Education can be used to abuse mistakes or weaknesses in human behavior. Used to take over a system using the Social engineering concept and defense methods against attacks is to learn.
Education can be used to abuse mistakes or weaknesses in human behavior. Used to take over a system using the Social engineering concept and defense methods against attacks is to learn.
All information system users, especially system administrators.
All information system users, especially system administrators.
2 Days
Participants may experience loss of common and confidential information and social engineering, which can even lead to an institution’s reputation they will be familiar with their attacks. Participants, social engineering They will also have the capacity to provide training.
In this training, related to crimes committed in today’s information World Attack Detection and Record Management training, Central Security Monitoring and Incident Management Training is provided.
SOME (Cyber Incident Response Team), Information Security Staff, Cyber Security Professionals.
Must have experience in both business processes and information systems.
2 Days
The aim of the training is to determine the level of trainees in their institutions Emergency Response Team. to a position where they can install.
Offering more advanced options than log analysis, SIEM’s most important with the help of established policies and rules. By making meaningful connections between events that appear to be independent It is the correlation technique that helps detect possible attacks.
IT Security Staff, Auditors, Cyber Security Specialists, Network Managers.
Familiarity with information system components.
4 Days
Participants learn about central attack correlation systems they will receive. Centralize logs collected in separate security components. from an internal or external network how to monitor attacks carried out and They will learn to take the necessary steps against.
Ethical hacker or white hat hacker; methods of cyber criminals knowing, by simulating malicious attacks to information systems They are people who try to prevent possible damages.
IT Security Center Staff, Auditors, Cyber Security Specialists, web Site or System Administrators.
Network security and basic knowledge of linux is a plus.
• Introduction (What is penetration test? Before, during and after the event? highlights that take place. Penetration testing methodologies)
• Discovery (Discovery categories. Applied nmap exercise; port scanning,service and operating system discovery etc.)
• Vulnerability exploration (Vulnerability concept. Nessus exercise;policy assignment, scanning and vulnerability analysis)
• Exploit (Exploit and payload concepts. Metasploit exercise;msfconsole, meterpreter, post-exploit and auxiliary modules, etc.) Network penetration tests and layer 2 attacks (Network sniffing, MAC tableflooding, ARP poisoning, VLAN hopping, DHCP IP pool consumption attacks)External network tests and information gathering (Active and passive information collection,”Google hacking” etc.)
• Social engineering (Using e-mail and phone. Customized. payload and malware generation – macro, pdf and exe. “Relay” security bug. “Post-exploitation”) Web application tests (Input-output detection, XSS and SQL-i attacks)
5 Days
Participants will be able to participate and contribute to penetration tests.
Systems that can be considered as the most important component of the information world and GSM working logic of their networks, internet of crime centers, GSM infrastructures using what methods, how they committed a crime, how This is the basis for collecting evidence about the crimes they deleted and committed. is one of the goals of the course.
IT Security Center Staff, Auditors, SOME members.
Basic information about Linux and Windows operating systems.
• Computer incident response
• Preliminary stages of computer analysis Information about NTFS, FAT32, ext2, ext3 file systems (this how files are opened, saved and deleted on systems)
• Different components of a computer (RAM, “Heap” space, fixed disks, etc.) The data is not temporary.undo
• Performing computer analysis on a Linux system and presentation of tools
• Creating an analysis environment in the applied part of the course and Analyzing a suspicious file with tools
• Performing computer analysis on a Windows system and presentation of tools
3 Days
Participants will be able to do computer analysis on their own.
Information security breaches and the increasing value of information resources, leads to an increase in companies’ information protection needs. Information security management system, to work to ensure information security It is a controlled approach towards. System personnel, processes and information includes security systems.
IT Security Center Staff, Auditors, Cyber Security Specialists, IT People whose staff will be audited under ISO 27001.
Familiarity with quality management systems is helpful, but a requirement is not.
• What is ISMS and why is it needed?
• “Plan-Apply-Check-Take Action” process in ISO 27001
Risk assessment and treatment in information systems
ISO 27001 control categories
– Information security policies
– Organization of information security
– Human resources security
– Asset Management
– Access control
– Cryptography
– Physical and environmental security
-Operational security
– Communication security
-System acquisition, development and maintenance
-Supplier relations
– Information security incident management
– Information security aspects of business continuity management
– Conformity
• ISO 27001 compliance audit
– Audit planning
– Audit checklists
– Nonconformities and reporting
Few applications
3 Days
Participants will be able to establish ISMS in their institutions. Participants also will learn about the concepts of control.
Unconscious and problematic use of technology, information security reasons such as the diversification of threats to ensure information security makes it difficult. Therefore, at national and international level Ensuring personal and corporate information security and information increasing awareness about safety is coming.
Information systems users.
No.
3 Hours
Participants will learn about the basics of information security and their awareness of the importance of corporate information security they will take it to the next level. The task that contributes to an institution and they will learn their responsibilities.
Gathering evidence over the network about crimes committed with this training of active network devices and mobile devices the ways in which evidence can be collected over the network. It is aimed to teach.
Security Center Staff, Auditors, SOME members, Network and System Managers.
Basic knowledge of TCP / IP, networks, Linux and Windows operating systems.
4 Days
Network traffic analysis without participants accessing storage components will be able to realize and collect evidence. Also, from the ingredients detecting malicious network traffic and security incidents caused by they will be able to.
Social Engineering that can be organized against corporate executives with training or many scenarios in information security training for other attacks By giving an example, it is aimed to increase the awareness of Information Security.
Managers and staff who want to learn a lot about information security.
Basic information systems knowledge.
2 Days
Participants learn about the basic concepts of information security. basic technical concepts of receivables and general operation of the ISMS Entry will be made by taking.
Authentication and basic SQL Server database security concepts how to manage access to objects through authorization configuration and how to maintain you will learn.
Database administrators, database security auditors.
Database management fundamentals.
3 Days
At the end of the course, participants will learn SQL Server database security They will learn the mechanisms and factors that affect security. A SQL Ability to perform a security audit of the server database they will win. By the way, database administrators can also They will learn how to manage safely.
Principles to be taken as basis in the management of systems, determined information security procedures, audit methods, compliance processes and Necessary to meet corporate information security needs sharing of information, what needs to be done for an effective audit It is aimed to transfer the processes.
Information technology auditors, system security auditing capabilities information security professionals, system and network administrators who want to improve.
Basic network and operating system (Windows and Unix) information, environmental protection familiarity with systems.
Windows control
• Auditing of Unix / Linux systems
4 Days
Participants learn how to use vulnerability scanners they will learn. Participants also include operating systems, environmental protection How to audit systems and web applications? They will also learn what to do.
Oracle, one of the largest manufacturers of database management software is someone. In this course, you will learn how to use Oracle database security efficiently. how to manage your Oracle network environment and you will learn how to perform database maintenance.
Database administrators, database security auditors.
Database management fundamentals
3 Days
At the end of the course, participants will have to do a security audit of databases. secure management of databases and administrators They will be able to apply.
Security of Windows, the most used operating system in the world configuration, systems tools necessary to protect data, and training that teaches techniques. Microsoft Operating System to install, use and make necessary security configurations is the main purpose of the course.
Windows Network Administrators, MS AD Administrators, IIS / Exchange Managers, IT Security Center Personnel.
Basic information about Microsoft systems.
3 Days
Participants, advanced knowledge within the scope of Microsoft system security they will get. Microsoft system security applications in their organizations They will have the ability to use it in the best way possible.
Practical aspects of safe configuration of inux and operating system work environment, data protection and attack standard mechanisms, tools and training that teaches techniques.
Linux System Administrators, IT Security Center Staff.
Linux management knowledge.
2 Days
Participants can ensure the security of Linux-based operating systems. will be able to realize consolidation. Open ource in their systems will gain the ability to use security software tools. Also, to help them discover security breaches in heir systems they will also gain the ability to use or develop tools.
Active Network Device Security courses will teach you about network technologies and general security problems of protocols, their specific operation in depth of its application in systems or network equipment It focuses on explaining by examining In this case, wireless networks and IP Certain areas such as telephones are treated separately.
System and network administrators, IT Security Personnel, Auditors, Cyber Security Professionals.
Basic knowledge of networks.
Within the scope of providing, the following subjects are theoretically applied
empowering active devices used to connect the outside world towards
Spine key,
– Router,
– The firewall,
– Content filter
– Physical security,
– Equipment safety,
– Authentication,
– Authorization and monitoring,
– Patch management,
– Access control lists,
– Remote management control etc.
2 Days
Participants are active through the theoretical and practical parts of the course. learn the security controls that can be applied to network devices expected. Participants also have these security checks in their institutions. applications are expected.
Focusing on the practical work of network security issues, organizations A comprehensive guide for professionals responsible for the security of computer networks educational program.
IT Security Center Staff, Auditors, Cyber Security Specialists, web site or System Administrators, Network Administrators.
Basic knowledge of networks.
2 Day
Applied studies on security of TCP / IP networks, It will provide the participants with rich knowledge and skills. Security practices in the network of their institutions are the best they are expected to be implemented in the same way.
The aim of the course is to inform web application developers of vulnerabilities to identify, assess the risks to the project and to teach to eradicate in various ways.
Web Application Developers, Website Administrators, IT Security Center Staff, Auditors, Cyber Security Specialists.
Basic information about web technologies
– Cross Site Scripting (XSS)
– Injection flaws: SQL Injection, OS command injection etc.
– Session fixing
– Playing session
– Cross-Site Request Forgery (CSRF)
2 Day
Participants, important security components of HTTP-based applications, common mistakes, how to avoid them and keep them They will learn how to ensure application security.
In the modern world, in the software development process, a developer implementing protocols and using vulnerable frameworks Lots of security associated with the features of programming languages can accept the deficit.
Software developers / engineers, software project managers, software quality control staff.
Intermediate experience in programming.
3 Day
Participants learn basic secure coding principles, secure software design and policies for development, threat modeling and security testing they will learn.