MENU
Home   /   Trainings  /   Kamu SM Trainings

TRAININGS

Public Certification Center Trainings

Our Center, which was founded in 1968, provides trainings to Public Institutions and Private Sector Organizations on Cryptology, Information Security, E-signature Applications, Software Testing and Quality Evaluations and TEMPEST.

E-Signature Awareness Training

Training Details

Duration of Education

• 4 hours

Prerequisites

• There are no specific prerequisites.

Who Can Participate?

• All users who use electronic signatures and want to learn about the legal responsibilities of electronic signature and anyone who is interested can participate.

Education Goals

• Obtaining information about laws and regulations,
• Obtaining information on obligations,
• Obtaining electronic signing and signature verification information,
• Obtaining information about Smart Card content

Subject Headings

• Public Certification Center E-signature Law, Communiqué, Regulation, Circulars Detailed Definition and Importance of E-signature How to Sign a Document with Electronic Signature?
• How to Verify the Signature of a Document with Electronic Signature?
• What's Inside Your Smart Card? What is Signing, Public and Private Key?
• What are the Obligations of Qualified Electronic Certificate Holders?
• What are the Obligations of Third Parties?
• What are the Requirements to be Provided by E-signature Software according to the Legislation?

E-Signature Technology Training

Training Details

Duration of Education

• 6 hours

Prerequisites

• There are no specific prerequisites.

Who Can Participate?

• Persons who will write or print electronic signature applications, decision makers in institutions and organizations and anyone interested in electronic signature can participate.

Education Goals

• Obtaining information about e-signature,
• AAA’nın sağladığı güvenlik kriterleri hakkında bilgi edinme,
• To learn about OCSP and CRL,
• Obtaining information about Time Stamp,
• Getting information about serial and discrete signature, e-signature data formats, archiving of e-signature

Subject Headings

• Algorithms used in e-signature
• E-signature creation and verification mechanism
• Security criteria provided by AAA
• Public Key Certificates (Electronic Certificate)
• Certificate Revocation Control Mechanisms (CRL, OCSP)
• Timestamp
• Types of E-signature Data Formats
• Discrete / Integrated Signature
• Serial / Parallel Signature
• Advanced E-signature Techniques
• Archiving of e-signature

Basic Cryptology Training

Training Details

Duration of Education

• 4 hours

Prerequisites

• There are no specific prerequisites.

Who Can Participate?

• Software developers who will develop electronic signature applications using TUBITAK API, decision makers in institutions and organizations and anyone interested in electronic signature can participate.

Education Goals

• To have knowledge about cryptology.

Subject Headings

• What is Cryptology?
• Simetrik Kriptografi – Gizli Anahtarlı Sistemler
• Asimetrik Kriptografi – Açık Anahtarlı Sistemler
• RSA Crypto System
• Summary Algorithms
• E-İmza’nın Kriptografik Tanımı

E-Signature Awareness Seminar

Education Goals

Duration of Education

• 2 hours

Prerequisites

• There are no specific prerequisites.

Who Can Participate?

• All users who use electronic signatures and want to learn about the legal responsibilities of electronic signature and anyone who is interested can participate.

Education Goals

• obtaining general information about e-signature,

Subject Headings

• Public Certification Center E-signature Law, Communiqué, Regulation, Circulars Detailed Definition and Importance of E-signature How to Sign a Document with Electronic Signature?
• How to Verify the Signature of a Document with Electronic Signature?
• What's Inside Your Smart Card? What is Signing, Public and Private Key?
• What are the Obligations of Qualified Electronic Certificate Holders?
• What are the Obligations of Third Parties?
• What are the Requirements to be Provided by E-signature Software according to the Legislation?

sge

(SGE) Cyber Security Institute

The Cyber Security Institute, which was established to carry out studies to increase the national cyber security capacity, carries out research and development activities in the field of cyber security; carries out solutions-oriented projects for military institutions, public institutions and organizations and the private sector.

The main fields of activity of our institute, which has made a significant contribution to the creation of cyber security knowledge and tactical infrastructure in our country with many successful projects to date, are secure software development, penetration tests and vulnerability analysis.

blank
6-yze card logo

(IZE) Artificial Intelligence Institute

Artificial Intelligence Institute is the first institute established within the scope of TUBITAK centers and institutes, which cuts the sectors and research fields horizontally and focuses directly on the emerging technology field. For this reason, it constitutes an innovative model in terms of both the open innovation and co-development approach of the institute and its focus on emerging technology.

Artificial Intelligence Institute aims to develop core technologies in the field of artificial intelligence and bring these innovations from the forefront of science to the use of the industry as soon as possible. Focusing on the transformative potential of artificial intelligence, it will continue to play its part in pioneering efforts to create and sustain artificial intelligence-based innovation, growth and productivity in Turkey. Working with industry and public institutions in Turkey, together with other organizations within the artificial intelligence ecosystem, spreading the use of artificial intelligence and increasing the workforce specialized in this field are among its primary goals.

blank

Discover institutes laboratories technologies products projects of BİLGEM.

Competence Centers

MILSEC 4 - Secure IP Terminal

SAFE IP TERMINAL

While the MİLSEC-4 terminal offers an up-to-date solution for next-generation secure communication (voice, data and video) in IP networks, it provides an uninterrupted communication service by maintaining the compatibility of secure voice communication in PSTN networks with PSTN secure phones in use.
provides.

Configuration, surveillance and software update processes of MILSEC-4 terminals are carried out securely remotely using the Security Management Center (GYM). MİLSEC-4 terminal is capable of IP Network Key Loading (IPAAY) through secure communication with GYM without the need for an additional device.

MİLSEC-4 terminals are interoperable with MİLSEC-1A and MİLSEC-2 phones and offer the opportunity to replace MİLSEC-1A and MİLSEC-2 phones without interruption in the gradual transformation of PSTN networks to next generation IP networks.

FEATURES

  • End-to-end secure voice communication in PSTN networks
  • End-to-end secure voice, image and data transmission in IP networks
  • NATO SCIP compliance on IP networks
  • Compatibility with commercial SIP products
  • Interoperability with MILSEC1A and MILSEC2 secure phones
  • National and AES crypto algorithms
  • Remote software update
  • Easy operation with touch screen

It is subject to the sales license to be given by the Ministry of National Defense.

Feedback