Skip to content

CRC 2026 edition#

Register for 2026 edition

Summary#

Number of hours > 40 hours
Number of meetings 8 meetings, 8 Saturdays
Form of meeting on-line
DAY 1 2026-03-21 9:00 - 16:00 (CET)
DAY 2 2026-03-28 9:00 - 16:00 (CET)
DAY 3 2026-04-11 9:00 - 16:00 (CEST)
DAY 4 2026-04-18 9:00 - 16:00 (CEST)
DAY 5 2026-04-25 9:00 - 16:00 (CEST)
DAY 6 2026-05-09 9:00 - 16:00 (CEST)
DAY 7 2026-05-16 9:00 - 16:00 (CEST)
DAY 8 2026-05-23 9:00 - 16:00 (CEST)
FINAL Exam 2026-05-30 (only one time slot)

Topics#

# Topic Trainer
1 Kickoff meeting Łukasz Jankowski ,
Damian Krawczyk
2 Cyber awareness Sławomir Staciwa
3 Data Protection - Compliance Dagmara Adamczyk
4 Legal aspects of cyber security Judyta Berc
5 IT Risk Management - Basics Askaniusz Ferens
6 IT Risk Management - Governance Anna Maszybrocka
7 IT Risk Management - Analysis, Monitoring & Reporting Daniel Leon
8 IT Risk Management - On-prem vs Cloud Piotr Czarnik
9 Risk Management - Compliance Kamila Juszczyk
10 Risk Management - Operational Risk Management Oskar Marszalik
11 Risk Management - Audits Kamila Juszczyk
12 Identity and Access Management Paweł Matyszok
13 Password vaults Mateusz Kozieł
14 Cryptography - Basics Jacek Kocyba
15 Shadow IT Jacek Kocyba
16 Vulnerability Assessment Łukasz Jankowski ,
Damian Krawczyk
17 Vulnerability Assessment for containers Krzysztof Kozak ,
Łukasz Galos
18 Introduction to secret scanning Patryk Zachnik , Mateusz Majstrak
19 Secure Configuration Monitoring Maciej Wróbel
20 Secure SDLC Maciej Wróbel
21 Introduction to Offensive tooling Michał Kucharski
22 OSINT in the service of Offensive Security Maciej Pypeć
23 Offensive Cybersecurity - Red Teaming theory Jakub Plusczok
24 Offensive Cybersecurity - Red Teaming workshop Jakub Plusczok
25 Offensive Cybersecurity - DDOS Gerard Żmuda
26 Defensive Cybersecurity - SIEM + SOAR + Proxy Daniel Jeczeń
27 Defensive Cybersecurity - Malware Analysis Mirosław Koczenasz
28 Defensive Cybersecurity - C2 & exfiltration Mirosław Koczenasz
29 Building ETL for Security data Michał Kocur
30 Security data processing automation Piotr Furmaniak ,
Adam Majstrak
31 Introduction to Azure Public Cloud Rafał Nowakowski
32 CISSP - Introduction Krystian Tokarz