Cyber Security

4,7 (190 voting)
 Last update date 08/2024
 Türkçe

Applied Machine Learning Certificate Program check out our education.

COURSE NAME : Cyber Securıty

SCOPE OF THE COURSE: This course covers fundamental security concepts including personal security, corporate security, network security, and security measures. The course provides participants with practical skills such as attack detection and response, data privacy management, and security policy development. Additionally, it keeps students up-to-date in the field of security by providing information on current threats and defense strategies.

 

DAY

TOPIC

DAY 1

Basic Cyber Security Concepts

  • Cybersecurity domains
  • Personal data
  • Cybersecurity Threats, Vulnerabilities, and Attacks
    • Common attacks
    • XSS, Sql Injection, Buffer overflow …
  • C-I-A Triad (Confidentiality, Integrity, Availability)
  • Authentication and Authorization
  • Risk Management Strategies

 

DAY 2

Malware and Malicious Code

  • Malware
    • Virus, Worm, Trojan Horse…
    • APT, Logic bombs,Ransomware
    • Backdoor, Rootkits
    • Spyware, Scareware, Adware
  • Social Engineering Attacks
    • Phising, Pharming,
    • Quid pro quo

 

DAY 3

Threat Actors

  • Hackers
  • Amateurs
  • State Sponsored
  • Cyber War
  • Cyber criminal motivations

DAY 4

Cryptography

  • History of cryptography
  • Encryption Algorithms
    • DES, AES, SEAL
    • RSA, DSA, DH
  • Hasing Algorithms
    • MD5, SHA, HMAC
  • Authentication methods
    • Password auth, Multifactor Auth., OAuth
    • Server based authentication
  • Certificate and Digital Signatures

 

DAY 5

Defending Systems and Devices

  • Password and Authentication Strategies
  • Antivirus, Antimalware
  • OS security
  • Windows OS Malware Analysis
  • Mobile Device Security
  • Defending Strategies
  • National Cybersecurity Workforce Framework

DAY 6

Threat Intelligence

  • Information gathering
    • Passive information gathering
    • Active information gathering
  • OSINT Tools
    • Packet Sniffer
    • Shodan
    • Google Hack DB
    • Python Tools

 

DAY 7

Network Security

  • Network attacks
    • DoS, Reconnaissance, Access Attacks,
    • Sniffing, Spoofing
    • MITM
  • IDS/IPS, Firewall, NAC
  • VPN technologies
  • Mitigating Network Attacks
  • Wireless Security

DAY 8

Emerging Technologies

  • Big data
  • IoT security
  • Cloud security

 

The Process of Education:
  • The training will be broadcast live simultaneously over the Internet.
  • In order to participate in the training, you must have internet access and a suitable internet package in your current environment.
  • In order for the educational system to be used,camera and microphone equipment have been introduced, a device that can connect to the Internet(smartphone, tablet and preferably computer) is needed.
  • Participants will log in to the system with their cameras and microphones turned on together with our instructor who provides the training during the specified lesson hours.
  • User names and passwords will be sent to the participants' e-mails before the training starts.
  • After the trainings are completed, the system will be kept open for participants for another 7 days. By the end of the seventh day at 23:00, the system will be completely shut down.
  • In order to help us during the training period, a whatsapp group will be created in the form of sending messages only to the administrator, and all kinds of support information will be shared by the administrator during the lesson period. Participants have all kinds of questions and problems usem@uludag.edu.tr they can write to our address. The mail will be followed up instantly during the training.
Important Information:
  • Certificates are issued for participation of 80% and above of the total training period. for participation of 79% and below, no documents will be issued. 
  • After the completion of the training period, certificates will be issued after the controls belonging to our institution and will be sent to the addresses you entered at the time of registration with PTT Cargo. Your address and contact information must be up-to-date.
  • Participants have all kinds of questions and problems usem@uludag.edu.tr they can write to our address. The mail will be followed up instantly during the training.
  • Application for education and paying the tuition fee are made via the Internet. Installment payments cannot be paid on the participants' bank credit cards.

Comments

You are allow cookie by using us website. ENTER