{"id":8966,"date":"2020-10-27T12:17:35","date_gmt":"2020-10-27T09:17:35","guid":{"rendered":"https:\/\/www.kaspersky.com.tr\/blog\/?p=8966"},"modified":"2020-10-27T12:17:35","modified_gmt":"2020-10-27T09:17:35","slug":"online-training-for-it-specialists","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/online-training-for-it-specialists\/8966\/","title":{"rendered":"G\u00fcvenlik konsolu ile e\u011fitim"},"content":{"rendered":"<p>Piyasada \u00f6zellikle son y\u0131llarda daha dikkat \u00e7ekici hale gelen siber g\u00fcvenlik uzman\u0131 yetersizli\u011fi, 2020\u2019de daha \u00f6nemli bir soruna d\u00f6n\u00fc\u015ft\u00fc. Uzaktan \u00e7al\u0131\u015fmaya yayg\u0131n bir ge\u00e7i\u015fe neden olan salg\u0131n, bir\u00e7ok \u015firkette g\u00fcvenlik stratejilerini de\u011fi\u015ftirme ihtiyac\u0131n\u0131n da alt\u0131n\u0131 \u00e7izmi\u015f oldu. K\u00fc\u00e7\u00fck firmalar bile BT y\u00f6neticilerinin becerilerinin art\u0131k i\u015f s\u00fcreklili\u011fini sa\u011flamak ve kurumsal bilgileri korumak i\u00e7in yeterli olmad\u0131\u011f\u0131n\u0131 fark etti.<\/p>\n<p>Y\u00f6neticiler bir se\u00e7imle kar\u015f\u0131 kar\u015f\u0131ya: Ya ilave bir bilgi g\u00fcvenli\u011fi uzman\u0131 i\u015fe alacaklar, ya da mevcut BT personeline ileri d\u00fczey uzmanl\u0131k e\u011fitimi sa\u011flayacaklar. Her iki yakla\u015f\u0131m da akla yatk\u0131n. \u0130kincisinde ise size yard\u0131mc\u0131 olabiliriz.<\/p>\n<h2>De\u011fi\u015fen tehdit ortam\u0131<\/h2>\n<p>Sosyal izolasyon ve d\u0131\u015far\u0131 \u00e7\u0131kma yasaklar\u0131n\u0131n ba\u015flang\u0131c\u0131ndan bu yana nelerin de\u011fi\u015fti\u011fini en iyi kendi BT y\u00f6neticiniz a\u00e7\u0131klayabilir. Uzaktan \u00e7al\u0131\u015fma s\u00fcrecini \u00e7al\u0131\u015fanlar i\u00e7in uygun hale getirme g\u00f6revi BT departmanlar\u0131na d\u00fc\u015ft\u00fc. \u00c7o\u011fu durumda zorluklar\u0131n \u00fcstesinden gelebildiler; kurumsal bilgi sistemlerine eri\u015fim sa\u011flad\u0131lar, yeni hizmetler kurdular ve \u00e7al\u0131\u015fanlar\u0131n ortaya \u00e7\u0131kan sorunlar\u0131 gidermelerine yard\u0131mc\u0131 oldular.<\/p>\n<p>Ancak sadece birka\u00e7 hafta i\u00e7inde, yeni s\u00fcre\u00e7lerin yeni g\u00fcvenlik mekanizmalar\u0131 gerektirdi\u011fi bir\u00e7ok ki\u015fi taraf\u0131ndan anla\u015f\u0131ld\u0131. Bunun ba\u015fl\u0131ca nedeni, uzaktan eri\u015fim ara\u00e7lar\u0131n\u0131 kaba kuvvetle zorlama giri\u015fimlerinde bir patlama g\u00f6r\u00fclmesine ra\u011fmen, ayn\u0131 zamanda her t\u00fcrden sald\u0131rgan\u0131n aktif hale ge\u00e7erek kimlik av\u0131 mesajlar\u0131 g\u00f6ndermeye ve evden \u00e7al\u0131\u015fan \u00e7al\u0131\u015fanlara BEC sald\u0131r\u0131lar\u0131 ger\u00e7ekle\u015ftirmeye ba\u015flamas\u0131yd\u0131.<\/p>\n<p>\u00c7al\u0131\u015fanlar da durumu daha karma\u015f\u0131k hale getirdi. Kendilerini al\u0131\u015f\u0131lmad\u0131k ve rahats\u0131z edici ortamlarda bulan \u00e7o\u011fu \u00e7al\u0131\u015fan, ekip \u00e7al\u0131\u015fmas\u0131n\u0131 kolayla\u015ft\u0131racak ara\u00e7lar aramaya ba\u015flad\u0131. \u00c7o\u011funlukla bu uygulamalar\u0131n ve hizmetlerin kullan\u0131m\u0131 i\u00e7in BT uzmanlar\u0131ndan onay alma zahmetine girmediler ve bunlar\u0131n g\u00fcvenli\u011fini sa\u011flamak i\u00e7in pek de \u00f6zen g\u00f6stermediler.<\/p>\n<p>Sonu\u00e7 olarak, BT y\u00f6neticileri yaln\u0131z i\u015f yerlerindeki yeni fakt\u00f6rlerle ilgilenmek zorunda kalmad\u0131, ayn\u0131 zamanda uzaktan \u00e7al\u0131\u015fmay\u0131 m\u00fcmk\u00fcn oldu\u011funca g\u00fcvenli hale getirmenin yollar\u0131n\u0131 da d\u00fc\u015f\u00fcnmek zorunda kald\u0131lar. G\u00fcn\u00fcm\u00fcz\u00fcn tehdit ortam\u0131 hakk\u0131nda daha derin bilgilere sahibi olmak ve \u00e7al\u0131\u015fanlar\u0131n uzak i\u015f istasyonlar\u0131nda olup bitenleri daha iyi anlamak \u00e7ok \u00f6nemli hale geldi.<\/p>\n<h2>Nas\u0131l yard\u0131mc\u0131 olabiliriz<\/h2>\n<p>\u00c7al\u0131\u015fanlar\u0131n i\u015f istasyonlar\u0131n\u0131 koruyan Kaspersky Endpoint Security Cloud \u00e7\u00f6z\u00fcm\u00fc, cephaneli\u011fimizdeki temel ara\u00e7lardan biri. Bulutta \u00e7al\u0131\u015ft\u0131\u011f\u0131 ve ek donan\u0131m gerektirmedi\u011fi i\u00e7in BT kaynaklar\u0131na gereksiz bir y\u00fck getirmez. Ayn\u0131 zamanda y\u00f6netici, \u00e7\u00f6z\u00fcm\u00fc tek bir bulut konsolundan y\u00f6netebilir. En son \u00f6zellik g\u00fcncellemelerinden biri, \u00e7al\u0131\u015fanlar\u0131n BT departmanlar\u0131n\u0131 bilgilendirmeden kurumsal verilerle \u00e7al\u0131\u015fmak i\u00e7in kulland\u0131klar\u0131 bulut hizmetleri olan g\u00f6lge BT sistemlerini tespit etme mekanizmas\u0131d\u0131r.<\/p>\n<p>Meslekta\u015flar\u0131m\u0131z \u00e7\u00f6z\u00fcm\u00fc daha da geli\u015ftirmeye devam ediyor. Pek \u00e7ok y\u00f6neticinin modern siber tehditleri tam olarak anlamad\u0131\u011f\u0131n\u0131 g\u00f6ren uzmanlar\u0131m\u0131z, yeni bir deneysel \u00f6zelli\u011fi, do\u011frudan ayn\u0131 konsoldan eri\u015febilece\u011finiz bir e\u011fitim arac\u0131 olan Cybersecurity for IT Online\u2019\u0131 yay\u0131nlad\u0131. Bu e\u011fitim arac\u0131n\u0131n, BT \u00e7\u00f6z\u00fcm y\u00f6neticilerinin bilgilerini, yeni ba\u015flayan bir g\u00fcvenlik uzman\u0131 seviyesine getirdi\u011fini s\u00f6yleyebiliriz.<\/p>\n<p>\u015eu anda e\u011fitim, \u00f6zellikle k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlar\u0131 daha iyi anlamaya odaklan\u0131yor. Kullan\u0131c\u0131lara temel k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m s\u0131n\u0131fland\u0131rmas\u0131n\u0131n yan\u0131 s\u0131ra tehlikeli ve \u015f\u00fcpheli davran\u0131\u015flar\u0131 nas\u0131l tan\u0131yacaklar\u0131n\u0131 \u00f6\u011fretiyor ve sim\u00fcle edilmi\u015f bir ortamda etkile\u015fimli g\u00f6revler sunuyor. B\u00f6ylece \u00f6\u011frenciler bir olay tespit uzman\u0131n\u0131n becerilerini kazan\u0131yor.<\/p>\n<p>\u00d6zellik, \u00e7\u00f6z\u00fcm\u00fcn beta s\u00fcr\u00fcm\u00fcnde uyguland\u0131 ve talep oldu\u011funu g\u00f6rd\u00fc\u011f\u00fcm\u00fcz takdirde uzmanlar\u0131m\u0131z, mevcut derslerin kapsam\u0131n\u0131 geni\u015fletmeye haz\u0131r. Kaspersky Endpoint Security Cloud\u2019un bu s\u00fcr\u00fcm\u00fcndeki bir di\u011fer yenilik de konsoldan eri\u015filebilen \u00fcr\u00fcn video k\u0131lavuzlar. K\u0131lavuzlar, \u00e7al\u0131\u015fanlar\u0131n kitap\u00e7\u0131klar i\u00e7inde kaybolmak zorunda kalmadan yeni \u00e7\u00f6z\u00fcm\u00fc kurmalar\u0131na yard\u0131mc\u0131 oluyor.<\/p>\n<p>Daha fazla bilgi edinmek ve Kaspersky Endpoint Security Cloud\u2019un demo s\u00fcr\u00fcm\u00fcn\u00fc denemek i\u00e7in <a href=\"https:\/\/www.kaspersky.com.tr\/small-to-medium-business-security\/cloud?icid=tr_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder____kescloud___\" target=\"_blank\" rel=\"noopener\">buradan indirebilirsiniz<\/a>.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kes-cloud\">\n","protected":false},"excerpt":{"rendered":"<p>BT ekiplerine, hizmet masalar\u0131na ve di\u011fer teknik a\u00e7\u0131dan geli\u015fmi\u015f personele y\u00f6nelik g\u00fcvenlik e\u011fitimi.<\/p>\n","protected":false},"author":700,"featured_media":8967,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1726,1194],"tags":[2301,1270,2300,1269],"class_list":{"0":"post-8966","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-enterprise","8":"category-business","9":"tag-bulut-guvenligi","10":"tag-egitim","11":"tag-golge-bt","12":"tag-guvenlik-farkindaligi"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/online-training-for-it-specialists\/8966\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/online-training-for-it-specialists\/22031\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/online-training-for-it-specialists\/17512\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/online-training-for-it-specialists\/8674\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/online-training-for-it-specialists\/23498\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/online-training-for-it-specialists\/21684\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/online-training-for-it-specialists\/20363\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/online-training-for-it-specialists\/24115\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/online-training-for-it-specialists\/23129\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/online-training-for-it-specialists\/29322\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/online-training-for-it-specialists\/37402\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/online-training-for-it-specialists\/15844\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/online-training-for-it-specialists\/16320\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/online-training-for-it-specialists\/14073\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/online-training-for-it-specialists\/25583\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/online-training-for-it-specialists\/26253\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/online-training-for-it-specialists\/28342\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/online-training-for-it-specialists\/28164\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/bulut-guvenligi\/","name":"bulut g\u00fcvenli\u011fi"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/8966","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/700"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=8966"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/8966\/revisions"}],"predecessor-version":[{"id":8970,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/8966\/revisions\/8970"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/8967"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=8966"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=8966"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=8966"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}