• Courses By Category

  • GL134 - Red Hat Enterprise Linux Systems Admin II

    5 Days
    The Red Hat Enterprise Linux System Administration II course builds upon the foundational skills acquired in the first administration course (GL124), diving deeper into more complex system administration tasks. This course is tailored for IT professionals looking to enhance their skills in managing Red Hat Enterprise Linux environments by covering advanced topics such as shell scripting, managing SELinux security, and working with network-attached storage.

    Submit an Inquiry
  • GL254 - Red Hat Enterprise Linux Systems Administration III

    5 Days
    This GL254 course is designed to follow an identical set of topics as the Red Hat® RH254, RH255 RHCE exam prep courses with the added benefit of very comprehensive lab exercises and detailed lecture material.

    Submit an Inquiry
  • GL340 - Docker

    5 Days
    Linux containers are changing the way companies think about service development and deployment. Containers play a vital role in the modern data-center, and Docker is leading the way. This course covers all the core features of Docker including: container creation and management, interacting with Docker hub, using Dockerfile to create and manage custom images, advanced Docker networking (how to safely expose container services to the world, and link containers),.

    Submit an Inquiry
  • GL360 - Kubernetes Administration

    5 Days
    This Kubernetes Administration course is designed to equip participants with the in-depth knowledge and practical skills necessary for the efficient administration of Kubernetes clusters. Covering a broad range of topics from core concepts and installation to advanced application lifecycle management and security, this course is structured to address the needs of professionals. The core concepts module introduces Kubernetes architecture, cluster communication, and fundamental Kubernetes objects.

    Submit an Inquiry
  • Go and Web Application Security

    2 Days
    Web and mobile applications are built from multiple components, but one statement is true for most of them: they need a backend. Since the performance of Go is on par with C, but its design and syntax are much more developer-friendly, it is a popular choice for backend development. However, with great power comes great responsibility.

    Submit an Inquiry
  • Java and Web Application Security

    3 Days
    Writing web applications in Java can be rather complex – reasons range from dealing with legacy technologies or underdocumented third-party components to sharp deadlines and code maintainability. Yet, beyond all that, what if we told you that attackers were trying to break into your code right now? How likely would they be to succeed?

    Submit an Inquiry
  • Java and Web Application Security Master Course

    5 Days
    Writing web applications in Java can be rather complex – reasons range from dealing with legacy technologies or underdocumented third-party components to sharp deadlines and code maintainability. Yet, beyond all that, what if we told you that attackers were trying to break into your code right now? How likely would they be to succeed?

    Submit an Inquiry
  • Network Security and Secure Communication

    3 Days
    Implementing a secure networked application can be difficult, even for developers who may have used various cryptographic building blocks (such as encryption and digital signatures) beforehand. In order to make the participants understand the role and usage of these cryptographic primitives, first a solid foundation on the main requirements of secure communication – secure acknowledgement, integrity, confidentiality, remote identification and anonymity.

    Submit an Inquiry
  • Node.JS And Web Application Security

    3 Days
    As a developer, your duty is to write bulletproof code. However... What if we told you that despite all of your efforts, the code you have been writing your entire career is full of weaknesses you never knew existed? What if, as you are reading this, hackers were trying to break into your code? How likely would they be to succeed? What if they could steal away your database and sell it on the black market?

    Submit an Inquiry
  • OWASP Top 10, Secure Coding Fundamentals

    2 Days
    Writing web applications can be rather complex – reasons range from dealing with legacy technologies or underdocumented third-party components to sharp deadlines and code maintainability. Yet, beyond all that, what if we told you that attackers were trying to break into your code right now? How likely would they be to succeed?

    Submit an Inquiry

Subscribe to Newsletter

Enter your email address to register to our newsletter subscription delivered on regular basis! 

CONTACT US     ABOUT     PRIVACY   BLOG

© Copyright GTP Computrain, Limited 2025