{"id":38856,"date":"2022-12-12T13:19:48","date_gmt":"2022-12-12T10:19:48","guid":{"rendered":"https:\/\/bilgem.tubitak.gov.tr\/?page_id=38856"},"modified":"2023-11-03T14:38:10","modified_gmt":"2023-11-03T11:38:10","slug":"sge-education","status":"publish","type":"page","link":"https:\/\/en.bilgem.tubitak.gov.tr\/en\/egitimler\/sge-egitimleri\/","title":{"rendered":"SGE Trainings"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"38856\" class=\"elementor elementor-38856\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-19a2845 elementor-section-full_width elementor-section-height-min-height tbw-hero elementor-section-height-default elementor-section-items-middle\" data-id=\"19a2845\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-779afa7\" data-id=\"779afa7\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-48adf04 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"48adf04\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-1d39664\" data-id=\"1d39664\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9aeaeb9 elementor-widget elementor-widget-text-editor\" data-id=\"9aeaeb9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<a href=\"\/en\/sge\/\">SGE Home<\/a>\u00a0 \u00a0\/\u00a0 \u00a0<a href=\"\/en\/trainings\/\">Trainings\u00a0<\/a> \/\u00a0 \u00a0<a href=\"\/en\/sge-education\/\">SGE Trainings<\/a> \t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d2f872a uael-heading-align-left elementor-invisible elementor-widget elementor-widget-uael-advanced-heading\" data-id=\"d2f872a\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"uael-advanced-heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div class=\"uael-module-content uael-heading-wrapper\">\n\t\t\t\t\t\t<div class=\"uael-module-content uael-separator-parent\">\n\t\t\t\t\t\t\t\t<div class=\"uael-separator-wrap\">\n\t\t\t\t\t<div class=\"uael-separator-line uael-side-left\">\n\t\t\t\t\t\t<span><\/span>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"uael-divider-content\">\n\t\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"uael-divider-text elementor-inline-editing\" data-elementor-setting-key=\"heading_line_text\" data-elementor-inline-editing-toolbar=\"basic\">TRAININGS<\/h3>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"uael-separator-line uael-side-right\">\n\t\t\t\t\t\t<span><\/span>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\n\t\t\t<h1 class=\"uael-heading\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"uael-heading-text elementor-inline-editing uael-size--default\" data-elementor-setting-key=\"heading_title\" data-elementor-inline-editing-toolbar=\"basic\">Cyber Security Institute Trainings<\/span>\n\t\t\t\t\t\t\t<\/h1>\n\n\t\t\t\n\t\t\t\n\t\t\t\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-62c59f1 elementor-align-start elementor-widget__width-auto elementor-fixed e-transform elementor-hidden-mobile elementor-hidden-tablet elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"62c59f1\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;fixed&quot;,&quot;_transform_translateX_effect&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;0&quot;,&quot;sizes&quot;:[]},&quot;_transform_translateY_effect&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_translateY_effect_tablet&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_translateY_effect_mobile&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_translateX_effect_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_translateX_effect_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"#giris\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-lock\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">ENTRY LEV.<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"#standart\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-user-lock\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">STANDARD LEV.<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"#gelismis\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-clipboard-check\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">ADVANCED LV.<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"#ileri\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-user-secret\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">HIGH LEV.<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c7505b3 underline-button dark bilgem elementor-align-left elementor-widget elementor-widget-button\" data-id=\"c7505b3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/siberakademi.bilgem.tubitak.gov.tr\/\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">E\u011fitim portalimize kay\u0131t olmak i\u00e7in Siber Akademi web sitesini ziyaret edin &gt;&gt;<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-7d29e04 elementor-hidden-tablet elementor-hidden-mobile\" data-id=\"7d29e04\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5974af9 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5974af9\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-453261e\" data-id=\"453261e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-b6decf5 elementor-section-full_width elementor-section-height-min-height elementor-section-height-default\" data-id=\"b6decf5\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-6bd8653\" data-id=\"6bd8653\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c80a0a2 elementor-widget elementor-widget-menu-anchor\" data-id=\"c80a0a2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-menu-anchor\" id=\"giris\"><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0d56b35 elementor-widget elementor-widget-heading\" data-id=\"0d56b35\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Entry Level Trainings<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fdd8b87 elementor-widget elementor-widget-eael-adv-accordion\" data-id=\"fdd8b87\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"eael-adv-accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t            <div class=\"eael-adv-accordion\" id=\"eael-adv-accordion-fdd8b87\" data-scroll-on-click=\"no\" data-scroll-speed=\"300\" data-accordion-id=\"fdd8b87\" data-accordion-type=\"accordion\" data-toogle-speed=\"300\">\n            <div class=\"eael-accordion-list\">\n\t\t\t\t\t<div id=\"kullanc-gvenlii\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"1\" aria-controls=\"elementor-tab-content-2661\"><span class=\"eael-advanced-accordion-icon-closed\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-plus\"><\/i><\/span><span class=\"eael-advanced-accordion-icon-opened\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-minus\"><\/i><\/span><span class=\"eael-accordion-tab-title\">User Security<\/span><i aria-hidden=\"true\" class=\"fa-toggle fas fa-angle-right\"><\/i><\/div><div id=\"elementor-tab-content-2661\" class=\"eael-accordion-content clearfix\" data-tab=\"1\" aria-labelledby=\"kullanc-gvenlii\"><table><tbody><tr><td><p><strong>Duration of Education<\/strong><\/p><\/td><td><p>\u2022 3 hours<\/p><\/td><\/tr><tr><td><p><strong>Prerequisites<\/strong><\/p><\/td><td><p>\u2022 Having knowledge of using information systems as a normal user.<\/p><\/td><\/tr><tr><td><p><strong>Who Can Participate?<\/strong><\/p><\/td><td><p>\u2022 Users using information systems.<\/p><\/td><\/tr><tr><td><p><strong>Education Goals<\/strong><\/p><\/td><td><p>\u2022 Awareness about the importance of information security,<br \/>\u2022 Gaining knowledge of responsibilities and duties as part of the information security management system,<br \/>\u2022 Acquisition of basic information on information security.<\/p><\/td><\/tr><tr><td><p><strong>Subject Headings<\/strong><\/p><\/td><td><p>\u2022 The Role of the User in Information Security<br \/>\u2022 User&#039;s Place in the Institution&#039;s Information Security Management System<br \/>\u2022 Access to Computers<br \/>\u2022 Password Security<br \/>\u2022 E-Mail Security<br \/>\u2022 Internet Access Security<br \/>\u2022 Virus Protection<br \/>\u2022 Creation, Modification and Destruction of Information Environments<br \/>\u2022 File Access and Sharing<br \/>\u2022 Data Backup<br \/>\u2022 Social Engineering<br \/>\u2022 Principles to be Followed by the User in Emergency Situations<\/p><\/td><\/tr><\/tbody><\/table><\/div>\n\t\t\t\t\t<\/div><div class=\"eael-accordion-list\">\n\t\t\t\t\t<div id=\"yneticilere-odakl-genel-gvenlik\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"2\" aria-controls=\"elementor-tab-content-2662\"><span class=\"eael-advanced-accordion-icon-closed\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-plus\"><\/i><\/span><span class=\"eael-advanced-accordion-icon-opened\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-minus\"><\/i><\/span><span class=\"eael-accordion-tab-title\">General Security Focused on Administrators<\/span><i aria-hidden=\"true\" class=\"fa-toggle fas fa-angle-right\"><\/i><\/div><div id=\"elementor-tab-content-2662\" class=\"eael-accordion-content clearfix\" data-tab=\"2\" aria-labelledby=\"yneticilere-odakl-genel-gvenlik\"><table><tbody><tr><td><p><strong>Duration of Education<\/strong><\/p><\/td><td><p>\u2022 2 days<\/p><\/td><\/tr><tr><td><p><strong>Prerequisites<\/strong><\/p><\/td><td><p>\u2022 Having general knowledge about information systems.<\/p><\/td><\/tr><tr><td><p><strong>Who Can Participate?<\/strong><\/p><\/td><td><p>\u2022 Managers who want to get information about information security,<br \/>\u2022 People who have general knowledge about information systems and want to learn about information security.<\/p><\/td><\/tr><tr><td><p><strong>Education Goals<\/strong><\/p><\/td><td><p>\u2022 Gaining knowledge about the general concepts of information security and the general structure of the information security management system,<br \/>\u2022 Acquisition of basic technical knowledge about system security.<\/p><\/td><\/tr><tr><td><p><strong>Subject Headings<\/strong><\/p><\/td><td><p>\u2022 Basic Concepts of Information Security<br \/>\u2022 Security Policy<br \/>\u2022 Information Security Organization<br \/>\u2022 Personnel Security<br \/>\u2022 Risk Analysis and Risk Management<br \/>\u2022 Business Continuity<br \/>\u2022 Security Incident Response<br \/>\u2022 Operating System Security<br \/>\u2022 Network Security<br \/>\u2022 Web Security<br \/>\u2022 Digital Certificates and Certificate Distribution Systems<br \/>\u2022 Password Management<br \/>\u2022 Virus Protection Systems<\/p><\/td><\/tr><\/tbody><\/table><\/div>\n\t\t\t\t\t<\/div><div class=\"eael-accordion-list\">\n\t\t\t\t\t<div id=\"sosyal-mhendislik-saldr-ve-korunma-yntemleri\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"3\" aria-controls=\"elementor-tab-content-2663\"><span class=\"eael-advanced-accordion-icon-closed\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-plus\"><\/i><\/span><span class=\"eael-advanced-accordion-icon-opened\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-minus\"><\/i><\/span><span class=\"eael-accordion-tab-title\">Social Engineering: Attack and Protection Methods<\/span><i aria-hidden=\"true\" class=\"fa-toggle fas fa-angle-right\"><\/i><\/div><div id=\"elementor-tab-content-2663\" class=\"eael-accordion-content clearfix\" data-tab=\"3\" aria-labelledby=\"sosyal-mhendislik-saldr-ve-korunma-yntemleri\"><table><tbody><tr><td><p><strong>Duration of Education<\/strong><\/p><\/td><td><p>\u2022 2 days<\/p><\/td><\/tr><tr><td><p><strong>Prerequisites<\/strong><\/p><\/td><td><p>\u2022 Since the training will be done practically, there should be as many computers as the number of participants in the training class.<\/p><\/td><\/tr><tr><td><p><strong>Who Can Participate?<\/strong><\/p><\/td><td><p>\u2022 All computer users, primarily system administrators.<\/p><\/td><\/tr><tr><td><p><strong>Education Goals<\/strong><\/p><\/td><td><p>\u2022 Immunity to social engineering attacks,<br \/>\u2022 Acquisition of knowledge to provide similar training in own institution.<\/p><\/td><\/tr><tr><td><p><strong>Subject Headings<\/strong><\/p><\/td><td><p>\u2022 Social Engineering Concept<br \/>\u2022 Attack Techniques<br \/>\u2022 Social Engineering Attack Examples<br \/>\u2022 Social Engineering Tests<br \/>\u2022 Protection Methods<br \/>\u2022 Various Social Engineering Applications<\/p><\/td><\/tr><\/tbody><\/table><\/div>\n\t\t\t\t\t<\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-4fd0df7 elementor-section-full_width elementor-section-height-min-height elementor-reverse-tablet elementor-reverse-mobile elementor-section-height-default\" data-id=\"4fd0df7\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-82f1ac6\" data-id=\"82f1ac6\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1a3535a elementor-widget elementor-widget-menu-anchor\" data-id=\"1a3535a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-menu-anchor\" id=\"standart\"><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4c592ba elementor-widget elementor-widget-heading\" data-id=\"4c592ba\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Standard Level Trainings<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3fb706d elementor-widget elementor-widget-eael-adv-accordion\" data-id=\"3fb706d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"eael-adv-accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t            <div class=\"eael-adv-accordion\" id=\"eael-adv-accordion-3fb706d\" data-scroll-on-click=\"no\" data-scroll-speed=\"300\" data-accordion-id=\"3fb706d\" data-accordion-type=\"accordion\" data-toogle-speed=\"300\">\n            <div class=\"eael-accordion-list\">\n\t\t\t\t\t<div id=\"bilgi-gvenliine-giri\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"1\" aria-controls=\"elementor-tab-content-6681\"><span class=\"eael-advanced-accordion-icon-closed\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-plus\"><\/i><\/span><span class=\"eael-advanced-accordion-icon-opened\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-minus\"><\/i><\/span><span class=\"eael-accordion-tab-title\">Introduction to Information Security<\/span><i aria-hidden=\"true\" class=\"fa-toggle fas fa-angle-right\"><\/i><\/div><div id=\"elementor-tab-content-6681\" class=\"eael-accordion-content clearfix\" data-tab=\"1\" aria-labelledby=\"bilgi-gvenliine-giri\"><table><tbody><tr><td><p><strong>Duration of Education<\/strong><\/p><\/td><td><p>\u2022 10 days<\/p><\/td><\/tr><tr><td><p><strong>Prerequisites<\/strong><\/p><\/td><td><p>\u2022 There are no specific prerequisites.<\/p><\/td><\/tr><tr><td><p><strong>Who Can Participate?<\/strong><\/p><\/td><td><p>\u2022 People who want to get basic information about all areas of information security.<\/p><\/td><\/tr><tr><td><p><strong>Education Goals<\/strong><\/p><\/td><td><p>\u2022 Gaining knowledge on the basic issues of information security,<br \/>\u2022 Gaining a holistic perspective on information security by gaining knowledge in different areas such as windows security, linux security and cyber threats.<\/p><\/td><\/tr><tr><td><p><strong>Subject Headings<\/strong><\/p><\/td><td><p>\u2022 Introduction to Information Security, Basic Concepts<br \/>\u2022 TCP\/IP<br \/>\u2022 Safety Devices and Methods<br \/>\u2022 Introduction to Cryptography<br \/>\u2022 Unix\/Linux Security<br \/>\u2022 Windows Security<br \/>\u2022 Web Security<br \/>\u2022 Wireless Network Security<br \/>\u2022 Social Engineering<br \/>\u2022 Records Management<br \/>\u2022 Incident Response<br \/>\u2022 Malware, Infection Techniques and Analysis<br \/>\u2022 Types of Cyber Attacks<br \/>\u2022 Advanced Cyber Threats<\/p><\/td><\/tr><\/tbody><\/table><\/div>\n\t\t\t\t\t<\/div><div class=\"eael-accordion-list\">\n\t\t\t\t\t<div id=\"iso-27001-bilgi-gvenlii-ynetim-sistemi-uygulama\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"2\" aria-controls=\"elementor-tab-content-6682\"><span class=\"eael-advanced-accordion-icon-closed\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-plus\"><\/i><\/span><span class=\"eael-advanced-accordion-icon-opened\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-minus\"><\/i><\/span><span class=\"eael-accordion-tab-title\">ISO 27001 Information Security Management System Implementation<\/span><i aria-hidden=\"true\" class=\"fa-toggle fas fa-angle-right\"><\/i><\/div><div id=\"elementor-tab-content-6682\" class=\"eael-accordion-content clearfix\" data-tab=\"2\" aria-labelledby=\"iso-27001-bilgi-gvenlii-ynetim-sistemi-uygulama\"><table><tbody><tr><td><p><strong>Duration of Education<\/strong><\/p><\/td><td><p>\u2022 3 days<\/p><\/td><\/tr><tr><td><p><strong>Prerequisites<\/strong><\/p><\/td><td><p>\u2022 There are no specific prerequisites. Familiarity with quality systems provides an advantage.<\/p><\/td><\/tr><tr><td><p><strong>Who Can Participate?<\/strong><\/p><\/td><td><p>\u2022 Persons responsible for establishing and operating an ISO 27001-based Information Security Management System (ISMS),<br \/>\u2022 Persons who will be subject to or participate in an ISO 27001 audit.<\/p><\/td><\/tr><tr><td><p><strong>Education Goals<\/strong><\/p><\/td><td><p>\u2022 Gaining the ability to establish ISMS,<br \/>\u2022 Gaining knowledge about the concepts related to auditing.<\/p><\/td><\/tr><tr><td><p><strong>Subject Headings<\/strong><\/p><\/td><td><p>\u2022 What is Information Security Management System? Why is it Necessary?<br \/>\u2022 \u201cPlan-Do-Check-Act\u201d Cycle in ISO 27001<br \/>\u2022 Information System Risk Analysis and Treatment<br \/>\u2022 ISO 27001 Basic Control Areas:<br \/>&#8211; G\u00fcvenlik Politikalar\u0131<br \/>&#8211; Bilgi G\u00fcvenli\u011fi Organizasyonu<br \/>&#8211; \u0130nsan Kaynaklar\u0131 G\u00fcvenli\u011fi<br \/>&#8211; Varl\u0131k Y\u00f6netimi<br \/>&#8211; Eri\u015fim Kontrol\u00fc<br \/>&#8211; Kriptografi<br \/>&#8211; Fiziksel ve \u00c7evresel G\u00fcvenlik<br \/>&#8211; \u0130\u015fletim G\u00fcvenli\u011fi<br \/>&#8211; Haberle\u015fme G\u00fcvenli\u011fi<br \/>&#8211; Sistem Temini, Geli\u015ftirme ve Bak\u0131m\u0131<br \/>&#8211; Tedarik\u00e7i \u0130li\u015fkileri<br \/>&#8211; Bilgi G\u00fcvenli\u011fi \u0130hlal Olay\u0131 Y\u00f6netimi<br \/>&#8211; \u0130\u015f S\u00fcreklili\u011fi Y\u00f6netiminin Bilgi G\u00fcvenli\u011fi Hususlar\u0131<br \/>&#8211; Uyum<br \/>\u2022 Compliance Audit to ISO 27001<br \/>&#8211; Denetim Planlama<br \/>&#8211; Denetim Kontrol Listeleri<br \/>&#8211; Uygunsuzluklar ve Raporlama<br \/>\u2022 Various Applications<\/p><\/td><\/tr><\/tbody><\/table><\/div>\n\t\t\t\t\t<\/div><div class=\"eael-accordion-list\">\n\t\t\t\t\t<div id=\"yneticilere-odakl-iso-27001-bilgilendirme\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"3\" aria-controls=\"elementor-tab-content-6683\"><span class=\"eael-advanced-accordion-icon-closed\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-plus\"><\/i><\/span><span class=\"eael-advanced-accordion-icon-opened\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-minus\"><\/i><\/span><span class=\"eael-accordion-tab-title\">ISO 27001 Information Focused on Managers<\/span><i aria-hidden=\"true\" class=\"fa-toggle fas fa-angle-right\"><\/i><\/div><div id=\"elementor-tab-content-6683\" class=\"eael-accordion-content clearfix\" data-tab=\"3\" aria-labelledby=\"yneticilere-odakl-iso-27001-bilgilendirme\"><table><tbody><tr><td><p><strong>Duration of Education<\/strong><\/p><\/td><td><p>\u2022 3 hours<\/p><\/td><\/tr><tr><td><p><strong>Prerequisites<\/strong><\/p><\/td><td><p>\u2022 There are no specific prerequisites. Familiarity with quality systems provides an advantage.<\/p><\/td><\/tr><tr><td><p><strong>Who Can Participate?<\/strong><\/p><\/td><td><p>\u2022 Managers who want to learn about ISO 27001-based Information Security Management System (ISMS)<\/p><\/td><\/tr><tr><td><p><strong>Education Goals<\/strong><\/p><\/td><td><p>\u2022 Participants in the training will have general information about ISO 27001 and ISMS.<\/p><\/td><\/tr><tr><td><p><strong>Subject Headings<\/strong><\/p><\/td><td><p>\u2022 What is Information Security Management System? Why is it Necessary?<br \/>\u2022 Standard History<br \/>\u2022 Annex SL Structure<br \/>\u2022 PDCA (Plan-Do-Check-Act) Approach<br \/>\u2022 Mandatory Items in the Standard<br \/>\u2022 Appendix A: Reference Control Objectives and Controls<br \/>\u2022 Matters to be Considered in the Process of Compliance with the Standard<\/p><\/td><\/tr><\/tbody><\/table><\/div>\n\t\t\t\t\t<\/div><div class=\"eael-accordion-list\">\n\t\t\t\t\t<div id=\"siber-olaylara-mdahale-ekibi\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"4\" aria-controls=\"elementor-tab-content-6684\"><span class=\"eael-advanced-accordion-icon-closed\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-plus\"><\/i><\/span><span class=\"eael-advanced-accordion-icon-opened\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-minus\"><\/i><\/span><span class=\"eael-accordion-tab-title\">Cyber Incident Response Team<\/span><i aria-hidden=\"true\" class=\"fa-toggle fas fa-angle-right\"><\/i><\/div><div id=\"elementor-tab-content-6684\" class=\"eael-accordion-content clearfix\" data-tab=\"4\" aria-labelledby=\"siber-olaylara-mdahale-ekibi\"><table><tbody><tr><td><p><strong>Duration of Education<\/strong><\/p><\/td><td><p>\u2022 2 days<\/p><\/td><\/tr><tr><td><p><strong>Prerequisites<\/strong><\/p><\/td><td><p>\u2022 Moderate experience in both administrative processes and information systems infrastructure.<\/p><\/td><\/tr><tr><td><p><strong>Who Can Participate?<\/strong><\/p><\/td><td><p>\u2022 Personnel who will take part in the establishment\/management of the SOME (Cyber Incidents Response Team) unit in their institutions,<br \/>\u2022 Personnel working in the information security units of the institution.<\/p><\/td><\/tr><tr><td><p><strong>Education Goals<\/strong><\/p><\/td><td><p>\u2022 Acquisition of capabilities that will form the response process to cyber incidents in their institutions.<\/p><\/td><\/tr><tr><td><p><strong>Subject Headings<\/strong><\/p><\/td><td><p>\u2022 Introduction (History, Case Studies, National Cyber Incident Response Organization)<br \/>\u2022 SOME Basic Topics (What is SOME, Who are its Internal Stakeholders?)<br \/>\u2022 SOME Installation Steps<br \/>\u2022 Roles and Responsibilities of SOMEs<br \/>&#8211; Siber Olay \u00d6ncesinde<br \/>&#8211; Siber Olay Esnas\u0131nda M\u00fcdahale S\u00fcreci<br \/>&#8211; Siber Olay Sonras\u0131<br \/>\u2022 SOME Operational Elements (Software, Hardware, Policy and Procedures)<\/p><\/td><\/tr><\/tbody><\/table><\/div>\n\t\t\t\t\t<\/div><div class=\"eael-accordion-list\">\n\t\t\t\t\t<div id=\"kritik-altyaplarn-korunmas\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"5\" aria-controls=\"elementor-tab-content-6685\"><span class=\"eael-advanced-accordion-icon-closed\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-plus\"><\/i><\/span><span class=\"eael-advanced-accordion-icon-opened\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-minus\"><\/i><\/span><span class=\"eael-accordion-tab-title\">Protection of Critical Infrastructure<\/span><i aria-hidden=\"true\" class=\"fa-toggle fas fa-angle-right\"><\/i><\/div><div id=\"elementor-tab-content-6685\" class=\"eael-accordion-content clearfix\" data-tab=\"5\" aria-labelledby=\"kritik-altyaplarn-korunmas\"><table><tbody><tr><td><p><strong>Duration of Education<\/strong><\/p><\/td><td><p>\u2022 2 days<\/p><\/td><\/tr><tr><td><p><strong>Prerequisites<\/strong><\/p><\/td><td><p>\u2022 Proximity to the business processes of their own institution, having basic knowledge about information systems and information security.<\/p><\/td><\/tr><tr><td><p><strong>Who Can Participate?<\/strong><\/p><\/td><td><p>\u2022 Managers of institutions operating critical infrastructure,<br \/>\u2022 Corporate SOME and IT unit supervisors and employees.<\/p><\/td><\/tr><tr><td><p><strong>Education Goals<\/strong><\/p><\/td><td><p>\u2022 Gaining information about the unique importance of critical infrastructures and Industrial Control Systems and the precautions to be taken,<br \/>\u2022 Institutions gaining competence in implementing both the administrative process and technical measures regarding the security of critical infrastructures.<\/p><\/td><\/tr><tr><td><p><strong>Subject Headings<\/strong><\/p><\/td><td><p>\u2022 Critical Infrastructures and Information Systems<br \/>\u2022 Critical Infrastructures and Information Security Incidents<br \/>\u2022 Managing Information Security in Institutions (Threats and Precautions)<br \/>\u2022 National Operators and Regulators<br \/>\u2022 National Cyber Security Organization<br \/>\u2022 Situation in the World and Suggestions for Turkey<\/p><\/td><\/tr><\/tbody><\/table><\/div>\n\t\t\t\t\t<\/div><div class=\"eael-accordion-list\">\n\t\t\t\t\t<div id=\"windows-gvenlii\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"6\" aria-controls=\"elementor-tab-content-6686\"><span class=\"eael-advanced-accordion-icon-closed\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-plus\"><\/i><\/span><span class=\"eael-advanced-accordion-icon-opened\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-minus\"><\/i><\/span><span class=\"eael-accordion-tab-title\">Windows Security<\/span><i aria-hidden=\"true\" class=\"fa-toggle fas fa-angle-right\"><\/i><\/div><div id=\"elementor-tab-content-6686\" class=\"eael-accordion-content clearfix\" data-tab=\"6\" aria-labelledby=\"windows-gvenlii\"><table><tbody><tr><td><p><strong>Duration of Education<\/strong><\/p><\/td><td><p>\u2022 3 days<\/p><\/td><\/tr><tr><td><p><strong>Prerequisites<\/strong><\/p><\/td><td><p>\u2022 Basic knowledge of Windows and networking.<\/p><\/td><\/tr><tr><td><p><strong>Who Can Participate?<\/strong><\/p><\/td><td><p>\u2022 Windows network administrators,<br \/>\u2022 Microsoft Active Directory administrators,<br \/>\u2022 Those who plan to make a secure transition to Microsoft systems,<br \/>\u2022 Those interested in security on Microsoft systems.<\/p><\/td><\/tr><tr><td><p><strong>Education Goals<\/strong><\/p><\/td><td><p>\u2022 Basic knowledge of Windows security,<br \/>\u2022 Acquisition of the capabilities to make applications in the field of windows security in their institutions.<\/p><\/td><\/tr><tr><td><p><strong>Subject Headings<\/strong><\/p><\/td><td><p>\u2022 Windows Operating System Security<br \/>\u2022 IPSec, PKI (\u201cPublic Key Infrastructure\u201d \u2013 Public Key Infrastructure) and EFS (\u201cEncrypting File System\u201d \u2013 Encrypted File System)<br \/>\u2022 \u201cPowershell\u201d Development in Windows Environment<\/p><\/td><\/tr><\/tbody><\/table><\/div>\n\t\t\t\t\t<\/div><div class=\"eael-accordion-list\">\n\t\t\t\t\t<div id=\"microsoft-sistemleri-gvenlii\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"7\" aria-controls=\"elementor-tab-content-6687\"><span class=\"eael-advanced-accordion-icon-closed\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-plus\"><\/i><\/span><span class=\"eael-advanced-accordion-icon-opened\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-minus\"><\/i><\/span><span class=\"eael-accordion-tab-title\">Microsoft Systems Security<\/span><i aria-hidden=\"true\" class=\"fa-toggle fas fa-angle-right\"><\/i><\/div><div id=\"elementor-tab-content-6687\" class=\"eael-accordion-content clearfix\" data-tab=\"7\" aria-labelledby=\"microsoft-sistemleri-gvenlii\"><table><tbody><tr><td><p><strong>Duration of Education<\/strong><\/p><\/td><td><p>\u2022 4 days<\/p><\/td><\/tr><tr><td><p><strong>Prerequisites<\/strong><\/p><\/td><td><p>\u2022 Basic knowledge of Windows, Exchange, active directory and networking.<\/p><\/td><\/tr><tr><td><p><strong>Who Can Participate?<\/strong><\/p><\/td><td><p>\u2022 Windows network administrators,<br \/>\u2022 Microsoft Active Directory administrators,<br \/>\u2022 Those who plan to make a secure transition to Microsoft systems,<br \/>\u2022 IIS and Exchange administrators,<br \/>\u2022 Those interested in security on Microsoft systems.<\/p><\/td><\/tr><tr><td><p><strong>Education Goals<\/strong><\/p><\/td><td><p>\u2022 Advanced knowledge of Microsoft systems security,<br \/>\u2022 Acquisition of the capabilities to make applications in the field of microsoft systems security in their institutions.<\/p><\/td><\/tr><tr><td><p><strong>Subject Headings<\/strong><\/p><\/td><td><p>\u2022 Microsoft Web Services Security<br \/>\u2022 Microsoft \u201cPowerShell\u201d<br \/>\u2022 Active Directory and Network Services Security (Group policy, DNS, DHCP)<br \/>\u2022 Patch Management on Microsoft Systems<\/p><\/td><\/tr><\/tbody><\/table><\/div>\n\t\t\t\t\t<\/div><div class=\"eael-accordion-list\">\n\t\t\t\t\t<div id=\"linux-gvenlii\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"8\" aria-controls=\"elementor-tab-content-6688\"><span class=\"eael-advanced-accordion-icon-closed\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-plus\"><\/i><\/span><span class=\"eael-advanced-accordion-icon-opened\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-minus\"><\/i><\/span><span class=\"eael-accordion-tab-title\">Linux Security<\/span><i aria-hidden=\"true\" class=\"fa-toggle fas fa-angle-right\"><\/i><\/div><div id=\"elementor-tab-content-6688\" class=\"eael-accordion-content clearfix\" data-tab=\"8\" aria-labelledby=\"linux-gvenlii\"><table><tbody><tr><td><p><strong>Duration of Education<\/strong><\/p><\/td><td><p>\u2022 3 days<\/p><\/td><\/tr><tr><td><p><strong>Prerequisites<\/strong><\/p><\/td><td><p>\u2022 Having experience at system administrator level in Linux systems.<\/p><\/td><\/tr><tr><td><p><strong>Who Can Participate?<\/strong><\/p><\/td><td><p>\u2022 Security professionals who want to secure Linux-based systems,<br \/>\u2022 System administrators responsible for the security of Linux-based internet applications,<br \/>\u2022 System administrators who are keen on security testing and hardening tools.<\/p><\/td><\/tr><tr><td><p><strong>Education Goals<\/strong><\/p><\/td><td><p>\u2022 Gaining the ability to do security hardening of Linux-based operating systems,<br \/>\u2022 Gaining the ability to use Linux-based open source security tools,<br \/>\u2022 Acquisition of the ability to use tools that detect security breaches on Linux systems.<\/p><\/td><\/tr><tr><td><p><strong>Subject Headings<\/strong><\/p><\/td><td><p>\u2022 Secure Installation<br \/>\u2022 Boot Services Configuration<br \/>\u2022 Safely Configuring the Kernel<br \/>\u2022 File System Access Control<br \/>\u2022 User Access Control<br \/>\u2022 Keeping System Logs<br \/>\u2022 Security Audit Tools<br \/>\u2022 Security Tightening Tools<br \/>\u2022 Script Programming for Security Purposes<\/p><\/td><\/tr><\/tbody><\/table><\/div>\n\t\t\t\t\t<\/div><div class=\"eael-accordion-list\">\n\t\t\t\t\t<div id=\"tcpip-a-gvenlii\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"9\" aria-controls=\"elementor-tab-content-6689\"><span class=\"eael-advanced-accordion-icon-closed\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-plus\"><\/i><\/span><span class=\"eael-advanced-accordion-icon-opened\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-minus\"><\/i><\/span><span class=\"eael-accordion-tab-title\">TCP\/IP Network Security<\/span><i aria-hidden=\"true\" class=\"fa-toggle fas fa-angle-right\"><\/i><\/div><div id=\"elementor-tab-content-6689\" class=\"eael-accordion-content clearfix\" data-tab=\"9\" aria-labelledby=\"tcpip-a-gvenlii\"><table><tbody><tr><td><p><strong>Duration of Education<\/strong><\/p><\/td><td><p>\u2022 2 days<\/p><\/td><\/tr><tr><td><p><strong>Prerequisites<\/strong><\/p><\/td><td><p>\u2022 Having basic networking knowledge.<\/p><\/td><\/tr><tr><td><p><strong>Who Can Participate?<\/strong><\/p><\/td><td><p>\u2022 System and network administrators,<br \/>\u2022 Security and penetration testing experts,<br \/>\u2022 Information systems security department employees,<br \/>\u2022 Employees of the information systems audit unit.<\/p><\/td><\/tr><tr><td><p><strong>Education Goals<\/strong><\/p><\/td><td><p>\u2022 Gaining knowledge and competence through laboratory studies on TCP\/IP network security.<\/p><\/td><\/tr><tr><td><p><strong>Subject Headings<\/strong><\/p><\/td><td><p>\u2022 Protocols in the TCP\/IP Protocol Stack<br \/>\u2022 How the Different Layers of the TCP\/IP Stack Work and the Security Threats Targeting Them<br \/>\u2022 Security Vulnerabilities and Solutions for TCP\/IP Protocols<br \/>\u2022 Techniques, Protocols and Devices Used to Ensure Network Security<br \/>\u2022 Wireshark etc. Packet Capture Programs, Protocol and Packet Structure Analysis<br \/>\u2022 Concepts such as SSL, IPSec, VPN, Digital Certificate<br \/>\u2022 Network Components such as Firewall, IDS\/IPS, Proxy<\/p><\/td><\/tr><\/tbody><\/table><\/div>\n\t\t\t\t\t<\/div><div class=\"eael-accordion-list\">\n\t\t\t\t\t<div id=\"aktif-cihaz-gvenlii\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"10\" aria-controls=\"elementor-tab-content-66810\"><span class=\"eael-advanced-accordion-icon-closed\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-plus\"><\/i><\/span><span class=\"eael-advanced-accordion-icon-opened\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-minus\"><\/i><\/span><span class=\"eael-accordion-tab-title\">Active Device Security<\/span><i aria-hidden=\"true\" class=\"fa-toggle fas fa-angle-right\"><\/i><\/div><div id=\"elementor-tab-content-66810\" class=\"eael-accordion-content clearfix\" data-tab=\"10\" aria-labelledby=\"aktif-cihaz-gvenlii\"><table><tbody><tr><td><p><strong>Duration of Education<\/strong><\/p><\/td><td><p>\u2022 2 days<\/p><\/td><\/tr><tr><td><p><strong>Prerequisites<\/strong><\/p><\/td><td><p>\u2022 Having basic networking knowledge.<\/p><\/td><\/tr><tr><td><p><strong>Who Can Participate?<\/strong><\/p><\/td><td><p>\u2022 System and network administrators,<br \/>\u2022 Security and penetration testing experts,<br \/>\u2022 Information systems security department employees,<br \/>\u2022 Employees of the information systems audit unit.<\/p><\/td><\/tr><tr><td><p><strong>Education Goals<\/strong><\/p><\/td><td><p>\u2022 Gaining knowledge and competence through laboratory studies within the scope of active device safety.<\/p><\/td><\/tr><tr><td><p><strong>Subject Headings<\/strong><\/p><\/td><td><p>\u2022 Within the scope of the active device concept and network design, tightening of active devices and ensuring the security of the network infrastructure, the following topics will be explained in an explanatory and practical manner:<br \/>\u2022 Steps for the tightening of active devices, which are widely used today, form the internal network infrastructure and connect the network with the outside world, such as:<br \/>&#8211; A\u011f Anahtar\u0131,<br \/>&#8211; Y\u00f6nlendirme Cihazlar\u0131,<br \/>&#8211; G\u00fcvenlik Duvar\u0131,<br \/>&#8211; \u0130\u00e7erik Kontrolc\u00fcs\u00fc gibi aktif cihazlar\u0131n s\u0131k\u0131la\u015ft\u0131rmalar\u0131na y\u00f6nelik ad\u0131mlar.<br \/>\u2022 Security measures that can be taken on active devices such as:<br \/>&#8211; Fiziksel G\u00fcvenlik,<br \/>&#8211; \u00c7al\u0131\u015fma Ko\u015fullar\u0131,<br \/>&#8211; Kimlik Do\u011frulama,<br \/>&#8211; Yetkilendirme, \u0130zleme, Servis Kontrol\u00fc,<br \/>&#8211; Yama Kontrol\u00fc,<br \/>&#8211; Eri\u015fim Listesi Kontrol\u00fc,<br \/>&#8211; Uzaktan Y\u00f6netim Kontrol\u00fc vb. g\u00fcvenlik \u00f6nlemleri.<\/p><\/td><\/tr><\/tbody><\/table><\/div>\n\t\t\t\t\t<\/div><div class=\"eael-accordion-list\">\n\t\t\t\t\t<div id=\"sistem-gvenlik-denetimi\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"11\" aria-controls=\"elementor-tab-content-66811\"><span class=\"eael-advanced-accordion-icon-closed\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-plus\"><\/i><\/span><span class=\"eael-advanced-accordion-icon-opened\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-minus\"><\/i><\/span><span class=\"eael-accordion-tab-title\">System Security Audit<\/span><i aria-hidden=\"true\" class=\"fa-toggle fas fa-angle-right\"><\/i><\/div><div id=\"elementor-tab-content-66811\" class=\"eael-accordion-content clearfix\" data-tab=\"11\" aria-labelledby=\"sistem-gvenlik-denetimi\"><table><tbody><tr><td><p><strong>Duration of Education<\/strong><\/p><\/td><td><p>\u2022 4 days<\/p><\/td><\/tr><tr><td><p><strong>Prerequisites<\/strong><\/p><\/td><td><p>Basic networking, operating systems (Windows and Unix), knowledge of border security structures.<\/p><\/td><\/tr><tr><td><p><strong>Who Can Participate?<\/strong><\/p><\/td><td><p>\u2022 Information technology auditors,<br \/>\u2022 Information security experts who want to increase their system security audit knowledge,<br \/>\u2022 System and network administrators who want to understand the security audit logic and prepare their systems for such audits.<\/p><\/td><\/tr><tr><td><p><strong>Education Goals<\/strong><\/p><\/td><td><p>\u2022 Gaining the ability to use security vulnerability scanners,<br \/>\u2022 Acquiring the ability of Linux and Windows Operating systems to perform security audits of border security components.<\/p><\/td><\/tr><tr><td><p><strong>Subject Headings<\/strong><\/p><\/td><td><p>\u2022 Openness, Threat Definitions<br \/>\u2022 Open Source Vulnerability Scanners and Using These Tools<br \/>\u2022 Extracting the Topology of a Network<br \/>\u2022 Border Systems Inspection<br \/>\u2022 Windows Control<br \/>\u2022 Audit of Unix\/Linux Systems<\/p><\/td><\/tr><\/tbody><\/table><\/div>\n\t\t\t\t\t<\/div><div class=\"eael-accordion-list\">\n\t\t\t\t\t<div id=\"temel-gvenlik-denetimi\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"12\" aria-controls=\"elementor-tab-content-66812\"><span class=\"eael-advanced-accordion-icon-closed\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-plus\"><\/i><\/span><span class=\"eael-advanced-accordion-icon-opened\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-minus\"><\/i><\/span><span class=\"eael-accordion-tab-title\">Basic Security Audit<\/span><i aria-hidden=\"true\" class=\"fa-toggle fas fa-angle-right\"><\/i><\/div><div id=\"elementor-tab-content-66812\" class=\"eael-accordion-content clearfix\" data-tab=\"12\" aria-labelledby=\"temel-gvenlik-denetimi\"><table><tbody><tr><td><p><strong>Duration of Education<\/strong><\/p><\/td><td><p>\u2022 1 day<\/p><\/td><\/tr><tr><td><p><strong>Prerequisites<\/strong><\/p><\/td><td><p>\u2022 Basic networking, basic operating system knowledge (Windows).<\/p><\/td><\/tr><tr><td><p><strong>Who Can Participate?<\/strong><\/p><\/td><td><p>\u2022 Information technology auditors,<br \/>\u2022 Information security experts who want to increase their system security audit knowledge,<br \/>\u2022 System and network administrators who want to understand the security audit logic and prepare their systems for such audits.<\/p><\/td><\/tr><tr><td><p><strong>Education Goals<\/strong><\/p><\/td><td><p>\u2022 Gaining the ability to use vulnerability scanners,<br \/>\u2022 Gain the ability to control Windows operating systems.<\/p><\/td><\/tr><tr><td><p><strong>Subject Headings<\/strong><\/p><\/td><td><p>\u2022 Openness, Threat Definitions<br \/>\u2022 Open Source Vulnerability Scanners and Using These Tools<br \/>&#8211; Nessus, Nmap, MBSA<br \/>\u2022 Windows Control<br \/>&#8211; G\u00fcvenlik \u015eablonlar\u0131<br \/>&#8211; \u201cSecurity Configuration and Analysis\u201d-\u201cG\u00fcvenlik Analizi ve Yap\u0131land\u0131rma\u201d Arac\u0131<\/p><\/td><\/tr><\/tbody><\/table><\/div>\n\t\t\t\t\t<\/div><div class=\"eael-accordion-list\">\n\t\t\t\t\t<div id=\"kablosuz-a-gvenlii\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"13\" aria-controls=\"elementor-tab-content-66813\"><span class=\"eael-advanced-accordion-icon-closed\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-plus\"><\/i><\/span><span class=\"eael-advanced-accordion-icon-opened\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-minus\"><\/i><\/span><span class=\"eael-accordion-tab-title\">Wireless Network Security<\/span><i aria-hidden=\"true\" class=\"fa-toggle fas fa-angle-right\"><\/i><\/div><div id=\"elementor-tab-content-66813\" class=\"eael-accordion-content clearfix\" data-tab=\"13\" aria-labelledby=\"kablosuz-a-gvenlii\"><table><tbody><tr><td><p><strong>Duration of Education<\/strong><\/p><\/td><td><p>\u2022 2 days<\/p><\/td><\/tr><tr><td><p><strong>Prerequisites<\/strong><\/p><\/td><td><p>\u2022 Having basic networking knowledge.<\/p><\/td><\/tr><tr><td><p><strong>Who Can Participate?<\/strong><\/p><\/td><td><p>\u2022 System and network administrators who manage wireless network systems or want to install such systems,<br \/>\u2022 Information technology professionals who want to learn about wireless network security.<\/p><\/td><\/tr><tr><td><p><strong>Education Goals<\/strong><\/p><\/td><td><p>\u2022 Gaining knowledge about wireless access risks and how to eliminate these risks,<br \/>\u2022 Acquisition of the ability to use wireless network inspection tools.<\/p><\/td><\/tr><tr><td><p><strong>Subject Headings<\/strong><\/p><\/td><td><p>\u2022 Security Risks in Local Area Networks Providing Wireless Access<br \/>\u2022 Secure Wireless Communication Architecture<br \/>\u2022 Software Used in Wireless Networks for Security or Attack Purposes<\/p><\/td><\/tr><\/tbody><\/table><\/div>\n\t\t\t\t\t<\/div><div class=\"eael-accordion-list\">\n\t\t\t\t\t<div id=\"kayt-ynetimi\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"14\" aria-controls=\"elementor-tab-content-66814\"><span class=\"eael-advanced-accordion-icon-closed\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-plus\"><\/i><\/span><span class=\"eael-advanced-accordion-icon-opened\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-minus\"><\/i><\/span><span class=\"eael-accordion-tab-title\">Records Management<\/span><i aria-hidden=\"true\" class=\"fa-toggle fas fa-angle-right\"><\/i><\/div><div id=\"elementor-tab-content-66814\" class=\"eael-accordion-content clearfix\" data-tab=\"14\" aria-labelledby=\"kayt-ynetimi\"><table><tbody><tr><td><p><strong>Duration of Education<\/strong><\/p><\/td><td><p>\u2022 2 days<\/p><\/td><\/tr><tr><td><p><strong>Prerequisites<\/strong><\/p><\/td><td><p>\u2022 Having basic operating and information systems knowledge.<\/p><\/td><\/tr><tr><td><p><strong>Who Can Participate?<\/strong><\/p><\/td><td><p>\u2022 System, security and network administrators,<br \/>\u2022 Information and information systems experts,<br \/>\u2022 Information security managers and experts.<\/p><\/td><\/tr><tr><td><p><strong>Education Goals<\/strong><\/p><\/td><td><p>\u2022 Acquiring the knowledge and skills of establishing a records management system that will enable the collection of record (log) information from information technologies and the effective and efficient management of these records in order to make these records meaningful in line with the needs of the institution, both in accordance with legal responsibility and corporate policy.<\/p><\/td><\/tr><tr><td><p><strong>Subject Headings<\/strong><\/p><\/td><td><p>\u2022 Basic Concepts of Records Management<br \/>\u2022 Configuration Settings That Must Be Fulfilled to Collect Records<br \/>\u2022 Analysis Techniques Related to Collected Records<br \/>\u2022 Considerations in Establishing a Records Management System<br \/>\u2022 Analysis of Large Records<br \/>\u2022 Instant Tracking of Collected Records<br \/>\u2022 Registration Information Required for Any Security Breach<br \/>\u2022 Records Required for Compliance with Legal or Corporate Policies<br \/>\u2022 Most Common Mistakes and Problems Encountered While Collecting Records<br \/>\u2022 Standards to Follow in Record Collection<\/p><\/td><\/tr><\/tbody><\/table><\/div>\n\t\t\t\t\t<\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-eb74193 elementor-section-full_width elementor-section-height-min-height elementor-reverse-tablet elementor-reverse-mobile elementor-section-height-default\" data-id=\"eb74193\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-86eda6a\" data-id=\"86eda6a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ee697d0 elementor-widget elementor-widget-menu-anchor\" data-id=\"ee697d0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-menu-anchor\" id=\"gelismis\"><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-aeca518 elementor-widget elementor-widget-heading\" data-id=\"aeca518\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Advanced Level Trainings<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1d5c70b elementor-widget elementor-widget-eael-adv-accordion\" data-id=\"1d5c70b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"eael-adv-accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t            <div class=\"eael-adv-accordion\" id=\"eael-adv-accordion-1d5c70b\" data-scroll-on-click=\"no\" data-scroll-speed=\"300\" data-accordion-id=\"1d5c70b\" data-accordion-type=\"accordion\" data-toogle-speed=\"300\">\n            <div class=\"eael-accordion-list\">\n\t\t\t\t\t<div id=\"oracle-veri-taban-gvenlii\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"1\" aria-controls=\"elementor-tab-content-3071\"><span class=\"eael-advanced-accordion-icon-closed\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-plus\"><\/i><\/span><span class=\"eael-advanced-accordion-icon-opened\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-minus\"><\/i><\/span><span class=\"eael-accordion-tab-title\">Oracle Database Security<\/span><i aria-hidden=\"true\" class=\"fa-toggle fas fa-angle-right\"><\/i><\/div><div id=\"elementor-tab-content-3071\" class=\"eael-accordion-content clearfix\" data-tab=\"1\" aria-labelledby=\"oracle-veri-taban-gvenlii\"><table><tbody><tr><td><p><strong>Duration of Education<\/strong><\/p><\/td><td><p>\u2022 3 days<\/p><\/td><\/tr><tr><td><p><strong>Prerequisites<\/strong><\/p><\/td><td><p>\u2022 Having general information about databases and basic database management.<\/p><\/td><\/tr><tr><td><p><strong>Who Can Participate?<\/strong><\/p><\/td><td><p>\u2022 Database administrators,<br \/>\u2022 Database security controllers.<\/p><\/td><\/tr><tr><td><p><strong>Education Goals<\/strong><\/p><\/td><td><p>\u2022 Acquisition of the ability to perform database security audits,<br \/>\u2022 Acquisition of the ability to manage the database securely.<\/p><\/td><\/tr><tr><td><p><strong>Subject Headings<\/strong><\/p><\/td><td><p>\u2022 Database Fundamentals<br \/>\u2022 Authentication<br \/>\u2022 Access Control Lists<br \/>\u2022 Database Security Audit<br \/>\u2022 Network Security<br \/>\u2022 Database Backup<br \/>\u2022 Controlling Access Tools<br \/>\u2022 Advanced Security Measures<\/p><\/td><\/tr><\/tbody><\/table><\/div>\n\t\t\t\t\t<\/div><div class=\"eael-accordion-list\">\n\t\t\t\t\t<div id=\"ms-sql-server-veri-taban-gvenlii\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"2\" aria-controls=\"elementor-tab-content-3072\"><span class=\"eael-advanced-accordion-icon-closed\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-plus\"><\/i><\/span><span class=\"eael-advanced-accordion-icon-opened\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-minus\"><\/i><\/span><span class=\"eael-accordion-tab-title\">MS SQL Server Database Security<\/span><i aria-hidden=\"true\" class=\"fa-toggle fas fa-angle-right\"><\/i><\/div><div id=\"elementor-tab-content-3072\" class=\"eael-accordion-content clearfix\" data-tab=\"2\" aria-labelledby=\"ms-sql-server-veri-taban-gvenlii\"><table><tbody><tr><td><p><strong>Duration of Education<\/strong><\/p><\/td><td><p>\u2022 3 days<\/p><\/td><\/tr><tr><td><p><strong>Prerequisites<\/strong><\/p><\/td><td><p>\u2022 Having general information about databases and basic database management.<\/p><\/td><\/tr><tr><td><p><strong>Who Can Participate?<\/strong><\/p><\/td><td><p>\u2022 Database administrators,<br \/>\u2022 Database security controllers.<\/p><\/td><\/tr><tr><td><p><strong>Education Goals<\/strong><\/p><\/td><td><p>\u2022 Gaining knowledge about SQL Server database security mechanisms and concepts affecting security,<br \/>\u2022 Acquisition of SQL Server security audit capability,<br \/>\u2022 Gaining the ability to manage database securely.<\/p><\/td><\/tr><tr><td><p><strong>Subject Headings<\/strong><\/p><\/td><td><p>\u2022 SQL Server, General Topics<br \/>\u2022 Operating System Configuration<br \/>\u2022 Network Configuration<br \/>\u2022 SQL Server Installation and Updates<br \/>\u2022 Making SQL Server Settings<br \/>\u2022 Access Control and Authorizations<br \/>\u2022 Auditing and Recording Procedures<br \/>\u2022 Backup and Disaster Recovery Procedures<br \/>\u2022 Replication<br \/>\u2022 Software Development Issues<br \/>\u2022 \u201cSurface Area Configuration\u201d Tool<br \/>\u2022 SQL Server Testing and Monitoring Tools<\/p><\/td><\/tr><\/tbody><\/table><\/div>\n\t\t\t\t\t<\/div><div class=\"eael-accordion-list\">\n\t\t\t\t\t<div id=\"web-uygulamalar-gvenlii\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"3\" aria-controls=\"elementor-tab-content-3073\"><span class=\"eael-advanced-accordion-icon-closed\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-plus\"><\/i><\/span><span class=\"eael-advanced-accordion-icon-opened\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-minus\"><\/i><\/span><span class=\"eael-accordion-tab-title\">Web Applications Security<\/span><i aria-hidden=\"true\" class=\"fa-toggle fas fa-angle-right\"><\/i><\/div><div id=\"elementor-tab-content-3073\" class=\"eael-accordion-content clearfix\" data-tab=\"3\" aria-labelledby=\"web-uygulamalar-gvenlii\"><table><tbody><tr><td><p><strong>Duration of Education<\/strong><\/p><\/td><td><p>\u2022 2 days<\/p><\/td><\/tr><tr><td><p><strong>Prerequisites<\/strong><\/p><\/td><td><p>\u2022 Having basic knowledge of web technologies (HTTP, HTML, web servers, internet browsers) and knowledge of at least one of the languages used in applications (PHP, Java, ASP.NET, Perl etc.)<\/p><\/td><\/tr><tr><td><p><strong>Who Can Participate?<\/strong><\/p><\/td><td><p>\u2022 HTTP-based application developers and controllers.<\/p><\/td><\/tr><tr><td><p><strong>Education Goals<\/strong><\/p><\/td><td><p>\u2022 Gaining knowledge about the important security components of HTTP-based applications, the most common security mistakes, how to fix these mistakes and ensure sustainable application security.<\/p><\/td><\/tr><tr><td><p><strong>Subject Headings<\/strong><\/p><\/td><td><p>\u2022 Information Gathering<br \/>\u2022 Settings Management<br \/>\u2022 Authentication<br \/>\u2022 Input\/Output Control<br \/>\u2022 Session Management<br \/>\u2022 Authorization<br \/>\u2022 Application Logic<br \/>\u2022 Record Keeping<br \/>\u2022 Error Management<br \/>\u2022 Secure Application Management<\/p><\/td><\/tr><\/tbody><\/table><\/div>\n\t\t\t\t\t<\/div><div class=\"eael-accordion-list\">\n\t\t\t\t\t<div id=\"merkez-gvenlik-kayt-ynetim-sistemleri\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"4\" aria-controls=\"elementor-tab-content-3074\"><span class=\"eael-advanced-accordion-icon-closed\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-plus\"><\/i><\/span><span class=\"eael-advanced-accordion-icon-opened\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-minus\"><\/i><\/span><span class=\"eael-accordion-tab-title\">Central Security Records Management Systems<\/span><i aria-hidden=\"true\" class=\"fa-toggle fas fa-angle-right\"><\/i><\/div><div id=\"elementor-tab-content-3074\" class=\"eael-accordion-content clearfix\" data-tab=\"4\" aria-labelledby=\"merkez-gvenlik-kayt-ynetim-sistemleri\"><table><tbody><tr><td><p><strong>Duration of Education<\/strong><\/p><\/td><td><p>\u2022 4 days<\/p><\/td><\/tr><tr><td><p><strong>Prerequisites<\/strong><\/p><\/td><td><p>\u2022 Being aware of information system components, having general knowledge about security components used in IT systems.<\/p><\/td><\/tr><tr><td><p><strong>Who Can Participate?<\/strong><\/p><\/td><td><p>\u2022 Information system managers,<br \/>\u2022 Information system security managers,<br \/>\u2022 IT auditors.<\/p><\/td><\/tr><tr><td><p><strong>Education Goals<\/strong><\/p><\/td><td><p>\u2022 Gaining knowledge on central attack association systems,<br \/>\u2022 Gaining the ability to centrally collect records from different security components in IT systems,<br \/>\u2022 Gaining the ability to centrally monitor and take precautions against internal or external attacks on IT systems.<\/p><\/td><\/tr><tr><td><p><strong>Subject Headings<\/strong><\/p><\/td><td><p>\u2022 Central Records Management Systems<br \/>\u2022 The Need for Event Association Systems<br \/>\u2022 Event Association Steps<br \/>\u2022 Benefits of Event Association Systems<br \/>\u2022 OSSIM Attack Association System<br \/>\u2022 OSSIM Promotion<br \/>\u2022 OSSIM Core Components<br \/>\u2022 Tools Used in OSSIM<br \/>\u2022 OSSIM Installation<br \/>\u2022 OSSIM Component Configuration<br \/>\u2022 Policies<br \/>\u2022 Gathering Information from Different Components<br \/>\u2022 Attack Attribution<br \/>\u2022 System Maintenance and Update<\/p><\/td><\/tr><\/tbody><\/table><\/div>\n\t\t\t\t\t<\/div><div class=\"eael-accordion-list\">\n\t\t\t\t\t<div id=\"szma-testi-uzmanl\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"5\" aria-controls=\"elementor-tab-content-3075\"><span class=\"eael-advanced-accordion-icon-closed\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-plus\"><\/i><\/span><span class=\"eael-advanced-accordion-icon-opened\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-minus\"><\/i><\/span><span class=\"eael-accordion-tab-title\">Penetration Testing Expertise<\/span><i aria-hidden=\"true\" class=\"fa-toggle fas fa-angle-right\"><\/i><\/div><div id=\"elementor-tab-content-3075\" class=\"eael-accordion-content clearfix\" data-tab=\"5\" aria-labelledby=\"szma-testi-uzmanl\"><table><tbody><tr><td><p><strong>Duration of Education<\/strong><\/p><\/td><td><p>\u2022 5 days<\/p><\/td><\/tr><tr><td><p><strong>Prerequisites<\/strong><\/p><\/td><td><p>\u2022 Having security awareness and experience in the field of security, having moderate knowledge of Linux, Windows and TCP\/IP, having moderate experience in information systems infrastructure.<\/p><\/td><\/tr><tr><td><p><strong>Who Can Participate?<\/strong><\/p><\/td><td><p>\u2022 Personnel to take part in penetration testing and security audits,<br \/>\u2022 Personnel working in information security units.<\/p><\/td><\/tr><tr><td><p><strong>Education Goals<\/strong><\/p><\/td><td><p>\u2022 Acquisition of penetration testing capability.<\/p><\/td><\/tr><tr><td><p><strong>Subject Headings<\/strong><\/p><\/td><td><p>\u2022 Introduction (What is penetration testing? Considerations before, during and after penetration testing, penetration testing methodologies)<br \/>\u2022 Discovery (Discovery types, applied nmap usage, discovery, port scanning, service detection, operating system detection, etc.)<br \/>\u2022 Vulnerability detection (Vulnerability concept, Nessus usage, policy making, scanning and examining vulnerabilities)<br \/>\u2022 Exploit (Exploit and payload concepts, Metasploit usage, msfconsole, meterpreter, post-exploit and auxiliary modules etc.)<br \/>\u2022 External Network Tests and Gathering Information (Active and passive information gathering, \u201cGoogle hacking\u201d etc.)<br \/>\u2022 Sosyal M\u00fchendislik (Telefon ve e-posta yolu ile sosyal m\u00fchendislik teknikleri, SET kullan\u0131m\u0131, \u00d6zelle\u015ftirilmi\u015f payload ve zararl\u0131 kod olu\u015fturma &#8211; makro, pdf, exe.<br \/>\u201cRelay\u201d vulnerability, \u201cPost-exploitation\u201d)<br \/>\u2022 Web Applications Tests (Input-output fields detection, XSS and SQL-i attacks)<\/p><\/td><\/tr><\/tbody><\/table><\/div>\n\t\t\t\t\t<\/div><div class=\"eael-accordion-list\">\n\t\t\t\t\t<div id=\"kayt-analizi\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"6\" aria-controls=\"elementor-tab-content-3076\"><span class=\"eael-advanced-accordion-icon-closed\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-plus\"><\/i><\/span><span class=\"eael-advanced-accordion-icon-opened\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-minus\"><\/i><\/span><span class=\"eael-accordion-tab-title\">Record Analysis<\/span><i aria-hidden=\"true\" class=\"fa-toggle fas fa-angle-right\"><\/i><\/div><div id=\"elementor-tab-content-3076\" class=\"eael-accordion-content clearfix\" data-tab=\"6\" aria-labelledby=\"kayt-analizi\"><table><tbody><tr><td><p><strong>Duration of Education<\/strong><\/p><\/td><td><p>\u2022 5 days<\/p><\/td><\/tr><tr><td><p><strong>Prerequisites<\/strong><\/p><\/td><td><p>\u2022 Basic operating systems, database systems and networking knowledge.<\/p><\/td><\/tr><tr><td><p><strong>Who Can Participate?<\/strong><\/p><\/td><td><p>\u2022 System, security and network administrators,<br \/>\u2022 Information and information systems experts,<br \/>\u2022 Information security managers and experts.<\/p><\/td><\/tr><tr><td><p><strong>Education Goals<\/strong><\/p><\/td><td><p>\u2022 Obtaining basic information about log and record keeping,<br \/>\u2022 Acquisition of record management and analysis capability in incident response,<br \/>\u2022 Gaining the experience of which recording type will be used in which situations and at which stage of the incident response,<br \/>\u2022 Acquisition of basic analysis capabilities for record analysis,<br \/>\u2022 Acquiring general knowledge and skills about record collection tools and gaining competence in using different record analysis tools.<\/p><\/td><\/tr><tr><td><p><strong>Subject Headings<\/strong><\/p><\/td><td><p>\u2022 Record Analysis Overview<br \/>\u2022 Records Analysis Standards, Rules and Regulations<br \/>\u2022 Record Keeping, Record Collection, Imaging Tools<br \/>\u2022 Common Errors in Record Analysis<br \/>\u2022 Incident Response Studies<br \/>\u2022 Use of Recording at Different Stages of Incident Response<br \/>\u2022 Contribution of Records Obtained from Different Sources to Incident Response and Analysis<\/p><\/td><\/tr><\/tbody><\/table><\/div>\n\t\t\t\t\t<\/div><div class=\"eael-accordion-list\">\n\t\t\t\t\t<div id=\"ddos-saldrlar-ile-mcadele\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"7\" aria-controls=\"elementor-tab-content-3077\"><span class=\"eael-advanced-accordion-icon-closed\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-plus\"><\/i><\/span><span class=\"eael-advanced-accordion-icon-opened\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-minus\"><\/i><\/span><span class=\"eael-accordion-tab-title\">Combating DDoS Attacks<\/span><i aria-hidden=\"true\" class=\"fa-toggle fas fa-angle-right\"><\/i><\/div><div id=\"elementor-tab-content-3077\" class=\"eael-accordion-content clearfix\" data-tab=\"7\" aria-labelledby=\"ddos-saldrlar-ile-mcadele\"><table><tbody><tr><td><p><strong>Duration of Education<\/strong><\/p><\/td><td><p>\u2022 2 days<\/p><\/td><\/tr><tr><td><p><strong>Prerequisites<\/strong><\/p><\/td><td><p>\u2022 Having basic TCP\/IP knowledge, basic networking and active device management knowledge.<\/p><\/td><\/tr><tr><td><p><strong>Who Can Participate?<\/strong><\/p><\/td><td><p>\u2022 System and network administrators.<\/p><\/td><\/tr><tr><td><p><strong>Education Goals<\/strong><\/p><\/td><td><p>\u2022 Gaining the ability to record and analyze network traffic at a basic level,<br \/>\u2022 Obtaining information about DoS\/DDoS attacks and their types,<br \/>\u2022 Gaining knowledge about methods of protection from DoS\/DDoS attacks.<\/p><\/td><\/tr><tr><td><p><strong>Subject Headings<\/strong><\/p><\/td><td><p>\u2022 Information security<br \/>\u2022 DoS\/DDoS Attacks and Types<br \/>\u2022 Methods of Protection from DoS\/DDoS Attacks<\/p><\/td><\/tr><\/tbody><\/table><\/div>\n\t\t\t\t\t<\/div><div class=\"eael-accordion-list\">\n\t\t\t\t\t<div id=\"mobil-gvenlik\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"8\" aria-controls=\"elementor-tab-content-3078\"><span class=\"eael-advanced-accordion-icon-closed\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-plus\"><\/i><\/span><span class=\"eael-advanced-accordion-icon-opened\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-minus\"><\/i><\/span><span class=\"eael-accordion-tab-title\">Mobile Security<\/span><i aria-hidden=\"true\" class=\"fa-toggle fas fa-angle-right\"><\/i><\/div><div id=\"elementor-tab-content-3078\" class=\"eael-accordion-content clearfix\" data-tab=\"8\" aria-labelledby=\"mobil-gvenlik\"><table><tbody><tr><td><p><strong>Duration of Education<\/strong><\/p><\/td><td><p>\u2022 5 days<\/p><\/td><\/tr><tr><td><p><strong>Prerequisites<\/strong><\/p><\/td><td><p>\u2022 Having basic knowledge of network protocols such as IP, HTTP, TCP, UDP and network listening tools such as Wireshark. Being able to use *NIX derivative operating systems at a basic level, having knowledge of basic security concepts and penetration testing, having basic knowledge of mobile application development, being able to understand the piece of code read.<\/p><\/td><\/tr><tr><td><p><strong>Who Can Participate?<\/strong><\/p><\/td><td><p>\u2022 Information technology workers who want to perform mobile application security penetration testing and mobile malware analysis.<\/p><\/td><\/tr><tr><td><p><strong>Education Goals<\/strong><\/p><\/td><td><p>\u2022 Participants in the training will learn about the security features offered by iOS and Android operating system platforms, and gain the ability to perform mobile application penetration testing. In addition, they will have the ability to analyze mobile malware.<br \/>Note: Participants must have a jailbroken iOS device (iPhone, iPad, iPod) in order to carry out practical applications for iOS applications. Participants will not be provided with any equipment by the trainer.<br \/><span><\/span><\/p><\/td><\/tr><tr><td><p><strong>Subject Headings<\/strong><\/p><\/td><td><p>\u2022 Basic Concepts in Mobile Security<br \/>\u2022 Android Operating System Fundamentals<br \/>\u2022 Android OS Security Features<br \/>\u2022 Android Application Penetration Test<br \/>\u2022 iOS Operating System Fundamentals<br \/>\u2022 iOS Operating System Security Features<br \/>\u2022 iOS Application Penetration Test<br \/>\u2022 Mobile Malware and Analysis<\/p><\/td><\/tr><\/tbody><\/table><\/div>\n\t\t\t\t\t<\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-aa8c4a3 elementor-section-full_width elementor-section-height-min-height elementor-section-height-default\" data-id=\"aa8c4a3\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-9bbff45\" data-id=\"9bbff45\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-49f3caf elementor-widget elementor-widget-menu-anchor\" data-id=\"49f3caf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-menu-anchor\" id=\"ileri\"><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-892170b elementor-widget elementor-widget-heading\" data-id=\"892170b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">High Level Trainings<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-32c1e7a elementor-widget elementor-widget-eael-adv-accordion\" data-id=\"32c1e7a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"eael-adv-accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t            <div class=\"eael-adv-accordion\" id=\"eael-adv-accordion-32c1e7a\" data-scroll-on-click=\"no\" data-scroll-speed=\"300\" data-accordion-id=\"32c1e7a\" data-accordion-type=\"accordion\" data-toogle-speed=\"300\">\n            <div class=\"eael-accordion-list\">\n\t\t\t\t\t<div id=\"temel-bilgisayar-analizi\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"1\" aria-controls=\"elementor-tab-content-5321\"><span class=\"eael-advanced-accordion-icon-closed\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-plus\"><\/i><\/span><span class=\"eael-advanced-accordion-icon-opened\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-minus\"><\/i><\/span><span class=\"eael-accordion-tab-title\">Basic Computer Analysis<\/span><i aria-hidden=\"true\" class=\"fa-toggle fas fa-angle-right\"><\/i><\/div><div id=\"elementor-tab-content-5321\" class=\"eael-accordion-content clearfix\" data-tab=\"1\" aria-labelledby=\"temel-bilgisayar-analizi\"><table><tbody><tr><td><p><strong>Duration of Education<\/strong><\/p><\/td><td><p>\u2022 3 days<\/p><\/td><\/tr><tr><td><p><strong>Prerequisites<\/strong><\/p><\/td><td><p>\u2022 Having basic Linux and Windows operating system knowledge.<\/p><\/td><\/tr><tr><td><p><strong>Who Can Participate?<\/strong><\/p><\/td><td><p>\u2022 Information system personnel who want to do computer analysis.<\/p><\/td><\/tr><tr><td><p><strong>Education Goals<\/strong><\/p><\/td><td><p>\u2022 Acquisition of the ability to do computer analysis.<\/p><\/td><\/tr><tr><td><p><strong>Subject Headings<\/strong><\/p><\/td><td><p>\u2022 Intervention to Computer Incidents<br \/>\u2022 Information About File Systems (NTFS, FAT32, ext2, ext3) in Operating Systems (How files are created, stored,<br \/>deleted etc.)<br \/>\u2022 Data Persistence and Data Extraction Patterns for Various Partitions of Computers (RAM, \u201cStack\u201d Space, hard disks, etc.)<br \/>\u2022 Computer Incident Analysis on Linux and Introduction of Related Tools<br \/>\u2022 Establishing the Analysis Workspace in the Practical Part and Examining Suspicious Files with Tools<br \/>\u2022 Performing Computer Event Analysis on Windows and Introduction of Related Tools<\/p><\/td><\/tr><\/tbody><\/table><\/div>\n\t\t\t\t\t<\/div><div class=\"eael-accordion-list\">\n\t\t\t\t\t<div id=\"a-trafik-analizi\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"2\" aria-controls=\"elementor-tab-content-5322\"><span class=\"eael-advanced-accordion-icon-closed\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-plus\"><\/i><\/span><span class=\"eael-advanced-accordion-icon-opened\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-minus\"><\/i><\/span><span class=\"eael-accordion-tab-title\">Network Traffic Analysis<\/span><i aria-hidden=\"true\" class=\"fa-toggle fas fa-angle-right\"><\/i><\/div><div id=\"elementor-tab-content-5322\" class=\"eael-accordion-content clearfix\" data-tab=\"2\" aria-labelledby=\"a-trafik-analizi\"><table><tbody><tr><td><p><strong>Duration of Education<\/strong><\/p><\/td><td><p>\u2022 4 days<\/p><\/td><\/tr><tr><td><p><strong>Prerequisites<\/strong><\/p><\/td><td><p>\u2022 Basic TCP\/IP and networking, Basic Linux and Windows operating system knowledge.<\/p><\/td><\/tr><tr><td><p><strong>Who Can Participate?<\/strong><\/p><\/td><td><p>\u2022 Network, system and security administrators,<br \/>\u2022 Information system personnel who want to analyze computer networks.<\/p><\/td><\/tr><tr><td><p><strong>Education Goals<\/strong><\/p><\/td><td><p>\u2022 Gaining the ability to perform incident analysis and evidence collection processes in cybercrimes without accessing memory units,<br \/>\u2022 Gaining the ability to detect errors and malicious network traffic originating from network components.<\/p><\/td><\/tr><tr><td><p><strong>Subject Headings<\/strong><\/p><\/td><td><p>\u2022 Network Packet Capture Technologies: Hardware, Software and Tools<br \/>\u2022 Basic Network Protocols and Components<br \/>\u2022  Analysis of Network Security Components Log File: Firewall, Intrusion Detection and Prevention System etc. Registry Files of Systems<br \/>\u2022 Analysis of Network Protocols. (For protocols like HTTP, SMTP, DNS etc.)<br \/>\u2022 In-Depth Network Packet Analysis<br \/>\u2022 Detection of Malicious Network Traffic: \u201cIntrusion Attack\u201d, \u201cDNS Cache Poisoning\u201d etc. attacks<br \/>\u2022 Detection of Network Traffic Tunneling Techniques: DNS, ICMP, SSH Tunneling etc. techniques<br \/>\u2022 Analysis of Encrypted Network Traffic: The \u201cSSL Traffic Listening\u201d Technique<br \/>\u2022 Obtaining Original Data by Reconstructing Network Traffic<br \/>\u2022 Network Flow Analysis<\/p><\/td><\/tr><\/tbody><\/table><\/div>\n\t\t\t\t\t<\/div><div class=\"eael-accordion-list\">\n\t\t\t\t\t<div id=\"windows-zararl-yazlmlar-analizi\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"3\" aria-controls=\"elementor-tab-content-5323\"><span class=\"eael-advanced-accordion-icon-closed\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-plus\"><\/i><\/span><span class=\"eael-advanced-accordion-icon-opened\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-minus\"><\/i><\/span><span class=\"eael-accordion-tab-title\">Windows Malware Analysis<\/span><i aria-hidden=\"true\" class=\"fa-toggle fas fa-angle-right\"><\/i><\/div><div id=\"elementor-tab-content-5323\" class=\"eael-accordion-content clearfix\" data-tab=\"3\" aria-labelledby=\"windows-zararl-yazlmlar-analizi\"><table><tbody><tr><td><p><strong>Duration of Education<\/strong><\/p><\/td><td><p>\u2022 5 days<\/p><\/td><\/tr><tr><td><p><strong>Prerequisites<\/strong><\/p><\/td><td><p>\u2022 Being familiar with high-level programming concepts such as variables, loops, and functions. Having knowledge about the basic concepts of Windows operating system (\u201cprocess\u201d, \u201cthread\u201d, \u201cmemory management\u201d, \u201cregistry\u201d, \u201chandle\u201d etc.). IP, HTTP, TCP.<br \/>Having basic knowledge of network protocols such as IP, HTTP, TCP, UDP and network listening tools such as Wireshark. Having introductory knowledge of assembly and x86 architecture.<\/p><\/td><\/tr><tr><td><p><strong>Who Can Participate?<\/strong><\/p><\/td><td><p>\u2022 Information technology workers who want to investigate malware.<\/p><\/td><\/tr><tr><td><p><strong>Education Goals<\/strong><\/p><\/td><td><p>\u2022 Gaining practical knowledge about reverse engineering,<br \/>\u2022 Gaining the ability to analyze harmful documents with Windows and web-based malware.<\/p><\/td><\/tr><tr><td><p><strong>Subject Headings<\/strong><\/p><\/td><td><p>\u2022 Windows Operating System, Basic Concepts<br \/>\u2022 Simple Static Analysis<br \/>\u2022 Behavior Analysis<br \/>\u2022 Code Analysis<br \/>\u2022 Confidential Working Methods<br \/>\u2022 Static Analysis Prevention Methods<br \/>\u2022 Dynamic Analysis Blocking Methods<br \/>\u2022 Unpacking Bundled Software<br \/>\u2022 Memory Dump Analysis<br \/>\u2022 Web (Browser) Based Malware Analysis<br \/>\u2022 Analysis of Harmful Documents<\/p><\/td><\/tr><\/tbody><\/table><\/div>\n\t\t\t\t\t<\/div><div class=\"eael-accordion-list\">\n\t\t\t\t\t<div id=\"gvenli-yazlm-gelitirme\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"4\" aria-controls=\"elementor-tab-content-5324\"><span class=\"eael-advanced-accordion-icon-closed\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-plus\"><\/i><\/span><span class=\"eael-advanced-accordion-icon-opened\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-minus\"><\/i><\/span><span class=\"eael-accordion-tab-title\">Secure Software Development<\/span><i aria-hidden=\"true\" class=\"fa-toggle fas fa-angle-right\"><\/i><\/div><div id=\"elementor-tab-content-5324\" class=\"eael-accordion-content clearfix\" data-tab=\"4\" aria-labelledby=\"gvenli-yazlm-gelitirme\"><table><tbody><tr><td><p><strong>Duration of Education<\/strong><\/p><\/td><td><p>\u2022 3 days<\/p><\/td><\/tr><tr><td><p><strong>Prerequisites<\/strong><\/p><\/td><td><p>\u2022 Intermediate command of any of the programming languages.<\/p><\/td><\/tr><tr><td><p><strong>Who Can Participate?<\/strong><\/p><\/td><td><p>\u2022 Software developers\/engineers,<br \/>\u2022 Software project managers,<br \/>\u2022 Software quality control team,<br \/>\u2022 System architects.<\/p><\/td><\/tr><tr><td><p><strong>Education Goals<\/strong><\/p><\/td><td><p>\u2022 Gaining knowledge of basic secure coding principles, secure software design, threat modeling, secure software development and security priority testing principles.<\/p><\/td><\/tr><tr><td><p><strong>Subject Headings<\/strong><\/p><\/td><td><p>\u2022 Security Problems of Software and Technology Components That Software Runs<br \/>\u2022 Key Elements of the Secure Software Development Process and How to Integrate the Secure Software Development Lifecycle into the Software Development Process<br \/>\u2022 The Most Encountered Vulnerabilities with Source Code Samples in addition to the Process and How to Avoid These Vulnerabilities<br \/>\u2022 Technologies That Can Be Used for Safe Operation of Components such as Application, Server, Database, on which the Software Runs on the Assumption that the Software Is Not Just Code<br \/><span><\/span><\/p><\/td><\/tr><\/tbody><\/table><\/div>\n\t\t\t\t\t<\/div><div class=\"eael-accordion-list\">\n\t\t\t\t\t<div id=\"leri-szma-testi-uzmanl\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"5\" aria-controls=\"elementor-tab-content-5325\"><span class=\"eael-advanced-accordion-icon-closed\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-plus\"><\/i><\/span><span class=\"eael-advanced-accordion-icon-opened\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-minus\"><\/i><\/span><span class=\"eael-accordion-tab-title\">Advanced Penetration Testing Expertise<\/span><i aria-hidden=\"true\" class=\"fa-toggle fas fa-angle-right\"><\/i><\/div><div id=\"elementor-tab-content-5325\" class=\"eael-accordion-content clearfix\" data-tab=\"5\" aria-labelledby=\"leri-szma-testi-uzmanl\"><table><tbody><tr><td><p><strong>Duration of Education<\/strong><\/p><\/td><td><p>\u2022 5 days<\/p><\/td><\/tr><tr><td><p><strong>Prerequisites<\/strong><\/p><\/td><td><p>\u2022 Having received penetration testing expertise, having intermediate knowledge of Linux, Windows and TCP\/IP, having basic programming experience (Scripting languages).<\/p><\/td><\/tr><tr><td><p><strong>Who Can Participate?<\/strong><\/p><\/td><td><p>\u2022 Personnel to take part in penetration testing and security audits.<\/p><\/td><\/tr><tr><td><p><strong>Education Goals<\/strong><\/p><\/td><td><p>\u2022 Gaining the competence to use advanced attack techniques in penetration tests.<\/p><\/td><\/tr><tr><td><p><strong>Subject Headings<\/strong><\/p><\/td><td><p>\u2022 Network Packet Generation (Scapy)<br \/>\u2022 Domain Tests (mimikatz, metasploit modules, meterpreter modules, incognito, remote registry, golden ticket, pivoting)<br \/>\u2022 Intrusion Attacks (ARP spoof, SSL Strip, SMB redirect, fake SMB Auth, LLMNR poisoning, DHCP starvation, rogue DHCP server, DNS spoofing, Mimf, scapy snipets)<br \/>\u2022 Parola K\u0131rma Sald\u0131r\u0131lar\u0131 (\u015fifre &#8211; \u00f6zet t\u00fcrleri, \u00e7evrimd\u0131\u015f\u0131 parola k\u0131rma, john, cain, \u00e7evrimi\u00e7i parola k\u0131rma, hydra, g\u00f6kk\u00fc\u015fa\u011f\u0131 tablolar\u0131, crunch, ophcrack, python betikleri)<br \/>\u2022 Wireless Network Tests (Network listening, de-authentication, interception, handshake capture, password cracking attacks, encrypted traffic decryption, wps pin cracking, rogue ap, radius server attacks, scapy snipets)<br \/>\u2022 Heartbleed, Shellshock<\/p><\/td><\/tr><\/tbody><\/table><\/div>\n\t\t\t\t\t<\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>SGE Ana Sayfa\u00a0 \u00a0\/\u00a0 \u00a0E\u011fitimler\u00a0 \/\u00a0 \u00a0SGE E\u011fitimleri E\u011e\u0130T\u0130MLER Siber G\u00fcvenlik Enstit\u00fcs\u00fc E\u011fitimleri G\u0130R\u0130\u015e SVY. STANDART SVY. GEL\u0130\u015eM\u0130\u015e SVY. \u0130LER\u0130 [&hellip;]<\/p>\n","protected":false},"author":8,"featured_media":0,"parent":38091,"menu_order":0,"comment_status":"closed","ping_status":"open","template":"elementor_header_footer","meta":{"_acf_changed":false,"site-sidebar-layout":"no-sidebar","site-content-layout":"page-builder","ast-site-content-layout":"full-width-container","site-content-style":"unboxed","site-sidebar-style":"unboxed","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"disabled","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"default","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"class_list":["post-38856","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/en.bilgem.tubitak.gov.tr\/en\/wp-json\/wp\/v2\/pages\/38856","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/en.bilgem.tubitak.gov.tr\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/en.bilgem.tubitak.gov.tr\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/en.bilgem.tubitak.gov.tr\/en\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/en.bilgem.tubitak.gov.tr\/en\/wp-json\/wp\/v2\/comments?post=38856"}],"version-history":[{"count":11,"href":"https:\/\/en.bilgem.tubitak.gov.tr\/en\/wp-json\/wp\/v2\/pages\/38856\/revisions"}],"predecessor-version":[{"id":124338,"href":"https:\/\/en.bilgem.tubitak.gov.tr\/en\/wp-json\/wp\/v2\/pages\/38856\/revisions\/124338"}],"up":[{"embeddable":true,"href":"https:\/\/en.bilgem.tubitak.gov.tr\/en\/wp-json\/wp\/v2\/pages\/38091"}],"wp:attachment":[{"href":"https:\/\/en.bilgem.tubitak.gov.tr\/en\/wp-json\/wp\/v2\/media?parent=38856"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}