Dr. Erdal Ozkaya

Dr. Erdal Ozkaya

New York City Metropolitan Area
37K followers 500+ connections

About

With an impressive tenure exceeding over 25 years in IT and security, Dr. Erdal Ozkaya is…

Articles by Dr. Erdal

Activity

Join now to see all activity

Experience

  • MAVeCap Graphic

    MAVeCap

    New York City Metropolitan Area

  • -

  • -

    New York City Metropolitan Area

  • -

    Sydney, New South Wales, Australia

  • -

  • -

  • -

  • -

  • -

    Sydney, Australia

  • -

    Sydney, Australia

  • Company ghost image

    • -

    • -

      Dubai, United Arab Emirates

  • Company ghost image

    • -

      Europe, Middle East & Africa

    • -

      Europe ,Middle East Africa

  • -

    Dubai, United Arab Emirates

  • -

    Australia , Asia Pacific

  • -

    Sydney

  • -

    Australia

  • -

    Australia, China, USA

  • -

    Ankara, Turkey

  • -

    Siegen Area, Germany

Education

  •  Graphic

    -

    -

    The Doctor of Information Technology provides the opportunity for advanced, critical reflection on professional practice in information and communication technology and closely related fields. The Doctor of Information Technology extends knowledge of the discipline of information and communication technology and develops the attributes required to successfully identify, investigate and resolve problems confronting these fields

  • -

    The Master of Computing Research provides the opportunity for critical reflection on professional practice in information and communication technology and closely related fields. Students extend their knowledge of the discipline of information and communication technology and develops the attributes required to successfully identify, investigate and resolve problems confronting these fields. Students carry out research into a current problem confronting information and communication technology…

    The Master of Computing Research provides the opportunity for critical reflection on professional practice in information and communication technology and closely related fields. Students extend their knowledge of the discipline of information and communication technology and develops the attributes required to successfully identify, investigate and resolve problems confronting these fields. Students carry out research into a current problem confronting information and communication technology and present the findings
    •The ability to formulate good research questions in a computing discipline
    •The ability able to critically evaluate the approaches to address research problems
    •The ability to successfully complete a major draft of a literature review for a doctoral dissertation
    •A strong familiarity with the major research issues to be addressed when designing a research methodology for a research study
    •The ability to produce authoritative reports that help solve a problem-White paper

  • -

    -

    The Master of Information Systems Security focuses on the design, implementation and management of secure computer networks and infrastructure. Preparation for the world's leading IT security industry certifications is an integral part of the course.

  • -

    -

    The Bachelor of Information and Communications Technology is a professional three year course that will provide you with solid skills and a knowledge base in ICT. As well as the ability to apply practical solutions across the ICT arena, it will also allow you to develop skills in systems analysis and design, application development, program design, networks, web design, and the implementation of technology.

    As a graduate of the Bachelor of ICT from Western Sydney University, you will be…

    The Bachelor of Information and Communications Technology is a professional three year course that will provide you with solid skills and a knowledge base in ICT. As well as the ability to apply practical solutions across the ICT arena, it will also allow you to develop skills in systems analysis and design, application development, program design, networks, web design, and the implementation of technology.

    As a graduate of the Bachelor of ICT from Western Sydney University, you will be able to:
    investigate – draw on a solid technological and software core of ICT knowledge and practice to analyse and develop current applications integrate – amalgamate knowledge and skills to develop new applications and new application areas innovate - keep up-to-date with the rapid development in technology and practice across ICT and find innovative solutions that move the field forward.

  • -

    -

    This qualification provides the skills and knowledge for an individual to coordinate and administer, as an independent information and communications technology (ICT) specialist or as part of a team, the installation, commissioning and ongoing maintenance of a range of networks, enterprise servers and systems, including internetworking, security and e-business solutions.

  • -

    -

Volunteer Experience

  • Academic Consultant

    Academic Consultant

    NATO

    - Present 8 years 7 months

    Civil Rights and Social Action

    COE-DAT is a NATO accredited multi-national sponsored entity located in Ankara, Turkey, whose membership is open to all NATO members.
    The Centre is composed of 62 multi-national billets with representatives from 8 nations focused on providing key decision-makers with realistic solutions to terrorism and Counterterrorism (CT) challenges. Like the other accredited COEs, COE-DAT is designed to complement NATO's current resources while also serving as NATO's Department Head in Education and…

    COE-DAT is a NATO accredited multi-national sponsored entity located in Ankara, Turkey, whose membership is open to all NATO members.
    The Centre is composed of 62 multi-national billets with representatives from 8 nations focused on providing key decision-makers with realistic solutions to terrorism and Counterterrorism (CT) challenges. Like the other accredited COEs, COE-DAT is designed to complement NATO's current resources while also serving as NATO's Department Head in Education and Training for CT. As such, COE-DAT is charged with ensuring synergy, coordination, and collaboration across this discipline. Since COE-DAT's inauguration in 2005, the Centre has worked in partnership with over 2,327 guest lecturers, conducted 204 educational and training activities on site or through Mobile Training Teams, and hosted over 11,720 participants from 107 countries on a myriad of terrorism and CT topics impacting NATO.

  • Volunteer

    Volunteer

    ISC2 New Jersey Chapter

    Science and Technology

    ISC2 New Jersey Chapter is a 501(c)(3) not-for-profit charitable organization.
    Our chapter’s mission is to disseminate knowledge, exchange ideas, and encourage community outreach efforts, for advancement of information security practice and awareness in our society.
    We also strive to provide enjoyable opportunities for professional networking and growth.

  • Senior Subject Matter Expert

    Senior Subject Matter Expert

    CertNexus

    - 5 years 3 months

    Education

    Logical Operations Certification Subject Matter Expert and Scheme community member for upcoming industry courses which are ANSI and American DoD certified
    - CyberSec First Responder (CFR 201)
    - Cyber Safe
    - and some new courses which is still under NDA 😊

  • Preventing Cyber-bullying

    Preventing Cyber-bullying

    Charles Sturt University

    - Present 12 years 5 months

    Children

    So far I have visit more then 100 schools in Australia, Singapore, United Arab Emirates , Germany & United States talking about the effects of Cyber Bullying and how we can minimize it.
    If you are a principle in a school or a parent which their kids faced similar issues in their school reach out to me and I am more then happy to schedule a visit . If you are not near by don't worry, still reach out as I travel a lot :) I might be near your city in the upcoming days...

  • Partner Skills & Readiness Trainer

    Partner Skills & Readiness Trainer

    Microsoft

    - 5 years

    Science and Technology

    Creation and delivery of technical readiness training for the Microsoft Partner channel on new technologies / upgrades including Windows Server, SharePoint, Windows Client, Exchange Server, Lync and Advanced Windows and Microsoft Networks Security....

    Consulting Microsoft Gold Partners (large scale organizations), in deployment of the new technologies into their organizations.

    Providing in-depth assessments and analysis of customers’ existing technology and processes, and use this…

    Creation and delivery of technical readiness training for the Microsoft Partner channel on new technologies / upgrades including Windows Server, SharePoint, Windows Client, Exchange Server, Lync and Advanced Windows and Microsoft Networks Security....

    Consulting Microsoft Gold Partners (large scale organizations), in deployment of the new technologies into their organizations.

    Providing in-depth assessments and analysis of customers’ existing technology and processes, and use this analysis to help develop a plan on how to align their system with Microsoft best practices. The key philosophy is to enable others to run healthy IT systems.

    This job was performed under CEO IT Training contract ( which I used to own)

  • MCT Advisory Council

    MCT Advisory Council

    Microsoft

    - 2 years 6 months

    Science and Technology

    Microsoft Certified Trainer Asia Pacific Regional lead and member of the MCT council representing the region as Advisory Council Member in Seattle, Washington USA. Sharing real life experiences with Microsoft learning in aid for creation of relevant Microsoft Official Courses for IT Pro’s to attend.

  • Volunteer

    Volunteer

    Center of technical aid for disabled people under Ministry of Social security and Labour

    - 6 years

    Children

    http://www.tadaustralia.org.au/

Licenses & Certifications

Publications

  • Global Trends in AI

    Trends Research & Advisory

    . Artificial Intelligence and the Fifth Industrial Revolution
    2. Governance of Artificial Intelligence
    3. Artificial Intelligence and Global Economic Challenges
    4. Artificial Intelligence and Cybersecurity
    5. Artificial Intelligence in the Face of Conflicts and Peacebuilding
    6. Artificial Intelligence and Healthcare
    7. Artificial Intelligence and Education

  • Cybersecurity Leadership Demystified

    Packt Publishing

    Gain useful insights into cybersecurity leadership in a modern-day organization with the help of use cases

    Key Features
    Discover tips and expert advice from the leading CISO and author of many cybersecurity books
    Become well-versed with a CISO's day-to-day responsibilities and learn how to perform them with ease
    Understand real-world challenges faced by a CISO and find out the best way to solve them

    See publication
  • Incident Response in the age of Cloud

    Packt

    Cybercriminals are always in search of new methods and ways to infiltrate systems. Quickly responding to an incident should help an organization minimize its losses, decrease vulnerabilities, and rebuild services and processes. An organization without knowledge of how to effectively implement key Incident Response (IR) best practices is highly prone to cyber-attacks.

    In the wake of the COVID-19 pandemic, with most organizations gravitating towards remote working and the cloud, this book…

    Cybercriminals are always in search of new methods and ways to infiltrate systems. Quickly responding to an incident should help an organization minimize its losses, decrease vulnerabilities, and rebuild services and processes. An organization without knowledge of how to effectively implement key Incident Response (IR) best practices is highly prone to cyber-attacks.

    In the wake of the COVID-19 pandemic, with most organizations gravitating towards remote working and the cloud, this book provides updated IR processes to address the associated security risks.

    The book begins by introducing you to the cybersecurity landscape and explaining why IR matters. You will understand the evolution of IR, current challenges, key metrics, and the composition of an IR team, along with an array of methods and tools used in an effective IR process. You will then learn how to apply this conceptual toolkit, with discussions on incident alerting, handling, investigation, recovery, and reporting.

    As you progress through the book, you will cover governing IR on multiple platforms and sharing cyber threat intelligence. You will then thoroughly explore the entire spectrum of procedures involved in IR in the cloud – the challenges, opportunities, and how to handle a phishing incident.

    Further, you’ll learn how to build a proactive incident readiness culture, learn and implement IR best practices, and explore practical case studies using tools from Keepnet Labs and Binalyze. Finally, the book concludes with an “Ask the Experts” section where industry experts have provided their perspective on diverse topics in the IR sphere.

    By the end of this book, you should become proficient at building and applying IR strategies pre-emptively and confidently.

    Publication date:
    February 2021
    Publisher
    Packt
    Pages
    622
    ISBN
    9781800569218

    See publication
  • Cybersecurity – Attack and Defense Strategies - Second Edition

    Packt Publishing

    Updated and revised edition of the bestselling guide to developing defense strategies against the latest threats to cybersecurity

    See publication
  • Siber Güvenlik:Saldırı ve Savunma Stratejileri

    Buzdagi Yayinevi

    My Book in Turkish

    See publication
  • Inside the Dark Web

    CRC Press

    nside the Dark Web provides a broad overview of emerging digital threats and computer crimes, with an emphasis on cyberstalking, hacktivism, fraud and identity theft, and attacks on critical infrastructure. The book also analyzes the online underground economy and digital currencies and cybercrime on the dark web. The book further explores how dark web crimes are conducted on the surface web in new mediums, such as the Internet of Things (IoT) and peer-to-peer file sharing systems as well as…

    nside the Dark Web provides a broad overview of emerging digital threats and computer crimes, with an emphasis on cyberstalking, hacktivism, fraud and identity theft, and attacks on critical infrastructure. The book also analyzes the online underground economy and digital currencies and cybercrime on the dark web. The book further explores how dark web crimes are conducted on the surface web in new mediums, such as the Internet of Things (IoT) and peer-to-peer file sharing systems as well as dark web forensics and mitigating techniques.

    This book starts with the fundamentals of the dark web along with explaining its threat landscape. The book then introduces the Tor browser, which is used to access the dark web ecosystem. The book continues to take a deep dive into cybersecurity criminal activities in the dark net and analyzes the malpractices used to secure your system. Furthermore, the book digs deeper into the forensics of dark web, web content analysis, threat intelligence, IoT, crypto market, and cryptocurrencies. This book is a comprehensive guide for those who want to understand the dark web quickly.

    See publication
  • Cybersecurity: The Beginner's Guide

    Packr

    It's not a secret that there is a huge talent gap in the cybersecurity industry. Everyone is talking about it including the prestigious Forbes Magazine, Tech Republic, CSO Online, DarkReading, and SC Magazine, among many others. Additionally, Fortune CEO's like Satya Nadella, McAfee's CEO Chris Young, Cisco's CIO Colin Seward along with organizations like ISSA, research firms like Gartner too shine light on it from time to time.

    This book put together all the possible information with…

    It's not a secret that there is a huge talent gap in the cybersecurity industry. Everyone is talking about it including the prestigious Forbes Magazine, Tech Republic, CSO Online, DarkReading, and SC Magazine, among many others. Additionally, Fortune CEO's like Satya Nadella, McAfee's CEO Chris Young, Cisco's CIO Colin Seward along with organizations like ISSA, research firms like Gartner too shine light on it from time to time.

    This book put together all the possible information with regards to cybersecurity, why you should choose it, the need for cyber security and how can you be part of it and fill the cybersecurity talent gap bit by bit. Starting with the essential understanding of security and its needs, we will move to security domain changes and how artificial intelligence and machine learning are helping to secure systems. Later, this book will walk you through all the skills and tools that everyone who wants to work as security personal need to be aware of. Then, this book will teach readers how to think like an attacker and explore some advanced security methodologies. Lastly, this book will deep dive into how to build practice labs, explore real-world use cases and get acquainted with various cybersecurity certifications.

    By the end of this book, readers will be well-versed with the security domain and will be capable of making the right choices in the cybersecurity field.

    See publication
  • Korean :사이버 보안 [레드팀 및 블루팀 전략]

    Our Award-winning - best seller book translated to Korean

    See publication
  • Hands On Cybersecurity for Finance

    Packt Publishing

    Organizations have always been a target of cybercrime. Hands-On Cybersecurity for Finance teaches you how to successfully defend your system against common cyber threats, making sure your financial services are a step ahead in terms of security.

    The book begins by providing an overall description of cybersecurity, guiding you through some of the most important services and technologies currently at risk from cyber threats. Once you have familiarized yourself with the topic, you will…

    Organizations have always been a target of cybercrime. Hands-On Cybersecurity for Finance teaches you how to successfully defend your system against common cyber threats, making sure your financial services are a step ahead in terms of security.

    The book begins by providing an overall description of cybersecurity, guiding you through some of the most important services and technologies currently at risk from cyber threats. Once you have familiarized yourself with the topic, you will explore specific technologies and threats based on case studies and real-life scenarios. As you progress through the chapters, you will discover vulnerabilities and bugs (including the human risk factor), gaining an expert-level view of the most recent threats. You'll then explore information on how you can achieve data and infrastructure protection. In the concluding chapters, you will cover recent and significant updates to procedures and configurations, accompanied by important details related to cybersecurity research and development in IT-based financial services.

    By the end of the book, you will have gained a basic understanding of the future of information security and will be able to protect financial services and their related infrastructures.

    Other authors
    See publication
  • Learn Social Engineering

    Packt

    The literature in the book can begin with understanding the concept and the whole idea behind “SOCIAL ENGINEERING” as to what it entirely compasses about and what the objective behind understanding the same is to ward off popular social engineering attacks such as Baiting, Phishing, Pretexting, Spear Phishing, Scareware and so on. Hence it becomes extremely important that we are vary of these attacks and know how to penetrate and test it.
    This book will initially start with the concept of…

    The literature in the book can begin with understanding the concept and the whole idea behind “SOCIAL ENGINEERING” as to what it entirely compasses about and what the objective behind understanding the same is to ward off popular social engineering attacks such as Baiting, Phishing, Pretexting, Spear Phishing, Scareware and so on. Hence it becomes extremely important that we are vary of these attacks and know how to penetrate and test it.
    This book will initially start with the concept of Social Engineering, different types of Social Engineering attacks, and the damages caused by Social Engineering attacks. Then we will set up the lab environment to use different toolkits and then perform social engineering steps such as information gathering, generating evil files and so on. We will also explore different tools used for doing social engineering such as Social Engineering toolkit. Towards the end of this book, we will learn how to design a threat model prominent in securing our information from Social Engineering threat attacks.
    By the end of the book, you will be in a position to protect your system from social engineering threats and attacks.

    See publication
  • The Use of Social Media for Terroism

    NATO , Defence Against Terrorisim Review

    This article goes through the ways in which terrorists have been exploiting
    social media. It explains how terrorist propaganda litters the internet and how terrorist
    groups are recruiting new fighters on social media with special interest on Westerners.
    The article also goes through how the increased encryption of social media platforms
    has made them ideal for terrorists to use to communicate. Lastly, the article discusses
    how terrorists have been capitalizing on social media to…

    This article goes through the ways in which terrorists have been exploiting
    social media. It explains how terrorist propaganda litters the internet and how terrorist
    groups are recruiting new fighters on social media with special interest on Westerners.
    The article also goes through how the increased encryption of social media platforms
    has made them ideal for terrorists to use to communicate. Lastly, the article discusses
    how terrorists have been capitalizing on social media to fulfill their attention-seeking
    goals. It also brings to light some complementary functions of the dark web to achieve
    goals that are unattainable on social media. The article ends by suggesting aggressive
    measures that can be taken by users, governments and social media platforms to bring
    an end to terrorism on both social media and the dark web

    See publication
  • 2017 Higher Degree Research Symposium "Book of Short Papers"

    Charles Sturt University

    This paper goes through the increasingly controversial issue of the exploitation of social media to spread
    fake news. It shows an elaborate method used by fake news peddlers to reach out to users. It discusses the eminent dangers of fake news and propaganda stories. Lastly, it highlights actions that governments, social media companies and users can take to curb the spread of fake news.
    ISBN: 978-1-86-467304-3

  • Privacy in Social Media,

    13th International Conference on Security and Privacy in Communication Networks

    Erdal Ozkaya and Rafiqul Islam (2017)Privacy in social media, 13th International Conference on Security and Privacy in Communication Networks, Niagara Falls, Canada.


  • Security and Privacy in Communication Networks

    Springers

    This book constitutes the refereed proceedings of two workshops held at the 13th International Conference on Security and Privacy in Communications Networks, SecureComm 2017, held in Niagara Falls, ON, Canada, in October 2017: the 5th International Workshop on Applications and Techniques in Cyber Security, ATCS 2017, and the First Workshop on Security and Privacy in the Internet Of Thing

    My Research: (my section of the book)
    This paper researched two issues; targeted advertising and…

    This book constitutes the refereed proceedings of two workshops held at the 13th International Conference on Security and Privacy in Communications Networks, SecureComm 2017, held in Niagara Falls, ON, Canada, in October 2017: the 5th International Workshop on Applications and Techniques in Cyber Security, ATCS 2017, and the First Workshop on Security and Privacy in the Internet Of Thing

    My Research: (my section of the book)
    This paper researched two issues; targeted advertising and politics in social media. In its findings, it was apparent that many social media platforms actively collected user data and used big data to store and analyze it so as to profile the users. From these profiles, targeted adverts were served to the users on their social media feeds. The data collection process was however found to be unethical and full of privacy intrusions. Concerning politics, it was found out that social media had been used as a political tool. There were findings that most users were annoyed with political posts being shown on their feeds. The culprits were found to be the algorithms behind social media feeds and suggestions and the users themselves. The paper gave recommendations said to be temporary solutions for the issues surrounding target advertising and politics in social media.

    See publication
  • Cybersecurity Issues

    IEEE

  • Cybersecurity: Attack and Defense Strategies

    Packt

    The book will start with the initial Incident Response process, moving to Red Team tactics, where you will learn the basic syntax for commonly used Windows and Linux tools to perform the necessary operations. You will also gain hands-on experience of using the new red team techniques with powerful tools like python and PowerShell which will enable you to find out vulnerabilities in your system and mediums to exploit them. Moving on, you will learn how to compromise a system, hack the user’s…

    The book will start with the initial Incident Response process, moving to Red Team tactics, where you will learn the basic syntax for commonly used Windows and Linux tools to perform the necessary operations. You will also gain hands-on experience of using the new red team techniques with powerful tools like python and PowerShell which will enable you to find out vulnerabilities in your system and mediums to exploit them. Moving on, you will learn how to compromise a system, hack the user’s identity, and the various tools used by the red team to find vulnerabilities in a system.
    In the next section, you will learn about the defense strategies followed by the blue team to enhance the overall security of a system. You will also learn about an in depth strategy to ensure that there are security controls in each network layer and ways in which you can carry out the recovery process of a compromised system. Finally, you will learn how to create a vulnerability management strategy and the different techniques for manual log analysis.
    By the end of this book, you will be well-versed with Red and Blue team techniques and will learn military grade security aspects of attacking and defending a system.

    Other authors
    See publication
  • Social Media Privacy Issues

    EAI International Conference on Security and Privacy

    Proceedings of 13th EAI International Conference on Security and Privacy in Communication Networks

  • Fight Against Cyber-Crime , experience from the filed

    NATO

    Fight Against Cyber-Crime , experince from the filed

    See publication
  • CyberSec First Responder

    Logical Operations

    By taking an approach where an understanding of the anatomy of an attack is developed, the CyberSec First Responder (CFR) cyber security certification validates individuals have the high-stakes skills needed to serve their organizations before, during, and after a breach.
    A CyberSec First Responder is the first line of defense against cyber attacks that can cost an organization valuable time and money. The CyberSec First Responder cyber security training and certification program will…

    By taking an approach where an understanding of the anatomy of an attack is developed, the CyberSec First Responder (CFR) cyber security certification validates individuals have the high-stakes skills needed to serve their organizations before, during, and after a breach.
    A CyberSec First Responder is the first line of defense against cyber attacks that can cost an organization valuable time and money. The CyberSec First Responder cyber security training and certification program will prepare security professionals to become the first responders who defend against cyber attacks by teaching students to analyze threats, design secure computing and network environments, proactively defend networks, and respond/investigate cyber security incidents

    See publication
  • Getting Started in Cybersecurity

    CRC

    This book is a guide for you on everything you should know about cybersecurity. The book helps you understand what cyber security is, and the various ways organizations and governments can stay safe from cyber-attacks. Implementing application security is a major approach to countering cyber-attacks. This is the security organizations’ and governments’ implement on the hardware and software components they are using.

    The various ways to implement this kind of security are discussed in…

    This book is a guide for you on everything you should know about cybersecurity. The book helps you understand what cyber security is, and the various ways organizations and governments can stay safe from cyber-attacks. Implementing application security is a major approach to countering cyber-attacks. This is the security organizations’ and governments’ implement on the hardware and software components they are using.

    The various ways to implement this kind of security are discussed in this book. Information should also be protected against cyber-attacks. The protection of information should be geared towards achieving confidentiality, integrity, and availability. The various ways to achieve these are explored. Computer networks should also be secured so that attacks from network intruders can be thwarted. This requires the use of multiple approaches.

    These approaches have been explored in this book. Organizations and governments may be attacked by cybercriminals. Such attacks can cripple the operations of the organization or the government.

    There is a way for these parties to ensure that they have implemented recovery mechanisms, or ensure that their operations will keep on running despite such attacks. This book explores this in details and how to achieve it. States should also stay protected against cyberwar.

    You will learn how to defining cybersecurity
    Familiar your self with available tools and how you can use them
    Improving your cyber defense skills
    Protecting your personal stuff
    Learn the current cybersecurity landscape
    Learn how  to handle a breach for beginners
    Tips for planning ahead of your cyber career 
    Careers in cybersecurity

    “Learn the Basics of Cybersecurity"

    See publication
  • EC Council CAST (Center for Advanced Security Training) courseware co Author

    EC Council

    EC-Council’s Center for Advanced Security Training (CAST) was created to address the need for highly technical and Advanced Security Training for information security professionals. CAST programs stand out from others thorough their extreme hands-on approach. These highly technical, lab intensive Advanced Security Training courses will allow a participant to combat real life scenarios

    See publication
  • 20410C Installing and Configuring Windows Server 2012 R2

    Microsoft

    Get hands-on instruction and practice installing and configuring Windows Server 2012, including Windows Server 2012 R2, in this 5-day Microsoft Official Course. This course is part one in a series of three courses that provides the skills and knowledge necessary to implement a core Windows Server 2012 infrastructure in an existing enterprise environment.


    The three courses collectively cover implementing, managing, maintaining and provisioning services and infrastructure in a Windows…

    Get hands-on instruction and practice installing and configuring Windows Server 2012, including Windows Server 2012 R2, in this 5-day Microsoft Official Course. This course is part one in a series of three courses that provides the skills and knowledge necessary to implement a core Windows Server 2012 infrastructure in an existing enterprise environment.


    The three courses collectively cover implementing, managing, maintaining and provisioning services and infrastructure in a Windows Server 2012 environment. Although there is some cross-over of skills and tasks across these courses, this course primarily covers the initial implementation and configuration of core services, such as Networking, Storage, Active Directory Domain Services (ADDS), Group Policy, File and Print services, and Hyper-V.


    This course maps directly to and is the preferred choice for hands-on preparation for Microsoft Certified Solutions Associate (MCSA) Exam 410:Installing and Configuring Windows Server 2012, which is the first of three exams required for MCSA: Windows Server 2012 certification.


    NOTE: Labs in this course are based on the General Availability release of Windows Server 2012 R2 and Windows 8.1.

    Other authors
    See publication
  • 20411C Administering Windows Server 2012 Courseware

    Microsoft

    This course is intended for Information Technology (IT) Professionals with hands on experience working in a Windows server 2008 or Windows Server 2012 environment who wish to acquire the skills and knowledge necessary to be able to manage and maintain the core infrastructure required for a Windows Server 2012 and Windows Server 2012 R2 environment. The key focus for students is to broaden the initial deployment of Windows Server 2012 services and infrastructure and provide the skills necessary…

    This course is intended for Information Technology (IT) Professionals with hands on experience working in a Windows server 2008 or Windows Server 2012 environment who wish to acquire the skills and knowledge necessary to be able to manage and maintain the core infrastructure required for a Windows Server 2012 and Windows Server 2012 R2 environment. The key focus for students is to broaden the initial deployment of Windows Server 2012 services and infrastructure and provide the skills necessary to Manage and Maintain a domain based Windows Server 2012 environment, providing skills in areas such as User and Group management, Network Access and Data Security. Candidates typically interested in attending this course would be

    •Windows Server Administrators experienced in working with Windows Server 2008 or Windows Server 2012 who wish to gain skills necessary to perform daily management and maintenance tasks in a Windows Server 2012 or Windows Server 2012 R2 environment.
    •IT Professionals who are looking to take the 411, Administering Windows Server 2012 exam
    •IT professional wishing to take the Microsoft Certified Solutions Expert (MCSE) exams in DataCenter, Desktop Infrastructure, Messaging, Collaboration and Communications will also be interested in taking this course as they prepare for the Microsoft Certified Solutions Associate (MCSA) exams, which are a pre-requisite for their individual specialties.

    Other authors
    See publication
  • 20417C Upgrading Your Skills to MCSA Windows Server 2012

    Microsoft



    This course is intended for Information Technology (IT) Professionals who are experienced Windows Server 2008 or Windows Server 2008 R2 system administrators who are familiar with carrying out day to day Windows Server management and maintenance tasks. The course will update their skills to Windows Server 2012 and Windows Server 2012 R2. Candidates suitable for this course would be:
    •Experienced Windows Server Administrators who have real world experience working in a Windows Server…



    This course is intended for Information Technology (IT) Professionals who are experienced Windows Server 2008 or Windows Server 2008 R2 system administrators who are familiar with carrying out day to day Windows Server management and maintenance tasks. The course will update their skills to Windows Server 2012 and Windows Server 2012 R2. Candidates suitable for this course would be:
    •Experienced Windows Server Administrators who have real world experience working in a Windows Server 2008 or Windows Server 2008 R2 enterprise environment
    •IT professionals who have obtained the credential Microsoft Certified Solutions Associate (MCSA) Windows Server 2008 or have equivalent knowledge
    •IT professional wanting to take the Microsoft Certified Solutions Expert (MCSE) exams in Data Center, Desktop Infrastructure, Messaging, Collaboration, and Communications will also be interested in taking this course as they prepare for the Microsoft Certified Solutions Associate (MCSA) exams, which are a pre-requisite for their individual specialties



    At Course Completion


    After completing this course, students will be able to:
    •Install and configure Windows Server 2012.
    •Manage Windows Server 2012 by using Windows PowerShell.
    •Manage storage in Windows Server 2012.
    •Implement network services.
    •Implement remote access.
    •Implement Failover Clustering.
    •Implement Hyper-V.
    •Implement Failover Clustering with Hyper-V.
    •Implementing secure data access for users and devices.
    •Implement Active Directory Domain Services (AD DS).
    •Implement Active Directory Federation Services (AD FS).
    •Monitor and maintain Windows Server 2012.

    Other authors
    See publication
  • Advanced Windows Defence

    AusCERT

    An advanced Windows Defence / Security courseware. First presented in the Australian Computer Emergency Response Team (AusCERT) conference .
    http://conference.auscert.org.au/conf2012/tutorial_Erdal_Ozkaya.html

    Other authors
    • www.advancedwindowsdefence.com
    See publication
  • Windows Intune

    Microsoft

    www.microsoft.com/intune

    See publication
  • My Blog

    www.erdalozkaya.com

    My Technical Articles which will be about Microsoft technologies specially Windows . Security, will be also covered in depth, from Ethical Hacking to Penetration Testing and reviews...

    Other authors
    • www.YourMCT.com
    See publication
  • Hands on Cybersecurity for Finance

    Packt

    A comprehensive guide to overcoming financial cyber threats
    Book Description
    Financial organizations has always been on top of the list of most frequent cybercrime.This book's main goal is to teach you to increase the level of scrutiny, making sure your financial services are a step ahead in terms of security.
    What You Will Learn
    Understand the threats to a financial organization.
    Learn to identify the attackers.
    Learn to do Vulnerability Assessment, software testing…

    A comprehensive guide to overcoming financial cyber threats
    Book Description
    Financial organizations has always been on top of the list of most frequent cybercrime.This book's main goal is to teach you to increase the level of scrutiny, making sure your financial services are a step ahead in terms of security.
    What You Will Learn
    Understand the threats to a financial organization.
    Learn to identify the attackers.
    Learn to do Vulnerability Assessment, software testing, Penetration Test, Code Analysis.
    Explore the different ways that you will use to defend your financial cyberspace using different Mitigation techniques, remediation plans etc.
    Perform actions like encryption and decryption.
    Understand how AI will affect cybersecurity.

    The book begins by providing an overall description of Cyber-security. Later, the book will guide you through some of the most important services and technologies currently under the fire of cyber threats. There will be a deep and detailed analysis of specific technologies and threats which will be based on study cases and real-life scenarios. Vulnerabilities, bugs, including the human risk factor will be dissected to provide you with an expert level view of the most recent threats.

    The book then deep dives into providing information on how to achieve data and infrastructure protection. A significant update on procedures and configuration, accompanied by important details related to research and development of cyber-security on IT infrastructure working on financial services. The book will end by providing an outlook on the future, an attempted forecast regarding the future of information security, to protect financial services and related infrastructures.

    See publication
  • Learn dark Web - Fundamentals of Dark Web

    -

    Your one stop guide to intrude the Dark web and build a cybersecurity plan

    Key Features
    Get up and running with the core concept of Dark Web
    Learn how to mitigate cyberattacks happening through Dark Web
    Integrate the Dark web ecosystem with cutting edge areas like IoT, Forensics, and threat intelligence and so on.
    Book Description
    Dark web is an internet content that exist in the World Wide Web ecosystem but is only accessible through specific software/browser. The…

    Your one stop guide to intrude the Dark web and build a cybersecurity plan

    Key Features
    Get up and running with the core concept of Dark Web
    Learn how to mitigate cyberattacks happening through Dark Web
    Integrate the Dark web ecosystem with cutting edge areas like IoT, Forensics, and threat intelligence and so on.
    Book Description
    Dark web is an internet content that exist in the World Wide Web ecosystem but is only accessible through specific software/browser. The anonymity around Dark web paves way to plenty of illegal activities leading to cyber-attacks. Having a sound knowledge around Dark web will act as a important skill for cybersecurity professionals.

    This book will start with the fundamentals of Dark Web along with explaining the threat landscape of Dark Net. Then we will introduce the Tor browser, which is used to access the Dark web ecosystem. Then we will deep dive into cybersecurity criminal activities in the dark net and we will deep dive into analyzing the malpractices used to secure your system. We will also dig deeper into forensics of dark web, web content analysis, threat intelligence, internet of things, crypto market and cryptocurrencies.

    This book will act as a comprehensive guide for those who wants to understand Dark right from the scratch.

    What you will learn
    Learn theoretical and cross-disciplinary approaches to the dark web
    Analyze the growth of the dark web in the context of emerging crime threats;
    Handle the cybercriminal activity through technological and social engineering methods;
    Understand the impact of cybercrime and defensive techniques against cybercrime.
    Work with ToR browser
    Get acquainted with most recent case studies on Dark Net
    Who This Book Is For
    This book is targeted towards cybersecurity professionals or aspiring cybersecurity enthusiast who wants to upgrade their skills by understanding the concept of Dark Web.

    See publication
  • Siber Guvenlik: Saldiri ve Savunma Stratejileri

    -

    Turkish Book co authored with very well known experts from Turkey, details will be added soon , expected to be published October 2018

    Other authors

Courses

  • Advanced Networking Technologies

    -

  • Securing Networks

    -

  • Business Management

    -

  • Financial Management for Business Owners

    -

Honors & Awards

  • International Cyber Warfare Award

    Turkish Cybersecurity Cluster

  • IT Blog Awards - Top 5

    Cisco

    Cisco Top 5 IT Blogs winners
    Cisco has received hundreds of submissions from across the globe and in a multitude of languages. With the help of community votes, they selected the top IT blogs, podcasts and videos of 2021. And I am extremally proud to announce that my blog made it to the TOP 5 IT blogs Globally. This would not happen with out your support. Thank you very much for everyone who has voted, as I always say, BETTER TOGETHER <3

    Dr Erdal Ozkaya

  • IT Blog Awards - Finalist

    Cisco

    The IT Blog Awards, hosted by Cisco, recognizes excellence in the blogging, vlogging, and podcasting communities for work done throughout the year.

  • Microsoft Most Valuable Professional

    Microsoft

    https://mvp.microsoft.com/

  • Top Global Enterprise CIO

    ICMG

  • Best CISO for Baking and Financial Sector

    Global CIO Forum

    I have been awarded as “Best CISO in Banking and Finance “ by GEC MEDIA GROUP and Global CIO Forum
    I am truly honored to win this award.

    Thank you

    Erdal

  • Certified Ethical Hacker - Hall of Fame

    EC Council

    CEH Hall of Fame

  • Most Powerful 10 Middle East Businessman 2021

    Tycoon Success Magazine

    I am proud to announce that I have been shortlisted by TYCOON SUCCESS Magazine as the “Most Powerful 10 Middle East Businessman 2021”

    Thank you

  • Top 50 Technology Leaders

    CIO Online

    CIO Online and IDC Top 50 Technology Leaders for Middle East

  • Cybersecurity Ambassadors

    Rochesten Cybersecurity Training and Awareness

  • Cyber Sentinel Award 2020 Global

    Enterprise IT

  • Legend by Global CIO Forum

    Global CIO Forum

  • Business Leadership Award

    IAG

  • CISO 50 Security Leader Award Winner by CPI Media Group

    Security ME magazine by CPI Media

    TOP CISO for the region

  • Comodo Community Trusted Advisor

    Comodo

  • Global Future Security Leader

    -

    I am proud to announce that I have been awarded by GEC Media and GCF as, Global Future Security Leader and TOP CISO .

    I am thankful to GEC Media Group as well as everyone who helped me in this journey. Special thanks to all my coworkers at Standard Chartered Bank for their support and of the wonderful Cyber Community that I am part of.

  • Global Future Security Leader Awards

    GEC Media

  • Microsoft Regional Director

    Microsoft

    The Regional Director Program provides Microsoft leaders with the customer insights and real-world voices it needs to continue empowering developers and IT professionals with the world's most innovative and impactful tools, services, and solutions.


    Regional Directors act in a non-paid advisory capacity with Microsoft. On an ongoing basis, RDs are asked to participate in scheduled strategic feedback sessions with Microsoft senior leadership teams. Because of their community leadership…

    The Regional Director Program provides Microsoft leaders with the customer insights and real-world voices it needs to continue empowering developers and IT professionals with the world's most innovative and impactful tools, services, and solutions.


    Regional Directors act in a non-paid advisory capacity with Microsoft. On an ongoing basis, RDs are asked to participate in scheduled strategic feedback sessions with Microsoft senior leadership teams. Because of their community leadership positions, passion, commitment to technology and business excellence, RDs have a regular outlet where they can express real-time customer and community feedback directly with Microsoft engineers and the senior leadership team, including Satya.

  • CISO Power List

    Khaleeje Times

    Khaleeje Times is Middle East's biggest news agency

  • Cybersecurity Legend

    GEC Media

    GEC Media 2019 Awards recognizes 10 path-breaking professionals that have redefined Cybersecurity to its core. The global awards will be segmented into multiple categories, which include:
    - Legend
    - Master
    - DX Inspire

  • Cybersecurity Influencer of the year

    EC Council

    Influencers are the people who many people through their social media accounts and have the potential to exert influence. At CISO MAG Awards, we recognize influencers who have raised cyber security awareness and inspired their followers on social media through inspirational posts.

  • Hall of Fame

    EC Council

    An individual which is an executive who had a vision and leadership to create the fundamental building blocks for the Information security

    This is a very auspicious moment for me to announce one more milestone in my career:

    It’s a great honor for me to be given accolades and award for being part of EC Council Hall of Fame and CISO Magazine Cybersecurity Influencer of the year

    First of all special thank you, to the jury for selecting me, to CISO Magazine for making this…

    An individual which is an executive who had a vision and leadership to create the fundamental building blocks for the Information security

    This is a very auspicious moment for me to announce one more milestone in my career:

    It’s a great honor for me to be given accolades and award for being part of EC Council Hall of Fame and CISO Magazine Cybersecurity Influencer of the year

    First of all special thank you, to the jury for selecting me, to CISO Magazine for making this happen and EC Council for valuing Individuals in the field for this honour and awarding me.

    I am grateful to everyone who has always been a part of my journey, from my family to friends, from bosses to my team my mentors ( and everyone who is supporting me in the journey.

    It is a pleasure to witness this beautiful moment in the presence of you all. On back end there are many hours of hard work, sleepless nights along with the great power of God who have enabled me to put in efforts and make me capable of getting this award. Each one of you has enabled me to bring the ideas into reality. My strength always increased on dealing with the challenges and overcoming them.

    Thank you

    Erdal

  • Top 100 Information Security Blogs

    FeedSpot.com

    I am really feeling very proud and thank full for all your support.

    This blog made it to the 84th spot in the Top 100 Cybersecurity Blogs and Webs Blogs for IT Pro’s.

    My Blog is included in the Feedspot Top 100 Cybersecurity Blogs and Webs Blogs for IT Pro’s!
    The blogs included in the list, which came from a pool of thousands of other infosec blogs, were ranked based on the following criteria:

    Google reputation and Google search ranking
    Influence and popularity on…

    I am really feeling very proud and thank full for all your support.

    This blog made it to the 84th spot in the Top 100 Cybersecurity Blogs and Webs Blogs for IT Pro’s.

    My Blog is included in the Feedspot Top 100 Cybersecurity Blogs and Webs Blogs for IT Pro’s!
    The blogs included in the list, which came from a pool of thousands of other infosec blogs, were ranked based on the following criteria:

    Google reputation and Google search ranking
    Influence and popularity on Facebook, Twitter and other social media sites
    Quality and consistency of posts
    Feedspot’s editorial team and expert review
    I am delighted to be recognized as one of the best sources of security information, news, and of course, training – and I am thankful for getting www.ErdalOzkaya.com this shiny new badge.

    The Best Cyber Security blogs from thousands of top Cyber Security blogs in our index using search and social metrics.

    FeedSpot.com

  • Cyber Security Professional of the Year

    GEC Media

    As the threat landscape becomes increasingly vulnerable with each passing day, there is no end to innovation and no limit to betterment when it comes to enterprise security solutions. The Cyber Sentinels Security Awards 2019 recognize the hard taskmasters of security in the digital enterprises and felicitate their unwavering commitment towards their organization’s security infrastructure.

    The award recognizes the top Security Professionals who are using technology to secure critical…

    As the threat landscape becomes increasingly vulnerable with each passing day, there is no end to innovation and no limit to betterment when it comes to enterprise security solutions. The Cyber Sentinels Security Awards 2019 recognize the hard taskmasters of security in the digital enterprises and felicitate their unwavering commitment towards their organization’s security infrastructure.

    The award recognizes the top Security Professionals who are using technology to secure critical business information assets and minimize risk while delivering business value. The award ceremony is a platform to showcase their achievements, share their expertise and knowledge.

  • 42 Best Social Engineering Books of All Time

    Book Authority

    It’s amazing to see that real effort does not go to waste…

    My book “Learn Social Engineering” has made it to Book Authority’s BEST BOOKS OF ALL TIME…

    I’m extremely thankful to all my friends who have contributed to ask the expert section. Thank you again:

    Troy, Jonathan, Raymond, Paula, Andy, Hasain, Marcus, Ozan, Emre, Sami, Aryeh, Chris, Oguzhan, Leyla, Daniel, Raif, Milad, Yalkin, George, Mitko and Sükrü

    This is my second book who got this award, and I am thankful…

    It’s amazing to see that real effort does not go to waste…

    My book “Learn Social Engineering” has made it to Book Authority’s BEST BOOKS OF ALL TIME…

    I’m extremely thankful to all my friends who have contributed to ask the expert section. Thank you again:

    Troy, Jonathan, Raymond, Paula, Andy, Hasain, Marcus, Ozan, Emre, Sami, Aryeh, Chris, Oguzhan, Leyla, Daniel, Raif, Milad, Yalkin, George, Mitko and Sükrü

    This is my second book who got this award, and I am thankful for everyone who is giving feedbacks..

    regards

    Erdal

  • Book Authority Best Cybersecurity book of all times

    Book Authority

    Based on Books Authority our “Cybersecurity Attack and Defense Strategies” Book which I co authored with my dear friend Yuri Diogenes is selected as number 2 in “34 Best Network Security Books of All Time” . This is really great news, we worked hard its always great to see an outcome like that.

    We would like to THANK all of you who made this possible

    You can buy our book from…

    Based on Books Authority our “Cybersecurity Attack and Defense Strategies” Book which I co authored with my dear friend Yuri Diogenes is selected as number 2 in “34 Best Network Security Books of All Time” . This is really great news, we worked hard its always great to see an outcome like that.

    We would like to THANK all of you who made this possible

    You can buy our book from Amazon

    https://www.amazon.com/Cybersecurity-Defense-Strategies-Infrastructure-security/dp/1788475291

    From the publisher (Packt)

    https://www.packtpub.com/networking-and-servers/cybersecurity-attack-and-defense-strategies
    or in any book retailer , who has online store

    To see the ranking on Books Authority :
    https://bookauthority.org/books/best-network-security-books

  • Global Cybersecurity Research Center Contribution award

    Global Cybersecurity Research Center

    http://csrc.global/en/icicsg2017-was-held-on-20th-october-2017/

  • Microsoft Platinum Circle of Excellence Platinum Club Award

    Microsoft

    Microsoft Platinum Circle of Excellence Platinum Club, Microsoft’s highest award for achievement

  • Fight Against Cyber- crime : Experince From the filed

    Charles Sturt University

  • NATO - Center of Excellence - Defence against Terrorism

    NATO

  • Certficate of Success

    General Military Staff of Turkey

    We all work hard, we all sacrifice from our own time to help our customers. Of course we do get paid for what we do but sometimes you receive appreciation certificates like the one I got which you can not buy with money or just hard work . Special thanks to General Military Staff of Turkey...

  • Information Security Society of Africa Nigeria (ISSAN)

    ISSAN

    Lagos, Nigeria. 24.10.16: Leading ICT Company, Microsoft has called on individuals and organizations to pay needed attention to ensuring cyber security in the face of global cyber threats. This call was made at a Cyber Security Summit organized by Microsoft in conjunction with Information Security Society of Africa Nigeria (ISAAN) at Eko Hotel and Suites, Lagos.
    https://issan.org.ng/microsoft-issan-collaborate-raise-cyber-security-awareness/

  • NATO - Center of Excellence - Defence against Terrorism

    NATO

  • Arab Emirates CERT ( Computer Emergency Response Team)

    AE CERT

    Contributor of making UAE worlds leading & most secure ITC country

  • NATO - Center of Excellence - Defence against Terrorism

    NATO

    Contribution on how to STOP or minimise the Cyber space use of Terrorist's .

    I was awarded by NATO Center of Excellence - Defence against Terrorism, and I am proud to be able to contribute and advise NATO to help the world to be more SAFE !

  • TOP Security Professional in Middle East

    Channel Middle East Magazine

    "As an IT Security Expert, Ozkaya is in-charge of EMT's channel business development and management, making him a key figure in the regional market. The VAD operates the EMT Academy , a training unit within the group and it is here that Ozkaya's expertise are helping partners gain the much needed skills."

    Channel Magazine Middle East has selected TOP 50 for 2015
    Security & Storage Section

  • Channel Champions 2015

    Channel Magazine Middle East

    Channel Magazine Middle East has selected TOP 50 Channel Champions for 2015 and I am proud to get in to the list under Security & Storage section.

    Based on the prestigious magazine, they wanted to highlight executives that are playing a crucial role in the advancement of the regional IT market and whose actions have direct influence over success of the whole channel ecosystem.

    Top 50 in Security & Storage

    As an IT Security Expert, Ozkaya is in-charge of EMT's channel…

    Channel Magazine Middle East has selected TOP 50 Channel Champions for 2015 and I am proud to get in to the list under Security & Storage section.

    Based on the prestigious magazine, they wanted to highlight executives that are playing a crucial role in the advancement of the regional IT market and whose actions have direct influence over success of the whole channel ecosystem.

    Top 50 in Security & Storage

    As an IT Security Expert, Ozkaya is in-charge of EMT's channel business development and management, making him a key figure in the regional market. The VAD operates the EMT Academy, a training unit within the group and it is here that Ozkaya's expertise are helping partners gain the much needed skills.

    I am proud & humbled to be in the list specially as I am still considered new in the Middle East/ Africa Market (10 months). I will continue to work hard …

    Special thanks for the whole EMT HOLDING team & my family, without their support I could not do much

    To read the magazine online

    http://www.itp.net/popup/latestissue?issid=51824

  • Microsoft Learning MVA Contribution Award

    Microsoft

    For sharing the Security Landscape and Cybersecuirty trends on a online course

  • Professional of the Year Sydney

    Sydney Chamber of Commerce

    The STCC Awards are intended to recognize those businesses and business people in NSW who exemplify the best that our community has to offer: community members, business people, professionals, entrereneurs, who are willing to take chances, push the boundaries and stretch the limits for the success of the Australian Turkish community and Australia
    http://www.stcc.org.au/2014/05/05/stcc-awards-2014/

  • EC Council Cirle of Excellence

    -

  • EC Council Roll of Honor 2012

    EC Council

    CEH, CHFI, ENSA , ECSA list of honor

  • EC- Council Instructor of the year

    EC Council

    EC- Council Instructor of the year 2011

  • Microsoft Tech Ed Australia BEST Speaker

    Microsoft

    My Microsoft Tech Ed Session was evaluated number one within 140 session by 3000+ IT pro

  • Microsoft Most Valuable Professional - Windows Expert -IT PRO

    Microsoft

    Microsoft Most Valuable Professional
    2008 2009. 2010, 2011 ,2012, 2013 ,2014 & 2015
    Microsoft Most Valuable Professionals, or MVPs, are technology experts who passionately share their knowledge with the community. They are always on the "bleeding edge" and have an unstoppable urge to get their hands on new, exciting technologies. They have very deep knowledge of Microsoft products and services, while also being able to bring together diverse platforms, products and solutions, to solve…

    Microsoft Most Valuable Professional
    2008 2009. 2010, 2011 ,2012, 2013 ,2014 & 2015
    Microsoft Most Valuable Professionals, or MVPs, are technology experts who passionately share their knowledge with the community. They are always on the "bleeding edge" and have an unstoppable urge to get their hands on new, exciting technologies. They have very deep knowledge of Microsoft products and services, while also being able to bring together diverse platforms, products and solutions, to solve real world problems. MVPs make up a global community of over 4,000 technical experts and community leaders across 90 countries and are driven by their passion, community spirit, and quest for knowledge. Above all and in addition to their amazing technical abilities, MVPs are always willing to help others - that's what sets them apart.

  • Windows Server 2008 Heroes Happen Honour Member

    Microsoft

    I was honoured to be a Microsoft hero on training the first 15 Windows Server 2008 Certified IT professionals in Australia. The award was handed to me in the Windows Server 2008 launch in Sydney Convention Centre

  • University of Cape Town Appreciation Award

    University of Cape Town

Languages

  • English

    Native or bilingual proficiency

  • German

    Native or bilingual proficiency

  • Turkish

    Native or bilingual proficiency

  • Arabic

    Limited working proficiency

Recommendations received

31 people have recommended Dr. Erdal Join now to view

View Dr. Erdal’s full profile

  • See who you know in common
  • Get introduced
  • Contact Dr. Erdal directly
Join to view full profile

People also viewed

Explore collaborative articles

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Explore More

Add new skills with these courses