Cyber Security

  1. Home
  2. Cyber Security

    İletişim Formu

    Eğitimler hakkında bilgi almak için formu doldurabilirsiniz.

    Eğitimlerimiz kurumlara ve firmalara yöneliktir.













    CISSP (Certified Information Systems Security Professional) Training

    This CISSP training program is designed for experienced information security professionals who aim to gain a comprehensive and strategic understanding of enterprise information security management. The training content is fully aligned with the latest ISC2 CISSP Common Body of Knowledge (CBK) and focuses on both managerial and technical aspects of information security. The program supports...

    CISA (Certified Information Systems Auditor) Training

    This CISA training aims to provide participants with a comprehensive and exam-focused understanding of information systems auditing, IT governance, risk management, and information security controls. The training is designed in alignment with the CISA domain structure defined by ISACA and aims to enable participants to both prepare effectively for the CISA certification exam and acquire...

    Secure Software Development

    Secure software development training is a training program that aims to provide software developers with knowledge and skills in secure software design, development processes and best practices. This course teaches the principles and methods needed to reduce the risks associated with the security of the software, prevent security vulnerabilities, and protect user data. This type of...

    Effective Measures Against Data Leaks

    Participants are provided with the necessary technical information on creating processes to take effective measures against data leaks and preventing data leaks. Delegates will learn Data Leaks Data Leaking from Clients and Servers Data Infiltration from Applications Measures against Data Infiltrations  

    Applied Network And System Security

    Transferring the measures to be taken to increase the aggressive point of view and security level to ensure the security of local network and internet connections and systems connected to them to the organization personnel. With the application of the techniques and tools learned on the third day of the training, it is carried out...

    Threat And Vulnerability Management

    Providing participants with in-depth information about information security threats and provide them with the information necessary to establish a vulnerability management process to maintain the organization's level of information security. Delegates will learn Threat, Risk and Vulnerability Security Vulnerabilities Patch and Update Management Creating a Vulnerability Management Program

    SOME Setup

    Necessary information will be provided for the effective and sustainable establishment of SOME (Cyber Incident Response Team) structures required to be established in public institutions and critical sectors within a successful project. Delegates will learn SOME principles SOME Personnel SOME Processes Cyber Incident Detection SOME Technologies

    Cyber Intelligence

    To ensure that necessary precautions are taken by identifying the information that hackers who will target your organization networks and systems can gather about you, your organization and its personnel before them. Delegates will learn Introduction to Cyber Intelligence and Hacking Internet Research Tools Advanced Search Engine Usage   Who should attend Network and system...

    LOG Collection And Management

    Providing cyber incident detection and post-incident review skills by using records (logs) that can be obtained from the organization network and systems. Delegates will learn Types of Records Generated on the Network Establishment of Record Collection and Retention Structure Processing of Records Use of Records

    Wireless Network Security

    Wireless networks that facilitate our business processes are also an offensive front for the organization network. Participants will be provided with the necessary information for the safe installation of the wireless network and the execution of the operating processes. Delegates will learn Principles of Wireless Network Security Wireless Network Security Vulnerabilities Ensuring Wireless Network Security...

    ISO 27001 Information Security Management System Manager

    Training for senior and mid-level managers of companies that have entered or intend to enter the ISO 27001 process includes general information security theory, ISO 27001 contributions, content of the standard, effects of ISO 27001 on business and management processes, ISO 27001 roadmap and important steps. Delegates will learn Introduction to Information Security Introduction to...

    Effective Use Of Safety Devices

    Transferring the necessary information for the effective use of information security solutions in the organization network. Delegates will learn Safety Devices Information Security Technology Use Scenarios of Information Security Devices Information Security Devices Integration

    Disaster Recovery Installation (DRI) Planning, Installation And Operation

    Information is provided in order for the organization to maintain its critical functions after a cyber incident or disaster and to keep the impact of the incident to the lowest possible level. Delegates will learn Business Continuity and Disaster Recovery Installation (DRI) DRI Project Management Risk and Business Impact Analysis Disaster Scenario Management

    Effective Backup And Backup Management

    An effective backup program should be established to ensure the security of organizational information and to ensure that business processes can continue with minimal loss in cases such as cyber attacks or disasters. Participants will be given detailed information about backup technologies and processes and necessary information for an effective backup process will be transferred....

    Creating an Effective Information Security Awareness Program

    To ensure that necessary precautions are taken by identifying the information that hackers who will target your organization networks and systems can gather about you, your organization and its personnel before them.   Delegates will learn Information Security Awareness Programs Principles of an Effective Program Preparation of Information Security Awareness Program Content Ensuring Personnel Adoption...

    Ethical Hacking

    Throughout the 5-day training, participants practically address the point of view of cyber attackers, the tools and techniques they use. At the end of this period, it is aimed to gain the knowledge and skills to detect and exploit the vulnerabilities of systems, networks and applications. Delegates will learn Introduction to Ethical Hacking Gathering Information...

    DoS / DdoS

    The scale of decommissioning attacks, which is an easy to organize, difficult to prevent and effective type of attack, is increasing day by day. Detailed information about DoS/DDoS attacks will be provided and necessary techniques will be conveyed to minimize the impact of these attacks on the organization. Delegates will learn Understanding DoS/DDoS Attacks DoS/DDoS...

    DNS Security

    We see that DNS servers that are located on the organization network but serve elements outside the organization by their nature have become important targets for attackers. Participants will be given detailed technical information about the attacks against the DNA protocol and the attacks carried out using this protocol and the measures to be taken...

    Burgundy Team Cyber Security

    For those involved in daily cybersecurity operations, it is a special training program developed to address a significant deficiency in the current training approach. Those who receive cyber-attack-oriented trainings cannot use the knowledge and skills they acquire here in their daily work. Performing an infiltration test between the tasks of the IT unit constitutes very...

    Information Security Management

    Providing participants with the necessary technical information to make the organizational information security level measurable and manageable. Delegates will learn Principles of Information Security Information Security Management Secure Network Architecture Business Continuity Important Issues of Information Security

    Advanced Persistant Threat (APT) And Kill Chain

    APT (Advanced Persistent Threat Advanced Continuous Threat) attacks, one of the most effective and most dangerous of the next generation cyber attacks, target especially strategic industries such as public, military, finance, telecom and energy. Understanding the techniques used in APT attacks and the measures that can be taken against these attacks with a very high...

    Network and System Security

    In order to ensure the security of local network and Internet connections and the systems connected to them, it is ensured that the measures to be taken in order to increase the aggressive point of view and security level to be learned are transferred to the organization personnel. Delegates will learn Basic Network Security Information...

    Advanced Web and Mobile Application Penetration Testing for Insurance Industry

    Penetration tests are considered one of the most fundamental issues in cybersecurity policies and procedures of corporate firms. Web and mobile applications continue to be the weakest link of today's information systems security due to rapid technological developments. As technology evolves, attack vectors and security perspectives on the respective systems change regularly. In the applications...

    Advanced Web and Mobile Application Penetration Testing for Telecommunication Industry

    Penetration tests are considered one of the most fundamental issues in cybersecurity policies and procedures of corporate firms. Web and mobile applications continue to be the weakest link of today's information systems security due to rapid technological developments. As technology evolves, attack vectors and security perspectives on the respective systems change regularly. In the applications...

    Advanced Web and Mobile Application Penetration Testing for Finance Industry

    Penetration tests are considered one of the most fundamental issues in cybersecurity policies and procedures of corporate firms. Web and mobile applications continue to be the weakest link of today's information systems security due to rapid technological developments. As technology evolves, attack vectors and security perspectives on the respective systems change regularly. In the applications...

    Advanced Web and Mobile Application Penetration Testing

    Penetration tests are considered one of the most fundamental issues in cybersecurity policies and procedures of corporate firms. Web and mobile applications continue to be the weakest link of today's information systems security due to rapid technological developments. As technology evolves, attack vectors and security perspectives on the respective systems change regularly. In the applications...

    Bug Bounty

    Did you know that big companies like Facebook, Google, Microsoft have paid millions of dollars’ worth of prize so far to bug bounty hunters who discover security vulnerabilities in their systems? As one of the most popular jobs of the new age, bug bounty hunting allows you to do your profession as the boss of...

    CEH – Ethical Hacker

    The CEH - Certified Ethical Hacker certification validates the knowledge and skills of individuals in the field of ethical hacking and penetration testing. The main objective of the CEH certification is to train individuals to understand and think like a hacker in order to identify and exploit vulnerabilities and weaknesses in computer systems and networks....

    Cyber security is everyone’s responsibility. But is everyone in your organization responsible for cyber security? If there are cracks in the defenses, you should learn how to protect and defend cyber threats with our cyber security training and certification programs.

    BlueMark Academy’s comprehensive cyber security training curriculum includes special IT security training and cyber security certification programs for all levels of your organization, including the C-suite. Learn best security practices, support IT security programs and policy with the NIST framework, or earn CISSP, CompTIA Security +, CASP or CEH certification!