Safe Configuration Control Training

Terms & Conditions

  • Basic Network Knowledge
  • Operating System Information (Windows and Unix)
  • Recognition of border security structures

Main Topics

  • Vulnerability, threat definitions
  • Open source security vulnerability scanners and the use of these tools
  • Windows operating system control
  • Control of Unix / Linux systems
  • Removing the topology of a network
  • Border systems inspection

Attack Techniques Training

Terms & Conditions

  • Basic TCP / IP information
  • Basic operating system information

Main Topics

  • Collecting Information in Security Tests
  • Intervention to TCP / IP communication
  •  Firewalls
  • Intrusion Detection and Blocking System
  • Firewall, Intrusion Detection and Prevention Systems and Content Filtering Systems
  • Host / Network / Port Discovery and Scanning Tools
  • Vulnerability Scanning and Discovery Systems
  • Exploit Types and Metasploit Use
  • Wireless Networks and Security
  • Web Application Security and Hacking Methods
  • VPN and Encryption Technologies
  • End User Attack Types and Methods
  • Security Extensions for Security
  • Linux system management and security
  • TCP / IP Protocol Family Vulnerability Analysis
  • Package Analysis, Sniffing

Attack Detection and Record Management Training

Terms & Conditions

  • Basic operating system information
  • Basic TCP / IP information
  • Basic Linux knowledge

Main Topics

  • Basics of Traffic Analysis
  • Application Protocols and Traffic Analysis
  • Open Source Intrusion Detection System
  • Network Traffic Analysis and Monitoring
  • Intrusion detection methods for application protocols
  • Recording Configuration Settings
  • Recording Analysis Methods and Techniques
  • Records Management
  • Processing Large Size Records
  • Tracking Records
  • Records for Event Intervention
  • Forensic Analysis Records
  • Registration for Compatibility
  • Most Common Mistakes in Record Collection
  • Records Standards

Central Security Monitoring and Incident Management Training

Terms & Conditions

  • Basic operating system information
  • TCP / IP Basic Network and Security information
  • Records Management and Attack

Main Topics

  • Central Records Management Systems
  • Event association systems (SIM)
  • Examples of SIM solutions
  • Determination of high risk assets by inventory analysis
  • Open Source Centralized Security Monitoring Software (OSSIM)
  •         . OSSIM Architecture and integrated tools
            . OSSIM Installation
            . OSSIM Configuration
            . OSSIM Web Console
            . Regulation of security policies and reports
            . Collecting information with the OSSIM agent
            . Collecting information with SYSLOG
  • Correlation of Security Events (Intrusion Associations)
  • Optimizing event analytical workflows for security intelligence
  • Event analysis and intervention
  • System maintenance and update

Cyber ​​Incident Response Team Installation and Management Training

Terms & Conditions

  • To have experience in both administrative processes and information systems infrastructure

Main Topics

  • Introduction (History, example of computer events, example SOME's and organizations)
  • Some basic issues (What is SOME, SOME frame, SOME service frame)
  • Cyber ​​incident intervention process (event response service definition and service framework)
  • Cyber ​​operational elements (software, hardware, policies and procedures)
  • SOME project area

Information Systems Forensic Analysis Training

Terms & Conditions

  • Basic Linux and Windows operating system information

Main Topics

  • Computer events
  • Preparation stages of computer forensic analysis
  • Information about filing systems (NTFS, FAT32, ext2, ext3) in operating systems (How files are created, stored, deleted, etc.)
  • Data retention and retrieval for various parts of computers (RAM, "Stack" area, hard disks, etc.)
  • Performing forensic analysis of computer event on Linux and introduction of related tools
  • Establishment of a forensic analysis working environment in the practical part and examination of suspicious files with tools
  • Forensic analysis of computer event on Windows and introduction of related tools
  • Retention of legal frameworks and evidences related to forensic analysis

Computer Forensic Analysis - In-depth Windows Analysis

Terms & Conditions

  • Forensic Analysis Training in Information Systems

Main Topics

  • Basics of Quantitative Forensic Analysis and Evidence Collection
  • Applied: Basic Windows Forensic Analysis Part 1 - Series Queries, Data Mining and Email Forensic Analysis
  • Applied: Basic Windows Forensic Analysis Part 2 - Registry and USB Analysis
  • Applied: Basic Windows Forensic Analysis Part 3 - Record File Analysis
  • Applied: Basic Windows Forensic Analysis Part 4 - Web Browser Analysis
  • Applied: Numerical Forensic Analysis Competition

Network Forensic Analysis Training

Terms & Conditions

  • Participants (VirtualBox or VMWare) to run a virtual operating system to run on a computer without problems.
  • Participants are knowledgeable about the Linux operating system basics and applications.
  • Simple installation and connection of the participants in Linux operating systems (IP address assignment, log file tracking, editor use, etc.).
  • Attendees have knowledge about the general network protocols (IP, HTTP, TCP, UDP, etc.) and network listening tools (wireshark, tcpdump, etc.).

Main Topics

  • Obtaining digital evidence from network resources
  • The results obtained during the analysis process can be reproducible and the evidence obtained is reliable.
  • Tools, technologies and processes that can be used for different purposes in network analysis
  • Mobile device security
  •  Applications

Malware Analysis Methods Training

Terms & Conditions

  • Basic operating system information

Main Topics

  • Practical: Malware Software and Methods
  • Practical: Fundamentals of Malware Analysis
  • Applied: Other Malware Analysis Methods
  • Applied: Harmful Code Analysis
  • Practical: Methods of Preventing Harmful Software

DDoS Attacks and Protection Methods Training

Terms & Conditions

  • Basic TCP / IP information

Main Topics

  • DDoS attack types
  • DDoS attack analysis
  • Fighting with DDoS

IT Law Education

Terms & Conditions

  • There is no specific prerequisite.

Main Topics

  • Basic training in the conduct of the judicial process
  • Computer technology
  • Digital data technology
  • Operating system and software
  • Internet technology
  • Network security for clients
  • IT culture
  • Internet search engines
  • Cybercrime-law articles
  • Electronic signature
  • Cyber ​​crimes - case studies
  • Offenses of insult-crime (internet-SMS etc.)
  • Expert reports
  • Domain names law
  • Detection of evidence
  • Internet service providers
  • Spam-stack E-mail-SMS
  • Filtering websites
  • E-consumer
  • E-bar-e-baro
  • Virtual gambling
  • E-government applications
  • International legislation
  • Interactive banking-law
  • Supreme court decisions
  • UYAP
  • Protection of personal data
  • Intellectual rights-related provisions
  • Telecommunications law
  • Child pornography

ISO / IEC 27001 Information Security Management System Application Training

Terms & Conditions

  • There is no specific prerequisite.

Main Topics

  • What is an information security management system? Why is it necessary?
  • "Plan-Apply-Check-Take" cycle in IS0 27001ü
  • Information system risk analysis and treatment
  • ISO 27001 basic control areas
  •         . Security policy
            . Information security organization
            . Asset management
            . Human resources security
            . Physical and environmental safety
            . Communication and operating management
            . Access control
            . Information system acquisition, development and maintenance
            . Information security event management
            . Business continuity management
            . Harmony
  • Inspection for compliance with ISO 27001
  •         . Audit planning
            . Audit checklists
            . Nonconformities and reporting
  • Various applications