top of page
PROFESSIONAL

PROFESSIONAL

SOFTWARE
DEVELOPMENT
Data Structures
Algorithm Analyses
ASP.NET
Clean Code
System Test
E-Commerce Systems
User Experience
Operating Systems
Topologies
.Net Core
POS Systems
Restful API

CYBER
SECURITY
WEB Pentest
OWASP Top 10 Preventions
OWASP Top 10 Analyses
Network SecurIty and Vulnerabilities
Reporting Standards
Attack Systems and Defense Systems
IPS/IDS Systems
Firewall Softwares
YETENEĞİN ÜSTÜNE GELİNİZ
Behavioral Biometry
Gait Recognation and Analyses
Keystroke Dynamics
Physical Biometry
Fingerprint Analyses Standards
IRIS Analyses Standards
Face Recognition
Hand Analyses
Signature Analyses
Hand Write Analyses

IDENTIFICATION METHODS AND BIOMETRY
Symetric Algorithms
Asymetric Algorithms
Hash Formats
Key Generating
Watermarking
Dapp
Consensus Systems
Cryptoanalysis
Smart Contracts

BLOCKCHAIN and CRYPTOLOGY
IT Ethics
Bilirkişi Raporu
Data Recovery
KVKK Compatibility
Process Management
Turkish Criminal Law
Cyber Bulling and Mobbing
IT Criminal and Investigation
CMK standards
5651 Law
Intelligence Gathering
Digital Evidence Analyses
Image Standards
Digital Forensic Hardwares
File System Analysis
Multimedia Investigation
Personal Data and Privacy

DIGITAL FORENSICS
Documentation
[7/10]Diagrams and Flowcharts
Requirement Analyses
System Verification/Validation
Testing Methodologies
Project Management Tools
Scrum
Agile Methodologies
Business Plan
Cost Management

BUSINESS ANALYSIS
DevOps Flow Structures
Pipelines
Documentation
Windows
Git Practices/Flows
Web Hooks
System Integration
Code Coverage
OSI Layers and Network
Linux
ESXI
Docker
Smoke/Load Test
Server Agents

DEVOPS
Video Editing
Photoshop
Digital mARKETING
SEO Management

SOCIAL and MULTIMEDIA
Data Mining
Datawarehouse Converting
Feature Engineering
Computer Vision
Frame Dependence Analysis
High Level Image Filtering
Cascade Object Detection
Decision Support Systems
Data Analyses/Converting

ARTIFICAL INTELLIGENCE
and
IMAGE PROCESSING

PORTFOLIO
EXPERIENCEO
bottom of page