{"id":2973,"date":"2024-07-30T13:28:59","date_gmt":"2024-07-30T10:28:59","guid":{"rendered":"https:\/\/bilisimacademy.com\/blog\/?p=2973"},"modified":"2025-07-11T10:09:20","modified_gmt":"2025-07-11T07:09:20","slug":"ceh-v12-ile-siber-guvenlik-kariyerinizi-guclendirin","status":"publish","type":"post","link":"https:\/\/bilisimacademy.com\/blog\/2024\/07\/ceh-v12-ile-siber-guvenlik-kariyerinizi-guclendirin\/","title":{"rendered":"CEH v12 ile Siber G\u00fcvenlik Kariyerinizi G\u00fc\u00e7lendirin"},"content":{"rendered":"\n<figure class=\"wp-block-image alignwide size-full\"><img fetchpriority=\"high\" decoding=\"async\" width=\"482\" height=\"702\" src=\"https:\/\/bilisimacademy.com\/blog\/wp-content\/uploads\/2024\/07\/image-8-1.webp\" alt=\"CEH v12 \" class=\"wp-image-4226\" srcset=\"https:\/\/bilisimacademy.com\/blog\/wp-content\/uploads\/2024\/07\/image-8-1.webp 482w, https:\/\/bilisimacademy.com\/blog\/wp-content\/uploads\/2024\/07\/image-8-1-206x300.webp 206w\" sizes=\"(max-width: 482px) 100vw, 482px\" \/><\/figure>\n\n\n\n<p>Bili\u015fim Academy olarak EC-Council\u2019in yetkili reseller partneri oldu\u011fumuzu duyurmaktan gurur duyuyoruz. CEH v12, siber g\u00fcvenlik alan\u0131nda en \u00e7ok talep edilen sertifikalardan biridir.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">CEH v12 Nedir?<\/h4>\n\n\n\n<p>CEH v12 (Certified Ethical Hacker), etik hacker\u2019lar\u0131n bilgi, beceri ve yeteneklerini geli\u015ftirmek amac\u0131yla tasarlanm\u0131\u015f, kapsaml\u0131 ve uygulamal\u0131 bir siber g\u00fcvenlik e\u011fitim program\u0131d\u0131r. Bu program, bireylerin sistemleri analiz etme, a\u00e7\u0131kl\u0131klar\u0131 tespit etme ve a\u011flara y\u00f6nelik sald\u0131r\u0131lara kar\u015f\u0131 savunma geli\u015ftirme konular\u0131nda uzmanla\u015fmas\u0131n\u0131 sa\u011flar. <\/p>\n\n\n\n<p>Sertifika, d\u00fcnya genelinde \u00f6zel sekt\u00f6r \u015firketleri, askeri kurumlar ve h\u00fck\u00fcmetler taraf\u0131ndan yayg\u0131n olarak tan\u0131nmakta ve g\u00fcvenilmektedir.<\/p>\n\n\n\n<p>CEH v12, etik hacking alan\u0131nda en g\u00fcncel teknikleri ve ara\u00e7lar\u0131 i\u00e7eren m\u00fcfredat\u0131yla dikkat \u00e7eker. Kat\u0131l\u0131mc\u0131lar, ger\u00e7ek d\u00fcnya sald\u0131r\u0131 senaryolar\u0131 \u00fczerinde uygulamal\u0131 e\u011fitimler alarak bilgi g\u00fcvenli\u011fi konular\u0131nda derinlemesine uzmanl\u0131k kazan\u0131rlar. <\/p>\n\n\n\n<p>Ayr\u0131ca, tehdit istihbarat\u0131, a\u011f g\u00fcvenli\u011fi, k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlar\u0131n analizi, sosyal m\u00fchendislik, g\u00fcvenlik a\u00e7\u0131klar\u0131n\u0131n tespiti, sistem istismar teknikleri ve kriptografi gibi bir\u00e7ok kritik konuda bilgi sahibi olurlar. <\/p>\n\n\n\n<p>CEH v12, siber g\u00fcvenlik alan\u0131nda en \u00e7ok talep edilen ve i\u015fverenler taraf\u0131ndan de\u011fer verilen sertifikalardan biridir. Sertifika sahibi bireyler, hem ulusal hem de uluslararas\u0131 d\u00fczeyde \u00e7e\u015fitli sekt\u00f6rlerde kariyer f\u0131rsatlar\u0131 elde edebilir.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"1024\" height=\"602\" src=\"https:\/\/bilisimacademy.com\/blog\/wp-content\/uploads\/2024\/07\/5-phases-1024x602-1.webp\" alt=\"\" class=\"wp-image-2977\" srcset=\"https:\/\/bilisimacademy.com\/blog\/wp-content\/uploads\/2024\/07\/5-phases-1024x602-1.webp 1024w, https:\/\/bilisimacademy.com\/blog\/wp-content\/uploads\/2024\/07\/5-phases-1024x602-1-300x176.webp 300w, https:\/\/bilisimacademy.com\/blog\/wp-content\/uploads\/2024\/07\/5-phases-1024x602-1-768x452.webp 768w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h4 class=\"wp-block-heading\">CEH v12 E\u011fitim Program\u0131<\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>5 G\u00fcnl\u00fck E\u011fitim<\/strong><\/li>\n\n\n\n<li><strong>20 Mod\u00fcl<\/strong><\/li>\n\n\n\n<li><strong>3000+ Sayfa \u00d6\u011frenci El Kitab\u0131<\/strong><\/li>\n\n\n\n<li><strong>1900+ Sayfa Laboratuvar El Kitab\u0131<\/strong><\/li>\n\n\n\n<li><strong>220+ Uygulamal\u0131 Laboratuvar<\/strong><\/li>\n\n\n\n<li><strong>3500+ Hacking Arac\u0131<\/strong><\/li>\n\n\n\n<li><strong>125 \u00c7oktan Se\u00e7meli Soru<\/strong><\/li>\n\n\n\n<li><strong>20 Senaryo Tabanl\u0131 Soru<\/strong><\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">CEH v12 E\u011fitim Mod\u00fclleri<\/h3>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Introduction to Ethical Hacking<\/strong>\n<ul class=\"wp-block-list\">\n<li>Ethical hacking ve bilgi g\u00fcvenli\u011fi d\u00fcnyas\u0131ndaki temel konular\u0131n temelleri.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Foot Printing and Reconnaissance<\/strong>\n<ul class=\"wp-block-list\">\n<li>Ke\u015fif ve ayak izi \u00e7\u0131karma teknikleri.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Scanning Networks<\/strong>\n<ul class=\"wp-block-list\">\n<li>A\u011f tarama teknikleri ve \u00f6nlemler.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Enumeration<\/strong>\n<ul class=\"wp-block-list\">\n<li>\u00c7e\u015fitli numaraland\u0131rma teknikleri ve ilgili \u00f6nlemler.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Vulnerability Analysis<\/strong>\n<ul class=\"wp-block-list\">\n<li>G\u00fcvenlik a\u00e7\u0131klar\u0131n\u0131 belirleme y\u00f6ntemleri ve ara\u00e7lar\u0131.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>System Hacking<\/strong>\n<ul class=\"wp-block-list\">\n<li>Sistem hackleme y\u00f6ntemleri, steganografi ve izleri kapatma teknikleri.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Malware Threats<\/strong>\n<ul class=\"wp-block-list\">\n<li>Farkl\u0131 zararl\u0131 yaz\u0131l\u0131m t\u00fcrleri ve kar\u015f\u0131 \u00f6nlemler.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Sniffing<\/strong>\n<ul class=\"wp-block-list\">\n<li>Paket yakalama teknikleri ve bunlara kar\u015f\u0131 savunma y\u00f6ntemleri.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Social Engineering<\/strong>\n<ul class=\"wp-block-list\">\n<li>Sosyal m\u00fchendislik kavramlar\u0131 ve teknikleri, insan d\u00fczeyinde zafiyetlerin tespiti ve \u00f6nlemler.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Denial-of-Service<\/strong>\n<ul class=\"wp-block-list\">\n<li>Hizmet reddi sald\u0131r\u0131lar\u0131 ve korunma y\u00f6ntemleri.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Session Hijacking<\/strong>\n<ul class=\"wp-block-list\">\n<li>Oturum ele ge\u00e7irme teknikleri ve ilgili \u00f6nlemler.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Evading IDS, Firewalls, and Honeypots<\/strong>\n<ul class=\"wp-block-list\">\n<li>IDS, firewall ve honeypot atlatma teknikleri ve \u00f6nlemler.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Hacking Web Servers<\/strong>\n<ul class=\"wp-block-list\">\n<li>Web sunucusu sald\u0131r\u0131lar\u0131 ve g\u00fcvenlik \u00f6nlemleri.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>SQL Injection<\/strong>\n<ul class=\"wp-block-list\">\n<li>SQL enjeksiyon sald\u0131r\u0131lar\u0131, atlatma teknikleri ve kar\u015f\u0131 \u00f6nlemler.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Hacking Wireless Networks<\/strong>\n<ul class=\"wp-block-list\">\n<li>Kablosuz a\u011flar\u0131 hackleme y\u00f6ntemleri ve g\u00fcvenlik \u00f6nlemleri.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Hacking Mobile Platforms<\/strong>\n<ul class=\"wp-block-list\">\n<li>Mobil platform sald\u0131r\u0131lar\u0131 ve g\u00fcvenlik \u00f6nlemleri.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>IoT and OT Hacking<\/strong>\n<ul class=\"wp-block-list\">\n<li>IoT ve OT sald\u0131r\u0131 y\u00f6ntemleri ve g\u00fcvenlik \u00f6nlemleri.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Cloud Computing<\/strong>\n<ul class=\"wp-block-list\">\n<li>Bulut bili\u015fim sald\u0131r\u0131lar\u0131 ve g\u00fcvenlik teknikleri.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Cryptography<\/strong>\n<ul class=\"wp-block-list\">\n<li>\u015eifreleme algoritmalar\u0131, \u015fifreleme ara\u00e7lar\u0131 ve kriptoanaliz teknikleri.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Hacking Web Applications<\/strong>\n<ul class=\"wp-block-list\">\n<li>Web uygulamas\u0131 sald\u0131r\u0131lar\u0131 ve g\u00fcvenlik \u00f6nlemleri.<\/li>\n<\/ul>\n<\/li>\n<\/ol>\n\n\n\n<p>Bu mod\u00fcller, CEH v12 e\u011fitim program\u0131n\u0131n kapsaml\u0131 i\u00e7eri\u011fini olu\u015fturmaktad\u0131r ve kat\u0131l\u0131mc\u0131lara etik hackleme konusunda geni\u015f bir bilgi yelpazesi sunar.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"938\" height=\"635\" src=\"https:\/\/bilisimacademy.com\/blog\/wp-content\/uploads\/2024\/07\/4-phase-box.webp\" alt=\"\" class=\"wp-image-2978\" srcset=\"https:\/\/bilisimacademy.com\/blog\/wp-content\/uploads\/2024\/07\/4-phase-box.webp 938w, https:\/\/bilisimacademy.com\/blog\/wp-content\/uploads\/2024\/07\/4-phase-box-300x203.webp 300w, https:\/\/bilisimacademy.com\/blog\/wp-content\/uploads\/2024\/07\/4-phase-box-768x520.webp 768w\" sizes=\"(max-width: 938px) 100vw, 938px\" \/><\/figure>\n\n\n\n<h4 class=\"wp-block-heading\">CEH v12\u2019nin Avantajlar\u0131<\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Kapsaml\u0131 E\u011fitim ve Uygulamal\u0131 Laboratuvarlar:<\/strong> Teorik ve pratik e\u011fitim mod\u00fclleriyle donat\u0131lm\u0131\u015ft\u0131r.<\/li>\n\n\n\n<li><strong>Global Siber Yar\u0131\u015fmalar:<\/strong> Ayda bir d\u00fczenlenen CTF tarz\u0131 yar\u0131\u015fmalarla kat\u0131l\u0131mc\u0131lara kendilerini test etme f\u0131rsat\u0131 sunar.<\/li>\n\n\n\n<li><strong>Tan\u0131nm\u0131\u015f Sertifika:<\/strong> CEH v12, ZDNet taraf\u0131ndan en iyi etik hacking sertifikas\u0131 olarak s\u0131ralanm\u0131\u015ft\u0131r.<\/li>\n\n\n\n<li><strong>G\u00fcncel Teknoloji ve Ara\u00e7lar:<\/strong> En yeni sald\u0131r\u0131 stratejileri ve teknikleri konusunda e\u011fitim verir.<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image alignfull size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"453\" height=\"193\" src=\"https:\/\/bilisimacademy.com\/blog\/wp-content\/uploads\/2024\/07\/image-11-1.webp\" alt=\"CEH v12 \" class=\"wp-image-4224\" srcset=\"https:\/\/bilisimacademy.com\/blog\/wp-content\/uploads\/2024\/07\/image-11-1.webp 453w, https:\/\/bilisimacademy.com\/blog\/wp-content\/uploads\/2024\/07\/image-11-1-300x128.webp 300w\" sizes=\"(max-width: 453px) 100vw, 453px\" \/><\/figure>\n\n\n\n<h4 class=\"wp-block-heading\">CEH v12 ile Neler \u00d6\u011freneceksiniz?<\/h4>\n\n\n\n<p>CEH v12 (Certified Ethical Hacker), etik hacker\u2019lar\u0131n bilgi, beceri ve yeteneklerini geli\u015ftirmek i\u00e7in \u00f6zel olarak tasarlanm\u0131\u015f kapsaml\u0131 ve g\u00fcncel bir siber g\u00fcvenlik e\u011fitim program\u0131d\u0131r. Bu sertifika, d\u00fcnya genelindeki \u015firketler, askeri kurumlar ve h\u00fck\u00fcmetler taraf\u0131ndan yayg\u0131n olarak tan\u0131nmakta ve g\u00fcvenle tercih edilmektedir. CEH v12, siber sald\u0131r\u0131lara kar\u015f\u0131 savunma olu\u015fturma, zafiyet tespiti, g\u00fcvenlik a\u00e7\u0131klar\u0131n\u0131n analiz edilmesi, a\u011flar\u0131n ve sistemlerin test edilmesi gibi ileri d\u00fczey konular\u0131 i\u00e7erir. Kat\u0131l\u0131mc\u0131lar, ger\u00e7ek d\u00fcnya senaryolar\u0131 \u00fczerinde uygulamal\u0131 e\u011fitimler alarak etik hacking alan\u0131nda uzmanla\u015f\u0131rlar. Program, ayn\u0131 zamanda sald\u0131r\u0131 teknikleri, k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m analizi, sosyal m\u00fchendislik, kriptografi ve g\u00fcvenlik protokolleri gibi konular\u0131 da kapsamaktad\u0131r. Bu sayede kat\u0131l\u0131mc\u0131lar hem teorik bilgiye hem de pratik becerilere sahip olur, i\u015f d\u00fcnyas\u0131nda ve siber g\u00fcvenlik sekt\u00f6r\u00fcnde g\u00fc\u00e7l\u00fc bir kariyer avantaj\u0131 elde ederler.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Reconnaissance (Ke\u015fif)<\/strong><\/li>\n\n\n\n<li><strong>Scanning (Tarama)<\/strong><\/li>\n\n\n\n<li><strong>Gaining Access (Eri\u015fim Sa\u011flama)<\/strong><\/li>\n\n\n\n<li><strong>Maintaining Access (Eri\u015fimi S\u00fcrd\u00fcrme)<\/strong><\/li>\n\n\n\n<li><strong>Covering Tracks (\u0130zleri Kapatma)<\/strong><\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading\">CEH v12\u2019ye Kat\u0131l\u0131n<\/h4>\n\n\n\n<p>Bili\u015fim Academy olarak, <a href=\"https:\/\/bilisimacademy.com\/pearson-vue-yetkili-test-merkezi\/\">Pearson VUE s\u0131nav merkezi<\/a> olarak hizmet veriyoruz ve <a href=\"https:\/\/www.eccouncil.org\/train-certify\/certified-ethical-hacker-ceh-engage\/\" target=\"_blank\" rel=\"noopener\">CEH<\/a> sertifikas\u0131n\u0131 almak isteyenler i\u00e7in gerekli t\u00fcm imkanlar\u0131 sa\u011fl\u0131yoruz. Bu Sertifika hakk\u0131nda daha fazla bilgi edinmek ve sertifika program\u0131na kat\u0131lmak i\u00e7in bizimle ileti\u015fime ge\u00e7in.<\/p>\n\n\n\n<p><strong>Siber g\u00fcvenlik kariyerinizi g\u00fc\u00e7lendirmek i\u00e7in ilk ad\u0131m\u0131 at\u0131n!<\/strong><\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Bili\u015fim Academy olarak EC-Council\u2019in yetkili reseller partneri oldu\u011fumuzu duyurmaktan gurur duyuyoruz. CEH v12, siber g\u00fcvenlik alan\u0131nda en \u00e7ok talep edilen sertifikalardan biridir. CEH v12 Nedir? CEH v12 (Certified Ethical Hacker), etik hacker\u2019lar\u0131n bilgi, beceri ve yeteneklerini geli\u015ftirmek amac\u0131yla tasarlanm\u0131\u015f, kapsaml\u0131 ve uygulamal\u0131 bir siber g\u00fcvenlik e\u011fitim program\u0131d\u0131r. Bu program, bireylerin sistemleri analiz etme, a\u00e7\u0131kl\u0131klar\u0131 tespit [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":2980,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[30,1],"tags":[],"class_list":["post-2973","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-siber-guvenlik","category-hot-news"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/bilisimacademy.com\/blog\/wp-json\/wp\/v2\/posts\/2973","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/bilisimacademy.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/bilisimacademy.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/bilisimacademy.com\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/bilisimacademy.com\/blog\/wp-json\/wp\/v2\/comments?post=2973"}],"version-history":[{"count":3,"href":"https:\/\/bilisimacademy.com\/blog\/wp-json\/wp\/v2\/posts\/2973\/revisions"}],"predecessor-version":[{"id":4227,"href":"https:\/\/bilisimacademy.com\/blog\/wp-json\/wp\/v2\/posts\/2973\/revisions\/4227"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/bilisimacademy.com\/blog\/wp-json\/wp\/v2\/media\/2980"}],"wp:attachment":[{"href":"https:\/\/bilisimacademy.com\/blog\/wp-json\/wp\/v2\/media?parent=2973"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/bilisimacademy.com\/blog\/wp-json\/wp\/v2\/categories?post=2973"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/bilisimacademy.com\/blog\/wp-json\/wp\/v2\/tags?post=2973"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}