Consultancy & Trainings

Increase the Knowledge Level of Your Employees

Cyber Security Trainings

Prerequisites

  • Basic Level Linux Qualification
  • Intermediate Possess of any web programming language

Level

  • Intermediate-Upper Level

Time

  • 3-5 Days

Educational Content

  • Web Application Technology
  • Database Systems
  • OWASP Top # 10
  • Creating and Using Backdoors
  • Web Application Firewalls (WAF)

Prerequisites

  • Basic Level Linux Qualification
  • Intermediate Possess of any web programming language

Level

  • Intermediate-Upper Level

Time

  • 2-3 Days

Educational Content

  • Cyber Crimes
  • Cyber Intelligence (Summary)
  • Deep Web Discovery
  • Domain Intelligence
  • Email Header Analysis
  • OSINT Methods and Tools
  • SSL / TLS Certificate Intelligence
  • Social Media Intelligence
  • Advanced Search Methods

Prerequisites

  • Basic Possess of any web programming language

Level

  • Basic-Intermediate Level

Time

  • 2-3 Days

Sample Training Content

  • Input Controls
  • Authentication types
  • Session Management
  • Authorization Methods
  • Code Analysis Tools
  • OWASP Checklist

Today, most of the attacks are social engineering attacks on the human factor. Your employees should be trained in order to be protected from these attacks and to gain awareness.

Prerequisites

  • There are no prerequisites for this training.

Level

  • Basic Level

Time

  • 2 Days

Educational Content

  • Introduction to Cyber Security
  • Threats
  • Passwords and Password Managements
  • What is Hacking?
  • Phishing Attacks
  • Human Risk Factors
  • Social Engineering Attacks
  • Removable Media Attacks
  • Safe Internet Usage
  • Online and Mobile Banking Security
  • Online Shopping Security
  • Using Wireless Networks
  • Antivirus Software
  • Malware
  • Physical Security
  • Cyber Security Cases that have stood out in the last 3 years

Prerequisites

  • Basic Level Linux Qualification
  • Intermediate Possess of any web programming language

Level

  • Intermediate Level

Time

  • 4-5 Days

Educational Content

  • What is Pentest?
  • Pentest Types and Methodology
  • Pentest prerequisites and start
  • Information gathering methods with OSINT
  • Vulnerability scanning software
  • Package collection and processing
  • Systems-specific (Windows, Linux / UNIX) pentest studies
  • Firewall / WAF pentest
  • Wireless network pentest
  • Social engineering tests
  • Distributed network attacks (DDos) pentest
  • Reporting and writing findings
Privacy Preferences
When you visit our website, it may store information through your browser from specific services, usually in form of cookies. Here you can change your privacy preferences. Please note that blocking some types of cookies may impact your experience on our website and the services we offer.