Educate youth. Give them the positive ideas of knowledge and science

Training Camps

WINDOWS SYSTEM MANAGEMENT | TRAINING CAMP
Place :
 FEDERATION TRAINING HALL

Active Directory Structure

IIS Structure and Processes

Basic Network Operations

LINUX SYSTEM MANAGEMENT
Place :
 FEDERATION TRAINING HALL

The basics of Operating System and kernel concepts

The Linux Distribution Concept and sample distributions

INTRODUCTION TO SOFTWARE AND DATABASE
Place :
 FEDERATION TRAINING HALL

Database logic and examples

PHYTON AND MYSQL
Place :
 FEDERATION TRAINING HALL
INTRODUCTION TO CYBER SECURITY AND INFORMATION SECURITY | TRAINING CAMP
Place :
  FEDERATION TRAINING HALL

What are Hackers, Hacker Types and Their Motivations?

Deep Web

Penetration and Vulnerability Analysis Test

Penetration Test Types and Methodologies

Penetration Test Project Management

Tools Used in Penetration Tests

Penetration Test Report

The Concept of Cyber Security

What Are Cyber Attacks and Their Sources?

The Concept of Information Security

Information Security Management System

Risk Analysis and Management

Security Solutions

Harmful Softwares

Denial-of-Service Attacks (Dos/Ddos)

APT (Advanced Persistent Threat) Attacks

Web Application Attacks

Social Engineering

Career Engineering

INFORMATION GATHERING ABOUT TARGET SYSTEMS | TRAINING CAMP
Place :
 FEDERATION TRAINING HALL

Gather Basic Information About the Target System

Detecting Sites on an IP Address

Examining the Past Content of the Site

Detecting Subdomains of a Domain Name

Detecting of E-Mail Addresses of the Target Domain

Information Gathering Using Search Engines

Information Gathering Using Shodan Search Engine

Detection of Security Systems in the Target

Information Gathering with DNS Protocol

DNS Zone Transfer Control

Detecting DNS Server Version

Detecting internal network IP Structure with SMTP

Detecting Live (Open) Systems Using Nmap

Perform TCP/UDP Port Scanning Using Nmap

Detection of Versions of Running Services using Nmap

Scanning a Specific Port Range in a Specific IP Range using Nmap

Scanning Port using Fake IP/Spoofed Systems

Detecting Security Vulnerability using NSE in Nmap

Scanning Port for Systems Using SYN Proxy

Identifying Operating System Using Nmap

Detecting SMB File Shares using Nmap NSE

Scanning Port using Nmap GUI/Zenmap

Discovering Web Server Information

Discovering Sub-directories and Files of Web Application

Information Gathering from Error Messages

Information Gathering from Photos

Use of All-in-One Information Gathering Tool Maltego

NETWORK POISONING, WIRELESS NETWORK ATTACKS, DDoS, SOCIAL ENGINEERING ATTACKS
Place :
 FEDERATION TRAINING HALL

ARP/DNS/DHCP Poisoning

Wireless Network Hacking

Wireless Network Security

DoS/DDoS Attacks and Security

Concept of Social Engineering

Social Engineering Attacks

WEB APPLICATION AND DATABASE UNAUTHORIZED ACCESS AND SECURITY
Place :
 FEDERATION TRAINING HALL

Web Technologies

OWASP

SQL Injection

Cross Site Scripting

Cross Site Request Forgery

Local/Remote File Inclusion

Remote Code/Command Injection

File Upload Abuse

Discovery of File and Directory Paths

SAFE SOFTWARE DEVELOPMENT
Place :
 FEDERATION TRAINING HALL

Input Verifications

White & Blacklist

Login Management

HTTP Only

Safe Cookie

Authorization

DIGITAL FORENSICS, ANALYSIS OF CYBER INCIDENTS, MALWARE ANALYSIS
Place :
 FEDERATION TRAINING HALL

Introduction to Digital Forensics

Disk/Image Forensic

Memory Forensic

Cyber Incident Intervention Applications

Simple Malware Analysis

REVERSE ENGINEERING
Place :
 FEDERATION TRAINING HALL

What is Reverse Engineering?

Malware

Encryption Algorithms Used

Low Level Software (Python)

Software Architecture

Modules

Data Management

Variables

User Operations

Stack, Heaps

Application Programming Interface

Win32 API

Win64 API

Native API

Input-Output Transactions

Reversing Tools

Offline Code Analysis

Live Code Analysis

Disassemblers

IDA Pro

ILDasm

Debuggers

Kernel Mode Debugging

System Monitoring Software

Executable Dumping Tools

Reverse Malware

Malware Types

Unpacking an Executable File

Network Activity Monitoring

IRC Channel Join Process

Usage of Debugger

Operations on IDA with Python

SAFE MOBILE APPLICATION DEVELOPMENT
Place :
 FEDERATION TRAINING HALL

iOS App Development

Android App Development

IT LAW
Place :
 FEDERATION TRAINING HALL

Electronic Signature Law Numbered 5070

Turkish Penal Code Numbered 5237

Code Of Criminal Procedure Numbered 5271

Law On Regulation of Publications on The Internet Numbered 5651

Electronic Communication Law Numbered 5809

Law On Intellectual and Artistic Works Numbered 5846

International Legal Arrangement Regarding Cybercrime

Fight of the United Nations Against Cybercrime

Fight of the Organization for Economic Cooperation and Development Against Cybercrime

Fight of G-8 Countries Against Cybercrime

Fight of NATO Against Cybercrime

Cyber Security Agreements