NOVA Academy

With our constantly updated hands-on training infrastructure, you can be a cyber security expert!


NOVA Academy provides highly focused skills training to address the cyber workforce needs of the sector. NOVA Academy courses and certificate programs combine multiple skills training and hands-on problem solving guided by expert instructors to create high-impact learning. The skills mastered in these programs prepare participants with immediate, on-the-job effectiveness to tackle real-world situations.

Network Security Courses
Course Id Course Title Description
TC-01 Network Security Administrator In the scope of course, possible attacks on network security will be explained and mitigation methods against these attacks are taught.
TC-02 Reverse Engineering and Malware Analysis The aim of the training is to teach the techniques of malware analysis theoretically and practically. At the end of the training, reverse engineering methods will be able to analyze suspicious files in daily life.
TC-03 Penetration Testing In this course,information about the beginning level of penetration tests that are attacked like a hacker on IT systems is provided. Practical scenarios about basic Linux, network with required tools are executed in training.
TC-04 Attack Detection and Log Management The methods and tools used to detect and prevent traces of attacks on existing systems are explained. It is taught how to analyze the data collected from the operating system, security devices and other log generating environments.
TC-05 Network and Security Management on Linux Network and security is a boot camp training aims at helping employees to use Linux more efficiently. Linux security audits and general usage scenarios are covered in the training.
TC-06 DDoS Attacks and Mitigation Methods This three-day course focuses on using mitigation methods for protection from availability threats such as volumetric, state-exhaustion, and application-layer Distributed Denial of Service (DDoS) attacks.
Offensive Security Courses
Course Id Course Title Description
TC-07 Licensed Penetration Tester(LPT) LPT-Licensed Penetration Tester Course is a security class with real world hands on experience, it is the only in-depth Advanced Hacking and Penetration Testing course that covers testing in all modern infrastructures, operating systems and application environments.
TC-08 Certified Pentester (CEH) Put your hacker skills to work with this CEH course, and prepare for EC-Council Certified Ethical Hacker exam 312-50 with real-time scenarios in essential security systems.
TC-09 Network Penetration Tester With comprehensive coverage of tools, techniques, and methodologies for network penetration testing, this course truly prepares you to conduct high-value penetration testing projects step-by-step and end-to-end.
TC-10 Wireless Penetration Test To be a wireless security expert, you need to have a comprehensive understanding of the technology, the threats, the exploits, and the defense techniques along with hands-on experience in evaluating and attacking wireless technology. this course will show you how to identify the threats that expose wireless technology and build on this knowledge to implement defensive techniques that can be used to protect wireless systems.
TC-11 Web Application Security This is the course to take if you have to defend web applications! From mind-bending XSS attacks, to exploiting vulnerabilities, this intensive hands-on course will take your skills beyond run-of-the-mill SQL injection and file inclusion attacks while propelling you into a world of brain-melting SQL queries, advanced web attacks and more!
TC-12 Penetration testing with Kali Linux Penetration Testing with Kali Linux simulates a full penetration test from start to finish, by injecting the student into a target-rich, diverse, and vulnerable network environment.During the training, the tests that can be done with the real attacker profile are taught.
TC-13 Vulnerability Analysis with Nessus This self-paced course provides security professionals with the skills and knowledge necessary to deploy and configure a Nessus scanner on the network. Students will perform a host discovery scan, basic network vulnerability scan, credentialed scan of a target, compliance scan, and a mobile device scan. This training program provides in-depth working and features of NESSUS vulnerability scanner, its policy configuration and overview on Nessus Attack Scripting Language
TC-14 Metasploit Framework This course will show students how to apply the incredible capabilities of the Metasploit Framework in a comprehensive penetration testing and vulnerability assessment, according to a methodology for performing effective tests.
Advanced Cyber Security Courses
Course Id Course Title Description
TC-15 Certified Information Systems Security Professional The CISSP course trains and prepares you to pass the premier security certification, the Certified Information Systems Security Professional. Professionals that hold the CISSP have demonstrated that they have deep knowledge of all Common Cyber Security Domains, and have the necessary skills to provide leadership in the creation and operational duties of enterprise wide information security programs.
TC-16 Secure Code Development Certificate(ECSP) EC-Council Certified Secure Programmer certification is specifically designed for programmers and application developers to equip them with necessary skills to build robust and highly secure applications for the user.The course teaches developers how to identify security flaws and implement security countermeasures throughout the software development life cycle to improve the overall quality of products and applications.
TC-17 Digital Forensics Digital Forensics course will teach you techniques and tools for sucessful forensics investigations in a hands-on and practical way; for both Windows and Linux.
TC-18 Network Forensics This course covers the tools, technology, and processes required to integrate network evidence sources into your investigations, with a focus on efficiency and effectiveness.Students will learn that describes the actions required to uncover an incident on a wired or wireless network.
TC-19 Advanced Malware Analysis Within the scope of the training, it is determined whether an application is malicious software by using static and dynamic analysis methods. The methods used by malicious software are taught as part of the course.
TC-20 Network Border Security(Firewall/IDS/IPS,SIEM) The goal of this course is teaching positioning of security devices and software used in IT systems, configuration settings, bypassing methods,known vulnerabilities and exploits.
Enterprise Security Courses
Course Id Course Title Description
TC-21 Cyber Attacks Emergency Response In this training, which is prepared for the Computer Incident Response-CERT teams, which is obligatory to be established within the institution, the participant's SOME tasks, roles and responsibilities, incident response process, use of required tools and management are explained.
TC-22 Cyber Security for Managers In this training, it is explained the subjects such as learning the terminology, identifying required process, creating and managing the necessary procedures via perspective of the cyber security by the managers of the institution.
TC-23 Database Security Within the scope of the training, the required precautions, type of attacks, audit checklist to compliance and post-attack actions are taught in order to ensure the security of the databases with the most critical information as in other systems.
TC-24 Virtualization Security The aim of this training is to teach the security of the virtualization platform where multiple systems are located in the same place (single point of failure) and to configure the environment according to best practices.


Information Request Form

Send request about training

Nova Cyber Security Solutions

Yenisehir Mah. Osmanli Bulvari No:11 34912
Kurtkoy-Pendik / Istanbul
Telefon: +90 (216) 522 20 00
Faks: +90 (216) 522 22 22

info@novacybersecurity.com


NOVA Presentation Film

You are secure with "Cyber Security Solutions" and "Pentest Services" by NETAS! But how? Click to watch now...