CRC 2025 edition#
Summary#
Number of hours | 45 hours |
---|---|
Number of meetings | 8 meetings, 8 Saturdays |
Form of meeting | on-line |
Schedule | 2025-03-01 09:00 – 16:00 +0100 (CET) DAY 1/8 2025-03-08 09:00 – 16:00 +0100 (CET) DAY 2/8 2025-03-15 09:00 – 16:00 +0100 (CET) DAY 3/8 2025-03-22 09:00 – 16:00 +0100 (CET) DAY 4/8 2025-03-29 09:00 – 16:00 +0100 (CET) DAY 5/8 2025-04-05 09:00 – 16:00 +0200 (CEST) DAY 6/8 2025-04-12 09:00 – 16:00 +0200 (CEST) DAY 7/8 2025-04-26 09:00 – 16:00 +0200 (CEST) DAY 8/8 2025-05-10 10:00 – 11:00 +0200 (CEST) FINAL EXAM |
Topics#
Schedule#
2025-03-01 09:00 – 16:00 +0100 (CET)
Time | Lecture |
---|---|
09:30 - 10:00 (30m) |
Kickoff meeting Damian Krawczyk, Łukasz Jankowski 5 minutes break |
10:05 - 11:05 (1h) |
Cyber awareness Sławomir Staciwa 5 minutes break |
11:10 - 12:10 (1h) |
Cyber awareness Sławomir Staciwa 20 minutes break |
12:30 - 13:30 (1h) |
Password vaults - dive into Mateusz Kozieł 5 minutes break |
13:35 - 15:05 (1h 30m) |
SIEM + SOAR + Proxy Daniel Jeczeń |
2025-03-08 09:00 – 16:00 +0100 (CET)
Time | Lecture |
---|---|
09:00 - 10:00 (1h) |
Compliance - Data Protection Dagmara Adamczyk 5 minutes break |
10:05 - 11:05 (1h) |
IT Risk Management - Basics Askaniusz Ferens 5 minutes break |
11:10 - 12:10 (1h) |
IT Risk Management - Governance Justyna Chochla-Wojdyła 20 minutes break |
12:30 - 13:30 (1h) |
IT Risk Management - Analysis Anna Maszybrocka 5 minutes break |
13:35 - 14:35 (1h) |
IT Risk Management - Monitoring and reporting Daniel Leon (This session is in English) 5 minutes break |
14:40 - 15:40 (1h) |
IT Risk Management - On-prem vs Cloud Piotr Czarnik |
2025-03-15 09:00 – 16:00 +0100 (CET)
Time | Lecture |
---|---|
09:00 - 10:00 (1h) |
Legal aspects of cyber security Judyta Berc 5 minutes break |
10:05 - 11:05 (1h) |
Identity and Access management Paweł Matyszok 5 minutes break |
11:10 - 12:10 (1h) |
Identity and Access management Paweł Matyszok 20 minutes break |
12:30 - 13:30 (1h) |
Risk Management - Compliance Kamila Juszczyk 5 minutes break |
13:35 - 14:35 (1h) |
Risk Management - Operational Risk Management Oskar Marszalik 5 minutes break |
14:40 - 15:40 (1h) |
Risk Management - Audits Kamila Juszczyk |
2025-03-22 09:00 – 16:00 +0100 (CET)
Time | Lecture |
---|---|
09:00 - 10:00 (1h) |
Introduction to offensive tooling Michał Kucharski 5 minutes break |
10:05 - 11:05 (1h) |
OSINT in the service of Offensive Security Maciej Pypeć 5 minutes break |
11:10 - 12:10 (1h) |
Offensive Cybersecurity – Red Teaming theory Jakub Plusczok 20 minutes break |
12:30 - 13:30 (1h) |
Offensive Cybersecurity – Red Teaming workshop Jakub Plusczok 5 minutes break |
13:35 - 14:35 (1h) |
Offensive Cybersecurity – Red Teaming workshop Jakub Plusczok 5 minutes break |
14:40 - 15:40 (1h) |
Offensive Cybersecurity – DDOS Gerard Żmuda |
2025-03-29 09:00 – 16:00 +0100 (CET)
Time | Lecture |
---|---|
09:00 - 10:00 (1h) |
Introduction to Azure Public Cloud Rafał Nowakowski 5 minutes break |
10:05 - 11:05 (1h) |
Security aspects of Azure Kubernetes clusters deployment and applications delivery Michał Ziółek 5 minutes break |
11:10 - 12:10 (1h) |
Cryptography - basics Jacek Kocyba 20 minutes break |
12:30 - 13:30 (1h) |
Shadow IT Jacek Kocyba 5 minutes break |
13:35 - 14:35 (1h) |
CISSP – Introduction Krystian Tokarz 5 minutes break |
14:40 - 16:00 (1h 20m) |
Introduction to secret scanning Patryk Zachnik, Mateusz Majstrak |
2025-04-05 09:00 – 16:00 +0200 (CEST)
Time | Lecture |
---|---|
09:00 - 10:00 (1h) |
Secure Configuration Monitoring Maciej Wróbel 5 minutes break |
10:05 - 11:05 (1h) |
Secure Configuration Monitoring Maciej Wróbel 5 minutes break |
11:10 - 12:10 (1h) |
Secure SDLC Maciej Wróbel 20 minutes break |
12:30 - 13:30 (1h) |
Secure SDLC Maciej Wróbel 5 minutes break |
13:35 - 15:05 (1h 30m) |
Malware Analysis Mirosław Koczenasz |
2025-04-12 09:00 – 16:00 +0200 (CEST)
Time | Lecture |
---|---|
09:00 - 10:00 (1h) |
Vulnerability Assessment – theory Damian Krawczyk 5 minutes break |
10:05 - 11:05 (1h) |
Vulnerability Assessment – demo Łukasz Jankowski 5 minutes break |
11:10 - 12:10 (1h) |
Vulnerability Assessment – demo Łukasz Jankowski 20 minutes break |
12:30 - 13:30 (1h) |
Vulnerability Assessment – practice Damian Krawczyk 5 minutes break |
13:35 - 14:35 (1h) |
Vulnerability Assessment for containers - theory Krzysztof Kozak, Łukasz Galos 5 minutes break |
14:40 - 15:40 (1h) |
Vulnerability Assessment for containers - demo/lab Krzysztof Kozak, Łukasz Galos |
2025-04-26 09:00 – 16:00 +0200 (CEST)
Time | Lecture |
---|---|
09:00 - 10:00 (1h) |
Security data processing automation Piotr Furmaniak, Adam Majstrak 5 minutes break |
10:05 - 11:05 (1h) |
Security data processing automation Piotr Furmaniak, Adam Majstrak 5 minutes break |
11:10 - 12:10 (1h) |
Building ETL for Security data Michał Kocur 20 minutes break |
12:30 - 13:30 (1h) |
Building ETL for Security data Michał Kocur 5 minutes break |
13:35 - 14:00 (25min) |
Closing session Damian Krawczyk, Łukasz Jankowski |
2025-05-10 10:00 – 11:00 +0200 (CEST)