| 1 |
Who attacks the organization and how (OWASP TOP 10, ASVS and protection methods) - part 1 |
Krzysztof Cudak |
| 2 |
Who attacks the organization and how (OWASP TOP 10, ASVS and protection methods) - part 2 |
Krzysztof Cudak |
| 3 |
Simulation and detection of APT attack in an organization - part 1 |
Mariusz Derela, Michał Terbert, Krzysztof Kuźnik |
| 4 |
Simulation and detection of APT attack in an organization - part 2 |
Mariusz Derela, Michał Terbert, Krzysztof Kuźnik |
| 5 |
Vulnerability types, classification and detection |
Maciej Wróbel |
| 6 |
Designing tests to verify configuration and detect vulnerabilities |
Maciej Wróbel |