Personal data is processed on our website through cookies and certain cookies are used for the presentation of information society services, other cookies will be used only to provide ads/marketing tailored to you, the improvement of our website and personalization (storing your preferences for your next visit to the website asides from your privacy choices) if you provide open consent. It is possible for you to manage your cookie preferences via a panel, to reach the enlightenment text: Click Here
Contact

InterProbe Training Services

The information age has increased the speed of life while bringing individuals, institutions, and organizations to a point where they carry out their vital activities over networks.

InterProbe offers training to raise the awareness and competitiveness of users at different levels.

The fact that threats to systems can cause a large amount of data to leak or the system to become unusable in a short time has revealed how important it is to raise users' awareness. It is a training job to be able to control such crises and produce effective solutions as soon as possible to adapt to the speed of the attack. Interprobe, with its experience of more than 20 years, offers training packages that serve the development of institutions in terms of cyber security. The 17-lesson training package offered by InterProbe provides comprehensive knowledge and skills in a short time. The trainings, which are given in periods ranging from 1 to 15 days, aim to equip people against threats to the systems.

TRAINING SERVICES

Cryptography training by InterProbe covers symmetric and public-key cryptography, post-quantum algorithms, and attack methods. This training is essential for institutions working in information security and developing products in this field.
At the end of the training, the participants will have acquired competent skills in cryptography algorithms, cryptanalysis methods, and efficient implementation methods. With the insights and knowledge gained through this training, it is ensured that experts in the field will have a competency to internalize the details they need to know. They will use the relevant information effectively.
The protection of the cyber environment, which consists of information and communication systems, in which many data are shared on an institutional basis, is of critical importance. Providing the necessary protection can be possible, first of all, by raising awareness. Cyber Security Awareness Training offered by InterProbe provides participants with comprehensive information about information security and cyber security.
Human is the most important factor in an important part of information security breaches and cyber security incidents. Every attack is done through a web component and often takes advantage of human ignorance. Cyber Security Awareness Training enables people to master the vulnerabilities in the cyber world and gain the ability to intervene before a crisis occurs.

Cyber security, as an area whose importance is felt in all sectors from the defense industry to health, becomes more and more involved in our lives every day. This makes it necessary for everyone to know the basic information about cyber security.
InterProbe adapts to the volatility of the cyber security field and to diversify itself more and more each day, bringing together current and popular cyber security topics with the participants. Participants in the Cyber Security Specialist Training, in addition to basic knowledge, go through a comprehensive program such as network training, information gathering and analysis stages, web application security.

Since DoS and DDoS are not a security vulnerability, there is no definitive solution. However, it is very important for institutions to take precautions against DDoS attack techniques that interrupt the continuity of business processes. InterProbe offers solutions to these attack techniques with its training.
Participants become able to resist this attack technique with the training they have completed by mastering the current methods. DDoS Attacks and Protection Ways Training is not limited to theoretical knowledge. In the training, in which DoS and DDoS attack techniques and ways to protect against these attacks are explained, a permanent and continuous result is obtained by making practical studies.

Domain Name Server (DNS), which forms the basis of the Internet, and the security of this system are vital for anyone using the Internet. Mastering the DNS architecture down to the smallest details prevents many threats. With the DNS Security Training offered by InterProbe, it is aimed that the participants learn the DNS architecture as well as DNS working principles and security in the most accurate way.
Within the scope of the training, the structure of the DNS protocol and the current attack and defense techniques are transferred. Thus, the participants gain knowledge and defense about DNS, one of the most basic elements of the internet.

CIRT is a training prepared within the framework determined by the National Cyber Incident Response Center (USOM). Within the framework of the action plan published with the decision of the Council of Ministers, the decision to establish cyber incident response teams within public institutions and the private sector makes this training a necessity as well as a necessity.
CIRT Training by InterProbe covers the USOM framework and more. At the end of the training, it is aimed that the participants acquire competent skills in vulnerability analysis, record management, effective response to cyber incidents and information security. The trainings provided enable cyber security experts to master the details they need to know and to use the information in the most effective way.
InterProbe attaches importance to practical applications that include real-life scenarios as well as theoretical knowledge so that the information presented within the framework of the trainings can be permanent.

IoT, which refers to objects accessing the Internet and interacting with each other, allows us to make our routine activities more practical, while it can also cause security vulnerabilities to be encountered. 
IoT Security Training, whose content was developed by InterProbe, teaches you to incorporate the advantages of IoT into your life without security problems. The training theoretically teaches the relationship of IoT devices with cybersecurity and ways to stay away from potential threats.

Interprobe designs the Linux Security Training with a content ranging from basic information to detailed information in order to ensure Linux security. Within the scope of the training, the participants are provided with information about access rights, disk operations, network commands, scheduled tasks and log files on Linux, and lay a solid foundation for Linux.
Participants who successfully complete the basic training move on to the second phase of the training, the Linux offensive security proficiency phase. Participants, who learn the steps such as login and network eavesdropping, malware, physical access attacks, are prepared for all possible threats. 
Within the scope of the training, the focus is on providing security tightening in Linux systems, while the participants reach a level where they can perform their own tests by having a deep understanding of the threats.

We are in an era where malware is making a big impact all over the world. Cyber attacks against banks, hotels, fuel companies and many other institutions and organizations and inadequate measures against these attacks occupy the agenda. When institutions do not take precautions for these attacks or do not have the personnel to produce effective solutions in a crisis, the extent of the damage increases. With the Malware Analysis Training, which InterProbe developed based on this need, it trains people with the ability to intervene against malicious software at any time.
The Malware Analysis Tutorial covers topics such as malware analysis tools, reverse engineering methods, and applied malware analysis. With this training, institutions come to a level where they can analyze and prevent threats against them.

Mobile applications are increasingly used in all areas of life in terms of communication and vital activities. Most of the business processes of institutions and organizations are carried out through mobile applications. Mobile Application Security Training enables corporate employees to take precautions and defend against threats that may come from mobile applications.
Within the scope of the training, in which the mobile application architecture is explained, the users who get detailed information about the applications will be equipped to use these applications in a versatile way, as well as to deal with the applications in terms of security. Participants also learn the structure of mobile applications, the most up-to-date attack and defense techniques.

Protecting against threats to network-based systems depends on knowing the threats in depth. Network Penetration Testing Training, which aims to fully understand attacks and produce practical solutions, also aims to increase the foresight of attacks. 
InterProbe primarily provides basic networking knowledge to the participants within the scope of the training. Within the scope of basic information; local area networks, OSI and TCP/IP model and how networks are defined, wired and wireless networks, internet protocols, network services and wide area networks are discussed. In the second phase, the basics of a network attack and how the attacks happen are explained.
Within the scope of the training, it is aimed that the participants gain competence in reducing all threats that may occur by understanding the details of the attacks and have high-level skills in this regard.
Security Operations Center (SOC) personnel must have the information to take action in the event of a potential breach. With the SOC Analyst Training developed by InterProbe, effective protection methods are shared with the participants before the violations, as well as intervening in violations. As a result of the training, it is aimed that the participants gain competence in analyzing and interpreting event logs. With the training focused on the measures and activities to be taken before and after the events in order to determine the actions to be implemented, the participants gain the ability to write rule correlations on the relevant products.
Participants who take the SOC Analyst Training complete their training as experts who can detect possible violations by acquiring the ability to think differently.

The most basic solution to social engineering attacks, where the human factor is at the center, is to invest to raise awareness of people. Because no matter how much institutions invest in their infrastructure, the inadequacy of the people who manage these infrastructures opens the door to attacks. InterProbe offers a real solution against such attacks by providing the most important element of protection against social engineering, namely people through extensive training.
InterProbe, with its years of experience, shares the most up-to-date techniques and practices in the field of cyber security with the participants within the scope of this training.

In the Secure Software Development Training, which is based on software architecture and working principles, it is aimed that the participants gain real competence in software security. The training, which aims to provide participants with a deep knowledge of the most up-to-date attack techniques, offers versatile information on how to develop web applications against these attack techniques.

VoIP  is a protocol used to carry voice signals over the internet in telephone calls. Understanding VoIP systems and knowing the functioning of the VoIP protocol is the first step to ensure VoIP security. VoIP networks, which are the biggest virtual means of daily communication, are one of the most vulnerable areas due to the vulnerabilities they contain.
InterProbe provides the participants to learn the VoIP infrastructure security situation in the most accurate way with the "Basic VoIP Security Training", which it gives with its competent engineer staff in their fields. 
VoIP Penetration Testing Training paves the way for the attacker to determine the damage and risks that may be caused to the system in a possible attack and for the participant to perform his own security test.
With the Basic VoIP Security Training, which emerged as a result of the detailed studies of our expert staff, it is aimed that the participants have advanced knowledge on the following subjects:
Establishing a VLAN connection from the data network to the voice network,
Expanding the numbering,
Capture SIP authentication,
Listening calls,
CallerID spoofing,
RTP injection,
Signal management,
Identifying unsafe services,
Testing default credentials,
Application level vulnerabilities,
Voicemail attacks,
Phone firmware analysis

The White Hat Hacker Training provides participants with all the skills necessary for a true defense. The most important element of protecting a system from attack is to master the vulnerabilities of the system. InterProbe teaches to “speak the attacker's language” in this course, while making participants think like a malicious hacker. In this way, participants have the ability to predict the paths that the attackers will follow.
White Hat Hackers use the tools used by cyber attackers for a legitimate and legitimate purpose and way. The relevant legal perspective is also conveyed to the participants in detail. In the training, a total of 20 modules, the most up-to-date version of CEHv11, are shown in detail, while the participants are also prepared for the CEH exam thanks to this training. Those who complete the training become real White Hackers with the competency to protect systems.

Windows, one of the most used operating systems in the world, is popular with its usage rate, as well as with security vulnerabilities. This situation makes it mandatory for institutions to take precautions against security vulnerabilities in Windows systems. InterProbe provides a secure Windows hardening with Windows Consolidation Tutorial. 
In the training, configurations in Windows hardening such as network security, user security, registry security are conveyed extensively. Participants complete the training with high-end hardware to protect systems, with full knowledge of the security vulnerabilities for Windows.

The field of new technologies created for the most effective use of devices continues to expand without slowing down. Although innovations such as getting rid of the cables of the devices and increasing the functions of the devices through the communication of objects with each other are quite advantageous in terms of ease of use, they bring along various security problems. In the absence of the necessary competence, 'hackers' trying to gain access to wireless networks without permission can also cause serious harm. The use of IoT (Internet of Things) and mobilized wireless networks opens the door to 'hackers' for attacks. The Wireless Network Security Test Training we offer also aims to provide the participants with skills in this field. Within the scope of the training, the participants are shown the most up-to-date attack techniques, both theoretically and practically, the most effective ways of protection against attacks.