• Vendor

  • AIBIZ (AIBIZ)

    0.5 days
    In the past, popular thought treated artificial intelligence (AI) as if it were the domain of science fiction or some far-flung future. In the last few years, however, AI has been given new life. The business world has especially given it renewed interest. However, AI is not just another technology or process for the business to consider—it is a truly disruptive force, one that promises to deliver an entirely new level of results for all aspects of the business.

    Submit an Inquiry
  • Angular, React and Front-end Security Follow Up

    1 Day
    This course is the next step for our participants, who completed either our OWASP Top 10, Java Secure Coding or C# Fundamentals course. This is a follow up training, meaning that in order to attend this, everyone must already have the knowledge that is covered in the Fundamentals.

    Submit an Inquiry
  • Application Security for Developers

    2 Days
    The future of secure software development depends on developers who understand how to design, build, and maintain secure applications. This intensive two-day course provides developers, architects, and tech leads with practical skills to identify and remediate vulnerabilities in their code. Through interactive labs and real-world scenarios, learners will explore modern application security practices and learn to apply threat modelling techniques using the STRIDE methodology.

    Submit an Inquiry
  • Azure Administrator Associate

    4 days
    This course teaches IT Professionals how to secure identities, manage their Azure subscriptions, administer the infrastructure, configure virtual networking, connect Azure and on-premises sites, manage network traffic, implement storage solutions, create and scale virtual machines, implement web apps and containers, back up and share data, and monitor your solution.

    Submit an Inquiry
  • C# and Web Application Security

    3 Days
    Writing .NET web applications can be rather complex - reasons range from dealing with legacy technologies or underdocumented third-party components to sharp deadlines and code maintainability. Yet, beyond all that, what if we told you that attackers were trying to break into your code right now? How likely would they be to succeed?

    Submit an Inquiry
  • C# and Web Application Security Master Course

    5 Days
    As a developer, your duty is to write bulletproof code. However... What if we told you that despite all of your efforts, the code you have been writing your entire career is full of weaknesses you never knew existed? What if, as you are reading this, hackers were trying to break into your code? How likely would they be to succeed?

    Submit an Inquiry
  • Certificate in Cloud Security Knowledge(CCSK+)

    Covering all 12 domains of critical cloud security knowledge, this CCSK+ v5 course covers the core concepts, best practices, and recommendations for securing an organization on the cloud regardless of the provider or platform, with hands-on labs. Learn and practice applying the knowledge from all 12 domains of the Cloud Security Alliance (CSA) Security Guidance v5.

    Submit an Inquiry
  • Certified Artificial Intelligence (AI) Practitioner (CAIP)

    5 days
    Artificial intelligence (AI) and machine learning (ML) have become an essential part of the toolset for many organizations. When used effectively, these tools provide actionable insights that drive critical decisions and enable organizations to create exciting, new, and innovative products and services. This course shows you how to apply various approaches and algorithms to solve business problems through AI and ML, follow a methodical workflow to develop sound solutions, use open source, off-the-shelf.

    Submit an Inquiry
  • Certified Cybersecurity Operations Analyst (CCOA)

    5 Days
    ISACA’s Certified Cybersecurity Operations Analyst (CCOA™) certification equips learners with the technical skills to evaluate threats, identify vulnerabilities, and design countermeasures to protect digital ecosystems. As emerging technologies such as AI-enabled automation continue to evolve, the demand for skilled cyber analysts is critical to safeguarding organisations. This practical hands-on training develops the analytical and investigative expertise required to detect.

    Submit an Inquiry
  • Certified Cybersecurity Operations Analyst E-Learning

    2 Days
    ISACA’s Cybersecurity Audit Certificate Program provides audit/assurance professionals with the knowledge needed to excel in cybersecurity audits. It provides security professionals with an understanding of the audit process, and IT risk professionals with an understanding of cyber-related risk and mitigating controls.

    Submit an Inquiry

Subscribe to Newsletter

Enter your email address to register to our newsletter subscription delivered on regular basis! 

CONTACT US     ABOUT     PRIVACY   BLOG

© Copyright GTP Computrain, Limited 2025