Skip to content

CRC 2025 edition#

Summary#

Number of hours 45 hours
Number of meetings 8 meetings, 8 Saturdays
Form of meeting on-line
Schedule 2025-03-01 09:00 – 16:00 +0100 (CET) DAY 1/8
2025-03-08 09:00 – 16:00 +0100 (CET) DAY 2/8
2025-03-15 09:00 – 16:00 +0100 (CET) DAY 3/8
2025-03-22 09:00 – 16:00 +0100 (CET) DAY 4/8
2025-03-29 09:00 – 16:00 +0100 (CET) DAY 5/8
2025-04-05 09:00 – 16:00 +0200 (CEST) DAY 6/8
2025-04-12 09:00 – 16:00 +0200 (CEST) DAY 7/8
2025-04-26 09:00 – 16:00 +0200 (CEST) DAY 8/8
2025-05-10 10:00 – 11:00 +0200 (CEST) FINAL EXAM

Topics#

# Topic Trainer
1 Kickoff meeting Łukasz Jankowski ,
Damian Krawczyk
2 Cyber awareness Sławomir Staciwa
3 Data Protection - Compliance Dagmara Adamczyk
4 Legal aspects of cyber security Judyta Berc
5 IT Risk Management - Basics Askaniusz Ferens
6 IT Risk Management - Governance Justyna Chochla-Wojdyła
7 IT Risk Management - Analysis Anna Maszybrocka
8 IT Risk Management - Monitoring and reporting Daniel Leon
9 IT Risk Management - On-prem vs Cloud Piotr Czarnik
10 Risk Management - Compliance Kamila Juszczyk
11 Risk Management - Operational Risk Management Oskar Marszalik
12 Risk Management - Audits Kamila Juszczyk
13 Identity and Access Management Paweł Matyszok
14 Password vaults Mateusz Kozieł
15 Cryptography - Basics Jacek Kocyba
16 Shadow IT Jacek Kocyba
17 Vulnerability Assessment Łukasz Jankowski ,
Damian Krawczyk
18 Vulnerability Assessment for containers Krzysztof Kozak ,
Łukasz Galos
19 Introduction to secret scanning Patryk Zachnik , Mateusz Majstrak
20 Secure Configuration Monitoring Maciej Wróbel
21 Secure SDLC Maciej Wróbel
22 Introduction to Offensive tooling Michał Kucharski
23 OSINT in the service of Offensive Security Maciej Pypeć
24 Offensive Cybersecurity - Red Teaming theory Jakub Plusczok
25 Offensive Cybersecurity - Red Teaming workshop Jakub Plusczok
26 Offensive Cybersecurity - DDOS Gerard Żmuda
27 Defensive Cybersecurity - SIEM + SOAR + Proxy Daniel Jeczeń
28 Defensive Cybersecurity - Malware Analysis Mirosław Koczenasz
29 Building ETL for Security data Michał Kocur
30 Security data processing automation Piotr Furmaniak ,
Adam Majstrak
31 Introduction to Azure Public Cloud Rafał Nowakowski
32 Security aspects of Azure Kubernetes clusters deployment and applications delivery Michał Ziółek

Schedule#

2025-03-01 09:00 – 16:00 +0100 (CET)

Time Lecture
09:30 - 10:00
(30m)
Kickoff meeting
Damian Krawczyk, Łukasz Jankowski
5 minutes break
10:05 - 11:05
(1h)
Cyber awareness
Sławomir Staciwa
5 minutes break
11:10 - 12:10
(1h)
Cyber awareness
Sławomir Staciwa
20 minutes break
12:30 - 13:30
(1h)
Password vaults - dive into
Mateusz Kozieł
5 minutes break
13:35 - 15:05
(1h 30m)
SIEM + SOAR + Proxy
Daniel Jeczeń

2025-03-08 09:00 – 16:00 +0100 (CET)

Time Lecture
09:00 - 10:00
(1h)
Compliance - Data Protection
Dagmara Adamczyk
5 minutes break
10:05 - 11:05
(1h)
IT Risk Management - Basics
Askaniusz Ferens
5 minutes break
11:10 - 12:10
(1h)
IT Risk Management - Governance
Justyna Chochla-Wojdyła
20 minutes break
12:30 - 13:30
(1h)
IT Risk Management - Analysis
Anna Maszybrocka
5 minutes break
13:35 - 14:35
(1h)
IT Risk Management - Monitoring and reporting
Daniel Leon
(This session is in English)
5 minutes break
14:40 - 15:40
(1h)
IT Risk Management - On-prem vs Cloud
Piotr Czarnik

2025-03-15 09:00 – 16:00 +0100 (CET)

Time Lecture
09:00 - 10:00
(1h)
Legal aspects of cyber security
Judyta Berc
5 minutes break
10:05 - 11:05
(1h)
Identity and Access management
Paweł Matyszok
5 minutes break
11:10 - 12:10
(1h)
Identity and Access management
Paweł Matyszok
20 minutes break
12:30 - 13:30
(1h)
Risk Management - Compliance
Kamila Juszczyk
5 minutes break
13:35 - 14:35
(1h)
Risk Management - Operational Risk Management
Oskar Marszalik
5 minutes break
14:40 - 15:40
(1h)
Risk Management - Audits
Kamila Juszczyk

2025-03-22 09:00 – 16:00 +0100 (CET)

Time Lecture
09:00 - 10:00
(1h)
Introduction to offensive tooling
Michał Kucharski
5 minutes break
10:05 - 11:05
(1h)
OSINT in the service of Offensive Security
Maciej Pypeć
5 minutes break
11:10 - 12:10
(1h)
Offensive Cybersecurity – Red Teaming theory
Jakub Plusczok
20 minutes break
12:30 - 13:30
(1h)
Offensive Cybersecurity – Red Teaming workshop
Jakub Plusczok
5 minutes break
13:35 - 14:35
(1h)
Offensive Cybersecurity – Red Teaming workshop
Jakub Plusczok
5 minutes break
14:40 - 15:40
(1h)
Offensive Cybersecurity – DDOS
Gerard Żmuda

2025-03-29 09:00 – 16:00 +0100 (CET)

Time Lecture
09:00 - 10:00
(1h)
Introduction to Azure Public Cloud
Rafał Nowakowski
5 minutes break
10:05 - 11:05
(1h)
Security aspects of Azure Kubernetes clusters deployment and applications delivery
Michał Ziółek
5 minutes break
11:10 - 12:10
(1h)
Cryptography - basics
Jacek Kocyba
20 minutes break
12:30 - 13:30
(1h)
Shadow IT
Jacek Kocyba
5 minutes break
13:35 - 14:35
(1h)
CISSP – Introduction
Krystian Tokarz
5 minutes break
14:40 - 16:00
(1h 20m)
Introduction to secret scanning
Patryk Zachnik, Mateusz Majstrak

2025-04-05 09:00 – 16:00 +0200 (CEST)

Time Lecture
09:00 - 10:00
(1h)
Secure Configuration Monitoring
Maciej Wróbel
5 minutes break
10:05 - 11:05
(1h)
Secure Configuration Monitoring
Maciej Wróbel
5 minutes break
11:10 - 12:10
(1h)
Secure SDLC
Maciej Wróbel
20 minutes break
12:30 - 13:30
(1h)
Secure SDLC
Maciej Wróbel
5 minutes break
13:35 - 15:05
(1h 30m)
Malware Analysis
Mirosław Koczenasz

2025-04-12 09:00 – 16:00 +0200 (CEST)

Time Lecture
09:00 - 10:00
(1h)
Vulnerability Assessment – theory
Damian Krawczyk
5 minutes break
10:05 - 11:05
(1h)
Vulnerability Assessment – demo
Łukasz Jankowski
5 minutes break
11:10 - 12:10
(1h)
Vulnerability Assessment – demo
Łukasz Jankowski
20 minutes break
12:30 - 13:30
(1h)
Vulnerability Assessment – practice
Damian Krawczyk
5 minutes break
13:35 - 14:35
(1h)
Vulnerability Assessment for containers - theory
Krzysztof Kozak, Łukasz Galos
5 minutes break
14:40 - 15:40
(1h)
Vulnerability Assessment for containers - demo/lab
Krzysztof Kozak, Łukasz Galos

2025-04-26 09:00 – 16:00 +0200 (CEST)

Time Lecture
09:00 - 10:00
(1h)
Security data processing automation
Piotr Furmaniak, Adam Majstrak
5 minutes break
10:05 - 11:05
(1h)
Security data processing automation
Piotr Furmaniak, Adam Majstrak
5 minutes break
11:10 - 12:10
(1h)
Building ETL for Security data
Michał Kocur
20 minutes break
12:30 - 13:30
(1h)
Building ETL for Security data
Michał Kocur
5 minutes break
13:35 - 14:00
(25min)
Closing session
Damian Krawczyk, Łukasz Jankowski

2025-05-10 10:00 – 11:00 +0200 (CEST)