Kurslar
Qeydiyyat Kurs adı Tarix Qiymət Endirim Qiymət + Endirim Müddət
İT Security 2024-04-26 500 AZN 0 % 500 AZN 3 ay
Syllabus
Introduction to Proactive Security
 Hacker, Hacking definition and hacker types
 General Hacking terminology
 Hacking phases and hacking methodologies
 Lab environment setup
Getting ready
 Introduction and Installing Kali Linux
 General overview and usage of Kali Linux
Information gathering phase
 General understanding of footprinting
 Passive information gathering
 Footprinting through WHOIS, Search Engines, GHDB, Maltego, Email harvesting, Netcraft, extracting meta information from files, Vulnerability Databases and etc.
 Active Information gathering
 Footprinting through Forward and reverse DNS lookup
 DNS zone transfers
 HTTP service and web application footprinting
 Port Scanning
 Passive OS fingerprinting
 Automating most of the tasks using Bash scripting
 Port Scanning (in-depth overview)
 TCP connect,SYN,ACK,FIN,XMAS,Idle scan techiques
 UDP scanning techniques
 Banner grabbing
 OS fingerprinting
 Gathering information using NSE scripting and vulnerability discovery
Enumeration phase
 SMB enumeration
 Null session enumeration
 SMTP enumeration
 SNMP enumeration
 FTP enumeration
Vulnerability discovery
 Scanning systems for vulnerability: OpenVAS, nikto,w3af and many more
Introduction to NetCat
 General overview
 Chat between computers
 Getting Reverse and Bind shell
 File Transfers
Introduction to Metasploit
 General overview
 Information gathering using MSF (active and passive)
 Case: Exploiting vulnerabilities using MSF
 Generating Payloads
 Meterpreter: Dumping Usernames and passwords, Privilege escalation, Token Impersonation, Pivoting
 MSF post exploitation
Privilege Escalation
 Case: Privilege escalation in Windows
 Case: Privilege escalation in Linux
Client-side attacks
 Information gathering about target
 Using Social Engineering
 Case: Leveraging browser based vulnerabilities
 Case: Using Java Applet attack
Changing public exploits for our use
 Case: Editing bind exploit for getting reverse shell exploit
Password attacks
 Cracking SSH,FTP,VNC,RDP,HTTP basic authentication with various tools
 Creating own Bruteforcer with python
 Dumping SAM database with various tools
 Getting clear-text passwords from memory with various techniques
Web application attacks
 Mapping the application
 Analyzing input points
 Testing for Client-side controls
 Authentication tests
 Authorization and Session management tests
 Access control tests
 Chained attacks
 Fuzzing for web vulnerabilities
 Exploiting vulnerabilities: SQL injection, XSS, CSRF, LFI/RFI, Insecure Direct Object reference, XXE,SSRF
Buffer Overflows in Win32
 General overview
 Fuzzing
 Replicating Crash
 Controlling EIP and avoiding bad characters
 Writing final exploit
System administrasiyasi kursu 2024-05-03 400 AZN 0 % 400 AZN 6 ay

MICROSOFT WINDOWS TRAINING’S

Installing and Configuring Windows 10
Prepare for installation requirements
Install Windows 10
Configure devices and device drivers
Post-installation configuration
Implement Windows in an enterprise environment
Configure networking
Configure storage
Configure data access and usage
Implement Apps
Configure remote management
Configure updates
Monitor Windows
Configure system and data recovery
Configure authorization and authentication
Configure advanced management tools

Windows Server Installing and Configuring
Installing Windows Server  
Introduction to Windows PowerShell 
Installing Active Directory Domain Services 
User Account Management 
Group Account Management 
Computer Account Management 
Working with Organizational Units (OUs) 
Managing Active Directory Domain Services Using PowerShell 
Implementing IPv4 
Implementing IPv6 
Implementing DHCP 
Implementing DNS 
Implementing Local Storage 
Implementing File Services 
Implementing Print Services 
Introduction to Group Policy 
Implementing a Group Policy Infrastructure 
Working with Group Policy Exceptions 
Implementing Server Virtualization with Hyper-V 
Installing Server Core 
Deploying and Maintaining Server Images 
Implementing Patch Management 
Monitoring Windows Server
Configuring File and Disk Encryption 
Configuring File Server Resource Manager (FSRM) 
Configuring Distributed File System (DFS) 
Configuring Advanced Auditing 
Configuring and Troubleshooting DNS 
Maintaining Active Directory Domain Services 
Implementing Read-Only Domain Controllers 
Configuring Domain Controllers 
Implementing a Group Policy Infrastructure 
Configuring Group Policy Settings 
Configuring Account Policies 
Configuring Group Policy Preferences 
Managing Group Policy Objects 
Configuring VPNs and Routing 
Configuring DirectAccess 
Installing and Configuring a Network Policy Server 
Implementing Network Access Protection (NAP) 
New Features of DHCP 
Securing DNS with DNSSEC 
Basic Configuration of Network Load Balancing 
Customizing Network Load Balancing 
Storage Management and Cluster Shared Volumes 
Configuring Quorum 
Cluster Properties and Failover Settings 
Backup and Restore of Failover Clusters 
Cluster-Aware Updating 
Implementing Hyper-V Clustering 
Migrating Hyper-V Virtual Machines 
Managing Hyper-V with SCVMM 
Disaster Recovery Technologies 
Configuring Microsoft Online Backup Service 
Domain and Forest Functional Levels 
Trust Relationships and UPN Suffixes 
Configuring Replication – Sites and Subnets 
Site Link Bridging and Universal Group Caching 
Read-Only Domain Controller Configuration 
Deploying a Certificate Authority 
Templates and Deploying Certificates 
Validating Certificates 
Certificate Recovery 
Rights Management 
Deploying Rights Management 
Configuring Rights Policy Templates 
Exposing RMS Access to External Clients 
Understanding and Installing AD Federation Services 
Claims Providers and Relying Parties 
Claims Provider Trusts/Relying Party Trusts 
Business to Business Federation 

Microsoft Exchange Server
Installation 
User Management 
Configuring Outlook 
Setup Internet Gateway for Exchange 
SMTP Relay Server 
OWA 
Remote Access – POP3 
Information Store 
Public Folders 
Exchange Management 
Exchange Groups, Address list 
Security in Exchange 
Disaster Recovery 
Routing Groups and Connectors 

 
 
 
 
Cisco CCNA kursu 2024-05-16 500 AZN 0 % 500 AZN 3 ay

CISCO-CCNA Routing and Switching 

Part I: Networking Fundamentals 
• The TCP/IP and OSI Networking Models 
• Fundamentals of Ethernet LANs
• Fundamentals of WANs
• Fundamentals of IPv4 Addressing and Routing 
• Fundamentals of TCP/IP Transport and Applications 
Part II: Ethernet LANs and Switches 
• Building Ethernet LANs with Switches 
• Installing and Operating Cisco LAN Switches 
• Configuring Ethernet Switching 
• Implementing Ethernet Virtual LANs 
• Troubleshooting Ethernet LANs 
Part III: IP Version 4 Addressing and Subnetting 
• Perspectives on IPv4 Subnetting 
• Analyzing Classful IPv4 Networks 
• Analyzing Subnet Masks 
• Analyzing Existing Subnets 
Part IV: Implementing IP Version 4 
• Operating Cisco Routers 
• Configuring IPv4 Addresses and Routes 
• Learning IPv4 Routes with OSPFv2 
• Configuring and Verifying Host Connectivity 
Part V: Advanced IPv4 Addressing Concepts 
• Subnet Design 
• Variable-Length Subnet Masks 
• Part VI: IPv4 Services 
• Basic IPv4 Access Control Lists
• Advanced IPv4 ACLs and Device Security 
• Network Address Translation
Part VII: IP Version 6 
• Fundamentals of IP Version 6 
• IPv6 Addressing and Subnetting 
• Implementing IPv6 Addressing on Routers 
• Implementing IPv6 Addressing on Hosts 
• Implementing IPv6 Routing 
Part I: LAN Switching 
• Spanning Tree Protocol Concepts
• Spanning Tree Protocol Implementation 
• Troubleshooting LAN Switching 
Part II: IP Version 4 Routing 
• Troubleshooting IPv4 Routing
• Creating Redundant First-Hop Routers
• Virtual Private Networks 
Part III: IP Version 4 Routing Protocols 
• Implementing OSPF for IPv4 
• Understanding EIGRP Concepts 
• Implementing EIGRP for IPv4 
• Troubleshooting IPv4 Routing Protocols
Part IV: Wide-Area Networks 
• Implementing Point-to-Point WANs 
• Understanding Frame Relay Concepts 
• Implementing Frame Relay 
• Identifying Other Types of WANs 
Part V: IP Version 
• Troubleshooting IPv6 Routing 
• Implementing OSPF for IPv6 
• Implementing EIGRP for IPv6 
Part VI: Network Management 555
• Managing Network Devices 
• Managing IOS Files 

IT DIRECTOR 2024-05-20 2500 AZN 0 % 2500 AZN 1 ay
IT DIRECTOR təliminə başlayırıq. Təlim İT sahəsində təcrübəsi olan managerlər və İT MANAGER təlimini bitirmiş şəxslər üçün nəzərdə tutulub. Təlimdə aşağıdakılar tədris olunacaq:

• IT Governance
• Personnel Management
• IT Strategy
• IT Processes
• IT Policies and Procedures
• IT Guidelines
• Texniki Tapşırıq yazma 
• İncident Management
• Problem Management
• Service Level Management
• Capacity Management
• Availability Management
• Change Management
• Configuration Management
• İT Service Continuity Management
• Release Management 
• IT Assessment
• IT Budgeting
• Technology Cost Saving Strategies
• IT Staff Motivation & Development
• IT Assessment
• IT Measurements
• IT Communication
• IT Audit 
• IT Risk 
• Project Management Fundamentals
Azure Fundamentals (AZ-900) / Onlayn 2024-06-05 500 AZN 0 % 500 AZN 2 ay

Cloud Concepts

  • High Availability, Scalability, Elasticity, Agility, and Disaster Recovery
  • Capital Expenditure (CapEx) and Operational Expenditure (OpEx)
  • Consumption-based model
  • Shared responsibility model
  • IaaS, PaaS, SaaS, Serverless computing
  • Public, Private and Hybrid Cloud

 

Core Azure Services and resources

  • Regions and Availability Zones
  • Resource Groups, Subscriptions, Management Groups
  • Azure Resource Manager (ARM)
  • Virtual Machines
  • Azure App Services,Azure Container Instances (ACI), Azure Kubernetes Service (AKS)
  • Virtual Networks, VPN Gateway, Virtual Network peering, and ExpressRoute
  • Container (Blob) Storage, Disk Storage, File Storage, and storage tiers
  • Cosmos DB, Azure SQL Database, Azure Database for
  • MySQL, Azure Database for PostgreSQL, and SQL Managed Instance
  • Azure Marketplace

Core solutions and management tools on Azure

  • Internet of Things (IoT) Hub, IoT Central, and Azure Sphere
  • Azure Synapse Analytics, HDInsight, and Azure Databricks
  • Azure Machine Learning, Cognitive Services and Azure Bot Service
  • Azure Functions and Logic Apps
  • Azure DevOps, GitHub, GitHub Actions
  • Azure Portal, Azure PowerShell, Azure CLI, Cloud Shell, and Azure Mobile App
  • Azure Advisor, Azure Monitor, Azure Service Health
  • ARM templates

 

General security and network security features (10-15%)

  • Azure Security Center, including policy compliance, security alerts, secure score, and resource hygiene
  • Key Vault
  • Azure Sentinel
  • Azure Dedicated Hosts
  • Network Security Groups (NSG)
  • Azure Firewall
  • Azure DDoS protection

Identity, governance, privacy, and compliance features

  • Azure authentication and authorization
  • Azure Active Directory
  • Azure Active Directory
  • Conditional Access, Multi-Factor Authentication (MFA), and Single Sign-On (SSO)
  • Role-Based Access Control (RBAC)
  • Tags
  • Azure Policy
  • Azure Blueprints
  • Microsoft core tenets of Security, Privacy, and Compliance
  • Azure Trust Center
  • Azure compliance documentation

Azure cost management and Service Level Agreements

  • Factors that can affect costs (resource types, services, locations, ingress and egress traffic)
  • Factors that can reduce costs (reserved instances, reserved capacity, hybrid use benefit, spot pricing)
  • Functionality and usage of the Pricing calculator and the Total Cost of Ownership (TCO) calculator
  • Functionality and usage of Azure Cost Management
  • Azure Service Level Agreement (SLA)
  • Actions that can impact an SLA (i.e. Availability Zones)
  • Service lifecycle in Azure (Public Preview and General Availability)
IT Manager təlimi 2024-06-05 1500 AZN 0 % 1500 AZN 1 ay
IT Manager təliminə başlayırıq. Təlim İT sahəsində təcrübəsi olanlar üçün nəzərdə tutulub. Təlimdə aşağıdakılar tədris olunacaq
• IT Strategy
• IT Processes
• IT Policies and Procedures
• İncident Management
• Problem Management
• Service Level Management
• Capacity Management
• Availability Management
• Change Management
• Configuration Management
• İT Service Continuity Management
• Release Management
• IT Assessment
• IT Budgeting
• Technology Cost Saving Strategies
• IT Staff Motivation & Development
• IT Assessment
• IT Communication
• IT Audit fundamentals
• IT Risk fundamentals
• KPI
Linux Redhat RHCSA\RHCE 2024-06-07 500 AZN 0 % 500 AZN 6 ay

RHCSA

 

Understand and use essential tools

●Access a shell prompt and issue commands with correct syntax

●Use input-output redirection (>, >>, |, 2>, etc.)

●Use grep and regular expressions to analyze text

●Access remote systems using ssh

●Log in and switch users in multiuser targets

●Archive, compress, unpack, and uncompress files using tar, star, gzip, and bzip2

●Create and edit text files

●Create, delete, copy, and move files and directories

●Create hard and soft links

●List, set, and change standard ugo/rwx permissions

●Locate, read, and use system documentation including man, info, and files in /usr/share/doc

Note: Red Hat may use applications during the exam that are not included in Red Hat Enterprise Linux for the purpose of evaluating candidate's abilities to meet this objective.

Operate running systems

●Boot, reboot, and shut down a system normally

●Boot systems into different targets manually

●Interrupt the boot process in order to gain access to a system

●Identify CPU/memory intensive processes, adjust process priority with renice, and kill processes

●Locate and interpret system log files and journals

●Access a virtual machine's console

●Start and stop virtual machines

●Start, stop, and check the status of network services

●Securely transfer files between systems

Configure local storage

●List, create, delete partitions on MBR and GPT disks

●Create and remove physical volumes, assign physical volumes to volume groups, and create and delete logical volumes

●Configure systems to mount file systems at boot by Universally Unique ID (UUID) or label

●Add new partitions and logical volumes, and swap to a system non-destructively

Create and configure file systems

●Create, mount, unmount, and use vfat, ext4, and xfs file systems

●Mount and unmount CIFS and NFS network file systems

●Extend existing logical volumes

●Create and configure set-GID directories for collaboration

●Create and manage Access Control Lists (ACLs)

●Diagnose and correct file permission problems

Deploy, configure, and maintain systems

●Configure networking and hostname resolution statically or dynamically

●Schedule tasks using at and cron

●Start and stop services and configure services to start automatically at boot

●Configure systems to boot into a specific target automatically

●Install Red Hat Enterprise Linux automatically using Kickstart

●Configure a physical machine to host virtual guests

●Install Red Hat Enterprise Linux systems as virtual guests

●Configure systems to launch virtual machines at boot

●Configure network services to start automatically at boot

●Configure a system to use time services

●Install and update software packages from Red Hat Network, a remote repository, or from the local file system

●Update the kernel package appropriately to ensure a bootable system

●Modify the system bootloader

Manage users and groups

●Create, delete, and modify local user accounts

●Change passwords and adjust password aging for local user accounts

●Create, delete, and modify local groups and group memberships

●Configure a system to use an existing authentication service for user and group information

Manage security

●Configure firewall settings using firewall-config, firewall-cmd, or iptables

●Configure key-based authentication for SSH

●Set enforcing and permissive modes for SELinux

●List and identify SELinux file and process context

●Restore default file contexts

●Use boolean settings to modify system SELinux settings

●Diagnose and address routine SELinux policy violations

 

 

RHCE

 

System configuration and management

●Use network teaming or bonding to configure aggregated network links between two Red Hat Enterprise Linux systems

●Configure IPv6 addresses and perform basic IPv6 troubleshooting

●Route IP traffic and create static routes

●Use firewalld and associated mechanisms such as rich rules, zones and custom rules, to implement packet filtering and configure network address translation (NAT)

●Configure a system to authenticate using Kerberos

●Configure a system as either an iSCSI target or initiator that persistently mounts an iSCSI target

●Produce and deliver reports on system utilization (processor, memory, disk, and network)

●Use shell scripting to automate system maintenance tasks

Network services

Network services are an important subset of the exam objectives. RHCE candidates should be capable of meeting the following objectives for each of the network services listed below:

●Install the packages needed to provide the service

●Configure SELinux to support the service

●Use SELinux port labeling to allow services to use non-standard ports

●Configure the service to start when the system is booted

●Configure the service for basic operation

●Configure host-based and user-based security for the service

HTTP/HTTPS

           

●Configure a virtual host        

●Configure access restrictions on directories

●Deploy a basic CGI application

●Configure group-managed content

●Configure TLS security

                                                                                                                       

DNS

           

●Configure a caching-only name server

●Troubleshoot DNS client issues

NFS

           

●Provide network shares to specific clients

●Provide network shares suitable for group collaboration

●Use Kerberos to control access to NFS network shares

SMB

           

●Provide network shares to specific clients

●Provide network shares suitable for group collaboration

SMTP

           

●Configure a system to forward all email to a central mail server

SSH

           

●Configure key-based authentication

●Configure additional options described in documentation

NTP

           

●Synchronize time using other NTP peers

Database services

           

●Install and configure MariaDB

●Backup and restore a database

●Create a simple database schema

●Perform simple SQL queries against a database

 

BASH SCRIPTING
Bash Files - .bash_profile .bashrc
Displaying Environment Variables in a Script
Using Variables on the Command Line
Setting and Using Variables in Scripts
Comment Types and Structure
Exit Status
Arithmetic Operations
Global and Local Environment Variables
Special Characters - Quotes and Escapes
Exercise: Using Arrays
If/Then/Else
For Loop
Case Statement
While Loop
Until Loop
Microsoft Exchange Server 2024-09-03 400 AZN 0 % 400 AZN 1 ay
Installation 
User Management 
Configuring Outlook 
Setup Internet Gateway for Exchange 
SMTP Relay Server 
OWA 
Remote Access – POP3 
Information Store 
Public Folders 
Exchange Management 
Exchange Groups, Address list 
Security in Exchange 
Disaster Recovery 
Routing Groups and Connectors 
Azure Administrator (AZ-104) / Onlayn 2024-09-05 600 AZN 0 % 600 AZN 2 ay

Manage Azure identities and governance

Manage Azure Active Directory (Azure AD) objects

      create users and groups

      create administrative units

      manage user and group properties

      manage device settings

      perform bulk user updates

      manage guest accounts configure

      Azure AD join configure self-service

      Self-service-password reset (SSPR)

Manage role-based access control (RBAC)

      create a custom role

      provide access to Azure resources by assigning roles at different scopes

      interpret access assignments

Manage subscriptions and governance

      configure Azure policies 

      configure resource locks

      apply and manage tags on resources

      manage resource groups

      manage subscriptions

      manage costs  

      configure management groups

Implement and manage storage

Secure storage

      configure network access to storage accounts

      create and configure storage accounts

      generate shared access signature (SAS) tokens

      manage access keys

      configure Azure AD authentication for a storage account

      configure access to Azure Files

Manage storage

      export from Azure job

      import into Azure job

      install and use Azure Storage Explorer

      copy data by using AZCopy

      implement Azure Storage replication

      configure blob object replication

Configure Azure files and Azure Blob Storage

      create an Azure file share

      create and configure Azure File Sync service

configure Azure Blob Storage

      configure storage tiers for Azure Blob Storage

      configure blob lifecycle management

Deploy and manage Azure compute resources

Automate deployment of virtual machines (VMs) by using Azure Resource Manager templates

      modify an Azure Resource Manager template

      configure a virtual hard disk (VHD) template

      deploy from a template

      save a deployment as an Azure Resource Manager template

      deploy virtual machine extensions

 

Configure VMs

      configure Azure Disk Encryption

      move VMs from one resource group to another

      manage VM sizes

      add data disks

      configure networking

      redeploy VMs

      configure high availability

      deploy and configure scale sets

Create and configure containers

      configure sizing and scaling for Azure Container Instances

      configure container groups for Azure Container Instances

      configure storage for Azure Kubernetes Service (AKS)

      configure scaling for AKS

      configure network connections for AKS

      upgrade an AKS cluster

Create and configure Azure App Service

      create an App Service plan

      configure scaling settings in an App Service plan

      create an App Service

      secure an App Service

      configure custom domain names

      configure backup for an App Service

      configure networking settings

configure deployment settings

Configure and manage virtual networking

Implement and manage virtual networking

      create and configure virtual networks, including peering

      configure private and public IP addresses

      configure user-defined network routes 

      implement subnets

      configure endpoints on subnets

      configure private endpoints

      configure Azure DNS, including custom DNS settings and private or public DNS zones

Secure access to virtual networks

      create security rules

      associate a network security group (NSG) to a subnet or network interface

      evaluate effective security rules

      implement Azure Firewall

      implement Azure Bastion

Configure load balancing

      configure Azure Application Gateway

      configure an internal or public load balancer

      troubleshoot load balancing

Monitor and troubleshoot virtual networking

      monitor on-premises connectivity

      configure and use Network Performance Azure Monitor for Networks

      use Azure Network Watcher

      troubleshoot external networking

      troubleshoot virtual network connectivity

Integrate an on-premises network with an Azure virtual network

      create and configure Azure VPN Gateway

      create and configure Azure ExpressRoute

      configure Azure Virtual WAN

Monitor and back up Azure resources

Monitor resources by using Azure Monitor

        configure and interpret metrics

        configure Azure Monitor logs

        query and analyze logs

        set up alerts and actions

        configure Application Insights

Implement backup and recovery

        create a Recovery Services vault

        create and configure backup policy

        perform backup and restore operations by using Azure Backup 

        perform site-to-site recovery by using Azure Site Recovery

        configure and review backup reports

 

Windows 10 (MD-100) 2024-10-01 400 AZN 0 % 400 AZN 1 ay
Prepare for installation requirements
Install Windows 10
Configure devices and device drivers
Post-installation configuration
Implement Windows in an enterprise environment
Configure networking
Configure storage
Configure data access and usage
Implement Apps
Configure remote management
Configure updates
Monitor Windows
Configure system and data recovery
Configure authorization and authentication
Configure advanced management tools