Support • Bug Reporting • Governance-Ready

GCTI Help Desk & Ticketing — Built into the Student Portal

We’re building a responsive, compliance-ready support system so anyone can report issues, bugs, or requests—and we can triage, fix, verify,
and close with documented evidence. This is part of our ecosystem: risk mitigation, governance, cyber forensic training and consulting, and
solutions aligned with Dell and Microsoft cloud architect practices.

Where to submit support requests

Primary: Submit all issues through the Help Desk inside the Student Portal so your request is tracked with a ticket number,
routing, priority, and an audit trail.

Fallback: If you can’t access the portal (login/account issues), email
helpdesk@globalctinstitute.org.

Bug / Error
Access / Account
Course / CyberLab
Website / Content
Security / Privacy Concern

Showcase
Support Hub Visual


View full-size


GCTI Support Hub Visual 1

Report → Triage → Fix → Verify → Close with ticket tracking, ownership, and evidence capture.

Showcase
Governance + Risk Mitigation


View full-size


GCTI Support Hub Visual 2

Tickets include severity/impact scoring, SLA timers, and compliance notes for audit readiness.

Showcase
Enterprise Delivery Alignment


View full-size


GCTI Support Hub Visual 3

Built with an enterprise mindset—reliability, documentation, and fast remediation aligned with Dell + Microsoft cloud architecture practices.

What to include in your ticket (so we can fix it fast)

Required: where the issue happened, what you expected, what happened, steps to reproduce, and any screenshots/error messages.
If security-related: submit through the portal help desk when possible and include only what’s necessary (no sensitive data you don’t need to share).

Response targets (example)

Critical (P1): acknowledge within 1 hour • mitigation within 4 hours • frequent status updates.
High (P2): acknowledge within 4 hours • resolution target 1–2 business days.
Normal (P3): acknowledge within 1 business day • resolution target 3–5 business days.
Low (P4): acknowledge within 2 business days • scheduled into a release cycle.

Portal tickets provide the best tracking and accountability, including ownership, timestamps, attachments, and resolution verification.

Global Counter-Terrorism Institute® | GCTI

We rebuilt our website to match how we actually operate: proactive, intelligence-driven, and modern.

I’m Dr. Todd M. Price, MBA, Ph.D., and I lead the Global Counter-Terrorism Institute® (GCTI). I want to share something important: we’ve launched a new website design and refreshed our branding and content to better reflect what we deliver—an ecosystem where operational expertise meets academia.

This redesign wasn’t cosmetic. It’s a strategic update that aligns our digital presence with our mission: building real-world capability in global security, counter-terrorism, and cybersecurity—with education, tools, and applied research that can be used immediately. Everything is clearer, faster, and structured around outcomes.

What’s new (and why it matters)

  • Cleaner navigation so you can find Programs, Research, Admissions, and our ecosystem faster.
  • Brand-forward design that looks like a modern technology organization—because that’s what we are.
  • Content that explains our “why” and connects our training, labs, research, and community into one operating model.
  • Stronger calls-to-action to schedule advisories, explore pathways, and join our portal community.

At GCTI, we aren’t building “just another training platform.” We’re building a security ecosystem: learning, applied labs, and decision support that helps students, analysts, and organizations stay ahead of threats—before they escalate.

Our Programs

We offer online programs in International Security Studies and Cybersecurity, plus hands-on diploma and certificate pathways powered by our Forensic Cyber Lab. If you want skills you can use immediately—this is built for you.

Our Research + Publications

Our work includes strategic frameworks like The 25 Immutable Laws of Geopolitical Strategy and ongoing research initiatives that translate complex security challenges into actionable decision models.

Our Technology Projects

We’re building proactive security capability through projects like DTM (Dynamic Threat Mitigation) and AEGIS (Analytics Engine for Global Intelligence and Strategy)—designed to support intelligence, assessment, and strategic mitigation across multiple verticals.

If you’re a prospective student, a working professional, or an organization looking to strengthen security posture, I’d like you to see what we’ve built. The new site makes it easier to understand our programs, our lab approach, and how we help people move from interest → skills → applied capability.

Visit the website Join our Portal Community Schedule an advisory session

Quick note: If you’re new here, start with our Programs and Research pages, then join the portal to connect with our community. If you need help choosing a pathway, book a session and we’ll point you in the right direction.

GCTI • Education & Training + AEGIS™ / DTM™ Services
Learn. Train. Build secure systems.
GCTI provides education and training across global security, intelligence, and cybersecurity—while also delivering AEGIS™ and DTM™ services for organizations that need real-world capability, secure infrastructure, and compliance-ready operations.
Certificates (200) Diplomas (300) Professional (400) Master’s (500) AEGIS™ Governance DTM™ Mitigation
Two tracks, one mission
Education & Training prepares students and practitioners. AEGIS™ / DTM™ Services help organizations implement secure infrastructure, governance, and threat-informed controls aligned to global standards.
Education & Training
Stackable pathways designed for operational readiness in global security and cyber defense.
  • Certificates → Diplomas → Master’s progression
  • Applied learning with labs, exercises, and research
  • Clear outcomes, milestones, and support
AEGIS™ (System-of-Systems)
Governance and analytical architecture to align people, processes, and telemetry to measurable security outcomes.
  • Policy → controls → evidence mapping
  • Operational dashboards and decision traceability
  • Compliance-ready reporting
DTM™ Services & SaaS Capability
Threat-informed mitigation and infrastructure build-out for modern organizations—services, partnerships, and delivery.
  • Threat modeling → mitigation planning
  • Secure infrastructure build-out (SaaS-ready)
  • Partner-aligned environments (Dell/Microsoft ecosystems)
Need a tailored plan?
If you’re looking for professional services for AEGIS™ / DTM™ implementation, or want guidance choosing a training pathway, reach out and we’ll route you to the right team.
Services Store • AEGIS™ + DTM™
Services for governance, threat mitigation, and secure infrastructure delivery
This store is for DTM™ and AEGIS™ services, productized implementations, and partnerships. (Coursework is not sold here.)
AEGIS Sentinel DTM App DTM Technology SaaS delivery Infrastructure build-out
Note: For engagement requests, include your organization name, scope, timeline, and preferred contact method.
AEGIS™ Sentinel • Governance & Operations
An operational layer for security governance, workflow enforcement, evidence capture, and continuous improvement.
  • Governance workflows & accountability
  • Evidence trails & reporting
  • Operational readiness and control mapping
DTM™ App • Dynamic Threat Mitigation
Practical tooling aligned to the DTM™ model to organize threats, mitigations, and operational coordination.
  • Threat tracking & mitigation planning
  • Playbooks, tasks, and follow-ups
  • Operational alignment across teams
DTM™ Technology • Doctrine & Implementation
Explore the DTM™ technology page for methodology, implementation pathways, and enterprise engagement options.
  • DTM™ framework & doctrine
  • Enterprise adoption strategy
  • Integration and delivery planning
SaaS delivery & infrastructure build-out
We support secure platform delivery for organizations that need resilient infrastructure, operational maturity, and integrated security execution.
  • Secure cloud & identity foundations
  • Operational telemetry and reporting
  • Governance workflows and compliance support
  • Implementation support and managed delivery options
Partnerships & enterprise alignment
We align delivery to enterprise environments and common standards, with strong positioning for infrastructure partnerships and modern security operations.
What to include in a request
Organization • Objectives • Current stack (if any) • Timeline • Regions • Compliance expectations • Stakeholders
Outreach routing (web + apps + GHL)
For campaigns and outreach, route audiences to the right asset based on intent: AEGIS (governance/operations), DTM App (execution), or DTM Technology (methodology/enterprise).
AEGIS Project
Governance, operations, evidence, and continuous improvement.
DTM App
Threat tracking, mitigation planning, and execution workflows.
DTM Technology
Doctrine, implementation pathways, and enterprise engagement.

Secure Document Upload Instructions (Student-Facing)

Overview

To protect your personal information and meet admissions/compliance requirements, GCTI does not accept sensitive documents by email unless explicitly instructed.
After you request admissions processing, we will email you a secure upload link to submit your documents.

Step-by-step process

  1. Request your secure upload link
    Email admissions@globalctinstitute.org
  2. from the same address you plan to use as a student and include:
    • Full legal name
    • Program of interest (Diploma / Certificate / Master’s track)
    • Country of citizenship (optional, but helpful for processing)
    • Phone number (optional)
  3. Receive your secure link
    You will receive a secure upload link from GCTI Admissions.
    • The link may expire for security reasons.
    • Do not share your link with anyone else.
  4. Prepare your documents
    Upload clear scans/photos:
    • Passport (preferred) or Driver’s License (where permitted)
    • Official transcripts (required for placement/program eligibility)
    • Paris Graduate School master’s requirements (if applicable)
    • Any additional items requested by admissions
  5. Upload using the secure link
    • Upload only the documents requested.
    • Use clear, complete images (all corners visible, no glare).
    • If possible, name files like: Last_First_Passport.pdf or Last_First_Transcript.pdf.
  6. Verification & review
    Admissions will review your submission for:
    • Identity verification
    • Academic eligibility and program requirements
    • Compliance checks (document completeness and authenticity)
  7. Next steps
    • If anything is missing or unclear, you will be contacted.
    • Once all requirements are met, you will be notified and moved forward in the admissions process.
    • If accepted, you will receive your acceptance letter and onboarding instructions.

Important notes (required)

Help

2026 Calendar • AEGIS Global Security Series (Plan B)
Global Security Series 2026 — Key Dates (Pacific Time)
Every other month (no December), covering global security verticals with alternating live access for EMEA/APAC.
Americas + EMEA live (alternating) Americas + APAC live (alternating) Decisions captured Remediation burndown tracked
Holiday slide rule: If a major holiday week creates conflicts, sessions slide to the next Tue/Wed/Thu of the same or following week without changing the month.
Schedule
Times listed in Pacific Time (PT).
Date Time (PT) Session Verticals Region
Wed, Jan 14, 2026 09:00–10:45 Digital & Space Infrastructure Resilience Cybersecurity & Digital Trust Space & Aerospace Security Americas + EMEA live
Tue, Mar 3, 2026 16:00–17:45 Climate Risk & Critical Systems Environmental & Climate Security Energy/Water/Critical Infrastructure (OT/ICS) Americas + APAC live
Wed, May 13, 2026 09:00–10:45 Population Protection & Health Security Human Security & Public Safety Biosecurity & Public Health Americas + EMEA live
Tue, Jul 7, 2026 16:00–17:45 Trade, Logistics & Mobility Security Economic, Supply Chain & Trade Security Border/Transportation/Maritime/Aviation Security Americas + APAC live
Wed, Sep 9, 2026 09:00–10:45 Threat Networks & Information Conflict Counterterrorism (CT) & Violent Extremism Information Integrity & Influence Operations Americas + EMEA live
Tue, Nov 17, 2026 16:00–19:00 Annual Summit & Roadmap (Cross-Vertical Wrap-Up) Program outcomes; KPI review; investments; standards; 2027 plan Americas + APAC live
Audience: Security, Engineering, Product, Operations, Leadership. Sessions include focused briefings tied to AEGIS/DTM controls, telemetry, and risk metrics.
Resources
Use these materials to prepare and to keep your calendar current.
  • ICS calendar file (full series)
  • Program PDF (details & rationale)
  • Session notes and follow-ups (via student portal)
Program Office
For schedule questions, coordination, or program operations.
Security Program Office
Trademarks and program attribution apply as noted in the one-pager.