Information Security, Cybersecurity, and Personal Data Protection Training

4,6 (43 voting)
 Last update date 03/2026
 Türkçe

Enforcement and Bankruptcy Law-Based Qualified Calculations Training check out our education.

Training Information

  • Training Method: Face-to-Face (Formal) Training
  • Training Date: It will be scheduled when sufficient pre-applications are received.
  • Training Location: Bursa Uludağ University Görükle Campus 
  • Training Duration: 12 Hours (2 Days * 6 Hours)
  • Training Process: A WhatsApp group will be created close to the training date and all announcements will be made there.
  • Quota: Minimum 20, maximum 30 participants. If sufficient participants are reached in 80 provinces outside Bursa, face-to-face training will be planned in your province. Training will not be held under 20 participants; fees will be refunded. A new group will be formed for applications exceeding 30.
  • Certificate of Participation: A certificate is issued for attendance of 80% or more.

Important Information

This training is organized to enhance the professional development and increase the knowledge of individuals who meet the qualifications specified in the link below, announced by the Department of Expertise, provided that they have at least 5 years of practical experience in their field.

The certificate obtained as a result of the training cannot be used as proof of the requirement of 5 years of practical experience in this field.

Sub-Expertise Qualifications

Purpose of the Training

The purpose of this training is to provide experts with technical and legal competence in protecting personal data processed in digital environments, ensuring information security, and analyzing cyber threats.

Training Content

Information Security and Basic Concepts

  • What is information security?
  • Principles of confidentiality, integrity, and availability
  • Corporate security policies
  • Types of threats: Malware, social engineering, insider threats

Cybersecurity and Incident Response Processes

  • Types of cyber attacks: DDoS, Phishing, Ransomware
  • Steps to follow in security breaches
  • Preparing an incident response plan
  • Log records and evidence collection processes

Protection of Personal Data and KVKK

  • Law No. 6698 on the Protection of Personal Data (KVKK)
  • What is personal data? Sensitive data
  • Roles of data controller and data processor
  • Obligation to inform, explicit consent, and data breach notification

Applied Evaluation from the Expert Perspective

  • Examples of personal data examination in expertise
  • Combining technical analysis with legal interpretation
  • Case study analyses
  • Presentation of security and KVKK findings in expert reports

Learning Outcomes

  • Understands the basic principles of information and cybersecurity.
  • Can interpret KVKK and related legislation.
  • Identifies risks related to personal data protection.
  • Knows security breach and response processes.

Important Notice

  • A Certificate of Participation is given to those with 80% or more attendance.
  • Certificates are sent via PTT Cargo after the training. Keeping address and contact information up to date is the participant's responsibility.
  • For all questions: usem@uludag.edu.tr
  • Payment is accepted only online.
  • Installment payment by credit card is not available.
  • For corporate invoices: 0850 840 8543

Attention: In case of عدم attendance due to a valid reason and cancellation after final registration, refunds may take approximately 1 month due to internal administrative procedures. Please consider this before completing your registration.

Comments

You are allow cookie by using us website. ENTER