2-day online training

introduction to IT security

Join our two-day training about IT security. Together we will enter the world of cybersecurity in an easy and clear way.

The course is provided by Michał Sajdak: an IT security researcher, Certified Ethical Hacker, co-author of the bestseller book: “Web applications security”, and the founder of sekurak.pl.

About the training

The training is targeted at all people working in IT departments and is a review of actual knowledge about trends in technical IT security. Almost every point of the agenda is illustrated by a practical live demo.

Hacking CCTV cameras, network reconnaissance, web application takeover in several ways, password cracking, computer takeover using a specially prepared MS Word document, LAN traffic wiretapping – are only a few of the demos that will be shown.

There will also be an indication of methods protecting against attacks, hot answers to attendees questions or additional teaching materials.

Each edition of the training is updated, to assure the most actual and essential issues are discussed.

Who should attend

Network Administrators

Learn about current threats and methods to protect against them.

Developers

Learn about selected threats to your applications in a practical way.

Security Officers

Complete and organize your knowledge.

SoC Employees

Save time and respond faster, we did the research for you.

Information Security Officer AND Data Protection Officer

Get your balance back between formalities and technicalities.

IT Managers

Learn ITSec jargon and get into seamless communication with your employees.

Agenda

Day 1Start: 9:00 | End: 15:30

Were you ever on trainings, which consisted of “slideshowing”? Well, we begin from a spectacular practice, understandable for everybody (in IT). A couple of minutes and you’ll see absolutely from nothing, how to locate a bug in a professional IP camera (in our lab). At the end – one simple link, which allows steering the camera, access to recordings or even the possibility of putting in a backdoor – all without authentication. Once more – everything takes a few minutes and is explained in a language for people, who don’t necessarily have experience with IT security.

Usually after this introduction session people ask – but how can we protect ourselves? Where can we search for information about bugs in other models? How can one check if our devices are exploitable? Can you paste that link-exploit in the chat? Of course, we answer these (and other) questions on an ongoing basis.

Another topic, that comes quite naturally after the introduction. Well – is there an easy way for finding network devices or other “forgotten” systems/applications which are facing the Internet in the company concerned? How to recognize public IP addresses of that company? How much (and what kind) of data records have been leaked for that domain? Can such a reconnaissance be performed fully passively (e.g., without touching in any way, the analyzed infrastructure)?

Answers to those questions once again appear in a practical way. Ready-made, proven tools, live analysis, or the ability for attendees to practice the topics shown live.

How can this type of reconnaissance performed by internal IT enhance the security of the entire company? How to protect yourself against hostile reconnaissance? Yes, we also cover these types of topics in the recon block.

After a technical dosage of information from the previous blocks, it’s time for a few aspects, which may be useful for people who are not strictly related to IT. Some example topics, which are discussed in this block:

  • The history of two companies, which lost a large amount of money due to losing access to their e-mail accounts (how does that happen? What are the options? What to look out for?).
  • How recording several seconds of your voice can enable a perfect vishing (i.e., voice phishing; adversaries can create almost any phrase “spoken” by you; there is a certain demo and a brief consideration of whether such attacks happen in reality).
  • From a leak, through forfeited documents to getting a loan using the name of the victim (we will see in realistic scenarios all steps needed for this attack, two words also on how to protect yourself from being cheated).
  • We can’t miss the frequently “played” topics by cybercriminals around smartphones. SIM swapping and cleaning out bank accounts for amounts going into hundreds of thousands of polish zlotys, or tricks that allow stealing our banking login credentials. Already to the point of boredom – there will also be protection methods here.
  • Almost everybody heard about Microsoft Office macros. But did you see a malicious macro in real action? Does simply opening a document with a malicious macro be a threat? What to sensitize non-technical employees to when it comes to working with Microsoft Office? Is it possible to put in place some top-level protection, so that even the most stubborn non-technical staff won’t be able to infect our network?

Opening an infected attachment (that’s how we finished the previous module) – is one way for ransomware to enter companies. But is it the most frequent one? We’ll see a handful of current statistics. We take a bird's eye look at real-world ransomware attacks on companies (how did he get in? how quick did they discover him? How long was the incident handled?). You’ll also see an example coverage of ransomware in a Polish company (coverage provided by one of our readers, from the point of view of a typical employee). There will be also two words about the basics of so-called threat intelligence.

At the end there will be a lot of tips on anti-ransomware hygiene – from the point of view of IT and a typical employee. Attendees will receive a link to a several-page Sekuraks’ material, discussing the recommended way of handling a ransomware incident or preparing for one.

The whole thing is also interspersed with interesting anecdotes from ransomware incident or mishaps by cybercriminals themselves. By the way – the presenter received first place in attendee polls for his presentation on ransomware - at the industry conference Techrisk (2021).

Was there an incident? – well, now we have a budget for security! Was there no incident? Crisis – cutting budgets. Many companies struggle with that kind of approach. So how much is it really worth spending on security? We’ll answer this question with the topic: security management / risk analysis  (here you can see the speaker’s paper in Polish – about the topic of IT risk analysis).

In this block we will speak about: confidentiality, integrity, accessibility, accountability. What is that? Which of those attributes is the most important? Or perhaps it is a misplaced question? There will also be something about security policies, and as a conclusion, attendees will receive a sample security policy (docx format) for their use.

If someone is less interested in policies, there will be a possibility to download an example workstation security instruction or incident response procedure (both documents to use freely in your organization).

For a good summary of our first day, we have what many people believes that is the most interesting. I.e.:

  • Firewalls are not only blocking a couple of ports.
  • A few words about functions of modern firewalls, some about DMZ’ and frequent sins when separating these zones. We will also see how to check the tightness of the firewall, using the nmap tool for that.
  • After 20 minutes, you’ll know: what nmap is used for, and what not. How to us it to not break anything in the network. How not to make some school mistakes when using it, and how to begin our adventure with a little more advanced option of that tool.
  • One of many eavesdropping attacks, working in most LAN networks.
  • Sounds intriguing? So, let's immediately hit "from the thick of it" by showing the eavesdropping of a VoIP call. There will be ready-made tools and a little later – explanation of how this attack works and recommended protection strategies.
  • IDS systems – as one of the network security monitoring elements.
  • Discovering intruders will be presented using Snort tool as an example. We will see how such a system is complementary to a firewall, consider if bypassing it is possible and where to place it in the network. We will also mention a bit about WAF systems – Web Application Firewall.
  • HTTPS – what it protects against and what not? Here, within one of the live demos, we’ll see logging into a bank (there will be a grey lock in the browser), while extracting from the attacker’s side the login and password in plaintext.

    Actually, this is a fragment of the previous block, but it’s worth highlighting as a practical summary of the first day. We won’t cheat – if during the training there are many questions, and they are answered regularly then the WiFi security block starts on day two.

    Anyway, attendees have the opportunity to see something that is most memorable: live demos:

    • Scanning local WiFi networks (everything legal) – including a short introduction to the subject of required equipment.
    • Cracking WPA2 passwords using GPU (extracting the hash, preparing the hash, dictionary attack / bruteforce attack).

      There will also be a short introduction to WPA2-Enterprise or some unusual WiFi attacks. Of course, all supplemented with practical advice – how to protect yourself.

      Day 2Start: 9:00 | End: 15:30

      It’s worth beginning day two right away with practical demos:

      • Attacking a seemingly safe login page.
      • Demonstration of an example, fresh attack on known software for developing webpages / intranet pages or other more extensive applications. By the way, we’ve seen this attack in Poland – the final effect was installing a cryptocurrency miner and further exploitation of the infrastructure.
      • Uploading in an unobvious way backdoors to an application.
      • A few absurdly simple to use vulnerabilities in big companies applications.

      After this warmup, we’ll see some interesting documents making life easier for developers, administrators or people creating requirements for software providers. There will be a few words about the still warm OWASP Top Ten document (2021 edition).

      In a nutshell – in this block you’ll receive the essence of fresh knowledge from the area of web application security. Anyway, it is about this subject that Sekurak has prepared a unique book: Web Applications Security.

      Note, if one reads carefully – a small surprise. Each attendee will receive a link to the video recording of the 4-hour training course by Michał Bentkowski: Introduction to web application security. You will be able to smoothly continue acquiring knowledge around application security even after the training.

      It’s best to learn from other people’s mistakes. That’s why, during this section, we will present common sins precisely in the context of network architecture.

      The whole thing is covered with a handful of information about the real security consequences that can befall us if we have one of the problems discussed in the network.

      You will also see one curiosity problem with the architecture, which at one time Polish Office of Personal Data Protection drew attention to.

      It’s an area that will be of interest not only to IT staff. Once again – everything is presented as case studies:

      • Can a mobile phone be taken over completely wirelessly?
      • When does clicking on a link make your camera undetectably available to attackers?
      • Is it worth it to use antivirus on mobile phones?
      • What’s an MDM and what could happen if somebody hacks it (case studies)?
      • Basic safety rules on phones.

      Probably the classic discussion around the topics will heat up here: Is Android more secure or iOS? Can we somehow protect ourselves against Pegasus? Does rooting phones increase or decrease security? There is no ideal answer here, which doesn’t mean that the trainer won’t present his point of view about the topic.

      Finally – links to some interesting documents will be provided (both in the context of securing phones/tablets themselves and in the context of building a more secure mobile infrastructure in the company).

      We could talk about this topic for a long time, although just a few basic principles will be mentioned in the training. At the same time, we refer to interesting and free documentation that anyone can apply to their infrastructure: operating systems, network devices, databases, web, application, or cloud servers.

      As they say – “S” in IoT stands for security. Well, exactly, is it that bad? In the final module of the training, we will see the actual IoT security landscape, trace some interesting vulnerabilities - and finally come to some very specific recommendations on how to secure these types of devices (if possible).

      There will also be fresh examples of vulnerabilities in enterprise class devices – here we will make a swift overview of high-profile vulnerabilities, mainly in firewall/VPN class systems. This point, in particular, can make a great argument that devices are worth updating after all, contrary to the wrongly cultivated rule: “if it works – don’t touch it”.

      Questions are often asked on the fly, but some prefer to ask them at the end. Or possibly they have some dilemma related to another area of IT security – other than the one covered in the training. This is the place for a calm conversation (on chat) with the trainer.

      Teaching hours

      9am – 1pm

      Training session

      1pm – 2pm

      Lunch

      2p – 3:30pm

      TRAINING SESSION

      During the training, we will have a 10-minute break every hour or so.

      requirements

      Workstation or laptop with any operating system.

      Stable internet connection with any internet browser.

      A microphone and headphones will help a seamless communication.

      After the training you'll receive

      Training presentation in PDF format.
      12-month access to the video recording of the training.

      Documentation bundle:

      • Example security policy.
      • Security incident response procedure.
      • Instruction for placing systems in a DMZ.
      • Possible ranges of security tests.
      • Links to web pages/tools shown during the training.
      Certificate of completing the training in PDF format (look).

      About the trainer

      Michał-Sajdak
      Michał Sajdak

      Founder of Sekurak and Securitum company.

      Industry certificates: CISSP, CEH (Certified Ethical Hacker), CTT+.

      Security researcher (reported more than a dozen vulnerabilities in IoT devices). Lead editor and co-author of the book Web Application Security (Cracow 2019). Recognized speaker at industry conferences.

      Among dozens of speeches, many received the highest rating from the audience for content quality or presentation style. Trainer and lecturer at training courses in various areas of IT security. Over 10 years he has trained thousands of people in Poland and abroad. An enthusiastic supporter of live demo training formula, which, despite a higher dose of stress on the part of the trainer, provides the attendees with excitement and better assimilation of the transmitted knowledge. Passionate and perfectionist in everything in his area of interest.

      Opinions about the training

      Very good training, professionally prepared and conducted. I will return surely for more.

      Professional approach, practical demos, teaching dynamics, a lot of concrete useful knowledge, materials, links, very good contact with the trainer.

      Elementary for a person who wants to start taking a conscious approach to IT security in the broadest sense.

      Awesome knowledge and light-hearted message of the trainer, only possible because of such passion. Great preparation of examples and very cool form of leading and contact with attendees. No boredom, no prolongation. Topics presented accessibly even for the less initiated. Big plus for a lot of practice and examples. The training inspires further development.

      I really liked the lack of "pouring water" - just specifics.

      Well, and seemingly the beginning, and already at the start shown cool demos. The flesh itself :)

      Reliable discussion of each module and very clear practical examples!

      Substantive, essence of knowledge, very good reception.

      The training was very clear, and I think understandable also for beginners. Trainer well prepared, calm very professional.


      Very cool and lightly served even for a novice.

      (...) Seriously, even advanced learners can verify and/or add to their knowledge. A mass of useful material for beginners.

      First of all - very pleasantly conducted. Approachable and clear.

      Faq

      Yes, when you sign up in the store, a pro-form invoice will be issued automatically. After its payment, a VAT invoice will appear in the system. For special invoicing needs (a company with a foreign TIN, statutory VAT exemption, etc.), please contact us: szkolenia@securitum.pl.

      Of course, besides, remember that you will have access to the training recording for a year, so you can go back to more difficult issues.

      For at least six months, there will be a chat room (for each attendee) where you can contact other attendees (who have joined the chat room), as well as the instructor.

      The training is in the form of practical demos (plus the necessary theory).

      Yes, please contact us: szkolenia@securitum.pl.

      While the training is recorded and made available to attendees, the Q&A session is not.

      No. Food is arranged by participants on their own.

      Introduction to IT security

      Complete the training, download additional materials, 
      get your cyber world in order and stay one step ahead of the hackers!

      During the training we organize contests to consolidate the knowledge - to win Sekurak mugs and t-shirts.

      Kubek-sekurak
      Koszulka-sekurak
      Top