{"id":108547,"date":"2023-01-10T21:06:09","date_gmt":"2023-01-10T18:06:09","guid":{"rendered":"https:\/\/academyclub.co\/urun\/cyber-security-training\/"},"modified":"2026-01-16T17:02:03","modified_gmt":"2026-01-16T14:02:03","slug":"cyber-security-training","status":"publish","type":"product","link":"https:\/\/academyclub.co\/en\/urun\/cyber-security-training\/","title":{"rendered":"Cyber Security Training"},"content":{"rendered":"[vc_row type=&#8221;full_width_content&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;center&#8221; overlay_strength=&#8221;0.3&#8243; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221; shape_type=&#8221;&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_position=&#8221;all&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_link_target=&#8221;_self&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; overlay_strength=&#8221;0.3&#8243; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221; bg_image_animation=&#8221;none&#8221;][image_with_animation image_url=&#8221;109474&#8243; alignment=&#8221;center&#8221; animation=&#8221;Fade In&#8221; hover_animation=&#8221;none&#8221; border_radius=&#8221;none&#8221; box_shadow=&#8221;none&#8221; image_loading=&#8221;default&#8221; max_width=&#8221;100%&#8221; max_width_mobile=&#8221;default&#8221;][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;center&#8221; top_padding=&#8221;3%&#8221; overlay_strength=&#8221;0.3&#8243; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221; shape_type=&#8221;&#8221;][vc_column column_padding=&#8221;padding-2-percent&#8221; column_padding_position=&#8221;left-right&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_link_target=&#8221;_self&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; overlay_strength=&#8221;0.3&#8243; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221; bg_image_animation=&#8221;none&#8221;][vc_custom_heading text=&#8221;Cyber Security Training&#8221; font_container=&#8221;tag:h2|font_size:32px|text_align:center|color:%23000000|line_height:32px&#8221; use_theme_fonts=&#8221;yes&#8221;][divider line_type=&#8221;No Line&#8221; custom_height=&#8221;32&#8243;][nectar_btn size=&#8221;large&#8221; button_style=&#8221;regular&#8221; button_color_2=&#8221;Accent-Color&#8221; icon_family=&#8221;none&#8221; url=&#8221;https:\/\/academyclub.co\/en\/contact\/&#8221; text=&#8221;Get Information&#8221; margin_right=&#8221;10px&#8221; margin_left=&#8221;10px&#8221;][\/vc_column][\/vc_row][vc_row type=&#8221;full_width_background&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; top_padding=&#8221;2%&#8221; bottom_padding=&#8221;4%&#8221; id=&#8221;footage&#8221; row_name=&#8221;Action Footage&#8221; overlay_strength=&#8221;0.3&#8243; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221; shape_type=&#8221;&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_position=&#8221;all&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_link_target=&#8221;_self&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; overlay_strength=&#8221;0.3&#8243; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221; bg_image_animation=&#8221;none&#8221;][vc_column_text]\n<p style=\"text-align: center;\">Cybersecurity encompasses many different concepts, from information security to operational security to the security of computer systems. Cybersecurity is the practice of protecting computers, servers, mobile devices, electronic systems, networks and data from malicious attacks.<br \/>\nThis course introduces the basic concepts and aspects of the cybersecurity discipline and presents the hackers and the cyber attacks they cause from a current and future perspective. In addition to these fundamentals, this course also explains more clearly and comprehensively the defense in depth approach and the Cyber Kill Chain\u2122 pattern, as well as how attackers conduct cyber attacks and build defenses against them.<br \/>\nCyber Security Training is a basic security course, but it still requires participants to have certain knowledge before attending the course, such as TCP\/IP, networking, and sufficient Linux knowledge.<\/p>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; top_padding=&#8221;3%&#8221; overlay_strength=&#8221;0.3&#8243; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221; shape_type=&#8221;&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_position=&#8221;all&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_link_target=&#8221;_self&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; overlay_strength=&#8221;0.3&#8243; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221; bg_image_animation=&#8221;none&#8221;][toggles style=&#8221;minimal&#8221;][toggle color=&#8221;Extra-Color-2&#8243; title=&#8221;About Training&#8221;][vc_column_text]Training Objectives:<\/p>\n<ul>\n<li>To introduce the phenomenon of cyberspace and the discipline of cyber security<br \/>\nwhich evolved from information security,<\/li>\n<li>To reveal the types and basic motives of the counterparty in cyber security &#8211; the &#8220;hackers&#8221; referred to as &#8220;hackers&#8221;\/&#8221;hacktivists&#8221;,<\/li>\n<li>Demonstrate the key points of being an effective cybersecurity expert,<\/li>\n<li>Classify and explain cyber threats\/attacks,<\/li>\n<li>Demonstrate known, current and future threats and attacks,<\/li>\n<li>To introduce the &#8220;defense in depth<br \/>\n&#8221; approach, which is one of the most fundamental approaches of cyber security, and to convey cyber attackers and the path they follow in a progressive way through the Cyber Kill Chain\u2122.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>Training Content:<\/p>\n<ul>\n<li style=\"text-align: left;\"><strong>Introduction to Cyber Security<\/strong><\/li>\n<\/ul>\n<p>What is a Hacker? Who is it called?<\/p>\n<p>Hacker Types &amp; Concepts<\/p>\n<p>Underground Hacking World<\/p>\n<p>General Penetration Testing Concepts<\/p>\n<p>Penetration Test Types<\/p>\n<p>White-box, Black-box, Gray-box<\/p>\n<p>Penetration Testing Steps and Methodologies<\/p>\n<p>Commercial and Free Software Used in Penetration Testing<\/p>\n<p>What Should a Penetration Test Report Look Like?<\/p>\n<ul>\n<li data-editor=\"true\"><strong>Password\/Passphrase Cracking Attacks <\/strong><\/li>\n<\/ul>\n<p>Password and Passcode concept<\/p>\n<p>Preparation of Wordlist Suitable for the Institution<\/p>\n<p>Hacking Windows LM\/NTLM Passwords<\/p>\n<p>Finding HASH Results from Search Engines<\/p>\n<p>Hacking Linux User Passwords<\/p>\n<p>Password Cracking Using the Cain &amp; Abel Tool<\/p>\n<p>Password Cracking Using John the Ripper Tool<\/p>\n<p>Password Attack on SMB Service<\/p>\n<p>Password Attack on RDP Service<\/p>\n<p>Password Attack on SSH Service<\/p>\n<p>Password Attack against MySQL Service<\/p>\n<p>Password Attack against MSSQL Service<\/p>\n<p>Password Attack on FTP Service<\/p>\n<p>Password Attack on HTTP Service<\/p>\n<p>Password Attack on Telnet Service<\/p>\n<ul>\n<li data-editor=\"true\"><strong>Gathering Information about Target Systems <\/strong><\/li>\n<\/ul>\n<p>What is Active \/ Passive Information Collection?<\/p>\n<p>Information Collection Techniques<\/p>\n<p>Whois, Subdomain Discovery etc.<\/p>\n<p>Shodan Usage<\/p>\n<p>Pipl Usage<\/p>\n<p>Use of Leaked Source<\/p>\n<p>Discovery of Other Sites Hosted on the Server<\/p>\n<p>Using Pastebin<\/p>\n<p>Using Cyberthint<\/p>\n<p>Use of Internet Archive (Archive.org, etc.)<\/p>\n<p>Web Application Firewall (WAF) Detection<\/p>\n<p>Determination of Mail Addresses of the Employees of the Institution<\/p>\n<p>Gathering Information from Underground Hacking Forums<\/p>\n<p>Local IP Block Detection via Mail<\/p>\n<p>Using Nmap<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Open, Closed, Filterd, Unfiltered, Open | Filtered, etc. Concepts<\/li>\n<li>FIN Screening<\/li>\n<li>TCP Port Scan<\/li>\n<li>UDP Port Scan<\/li>\n<li>Version Detection<\/li>\n<li>OS Detection<\/li>\n<li>Port Scanning with Fake IP Addresses<\/li>\n<li>Port Range Determination<\/li>\n<li>Using Scripts<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li><strong>Local Network Poisoning Attacks <\/strong><\/li>\n<\/ul>\n<p>Interception and Session Intervention in TCP\/IP Networks<\/p>\n<p>Various Session Intervention Methods<\/p>\n<p>ARP Spoofing<\/p>\n<p>IP Spoofing<\/p>\n<p>DNS Spoofing<\/p>\n<p>MAC Flooding<\/p>\n<p>Cain &amp; Abel<\/p>\n<p>HTTP Session Interception<\/p>\n<ul>\n<li data-editor=\"true\"><strong>Vulnerability Scanning <\/strong><\/li>\n<\/ul>\n<p>Vulnerability Definition and Types<\/p>\n<p>What is Vulnerability Scanning?<\/p>\n<p>Vulnerability Scanning Tools<\/p>\n<p>Network and Web Vulnerability Scanning Tools<\/p>\n<p>Paid Vulnerability Scanning Tools<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Netsparker<\/li>\n<li>Acunetix<\/li>\n<li>Nexpose<\/li>\n<li>Nessus<\/li>\n<li>CoreImpact<\/li>\n<li>Etc. o Free Vulnerability Scanning Tools<\/li>\n<li>OpenVas<\/li>\n<li>Nikto<\/li>\n<li>Uniscan<\/li>\n<li>Etc.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>Risk Assessment<\/p>\n<p>Validation of Vulnerabilities<\/p>\n<p>CVE, EDB, etc. Explanations &amp; Usage of Abbreviations<\/p>\n<ul>\n<li data-editor=\"true\"><strong>DoS\/DDoS Attacks <\/strong><\/li>\n<\/ul>\n<p>What is Denial Of Service?<\/p>\n<p>Objectives o DDoS\/DoS Attack Types<\/p>\n<p>DNS Amflication, GET\/POST Flood, SYN Flood, UDPFlood<\/p>\n<p>DDOS Attacks<\/p>\n<p>DDOS Types and Tools<\/p>\n<p>Ircbot, zombie, BotNet Concepts<\/p>\n<ul>\n<li data-editor=\"true\"><strong>Exploitation Attempts and Processes to Infiltrate Target Systems<\/strong><\/li>\n<\/ul>\n<p>What is an Exploit?<\/p>\n<p>Exploit Types<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Zeroday Exploits<\/li>\n<li>Local Exploits<\/li>\n<li>Remote Exploits<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>Manual Exploit Usage<\/p>\n<p>What is Metasploit?<\/p>\n<ul>\n<li><strong>Metasploit Modules<\/strong><\/li>\n<li data-editor=\"true\"><strong>Web Application Security &amp; Attacks <\/strong><\/li>\n<\/ul>\n<p>Web Applications and HTTP<\/p>\n<p>Http Protocol Details<\/p>\n<p>Hacking, Defacement, Rooting, Shell etc.<\/p>\n<p>What Does Web Application\/Site Security Depend on?<\/p>\n<p>Information Collection for Hacking in Web Applications<\/p>\n<p>Web Server, Application Version Discovery<\/p>\n<p>Gathering Information from Error Messages<\/p>\n<p>Collecting Information Using Google<\/p>\n<p>Subdirectory and File Discovery<\/p>\n<p>Admin Panel Discovery<\/p>\n<p>XSS, CSRF Vulnerabilities<\/p>\n<p>SQL Injection Vulnerabilities<\/p>\n<p>Google&#8217;s Automatic SQLi Vulnerability Search<\/p>\n<p>File Inclusion Vulnerabilities<\/p>\n<p>Shell Types and Purposes of Use<\/p>\n<p>Shell Concept and Usage<\/p>\n<p>PHP, ASP and JSP Shell Types<\/p>\n<p>Commonly Used Shell Software<\/p>\n<p>Web Application Security Test Software<\/p>\n<ul>\n<li data-editor=\"true\"><strong>Auxilary, Encoder, Scanner, Nops, Payload, etc.<\/strong><\/li>\n<\/ul>\n<p><strong>What is a Payload?<\/strong><\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Payload Types<\/li>\n<li>Reverse_Shell &amp; Bind_Shell Differences<\/li>\n<li>Encryption of Payloads<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>Exploitation Using Metasploit<\/p>\n<ul>\n<li data-editor=\"true\"><strong>Introduction to Malware<\/strong><\/li>\n<\/ul>\n<p>Basic concepts<\/p>\n<p>Malware, Virus, Worm, Trojan, Spyware, Ransomware<\/p>\n<p>Creating Different Types of Malware<\/p>\n<p>Shellter, Msfvenom Usage<\/p>\n<p>Creating Malware Suitable for Android Phones<\/p>\n<p>File Merger (Binder)<\/p>\n<ul>\n<li data-editor=\"true\"><strong>Post Exploitation Attacks on Target Systems<\/strong><\/li>\n<\/ul>\n<p>Escalation Attacks<\/p>\n<p>Interfering with Another Application<\/p>\n<p>Password Review with Memory Dump<\/p>\n<p>Starting a Remote Desktop Connection<\/p>\n<p>Transition to Target&#8217;s Live Session<\/p>\n<p>Trace Cleaning<\/p>\n<p>Traffic Sniffing (Packet Sniffing)<\/p>\n<p>Screenshot Capture<\/p>\n<p>Keylogger Usage<\/p>\n<p>Microphone Recording<\/p>\n<p>File Upload \/ Download Activities<\/p>\n<ul>\n<li data-editor=\"true\"><strong>Social Engineering Attacks <\/strong><\/li>\n<\/ul>\n<p>What is Social Engineering?<\/p>\n<p>How Social Engineering Attacks Are Conducted<\/p>\n<p>Social Engineering Attack Examples<\/p>\n<p>Scenario Building in Social Engineering Attacks<\/p>\n<p>GoPhish Usage<\/p>\n<ul>\n<li data-editor=\"true\"><strong>Local Network Attacks <\/strong><\/li>\n<\/ul>\n<p>CAM table attack<\/p>\n<p>CDP Protocol attack<\/p>\n<p>DHCP protocol attack<\/p>\n<p>ARP protocol attack<\/p>\n<p>Spoofing attack<\/p>\n<p>VTP protocol attack<\/p>\n<p>VLAN attack<\/p>\n<p>HSRP attack<\/p>\n<p>SNMP attack<\/p>\n<ul>\n<li data-editor=\"true\"><strong>Wireless Network Attacks <\/strong><\/li>\n<\/ul>\n<p>Introduction to Wireless Networks<\/p>\n<p>Definitions<\/p>\n<p>Wireless Network Types<\/p>\n<p>Hazards in Wireless Networks<\/p>\n<p>Fake Access Points and Their Damages<\/p>\n<p>WLAN discovery methods<\/p>\n<p>Exploration Techniques<\/p>\n<p>Hidden SSID Detection<\/p>\n<p>WEP\/WPA\/WPA2 Attacks<\/p>\n<p>Hazards in Public Wireless Networks<\/p>\n<p>Using Intrusion Detection System in Wireless Networks[\/vc_column_text][\/toggle][toggle color=&#8221;Extra-Color-2&#8243; title=&#8221;Who Should Receive the Training?&#8221;][vc_column_text]\n<ul>\n<li>Anyone who wants to recognize the discipline of cyber security and grasp its basic aspects\/facts<\/li>\n<li>Students or employees who want to enter the field of cybersecurity or obtain a cybersecurity certificate<br \/>\n,<\/li>\n<li>Individuals or managers working in any technical\/administrative field related to Information Security \/ Cyber Security,<\/li>\n<li>Experts who are working<br \/>\nin a specific area of information security or cybersecurity, but feel deficient in general topics and concepts,<\/li>\n<li>Those who want to have knowledge about cyber security,<\/li>\n<li>Experts\/employees who plan a career in penetration testing and want to enter this sector,<\/li>\n<li>Those who want to have knowledge about information security,<\/li>\n<li>Those who want to protect themselves from attacks by hackers,<\/li>\n<li>Those who want to learn the latest hacking methods and software,<\/li>\n<li>Network administrators and security professionals.<\/li>\n<\/ul>\n[\/vc_column_text][\/toggle][\/toggles][vc_column_text]\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; id=&#8221;bilgi&#8221; overlay_strength=&#8221;0.3&#8243; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221; shape_type=&#8221;&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_position=&#8221;all&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_link_target=&#8221;_self&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; overlay_strength=&#8221;0.3&#8243; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221; bg_image_animation=&#8221;none&#8221;][divider line_type=&#8221;No Line&#8221; custom_height=&#8221;20&#8243;][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; bg_color=&#8221;#26bd7e&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;light&#8221; text_align=&#8221;left&#8221; id=&#8221;bilgi&#8221; overlay_strength=&#8221;0.3&#8243; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221; shape_type=&#8221;&#8221;][vc_column column_padding=&#8221;padding-1-percent&#8221; column_padding_position=&#8221;all&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_link_target=&#8221;_self&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; overlay_strength=&#8221;0.3&#8243; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221; bg_image_animation=&#8221;none&#8221;][vc_custom_heading text=&#8221;Plan this training for your business!&#8221; font_container=&#8221;tag:h3|font_size:26px|text_align:left|line_height:26px&#8221; use_theme_fonts=&#8221;yes&#8221;][vc_column_text]This training can be planned in different durations and content specific to your organization. Please contact us for detailed rich content and planning to realize your training objectives.[\/vc_column_text][nectar_btn size=&#8221;large&#8221; button_style=&#8221;regular&#8221; button_color_2=&#8221;Extra-Color-1&#8243; color_override=&#8221;#ffffff&#8221; solid_text_color_override=&#8221;#2ed397&#8243; icon_family=&#8221;none&#8221; url=&#8221;https:\/\/academyclub.co\/en\/contact\/&#8221; text=&#8221;Get in touch&#8221;][\/vc_column][\/vc_row]\n","protected":false},"excerpt":{"rendered":"<p>[vc_row type=&#8221;full_width_content&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;center&#8221; overlay_strength=&#8221;0.3&#8243; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221; shape_type=&#8221;&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_position=&#8221;all&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_link_target=&#8221;_self&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; overlay_strength=&#8221;0.3&#8243; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;&#8230;<\/p>\n","protected":false},"featured_media":109143,"template":"","meta":[],"product_brand":[],"product_cat":[580,294,253,245],"product_tag":[],"class_list":{"0":"post-108547","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-academy-club","7":"product_cat-software","8":"product_cat-business-world","9":"product_cat-general","11":"first","12":"outofstock","13":"shipping-taxable","14":"product-type-simple"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cyber Security Training - Academy Club<\/title>\n<meta name=\"description\" content=\"Cyber Security Training is a basic security course, but participants should have certain knowledge such as TCP\/IP, networking and Linux knowledge before attending the training.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/academyclub.co\/en\/urun\/cyber-security-training\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Security Training - Academy Club\" \/>\n<meta property=\"og:description\" content=\"Cyber Security Training is a basic security course, but participants should have certain knowledge such as TCP\/IP, networking and Linux knowledge before attending the training.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/academyclub.co\/en\/urun\/cyber-security-training\/\" \/>\n<meta property=\"og:site_name\" content=\"Academy Club\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/academyclubtr\/\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-16T14:02:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/academyclub.co\/wp-content\/uploads\/2023\/01\/Siber-Guvenlik-1.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"500\" \/>\n\t<meta property=\"og:image:height\" content=\"700\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/academyclub.co\/en\/urun\/cyber-security-training\/\",\"url\":\"https:\/\/academyclub.co\/en\/urun\/cyber-security-training\/\",\"name\":\"Cyber Security Training - Academy Club\",\"isPartOf\":{\"@id\":\"https:\/\/academyclub.co\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/academyclub.co\/en\/urun\/cyber-security-training\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/academyclub.co\/en\/urun\/cyber-security-training\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/academyclub.co\/wp-content\/uploads\/2023\/01\/Siber-Guvenlik-1.webp\",\"datePublished\":\"2023-01-10T18:06:09+00:00\",\"dateModified\":\"2026-01-16T14:02:03+00:00\",\"description\":\"Cyber Security Training is a basic security course, but participants should have certain knowledge such as TCP\/IP, networking and Linux knowledge before attending the training.\",\"breadcrumb\":{\"@id\":\"https:\/\/academyclub.co\/en\/urun\/cyber-security-training\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/academyclub.co\/en\/urun\/cyber-security-training\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/academyclub.co\/en\/urun\/cyber-security-training\/#primaryimage\",\"url\":\"https:\/\/academyclub.co\/wp-content\/uploads\/2023\/01\/Siber-Guvenlik-1.webp\",\"contentUrl\":\"https:\/\/academyclub.co\/wp-content\/uploads\/2023\/01\/Siber-Guvenlik-1.webp\",\"width\":500,\"height\":700,\"caption\":\"Cyber Security Training\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/academyclub.co\/en\/urun\/cyber-security-training\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home page\",\"item\":\"https:\/\/academyclub.co\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Products\",\"item\":\"https:\/\/academyclub.co\/en\/shop\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Security Training\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/academyclub.co\/en\/#website\",\"url\":\"https:\/\/academyclub.co\/en\/\",\"name\":\"Academy Club\",\"description\":\"Your Innovative Education Solution Partner\",\"publisher\":{\"@id\":\"https:\/\/academyclub.co\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/academyclub.co\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/academyclub.co\/en\/#organization\",\"name\":\"Academy Club\",\"url\":\"https:\/\/academyclub.co\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/academyclub.co\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/academyclub.co\/wp-content\/uploads\/2022\/07\/academy-siyahAsset-16-1.png\",\"contentUrl\":\"https:\/\/academyclub.co\/wp-content\/uploads\/2022\/07\/academy-siyahAsset-16-1.png\",\"width\":570,\"height\":92,\"caption\":\"Academy Club\"},\"image\":{\"@id\":\"https:\/\/academyclub.co\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/academyclubtr\/\",\"https:\/\/www.instagram.com\/academyclubtr\/?hl=tr\",\"https:\/\/www.linkedin.com\/company\/academy-clubtr\/\",\"https:\/\/discord.io\/academyclub\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber Security Training - Academy Club","description":"Cyber Security Training is a basic security course, but participants should have certain knowledge such as TCP\/IP, networking and Linux knowledge before attending the training.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/academyclub.co\/en\/urun\/cyber-security-training\/","og_locale":"en_US","og_type":"article","og_title":"Cyber Security Training - Academy Club","og_description":"Cyber Security Training is a basic security course, but participants should have certain knowledge such as TCP\/IP, networking and Linux knowledge before attending the training.","og_url":"https:\/\/academyclub.co\/en\/urun\/cyber-security-training\/","og_site_name":"Academy Club","article_publisher":"https:\/\/www.facebook.com\/academyclubtr\/","article_modified_time":"2026-01-16T14:02:03+00:00","og_image":[{"width":500,"height":700,"url":"https:\/\/academyclub.co\/wp-content\/uploads\/2023\/01\/Siber-Guvenlik-1.webp","type":"image\/webp"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/academyclub.co\/en\/urun\/cyber-security-training\/","url":"https:\/\/academyclub.co\/en\/urun\/cyber-security-training\/","name":"Cyber Security Training - Academy Club","isPartOf":{"@id":"https:\/\/academyclub.co\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/academyclub.co\/en\/urun\/cyber-security-training\/#primaryimage"},"image":{"@id":"https:\/\/academyclub.co\/en\/urun\/cyber-security-training\/#primaryimage"},"thumbnailUrl":"https:\/\/academyclub.co\/wp-content\/uploads\/2023\/01\/Siber-Guvenlik-1.webp","datePublished":"2023-01-10T18:06:09+00:00","dateModified":"2026-01-16T14:02:03+00:00","description":"Cyber Security Training is a basic security course, but participants should have certain knowledge such as TCP\/IP, networking and Linux knowledge before attending the training.","breadcrumb":{"@id":"https:\/\/academyclub.co\/en\/urun\/cyber-security-training\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/academyclub.co\/en\/urun\/cyber-security-training\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/academyclub.co\/en\/urun\/cyber-security-training\/#primaryimage","url":"https:\/\/academyclub.co\/wp-content\/uploads\/2023\/01\/Siber-Guvenlik-1.webp","contentUrl":"https:\/\/academyclub.co\/wp-content\/uploads\/2023\/01\/Siber-Guvenlik-1.webp","width":500,"height":700,"caption":"Cyber Security Training"},{"@type":"BreadcrumbList","@id":"https:\/\/academyclub.co\/en\/urun\/cyber-security-training\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home page","item":"https:\/\/academyclub.co\/en\/"},{"@type":"ListItem","position":2,"name":"Products","item":"https:\/\/academyclub.co\/en\/shop\/"},{"@type":"ListItem","position":3,"name":"Cyber Security Training"}]},{"@type":"WebSite","@id":"https:\/\/academyclub.co\/en\/#website","url":"https:\/\/academyclub.co\/en\/","name":"Academy Club","description":"Your Innovative Education Solution Partner","publisher":{"@id":"https:\/\/academyclub.co\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/academyclub.co\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/academyclub.co\/en\/#organization","name":"Academy Club","url":"https:\/\/academyclub.co\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/academyclub.co\/en\/#\/schema\/logo\/image\/","url":"https:\/\/academyclub.co\/wp-content\/uploads\/2022\/07\/academy-siyahAsset-16-1.png","contentUrl":"https:\/\/academyclub.co\/wp-content\/uploads\/2022\/07\/academy-siyahAsset-16-1.png","width":570,"height":92,"caption":"Academy Club"},"image":{"@id":"https:\/\/academyclub.co\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/academyclubtr\/","https:\/\/www.instagram.com\/academyclubtr\/?hl=tr","https:\/\/www.linkedin.com\/company\/academy-clubtr\/","https:\/\/discord.io\/academyclub"]}]}},"_links":{"self":[{"href":"https:\/\/academyclub.co\/en\/wp-json\/wp\/v2\/product\/108547","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/academyclub.co\/en\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/academyclub.co\/en\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/academyclub.co\/en\/wp-json\/wp\/v2\/media\/109143"}],"wp:attachment":[{"href":"https:\/\/academyclub.co\/en\/wp-json\/wp\/v2\/media?parent=108547"}],"wp:term":[{"taxonomy":"product_brand","embeddable":true,"href":"https:\/\/academyclub.co\/en\/wp-json\/wp\/v2\/product_brand?post=108547"},{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/academyclub.co\/en\/wp-json\/wp\/v2\/product_cat?post=108547"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/academyclub.co\/en\/wp-json\/wp\/v2\/product_tag?post=108547"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}