MENU
Home   /   Trainings  /   TDD Trainings

TRAININGS

Test and Evaluation Directorate Trainings

Our Center, which was founded in 1968, provides trainings to Public Institutions and Private Sector Organizations on Cryptology, Information Security, E-signature Applications, Software Testing and Quality Evaluations and TEMPEST.

TEMPEST Trainings

General TEMPEST Training

Duration of Education

• 1 day

Prerequisites

• To have knowledge about information security.

Who Can Participate?

• Those working on information security,

• combatants,

• Those who want to have information about TEMPEST (information leaks),

• Persons with roles of supervising, designing/developing, operating IT products and systems.

Education Goals

• To learn what the concepts of information security and TEMPEST are,

• Learning the history of TEMPEST,

• To have knowledge about the standards related to TEMPEST,

• Gains about what measures should be taken to prevent information leakage.

Subject Headings

• Information security

• What is TEMPEST?

• TEMPEST History

• Definitions and Important Concepts

• Device TEMPEST Risks

• TEMPEST Standards

• TEMPEST Policy

• TEMPEST Countermeasures

TEMPEST General Installation Guide Training

Duration of Education

• 0.5 days

Prerequisites

• To have knowledge about information security.

Who Can Participate?

• Those working on information security,
•Communicators,
• Those who want to have information about TEMPEST (information leaks),
• Persons with roles of controlling, designing/developing, operating IT products and systems.

Education Goals

• To learn what the concepts of information security and TEMPEST are,

• Learning the history of TEMPEST,

• To have knowledge about the standards related to TEMPEST,

• Gains about what measures should be taken to prevent information leakage.

Subject Headings

• Information security

• What is TEMPEST?

• TEMPEST History

• Definitions and Important Concepts

• Device TEMPEST Risks

• TEMPEST Standards

• TEMPEST Policy

• TEMPEST Countermeasures

(YTKDL) Software Testing and Quality Evaluation Laboratory Trainings

Software Testing Training

Duration of Education

• 1 day

Prerequisites

• There are no specific prerequisites.

Who Can Participate?

• Software test engineers,
• Software developers,
• Project managers,
• Business analysts,
• Systems engineers.

Education Goals

• Software testing concepts,
• The importance of software disasters and software testing,
• Learning how to test software in software development projects, how to operate and manage the testing process, software testing techniques, reviews, test documentation and test automation.

Subject Headings

• Fundamentals and Importance of Software Testing
• Software Disasters
• Testing in the Software Lifecycle
• Software Requirements Analysis
• Software Test Levels
• Software Testing Techniques
• Test Documentation
• Test Automation
• Test Management and Error Lifecycle
• Test Standards
• Review Process
• Practical Practices/Lessons Learned

Software Quality Metrics

Duration of Education

• 0.5 days

Prerequisites

• To have basic programming knowledge.

Who Can Participate?

• Software test engineers,
• Software developers,
• Project managers,
• Business analysts,
• Systems engineers.

Education Goals

• Understanding the difficulty and cost of writing quality code, as well as the importance of gains,
• The importance of increasing code quality,
• A good way to master the code and the project
thanks to the measurement and evaluation mechanism
realization that it can happen.

Subject Headings

• Factors Affecting Software Code Quality
• Detecting and Fixing Errors in Software
– Statik Yöntemler (Gözden Geçirmeler, Kod Analizi vs.)
– Dinamik Yöntemler (Birim Testler, Sistem Testleri vs.)
• Measurement Processes and Methods
• Static Code Analysis
• Software Metrics
– Karmaşıklık Metrikleri
– Satır Sayısı Metrikleri
– Nesne Yönelimli Metrikler
– Halstead Metrikleri
– Bakım Yapılabilirlik Metrikleri
– Paket Metrikleri
• Tools and Techniques
• Complexity Reduction
• Automation of the Measurement Process

Detection of Critical Application Vulnerabilities with Static Code Analysis

Duration of Education

• 0.5 days

Prerequisites

• To have basic programming knowledge.

Who Can Participate?

• Software developers,
• Software test engineers,
• Project managers,
• Software quality engineers.

Education Goals

• Which guides they will use to develop secure code,
• Acquisition of error avoidance methods and basic knowledge of code improvement while developing code.

Subject Headings

• What is Static Code Analysis?
• What are the International Code Security Guidelines?
– OWASP, SANS, CWE
• Most Common Encoding Problems
– En Çok Yapılan Hatalar
– Örnekler Üzerinden Anlatım
• Featured Issues Specific to Scripting Languages
• Vehicles
• Practical Code Improvement Examples

Software Reliability and Reliable Software Development Processes

Duration of Education

• 1 day

Prerequisites

• There are no specific prerequisites.

Who Can Participate?

• Software developers,
• Software test engineers,
• Project managers,
• Software quality engineers.

Education Goals

• The concept of reliability,
• Software quality, software testing and reliability,
• The importance of increasing the reliability of the software,
• Reliability models,
• Learning the metrics required for reliability.

Subject Headings

• Software Reliability and Reliable Software Development
• Safety, Reliability and Security Definitions
• Error Density Prediction and Failure
(Problem) Estimation
• Software Reliability Models
• Bir Teknik Performans Metriği Olarak Güvenilirlik –
Rome Lab. model
• Safety Critical Software Development Processes
– DO 178 C Tanıtımı, Seviyeleri ve Amaçları
– CENELEC 50128 Tanıtımı, Seviyeleri ve Amaçları

Usability Training

Duration of Education

• 0.5 days

Prerequisites

• There are no specific prerequisites.

Who Can Participate?

• Software test engineers,
• Software developers,
• Project managers,
• Business analysts,
• User graphical interface designers.

Education Goals

• Learning the concepts of usability and user experience,
• Understanding of usability evaluation and testing methods,
• Understanding the importance of usable software development,
• Development of software conforming to standards and guidelines.

Subject Headings

• Usability and User Experience
• Usability Problems
• User-Centered Design
• Usability Testing and Methods
• Eye Tracking Application
• Usability Assessment and Methods
• Usability Standards and Guidelines
• Practical Practices/Lessons Learned
• 50128 Introduction, Levels and Objectives

Performance Test Training

Duration of Education

• 0.5 days

Prerequisites

• There are no specific prerequisites.

Who Can Participate?

• Software test engineers,
• Software developers,
• Project managers,
• Business analysts,
• Systems engineers.

Education Goals

• Defining how the performance of the software will be determined,
• Identification of the factors affecting the performance of the software,
• Learning the issues to be considered in software performance tests.

Subject Headings

• Basics of Performance Testing
• Performance Requirements
• Performance Test Types
• Factors Affecting Performance Tools Used
• Performance Test Process
• Risks Experienced in Performance Tests
• Problems and Solution Suggestions

Off the Shelf Commercial Products (TSE ISO EN 25051) Certification

Duration of Education

• 0.5 days

Prerequisites

• There are no specific prerequisites.

Who Can Participate?

• Software developers,
• Software suppliers,
• Software testing and quality engineers,
• Project managers,
• Customers who will purchase a Cots product.

Education Goals

• Understanding the TS ISO/IEC 25051 standard and the importance of software quality,
• TS ISO/IEC 25051 Standard content, standard conformity assessment process and methods
raising awareness about
• Establishing trust and increasing satisfaction for people/institutions who will purchase COTS (RUSP) products.

Subject Headings

• Importance of TS ISO/IEC 25051 Standard
– Yazılım Kalitesinin Önemi
– Yazılım Testinin Önemi
• Overview of TS ISO IEC 25051 Standard
• Content of TS ISO IEC 25051 Standard
• COTS Software Product Requirements
– Ürün Açıklaması Gereksinimleri
– Kullanıcı Dokümantasyonu Gereksinimleri
– Yazılım için Kalite Gereksinimleri Kullanılan Araçlar
• Requirements for Test Documentation
– Test Planı Gereksinimleri
– Test Açıklamaları Gereksinimleri
– Test Sonuçları Gereksinimleri
• Standard Conformity Assessment Methods
• Standard Conformity Assessment Process

Electronic Document Management (TSE ISO EN 13298) Certification

Duration of Education

• 0.5 days

Prerequisites

• There are no specific prerequisites.

Who Can Participate?

• EBYS software developers,
• EBYS software suppliers,
• EBYS software test engineers,
• Project managers,
• Customers who will purchase an EBYS product.

Education Goals

• Learning EBYS document management techniques and applications,
• Understanding ERMS requirements,
• Learning of the activities to be carried out in the certification process.

Subject Headings

• Required Document Management Techniques for EBYS and
Applications
• Required to Manage Electronic Documents
Requirements
• Management of Documents Not Produced in Electronic Environment
Execution of Functions in Electronic Environment
Requirements for
• Diplomatic Required in Electronic Documents
Features
• Legal Validity of Electronic Documents
Precautions to be taken to ensure
• Secure Electronic Signature and Seal Systems
System Infrastructure Required for Implementation
• What to Do in the Certification Process

(OKTEM) Common Criteria Test and Evaluation Laboratory Trainings

Common Criteria (TS ISO/IEC 15408) Training

Duration of Education

• 1 day

Prerequisites

• Reviewing the Common Criteria standard Part-1 “Introduction and General Model” before training will make training more efficient.

Who Can Participate?

• Those who audit information technology (IT) products and systems,
• Persons responsible for designing/developing and using IT products.

Education Goals

• To have basic information about the Common Criteria standard, usage, applications and certification process.

Subject Headings

• Summary Information on Common Criteria Standard, Field of Application and Parts of the Standard
• How the Common Criteria Standard Can Be Used by IT Product/System Controllers, Designers, and Consumers
• Türkiye’deki Ortak Kriterler Yapısı (Sertifika Makamı – Laboratuvar), Ortak Kriterler Değerlendirme Süreci ve Ortak Kriterler Sertifika Yayınlama Süreci
• Prevalence of the Common Criteria Standard in the International Area
• Security, Availability, Integrity and Reliability in accordance with the Common Criteria Standard
Types of IT Products and Systems That Can Be Evaluated (Smart Card, Border Protection Devices, Operating Systems, etc.)

Smart Card Side Channel Analysis and Reverse Engineering Training

Duration of Education

• 5 days (1 day theoretical, 4 days practical)

Prerequisites

• Basic knowledge of the operation of RSA (Rivest Shamir Adleman), DES (Data Encryption Standard) and AES (Advanced Encryption Standard) crypto algorithms.

Who Can Participate?

• Those who audit information technology (IT) products and systems
• Persons responsible for designing/developing and using IT products

Education Goals

• Having knowledge about Side Channel Analysis applicable for smart cards,
• Knowledge of Reverse Engineering attack techniques for smart cards,
• Being informed about the precautions that can be taken against attack techniques.

Subject Headings

• Theoretical Section:
– Yan Kanal Analizi (Side Channel Analysis) Saldırı Teknikleri
– Tersine Mühendislik (Reverse Engineering) Saldırı Teknikleri
• Practical Section:
– RSA Algoritması Basit Güç Analizi (Simple Power Analysis)
– RSA Algoritması Farksal Güç Analizi (Differential Power Analysis)
– AES Algoritması Güç Analizi (Power Analysis)
– DES Algoritması Güç Analizi
– RSA Algoritması Hata Analizi (Fault Analysis)
– DES Algoritması Hata Analizi
– AES Algoritması Hata Analizi
– Odaklanmış İyon Işını (Focused Ion Beam) Cihazı ile Akıllı Kart Veri Yolu Dinleme (Bus Probing) ve Yonga Biçimlendirme (Circuit Edit)

(RAPSİM) Radar Performance and Track Analysis Center Trainings

Target Classification Training

Duration of Education

• 1 day

Prerequisites

• To have knowledge of basic mathematics, linear algebra, probability theory and basic optimization.

Who Can Participate?

• Scientists or engineers doing research in the field of radar target classification

Education Goals

• Gaining general knowledge and skills about target classification,
• Acquisition of basic theoretical knowledge about target classification,
• Acquisition of capabilities for defining and designing target classification problems

Subject Headings

• Target Classification Basics
• Attribute Concept
• Feature Generation, Feature Selection and Size Reduction
• Parameter Estimation
• Bayes Decision Rule Based Classifiers
• Linear Classifiers
• Non-Linear Classifiers
• Hidden Markov Models
• Tutorial Classification

sge

(SGE) Cyber Security Institute

The Cyber Security Institute, which was established to carry out studies to increase the national cyber security capacity, carries out research and development activities in the field of cyber security; carries out solutions-oriented projects for military institutions, public institutions and organizations and the private sector.

The main fields of activity of our institute, which has made a significant contribution to the creation of cyber security knowledge and tactical infrastructure in our country with many successful projects to date, are secure software development, penetration tests and vulnerability analysis.

blank
6-yze card logo

(IZE) Artificial Intelligence Institute

Artificial Intelligence Institute is the first institute established within the scope of TUBITAK centers and institutes, which cuts the sectors and research fields horizontally and focuses directly on the emerging technology field. For this reason, it constitutes an innovative model in terms of both the open innovation and co-development approach of the institute and its focus on emerging technology.

Artificial Intelligence Institute aims to develop core technologies in the field of artificial intelligence and bring these innovations from the forefront of science to the use of the industry as soon as possible. Focusing on the transformative potential of artificial intelligence, it will continue to play its part in pioneering efforts to create and sustain artificial intelligence-based innovation, growth and productivity in Turkey. Working with industry and public institutions in Turkey, together with other organizations within the artificial intelligence ecosystem, spreading the use of artificial intelligence and increasing the workforce specialized in this field are among its primary goals.

blank

Discover institutes laboratories technologies products projects of BİLGEM.

Competence Centers

MILSEC 4 - Secure IP Terminal

SAFE IP TERMINAL

While the MİLSEC-4 terminal offers an up-to-date solution for next-generation secure communication (voice, data and video) in IP networks, it provides an uninterrupted communication service by maintaining the compatibility of secure voice communication in PSTN networks with PSTN secure phones in use.
provides.

Configuration, surveillance and software update processes of MILSEC-4 terminals are carried out securely remotely using the Security Management Center (GYM). MİLSEC-4 terminal is capable of IP Network Key Loading (IPAAY) through secure communication with GYM without the need for an additional device.

MİLSEC-4 terminals are interoperable with MİLSEC-1A and MİLSEC-2 phones and offer the opportunity to replace MİLSEC-1A and MİLSEC-2 phones without interruption in the gradual transformation of PSTN networks to next generation IP networks.

FEATURES

  • End-to-end secure voice communication in PSTN networks
  • End-to-end secure voice, image and data transmission in IP networks
  • NATO SCIP compliance on IP networks
  • Compatibility with commercial SIP products
  • Interoperability with MILSEC1A and MILSEC2 secure phones
  • National and AES crypto algorithms
  • Remote software update
  • Easy operation with touch screen

It is subject to the sales license to be given by the Ministry of National Defense.

Feedback