Cyber Security Institute

The Cyber Security Institute (SGE), which was established to carry out studies to increase the national cyber security capacity, carries out research and development activities in the field of cyber security; carries out solution-oriented projects for military institutions, public institutions and organizations, and the private sector.

ABOUT US

Who We Are

Cyber Security Institute (SGE) was established under the umbrella of TÜBİTAK BİLGEM in line with the mission of ensuring national cyber security and standing on its own feet in this regard. The Institute, which has carried out many projects to meet the needs of the Turkish Armed Forces in the field of information systems security since its establishment, has become an authority in the field of information security, which should be given great importance for the future of our country. With its growing and expert staff, SGE continues to meet the information security needs of institutions in a wide spectrum and to carry out important projects both in Turkey and abroad with the Turkish Armed Forces, public institutions and companies from the private sector.
who-we-sge-img
sge-lab

Cyber Security Institute Laboratories

Discover the laboratories affiliated with Cyber Security Institute

SGE

Technology & Products

In line with its establishment purpose, SGE carries out research and development activities in the field of cyber security and introduces advanced technologies in these fields. The Institute, which plays an important role in the creation of cyber security knowledge and tactical infrastructure in our country with the devices it has developed in the field of cyber security, develops products that maximize national security by carrying out activities in the fields of secure software development, penetration tests and vulnerability analysis. SGE continues to achieve many national and international successes with the technologies it has developed and the products it has produced under the umbrella of TÜBİTAK BİLGEM.

SGE

Cyber Security Activities

In line with the purposes of the Public Information Systems Security Program (KBGP) and pursuant to the sixth article of the Cyber Security Action Plan, 15 cyber security trainings were prepared with the target audience public institution employees and 648 different personnel from 58 public institutions, 54 of which were active, were given. The list of personnel to participate is determined by the institutions.
Event Details

The first phase of the trainings was held between 25 March 2013 – 2 August 2013, and the second phase between 9 December 2013 and 27 December 2013 at TODAIE. The trainings were presented in 2 or 3 sessions with the aim of reaching as many people as possible, with a maximum of 45 people in the class. In order to support the participants in the application laboratory studies, the instructor was accompanied by 2 assistant trainers and it was aimed that the participants complete the application laboratory studies as much as possible. In the trainings, especially in the application-theory balance, application laboratory studies were ensured to dominate and practical information was tried to be presented to the participants.

The trainings given within the scope of KBGP are listed below.

  • TCP/IP Fundamentals and Security
  • Security of Active Devices
  • Windows Security
  • Microsoft Systems Security
  • Web Application Security
  • Social Engineering: Attack and Protection Methods
  • Combating DDoS Training
  • Secure Software Development Lifecycle
  • Linux Based Operating System Security
  • Oracle Database Security
  • User Security
  • ISO 27001 Information Security Management System
  • Windows Malware Analysis
  • Network Forensics
  • Digital Forensic Analysis

sge

(SGE) Cyber Security Institute

The Cyber Security Institute, which was established to carry out studies to increase the national cyber security capacity, carries out research and development activities in the field of cyber security; carries out solutions-oriented projects for military institutions, public institutions and organizations and the private sector.

The main fields of activity of our institute, which has made a significant contribution to the creation of cyber security knowledge and tactical infrastructure in our country with many successful projects to date, are secure software development, penetration tests and vulnerability analysis.

blank
6-yze card logo

(IZE) Artificial Intelligence Institute

Artificial Intelligence Institute is the first institute established within the scope of TUBITAK centers and institutes, which cuts the sectors and research fields horizontally and focuses directly on the emerging technology field. For this reason, it constitutes an innovative model in terms of both the open innovation and co-development approach of the institute and its focus on emerging technology.

Artificial Intelligence Institute aims to develop core technologies in the field of artificial intelligence and bring these innovations from the forefront of science to the use of the industry as soon as possible. Focusing on the transformative potential of artificial intelligence, it will continue to play its part in pioneering efforts to create and sustain artificial intelligence-based innovation, growth and productivity in Turkey. Working with industry and public institutions in Turkey, together with other organizations within the artificial intelligence ecosystem, spreading the use of artificial intelligence and increasing the workforce specialized in this field are among its primary goals.

blank

Discover institutes laboratories technologies products projects of BİLGEM.

Competence Centers

MILSEC 4 - Secure IP Terminal

SAFE IP TERMINAL

While the MİLSEC-4 terminal offers an up-to-date solution for next-generation secure communication (voice, data and video) in IP networks, it provides an uninterrupted communication service by maintaining the compatibility of secure voice communication in PSTN networks with PSTN secure phones in use.
provides.

Configuration, surveillance and software update processes of MILSEC-4 terminals are carried out securely remotely using the Security Management Center (GYM). MİLSEC-4 terminal is capable of IP Network Key Loading (IPAAY) through secure communication with GYM without the need for an additional device.

MİLSEC-4 terminals are interoperable with MİLSEC-1A and MİLSEC-2 phones and offer the opportunity to replace MİLSEC-1A and MİLSEC-2 phones without interruption in the gradual transformation of PSTN networks to next generation IP networks.

FEATURES

  • End-to-end secure voice communication in PSTN networks
  • End-to-end secure voice, image and data transmission in IP networks
  • NATO SCIP compliance on IP networks
  • Compatibility with commercial SIP products
  • Interoperability with MILSEC1A and MILSEC2 secure phones
  • National and AES crypto algorithms
  • Remote software update
  • Easy operation with touch screen

It is subject to the sales license to be given by the Ministry of National Defense.

Feedback