top of page

Please contact us to get an official price quote. Successful completing of the training material will result in a certificate.

Cyber Security for Engineers

- Introduction to Computer and Network Security

- Security Principles

- Cryptographic Tools and Proper use of Cryptography

- PKI and Certificates

- Password Security

- Usable Security

- Operating System Security

- Malware and Computer Viruses

- Network Security (LAN, TCP/IP, DNS, BGP, NAT)

- Denial of Service (DoS, DDoS)

- Firewalls, Intrusion Detection Systems, SSH, VPN

- Web Security, HTTP/HTTPS

- Wireless Network Security (WEP, WPA)

- Phishing, Clickjacking, Browser Extensions, Cookies

- Cross Site Scripting (XSS) and Cross Site Request Forgery (XSRF)

- SQL Injection

- Email Security

- Web Privacy and TOR

- Physical Security

- Authentication Security, Passwords, Biometrics, Kerberos

- Side Channel Security (introduction)

- Cyber Forensics (introduction)

- Penetration Testing (introduction)

- RFID, Credit Card, Passport, GSM, SIM Card Security

- Disk Encryption (TrueCrypt, BitLocker, FileVault)

- Mobile Device Security (introduction)

- Applied Labs

Educator: Assoc. Prof. Alptekin Küpçü

Cyber Security for Everyone

- Fundamentals of Computer and Network Security

- Security Principles

- Proper use of Cryptography

- Web, HTTPS, PKI and Certificates

- Password Security

- Usable Security

- Malware and Computer Viruses

- Firewalls, Intrusion Detection Systems, VPN, Wireless Network Security

- Web Security, HTTP/HTTPS, Phishing, Cookies, Email, Spam

- Web Privacy

- Identity Theft

- Mobile Device Security (introduction)

- Authentication, RFID, Credit Card, Passport, GSM Security

- Security and Privacy & Machine Learning

- Applied Projects

Educator: Assoc. Prof. Alptekin Küpçü

Robotics, Security, and Privacy in the Age of Artificial Intelligence

- Fundamentals of Computer and Network Security

- Security Principles

- Proper use of Cryptography

- Web, HTTPS, PKI and Certificates

- Password Security

- Usable Security

- Malware and Computer Viruses

- Firewalls, Intrusion Detection Systems, VPN, Wireless Network Security

- Web Security, Phishing, Cookies, Email, Spam

- Web Privacy

- Identity Theft

- Mobile Device Security (introduction)

- Authentication, RFID, Credit Card, Passport, GSM Security

- Security and Privacy & Machine Learning

- Applied Projects

- Robotics (introduction)

- Artificial Intelligence (introduction)

- Machine Learning (introduction)

- Healthcare, Logistics, and other Applications

- AI, ML, and Robotics Market

- Automation

- Ethics

- Crucial Employer and Employee Skills for the world of Robotics and AI

- Case Studies

Educators: Asst. Prof. Barış Akgün & Assoc. Prof. Alptekin Küpçü

Blockchains and Security

- Fundamentals of Blockchains

- Incorrect Myths about Blockchains

- Application Areas- Cryptographic Tools and Proper use of Cryptography

- Incorrect Myths about Cryptography

- Blockchain History

- Mining

- Decentralization, Centralization, Pools

- Privacy and Anonymity

- Peer-to-Peer and Distributed Systems (introduction)

- Attacks and Defenses on Blockchain Systems

- Consensus Algorithms

- Blockchain and Node Types

- Crypto-Currencies, Wallet, Token

- Decentralized Finance (DeFi), NFT, DApp

- Smart Contracts, Gas, Outsourcing Computation

- Solidity and Ethereum

- Applied DApp Lab

Educators: Assoc. Prof. Kamer Kaya & Assoc. Prof. Alptekin Küpçü

bottom of page