CyberShIeld INNOVATORS

Next Generation Cybersecurity Training

80 Hours of Training Content

TRAINING PROGRAM

We Are Training the Future Cybersecurity Experts Together

Cybersecurity Background

10 Hours

Teaches the basic concepts of cybersecurity by covering definitions, components, and risk analysis methods. It includes topics such as definitions, components, social engineering attacks, and risk analysis. Cyberbullying and information ethics law are also examined.

  • Definitions and components
  • Password security and risk analysis
  • Social engineering attacks
  • Metadata analysis methods
  • Cyberbullying
  • Information ethics and law

Network Essentials

10 Hours

Teaches the fundamentals of computer networks covering OSI, TCP/IP network models and data transmission processes. Examines the functions of network devices and protocol structures to build a solid foundation for advanced network security.

  • Network layers and networking
  • Steganography techniques
  • Network protocols and devices
  • IP addressing and routing

Linux Basics

4 Hours

Teaches the structure of the Linux operating system, file system hierarchy and directory structure. Includes user and group authorization mechanisms, basic Linux commands and shell programming basics.

  • Linux file and directory structure
  • User/group authorization mechanisms
  • Basic Linux commands
  • Shell programming basics

Open Source Intelligence (OSINT)

10 Hours

Addresses the concept of Open Source Intelligence (OSINT) and its applications. Teaches how to analyze robots.txt and sitemap files for search engines and intelligence work. Develops skills in tracking traces on the internet.

  • Robots.txt and sitemap analysis
  • Google Dorking techniques
  • Steghide/Exiftool
  • Reconnaissance, information gathering, and vulnerability scanning

Penetration Testing Network & System

39 Hours

Details the penetration testing process for network/system environments. Practically conveys reconnaissance, vulnerability scanning, exploitation techniques, and privilege escalation steps. Includes real system simulations.

  • Metasploitable
  • Reconnaissance, information gathering, and vulnerability scanning
  • Vulnerability scanning and exploitation
  • Password attacks and exploitation techniques
  • Active knee pentest
  • Lateral/Horizontal Movement
  • Script writing and Powershell Empire

AI Applications in Cybersecurity

5 Hours

Introduces artificial intelligence-based security systems and threat analysis methods. Addresses security applications of machine learning and deep learning techniques with real scenarios.

  • Machine learning and cybersecurity
  • Attack detection and anomaly analysis
  • Threat classification methods
  • Security automation applications

Career Planning / Career in Cybersecurity

2 Hours

Introduces professional fields and competency areas in the cybersecurity sector. Helps create a personal career roadmap by providing information about CV preparation, interview processes, and certifications.

  • CV preparation and technical interview processes
  • Cybersecurity Background
  • Field of Expertise
  • Creating a career roadmap

Training Calendar

Below you can find the date and time information for our trainings. The trainings will be conducted in a hybrid format (face-to-face and online) on the specified dates.

15 June 10:00 - 15:00

Cybersecurity Background 10 Hours

Basic concepts of cyber security, definitions, components and risk analysis.

Eğitmen: Serkan GÖNEN, Uğur KAYA Location Live Streaming and Recording
16-17 June 10:00 - 15:00

Network Fundamentals 10 Hours

Network layers and protocols, subnetting and routing.

Eğitmen: Serkan GÖNEN, Gökçe KARACAYILMAZ Location Live Streaming and Recording
18 June 10:00 - 14:00

Linux Basics 4 Hours

Linux dosya sistemi, kullanıcı yetkilendirmeleri ve temel komutlar.

Eğitmen: Gökçe KARACAYILMAZ Location Live Streaming and Recording
22-23 June 10:00 - 15:00

Open Source Intelligence (OSINT) 10 Hours

OSINT techniques, Google Dorking and targeted information gathering.

Eğitmen: Utku YILDIZ Location Live Streaming and Recording
23-27 June 10:00 - 15:00

Penetration Testing Network & System (Part 1) 20 Hours

Reconnaissance, information gathering, and vulnerability scanning

Eğitmen: Serkan GÖNEN, Uğur KAYA Location Live Streaming and Recording
27-30 June 10:00 - 15:00

Penetration Testing Network & System (Part 2) 19 Hours

Password attacks and exploitation techniques

Eğitmen: Serkan GÖNEN, Uğur KAYA Location Live Streaming and Recording
8-9 July 10:00 - 15:30

AI Applications in Cybersecurity 5 Hours

Cybersecurity applications with artificial intelligence and machine learning.

Eğitmen: Gökçe KARACAYILMAZ Location Live Streaming and Recording
15 July 13:00 - 15:00

Career Planning / Career in Cybersecurity 2 Hours

Guidance on cybersecurity careers, certifications, and job opportunities.

Eğitmen: Mehmet Ali BARIŞKAN Location Live Streaming and Recording

Note: Trainings will be conducted online. Participants can attend the trainings online. Capacity is limited.

APPLY NOW