İletişim Formu

    Eğitimler hakkında bilgi almak için formu doldurabilirsiniz.

    Eğitimlerimiz kurumlara ve firmalara yöneliktir.













    Elastic Stack Operations

    Elastic Stack is a group of open source products from Elastic designed to help users take data from any type of source and in any format and search, analyze, and visualize that data in real time. The product group was formerly known as ELK Stack, in which the letters in the name stood for the products in the group: Elasticsearch,...

    Advanced Web and Mobile Application Penetration Testing for Insurance Industry

    Penetration tests are considered one of the most fundamental issues in cybersecurity policies and procedures of corporate firms. Web and mobile applications continue to be the weakest link of today's information systems security due to rapid technological developments. As technology evolves, attack vectors and security perspectives on the respective systems change regularly. In the applications...

    Advanced Web and Mobile Application Penetration Testing for Telecommunication Industry

    Penetration tests are considered one of the most fundamental issues in cybersecurity policies and procedures of corporate firms. Web and mobile applications continue to be the weakest link of today's information systems security due to rapid technological developments. As technology evolves, attack vectors and security perspectives on the respective systems change regularly. In the applications...

    Advanced Web and Mobile Application Penetration Testing for Finance Industry

    Penetration tests are considered one of the most fundamental issues in cybersecurity policies and procedures of corporate firms. Web and mobile applications continue to be the weakest link of today's information systems security due to rapid technological developments. As technology evolves, attack vectors and security perspectives on the respective systems change regularly. In the applications...

    Advanced Web and Mobile Application Penetration Testing

    Penetration tests are considered one of the most fundamental issues in cybersecurity policies and procedures of corporate firms. Web and mobile applications continue to be the weakest link of today's information systems security due to rapid technological developments. As technology evolves, attack vectors and security perspectives on the respective systems change regularly. In the applications...

    Bug Bounty

    Did you know that big companies like Facebook, Google, Microsoft have paid millions of dollars’ worth of prize so far to bug bounty hunters who discover security vulnerabilities in their systems? As one of the most popular jobs of the new age, bug bounty hunting allows you to do your profession as the boss of...

    CISSP (Certified Information Systems Security Professional) Training

    This CISSP training program is designed for experienced information security professionals who aim to gain a comprehensive and strategic understanding of enterprise information security management. The training content is fully aligned with the latest ISC2 CISSP Common Body of Knowledge (CBK) and focuses on both managerial and technical aspects of information security. The program supports...

    CISA (Certified Information Systems Auditor) Training

    This CISA training aims to provide participants with a comprehensive and exam-focused understanding of information systems auditing, IT governance, risk management, and information security controls. The training is designed in alignment with the CISA domain structure defined by ISACA and aims to enable participants to both prepare effectively for the CISA certification exam and acquire...

    CEH – Ethical Hacker

    The CEH - Certified Ethical Hacker certification validates the knowledge and skills of individuals in the field of ethical hacking and penetration testing. The main objective of the CEH certification is to train individuals to understand and think like a hacker in order to identify and exploit vulnerabilities and weaknesses in computer systems and networks....

    Interconnecting Cisco Networking Devices ICND2

    The Interconnecting Cisco Networking Devices, Part 2 (ICND2) v3.0 course provides network administrators with the knowledge and skills needed to install, configure, operate, and troubleshoot a small enterprise network. Key additions to this latest revision include; understanding of Quality of Service (QoS) elements and their applicability, how virtualized and cloud services will interact and impact...

    Interconnecting Cisco Networking Devices ICND1

    The Interconnecting Cisco Networking Devices, Part 1 (ICND1) v3.0 course provides you with the knowledge and skills that are needed how to install, operate, configure, and verify a basic IPv4 and IPv6 network, including configuring a LAN switch, configuring an IP router, managing network devices, and identifying basic security threats. The course focuses on the...

    CCNA Boot Camp Accelerated

    Interconnecting Cisco Networking Devices: Accelerated (CCNAX), is an instructor-led training course that teaches learners how to install, operate, configure, and verify a basic IPv4 and IPv6 network, including configuring a LAN switch, configuring an IP router, connecting to a WAN, and identifying basic security threats. Also covers topics in more depth and teaches learners how...

    AWS Systems Operations

    System Operations on AWS is designed to teach those in a Systems Administrator or Developer Operations (DevOps) role how to create automatable and repeatable deployments of networks and systems on the AWS platform. The course covers the specific AWS features and tools related to configuration and deployment, as well as common techniques used throughout the...

    Developing on AWS

    Developing on AWS helps developers understand how to use the AWS SDK to develop secure and scalable cloud applications. The course provides in-depth knowledge about how to interact with AWS using code and covers key concepts, best practices, and troubleshooting tips.   Delegates will learn how to Set up the AWS SDK and developer credentials...

    Architecting on AWS

    Architecting on AWS covers the fundamentals of building IT infrastructure on AWS. The course is designed to teach solutions architects how to optimize the use of the AWS cloud by understanding AWS services and how these services fit into cloud-based solutions. Because architectural solutions may differ depending on industry, type of applications, and size of...

    AWS Technical Essentials

    AWS Technical Essentials introduces you to AWS products, services, and common solutions. It provides you with fundamentals to become more proficient in identifying AWS services so that you can make informed decisions about IT solutions based on your business requirements and get started working on AWS.   Delegates will learn how to Recognize terminology and...

    AWS Business Essentials

    AWS Business Essentials helps IT business decision–makers understand the benefits of cloud computing and how a cloud strategy can help you meet your business objectives. This course discusses the advantages of cloud computing for your business and the fundamentals of AWS, including financial benefits. This course also introduces you to compliance and security concepts to...

    Adobe Illustrator Advanced

    This one-day advanced course will cover some of Adobe Illustrator’s more advanced artwork creation tools and techniques. You will learn how to create more complex shapes and graphics, work with symbols and with masking. The course will also cover how to convert raster graphics into vectors, how to apply effects and how to work in...

    Adobe Illustrator – Introduction

    This introductory course covers some of the basic and more commonly used features of Adobe Illustrator, so that delegates can navigate the software and use Illustrator's tools to create and work with vector graphics.   Delegates will learn how to Create vector artwork using Illustrator Format paths using fills and colour Understand and use the...

    Adobe Photoshop – Advanced

    This course delves into some of the more advanced image editing and manipulation techniques that are used by Photoshop experts, and offers you hands on activities that demonstrate how these techniques can be used in order to create exciting, professional visual effects. It will also cover powerful tools and techniques to automate aspects of your...

    Adobe Photoshop – Introduction

    This introductory Photoshop course will enable you to make full use of the key image editing capabilities of the application. Through the day your Adobe certified instructor will introduce you to the most important Photoshop tools and explain the key concepts of non-destructive digital image editing. You will learn how to crop, resize and format...

    List Course