Lostar Academy

At Lostar, training programs are designed employing new training methods and giving weight to hands-on training, in an effort to contribute added value to participants.

The training programs are organized either in open house format or specific to an organization. Training contents have been developed by the most experienced and qualified specialists in line with international training norms, so as to equip the participants with competency.

The pages providing details about the training programs will be ready soon.

Information Security

ISO 27001:27002 Awareness
ISO 27001:27002 Implementation
ISO 27001 Control Selection and Implementation
ISO 27001 Internal Auditor
Risk Analysis
Enterprise Risk Management (ISO 31000:2009) NEW
Enterprise Security Policy Design Workshop
Integrated Management System (ISO 9001, ISO 20000, ISO 27001)


IT Security

c-sap (Certified Secure Application Programmer)
Individual Technology Security
Network (TCP/IP) Security
Network Systems Technical Audit Workshop
Wireless Network Security Workshop
Corporate Awareness Program Development
Technology Security for Executives
Microsoft Products Technical Audit Workshop
Databases Technical Audit Workshop
VOIP Security Technical Audit Workshop
Computer Forensics and eDiscovery
IT Law and Security NEW
EC Council CEH Certificate Preparation NEW


Information Technologies Governance

CobiT Foundation
CobiT Implementation
COBIT 5 Differences NEW
ISACA CISA Certification Preparation NEW
ITIL Foundation
ITIL Implementation
Apollo 13 ITIL Simulation
ITIL/ISO 20000
IT Service Management and ITIL for Executives
IT Audit and COBIT
Green IT
Outsourcing Contract Management


Business Continuity

BS 25777:2008 Disaster Recovery and IT Continuity Implementation Conditions
ISO 22301 Business Continuity Awareness
ISO 22301 Business Continuity Implementation
ISO 22301 Business Continuity Plan Workshop
Business Continuity – Drill Management



Information Security Legislation for the Financial Services Industry
Electronic and Mobile Signature Authentication
Internet Banking Security Audits
PCI DSS Compatibility Security (Awareness)



Information Security Legislation for the Healthcare Industry



Information Security Legislation for the Telecommunication Industry


Call Center

Information Security for Call Centers


Let us know if you need a training program that is not covered in our training list.


Customized Training

The training programs designed specifically for an organization at Lostar Academy focus on hands-on training and cover case studies and practices from practical and everyday life in an attempt to support the entities’ projects in progress. Another priority objective is to help render the achieved levels permanent with respect to Information Security, IT Security, Information Technologies, Risk Analysis, Business Continuity Management (BCM) and Security Policies.

Customized training programs are designed with a ‘tailor-made’ approach, taking an organization’s needs and expectations into consideration and modifying the relevant training, if necessary. In our training programs, seminars and workshops organized by our competent training team, we share our experience acquired from companies of different sizes from different sectors, and contribute added value to entities and participants pursuing self-improvement.

You can email us at [email protected] for a joint identification of your training needs, and for setting the training path for your employees.