Skip to content

CRC 2026 edition#

Summary#

Number of hours > 46 hours
Number of meetings 8 meetings, 8 Saturdays
Form of meeting on-line
DAY 1 2026-03-21 9:00 - 16:00 (CET)
DAY 2 2026-03-28 9:00 - 15:00 (CET)
DAY 3 2026-04-11 9:00 - 16:00 (CEST)
DAY 4 2026-04-18 9:00 - 16:00 (CEST)
DAY 5 2026-04-25 9:00 - 16:00 (CEST)
DAY 6 2026-05-09 9:00 - 16:00 (CEST)
DAY 7 2026-05-16 9:00 - 16:00 (CEST)
DAY 8 2026-05-23 9:00 - 16:00 (CEST)
FINAL Exam 2026-05-30 (only one time slot)

Topics#

# Topic Trainer
1 Kickoff meeting Łukasz Jankowski ,
Damian Krawczyk
2 Cyber awareness Sławomir Staciwa
3 Data Protection - Compliance Dagmara Adamczyk
4 Legal aspects of cyber security Judyta Berc
5 IT Risk Management - Basics Askaniusz Ferens
6 IT Risk Management - Governance Anna Maszybrocka
7 IT Risk Management - Analysis, Monitoring & Reporting Daniel Leon
8 IT Risk Management - On-prem vs Cloud Piotr Czarnik
9 Risk Management - Compliance Kamila Juszczyk
10 Risk Management - Operational Risk Management Oskar Marszalik
11 Risk Management - Audits Kamila Juszczyk
12 Identity and Access Management Paweł Matyszok
13 Password vaults Mateusz Kozieł
14 Cryptography - Basics Jacek Kocyba
15 Shadow IT Jacek Kocyba
16 Vulnerability Assessment Łukasz Jankowski ,
Damian Krawczyk
17 Vulnerability Assessment for containers Krzysztof Kozak ,
Łukasz Galos
18 Introduction to secret scanning Patryk Zachnik ,
Mateusz Majstrak
19 Secure Configuration Monitoring Maciej Wróbel
20 Secure SDLC Maciej Wróbel
21 Introduction to Offensive tooling Michał Kucharski
22 OSINT in the service of Offensive Security Maciej Pypeć
23 Offensive Cybersecurity - Red Teaming theory Jakub Plusczok
24 Offensive Cybersecurity - Red Teaming workshop Jakub Plusczok
25 Offensive Cybersecurity - DDOS Gerard Żmuda
26 Defensive Cybersecurity - SIEM + SOAR + Proxy Daniel Jeczeń
27 Defensive Cybersecurity - Malware Analysis Mirosław Koczenasz
28 Defensive Cybersecurity - C2 & exfiltration Mirosław Koczenasz
29 Building ETL for Security data Michał Kocur
30 Security data processing automation Piotr Furmaniak ,
Adam Majstrak
31 Introduction to Azure Public Cloud Rafał Nowakowski
32 CISSP - Introduction Krystian Tokarz

Schedule#

2026-03-21 09:00 – 16:00 +0100 (CET)

Time Lecture
09:00 - 09:30
(30m)
Kickoff meeting
Damian Krawczyk, Łukasz Jankowski
5 minutes break
09:35 - 10:35
(1h)
Keynote session
Debbie Janeczek, Global CISO
(45 minutes sessions, 15 minutes Q&A)
(This session is in English)
5 minutes break
10:40 - 11:40
(1h)
Cyber awareness
Sławomir Staciwa
5 minutes break
11:45 - 12:45
(1h)
Cyber awareness
Sławomir Staciwa
20 minutes break
13:10 - 14:10
(1h)
Password vaults - dive into
Mateusz Kozieł
5 minutes break
14:15 - 15:45
(1h 30m)
SIEM + SOAR + Proxy
Daniel Jeczeń

2026-03-28 09:00 – 15:00 +0100 (CET)

Time Lecture
09:00 - 10:00
(1h)
Compliance - Data Protection
Dagmara Adamczyk
5 minutes break
10:05 - 11:05
(1h)
IT Risk Management - Basics
Askaniusz Ferens
5 minutes break
11:10 - 12:10
(1h)
IT Risk Management - Governance
Anna Maszybrocka
20 minutes break
12:30 - 13:30
(1h)
IT Risk Management - On-prem vs Cloud
Piotr Czarnik
5 minutes break
13:35 - 14:00
(1h 25m)
IT Risk Management - Analysis, Monitoring & Reporting
Daniel Leon
(This session is in English)

2026-04-11 09:00 – 16:00 +0200 (CEST)

Time Lecture
09:00 - 10:00
(1h)
Legal aspects of cyber security
Judyta Berc
5 minutes break
10:05 - 11:05
(1h)
Identity and Access management
Paweł Matyszok
5 minutes break
11:10 - 12:10
(1h)
Identity and Access management
Paweł Matyszok
20 minutes break
12:30 - 13:30
(1h)
Risk Management - Compliance
Kamila Juszczyk
5 minutes break
13:35 - 14:35
(1h)
Risk Management - Operational Risk Management
Oskar Marszalik
5 minutes break
14:40 - 15:40
(1h)
Risk Management - Audits
Kamila Juszczyk

2026-04-18 09:00 – 16:00 +0200 (CEST)

Time Lecture
09:00 - 10:00
(1h)
Introduction to offensive tooling
Michał Kucharski
5 minutes break
10:05 - 11:05
(1h)
OSINT in the service of Offensive Security
Maciej Pypeć
5 minutes break
11:10 - 12:10
(1h)
Offensive Cybersecurity – DDOS
Gerard Żmuda
20 minutes break
12:30 - 13:30
(1h)
Offensive Cybersecurity – Red Teaming theory
Jakub Plusczok
5 minutes break
13:35 - 14:35
(1h)
Offensive Cybersecurity – Red Teaming workshop
Jakub Plusczok
5 minutes break
14:40 - 15:40
(1h)
Offensive Cybersecurity – Red Teaming workshop
Jakub Plusczok

2026-04-25 09:00 – 16:00 +0200 (CEST)

Time Lecture
09:00 - 10:00
(1h)
Malware Analysis
Mirosław Koczenasz
5 minutes break
10:05 - 11:05
(1h)
Malware Analysis
Mirosław Koczenasz
5 minutes break
11:10 - 12:10
(1h)
Cryptography - basics
Jacek Kocyba
20 minutes break
12:30 - 13:30
(1h)
Shadow IT
Jacek Kocyba
5 minutes break
13:35 - 14:35
(1h)
CISSP – Introduction
Krystian Tokarz
5 minutes break
14:40 - 16:00
(1h 20m)
Introduction to secret scanning
Patryk Zachnik, Mateusz Majstrak.

2026-05-09 09:00 – 16:00 +0200 (CEST)

Time Lecture
09:00 - 10:00
(1h)
Introduction to Azure Public Cloud
Rafał Nowakowski
5 minutes break
10:05 - 11:05
(1h)
Secure Configuration Monitoring
Maciej Wróbel
5 minutes break
11:10 - 12:10
(1h)
Secure SDLC
Maciej Wróbel
20 minutes break
12:30 - 13:30
(1h)
Secure SDLC
Maciej Wróbel
5 minutes break
13:35 - 14:35
(1h)
C2 & exfiltration
Mirosław Koczenasz
5 minutes break
14:40 - 15:40
(1h)
C2 & exfiltration
Mirosław Koczenasz

2026-05-16 09:00 – 16:00 +0200 (CEST)

Time Lecture
09:00 - 10:00
(1h)
Vulnerability Assessment – introduction
Damian Krawczyk
5 minutes break
10:05 - 11:05
(1h)
Vulnerability Assessment – demo
Łukasz Jankowski
5 minutes break
11:10 - 12:10
(1h)
Vulnerability Assessment – demo
Łukasz Jankowski
20 minutes break
12:30 - 13:30
(1h)
Vulnerability Assessment – practice
Damian Krawczyk
5 minutes break
13:35 - 14:35
(1h)
Vulnerability Assessment for containers - theory
Krzysztof Kozak, Łukasz Galos
5 minutes break
14:40 - 15:40
(1h)
Vulnerability Assessment for containers - demo/lab
Krzysztof Kozak, Łukasz Galos

2026-05-23 09:00 – 16:00 +0200 (CEST)

Warning

This day may end at 16:00 we will share more details about the schedule for this day in advance.

Time Lecture
09:00 - 10:00
(1h)
Security data processing automation
Piotr Furmaniak, Adam Majstrak
5 minutes break
10:05 - 11:05
(1h)
Security data processing automation
Piotr Furmaniak, Adam Majstrak
5 minutes break
11:10 - 12:10
(1h)
Building ETL for Security data
Michał Kocur
20 minutes break
12:30 - 13:30
(1h)
Building ETL for Security data
Michał Kocur
5 minutes break
13:35 - 14:00
(25min)
Closing session
Damian Krawczyk, Łukasz Jankowski

2026-05-30 10:00 – 11:00 +0200 (CEST)