PowerShell for Practical Purple TeamingNikhil Mittal
The document discusses purple teaming, which involves red and blue teams working together to improve security. It provides two examples using PowerShell to simulate insider threats and client-side attacks. The first story involves escalating privileges from a normal user to domain admin and creating a golden ticket. The second starts as a non-admin user using a client-side attack like an HTA when PowerShell is blocked. Detection methods like logs, Applocker, and network monitoring are also outlined. The document concludes purple teaming aims to maximize threat simulation benefits by bringing red and blue teams together.
Comment l’architecture événementielle révolutionne la communication dans le S...Vincent Lepot
Les slides de notre talk au Meetup "Les Frenchies du web #1" présentation l'archictecture événementielle mise en place chez Meetic autour d'Apache Kafka
1) Traditional network security devices are limited in protecting applications from attacks, with web application firewalls (WAFs) like BIG-IP ASM providing more comprehensive protection against a wide range of vulnerabilities and attacks.
2) BIG-IP ASM protects applications from the OWASP top 10 vulnerabilities like injection, XSS, CSRF, and more, with features like automatic DOS detection and PCI compliance reporting.
3) The solution provides visibility into applications through monitoring and reporting on server latency and other metrics to help optimize performance and security.
Security+ Guide to Network Security Fundamentals, 3rd Edition, by Mark Ciampa
Knowledge and skills required for Network Administrators and Information Technology professionals to be aware of security vulnerabilities, to implement security measures, to analyze an existing network environment in consideration of known security threats or risks, to defend against attacks or viruses, and to ensure data privacy and integrity. Terminology and procedures for implementation and configuration of security, including access control, authorization, encryption, packet filters, firewalls, and Virtual Private Networks (VPNs).
CNIT 120: Network Security
http://samsclass.info/120/120_S09.shtml#lecture
Policy: http://samsclass.info/policy_use.htm
Many thanks to Sam Bowne for allowing to publish these presentations.
This document discusses patch and vulnerability management. It begins with an agenda that covers why patch management matters, its relationship to risk management and penetration testing, how to implement patch and vulnerability management, establish metrics, plan ahead, and draw conclusions. It then discusses key aspects of patch and vulnerability management including monitoring vulnerabilities, establishing priorities, managing knowledge of vulnerabilities and patches, testing patches, implementing patches, verifying implementation, and improving the process. The goal is to reduce risk by addressing vulnerabilities through a structured patch management program.
PowerShell for Practical Purple TeamingNikhil Mittal
The document discusses purple teaming, which involves red and blue teams working together to improve security. It provides two examples using PowerShell to simulate insider threats and client-side attacks. The first story involves escalating privileges from a normal user to domain admin and creating a golden ticket. The second starts as a non-admin user using a client-side attack like an HTA when PowerShell is blocked. Detection methods like logs, Applocker, and network monitoring are also outlined. The document concludes purple teaming aims to maximize threat simulation benefits by bringing red and blue teams together.
Comment l’architecture événementielle révolutionne la communication dans le S...Vincent Lepot
Les slides de notre talk au Meetup "Les Frenchies du web #1" présentation l'archictecture événementielle mise en place chez Meetic autour d'Apache Kafka
1) Traditional network security devices are limited in protecting applications from attacks, with web application firewalls (WAFs) like BIG-IP ASM providing more comprehensive protection against a wide range of vulnerabilities and attacks.
2) BIG-IP ASM protects applications from the OWASP top 10 vulnerabilities like injection, XSS, CSRF, and more, with features like automatic DOS detection and PCI compliance reporting.
3) The solution provides visibility into applications through monitoring and reporting on server latency and other metrics to help optimize performance and security.
Security+ Guide to Network Security Fundamentals, 3rd Edition, by Mark Ciampa
Knowledge and skills required for Network Administrators and Information Technology professionals to be aware of security vulnerabilities, to implement security measures, to analyze an existing network environment in consideration of known security threats or risks, to defend against attacks or viruses, and to ensure data privacy and integrity. Terminology and procedures for implementation and configuration of security, including access control, authorization, encryption, packet filters, firewalls, and Virtual Private Networks (VPNs).
CNIT 120: Network Security
http://samsclass.info/120/120_S09.shtml#lecture
Policy: http://samsclass.info/policy_use.htm
Many thanks to Sam Bowne for allowing to publish these presentations.
This document discusses patch and vulnerability management. It begins with an agenda that covers why patch management matters, its relationship to risk management and penetration testing, how to implement patch and vulnerability management, establish metrics, plan ahead, and draw conclusions. It then discusses key aspects of patch and vulnerability management including monitoring vulnerabilities, establishing priorities, managing knowledge of vulnerabilities and patches, testing patches, implementing patches, verifying implementation, and improving the process. The goal is to reduce risk by addressing vulnerabilities through a structured patch management program.
This document summarizes feedback from 396 LogRhythm customers on why they chose and recommend LogRhythm. It provides 8 reasons: 1) Improved security visibility and issues identification. 2) High customer recommendation rate of 86%. 3) Measurable ROI within 12 months for 84% of customers. 4) Excellent customer support rated better than previous providers by 89%. 5) Easy to use interface preferred over previous providers by 61%. 6) Significant impact on staff productivity for 72%. 7) Stopped unauthorized access and security breaches. 8) Supported compliance mandates such as PCI.
1. O documento descreve um livro sobre a adoção do partido arquitetônico como idéia preliminar de um projeto.
2. O livro apresenta um método com duas etapas: coleta e análise de informações, e adoção do partido arquitetônico.
3. O método visa auxiliar iniciantes na prática de projetar, orientando-os nos passos para idealizar o partido e desenvolver habilidades de síntese criativa.
İstanbul Şehir Üniversitesi - İnternet Üzerinde Anonimlik ve Tespit Yöntemleri - Bilgi Güvenliği Mühendisliği Yüksek Lisans Programı - Bilgisayar Adli Analizi Dersi
Hazırlayan: Muhammed Zaid Alperen
This document discusses Android's recoverable keystore, which allows for migration of encryption keys to a new device and is linked to a Google account. It protects symmetric keys using AES-GCM encryption. Only system apps like Google Play Services can generate and restore recoverable keys. The keystore takes a snapshot of keys that is encrypted and stored in Google's cloud key vault service, allowing restoration of encrypted data and full device backups between devices.
This document provides an overview and agenda for a Splunk lunch and learn session. It discusses what Splunk is, its key capabilities including searching, alerting, and reporting on machine data, and its universal indexing approach. The document also outlines deployment options and includes a demonstration. It explains how Splunk eliminates finger pointing across IT silos by enabling users to search and investigate issues more quickly. It also discusses how Splunk supports proactive monitoring, operational visibility, and real-time business insights.
La confidentialité est l’assurance que l’information n’est accessible qu’aux personnes autorisées, qu’elle ne
sera pas divulguée en dehors d’un environnement spécifié.
Buffer overflows occur when a program writes more data to a buffer than it is configured to hold. This can overwrite adjacent memory and compromise the program. Common types of buffer overflows include stack overflows, heap overflows, and format string vulnerabilities. Buffer overflows have been exploited by major computer worms to spread, including the Morris worm in 1988 and the SQL Slammer worm in 2003. Techniques like canaries can help detect buffer overflows by placing check values between buffers and control data. Programming best practices like bounds checking and safe string functions can prevent buffer overflows.
the IBM Security Intelligence Platform, also known as QRadar®, integrates SIEM, log management, anomaly detection, vulnerability management, risk management and incident forensics into a unified, highly scalable, real-time solution that provides superior threat detection, greater ease of use, and low total cost of ownership compared with competitive products
Presentation from Cyber Security for Critical Assets conference (CS4CA ) in Houston, March 26-28 2019 presented by Sergio Caltagirone, Vice President of Threat Intelligence.
Covers:
- overview of the OT threat landscape
- new OT threats Dragos has uncovered through its industrial cybersecurity technology platform, array of services, and industrial threat intelligence.
- details on major industrial threat activity groups and root causes of many recent OT compromises
Learn more here: https://dragos.com/year-in-review/
More info: www.dragos.com
Follow us on LinkedIn: https://www.linkedin.com/company/dragos-inc./
Follow us on Twitter: https://twitter.com/dragosinc
Cyber security is a hot topic right now but have you ever wondered how far it goes back or where it all began? Our very own CEO has put together this fascinating presentation explaining the evolution of cyber security.
Even if you don't feel you're 'tech inclined' you will, no doubt, find this presentation riveting and want to share this information with colleagues, as we take you through the defining moments of cyber security since 700BC.
The document outlines NII Consulting's VAPT methodology, which consists of 5 steps: 1) planning and initiation, 2) analysis and testing, 3) infrastructure vulnerability assessment, 4) application security assessment, and 5) reporting and knowledge transfer. It then provides details on the various testing approaches and phases within each step, such as blackbox vs greybox testing, reconnaissance, port scanning, and vulnerability identification and exploitation. The document also covers NII's approach to PCI DSS compliance testing and includes a proposed report format that would provide an executive summary, technical details of vulnerabilities found, and recommendations.
The Stuxnet worm was designed to target Siemens industrial control systems used in Iran's uranium enrichment centrifuges. It spread to these systems through infected USB drives and exploited multiple Windows vulnerabilities. It then took control of centrifuges and varied their speeds, damaging around 1,000 centrifuges and slowing Iran's nuclear program. While not intended to spread beyond Iran, it ended up infecting systems in other countries as well through file transfers.
This document discusses how Citrix NetScaler delivers solutions to address common business challenges related to application delivery, including technical debt, hybrid cloud management, reliability, performance, and security issues. It provides an overview of NetScaler's capabilities such as cloud native elasticity, high performance, hybrid SSL support, AWS AutoScale integration, multi-NIC/IP support in Azure, server monitoring and load management, SSL offloading, application acceleration, and more. Case studies are presented showing how NetScaler has helped customers like Washington State DOT and Aramex International improve application availability, performance, and security.
Hybrid cloud overview and VCF on VxRAILDavid Pasek
This document provides an overview of VMware Cloud Foundation on Dell EMC VxRail. It discusses how it delivers full stack integration and automation for deploying, configuring, and managing the entire software-defined data center infrastructure stack. Key benefits include rapid deployment of a standardized private cloud, reduced risk through an integrated architecture, and enabling IT transformation by adopting an IT-as-a-Service model. The solution leverages VMware Cloud Foundation management and Dell EMC VxRail hardware and management to provide automated lifecycle management across the entire solution.
This document summarizes feedback from 396 LogRhythm customers on why they chose and recommend LogRhythm. It provides 8 reasons: 1) Improved security visibility and issues identification. 2) High customer recommendation rate of 86%. 3) Measurable ROI within 12 months for 84% of customers. 4) Excellent customer support rated better than previous providers by 89%. 5) Easy to use interface preferred over previous providers by 61%. 6) Significant impact on staff productivity for 72%. 7) Stopped unauthorized access and security breaches. 8) Supported compliance mandates such as PCI.
1. O documento descreve um livro sobre a adoção do partido arquitetônico como idéia preliminar de um projeto.
2. O livro apresenta um método com duas etapas: coleta e análise de informações, e adoção do partido arquitetônico.
3. O método visa auxiliar iniciantes na prática de projetar, orientando-os nos passos para idealizar o partido e desenvolver habilidades de síntese criativa.
İstanbul Şehir Üniversitesi - İnternet Üzerinde Anonimlik ve Tespit Yöntemleri - Bilgi Güvenliği Mühendisliği Yüksek Lisans Programı - Bilgisayar Adli Analizi Dersi
Hazırlayan: Muhammed Zaid Alperen
This document discusses Android's recoverable keystore, which allows for migration of encryption keys to a new device and is linked to a Google account. It protects symmetric keys using AES-GCM encryption. Only system apps like Google Play Services can generate and restore recoverable keys. The keystore takes a snapshot of keys that is encrypted and stored in Google's cloud key vault service, allowing restoration of encrypted data and full device backups between devices.
This document provides an overview and agenda for a Splunk lunch and learn session. It discusses what Splunk is, its key capabilities including searching, alerting, and reporting on machine data, and its universal indexing approach. The document also outlines deployment options and includes a demonstration. It explains how Splunk eliminates finger pointing across IT silos by enabling users to search and investigate issues more quickly. It also discusses how Splunk supports proactive monitoring, operational visibility, and real-time business insights.
La confidentialité est l’assurance que l’information n’est accessible qu’aux personnes autorisées, qu’elle ne
sera pas divulguée en dehors d’un environnement spécifié.
Buffer overflows occur when a program writes more data to a buffer than it is configured to hold. This can overwrite adjacent memory and compromise the program. Common types of buffer overflows include stack overflows, heap overflows, and format string vulnerabilities. Buffer overflows have been exploited by major computer worms to spread, including the Morris worm in 1988 and the SQL Slammer worm in 2003. Techniques like canaries can help detect buffer overflows by placing check values between buffers and control data. Programming best practices like bounds checking and safe string functions can prevent buffer overflows.
the IBM Security Intelligence Platform, also known as QRadar®, integrates SIEM, log management, anomaly detection, vulnerability management, risk management and incident forensics into a unified, highly scalable, real-time solution that provides superior threat detection, greater ease of use, and low total cost of ownership compared with competitive products
Presentation from Cyber Security for Critical Assets conference (CS4CA ) in Houston, March 26-28 2019 presented by Sergio Caltagirone, Vice President of Threat Intelligence.
Covers:
- overview of the OT threat landscape
- new OT threats Dragos has uncovered through its industrial cybersecurity technology platform, array of services, and industrial threat intelligence.
- details on major industrial threat activity groups and root causes of many recent OT compromises
Learn more here: https://dragos.com/year-in-review/
More info: www.dragos.com
Follow us on LinkedIn: https://www.linkedin.com/company/dragos-inc./
Follow us on Twitter: https://twitter.com/dragosinc
Cyber security is a hot topic right now but have you ever wondered how far it goes back or where it all began? Our very own CEO has put together this fascinating presentation explaining the evolution of cyber security.
Even if you don't feel you're 'tech inclined' you will, no doubt, find this presentation riveting and want to share this information with colleagues, as we take you through the defining moments of cyber security since 700BC.
The document outlines NII Consulting's VAPT methodology, which consists of 5 steps: 1) planning and initiation, 2) analysis and testing, 3) infrastructure vulnerability assessment, 4) application security assessment, and 5) reporting and knowledge transfer. It then provides details on the various testing approaches and phases within each step, such as blackbox vs greybox testing, reconnaissance, port scanning, and vulnerability identification and exploitation. The document also covers NII's approach to PCI DSS compliance testing and includes a proposed report format that would provide an executive summary, technical details of vulnerabilities found, and recommendations.
The Stuxnet worm was designed to target Siemens industrial control systems used in Iran's uranium enrichment centrifuges. It spread to these systems through infected USB drives and exploited multiple Windows vulnerabilities. It then took control of centrifuges and varied their speeds, damaging around 1,000 centrifuges and slowing Iran's nuclear program. While not intended to spread beyond Iran, it ended up infecting systems in other countries as well through file transfers.
This document discusses how Citrix NetScaler delivers solutions to address common business challenges related to application delivery, including technical debt, hybrid cloud management, reliability, performance, and security issues. It provides an overview of NetScaler's capabilities such as cloud native elasticity, high performance, hybrid SSL support, AWS AutoScale integration, multi-NIC/IP support in Azure, server monitoring and load management, SSL offloading, application acceleration, and more. Case studies are presented showing how NetScaler has helped customers like Washington State DOT and Aramex International improve application availability, performance, and security.
Hybrid cloud overview and VCF on VxRAILDavid Pasek
This document provides an overview of VMware Cloud Foundation on Dell EMC VxRail. It discusses how it delivers full stack integration and automation for deploying, configuring, and managing the entire software-defined data center infrastructure stack. Key benefits include rapid deployment of a standardized private cloud, reduced risk through an integrated architecture, and enabling IT transformation by adopting an IT-as-a-Service model. The solution leverages VMware Cloud Foundation management and Dell EMC VxRail hardware and management to provide automated lifecycle management across the entire solution.
BTOS Bilişim İnsan Kaynakları HizmetleriBTOS Bilişim
Bilişim İnsan Kaynakları, Proje ve Yazılım Geliştirme, Eğitim ve Danışmanlık. CEO, CTO, CFO, Genel Müdür, Direktör, Koordinatör, Proje Yöneticisi,
Sistem Yöneticisi, Yönetici Asistan, Yazılım Geliştirme Uzmanı, PHP, ASP.NET, Python, Ruby, Java, Javascript, C#, Oracle DBA, Oracle PL/SQL Developer, Mobil Yazılım Geliştirme Uzmanı, iOS, Android, Windows Mobile, Web Arayüz Tasarım Uzmanı, UX UI, Art Direktör,
İş Geliştirme, Dijital Pazarlama
hızlıYOL Teknoloji, Chatbot geliştirme, Beacon projeleri, Mobil Uygulama, Web ve Yazılım geliştirme projelerinde fayda temelli yaratıcı çözümler sunar. Kurumsal teknoloji çözümleri için bizi mutlaka arayın.
Kurulduğu 1989 yılından bugüne, sürekli büyüyen ve bilişim sektörünün önde gelen sistem entegratörlerinden olan Datateknik, Kamu, Savunma Sanayii ve Güvenlik, Telekomünikasyon ve Özel Sektörde ülkemizin gelişimine katkı sağlayan önemli projelere ve başarılara imza atmıştır. Datateknik, 2011 yılından itibaren AR-GE ve innovasyona verdiği önemi arttırarak Türkiye’nin lider katma değerli çözüm ve hizmet sağlayıcı şirketi olma vizyonu ile yoluna devam etmektedir.
Fuat Balta öğretim görevlisi İAÜ, Gsm : 0(532) 728 47 62 Koza Plaza Teknoloji merkezi Teknoloji center yazılım uzmanı girişimci aranıyor e-reklam uzmanı girişimci aranıyor e-ticaret girişimci uzmanı aranıyor, bilgisayar uzmanı aranıyor koza plaza teknoloji merkezi teknoloji projesine uzman aranıyor kiralık sekreterli hazır mobilyalı plaza hazır ofis
4S Bilgi Teknolojileri, Ankara ve İstanbulda, Proje, Test, Operasyon Yönetimi, Sanallaştırma, DevOps, Güvenlik, Veri Merkezi, Felaket Kurtarma Merkezleri, İş Sürekliliği ve çok daha fazla konuda faaliyet gösteren 20 yıllık bir BT firmasıdır.
2. HAKKIMIZDA
Avaxa Bilişim Teknolojileri yazılım sektörüne, yenilikçi ve
inovatif çözümler üretmek amacıyla kurulmuş olup ar-ge
projeleri, müşteri talep ve ihtiyaçlarına özel geliştirdiği
profesyonel çözümleri ile faaliyetlerine devam etmektedir.
Ar-ge ve müşteri odaklı yaklaşımları ile hem sektöre hem de
müşterilerine özel ve maliyet etkin çözümler sunan Avaxa
Bilişim Teknolojileri sunmuş olduğu çözümleri, etkili teknik
yazılım yaklaşımları ve alanlarında uzman ekibi ile
geliştirmektedir.
www.avaxagroup.comHizmete Özel
3. ORGANİZASYON YAPISI
www.avaxagroup.comHizmete Özel
Yazılım Departmanı
Mühendis ve Uzmanlarımız
• Senior Yazılım Uzmanı
• Yazılım Uzmanı
• Mobil Uygulama Geliştirme Uzmanı
• Veri tabanı ve Network Uzmanı
• Siber Güvenlik Uzmanı
Tasarım Departmanı
Tasarım ve Sosyal Medya
• Art Director (Sanat Yönetmeni)
• Grafik Tasarım Uzmanı
• Sosyal Medya Uzmanı
7. MOBİL
TEKNOLOJİLER
BIG DATA
MICROSOFT
YAZILIM
GELİŞTİME
SOSYAL MEDYA
TASARIM VE
AJANS
HİZMETLERİ
CALL CENTER
KURULUMU VE
DANIŞMANLIK
HİZMETLERİ
OPEN SOURCE
YAZILIM
GELİŞTİRME
EĞİTİM VE
DANIŞMANLIK
www.avaxagroup.comHizmete Özel
SİBER
GÜVENLİK
OPEN SOURCE YAZILIM GELİŞTİRME
Java / GNU C
Python / PHP
Spring
Framework
Debian /
Centos
RedHat
8. www.avaxagroup.comHizmete Özel
SİBER
GÜVENLİK
MİCROSOFT YAZILIM GELİŞTİRME
MOBİL
TEKNOLOJİLER
BIG DATASOSYAL MEDYA
TASARIM VE
AJANS
HİZMETLERİ
CALL CENTER
KURULUMU VE
DANIŞMANLIK
HİZMETLERİ
OPEN SOURCE
YAZILIM
GELİŞTİRME
EĞİTİM VE
DANIŞMANLIK
MICROSOFT
YAZILIM
GELİŞTİME
Desktop, Web
& Mobile
Development
9. www.avaxagroup.comHizmete Özel
SİBER
GÜVENLİK
SOSYAL MEDYA
MOBİL
TEKNOLOJİLER
BIG DATA
TASARIM VE
AJANS
HİZMETLERİ
CALL CENTER
KURULUMU VE
DANIŞMANLIK
HİZMETLERİ
OPEN SOURCE
YAZILIM
GELİŞTİRME
EĞİTİM VE
DANIŞMANLIK
MICROSOFT
YAZILIM
GELİŞTİME
SOSYAL MEDYA
Sosyal Medya
Danışmanlığı»
Sosyal Medya
Hesap
Yönetimi
Sosyal Medya
Kampanya
Yönetimi
10. www.avaxagroup.comHizmete Özel
SİBER
GÜVENLİK
TASARIM VE AJANS HİZMETLERİ
MOBİL
TEKNOLOJİLER
BIG DATA
CALL CENTER
KURULUMU VE
DANIŞMANLIK
HİZMETLERİ
OPEN SOURCE
YAZILIM
GELİŞTİRME
EĞİTİM VE
DANIŞMANLIK
MICROSOFT
YAZILIM
GELİŞTİME
SOSYAL MEDYA
TASARIM VE
AJANS
HİZMETLERİ
Web Sitesi /
Web & Mobil
Arayüz Tasarımı
3D Modelleme
& Animasyon
Logo &
Kurumsal Kimlik
Tasarımları
11. www.avaxagroup.comHizmete Özel
SİBER
GÜVENLİK
CALL CENTER KURULUMU VE DANIŞMANLIK
HİZMETLERİ
TASARIM VE
AJANS
HİZMETLERİ
MOBİL
TEKNOLOJİLER
BIG DATA
OPEN SOURCE
YAZILIM
GELİŞTİRME
EĞİTİM VE
DANIŞMANLIK
MICROSOFT
YAZILIM
GELİŞTİME
SOSYAL MEDYA
CALL CENTER
KURULUMU VE
DANIŞMANLIK
HİZMETLERİ
Call Center
Danışmanlığı
Call Center
Kurulumu
12. www.avaxagroup.comHizmete Özel
SİBER GÜVENLİK
TASARIM VE
AJANS
HİZMETLERİ
MOBİL
TEKNOLOJİLER
BIG DATA
CALL CENTER
KURULUMU VE
DANIŞMANLIK
HİZMETLERİ
OPEN SOURCE
YAZILIM
GELİŞTİRME
EĞİTİM VE
DANIŞMANLIK
MICROSOFT
YAZILIM
GELİŞTİME
SOSYAL MEDYA SİBER
GÜVENLİK
Sızma Testi
Kriptografi
Yazılım
Geliştirme
13. www.avaxagroup.comHizmete Özel
BIG DATA
TASARIM VE
AJANS
HİZMETLERİ
Apache
Hadoop
Veri
Madenciliği
MOBİL
TEKNOLOJİLER
CALL CENTER
KURULUMU VE
DANIŞMANLIK
HİZMETLERİ
OPEN SOURCE
YAZILIM
GELİŞTİRME
EĞİTİM VE
DANIŞMANLIK
MICROSOFT
YAZILIM
GELİŞTİME
SOSYAL MEDYA SİBER
GÜVENLİK
BIG DATA
14. www.avaxagroup.comHizmete Özel
EĞİTİM VE DANIŞMANLIK
TASARIM VE
AJANS
HİZMETLERİ
Kurumsal IT
Danışmanlığı
Uzmanlık
Alanları İle ilgili
Eğitimler
MOBİL
TEKNOLOJİLER
CALL CENTER
KURULUMU VE
DANIŞMANLIK
HİZMETLERİ
OPEN SOURCE
YAZILIM
GELİŞTİRME
MICROSOFT
YAZILIM
GELİŞTİME
SOSYAL MEDYA SİBER
GÜVENLİK
BIG DATA
EĞİTİM VE
DANIŞMANLIK
15. İŞ ODAKLARIMIZ
www.avaxagroup.comHizmete Özel
MOBİL
TEKNOLOJİLER
BIG DATA
MICROSOFT
YAZILIM
GELİŞTİME
SOSYAL MEDYA
SİBER
GÜVENLİK
TASARIM VE
AJANS
HİZMETLERİ
CALL CENTER
KURULUMU VE
DANIŞMANLIK
HİZMETLERİ
OPEN SOURCE
YAZILIM
GELİŞTİRME
EĞİTİM VE
DANIŞMANLIK
iOS
Android
Windows
Phone
Java / GNU C
Python / PHP
Spring
Framework
Debian /
Centos
RedHat
Desktop, Web
& Mobile
Development
Sosyal Medya
Danışmanlığı»
Sosyal Medya
Hesap
Yönetimi
Sosyal Medya
Kampanya
Yönetimi
Web Sitesi /
Web & Mobil
Arayüz Tasarımı
3D Modelleme
& Animasyon
Logo &
Kurumsal Kimlik
Tasarımları
Call Center
Danışmanlığı
Call Center
Kurulumu
Sızma Testi
Kriptografi
Yazılım
Geliştirme
Apache
Hadoop
Veri
Madenciliği
Kurumsal IT
Danışmanlığı
Uzmanlık
Alanları İle ilgili
Eğitimler
16. HAZIR ÇÖZÜMLER
www.avaxagroup.comHizmete Özel
• Social Wifi Çözümü – Sosyal Wifi Yazılımı
• Twitter Takip Yazılımı
• Kurum İçi Özel İletişim YazılımıOnline Video Bazlı
Uzaktan Eğitim Çözümü
• Restoran İçi Sipariş Takip Çözümü
17. DEVAM EDEN PROJELER
www.avaxagroup.comHizmete Özel
• Restoran İçi Sipariş Takip Çözümü ve Otomasyonu
• Online Video Bazlı Uzaktan Eğitim Çözümü
• 3D Sanal Gerçeklik Çözümü (3D Video Gözlük Entegreli)