Intermediate Level Trainings
Cyberdata Intermediate Level Trainings
Cyber security is a set of technologies, processes and applications designed to protect networks, computers and data from attacks, damage and unauthorized access. Cybersecurity courses teach professionals to detect vulnerabilities, fend off attacks, and respond immediately to emergencies. For information about SOME and other cyber security trainings info@cyberdata.com.tr
Basic Computer Analysis
Main Topics Vulnerability, threat definitions Open source security vulnerability scanners and their use Windows operating system audit Control of Unix / Linux systems Extract the
Attack Detection and Record Management
Main Topics Traffic Analysis Fundamentals Application Protocols and Traffic Analysis Open Source Intrusion Detection System Network Traffic Analysis and Monitoring Intrusion detection methods for application
Cyber Attack Techniques
Main Topics Gathering information in security tests Session intervention in TCP / IP communication Firewalls Intrusion detection and prevention systems Bypassing firewall, intrusion detection and
Central Security Monitoring and Event Management
Main Topics Central Records Management systems Editing event correlation systems (SIM) reports Examples of SIM solutions Determination of high risk assets with inventory analysis Open
Cyber Incident Response Team Establishment and Management
Main Topics Introduction History, sample computer events, sample SOMEs and organizations SOME basic issues What is SOME, SOME framework, SOME service framework Cyber incident response
Information Systems Forensic Analysis
Main Topics Computer incident response Computer forensic analysis preparation stages Information about filing systems (NTFS, FAT32, ext2, ext3) in operating systems: Information such as how
Computer Forensic Analysis In-depth Windows Training
Main Topics Numerical forensic analysis basics and evidence collection Applied basic Windows forensic analysis Part-1: Sequence queries, data mining and email forensic analysis Applied basic
Malware Analysis Methods
Main Topics Applied: Malware tools and methods Applied: Malware analysis fundamentals Applied: Other malware analysis methods Applied: Malicious code analysis Applied: Malware protection methods Prerequisites
Network Forensic Analysis
Main Topics Obtaining digital evidence from network resources The reproducibility of the results to be obtained during the analysis process and the reliability of the
ISO / IEC 27001 Information Security Management System Application Training
Main Topics What is the information security management system? Why is it necessary? “Plan – Apply – Check, Take Action” cycle in ISO 27001 Information
Social Engineering Attack and Protection Methods
Main Topics Social engineering concept Attack techniques Examples of social engineering attacks Social engineering tests Protection methods Various social engineering applications Who Can Participate All
Records Management
Main Topics Basic concepts of records management Configuration settings that must be fulfilled to be able to collect logs Analysis techniques related to the collected
Central Security Record Management Systems
Main Topics Central record management systems Tools used in OSSIM The need for event correlation systems OSSIM setup OSSIM component configuration Event association steps Policies
Record Analysis
Main Topics Record analysis overview Record analysis standards, rules and legal regulations Record keeping, record collection, viewing tools Common mistakes in record analysis Incident response
Mobile Security
Main Topics Basic concepts in mobile security Android OS basics Android OS security features Android application penetration test IOS operating system basics IOS operating system