• Cyber Security Training Courses

  • ISC2 Certified in Governance Risk and Compliance

    5 Days
    This official ISC2® Certified in Governance, Risk and Compliance (CGRC) Training prepares you for the CGRC exam. The Certified in Governance, Risk and Compliance (CGRC®) is an information security practitioner who advocates for security risk management in pursuit of information system authorisation to support an organisation’s mission and operations in accordance with legal and regulatory requirements.

    Submit an Inquiry
  • ISC2 Certified Secure Software Lifecycle Professional

    5 Days
    The Official ISC2 ® Certified Secure Software Lifecycle Professional (CSSLP®) training provides a comprehensive review of the knowledge required to incorporate security practices, including authentication, authorization and auditing, into each phase of the Software Development Lifecycle (SDLC), from software design and implementation to testing and deployment. This training course will help learners review and refresh their knowledge and identify areas they need to study for the CSSLP exam.

    Submit an Inquiry
  • ISC2 Systems Security Certified Practitioner

    5 Days
    The official ISC2 Systems Security Certified Practitioner (SSCP) is the ideal certification for those with proven technical skills and practical, hands-on security knowledge in operational IT roles. It provides confirmation of a practitioner’s ability to implement, monitor and administer IT infrastructure in accordance with information security policies and procedures that ensure data confidentiality, integrity and availability

    Submit an Inquiry
  • ISO 27001 Transition

    1 Day
    The new version of ISO/IEC 27001 has been recently published and is now aligned with the new version of ISO/IEC 27002, which was published in February, 2022. The major changes between ISO/IEC 27001:2022 and ISO/IEC 27001:2013 are noticed in the information security controls of Annex A, whereas a few other minor changes are present in the clauses of the standard too. Furthermore, the title of ISO/IEC 27001:2022 differs from the title of ISO/IEC 27001:2013.

    Submit an Inquiry
  • Java and Web Application Security

    3 Days
    Writing web applications in Java can be rather complex – reasons range from dealing with legacy technologies or underdocumented third-party components to sharp deadlines and code maintainability. Yet, beyond all that, what if we told you that attackers were trying to break into your code right now? How likely would they be to succeed?

    Submit an Inquiry
  • Java and Web Application Security Master Course

    5 Days
    Writing web applications in Java can be rather complex – reasons range from dealing with legacy technologies or underdocumented third-party components to sharp deadlines and code maintainability. Yet, beyond all that, what if we told you that attackers were trying to break into your code right now? How likely would they be to succeed?

    Submit an Inquiry
  • Mastering LLM Integration Security: Offensive & Defensive Tactics

    2 Days
    This intensive two-day course explores the security risks and challenges introduced by Large Language Models (LLMs) as they become embedded in modern digital systems. Through AI labs and real-world threat simulations, participants will develop the practical expertise to detect, exploit, and remediate vulnerabilities in AI-powered environments. The course uses a defence-by-offence methodology, helping learners build secure, reliable, and efficient LLM applications.

    Submit an Inquiry
  • Microsoft Power Platform Fundamentals

    1 day
    Learn the business value and product capabilities of Microsoft Power Platform. Create simple Power Apps, connect data with Dataverse, build a Power BI Dashboard, automate processes with Power Automate, and build a chatbot with Power Virtual Agents. What we teach you: Describe the business value of Power Platform (20-25%) Identify the core components of Power Platform (15-20%) Describe the business value of Power BI (10-15%) Describe the business value of Power Apps (15-20%)

    Submit an Inquiry
  • Network Security and Secure Communication

    3 Days
    Implementing a secure networked application can be difficult, even for developers who may have used various cryptographic building blocks (such as encryption and digital signatures) beforehand. In order to make the participants understand the role and usage of these cryptographic primitives, first a solid foundation on the main requirements of secure communication – secure acknowledgement, integrity, confidentiality, remote identification and anonymity.

    Submit an Inquiry
  • NIS 2 Directive Foundation

    2 Days
    The NIS 2 Directive Foundation training course outlines the essential insights necessary for understanding the requirements of NIS 2 Directive regarding cybersecurity measures. It provides the core concepts required to support organizations in the initial phases of planning, implementation, and management of cybersecurity programs.

    Submit an Inquiry

Subscribe to Newsletter

Enter your email address to register to our newsletter subscription delivered on regular basis! 

CONTACT US     ABOUT     PRIVACY   BLOG

© Copyright GTP Computrain, Limited 2025