Cyber Security

4,7 (190 voting)
 Last update date 03/2026
 Türkçe

Basic Programming and Algorithms Training check out our education.

This training is for professional development purposes, and the certificate obtained does not replace the MYK authorization certificate required in trainings where it is mandatory.

This course covers fundamental security concepts such as personal security, corporate security, network security, and security measures. It provides participants with practical skills including attack detection and response, data privacy management, and security policy development. Additionally, it informs students about current threats and defense strategies to keep them up-to-date in the field of cybersecurity.

Training Program

  • DAY 1 Basic Cybersecurity Concepts
  • Cybersecurity domains
  • Personal data
  • Cybersecurity Threats, Vulnerabilities, and Attacks
  • Common attacks: XSS, SQL Injection, Buffer Overflow, etc.
  • C-I-A Triad (Confidentiality, Integrity, Availability)
  • Authentication and Authorization
  • Risk Management Strategies
  • DAY 2 Malware and Malicious Code
  • Malware: Virus, Worm, Trojan, etc.
  • APT, Logic bombs, Ransomware
  • Backdoors, Rootkits
  • Spyware, Keyloggers, Adware
  • Social Engineering Attacks: Phishing, Pharming, Quid pro quo
  • DAY 3 Threat Actors
  • Hackers
  • Amateurs
  • State-Sponsored
  • Cyber Warfare
  • Motivations for cybercrime
  • DAY 4 Cryptography
  • History of cryptography
  • Encryption Algorithms: DES, AES, RSA, etc.
  • Hashing Algorithms: MD5, SHA, HMAC
  • Authentication Methods: Password verification, Multi-Factor Authentication, OAuth
  • Certificates and Digital Signatures
  • DAY 5 Defense Systems and Devices
  • Password and Authentication Strategies
  • Antivirus, Malware Protection
  • Operating System Security
  • Windows Malware Analysis
  • Mobile Device Security
  • Defense Strategies
  • National Cybersecurity Workforce Framework
  • DAY 6 Threat Intelligence
  • Information gathering: Passive and Active reconnaissance
  • OSINT Tools: Packet Sniffers, Shodan, Google Hack DB, etc.
  • Python Tools
  • DAY 7 Network Security
  • Network attacks: DoS, Recon, Access Attacks, Sniffing, Spoofing, MITM
  • IDS / IPS, Firewall, NAC
  • VPN technologies
  • Mitigating Network Attacks
  • Wireless Security
  • DAY 8 Emerging Technologies
  • Big Data
  • IoT Security
  • Cloud Security

The training is open to corporate collaboration (institution/company legal entity packages), and individual applications are not accepted. The training content can be reorganized according to your corporate participant profile and needs. Through mutual discussions, the training scope and method (Face-to-Face, Online) are determined and relevant processes completed. Upon agreement, suitable dates and times for your participants and our instructors, as well as the training location, are set.

Comments

You are allow cookie by using us website. ENTER