UEKAE Home   /   Trainings UEKAE Trainings

TRAININGS

National Research Institute of Electronics and Cryptology Trainings

Blockchain Technology and Applications

Training Details

Duration of Education

• 1 semester (Fall/Spring)

Prerequisites

• Being in the 2nd and upper classes of the relevant departments

Who Can Participate?

• Students of related departments of universities

Education Goals

It is aimed that students;
• Have knowledge about blockchain architectures,
• Have knowledge about blockchain cryptography (crypto building blocks),
• Become able to offer blockchain solutions in line with the requirements,
• Have knowledge about the application areas of blockchain technologies.

Subject Headings

• Fundamentals of blockchain technology (5 weeks)
• Blockchain cryptology (2 weeks)
• Ethereum platform and smart contracts
• Community and regulations in blockchain technology
• Cryptocurrency ecosystem
• Application areas of blockchain technology (3 weeks)

Smart Card Operating System Training

Training Details

Duration of Education

• 2 days

Prerequisites

• There are no specific prerequisites.

Who Can Participate?

• Those who want to develop applications on AKİS,
• Those who want to develop a computer application that works with AKIS installed cards.

Education Goals

• Having knowledge about smart card operating systems and general features,
• Having knowledge at a level to develop applications on AKİS,
• Having knowledge at a level to develope a library software and/or a driver software working with AKIS installed cards
knowledge to develop library software
owning.

Subject Headings

• Smart Cards and Usage Areas
• AKİS and Application Areas
• AKİS Communication Protocol
• AKİS Life Stages
• AKİS Filing Structure, Security Architecture and Commands
• AKİS Computer Applications (PKCS11, PKCS15, CSP, mini driver)

Card Access Device Standard Training

Training Details

Duration of Education

• 2 days

Prerequisites

• Having knowledge about APDU commands (IEC/ISO 7816-4) used by smart cards to communicate

 

Who Can Participate?

• Those who want to improve the Card Access Device defined in TS 13582, TS13583, TS 13584, TS 13585 standards

Education Goals

• Having a level of knowledge to develop a Card Access Device,
• Having knowledge about Card Access Device certification processes.

Subject Headings

• Basic Concepts of Standards
• Electronic Authentication System
• Card Access Device Interfaces and Features
• Card Access Device Application Software Features
• Card Access Device Protocols
• Republic of Turkey Identity Card and Electronic Authentication System Data Structures and Access Rules
• Card Access Device Common Criteria (CC) Certification Process
• Card Access Device TSE Standard Certification Process

Card Access Device Common Criteria Certification Training

Training Details

Duration of Education

• 1 day

Prerequisites

• There are no specific prerequisites.

Who Can Participate?

• Those who want to improve the Card Access Device defined in TS 13582, TS13583, TS 13584, TS 13585 standards

Education Goals

• Before the development of the Card Access Device, being informed about the Common Criteria and the product requirements of the Card Access Device Protection Profile and preparing the security target document (ST) from the assurance requirements.

Subject Headings

• Common Criteria (CC) Evaluation Process
• Definition of Card Access Device
• Card Access Device Security Problem Definition
• Card Access Device Security Objectives
• Card Access Device Security Functional Requirements
• Card Access Device Security Assurance Requirements

Electronic Authentication System Standard Training

Education Goals

Duration of Education

• 2 days

Prerequisites

• There are no specific prerequisites.

Who Can Participate?

• Those who want to develop an Authentication Server, Authentication Policy Server, Role Authentication Server or ID Card Software Library defined in TS 13678, TS 13679, TS 13680, TS 13681 standards.

Education Goals

• Having a level of knowledge to develop Electronic Authentication System components such as Authentication Server, Authentication Policy Server, Role Authentication Server or ID Card Software Library.

Subject Headings

• Electronic Authentication System
• Identity Card Data Structures and Access Conditions
• ID Card Software Library
• Authentication Server
• Authentication Policy Server
• Identity Recognition and Authentication Methods
• Data Access with Role Authentication

TR Identity Card Use Cases Training

Training Details

Duration of Education

• 1 day

Prerequisites

• There are no specific prerequisites

Who Can Participate?

• Business analysts and application developers who want to integrate their business processes with the Turkish Identity Card and Electronic Authentication System.

Education Goals

• To have knowledge about the subjects of TR Identity Card, Electronic Identity Authentication System, Identity Recognition and Verification Methods and Identity Card Use Cases.

Subject Headings

• TR Identity Card Introduction
• TR ID Card Visual Security Features
• Electronic Authentication System
• Identity Recognition and Authentication Methods
• Identity Card Use Cases

sge

(SGE) Cyber Security Institute

The Cyber Security Institute, which was established to carry out studies to increase the national cyber security capacity, carries out research and development activities in the field of cyber security; carries out solutions-oriented projects for military institutions, public institutions and organizations and the private sector.

The main fields of activity of our institute, which has made a significant contribution to the creation of cyber security knowledge and tactical infrastructure in our country with many successful projects to date, are secure software development, penetration tests and vulnerability analysis.

blank
6-yze card logo

(IZE) Artificial Intelligence Institute

Artificial Intelligence Institute is the first institute established within the scope of TUBITAK centers and institutes, which cuts the sectors and research fields horizontally and focuses directly on the emerging technology field. For this reason, it constitutes an innovative model in terms of both the open innovation and co-development approach of the institute and its focus on emerging technology.

Artificial Intelligence Institute aims to develop core technologies in the field of artificial intelligence and bring these innovations from the forefront of science to the use of the industry as soon as possible. Focusing on the transformative potential of artificial intelligence, it will continue to play its part in pioneering efforts to create and sustain artificial intelligence-based innovation, growth and productivity in Turkey. Working with industry and public institutions in Turkey, together with other organizations within the artificial intelligence ecosystem, spreading the use of artificial intelligence and increasing the workforce specialized in this field are among its primary goals.

blank

Discover institutes laboratories technologies products projects of BİLGEM.

Competence Centers

MILSEC 4 - Secure IP Terminal

SAFE IP TERMINAL

While the MİLSEC-4 terminal offers an up-to-date solution for next-generation secure communication (voice, data and video) in IP networks, it provides an uninterrupted communication service by maintaining the compatibility of secure voice communication in PSTN networks with PSTN secure phones in use.
provides.

Configuration, surveillance and software update processes of MILSEC-4 terminals are carried out securely remotely using the Security Management Center (GYM). MİLSEC-4 terminal is capable of IP Network Key Loading (IPAAY) through secure communication with GYM without the need for an additional device.

MİLSEC-4 terminals are interoperable with MİLSEC-1A and MİLSEC-2 phones and offer the opportunity to replace MİLSEC-1A and MİLSEC-2 phones without interruption in the gradual transformation of PSTN networks to next generation IP networks.

FEATURES

  • End-to-end secure voice communication in PSTN networks
  • End-to-end secure voice, image and data transmission in IP networks
  • NATO SCIP compliance on IP networks
  • Compatibility with commercial SIP products
  • Interoperability with MILSEC1A and MILSEC2 secure phones
  • National and AES crypto algorithms
  • Remote software update
  • Easy operation with touch screen

It is subject to the sales license to be given by the Ministry of National Defense.

Feedback