Active Directory Structure
IIS Structure and Processes
Basic Network Operations
Active Directory Structure
IIS Structure and Processes
Basic Network Operations
The basics of Operating System and kernel concepts
The Linux Distribution Concept and sample distributions
Database logic and examples
What are Hackers, Hacker Types and Their Motivations?
Deep Web
Penetration and Vulnerability Analysis Test
Penetration Test Types and Methodologies
Penetration Test Project Management
Tools Used in Penetration Tests
Penetration Test Report
The Concept of Cyber Security
What Are Cyber Attacks and Their Sources?
The Concept of Information Security
Information Security Management System
Risk Analysis and Management
Security Solutions
Harmful Softwares
Denial-of-Service Attacks (Dos/Ddos)
APT (Advanced Persistent Threat) Attacks
Web Application Attacks
Social Engineering
Career Engineering
Gather Basic Information About the Target System
Detecting Sites on an IP Address
Examining the Past Content of the Site
Detecting Subdomains of a Domain Name
Detecting of E-Mail Addresses of the Target Domain
Information Gathering Using Search Engines
Information Gathering Using Shodan Search Engine
Detection of Security Systems in the Target
Information Gathering with DNS Protocol
DNS Zone Transfer Control
Detecting DNS Server Version
Detecting internal network IP Structure with SMTP
Detecting Live (Open) Systems Using Nmap
Perform TCP/UDP Port Scanning Using Nmap
Detection of Versions of Running Services using Nmap
Scanning a Specific Port Range in a Specific IP Range using Nmap
Scanning Port using Fake IP/Spoofed Systems
Detecting Security Vulnerability using NSE in Nmap
Scanning Port for Systems Using SYN Proxy
Identifying Operating System Using Nmap
Detecting SMB File Shares using Nmap NSE
Scanning Port using Nmap GUI/Zenmap
Discovering Web Server Information
Discovering Sub-directories and Files of Web Application
Information Gathering from Error Messages
Information Gathering from Photos
Use of All-in-One Information Gathering Tool Maltego
ARP/DNS/DHCP Poisoning
Wireless Network Hacking
Wireless Network Security
DoS/DDoS Attacks and Security
Concept of Social Engineering
Social Engineering Attacks
Web Technologies
OWASP
SQL Injection
Cross Site Scripting
Cross Site Request Forgery
Local/Remote File Inclusion
Remote Code/Command Injection
File Upload Abuse
Discovery of File and Directory Paths
Input Verifications
White & Blacklist
Login Management
HTTP Only
Safe Cookie
Authorization
Introduction to Digital Forensics
Disk/Image Forensic
Memory Forensic
Cyber Incident Intervention Applications
Simple Malware Analysis
What is Reverse Engineering?
Malware
Encryption Algorithms Used
Low Level Software (Python)
Software Architecture
Modules
Data Management
Variables
User Operations
Stack, Heaps
Application Programming Interface
Win32 API
Win64 API
Native API
Input-Output Transactions
Reversing Tools
Offline Code Analysis
Live Code Analysis
Disassemblers
IDA Pro
ILDasm
Debuggers
Kernel Mode Debugging
System Monitoring Software
Executable Dumping Tools
Reverse Malware
Malware Types
Unpacking an Executable File
Network Activity Monitoring
IRC Channel Join Process
Usage of Debugger
Operations on IDA with Python
iOS App Development
Android App Development
Electronic Signature Law Numbered 5070
Turkish Penal Code Numbered 5237
Code Of Criminal Procedure Numbered 5271
Law On Regulation of Publications on The Internet Numbered 5651
Electronic Communication Law Numbered 5809
Law On Intellectual and Artistic Works Numbered 5846
International Legal Arrangement Regarding Cybercrime
Fight of the United Nations Against Cybercrime
Fight of the Organization for Economic Cooperation and Development Against Cybercrime
Fight of G-8 Countries Against Cybercrime
Fight of NATO Against Cybercrime
Cyber Security Agreements