Join our two-day training about IT security. Together we will enter the world of cybersecurity in an easy and clear way.
The course is provided by Michał Sajdak: an IT security researcher, Certified Ethical Hacker, co-author of the bestseller book: “Web applications security”, and the founder of sekurak.pl.
The training is targeted at all people working in IT departments and is a review of actual knowledge about trends in technical IT security. Almost every point of the agenda is illustrated by a practical live demo.
Hacking CCTV cameras, network reconnaissance, web application takeover in several ways, password cracking, computer takeover using a specially prepared MS Word document, LAN traffic wiretapping – are only a few of the demos that will be shown.
There will also be an indication of methods protecting against attacks, hot answers to attendees questions or additional teaching materials.
Each edition of the training is updated, to assure the most actual and essential issues are discussed.
Learn about current threats and methods to protect against them.
Learn about selected threats to your applications in a practical way.
Complete and organize your knowledge.
Save time and respond faster, we did the research for you.
Get your balance back between formalities and technicalities.
Learn ITSec jargon and get into seamless communication with your employees.
Were you ever on trainings, which consisted of “slideshowing”? Well, we begin from a spectacular practice, understandable for everybody (in IT). A couple of minutes and you’ll see absolutely from nothing, how to locate a bug in a professional IP camera (in our lab). At the end – one simple link, which allows steering the camera, access to recordings or even the possibility of putting in a backdoor – all without authentication. Once more – everything takes a few minutes and is explained in a language for people, who don’t necessarily have experience with IT security.
Usually after this introduction session people ask – but how can we protect ourselves? Where can we search for information about bugs in other models? How can one check if our devices are exploitable? Can you paste that link-exploit in the chat? Of course, we answer these (and other) questions on an ongoing basis.
Another topic, that comes quite naturally after the introduction. Well – is there an easy way for finding network devices or other “forgotten” systems/applications which are facing the Internet in the company concerned? How to recognize public IP addresses of that company? How much (and what kind) of data records have been leaked for that domain? Can such a reconnaissance be performed fully passively (e.g., without touching in any way, the analyzed infrastructure)?
Answers to those questions once again appear in a practical way. Ready-made, proven tools, live analysis, or the ability for attendees to practice the topics shown live.
How can this type of reconnaissance performed by internal IT enhance the security of the entire company? How to protect yourself against hostile reconnaissance? Yes, we also cover these types of topics in the recon block.
After a technical dosage of information from the previous blocks, it’s time for a few aspects, which may be useful for people who are not strictly related to IT. Some example topics, which are discussed in this block:
Opening an infected attachment (that’s how we finished the previous module) – is one way for ransomware to enter companies. But is it the most frequent one? We’ll see a handful of current statistics. We take a bird's eye look at real-world ransomware attacks on companies (how did he get in? how quick did they discover him? How long was the incident handled?). You’ll also see an example coverage of ransomware in a Polish company (coverage provided by one of our readers, from the point of view of a typical employee). There will be also two words about the basics of so-called threat intelligence.
At the end there will be a lot of tips on anti-ransomware hygiene – from the point of view of IT and a typical employee. Attendees will receive a link to a several-page Sekuraks’ material, discussing the recommended way of handling a ransomware incident or preparing for one.
The whole thing is also interspersed with interesting anecdotes from ransomware incident or mishaps by cybercriminals themselves. By the way – the presenter received first place in attendee polls for his presentation on ransomware - at the industry conference Techrisk (2021).
Was there an incident? – well, now we have a budget for security! Was there no incident? Crisis – cutting budgets. Many companies struggle with that kind of approach. So how much is it really worth spending on security? We’ll answer this question with the topic: security management / risk analysis (here you can see the speaker’s paper in Polish – about the topic of IT risk analysis).
In this block we will speak about: confidentiality, integrity, accessibility, accountability. What is that? Which of those attributes is the most important? Or perhaps it is a misplaced question? There will also be something about security policies, and as a conclusion, attendees will receive a sample security policy (docx format) for their use.
If someone is less interested in policies, there will be a possibility to download an example workstation security instruction or incident response procedure (both documents to use freely in your organization).
For a good summary of our first day, we have what many people believes that is the most interesting. I.e.:
Actually, this is a fragment of the previous block, but it’s worth highlighting as a practical summary of the first day. We won’t cheat – if during the training there are many questions, and they are answered regularly then the WiFi security block starts on day two.
Anyway, attendees have the opportunity to see something that is most memorable: live demos:
There will also be a short introduction to WPA2-Enterprise or some unusual WiFi attacks. Of course, all supplemented with practical advice – how to protect yourself.
It’s worth beginning day two right away with practical demos:
After this warmup, we’ll see some interesting documents making life easier for developers, administrators or people creating requirements for software providers. There will be a few words about the still warm OWASP Top Ten document (2021 edition).
In a nutshell – in this block you’ll receive the essence of fresh knowledge from the area of web application security. Anyway, it is about this subject that Sekurak has prepared a unique book: Web Applications Security.
Note, if one reads carefully – a small surprise. Each attendee will receive a link to the video recording of the 4-hour training course by Michał Bentkowski: Introduction to web application security. You will be able to smoothly continue acquiring knowledge around application security even after the training.
It’s best to learn from other people’s mistakes. That’s why, during this section, we will present common sins precisely in the context of network architecture.
The whole thing is covered with a handful of information about the real security consequences that can befall us if we have one of the problems discussed in the network.
You will also see one curiosity problem with the architecture, which at one time Polish Office of Personal Data Protection drew attention to.
It’s an area that will be of interest not only to IT staff. Once again – everything is presented as case studies:
Probably the classic discussion around the topics will heat up here: Is Android more secure or iOS? Can we somehow protect ourselves against Pegasus? Does rooting phones increase or decrease security? There is no ideal answer here, which doesn’t mean that the trainer won’t present his point of view about the topic.
Finally – links to some interesting documents will be provided (both in the context of securing phones/tablets themselves and in the context of building a more secure mobile infrastructure in the company).
We could talk about this topic for a long time, although just a few basic principles will be mentioned in the training. At the same time, we refer to interesting and free documentation that anyone can apply to their infrastructure: operating systems, network devices, databases, web, application, or cloud servers.
As they say – “S” in IoT stands for security. Well, exactly, is it that bad? In the final module of the training, we will see the actual IoT security landscape, trace some interesting vulnerabilities - and finally come to some very specific recommendations on how to secure these types of devices (if possible).
There will also be fresh examples of vulnerabilities in enterprise class devices – here we will make a swift overview of high-profile vulnerabilities, mainly in firewall/VPN class systems. This point, in particular, can make a great argument that devices are worth updating after all, contrary to the wrongly cultivated rule: “if it works – don’t touch it”.
Questions are often asked on the fly, but some prefer to ask them at the end. Or possibly they have some dilemma related to another area of IT security – other than the one covered in the training. This is the place for a calm conversation (on chat) with the trainer.
Workstation or laptop with any operating system.
Stable internet connection with any internet browser.
A microphone and headphones will help a seamless communication.
Documentation bundle:
Founder of Sekurak and Securitum company.
Industry certificates: CISSP, CEH (Certified Ethical Hacker), CTT+.
Security researcher (reported more than a dozen vulnerabilities in IoT devices). Lead editor and co-author of the book Web Application Security (Cracow 2019). Recognized speaker at industry conferences.
Among dozens of speeches, many received the highest rating from the audience for content quality or presentation style. Trainer and lecturer at training courses in various areas of IT security. Over 10 years he has trained thousands of people in Poland and abroad. An enthusiastic supporter of live demo training formula, which, despite a higher dose of stress on the part of the trainer, provides the attendees with excitement and better assimilation of the transmitted knowledge. Passionate and perfectionist in everything in his area of interest.
Very good training, professionally prepared and conducted. I will return surely for more.
Professional approach, practical demos, teaching dynamics, a lot of concrete useful knowledge, materials, links, very good contact with the trainer.
Elementary for a person who wants to start taking a conscious approach to IT security in the broadest sense.
Awesome knowledge and light-hearted message of the trainer, only possible because of such passion. Great preparation of examples and very cool form of leading and contact with attendees. No boredom, no prolongation. Topics presented accessibly even for the less initiated. Big plus for a lot of practice and examples. The training inspires further development.
I really liked the lack of "pouring water" - just specifics.
Well, and seemingly the beginning, and already at the start shown cool demos. The flesh itself :)
Reliable discussion of each module and very clear practical examples!
Substantive, essence of knowledge, very good reception.
The training was very clear, and I think understandable also for beginners. Trainer well prepared, calm very professional.
Very cool and lightly served even for a novice.
(...) Seriously, even advanced learners can verify and/or add to their knowledge. A mass of useful material for beginners.
First of all - very pleasantly conducted. Approachable and clear.
Yes, when you sign up in the store, a pro-form invoice will be issued automatically. After its payment, a VAT invoice will appear in the system. For special invoicing needs (a company with a foreign TIN, statutory VAT exemption, etc.), please contact us: szkolenia@securitum.pl.
Of course, besides, remember that you will have access to the training recording for a year, so you can go back to more difficult issues.
For at least six months, there will be a chat room (for each attendee) where you can contact other attendees (who have joined the chat room), as well as the instructor.
The training is in the form of practical demos (plus the necessary theory).
Yes, please contact us: szkolenia@securitum.pl.
While the training is recorded and made available to attendees, the Q&A session is not.
No. Food is arranged by participants on their own.
Complete the training, download additional materials,
get your cyber world in order and stay one step ahead of the hackers!
During the training we organize contests to consolidate the knowledge - to win Sekurak mugs and t-shirts.