Information Security, Cybersecurity, and Personal Data Protection Training

4,6 (43 voting)
 Last update date 09/2025
 Türkçe

Qualified Calculations Training Based on Family and Inheritance Legislation check out our education.

raining Information
Training Method: In-person

Training Date: Will be scheduled once the minimum number of pre-registrations is reached.

Training Hours: Will be scheduled once the minimum number of pre-registrations is reached.

Training Venue: Bursa Uludağ University Görükle Campus, Faculty of Economics and Administrative Sciences – C Block

If a sufficient number of participants is reached in other provinces, the training will also be organized face-to-face in those cities on separately planned dates.

Number of Participants: Minimum 20, maximum 30.
If the number of participants is below 20, fees will be refunded, and the training will not be held. In case of over 30 participants, new groups will be created based on registration order. Training schedules and details will be shared via the Call Center before the start of the program.

Training Fee:


Purpose of the Training

The aim of this training is to provide experts with the technical and legal competencies required for ensuring information security, protecting personal data, and analyzing cyber threats in digital environments.


Note:
This training is organized to enhance the professional development and knowledge of individuals who meet the qualifications announced by the Department of Expert Witness Affairs and have at least 5 years of experience in their field, as required for basic expert witness eligibility.

The certificate obtained after this training cannot be used as proof of the 5-year work requirement in the relevant field.


Learning Outcomes

  • Understands the fundamental principles of information and cyber security.

  • Interprets KVKK (Personal Data Protection Law) and related regulations.

  • Identifies risks related to personal data protection.

  • Knows the processes of security breaches and incident response.


Training Content

Information Security and Basic Concepts

  • What is information security?

  • Principles of confidentiality, integrity, and availability

  • Corporate security policies

  • Types of threats: malware, social engineering, internal threats

Cybersecurity and Incident Response Processes

  • Types of cyberattacks: DDoS, phishing, ransomware

  • Steps to follow during security breaches

  • Preparing an incident response plan

  • Log management and evidence collection

Personal Data Protection and KVKK

  • Law No. 6698 on the Protection of Personal Data (KVKK)

  • What is personal data? Special categories of data

  • Roles of data controllers and data processors

  • Obligation to inform, explicit consent, and data breach notification

Applied Evaluation from the Expert Witness Perspective

  • Case studies on personal data examination in expert reports

  • Integrating technical analysis with legal interpretation

  • Example case evaluations

  • Presentation of security and KVKK findings in expert reports


Important Information

  • A Certificate of Participation will be issued to participants with 80% or higher attendance.

  • Certificates will be sent by PTT Cargo to the address provided at registration.

  • Participants must ensure their contact details are up to date.

  • Installment payment options are not available.

  • For corporate invoices: 0850 840 8543

  • Support: usem@uludag.edu.tr

  • Note: In case of cancellation, refund processing may take approximately 1 month due to revolving fund procedures.

Comments

You are allow cookie by using us website. ENTER