Cyber Security
- Home
- Cyber Security
CISSP (Certified Information Systems Security Professional) Training
This CISSP training program is designed for experienced information security professionals who aim to gain a comprehensive and strategic understanding of enterprise information security management. The training content is fully aligned with the latest ISC2 CISSP Common Body of Knowledge (CBK) and focuses on both managerial and technical aspects of information security. The program supports...
- Cyber Security
- 5 Days
CISA (Certified Information Systems Auditor) Training
This CISA training aims to provide participants with a comprehensive and exam-focused understanding of information systems auditing, IT governance, risk management, and information security controls. The training is designed in alignment with the CISA domain structure defined by ISACA and aims to enable participants to both prepare effectively for the CISA certification exam and acquire...
- Cyber Security
- 5 Days
Secure Software Development
Secure software development training is a training program that aims to provide software developers with knowledge and skills in secure software design, development processes and best practices. This course teaches the principles and methods needed to reduce the risks associated with the security of the software, prevent security vulnerabilities, and protect user data. This type of...
- Cyber Security
- 3 Days
Effective Measures Against Data Leaks
Participants are provided with the necessary technical information on creating processes to take effective measures against data leaks and preventing data leaks. Delegates will learn Data Leaks Data Leaking from Clients and Servers Data Infiltration from Applications Measures against Data Infiltrations
- Cyber Security
- 1 Day
Applied Network And System Security
Transferring the measures to be taken to increase the aggressive point of view and security level to ensure the security of local network and internet connections and systems connected to them to the organization personnel. With the application of the techniques and tools learned on the third day of the training, it is carried out...
- Cyber Security
- 3 Days
Threat And Vulnerability Management
Providing participants with in-depth information about information security threats and provide them with the information necessary to establish a vulnerability management process to maintain the organization's level of information security. Delegates will learn Threat, Risk and Vulnerability Security Vulnerabilities Patch and Update Management Creating a Vulnerability Management Program
- Cyber Security
- 2 Days
SOME Setup
Necessary information will be provided for the effective and sustainable establishment of SOME (Cyber Incident Response Team) structures required to be established in public institutions and critical sectors within a successful project. Delegates will learn SOME principles SOME Personnel SOME Processes Cyber Incident Detection SOME Technologies
- Cyber Security
- 1 Day
Cyber Intelligence
To ensure that necessary precautions are taken by identifying the information that hackers who will target your organization networks and systems can gather about you, your organization and its personnel before them. Delegates will learn Introduction to Cyber Intelligence and Hacking Internet Research Tools Advanced Search Engine Usage Who should attend Network and system...
- Cyber Security
- 2 Days
LOG Collection And Management
Providing cyber incident detection and post-incident review skills by using records (logs) that can be obtained from the organization network and systems. Delegates will learn Types of Records Generated on the Network Establishment of Record Collection and Retention Structure Processing of Records Use of Records
- Cyber Security
- 3 Days
Wireless Network Security
Wireless networks that facilitate our business processes are also an offensive front for the organization network. Participants will be provided with the necessary information for the safe installation of the wireless network and the execution of the operating processes. Delegates will learn Principles of Wireless Network Security Wireless Network Security Vulnerabilities Ensuring Wireless Network Security...
- Cyber Security
- 1 Day
ISO 27001 Information Security Management System Manager
Training for senior and mid-level managers of companies that have entered or intend to enter the ISO 27001 process includes general information security theory, ISO 27001 contributions, content of the standard, effects of ISO 27001 on business and management processes, ISO 27001 roadmap and important steps. Delegates will learn Introduction to Information Security Introduction to...
- Cyber Security
- 1 Day
Effective Use Of Safety Devices
Transferring the necessary information for the effective use of information security solutions in the organization network. Delegates will learn Safety Devices Information Security Technology Use Scenarios of Information Security Devices Information Security Devices Integration
- Cyber Security
- 1 Day
Disaster Recovery Installation (DRI) Planning, Installation And Operation
Information is provided in order for the organization to maintain its critical functions after a cyber incident or disaster and to keep the impact of the incident to the lowest possible level. Delegates will learn Business Continuity and Disaster Recovery Installation (DRI) DRI Project Management Risk and Business Impact Analysis Disaster Scenario Management
- Cyber Security
- 1 Day
Effective Backup And Backup Management
An effective backup program should be established to ensure the security of organizational information and to ensure that business processes can continue with minimal loss in cases such as cyber attacks or disasters. Participants will be given detailed information about backup technologies and processes and necessary information for an effective backup process will be transferred....
- Cyber Security
- 1 Day
Creating an Effective Information Security Awareness Program
To ensure that necessary precautions are taken by identifying the information that hackers who will target your organization networks and systems can gather about you, your organization and its personnel before them. Delegates will learn Information Security Awareness Programs Principles of an Effective Program Preparation of Information Security Awareness Program Content Ensuring Personnel Adoption...
- Cyber Security
- 2 Days
Ethical Hacking
Throughout the 5-day training, participants practically address the point of view of cyber attackers, the tools and techniques they use. At the end of this period, it is aimed to gain the knowledge and skills to detect and exploit the vulnerabilities of systems, networks and applications. Delegates will learn Introduction to Ethical Hacking Gathering Information...
- Cyber Security
- 5 Days
DoS / DdoS
The scale of decommissioning attacks, which is an easy to organize, difficult to prevent and effective type of attack, is increasing day by day. Detailed information about DoS/DDoS attacks will be provided and necessary techniques will be conveyed to minimize the impact of these attacks on the organization. Delegates will learn Understanding DoS/DDoS Attacks DoS/DDoS...
- Cyber Security
- 2 Days
DNS Security
We see that DNS servers that are located on the organization network but serve elements outside the organization by their nature have become important targets for attackers. Participants will be given detailed technical information about the attacks against the DNA protocol and the attacks carried out using this protocol and the measures to be taken...
- Cyber Security
- 1 Day
Burgundy Team Cyber Security
For those involved in daily cybersecurity operations, it is a special training program developed to address a significant deficiency in the current training approach. Those who receive cyber-attack-oriented trainings cannot use the knowledge and skills they acquire here in their daily work. Performing an infiltration test between the tasks of the IT unit constitutes very...
- Cyber Security
- 5 Days
Information Security Management
Providing participants with the necessary technical information to make the organizational information security level measurable and manageable. Delegates will learn Principles of Information Security Information Security Management Secure Network Architecture Business Continuity Important Issues of Information Security
- Cyber Security
- 2 Days
Advanced Persistant Threat (APT) And Kill Chain
APT (Advanced Persistent Threat Advanced Continuous Threat) attacks, one of the most effective and most dangerous of the next generation cyber attacks, target especially strategic industries such as public, military, finance, telecom and energy. Understanding the techniques used in APT attacks and the measures that can be taken against these attacks with a very high...
- Cyber Security
- 2 Days
Network and System Security
In order to ensure the security of local network and Internet connections and the systems connected to them, it is ensured that the measures to be taken in order to increase the aggressive point of view and security level to be learned are transferred to the organization personnel. Delegates will learn Basic Network Security Information...
- Cyber Security
- 2 Days
Advanced Web and Mobile Application Penetration Testing for Insurance Industry
Penetration tests are considered one of the most fundamental issues in cybersecurity policies and procedures of corporate firms. Web and mobile applications continue to be the weakest link of today's information systems security due to rapid technological developments. As technology evolves, attack vectors and security perspectives on the respective systems change regularly. In the applications...
- Cyber Security / EC-Council Courses
- 2 Days
Advanced Web and Mobile Application Penetration Testing for Telecommunication Industry
Penetration tests are considered one of the most fundamental issues in cybersecurity policies and procedures of corporate firms. Web and mobile applications continue to be the weakest link of today's information systems security due to rapid technological developments. As technology evolves, attack vectors and security perspectives on the respective systems change regularly. In the applications...
- Cyber Security / EC-Council Courses
- 2 Days
Advanced Web and Mobile Application Penetration Testing for Finance Industry
Penetration tests are considered one of the most fundamental issues in cybersecurity policies and procedures of corporate firms. Web and mobile applications continue to be the weakest link of today's information systems security due to rapid technological developments. As technology evolves, attack vectors and security perspectives on the respective systems change regularly. In the applications...
- Cyber Security / EC-Council Courses
- 2 Days
Advanced Web and Mobile Application Penetration Testing
Penetration tests are considered one of the most fundamental issues in cybersecurity policies and procedures of corporate firms. Web and mobile applications continue to be the weakest link of today's information systems security due to rapid technological developments. As technology evolves, attack vectors and security perspectives on the respective systems change regularly. In the applications...
- Cyber Security / EC-Council Courses
- 2 Days
Bug Bounty
Did you know that big companies like Facebook, Google, Microsoft have paid millions of dollars’ worth of prize so far to bug bounty hunters who discover security vulnerabilities in their systems? As one of the most popular jobs of the new age, bug bounty hunting allows you to do your profession as the boss of...
- Cyber Security / EC-Council Courses
- 2 Days
CEH – Ethical Hacker
The CEH - Certified Ethical Hacker certification validates the knowledge and skills of individuals in the field of ethical hacking and penetration testing. The main objective of the CEH certification is to train individuals to understand and think like a hacker in order to identify and exploit vulnerabilities and weaknesses in computer systems and networks....
- Cyber Security / EC-Council Courses
- 5 Days
Cyber security is everyone’s responsibility. But is everyone in your organization responsible for cyber security? If there are cracks in the defenses, you should learn how to protect and defend cyber threats with our cyber security training and certification programs.
BlueMark Academy’s comprehensive cyber security training curriculum includes special IT security training and cyber security certification programs for all levels of your organization, including the C-suite. Learn best security practices, support IT security programs and policy with the NIST framework, or earn CISSP, CompTIA Security +, CASP or CEH certification!