Home
Corporate
About TUGAY Certificates Partners Careers
Services
Penetration Testing Source Code Analysis Training References Contact Startup Application
Get a Quote

Who Is This Training For?

Security Enthusiasts

A comprehensive starting point for those who want to enter the cybersecurity field and explore the world of ethical hacking.

IT and System Administrators

IT professionals who want to evaluate the infrastructure they manage from an attacker's perspective and identify security vulnerabilities.

Software Developers

Developers who want to reinforce secure coding practices, understand application-layer attacks, and run security tests independently.

Training Modules

01

Network Fundamentals and Reconnaissance

TCP/IP protocols, port scanning, service discovery, passive and active information-gathering techniques. Nmap, Shodan, and OSINT tools.

02

Web Application Attacks

OWASP Top 10 attack types, SQL injection, XSS, CSRF, IDOR, and web application vulnerability exploitation.

03

System Penetration Testing

Exploiting operating system vulnerabilities, privilege escalation, hash cracking, and post-exploitation techniques.

04

Malware Analysis

Malware categories, static and dynamic analysis methods, and sandbox examination techniques.

05

Social Engineering

Designing phishing scenarios, vishing techniques, pretexting, and human-factor attack methodology.

06

Professional Reporting

Pentest finding documentation, executive summary writing, CVSS scoring, and client-focused report writing.

Training Format

Hands-On Labs

Practical application in a dedicated lab environment simulating real systems. Hands-on scenarios and exercises in every module.

CTF Competitions

Capture The Flag competitions held throughout the training program to apply learned techniques in practice.

Certificate and CEH Preparation

A training completion certificate and preparatory materials for the international CEH (Certified Ethical Hacker) exam.

Duration and Format Details

Training Program Details

The training program can be arranged as an intensive 5-day format (40 hours) or a part-time 10-week format (4 hours per week). Both in-person and online options are available.

Upon completion, participants receive a TUGAY training completion certificate. Additional resources and guidance for CEH exam preparation are also provided.

Request Training Enrollment
40
Training Hours
6
Modules
CEH
Certificate Prep
Lab
Hands-On Environment
Startup Program

Secure your product
before it hits the market.

Security isn't just for large enterprises. Every startup needs a solid foundation from day one. Let us find the vulnerabilities before attackers do. For free.

Apply for Startup Program

Application is free. No commitment required.

Assessment scope

  • Initial security assessment by an expert
  • Critical vulnerability and weakness identification
  • Prioritized findings summary report
  • GDPR preliminary compliance assessment
  • Expert feedback within 48 hours
Completely free & non-binding
Free Assessment Request Pentest Startup Application