1 |
Who attacks the organization and how (OWASP TOP 10, ASVS and protection methods) - part 1 |
Krzysztof Cudak |
2 |
Who attacks the organization and how (OWASP TOP 10, ASVS and protection methods) - part 2 |
Krzysztof Cudak |
3 |
Simulation and detection of APT attack in an organization - part 1 |
Mariusz Derela, Michał Terbert, Krzysztof Kuźnik |
4 |
Simulation and detection of APT attack in an organization - part 2 |
Mariusz Derela, Michał Terbert, Krzysztof Kuźnik |
5 |
Vulnerability types, classification and detection |
Maciej Wróbel |
6 |
Designing tests to verify configuration and detect vulnerabilities |
Maciej Wróbel |