Training Information
- Training Method: Face-to-Face (Formal) Training
- Training Date: It will be scheduled when sufficient pre-applications are received.
- Training Location: Bursa Uludağ University Görükle Campus
- Training Duration: 12 Hours (2 Days * 6 Hours)
- Training Process: A WhatsApp group will be created close to the training date and all announcements will be made there.
- Quota: Minimum 20, maximum 30 participants. If sufficient participants are reached in 80 provinces outside Bursa, face-to-face training will be planned in your province. Training will not be held under 20 participants; fees will be refunded. A new group will be formed for applications exceeding 30.
- Certificate of Participation: A certificate is issued for attendance of 80% or more.
Important Information
This training is organized to enhance the professional development and increase the knowledge of individuals who meet the qualifications specified in the link below, announced by the Department of Expertise, provided that they have at least 5 years of practical experience in their field.
The certificate obtained as a result of the training cannot be used as proof of the requirement of 5 years of practical experience in this field.
Sub-Expertise Qualifications
Purpose of the Training
The purpose of this training is to provide experts with technical and legal competence in protecting personal data processed in digital environments, ensuring information security, and analyzing cyber threats.
Training Content
Information Security and Basic Concepts
- What is information security?
- Principles of confidentiality, integrity, and availability
- Corporate security policies
- Types of threats: Malware, social engineering, insider threats
Cybersecurity and Incident Response Processes
- Types of cyber attacks: DDoS, Phishing, Ransomware
- Steps to follow in security breaches
- Preparing an incident response plan
- Log records and evidence collection processes
Protection of Personal Data and KVKK
- Law No. 6698 on the Protection of Personal Data (KVKK)
- What is personal data? Sensitive data
- Roles of data controller and data processor
- Obligation to inform, explicit consent, and data breach notification
Applied Evaluation from the Expert Perspective
- Examples of personal data examination in expertise
- Combining technical analysis with legal interpretation
- Case study analyses
- Presentation of security and KVKK findings in expert reports
Learning Outcomes
- Understands the basic principles of information and cybersecurity.
- Can interpret KVKK and related legislation.
- Identifies risks related to personal data protection.
- Knows security breach and response processes.
Important Notice
- A Certificate of Participation is given to those with 80% or more attendance.
- Certificates are sent via PTT Cargo after the training. Keeping address and contact information up to date is the participant's responsibility.
- For all questions: usem@uludag.edu.tr
- Payment is accepted only online.
- Installment payment by credit card is not available.
- For corporate invoices: 0850 840 8543
Attention: In case of عدم attendance due to a valid reason and cancellation after final registration, refunds may take approximately 1 month due to internal administrative procedures. Please consider this before completing your registration.