Entry Level

Introduction to Information Security – Awareness Training

Main Topics Introduction to information security and basic concepts Social engineering TCP / IP Record management Security devices and methods Incident response Introduction to cryptography Unix / Linux security Windows security Web security Wireless network security Malware, infection techniques and analysis Types of cyber attacks Advanced cyber threats Who Can Participate People who want to …

Introduction to Information Security – Awareness Training Read More »

User Safety

Main Topics User’s role in information security User’s place in the corporate information security management system Access to computers Password security Email security Internet access security Virus protection Creation, modification and destruction of information media File access and sharing Data backup Social engineering Principles to be obeyed by the user in emergency situations Who Can …

User Safety Read More »

Administrator Oriented General Security

Main Topics Information security basic concepts Security policy Information security organization Personnel safety Risk analysis and risk management Business continuity Security incident response Operating system security Network security Web security Digital certificates and certificate distribution systems Password management Virus protection systems Who Can Participate Managers who want to get information about information security, people who …

Administrator Oriented General Security Read More »

Managers Focused ISO 27001 Disclosure

Main Topics Main Topics What is the information security system? Why is it necessary? Standard history Annex SL structure PDCA (Plan-Apply-Check-Take Action) approach Mandatory clauses in the standard Annex A: Reference control objectives and controls Matters to be considered in the standard compliance process Who Can Participate Managers who want to learn about the ISO …

Managers Focused ISO 27001 Disclosure Read More »

Basic Security Audit

Main Topics Openness, threat definitions Open source vulnerability scanners and their use Nessus, Nmap, MBSA Windows control Security templates Security Configuration and Analysis / Security Analysis and Configuration Tool Who Can Participate Information technology auditors, information security experts who want to increase their knowledge of system security audits, and system and network administrators who want …

Basic Security Audit Read More »

Basic Computer Analysis

Ana Konular Bilgisayar olaylarına müdahale İşletim sistemlerinde dosyalama sistemleri (NTFS, FAT32, ext2, ext3) hakkında bilgiler: Dosyaların bu sistemlerde ne şetilde oluşturulduğu, saklandığı, silindiği gibi bilgiler Bilgisayarların çeşitli bölümleri için (RAM, Stack alanı, sabit diskler gibi) verilerin kalıcılığı ve veri çıkarma şekilleri Linux üzerinde bilgisayar olayı analizi yapılması ve ilgili araçların tanıtımı Uygulamalı kısımda analiz çalışma …

Basic Computer Analysis Read More »