| 1 |
Kickoff meeting |
Łukasz Jankowski , Damian Krawczyk |
| 2 |
Cyber awareness |
Sławomir Staciwa |
| 3 |
Data Protection - Compliance |
Dagmara Adamczyk |
| 4 |
Legal aspects of cyber security |
Judyta Berc |
| 5 |
IT Risk Management - Basics |
Askaniusz Ferens |
| 6 |
IT Risk Management - Governance |
Anna Maszybrocka |
| 7 |
IT Risk Management - Analysis, Monitoring & Reporting |
Daniel Leon |
| 8 |
IT Risk Management - On-prem vs Cloud |
Piotr Czarnik |
| 9 |
Risk Management - Compliance |
Kamila Juszczyk |
| 10 |
Risk Management - Operational Risk Management |
Oskar Marszalik |
| 11 |
Risk Management - Audits |
Kamila Juszczyk |
| 12 |
Identity and Access Management |
Paweł Matyszok |
| 13 |
Password vaults |
Mateusz Kozieł |
| 14 |
Cryptography - Basics |
Jacek Kocyba |
| 15 |
Shadow IT |
Jacek Kocyba |
| 16 |
Vulnerability Assessment |
Łukasz Jankowski , Damian Krawczyk |
| 17 |
Vulnerability Assessment for containers |
Krzysztof Kozak , Łukasz Galos |
| 18 |
Introduction to secret scanning |
Patryk Zachnik , Mateusz Majstrak |
| 19 |
Secure Configuration Monitoring |
Maciej Wróbel |
| 20 |
Secure SDLC |
Maciej Wróbel |
| 21 |
Introduction to Offensive tooling |
Michał Kucharski |
| 22 |
OSINT in the service of Offensive Security |
Maciej Pypeć |
| 23 |
Offensive Cybersecurity - Red Teaming theory |
Jakub Plusczok |
| 24 |
Offensive Cybersecurity - Red Teaming workshop |
Jakub Plusczok |
| 25 |
Offensive Cybersecurity - DDOS |
Gerard Żmuda |
| 26 |
Defensive Cybersecurity - SIEM + SOAR + Proxy |
Daniel Jeczeń |
| 27 |
Defensive Cybersecurity - Malware Analysis |
Mirosław Koczenasz |
| 28 |
Defensive Cybersecurity - C2 & exfiltration |
Mirosław Koczenasz |
| 29 |
Building ETL for Security data |
Michał Kocur |
| 30 |
Security data processing automation |
Piotr Furmaniak , Adam Majstrak |
| 31 |
Introduction to Azure Public Cloud |
Rafał Nowakowski |
| 32 |
CISSP - Introduction |
Krystian Tokarz |