The Objective of the Program:
The goal of this program is to provide the necessary information in line with the legislation and judicial decisions to the participants who will act as experts and attorneys in the field of cybercrimes.
By clicking on the link you can get the current training dates
Program Fee:
ByClicking on the link You can see the current training fees
Communication:
0507 230 1166 – 0553 837 9103 – 0553 837 9102
Process of Distance Education:
The training program has been prepared in a distance learning format and it will be delivered through an online training portal.
This certificate program consists of 10 lessons of 40 minutes each and covers the entire 10-hour formal (in-class) education curriculum. The way education is handled is exactly the same as formal education.
In order to enter the training portal, your user code and password will be sent by an SMS and e-mail to the phone number and e-mail address you provided while registering.
The training material consists of videos and training notes.
There is no specific day and time limit for participation in the trainings. During the training period, you can participate in the training, wherever and whenever you want, from any device (tablet, phone, computer, etc.) that you are connected to the internet. Access authorization to the training portal will be automatically removed after 14 days from the training start date.
Certificate:
Participants will be awarded a certificate to show that that they have attended the relevant training, provided that they complete the training by watching all the videos within 14 days from the start of the training.
Scope:
- LOGIN
- CONCEPTS IN CYBERLAW (INFORMATION TECHNOLOGIES= IT LAW)
- INSTITUTIONS IN CYBERLAW
- Ministry of Transportation and Infrastructure
- Internet Development Board
- Information Technologies and Communications Authority
- IT CRIMES IN GENERAL
- IT CRIMES REGULATED IN TURKISH CRIMINAL LAW
- Crime of Entering Information System (Article 243)
- Crime of Blocking, Destroying, Making it Inaccessible, Destroying or Modifying Data (Article 244)
- Offense of Credit/Debit Card Abuse
(Article 245)
- Offense of Using Forbidden Devices or Programs (Article 245/A)
- OTHER CRIMES THAT MAY BE COMMITTED THROUGH INFORMATION SYSTEMS
- Theft Crime Through Information Systems
- Fraud Crime Through Information Systems
- Offense of Providing Space and Opportunity for Gambling
- Crime of Violating Moral, Financial or Related Rights
- Offense of Preparatory Actions to Neutralize Protective Programs
- Offense of Unauthorized Use of Signature Creation Data
- Fraud Crime in Electronic Certificates
- Offense of Suicide Routing
- Offense of Sexually Abusing a Child
- Offense of Defamation
- Offense of Threatening
- Crimes Committed Against Atatürk
- Terror Crimes
- Offenses Against the State
- PROTECTION MEASURES SPECIFIC TO CYBER CRIMES REGARDED IN CRIMINAL PROCEDURE LAW
- Search, Copy and Seize Computers, Computer Programs and Logs
- PREVENTING ACCESS IN CYBER CRIMES
- Responsibility of Content Provider
- Obligations of the Hosting Provider
- Obligations of the Access Provider
- Content Takedown and Access Blocking
- Issues to be Considered in the Decision to Block Access
- Invalidation of Access Blocking
- Unblocking of Access
- Administrative and Penal Sanctions
- COUNCIL OF EUROPE CYBERCRIME CONVENTION (CONVENTION ON VIRTUAL CRIMES)
- Types of Crime Included in the Contract
- Unauthorized Access (Article 2)
- Unauthorized Intervention (Article 3)
- Data Interference (Article 4)
- Intervention in Systems (Article 5)
- Abuse of Devices (Article 6)
- Forgery Through Computers (Article 7)
- Fraud Through Computers (Article 8)
- Child Pornography (Article 9)
- Violation of Copyright Related Rights (Article 10)
- SAMPLE EXPERT AND FORENSIC IT REPORTS
- Sample Report 1
- Sample Report 2
- Sample Report 3
- Sample Report 4
- Sample Report 5
- Sample Report 6