Intermediate Level

Mobile Security

Main Topics Basic concepts in mobile security Android OS basics Android OS security features Android application penetration test IOS operating system basics IOS operating system security features IOS application penetration test Mobile malware and analysis Who Can Participate Information technology employees who want to perform mobile application security penetration testing and mobile malware analysis Prerequisites …

Mobile Security Read More »

Record Analysis

Main Topics Record analysis overview Record analysis standards, rules and legal regulations Record keeping, record collection, viewing tools Common mistakes in record analysis Incident response studies Use of recording at different stages of incident response Contribution of records obtained from different sources to incident response and analysis Who Can Participate System, security and network administrators …

Record Analysis Read More »

Central Security Record Management Systems

Main Topics Central record management systems Tools used in OSSIM The need for event correlation systems OSSIM setup OSSIM component configuration Event association steps Policies Benefits of event correlation systems Gathering information from different components OSSIM attack attribution system Attack attribution OSSIM introduction System maintenance and update OSSIM core components Who Can Participate Information system …

Central Security Record Management Systems Read More »

Records Management

Main Topics Basic concepts of records management Configuration settings that must be fulfilled to be able to collect logs Analysis techniques related to the collected records Issues to be considered in establishing a record management system Analysis of large size records Instant tracking of the collected records Registration information needed for any security breach Records …

Records Management Read More »

Social Engineering Attack and Protection Methods

Main Topics Social engineering concept Attack techniques Examples of social engineering attacks Social engineering tests Protection methods Various social engineering applications Who Can Participate All computer users, primarily system administrators Prerequisites Since the training will be carried out practically, there should be as many computers as the number of participants in the training class. Accumulation …

Social Engineering Attack and Protection Methods Read More »

ISO / IEC 27001 Information Security Management System Application Training

Main Topics What is the information security management system? Why is it necessary? “Plan – Apply – Check, Take Action” cycle in ISO 27001 Information system risk analysis and treatment ISO 27001 basic control areas – Security policy – Information security organization – Asset management – Human resources security – Physical and environmental security – …

ISO / IEC 27001 Information Security Management System Application Training Read More »

Network Forensic Analysis

Main Topics Obtaining digital evidence from network resources The reproducibility of the results to be obtained during the analysis process and the reliability of the obtained evidence Tools, technologies and processes that can be used for different purposes in network analysis Mobile device security Apps Prerequisites Participants (VirtualBox or VMWare) have a computer that can …

Network Forensic Analysis Read More »

Computer Forensic Analysis In-depth Windows Training

Main Topics Numerical forensic analysis basics and evidence collection Applied basic Windows forensic analysis Part-1: Sequence queries, data mining and email forensic analysis Applied basic Windows forensic analysis Part-2: Registry and USB analysis Applied basic Windows forensic analysis Part-3: Log file analysis Applied basic Windows forensic analysis Part-4: Web browser analysis Applied numerical forensic analysis …

Computer Forensic Analysis In-depth Windows Training Read More »

Information Systems Forensic Analysis

Main Topics Computer incident response Computer forensic analysis preparation stages Information about filing systems (NTFS, FAT32, ext2, ext3) in operating systems: Information such as how files are created, stored, deleted in these systems Data retention and data extraction methods for various parts of computers (such as RAM, “Stack” space, hard drives) Forensic analysis of computer …

Information Systems Forensic Analysis Read More »