Skip to content

CRC 2025 edition#

Click the button below and register for "Cybersecurity - defense in modern organizations" training.

Register for 2025 edition

Summary#

Number of hours to be announced soon
Number of meetings 8 meetings, 8 Saturdays
Form of meeting on-line
Schedule 2025-03-01 09:00 – 16:00 +0100 (CET) DAY 1/8
2025-03-08 09:00 – 16:00 +0100 (CET) DAY 2/8
2025-03-15 09:00 – 16:00 +0100 (CET) DAY 3/8
2025-03-22 09:00 – 16:00 +0100 (CET) DAY 4/8
2025-03-29 09:00 – 16:00 +0100 (CET) DAY 5/8
2025-04-05 09:00 – 16:00 +0200 (CEST) DAY 6/8
2025-04-12 09:00 – 16:00 +0200 (CEST) DAY 7/8
2025-04-26 09:00 – 16:00 +0200 (CEST) DAY 8/8
2025-05-10 10:00 – 11:00 +0200 (CEST) FINAL EXAM

Topics#

# Topic Trainer
1 Kickoff meeting Łukasz Jankowski ,
Damian Krawczyk
2 Cyber awareness Sławomir Staciwa
3 Data Protection - Compliance Dagmara Adamczyk
4 Legal aspects of cyber security Judyta Berc
5 IT Risk Management - Basics Askaniusz Ferens
6 IT Risk Management - Governance Justyna Chochla-Wojdyła
7 IT Risk Management - Analysis Anna Maszybrocka
8 IT Risk Management - Monitoring Daniel Leon
9 IT Risk Management - On-prem vs Cloud Piotr Czarnik
10 Risk Management - Compliance Kamila Juszczyk
11 Risk Management - Operational Risk Management Oskar Marszalik
12 Risk Management - Audits Kamila Juszczyk
13 Identity and Access Management Paweł Matyszok
14 Password vaults Mateusz Kozieł
15 Cryptography - Basics Jacek Kocyba
16 Shadow IT Jacek Kocyba
17 Vulnerability Assessment Łukasz Jankowski ,
Damian Krawczyk
18 Vulnerability Assessment for containers Krzysztof Kozak ,
Łukasz Galos
19 Introduction to secret scanning Patryk Zachnik , Mateusz Majstrak
20 Secure Configuration Monitoring Maciej Wróbel
21 Secure SDLC Maciej Wróbel
22 Introduction to Offensive tooling Michał Kucharski
23 OSINT in the service of Offensive Security Maciej Pypeć
24 Offensive Cybersecurity - Red Teaming theory Jakub Plusczok
25 Offensive Cybersecurity - Red Teaming workshop Jakub Plusczok
26 Offensive Cybersecurity - DDOS Gerard Żmuda
27 Defensive Cybersecurity - SIEM + SOAR + Proxy Daniel Jeczeń
28 Defensive Cybersecurity - Malware Analysis Mirosław Koczenasz
29 Building ETL for Security data Michał Kocur
30 Security data processing automation Piotr Furmaniak ,
Adam Majstrak
31 Introduction to Azure Public Cloud Rafał Nowakowski
32 Security aspects of Azure Kubernetes clusters deployment and applications delivery Michał Ziółek