Cyber Security Trainings
Prerequisites
- Basic Level Linux Qualification
- Intermediate Possess of any web programming language
Level
- Intermediate-Upper Level
Time
- 3-5 Days
Educational Content
- Web Application Technology
- Database Systems
- OWASP Top # 10
- Creating and Using Backdoors
- Web Application Firewalls (WAF)
Prerequisites
- Basic Level Linux Qualification
- Intermediate Possess of any web programming language
Level
- Intermediate-Upper Level
Time
- 2-3 Days
Educational Content
- Cyber Crimes
- Cyber Intelligence (Summary)
- Deep Web Discovery
- Domain Intelligence
- Email Header Analysis
- OSINT Methods and Tools
- SSL / TLS Certificate Intelligence
- Social Media Intelligence
- Advanced Search Methods
Prerequisites
- Basic Possess of any web programming language
Level
- Basic-Intermediate Level
Time
- 2-3 Days
Sample Training Content
- Input Controls
- Authentication types
- Session Management
- Authorization Methods
- Code Analysis Tools
- OWASP Checklist
Today, most of the attacks are social engineering attacks on the human factor. Your employees should be trained in order to be protected from these attacks and to gain awareness.
Prerequisites
- There are no prerequisites for this training.
Level
- Basic Level
Time
- 2 Days
Educational Content
- Introduction to Cyber Security
- Threats
- Passwords and Password Managements
- What is Hacking?
- Phishing Attacks
- Human Risk Factors
- Social Engineering Attacks
- Removable Media Attacks
- Safe Internet Usage
- Online and Mobile Banking Security
- Online Shopping Security
- Using Wireless Networks
- Antivirus Software
- Malware
- Physical Security
- Cyber Security Cases that have stood out in the last 3 years
Prerequisites
- Basic Level Linux Qualification
- Intermediate Possess of any web programming language
Level
- Intermediate Level
Time
- 4-5 Days
Educational Content
- What is Pentest?
- Pentest Types and Methodology
- Pentest prerequisites and start
- Information gathering methods with OSINT
- Vulnerability scanning software
- Package collection and processing
- Systems-specific (Windows, Linux / UNIX) pentest studies
- Firewall / WAF pentest
- Wireless network pentest
- Social engineering tests
- Distributed network attacks (DDos) pentest
- Reporting and writing findings