CORPORATE EDUCATIONS

Our courses are given by lecturers, research assistants or people who have or are doing a doctorate in the field. The level of our course is designed in line with the request and infrastructure of the institutions or organizations to be provided. The courses can also be given with a theoretical or theoretical and practical planning for their purpose. Details of our courses are presented under their own headings.

For detailed information about corporate educations, you can contact us at [email protected].

Courses

For detailed information about corporate training, you can reach us at [email protected].

CYBER SECURITY

Devamını oku...

  1. 1. Introduction to Cybersecurity
    1. a. Basic Security Concepts
    2. b. Layered Security Approach
    3. c. Types of Attackers
    4. d. Classification of Attacks
  2. 2. Cybersecurity Domains
    1. a. Critical Infrastructure Security
    2. b. Network Security
    3. c. Application Security
    4. d. Cloud Security
  3. 3. Types of Cybersecurity Attacks
    1. a. Network-Based Cybersecurity Attacks
      1. i. Injection Attacks
      2. ii. DNS Cache Poisoning Attacks
      3. iii. Session Hijacking Attacks
      4. iv. Phishing Attacks
      5. v. Brute Force Attacks
      6. vi. Denial of Service Attack
      7. vii. Dictionary Attack
      8. viii. Malicious URL Attack
      9. ix. File Inclusion Attack
      10. x. Man-in-the-Middle Attack
    2. b. System-Based Cybersecurity Attacks
      1. i. Virus
      2. ii. Worm
      3. iii. Trojan Horse
      4. iv. Backdoor
      5. v. Bots
  4. 4. Management of Cyber Threats
    1. a. Firewalls
    2. b. Virtual Private Networks
    3. c. Security Control Management
    4. d. Hardware and Software Prevention

CRYPTOGRAPHIC PROTOCOLS

Devamını oku...

  1. 1. Fundamentals of Cryptographic Protocols
  2. 2. Key Exchange Protocols
  3. 3. Commitment Schemes
  4. 4. Authentication Protocols
  5. 5. Zero-Knowledge Proof Protocols
  6. 6. Threshold Cryptography Protocols
    1. a. Secret Sharing Schemes
    2. b. Verifiable Secret Sharing Schemes
    3. c. Threshold Cryptosystems
  7. 7. Secure Multi-Party Computation Protocols
    1. a. Threshold Homomorphic Cryptosystems
    2. b. Oblivious Transfer Protocols
  8. 8. Digital Signature Protocols
    1. a. Undeniable Digital Signatures
    2. b. Proxy Signatures
    3. c. Group Signatures
    4. d. Blind Signature Protocols
  9. 9. Secure Multi-Party Computation

SECURE SOFTWARE

Devamını oku...

  1. 1. Secure Software Development
    1. a. Software Development Life Cycle
    2. b. Secure Software Attributes
    3. c. Threat Models in Software Development
  2. 2. Security Vulnerabilities in Software Development
    1. a. Inadvertent Security Vulnerabilities
    2. b. Malicious Security Vulnerabilities
    3. c. Countermeasures
  3. 3. Database Security
  4. 4. Operating Systems Security
  5. 5. Network Security
  6. 6. Application Security

BLOCKCHAIN

Devamını oku...

  1. 1. Introduction to Blockchain
    1. a. Principles of Blockchain
    2. b. Blockchain and Block Structure
    3. c. Evolution of Blockchain
    4. d. Classification of Blockchain Systems
  2. 2. Cryptographic Foundations in Blockchain Systems
    1. a. Elliptic Curves in Cryptography
    2. b. Hash Functions
    3. c. Digital Signatures
    4. d. Zero-Knowledge Proofs
    5. e. Commitment Schemes
    6. f. Consensus Protocols
  3. 3. The Bitcoin System Underlying Blockchain
    1. a. Introduction to the Bitcoin System
    2. b. Bitcoin Transactions
  4. 4. Limitations and Alternative Approaches in Blockchain
    1. a. Energy Consumption
    2. b. Scalability
    3. c. Privacy
  5. 5. Applications and Future of Blockchain Technology
    1. a. Digital Currency
    2. b. Smart Contracts
    3. c. Ensuring Information Security
    4. d. Record Keeping

SIDE CHANNEL ANALYSIS

Devamını oku...

  1. 1. Introduction to Side-Channel Analysis
    1. a. Sources of Leakage
    2. b. Attacks by Access Level
      1. i. Local Attacks
      2. ii. Proximity Attacks
      3. iii. Remote Attacks
  2. 2. Types of Side-Channel Analysis Attacks
    1. a. Active Attacks
      1. i. Fault Injection Attacks
    2. b. Passive Attacks
      1. i. Timing Attacks
      2. ii. Electromagnetic Attacks
      3. iii. Acoustic Attacks
      4. iv. Power Analysis Attacks
  3. 3. Power Analysis Attacks
    1. a. Simple Power Analysis (SPA) Attacks
    2. b. Differential Power Analysis (DPA) Attacks
      1. i. DPA Attack on AES
    3. c. Correlation Power Analysis (CPA) Attack
  4. 4. Other Side-Channel Attacks
    1. a. Acoustic Attacks
      1. i. Timing Attacks
      2. ii. Electromagnetic Attacks
    2. b. Record Keeping

FUNDAMENTALS OF CRYPTOGRAPHY

Devamını oku...

  1. 1. Introduction to Cryptography and Basic Concepts
  2. 2. Objectives of Cryptography
  3. 3. Classical Encryption Systems
  4. 4. Basic Types of Attacks
    1. a. Brute Force Attack
    2. b. Frequency Analysis
    3. c. Confusion and Diffusion
  5. 5. Basic Cryptanalysis Methods
  6. 6. Mathematical Concepts for Cryptology
    1. a. Number Theory
    2. b. Abstract Algebra
    3. c. Boolean Functions
  7. 7. Symmetric Cryptography
    1. a. Block Ciphers
      1. i. AES, DES
      2. ii. Modes of Operation
    2. b. Stream Ciphers
      1. i. LFSR (Linear Feedback Shift Register)
      2. ii. One-Time Pad
  8. 8. Public-Key Cryptography
    1. a. Hard Mathematical Problems
      1. i. Factoring Problem
      2. ii. Discrete Logarithm Problem
      3. iii. Subset Sum Problem
    2. b. RSA, Diffie-Hellman, ElGamal
    3. c. Elliptic Curve Cryptography
    4. d. Secure Message Transmission
    5. e. Authentication
    6. f. Key Exchange
    7. g. Bit Commitment
    8. h. Secret Sharing
    9. i. Electronic Voting
    10. j. Zero-Knowledge Proofs
  9. 9. Digital Signatures
  10. 10. MAC (Message Authentication Code)
  11. 11. Hash Functions

Devamını oku...

Devamını oku...

 

 

Devamını oku...