Security testing should start with information gathering about the system (ToC, i.e. Target of Evaluation), then a thorough threat modeling should reveal and rate all threats, arriving to the most appropriate risk analysis-driven test plan.

    Submit an Inquiry

Subscribe to Newsletter

Enter your email address to register to our newsletter subscription delivered on regular basis! 

CONTACT US     ABOUT     PRIVACY   BLOG

© Copyright GTP Computrain, Limited 2025