TRAININGS

Secure code development training explains the coding techniques and methods that should be used to prevent vulnerabilities arising from web applications. The training customizes and elaborates on secure software development strategies in separate categories. Secure software development training is provided as two separate trainings for J2EE and .NET technologies, each lasting 2 days. During the training, the topics covered are taught by working with code in a laboratory environment, demonstrating how secure code can be developed and necessary precautions can be taken in code segments that create vulnerabilities.

Secure code development self-learning kit is a collection of training materials consisting of videos that explain the coding techniques and methods to prevent vulnerabilities arising from web applications.

It consists of approximately 6 hours and 40 minutes of 82 videos.
The training is available in Turkish or English.
It is provided in mp4 or Scorm2004 format.
It can be used by an unlimited number of users.
The usage period is unlimited for the purchased content. However, the update right is valid for 1 year. After 1 year, the training needs to be retaken for new content in subsequent versions.

Web application security training is a practical training that examines web applications from an attacker's perspective. It includes web technologies, the structure of the HTTP protocol, the root causes of application vulnerabilities, exploitation methods, their impacts, bypassing WAF / IPS or application-based measures, commonly encountered configuration errors, and solutions and recommendations for vulnerabilities.

During the training, the topics covered are demonstrated systematically using methodologies and tools used by a penetration testing expert in a laboratory environment, vulnerabilities are exploited to demonstrate their impacts, and solution recommendations are provided after each application. This training is conducted as a 3-day classroom training.

Penetration testing training is an ethical training that demonstrates how security vulnerabilities in IT systems can be identified and exploited from an attacker's perspective. The training covers topics related to network, system, and application security, allowing participants to practice attack techniques on systems in a laboratory environment. Along with the explanation of penetration testing methodologies and tools, the aim is to enable participants to interpret penetration testing reports and come up with solutions for vulnerabilities. This training is conducted as a 5-day classroom training.

Mobile application security training is a practical training that examines mobile applications from an attacker's perspective. It covers the root causes of mobile application vulnerabilities, exploitation methods, impacts, bypassing WAF / IPS or application-based measures, and solutions for vulnerabilities from both attacker and developer perspectives.

During the training, the topics covered specifically for Android and iOS mobile applications are systematically demonstrated using methodologies and tools used by a penetration testing expert in a laboratory environment. Vulnerabilities are exploited to demonstrate their impacts, and solution recommendations are provided after each application. This training is conducted as a 3-day classroom training.

This training provides information about the equipment, processes, and architectures used in ICS infrastructures, as well as the cybersecurity threats specific to these infrastructures and the fundamental security measures important in mitigating threats. This training is provided as a 1-day classroom training with hands-on exercises.

This training provides general information about cybersecurity technologies used in industrial facilities. Practical examples are conducted on the implementation, selection, and placement of these technologies. The training is designed to be practical and covers both open-source and commercial solutions. It is organized as a 2-day training program.

This training covers advanced topics related to industrial cybersecurity. It provides an in- depth understanding of attack and defense methods and is tailored to the target industry. The training is conducted in a practical manner over a duration of 4 days.

This training is conducted based on the "ATT&CK® for ICS" framework, which is specifically developed for ICS/SCADA infrastructures. It covers the attack techniques presented within the framework and provides hands-on practical training over a duration of 3 days.

The secure deployment and commissioning of critical devices such as PLC/RTU in ICS/SCADA infrastructures is crucial. This training addresses various topics from the logical level to the configuration level from a cybersecurity perspective. It is provided as a one-day hands-on training.

In order to ensure that the necessary measures are taken regarding POS security according to Requirement 9.9 of PCI DSS and to emphasize the importance of credit card security for companies and organizations according to Requirement 12.6, PCI DSS Awareness Training aims to provide the required security awareness activities as per these requirements. These trainings can be conducted as classroom training or remote live training.

PCI DSS Technical Training is an in-depth training on the technical controls of PCI DSS aimed at IT professionals. The training program, delivered by experienced experts from Cyberwise, aims to enable participants to understand, interpret, and implement PCI DSS requirements and security controls. These trainings can be conducted as classroom training or remote live training.

Check Point Security Administration (CCSA)
This foundational course covers the essential knowledge required to configure and manage Check Point Security Gateways and Management Software Blades on the Gaia operating system for daily operations.

Check Point Certified Security Expert (CCSE)
This course is recommended for Security Experts and other technical professionals who have received prior training and/or practical experience with Check Point Management Servers and Security Gateways on the Gaia operating system. It provides advanced-level Check Point firewall training.

Check Point Troubleshooting Expert (CCTE)
The advanced-level firewall troubleshooting training equips participants with advanced troubleshooting skills to investigate and resolve more complex issues that may arise while managing your Check Point security environment.

Cloud Network Security Expert for Azure R81
A 2-day specialized course that provides an understanding of the concepts and skills required to configure and manage the CloudGuard Network and Cloud Security Posture Management security solutions in the Azure security environment.

Cloud Network Security Expert for AWS R81
A 2-day specialized course that provides an understanding of the concepts and skills required to configure and manage the CloudGuard Network and Cloud Security Posture Management security solutions in the AWS security environment.

Check Point Admin Class
This Check Point firewall admin training covers the installation and management stages of Check Point firewall software, as well as fundamental operational functions.

Check Point Expert Class
The advanced-level Check Point firewall expertise training that covers all blade functions in-depth.

Check Point Master Class
An expertise training that delves into critical functions that constitute the structure of Check Point firewall software, covering troubleshooting, performance, and optimization topics at an advanced level.

Check Point Multi-Domain & VSX Class
An admin training that addresses the installation, management, and troubleshooting stages of the Check Point Multi-Domain & VSX solution.

Palo Alto Networks Admin Class
An admin training that covers the installation stages and basic management definitions of Palo Alto firewall software.

Linux Expertise Training
An expertise training that covers the working structure, architecture, and security functions of Linux software.

Fundamental Concepts of Network Architecture and Security Training
In the second stage of this training, which covers the components forming the network structure through global concepts and definitions, the fundamental building blocks of network security are discussed, along with practical applications and examples in a LAB environment.

Hands-On Tech Sessions Expertise Program
The Hands-On Tech Sessions from Cyberwise PS services is an expertise program developed to keep the competencies of professionals working in the field of Network Security up-to-date and dynamic. The program includes workshops on "Check Point Firewall, Cloud Security, Linux, Network Architecture, and Security" held every 2, 3, and 4 months.