Professional Documents
Culture Documents
All these reasons above make it pretty hard for organizations and institutions about the way they
should understand Cyber Security, they should approach cyber threats, what they should learn and how
they should get prepared.
As a retired Lieutenant Colonel from Cyber Defense Command of Turkish Military Forces, Yilmaz
Degirmenci possesses both public service experience, strategic & tactical level procedures and
technical and sectoral experience. This unique path enabled him seeing very distinct aspects of Cyber
Security. Thus in his trainings, he can show both offensive and defensive approaches at the same time.
The “Fundamental Cyber Security Training” is prepared with such a mind set. My purpose is to
provide a deep understanding of attack vs defense techniques within a 10 days training session.
2. Code YD-APWT-1
2. Code YD-SOC-1
✔ 4. Prerequisites No prerequisites
6. Content ➢ CERTs
➢ National Cyber Security Strategy and Action Plan
➢ CERT Processes
➢ SOC Purpose and Actions
➢ SIEM
➢ Defense Tools and Solutions
➢ Modern Defense Mechanisms
➢ Offensive Based Detection
➢ Network Security Monitoring
➢ Honeypots
➢ Continious Security Monitoring
➢ Situational Awareness
➢ Application Monitoring
➢ Configuration Change Monitoring
➢ Log Management and Monitoring
➢ Endpoint Security
➢ Admin Accounts Monitoring and Management
➢ Threat Hunting
➢ Cyber Intelligence
➢ Authentication
➢ Post-Authentication
➢ Reputation Based Detection
➢ Anomaly Detection and Analysis
➢ Packet Analysis
➢ Signature Based Detection
➢ Session Analysis
➢ Sensor Platforms
➢ Risk Management and Plan