1 |
Kickoff meeting |
Łukasz Jankowski , Damian Krawczyk |
2 |
Cyber awareness |
Sławomir Staciwa |
3 |
Data Protection - Compliance |
Dagmara Adamczyk |
4 |
Legal aspects of cyber security |
Judyta Berc |
5 |
IT Risk Management - Basics |
Askaniusz Ferens |
6 |
IT Risk Management - Governance |
Justyna Chochla-Wojdyła |
7 |
IT Risk Management - Analysis |
Anna Maszybrocka |
8 |
IT Risk Management - Monitoring |
Daniel Leon |
9 |
IT Risk Management - On-prem vs Cloud |
Piotr Czarnik |
10 |
Risk Management - Compliance |
Kamila Juszczyk |
11 |
Risk Management - Operational Risk Management |
Oskar Marszalik |
12 |
Risk Management - Audits |
Kamila Juszczyk |
13 |
Identity and Access Management |
Paweł Matyszok |
14 |
Password vaults |
Mateusz Kozieł |
15 |
Cryptography - Basics |
Jacek Kocyba |
16 |
Shadow IT |
Jacek Kocyba |
17 |
Vulnerability Assessment |
Łukasz Jankowski , Damian Krawczyk |
18 |
Vulnerability Assessment for containers |
Krzysztof Kozak , Łukasz Galos |
19 |
Introduction to secret scanning |
Patryk Zachnik , Mateusz Majstrak |
20 |
Secure Configuration Monitoring |
Maciej Wróbel |
21 |
Secure SDLC |
Maciej Wróbel |
22 |
Introduction to Offensive tooling |
Michał Kucharski |
23 |
OSINT in the service of Offensive Security |
Maciej Pypeć |
24 |
Offensive Cybersecurity - Red Teaming theory |
Jakub Plusczok |
25 |
Offensive Cybersecurity - Red Teaming workshop |
Jakub Plusczok |
26 |
Offensive Cybersecurity - DDOS |
Gerard Żmuda |
27 |
Defensive Cybersecurity - SIEM + SOAR + Proxy |
Daniel Jeczeń |
28 |
Defensive Cybersecurity - Malware Analysis |
Mirosław Koczenasz |
29 |
Building ETL for Security data |
Michał Kocur |
30 |
Security data processing automation |
Piotr Furmaniak , Adam Majstrak |
31 |
Introduction to Azure Public Cloud |
Rafał Nowakowski |
32 |
Security aspects of Azure Kubernetes clusters deployment and applications delivery |
Michał Ziółek |