Top
 
CYBERSECURITY

Trainings

Cybersecurity trainings – awareness

Cybersecurity training is dedicated for management and technical department staff (security or IT department) and is organized as the theoretical presentations, demonstrations and practical trainings (hands on trainings).
The topics addressed during the trainings are standardizations, regulations in the area of cybersecurity, actual threats and attacks methods, prevention – security controls minimalizing the risk of vulnerabilities exploitation and providing high levels of Confidentiality, Integrity, Availability and Accountability.
The training is organized as a three days session with the following schedule:

DAY I
09:00 – 09:45 Introduction, IT security regulations, standards and good practices – NIST, ISO/IEC, ENISA, application security OWASP, security tests OSSTM.
10:00 – 10:45 Modern threats of the digital world, vulnerabilities, vulnerabilities databases CVE/CWE, modern attacks.
11:00 – 11:45 Advanced Persistent Threats attacks, taking control over IT system, remote access to the IT/OT systems.
12:00 – 13:00 Lunch brake.
13:00 – 13:45 APT attacks continued.
14:00 – 14:45 ZRemote code execution, practical demonstration.

DAY II
09:00 – 09:45 Security controls – examples of the security controls that mitigates the risks of exposures to threats.
10:00 – 10:45 Data control in the IT systems, data leakage protection.
11:00 – 11:45 IP traffic monitoring – IDS/IPS.
12:00 – 13:00 Lunch brake.
13:00 – 13:45 HIDS solutions – integrity and accountability.
14:00 – 14:45 Data collection and analysis – SIEM, correlation and alerting.

DAY III
09:00 – 09:45 Cryptography and data security in IT systems.
10:00 – 10:45 Secure, remote connections – VPN/IPSec.
11:00 – 11:45 Cloud security.
12:00 – 13:00 Lunch brake.
13:00 – 13:45 Summary.

CYBERBEZPIECZEŃSTWOCYBERBEZPIECZEŃSTWOCYBERBEZPIECZEŃSTWO