├── .github └── workflows │ └── publish.yml ├── .gitignore ├── .vscode ├── settings.json └── tasks.json ├── README.md ├── docs ├── assets │ ├── favicon.png │ ├── images │ │ └── crc-logo.png │ └── logo.png ├── blog │ ├── .authors.yml │ ├── index.md │ └── posts │ │ └── crc-2025-edition.md ├── crc │ ├── 2017 │ │ ├── index.md │ │ ├── summary.csv │ │ └── topics.csv │ ├── 2018 │ │ ├── index.md │ │ ├── summary.csv │ │ └── topics.csv │ ├── 2019 │ │ ├── crc-cybersecurity-survey-2019-dark.webp │ │ ├── crc-cybersecurity-survey-2019-light.webp │ │ ├── crc-cybersecurity-survey-2019.webp │ │ ├── index.md │ │ ├── summary.csv │ │ └── topics.csv │ ├── 2021 │ │ ├── crc-cybersecurity-survey-2021-dark.webp │ │ ├── crc-cybersecurity-survey-2021-light.webp │ │ ├── crc-cybersecurity-survey-2021.webp │ │ ├── index.md │ │ ├── summary.csv │ │ └── topics.csv │ ├── 2022 │ │ ├── crc-cybersecurity-survey-2022-dark.webp │ │ ├── crc-cybersecurity-survey-2022-light.webp │ │ ├── crc-cybersecurity-survey-2022.webp │ │ ├── index.md │ │ ├── summary.csv │ │ └── topics.csv │ ├── 2023 │ │ ├── crc-cybersecurity-survey-2023-dark.webp │ │ ├── crc-cybersecurity-survey-2023-light.webp │ │ ├── crc-cybersecurity-survey-2023.webp │ │ ├── index.md │ │ ├── summary.csv │ │ └── topics.csv │ ├── 2024 │ │ ├── crc-cybersecurity-survey-2024-dark.webp │ │ ├── crc-cybersecurity-survey-2024-light.webp │ │ ├── crc-cybersecurity-survey-2024.webp │ │ ├── index.md │ │ ├── summary.csv │ │ └── topics.csv │ ├── 2025 │ │ ├── crc-cybersecurity-survey-2025-dark.webp │ │ ├── crc-cybersecurity-survey-2025-light.webp │ │ ├── index.md │ │ ├── summary.csv │ │ └── topics.csv │ ├── faq.md │ ├── index.md │ ├── instruction │ │ ├── crcep-invitation.png │ │ ├── crcep-join.png │ │ ├── crcep-member.png │ │ ├── crcep-watch-star.png │ │ ├── cybersecuritystream-invitation.png │ │ ├── cybersecuritystream-invitation.webp │ │ ├── cybersecuritystream-join.png │ │ ├── cybersecuritystream-join.webp │ │ ├── cybersecuritystream-member.png │ │ ├── cybersecuritystream-member.webp │ │ ├── github-new-account.png │ │ ├── github-notification-settings.png │ │ ├── github-notification-settings.webp │ │ └── index.md │ └── previous │ │ └── index.md ├── index.md ├── javascripts │ ├── chart-2019.js │ ├── chart-2021.js │ ├── chart-2022.js │ ├── chart-2023.js │ ├── chart-2024.js │ ├── chart-2025.js │ ├── chart-all.js │ └── chart.min.js ├── projects-initiatives │ └── index.md └── stylesheet │ └── extra.css ├── includes ├── abbreviations.md └── links.md ├── mkdocs.yml ├── overrides ├── main.html └── partials │ ├── copyright.html │ ├── header.html │ └── nav.html └── requirements.txt /.github/workflows/publish.yml: -------------------------------------------------------------------------------- 1 | name: ci 2 | on: 3 | push: 4 | branches: 5 | - master 6 | - main 7 | permissions: 8 | contents: write 9 | jobs: 10 | deploy: 11 | runs-on: ubuntu-latest 12 | steps: 13 | - uses: actions/checkout@v4 14 | with: 15 | fetch-depth: '0' 16 | - name: Configure Git Credentials 17 | run: | 18 | git config user.name github-actions[bot] 19 | git config user.email 41898282+github-actions[bot]@users.noreply.github.com 20 | - uses: actions/setup-python@v5 21 | with: 22 | python-version: 3.x 23 | - run: echo "cache_id=$(date --utc '+%V')" >> $GITHUB_ENV 24 | - uses: actions/cache@v4 25 | with: 26 | key: mkdocs-material-${{ env.cache_id }} 27 | path: .cache 28 | restore-keys: | 29 | mkdocs-material- 30 | - run: pip install mkdocs-material mkdocs-glightbox mkdocs-git-authors-plugin mkdocs-git-revision-date-localized-plugin mkdocs-table-reader-plugin "mkdocs-material[imaging]" mkdocs-rss-plugin 31 | - run: mkdocs gh-deploy --force -------------------------------------------------------------------------------- /.gitignore: -------------------------------------------------------------------------------- 1 | .DS_Store 2 | .cache 3 | data -------------------------------------------------------------------------------- /.vscode/settings.json: -------------------------------------------------------------------------------- 1 | { 2 | "virtualenvPath": "/Users/$USER/.virtualenvs/mkdocs/bin", 3 | } -------------------------------------------------------------------------------- /.vscode/tasks.json: -------------------------------------------------------------------------------- 1 | { 2 | "version": "2.0.0", 3 | "tasks": [ 4 | { 5 | "label": "Start Mkdocs", 6 | "type": "shell", 7 | "options": 8 | { 9 | "env": 10 | { 11 | "PROJECT_PORT": "8087" 12 | } 13 | }, 14 | "command": "${config:virtualenvPath}/mkdocs serve -a 127.0.0.1:$PROJECT_PORT --open" 15 | } 16 | ] 17 | } -------------------------------------------------------------------------------- /README.md: -------------------------------------------------------------------------------- 1 | # Cybersecurity Stream 2 | 3 | To see generated output go to https://cybersecuritystream.github.io -------------------------------------------------------------------------------- /docs/assets/favicon.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/cybersecuritystream/cybersecuritystream.github.io/ab572f2b8254a8b64a0914a3f1c21b878bbccb32/docs/assets/favicon.png -------------------------------------------------------------------------------- /docs/assets/images/crc-logo.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/cybersecuritystream/cybersecuritystream.github.io/ab572f2b8254a8b64a0914a3f1c21b878bbccb32/docs/assets/images/crc-logo.png -------------------------------------------------------------------------------- /docs/assets/logo.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/cybersecuritystream/cybersecuritystream.github.io/ab572f2b8254a8b64a0914a3f1c21b878bbccb32/docs/assets/logo.png -------------------------------------------------------------------------------- /docs/blog/.authors.yml: -------------------------------------------------------------------------------- 1 | authors: 2 | damiankrawczyk: 3 | name: Damian Krawczyk 4 | description: Coordinator 5 | avatar: https://avatars.githubusercontent.com/u/9287709?v=4 6 | url: https://damiankrawczyk.com 7 | lukaszjankowski: 8 | name: Łukasz Jankowski 9 | description: Coordinator 10 | avatar: https://avatars.githubusercontent.com/u/83634348?v=4 11 | url: https://www.linkedin.com/in/lukasz-jan-jankowski -------------------------------------------------------------------------------- /docs/blog/index.md: -------------------------------------------------------------------------------- 1 | --- 2 | title: Blog 3 | description: Subscribe our blog to be always up-to-date! 4 | --- 5 | 6 | # Blog 7 | 8 | [Subscribe to this blog via RSS feed :fontawesome-solid-square-rss:](https://cybersecuritystream.github.io/feed_rss_created.xml){ .md-button } 9 | 10 | -------------------------------------------------------------------------------- /docs/blog/posts/crc-2025-edition.md: -------------------------------------------------------------------------------- 1 | --- 2 | title: Registration for CRC 2025 edition is open! 3 | date: 2025-01-11 4 | authors: [damiankrawczyk,lukaszjankowski] 5 | description: > 6 | CRC edition 2025 registration started, sign-up! 7 | categories: 8 | - CRC 9 | --- 10 | 11 | # Registration for CRC 2025 edition is open! 12 | 13 | __Sign-up!__ 14 | 15 | If you have been waiting the whole year for a new edition of our "*Cybersecurity - defense in modern organizations*" training, this time has come! Registration is finally open! 16 | 17 | 18 | Check [this page](../../crc/2025/index.md) to learn more about what we prepared for you this year, or click the button below right away! 19 | 20 | [Register for 2025 edition :octicons-link-external-16:](https://euslugi.polsl.pl/Formularz/Formularz/Wypelnij/97){ .md-button .md-button--primary } -------------------------------------------------------------------------------- /docs/crc/2017/index.md: -------------------------------------------------------------------------------- 1 | --- 2 | title: CRC 2017 edition 3 | description: Schedule, topics, and trainers for the 2017 edition. 4 | --- 5 | 6 | # CRC 2017 edition 7 | 8 | ## Summary 9 | 10 | {{ read_csv('summary.csv') }} 11 | 12 | ## Topics 13 | 14 | {{ read_csv('topics.csv', colalign=("left","left",)) }} 15 | -------------------------------------------------------------------------------- /docs/crc/2017/summary.csv: -------------------------------------------------------------------------------- 1 | **Number of hours**,**15 hours** 2 | **Number of meetings**,**5 meetings** 3 | **Form of meeting**,**on-site** -------------------------------------------------------------------------------- /docs/crc/2017/topics.csv: -------------------------------------------------------------------------------- 1 | #,Topic,Trainer 2 | 1,IT Security and Cybercrime - introduction,Łukasz Miedziński 3 | 2,IT Risk management processes,Łukasz Miedziński 4 | 3,IT security assurance in the final users environments - as the security assurance of end-user environments,Łukasz Miedziński 5 | 4,IT security - networks and applications,Łukasz Miedziński 6 | 5,Vulnerability Management,Łukasz Miedziński -------------------------------------------------------------------------------- /docs/crc/2018/index.md: -------------------------------------------------------------------------------- 1 | --- 2 | title: CRC 2018 edition 3 | description: Schedule, topics, and trainers for the 2018 edition. 4 | --- 5 | 6 | --8<-- "includes/links.md" 7 | 8 | # CRC 2018 edition 9 | 10 | ## Summary 11 | 12 | {{ read_csv('summary.csv') }} 13 | 14 | ## Topics 15 | 16 | {{ read_csv('topics.csv', colalign=("left","left",)) }} 17 | -------------------------------------------------------------------------------- /docs/crc/2018/summary.csv: -------------------------------------------------------------------------------- 1 | **Number of hours**,**12 hours** 2 | **Number of meetings**,**6 meetings** 3 | **Form of meeting**,**on-site** -------------------------------------------------------------------------------- /docs/crc/2018/topics.csv: -------------------------------------------------------------------------------- 1 | #,Topic,Trainer 2 | 1,"Who attacks the organization and how (OWASP TOP 10, ASVS and protection methods) - part 1",Krzysztof Cudak 3 | 2,"Who attacks the organization and how (OWASP TOP 10, ASVS and protection methods) - part 2",Krzysztof Cudak 4 | 3,"Simulation and detection of APT attack in an organization - part 1","Mariusz Derela, Michał Terbert, Krzysztof Kuźnik [:material-linkedin:][krzysztof-kuznik-in]" 5 | 4,"Simulation and detection of APT attack in an organization - part 2","Mariusz Derela, Michał Terbert, Krzysztof Kuźnik [:material-linkedin:][krzysztof-kuznik-in]" 6 | 5,"Vulnerability types, classification and detection",Maciej Wróbel [:material-linkedin:][maciej-wrobel-in] 7 | 6,"Designing tests to verify configuration and detect vulnerabilities",Maciej Wróbel [:material-linkedin:][maciej-wrobel-in] -------------------------------------------------------------------------------- /docs/crc/2019/crc-cybersecurity-survey-2019-dark.webp: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/cybersecuritystream/cybersecuritystream.github.io/ab572f2b8254a8b64a0914a3f1c21b878bbccb32/docs/crc/2019/crc-cybersecurity-survey-2019-dark.webp -------------------------------------------------------------------------------- /docs/crc/2019/crc-cybersecurity-survey-2019-light.webp: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/cybersecuritystream/cybersecuritystream.github.io/ab572f2b8254a8b64a0914a3f1c21b878bbccb32/docs/crc/2019/crc-cybersecurity-survey-2019-light.webp -------------------------------------------------------------------------------- /docs/crc/2019/crc-cybersecurity-survey-2019.webp: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/cybersecuritystream/cybersecuritystream.github.io/ab572f2b8254a8b64a0914a3f1c21b878bbccb32/docs/crc/2019/crc-cybersecurity-survey-2019.webp -------------------------------------------------------------------------------- /docs/crc/2019/index.md: -------------------------------------------------------------------------------- 1 | --- 2 | title: CRC 2019 edition 3 | description: Schedule, topics, and trainers for the 2019 edition. 4 | --- 5 | 6 | --8<-- "includes/links.md" 7 | 8 | # CRC 2019 edition 9 | 10 | ## Summary 11 | 12 | {{ read_csv('summary.csv') }} 13 | 14 |
15 | 16 | ## Topics 17 | 18 | {{ read_csv('topics.csv', colalign=("left","left",)) }} 19 | 20 | ## Assessment 21 | 22 | Here are some opinions from our training participants in **CRC'19**: 23 | 24 | ![CRC Cybersecurity survey 2019](crc-cybersecurity-survey-2019-light.webp#only-light){ width="600" } 25 | ![CRC Cybersecurity survey 2019](crc-cybersecurity-survey-2019-dark.webp#only-dark){ width="600" } 26 | 27 | ## Testimonials 28 | 29 | !!! quote "2019 training participant 1" 30 | 31 | It was very helpful to understand security principles. 32 | 33 | !!! quote "2019 training participant 2" 34 | 35 | I really liked hearing the entire course finished in just two meetings and all the conversations during the breaks, so I think this is definitely what should stay. 36 | 37 | !!! quote "2019 training participant 3" 38 | 39 | Such a course should be at the university as a subject throughout the whole semester. Too many interesting things to explain in 16h. 40 | 41 | !!! quote "2019 training participant 4" 42 | 43 | I believe that the course should consist of more classes, as a consequence of which each topic would be discussed in more detail, which would translate into its better understanding and consolidation. The course was very interesting and I am glad to be able to take part in it. 44 | 45 | !!! quote "2019 training participant 5" 46 | 47 | Two Saturdays is not enough. Ideally, for example, 6 Saturdays. 48 | 49 | -------------------------------------------------------------------------------- /docs/crc/2019/summary.csv: -------------------------------------------------------------------------------- 1 | **Number of hours**,**12 hours** 2 | **Number of meetings**,"**2 meetings, 2 Saturdays**" 3 | **Form of meeting**,**on-site** -------------------------------------------------------------------------------- /docs/crc/2019/topics.csv: -------------------------------------------------------------------------------- 1 | #,Topic,Trainer 2 | 1,Light Side of Security,"Askaniusz Ferens [:material-linkedin:][askaniusz-ferens-in], Sławomir Staciwa [:material-linkedin:][slawomir-staciwa-in]" 3 | 2,"Brief introduction to CCERT & CTA responsibilities, Vulnerability Alerting Service, Responsible Disclosure Programme", Jędrzej Maksym 4 | 3,"Phishing Employee Programme, Incident Response, Domain Monitoring",Jędrzej Maksym 5 | 4,Vulnerability Assessment,Damian Krawczyk [:material-web:][damian-krawczyk-web] 6 | 5,Vulnerability Detection Plugins,Damian Krawczyk [:material-web:][damian-krawczyk-web] 7 | 6,Technical State Compliance Monitoring,Maciej Wróbel [:material-linkedin:][maciej-wrobel-in] -------------------------------------------------------------------------------- /docs/crc/2021/crc-cybersecurity-survey-2021-dark.webp: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/cybersecuritystream/cybersecuritystream.github.io/ab572f2b8254a8b64a0914a3f1c21b878bbccb32/docs/crc/2021/crc-cybersecurity-survey-2021-dark.webp -------------------------------------------------------------------------------- /docs/crc/2021/crc-cybersecurity-survey-2021-light.webp: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/cybersecuritystream/cybersecuritystream.github.io/ab572f2b8254a8b64a0914a3f1c21b878bbccb32/docs/crc/2021/crc-cybersecurity-survey-2021-light.webp -------------------------------------------------------------------------------- /docs/crc/2021/crc-cybersecurity-survey-2021.webp: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/cybersecuritystream/cybersecuritystream.github.io/ab572f2b8254a8b64a0914a3f1c21b878bbccb32/docs/crc/2021/crc-cybersecurity-survey-2021.webp -------------------------------------------------------------------------------- /docs/crc/2021/index.md: -------------------------------------------------------------------------------- 1 | --- 2 | title: CRC 2021 edition 3 | description: Schedule, topics, and trainers for the 2021 edition. 4 | --- 5 | 6 | --8<-- "includes/links.md" 7 | 8 | # CRC 2021 edition 9 | 10 | ## Summary 11 | 12 | {{ read_csv('summary.csv') }} 13 | 14 |
15 | 16 | ## Topics 17 | 18 | {{ read_csv('topics.csv', colalign=("left","left",)) }} 19 | 20 | ## Assessment 21 | 22 | Here are some opinions from our training participants in **CRC'21**: 23 | 24 | ![CRC Cybersecurity survey 2021](crc-cybersecurity-survey-2021-light.webp#only-light){ width="600" } 25 | ![CRC Cybersecurity survey 2021](crc-cybersecurity-survey-2021-dark.webp#only-dark){ width="600" } 26 | 27 | ## Testimonials 28 | 29 | !!! quote "2021 training participant 1" 30 | 31 | Great course, thanks! 32 | 33 | !!! quote "2021 training participant 2" 34 | 35 | It is a pity that the course only lasted two days. There was no time to bite into the topic :) 36 | 37 | !!! quote "2021 training participant 3" 38 | 39 | Even more labs would be welcome ;) 40 | 41 | !!! quote "2021 training participant 4" 42 | 43 | In my opinion more practical exercises would be better, also homework tasks would be welcome too. 44 | 45 | -------------------------------------------------------------------------------- /docs/crc/2021/summary.csv: -------------------------------------------------------------------------------- 1 | **Number of hours**,**10 hours** 2 | **Number of meetings**,"**2 meetings, 2 Saturdays**" 3 | **Form of meeting**,**on-line** -------------------------------------------------------------------------------- /docs/crc/2021/topics.csv: -------------------------------------------------------------------------------- 1 | #,Topic,Trainer 2 | 1,Defensive Cyber Security,Askaniusz Ferens [:material-linkedin:][askaniusz-ferens-in] 3 | 2,Technical State Compliance Monitoring,Maciej Wróbel [:material-linkedin:][maciej-wrobel-in] 4 | 3,Vulnerability Assessment,"Łukasz Jankowski [:material-linkedin:][lukasz-jankowski-in],Damian Krawczyk [:material-web:][damian-krawczyk-web]" 5 | 4,Cloud Native Security,Damian Krawczyk [:material-web:][damian-krawczyk-web] 6 | 5,Secure Software Lifecycle,Damian Krawczyk [:material-web:][damian-krawczyk-web] -------------------------------------------------------------------------------- /docs/crc/2022/crc-cybersecurity-survey-2022-dark.webp: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/cybersecuritystream/cybersecuritystream.github.io/ab572f2b8254a8b64a0914a3f1c21b878bbccb32/docs/crc/2022/crc-cybersecurity-survey-2022-dark.webp -------------------------------------------------------------------------------- /docs/crc/2022/crc-cybersecurity-survey-2022-light.webp: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/cybersecuritystream/cybersecuritystream.github.io/ab572f2b8254a8b64a0914a3f1c21b878bbccb32/docs/crc/2022/crc-cybersecurity-survey-2022-light.webp -------------------------------------------------------------------------------- /docs/crc/2022/crc-cybersecurity-survey-2022.webp: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/cybersecuritystream/cybersecuritystream.github.io/ab572f2b8254a8b64a0914a3f1c21b878bbccb32/docs/crc/2022/crc-cybersecurity-survey-2022.webp -------------------------------------------------------------------------------- /docs/crc/2022/index.md: -------------------------------------------------------------------------------- 1 | --- 2 | title: CRC 2022 edition 3 | description: Schedule, topics, and trainers for the 2022 edition. 4 | --- 5 | 6 | --8<-- "includes/links.md" 7 | 8 | # CRC 2022 edition 9 | 10 | ## Summary 11 | 12 | {{ read_csv('summary.csv') }} 13 | 14 |
15 | 16 | ## Topics 17 | 18 | {{ read_csv('topics.csv', colalign=("left","left",)) }} 19 | 20 | ## Assessment 21 | 22 | Here are some opinions from our training participants in **CRC'22**: 23 | 24 | ![CRC Cybersecurity survey 2022](crc-cybersecurity-survey-2022-light.webp#only-light){ width="600" } 25 | ![CRC Cybersecurity survey 2022](crc-cybersecurity-survey-2022-dark.webp#only-dark){ width="600" } 26 | 27 | ## Testimonials 28 | 29 | !!! quote "2022 training participant 1" 30 | 31 | It was a great adventure, comparing to other CRC course that i participated you definitely exceeded my expectations, I will recommend your course to others, thanks :) 32 | 33 | !!! quote "2022 training participant 2" 34 | 35 | I liked the opportunity to hear the opinions of many people working in different areas of cyber security. 36 | 37 | !!! quote "2022 training participant 3" 38 | 39 | The course was really well run and interesting. Time went by very quickly and it’s hard to complain about anything. 40 | 41 | !!! quote "2022 training participant 4" 42 | 43 | Very cool course! Awesome that you were able to include hands-on activities! 44 | 45 | !!! quote "2022 training participant 5" 46 | 47 | Course was really good and valuable from cyber side. It was performed on the high - level quality. 48 | 49 | !!! quote "2022 training participant 6" 50 | 51 | A must have for a newbies who want to jump into the cybersecurity. 52 | 53 | !!! quote "2022 training participant 7" 54 | 55 | Interesting introduction to the topic of cyber security, required theory presented in an understandable way. 56 | 57 | !!! quote "2022 training participant 8" 58 | 59 | Everything was correct in my opinion. It was very professional course and I’m very satisfied. 60 | 61 | !!! quote "2022 training participant 9" 62 | 63 | In my opinion, all lectures were very interesting, the presenters were well-prepared. I just think that after each lecture should be more practical exercises or something like homework, to consolidate the knowledge of students. 64 | 65 | !!! quote "2022 training participant 10" 66 | 67 | It would be great to make this course longer with more practical exercises. But overall it was really great experience. 68 | 69 | !!! quote "2022 training participant 11" 70 | 71 | I used the class to systematize my knowledge and learn about the corporate viewpoint and approach. Considering the limited time frame of the class, the topics covered were reasonably developed. I have a very positive opinion on the whole. 72 | 73 | !!! quote "2022 training participant 12" 74 | 75 | I think all the points covered in the course are very important, but I would have added an extra week to the course to cover more points in a practical context. 76 | 77 | !!! quote "2022 training participant 13" 78 | 79 | It was fun - the kindness of lecturers is always appreciated :) 80 | 81 | !!! quote "2022 training participant 14" 82 | 83 | I really enjoyed it! I found it really interesting to take a deep dive into the cybersecurity field of work and see how it’s done. 84 | 85 | !!! quote "2022 training participant 15" 86 | 87 | A very good and valuable course. 88 | 89 | !!! quote "2022 training participant 16" 90 | 91 | Maybe more practical lessons - and more lessons in general because the course was very interesting. 92 | 93 | !!! quote "2022 training participant 17" 94 | 95 | I think it’s a very much digestible course with many real examples, easy to follow for the IT student. 96 | 97 | !!! quote "2022 training participant 18" 98 | 99 | I really enjoyed the practical classes. For that reason, it’s a little bit of a pity that there weren’t enough of them. 100 | 101 | !!! quote "2022 training participant 19" 102 | 103 | Revelation. More meetings than 4. 104 | 105 | !!! quote "2022 training participant 20" 106 | 107 | The course was conducted by excellent professionals, in a pleasant atmosphere. 108 | 109 | !!! quote "2022 training participant 21" 110 | 111 | I learned a lot of new interesting facts and things about cyber security, very interesting and developing course. 112 | 113 | !!! quote "2022 training participant 22" 114 | 115 | I learned a lot of cool new information both internally and refreshed the basics, the course was really very enjoyable. 116 | 117 | !!! quote "2022 training participant 23" 118 | 119 | Very cool course, nice to listen to people with actual experience in the field. 120 | 121 | !!! quote "2022 training participant 24" 122 | 123 | I think it is always a good idea to spend your time on learning something new. So, in general I’m happy that I could take part in this course and (I hope) get a certificate to showcase my knowledge. 124 | 125 | !!! quote "2022 training participant 25" 126 | 127 | I would not change anything about this course. 128 | 129 | !!! quote "2022 training participant 26" 130 | 131 | A must have for a newbies who want to jump into the cybersecurity. 132 | 133 | !!! quote "2022 training participant 27" 134 | 135 | Nice course, opportunity to gain practical knowledge from people working in cyber security. 136 | 137 | !!! quote "2022 training participant 28" 138 | 139 | Overall I really enjoyed the course. If possible, even more topics could be covered in the future. 140 | 141 | !!! quote "2022 training participant 29" 142 | 143 | Even more practice and maybe more advanced stuff! It’s been great! 144 | 145 | -------------------------------------------------------------------------------- /docs/crc/2022/summary.csv: -------------------------------------------------------------------------------- 1 | **Number of hours**,**24 hours** 2 | **Number of meetings**,"**4 meetings, 4 Saturdays**" 3 | **Form of meeting**,**on-line** 4 | **Schedule**,2022-03-19 09:00-16:00 +0100 (CET)
2022-03-26 09:00-16:00 +0100 (CET)
2022-04-02 09:00-16:00 +0200 (CEST)
2022-04-09 09:00-16:00 +0200 (CEST) -------------------------------------------------------------------------------- /docs/crc/2022/topics.csv: -------------------------------------------------------------------------------- 1 | #,Topic,Trainer 2 | 1,Cyber awareness,Sławomir Staciwa [:material-linkedin:][slawomir-staciwa-in] 3 | 2,Risk Management - basics,Askaniusz Ferens [:material-linkedin:][askaniusz-ferens-in] 4 | 3,Identity and Access Management,Jacek Kocyba [:material-linkedin:][jacek-kocyba-in] 5 | 4,Cryptography - basics,Jacek Kocyba [:material-linkedin:][jacek-kocyba-in] 6 | 5,Secure Configuration Monitoring,Maciej Wróbel [:material-linkedin:][maciej-wrobel-in] 7 | 6,Password vaults,Mateusz Kozieł [:material-linkedin:][mateusz-koziel-in] 8 | 7,Vulnerability Assessment,"Łukasz Jankowski [:material-linkedin:][lukasz-jankowski-in],Damian Krawczyk [:material-web:][damian-krawczyk-web]" 9 | 8,Cloud Native Security,Damian Krawczyk [:material-web:][damian-krawczyk-web] 10 | 9,Offensive Cybersecurity,Jakub Plusczok [:material-linkedin:][jakub-plusczok-in] -------------------------------------------------------------------------------- /docs/crc/2023/crc-cybersecurity-survey-2023-dark.webp: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/cybersecuritystream/cybersecuritystream.github.io/ab572f2b8254a8b64a0914a3f1c21b878bbccb32/docs/crc/2023/crc-cybersecurity-survey-2023-dark.webp -------------------------------------------------------------------------------- /docs/crc/2023/crc-cybersecurity-survey-2023-light.webp: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/cybersecuritystream/cybersecuritystream.github.io/ab572f2b8254a8b64a0914a3f1c21b878bbccb32/docs/crc/2023/crc-cybersecurity-survey-2023-light.webp -------------------------------------------------------------------------------- /docs/crc/2023/crc-cybersecurity-survey-2023.webp: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/cybersecuritystream/cybersecuritystream.github.io/ab572f2b8254a8b64a0914a3f1c21b878bbccb32/docs/crc/2023/crc-cybersecurity-survey-2023.webp -------------------------------------------------------------------------------- /docs/crc/2023/index.md: -------------------------------------------------------------------------------- 1 | --- 2 | title: CRC 2023 edition 3 | description: Schedule, topics, and trainers for the 2023 edition. 4 | --- 5 | 6 | --8<-- "includes/links.md" 7 | 8 | # CRC 2023 edition 9 | 10 | ## Summary 11 | 12 | {{ read_csv('summary.csv') }} 13 | 14 |
15 | 16 | ## Topics 17 | 18 | {{ read_csv('topics.csv', colalign=("left","left",)) }} 19 | 20 | ## Assessment 21 | 22 | Here are some opinions from our training participants in **CRC'23**: 23 | 24 | ![CRC Cybersecurity survey 2023](crc-cybersecurity-survey-2023-light.webp#only-light){ width="600" } 25 | ![CRC Cybersecurity survey 2023](crc-cybersecurity-survey-2023-dark.webp#only-dark){ width="600" } 26 | 27 | ## Testimonials 28 | 29 | !!! quote "2023 training participant 1" 30 | 31 | This was one of the best experiences I’ve had during my time at a university. 32 | 33 | !!! quote "2023 training participant 2" 34 | 35 | Overall it was a very interesting course. I am satisfied with it - it taught me more than 2 years of cybersecurity studies :D 36 | 37 | !!! quote "2023 training participant 3" 38 | 39 | The course was conducted very high quality compared to other CRC courses. The commitment of the speakers was evident and their interest in the subject made a very positive impression. The course was very interesting and engaging. 40 | 41 | !!! quote "2023 training participant 4" 42 | 43 | I am very pleased that I chose this course among many others. The topics as well as the materials presented, are very important in today’s business operations, so I was eager to listen to the lectures presented in the course. It also brought me closer to deciding to start looking for a job in this industry. 44 | 45 | !!! quote "2023 training participant 5" 46 | 47 | Very valuable time spent with very friendly and qualified staff from ING Hubs Poland. Nicely organized, the presenter interviewed and interacted with participants on streaming quality and questions on cybersecurity topics. A lot of substantive knowledge and topical anecdotes. As a beginner in the subject, it was a great injection of knowledge and perspective on the topic. I would recommend to others and would gladly attend again and continue to gain knowledge. 48 | 49 | !!! quote "2023 training participant 6" 50 | 51 | I am very satisfied with the course. I learned a lot about the operation of cybersecurity teams in companies. The presenters were very friendly and encouraged me to explore the world of Cybersecurity further. 52 | 53 | !!! quote "2023 training participant 7" 54 | 55 | The course was a very interesting introduction to the world of Cybersecurity. I recommend it to people who are unsure which way they want to go in the IT world. Having classes taught by experienced industry professionals is a very good idea. 56 | 57 | !!! quote "2023 training participant 8" 58 | 59 | Very valuable course, interesting labs, and really a lot of useful knowledge. The biggest plus was that the presenters were practitioners. Course without unnecessary clogging. 100% knowledge and inspiration! 60 | 61 | !!! quote "2023 training participant 9" 62 | 63 | The course was very enjoyable. Some Saturdays passed very quickly, and some did not. I really liked the case study idea. All the lecturers were very substantive and explained the issues clearly. 64 | 65 | !!! quote "2023 training participant 10" 66 | 67 | The course was conducted very well. A lot of information was presented in the lectures. A big plus is also the materials that will certainly be useful in the future to consolidate information. I am very satisfied with the course, and I hope to join ING Hubs Poland someday. 68 | 69 | !!! quote "2023 training participant 11" 70 | 71 | I enjoyed spending time learning new things, especially about audits. I’m surprised you provided us with a schedule specifying the specific time for each class. A big thank you for that, and please continue this course because you did an excellent job. I hope to participate in Vol. 2 of this course in the future :) 72 | 73 | !!! quote "2023 training participant 12" 74 | 75 | The course was conducted at a high standard in an interesting way. It guides us through the various levels of CyberSec, as well as gives us the opportunity to acquire new and helpful knowledge, mainly theoretical, which gives us the opportunity to get acquainted with various levels of the industry and helps us decide what is most interesting to us and in what direction we would like to develop. Everyone will find something for themselves, whether a newcomer, unfamiliar with the subject, or even an intermediate who wants to expand their knowledge. I recommend and thank you for the opportunity to participate, it was interesting :) 76 | 77 | !!! quote "2023 training participant 13" 78 | 79 | It’s great that ING Hubs give a possibility to broaden their horizons in an eld of Cybersecurity for students without work experience. I am very happy I could participate in this course and see a little bit of every area. I’m looking forward to other courses conducted by your company! :) 80 | 81 | !!! quote "2023 training participant 14" 82 | 83 | I think that the course is something completely transformative for me, as somebody coming from more of a software development background because that is what I did as a hobby and part of learning new technologies, mainly web technologies. I was always interested in technologies related to security. I used Kali Linux in the past to do some basic pentesting at home with an old router. And when attending this course, I was able to learn information that made me realize how broad and interesting the field of security is in IT. The professionalism of the presenters and the depth at which the topics were explained, along with very interesting practical elements, made it so that I believe I want to actively use the skills learned here in my career in the future. To sum up, it was a very positive experience. 84 | 85 | !!! quote "2023 training participant 15" 86 | 87 | I learned a lot of new things during the course. I am glad I had the opportunity to learn about the world of Cybersecurity. The exercises were conducted in a very accessible form and in an extremely interesting way. 88 | 89 | !!! quote "2023 training participant 16" 90 | 91 | I enjoyed the course, I have learned many interesting new things and I am happy that I participated in the course. 92 | 93 | !!! quote "2023 training participant 17" 94 | 95 | The course, in a single word, was great. A lot of knowledge was passed on in a very friendly way. I learned a lot of useful things that will definitely help me in my development in the field of Cybersecurity, as well as useful in everyday life. 96 | 97 | !!! quote "2023 training participant 18" 98 | 99 | You don’t need to correct anything in this course. 100 | 101 | !!! quote "2023 training participant 19" 102 | 103 | The topics covered were discussed at length by people who clearly have a passion for what they do for a living, and I enjoyed the lectures on conducting attacks and red teaming the most. 104 | 105 | !!! quote "2023 training participant 20" 106 | 107 | Very cool course. Hopefully, such courses will be held more often. 108 | 109 | !!! quote "2023 training participant 21" 110 | 111 | I really enjoyed the course and the whole format. The instructors were very friendly and professional. I learned a lot of new things that I am eager to use in my future engineering thesis on Cybersecurity. 112 | 113 | !!! quote "2023 training participant 22" 114 | 115 | My impressions of the course are very positive. I learned a lot of new things, and the wide range of topics allowed me to become familiar with the cybersecurity industry. 116 | 117 | !!! quote "2023 training participant 23" 118 | 119 | Do more of that kind of events :) 120 | 121 | !!! quote "2023 training participant 24" 122 | 123 | I would not correct anything, the course was great, and you do not have to correct anything. I learned a lot of new and interesting things. I recommend everyone to take such a course. 124 | 125 | !!! quote "2023 training participant 25" 126 | 127 | Great experience - thank you so much for the informative and engaging lectures. 128 | 129 | !!! quote "2023 training participant 26" 130 | 131 | The whole training came out great. The presenters interestingly passed on knowledge. 132 | 133 | !!! quote "2023 training participant 27" 134 | 135 | I don’t have any background in it, but I enjoyed this course a lot. Especially risk management and audit. Case studies and real examples are always the best way to learn for me. Thank you for the course, and good luck to all of you. 136 | 137 | !!! quote "2023 training participant 28" 138 | 139 | Thanks to the whole team for a well conducted classes. Everyone has a lot of knowledge; most importantly, they can convey it understandably. Lots of practical examples from real work, not just theory. In addition, a broad view of the whole CyberSec (VA, Risk Management, Blue Team, Red Team) there is something for everyone :) 140 | 141 | !!! quote "2023 training participant 29" 142 | 143 | It’s a very cool and valuable course. 144 | 145 | !!! quote "2023 training participant 30" 146 | 147 | The course contained a lot of practical and theoretical knowledge provided by practitioners, which allows one to expand knowledge and greater awareness of risks and allows further development! Super course! 148 | 149 | !!! quote "2023 training participant 31" 150 | 151 | The course is great. I don’t have any more ideas to improve this course. Very enjoyable training sessions :) 152 | 153 | -------------------------------------------------------------------------------- /docs/crc/2023/summary.csv: -------------------------------------------------------------------------------- 1 | **Number of hours**,**28 hours** 2 | **Number of meetings**,"**5 meetings, 5 Saturdays**" 3 | **Form of meeting**,**on-line / hybrid** 4 | **Schedule**,2023-03-18 09:00-16:00 +0100 (CET)
2023-03-25 09:00-16:00 +0100 (CET)
2023-04-01 09:00-16:00 +0200 (CEST)
2023-04-15 09:00-16:00 +0200 (CEST)
2023-04-22 09:00-16:00 +0200 (CEST) -------------------------------------------------------------------------------- /docs/crc/2023/topics.csv: -------------------------------------------------------------------------------- 1 | #,Topic,Trainer 2 | 1,Kickoff meeting,Damian Krawczyk [:material-web:][damian-krawczyk-web] 3 | 2,Cyber awareness,Sławomir Staciwa [:material-linkedin:][slawomir-staciwa-in] 4 | 3,Risk Management - Basics,Askaniusz Ferens [:material-linkedin:][askaniusz-ferens-in] 5 | 4,Risk Management - Compliance,Kamila Juszczyk [:material-linkedin:][kamila-juszczyk-in] 6 | 5,Risk Management - Operational Risk Management,Katarzyna Kowalski [:material-linkedin:][katarzyna-kowalski-in] 7 | 6,Risk Management - Audits,Karolina Sieruga [:material-linkedin:][karolina-sieruga-in] 8 | 7,Identity and Access Management,Jacek Kocyba [:material-linkedin:][jacek-kocyba-in] 9 | 8,Password vaults,Mateusz Kozieł [:material-linkedin:][mateusz-koziel-in] 10 | 9,Cryptography - basics,Jacek Kocyba [:material-linkedin:][jacek-kocyba-in] 11 | 10,Secure Configuration Monitoring,Maciej Wróbel [:material-linkedin:][maciej-wrobel-in] 12 | 11,Vulnerability Assessment,"Łukasz Jankowski [:material-linkedin:][lukasz-jankowski-in],
Damian Krawczyk [:material-web:][damian-krawczyk-web],
Jakub Hrehorowicz" 13 | 12,Offensive Cybersecurity - workshop,Jakub Plusczok [:material-linkedin:][jakub-plusczok-in] 14 | 13,Offensive Cybersecurity - DDOS,Gerard Żmuda [:material-linkedin:][gerard-zmuda-in] 15 | 14,Defensive Cybersecurity - HTTP traffic analysis,Krzysztof Kuźnik [:material-linkedin:][krzysztof-kuznik-in] 16 | 15,"Defensive Cybersecurity - SIEM, SOAR, ETL",Daniel Jeczeń [:material-linkedin:][daniel-jeczen-in] 17 | 16,Defensive Cybersecurity - Static malware analysis,Mirosław Koczenasz 18 | 17,Introduction to Azure Public Cloud,Rafał Nowakowski [:material-linkedin:][rafal-nowakowski-in] -------------------------------------------------------------------------------- /docs/crc/2024/crc-cybersecurity-survey-2024-dark.webp: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/cybersecuritystream/cybersecuritystream.github.io/ab572f2b8254a8b64a0914a3f1c21b878bbccb32/docs/crc/2024/crc-cybersecurity-survey-2024-dark.webp -------------------------------------------------------------------------------- /docs/crc/2024/crc-cybersecurity-survey-2024-light.webp: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/cybersecuritystream/cybersecuritystream.github.io/ab572f2b8254a8b64a0914a3f1c21b878bbccb32/docs/crc/2024/crc-cybersecurity-survey-2024-light.webp -------------------------------------------------------------------------------- /docs/crc/2024/crc-cybersecurity-survey-2024.webp: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/cybersecuritystream/cybersecuritystream.github.io/ab572f2b8254a8b64a0914a3f1c21b878bbccb32/docs/crc/2024/crc-cybersecurity-survey-2024.webp -------------------------------------------------------------------------------- /docs/crc/2024/index.md: -------------------------------------------------------------------------------- 1 | --- 2 | title: CRC 2024 edition 3 | description: Schedule, topics, and trainers for the 2024 edition. 4 | --- 5 | 6 | --8<-- "includes/links.md" 7 | 8 | # CRC 2024 edition 9 | 10 | ## Summary 11 | 12 | {{ read_csv('summary.csv') }} 13 | 14 |
15 | 16 | ## Topics 17 | 18 | {{ read_csv('topics.csv', colalign=("left","left",)) }} 19 | 20 | ## Assessment 21 | 22 | Here are some opinions from our training participants in **CRC'24**: 23 | 24 | ![CRC Cybersecurity survey 2024](crc-cybersecurity-survey-2024-light.webp#only-light){ width="600" } 25 | ![CRC Cybersecurity survey 2024](crc-cybersecurity-survey-2024-dark.webp#only-dark){ width="600" } 26 | 27 | ## Testimonials 28 | 29 | !!! quote "2024 training participant 1" 30 | 31 | This was one of the best courses on Cybersecurity I have ever attended. Loved the timeline and how you built the momentum for the most difficult parts to come, leading us through the basics first. I have already recommended it to my friends for the upcoming year. Loved the classes and the tutors who did an amazing job explaining even the hardest concepts, plus being extremely friendly and approachable at the same time. My personal fav - IAM, wow that guy did great! :) Kudos to the organizers, great job! 32 | 33 | !!! quote "2024 training participant 2" 34 | 35 | Thank you very much for the opportunity to participate in your course. You gave me more knowledge in less than 3 months than my University did in 3 years. 36 | 37 | !!! quote "2024 training participant 3" 38 | 39 | I really liked the approach to the topics from scratch, i.e. the trainers' explanation of even the simplest issues. This allowed me to understand the issues despite the fact that I’m not a student heavily involved in IT. I also liked the fact that almost every topic was taught by a different person, which meant that even though the course was on a Saturday and lasted for several hours at a time, it was not tedious and tiring. 40 | 41 | !!! quote "2024 training participant 4" 42 | 43 | The course is a huge dose of knowledge, it was clear that the topics are presented to us by passionate people. 44 | 45 | !!! quote "2024 training participant 5" 46 | 47 | Thanks a lot for organizing the course! Starting I expected the usual average course dry theory, etc. and here surprise, a group of enthusiasts creating an amazing training. The whole course was conducted in a very engaging and interesting way with a huge amount of knowledge. You showed in a very accessible way how Cybersecurity is a broad area, how many areas related to it can be developed and how many nooks and crannies of this field I have to discover :) As for the form of the course itself, it was accessible and conducted in an interesting way, but a nice addition would have been the opportunity for me to meet you ;) 48 | 49 | !!! quote "2024 training participant 6" 50 | 51 | In my opinion, each presentation was very professionally prepared and had a large amount of information that was new to me. In addition, I think it is very difficult to find the golden mean between the amount of material and the range of topics, so I realize that the course could have been overwhelming. However, for me, it was perfect, allowing me to learn about many areas of such a vast topic as cybersecurity and the behind-the-scenes work in this field. 52 | 53 | !!! quote "2024 training participant 7" 54 | 55 | You are cybersecurity professionals, I would enjoy live meetings/laboratories at your company. It would be a good idea to introduce such a series in the next edition of the course. 56 | 57 | !!! quote "2024 training participant 8" 58 | 59 | The entire course is very interesting and expands knowledge, giving a solid pill of information. 60 | 61 | !!! quote "2024 training participant 9" 62 | 63 | I really enjoyed this whole course. I’ve found all the lectures interesting even though I wasn’t so sure about it at the beginning (if I chose the right one for me), this course quickly proved me wrong. Above all that, all the trainers seemed very passionate about their subjects and the information they gave us. It was a pleasure to be a part of this project. 64 | 65 | !!! quote "2024 training participant 10" 66 | 67 | The course was really enjoyable and I will remember it well, I learned a lot of things that will certainly be useful to me in the future. 68 | 69 | !!! quote "2024 training participant 11" 70 | 71 | I would rate the classes conducted at 5+, because of the instructors and topics. 72 | 73 | !!! quote "2024 training participant 12" 74 | 75 | First of all, I would like to thank you all very much for conducting the course. It was, for the most part, interesting, thought-provoking and thought-provoking about the day-to-day work in IT. I listened to you, often with my daughter, who later told at school how to 'hack people through the ceiling' based on the presentation about red teams :) 76 | 77 | !!! quote "2024 training participant 13" 78 | 79 | Very interestingly conducted course, I learned a lot of new issues. Without the knowledgeable people at ING, it would have been difficult on my own. I sincerely thank you for the opportunity to participate. 80 | 81 | !!! quote "2024 training participant 14" 82 | 83 | It is impossible to improve the course, because in my opinion it is perfect ;) I liked everything, I learned a lot. I would be happy to participate in the next part. Thank you for the opportunity to participate :) 84 | 85 | !!! quote "2024 training participant 15" 86 | 87 | I found the course to be very well constructed and with interestingly selected materials. Even a person who has no contact with the subject can learn a lot, especially through contact with many professionals in this field. 88 | 89 | !!! quote "2024 training participant 16" 90 | 91 | The course was very interesting, varied and in the form it was fine, while I would have preferred the classroom, because on remote it is harder for me to focus. 92 | 93 | !!! quote "2024 training participant 17" 94 | 95 | I loved the course! I’m really happy I had the chance to take part in it because my studies are not in the field of IT and I wanted to learn more about cybersecurity. I’m very grateful to everyone who dedicated their time into this course. I learned a lot, I’m happy it was more introductory beacuse otherwise I wouldn’t understand anything :)) (still some things were confusing to me but that’s probably because of my lack of IT background). The classes were very interesting, I have my favourites, and I would definitely recommend this course to everyone wanting to take their first step into cybersecurity, whether they have an education in IT already or not. All the teachers were very nice and open to questions, I think it was also cool to see the "vibe" in relations in ING Hubs Poland which was very friendly. I’m also happy this course wasn’t just 10 hours, because you can’t learn much in that time. 96 | 97 | !!! quote "2024 training participant 18" 98 | 99 | The course is time-consuming, but very much worth it. Cybersecurity is my field of study, so I was already familiar with some topics, nevertheless I still could find the course interesting and find out about some new things. I would say that opportunity to meet (despite the remote characteristic of the course) people that work in Cybersecurity field and have day-to-day experience with it was the best aspect of the course (friendly attitude was also a great and encouraged interaction with participants). Even if someone was familiar with presented topics, having hands-on experience and perhaps a chance to get to know new solutions was enough to compensate for it. 100 | 101 | !!! quote "2024 training participant 19" 102 | 103 | Overall the course was very informatory, and it was clear that people teaching/presenting the topics have broad knowledge in their field. 104 | 105 | !!! quote "2024 training participant 20" 106 | 107 | The course was very well conducted. The trainers had a lot of knowledge and were willing to share it with the participants. The atmosphere was very good and encouraged learning new things. 108 | 109 | !!! quote "2024 training participant 21" 110 | 111 | I think that the current form of the course is perfect. The only improvement could be the onsite classes and getting to know you personally, but this is my subjective opinion :) The number of classes and their scope is sufficient, you can really get a lot of knowledge from them if you are fully focused on the class. Thanks to you, I know that a career in cybersecurity is written for me and I no longer have any resistance to change my career path. Maybe I’ll see you again someday! ;) 112 | 113 | !!! quote "2024 training participant 22" 114 | 115 | I really liked this course. It aligned exceptionally well with my current pursuit of knowledge from the cybersecurity field as I was able to learn something new as well as to revise the previously learnt information. The lecturers were always passionate about the topic they were presenting, which helped with the learning process. 116 | 117 | !!! quote "2024 training participant 23" 118 | 119 | It is perfect :) 120 | 121 | !!! quote "2024 training participant 24" 122 | 123 | I am very pleased and sincerely thankful that I could participate in the course. This training allowed me to look at different departments of Cybersecurity and consolidate my knowledge in this area and also gave me motivation for further learning. This is an industry in which I would like to grow. I am very grateful for the time and preparation for the training. Each of the people put a lot of heart in the preparation and a great plus was that so many people conducted the training so that I could catch something from each presenter. The current number of hours of the course I think is sufficient. The diversity of the material also appealed to me and I think that the course conducted in its current form is fine. 124 | 125 | !!! quote "2024 training participant 25" 126 | 127 | Overall great, I really like that there were multiple presenters. It definitely broadened my perspective and outlook on the complexity of the cybersecurity topic. 128 | 129 | !!! quote "2024 training participant 26" 130 | 131 | As a beginner, I found the course well-prepared and appreciated the opportunity to interact with the instructors. I was hoping for more hands-on activities/simulation exercises, but I am still satisfied. 132 | 133 | !!! quote "2024 training participant 27" 134 | 135 | CRC 2024 Cybersecurity course for me was very informative and covered a lot of cybersecurity topics. It was very interesting to see the corporate point of view and discover many difficult challenges that you are taking day by day. I really appreciated this course - good job. Thank you! 136 | 137 | !!! quote "2024 training participant 28" 138 | 139 | The course was really great and thanks to it, I consolidated some issues in the broader field of cybersecurity. I will definitely participate in future editions. 140 | 141 | !!! quote "2024 training participant 29" 142 | 143 | The course was very informative and substantive, I learned many new things and sorted out what I want to study further. I enjoyed the overview of all possible areas in Cybersecurity and the professionals delegated to us showed the highest level. Thank you. The test was quite challenging. 144 | 145 | !!! quote "2024 training participant 30" 146 | 147 | I really enjoyed the course. I gained a lot of knowledge from it. As a person fascinated by OSINT and the legal side of data protection in IT systems, I really enjoyed the modules on OSINT and Data Protection. I hope that you will do even more courses, for even more people, because it was really apparent how committed you all are and with what passion you pass on knowledge. :) 148 | 149 | !!! quote "2024 training participant 31" 150 | 151 | I liked the course, it was full of unique information. 152 | 153 | !!! quote "2024 training participant 32" 154 | 155 | I have positive impressions about the course content. 156 | 157 | !!! quote "2024 training participant 33" 158 | 159 | I feel that this course has expanded my knowledge significantly. The lectures were interesting and substantive. 160 | 161 | !!! quote "2024 training participant 34" 162 | 163 | Whole course was exceptional with its lectures and topics. 164 | 165 | !!! quote "2024 training participant 35" 166 | 167 | Really great course, a lot of different presenters and every lecture on the high level, so I’m impressed that they managed to orchestrate it this way, thanks a lot for the opportunity to participate. 168 | 169 | !!! quote "2024 training participant 36" 170 | 171 | Great classes conducted. A big plus is looking at different perspectives of the cybersecurity world. 172 | 173 | !!! quote "2024 training participant 37" 174 | 175 | Course was very nice and I have learned a lot of new things. For somebody who is not connected to the field (my studies are in finance and do not offer any subject related to cybersecurity) it required a lot of additional work. Sometimes there were classes that I felt like the presenter went from 0 to 100 in a matter of few slides skipping all the "middle knowledge". After all I’m really pleased by this course and I have achieved my goal by participating. 176 | 177 | !!! quote "2024 training participant 38" 178 | 179 | I really liked it. I have gained a lot of knowledge that would be useful in my future career. 180 | 181 | !!! quote "2024 training participant 39" 182 | 183 | The cybersecurity course allowed me to fill a number of knowledge gaps, which can definitely be counted as a plus. 184 | 185 | !!! quote "2024 training participant 40" 186 | 187 | The presenters, very substantive and in an accessible way, conducted their lectures. You could see the full professionalism and the contribution they made to the preparation of the topics. What I liked about the course was that the presenters asked several questions a day or two before the class. It was thought-provoking, and it definitely improved the quality and caused there to be more discussion in a given class. I enjoyed it very much, warm greetings and many thanks! May there be more such courses! 188 | 189 | !!! quote "2024 training participant 41" 190 | 191 | I think the course has shown me the interior of the Cybersecurity environment. Back in the past, before the course, I had been learning things about Cybersecurity on my own, and it had been hard to search for the point to start with. I am satisfied and happy that I could be a part of that course and I wish you the best next years. Thank you! 192 | 193 | !!! quote "2024 training participant 42" 194 | 195 | Interesting course conducted by interesting people. Awesome opportunity that I was able to take part in it :) 196 | 197 | !!! quote "2024 training participant 43" 198 | 199 | Well organized, informative course. 200 | 201 | !!! quote "2024 training participant 44" 202 | 203 | Mass of knowledge imparted in a great way. 204 | 205 | !!! quote "2024 training participant 45" 206 | 207 | The course was sensational, the amount of knowledge imparted in the course was incredibly great and valuable. 208 | 209 | -------------------------------------------------------------------------------- /docs/crc/2024/summary.csv: -------------------------------------------------------------------------------- 1 | **Number of hours**,**40 hours** 2 | **Number of meetings**,"**8 meetings, 8 Saturdays**" 3 | **Form of meeting**,**on-line** 4 | **Schedule**,2024-03-02 09:00-14:10 +0100 (CET) DAY 1/8
2024-03-09 09:00-14:00 +0100 (CET) DAY 2/8
2024-03-16 09:00-14:50 +0100 (CET) DAY 3/8
2024-03-23 09:00-16:00 +0100 (CET) DAY 4/8
2024-04-06 09:00-13:40 +0200 (CEST) DAY 5/8
2024-04-13 09:00-14:40 +0200 (CEST) DAY 6/8
2024-04-20 09:00-14:50 +0200 (CEST) DAY 7/8
2024-04-27 09:00-16:00 +0200 (CEST) DAY 8/8
2024-05-11 10:00-11:00 +0200 (CEST) FINAL EXAM -------------------------------------------------------------------------------- /docs/crc/2024/topics.csv: -------------------------------------------------------------------------------- 1 | #,Topic,Trainer 2 | 1,Kickoff meeting,"Łukasz Jankowski [:material-linkedin:][lukasz-jankowski-in],
Damian Krawczyk [:material-web:][damian-krawczyk-web]" 3 | 2,Cyber awareness,Sławomir Staciwa [:material-linkedin:][slawomir-staciwa-in] 4 | 3 :material-new-box:,Data Protection - Compliance,Dagmara Adamczyk [:material-linkedin:][dagmara-adamczyk-in] 5 | 4,IT Risk Management - Basics,"Askaniusz Ferens [:material-linkedin:][askaniusz-ferens-in],
Anna Maszybrocka [:material-linkedin:][anna-maszybrocka-in]" 6 | 5 :material-new-box:,IT Risk Management - Governance,Justyna Chochla-Wojdyła [:material-linkedin:][justyna-chochla-wojdyla-in] 7 | 6,Risk Management - Operational Risk Management,Katarzyna Kowalski [:material-linkedin:][katarzyna-kowalski-in] 8 | 7 :material-new-box:,Risk Management - Compliance,Kamila Juszczyk [:material-linkedin:][kamila-juszczyk-in] 9 | 8,Risk Management - Audits,Karolina Sieruga [:material-linkedin:][karolina-sieruga-in] 10 | 9,Identity and Access Management,Paweł Matyszok [:material-linkedin:][pawel-matyszok-in] 11 | 10,Password vaults,Mateusz Kozieł [:material-linkedin:][mateusz-koziel-in] 12 | 11,Cryptography - Basics,Jacek Kocyba [:material-linkedin:][jacek-kocyba-in] 13 | 12 :material-new-box:,Shadow IT,Jacek Kocyba [:material-linkedin:][jacek-kocyba-in] 14 | 13,Vulnerability Assessment,"Łukasz Jankowski [:material-linkedin:][lukasz-jankowski-in],
Damian Krawczyk [:material-web:][damian-krawczyk-web]" 15 | 14 :material-new-box:,Vulnerability Assessment for containers,"Krzysztof Kozak [:material-linkedin:][krzysztof-kozak-in],
Łukasz Galos [:material-linkedin:][lukasz-galos-in]" 16 | 15,Secure Configuration Monitoring,Maciej Wróbel [:material-linkedin:][maciej-wrobel-in] 17 | 16 :material-new-box:,Secure Software Development Lifecycle Management,Maciej Wróbel [:material-linkedin:][maciej-wrobel-in] 18 | 17 :material-new-box:,Introduction to Offensive tooling,Michał Kucharski [:material-web:][michal-kucharski-web] 19 | 18 :material-new-box:,OSINT in the service of Offensive Security,Maciej Pypeć [:material-linkedin:][maciej-pypec-in] 20 | 19,Offensive Cybersecurity - Red Teaming theory,Jakub Plusczok [:material-linkedin:][jakub-plusczok-in] 21 | 20,Offensive Cybersecurity - Red Teaming workshop,Jakub Plusczok [:material-linkedin:][jakub-plusczok-in] 22 | 21,Offensive Cybersecurity - DDOS,Gerard Żmuda [:material-linkedin:][gerard-zmuda-in] 23 | 22 :material-new-box:,Defensive Cybersecurity - Threat Hunting,Jakub Szumera [:material-linkedin:][jakub-szumera-in] 24 | 23,Defensive Cybersecurity - SIEM + SOAR + Proxy,Daniel Jeczeń [:material-linkedin:][daniel-jeczen-in] 25 | 24,Defensive Cybersecurity - Malware Analysis,Mirosław Koczenasz 26 | 25 :material-new-box:,Building ETL for Security data,Michał Kocur [:material-linkedin:][michal-kocur-in] 27 | 26 :material-new-box:,Security data processing automation,"Piotr Furmaniak [:material-linkedin:][piotr-furmaniak-in],
Adam Majstrak [:material-web:][adam-majstrak-web]" 28 | 27,Introduction to Azure Public Cloud,Rafał Nowakowski [:material-linkedin:][rafal-nowakowski-in] -------------------------------------------------------------------------------- /docs/crc/2025/crc-cybersecurity-survey-2025-dark.webp: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/cybersecuritystream/cybersecuritystream.github.io/ab572f2b8254a8b64a0914a3f1c21b878bbccb32/docs/crc/2025/crc-cybersecurity-survey-2025-dark.webp -------------------------------------------------------------------------------- /docs/crc/2025/crc-cybersecurity-survey-2025-light.webp: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/cybersecuritystream/cybersecuritystream.github.io/ab572f2b8254a8b64a0914a3f1c21b878bbccb32/docs/crc/2025/crc-cybersecurity-survey-2025-light.webp -------------------------------------------------------------------------------- /docs/crc/2025/index.md: -------------------------------------------------------------------------------- 1 | --- 2 | status: new 3 | title: CRC 2025 edition 4 | description: Schedule, topics, and trainers for this year's edition. 5 | --- 6 | 7 | --8<-- "includes/links.md" 8 | 9 | # CRC 2025 edition 10 | 11 | ## Summary 12 | 13 | {{ read_csv('summary.csv') }} 14 | 15 |
16 | 17 | ## Topics 18 | 19 | {{ read_csv('topics.csv', colalign=("left","left",)) }} 20 | 21 | ## Schedule 22 | 23 | === "DAY 1" 24 | 25 | 2025-03-01 09:00 – 16:00 +0100 (CET) 26 | 27 | |Time |Lecture | 28 | |---------------------------|-----------------------------------------------------------------------------------| 29 | |09:30 - 10:00
(30m) |**Kickoff meeting**
Damian Krawczyk, Łukasz Jankowski
{++5 minutes break++} | 30 | |10:05 - 11:05
(1h) |**Cyber awareness**
Sławomir Staciwa
{++5 minutes break++} | 31 | |11:10 - 12:10
(1h) |**Cyber awareness**
Sławomir Staciwa
{++**20** minutes break++} | 32 | |12:30 - 13:30
(1h) |**Password vaults - dive into**
Mateusz Kozieł
{++5 minutes break++} | 33 | |13:35 - 15:05
(1h 30m) |**SIEM + SOAR + Proxy**
Daniel Jeczeń | 34 | 35 | === "DAY 2" 36 | 37 | 2025-03-08 09:00 – 16:00 +0100 (CET) 38 | 39 | |Time |Lecture | 40 | |---------------------------|---------------------------------------------------------------------------------------------------| 41 | |09:00 - 10:00
(1h) |**Compliance - Data Protection**
Dagmara Adamczyk
{++5 minutes break++} | 42 | |10:05 - 11:05
(1h) |**IT Risk Management - Basics**
Askaniusz Ferens
{++5 minutes break++} | 43 | |11:10 - 12:10
(1h) |**IT Risk Management - Governance**
Justyna Chochla-Wojdyła
{++**20** minutes break++} | 44 | |12:30 - 13:30
(1h) |**IT Risk Management - Analysis** :material-new-box:
Anna Maszybrocka
{++5 minutes break++} | 45 | |13:35 - 14:35
(1h) |**IT Risk Management - Monitoring and reporting** :material-new-box:
Daniel Leon
{==(This session is in English)==}
{++5 minutes break++} | 46 | |14:40 - 15:40
(1h) |**IT Risk Management - On-prem vs Cloud** :material-new-box:
Piotr Czarnik | 47 | 48 | === "DAY 3" 49 | 50 | 2025-03-15 09:00 – 16:00 +0100 (CET) 51 | 52 | |Time |Lecture | 53 | |---------------------------|---------------------------------------------------------------------------------------------------| 54 | |09:00 - 10:00
(1h) |**Legal aspects of cyber security** :material-new-box:
Judyta Berc
{++5 minutes break++} | 55 | |10:05 - 11:05
(1h) |**Identity and Access management**
Paweł Matyszok
{++5 minutes break++} | 56 | |11:10 - 12:10
(1h) |**Identity and Access management**
Paweł Matyszok
{++**20** minutes break++} | 57 | |12:30 - 13:30
(1h) |**Risk Management - Compliance**
Kamila Juszczyk
{++5 minutes break++} | 58 | |13:35 - 14:35
(1h) |**Risk Management - Operational Risk Management**
Oskar Marszalik
{++5 minutes break++} | 59 | |14:40 - 15:40
(1h) |**Risk Management - Audits**
Kamila Juszczyk | 60 | 61 | === "DAY 4" 62 | 63 | 2025-03-22 09:00 – 16:00 +0100 (CET) 64 | 65 | |Time |Lecture | 66 | |---------------------------|---------------------------------------------------------------------------------------------------| 67 | |09:00 - 10:00
(1h) |**Introduction to offensive tooling**
Michał Kucharski
{++5 minutes break++} | 68 | |10:05 - 11:05
(1h) |**OSINT in the service of Offensive Security**
Maciej Pypeć
{++5 minutes break++} | 69 | |11:10 - 12:10
(1h) |**Offensive Cybersecurity – DDOS**
Gerard Żmuda | 70 | |12:30 - 13:30
(1h) |**Offensive Cybersecurity – Red Teaming theory**
Jakub Plusczok
{++**20** minutes break++} | 71 | |13:35 - 14:35
(1h) |**Offensive Cybersecurity – Red Teaming workshop**
Jakub Plusczok
{++5 minutes break++} | 72 | |14:40 - 15:40
(1h) |**Offensive Cybersecurity – Red Teaming workshop**
Jakub Plusczok
{++5 minutes break++} | 73 | 74 | === "DAY 5" 75 | 76 | 2025-03-29 09:00 – 16:00 +0100 (CET) 77 | 78 | |Time |Lecture | 79 | |---------------------------|---------------------------------------------------------------------------------------------------| 80 | |09:00 - 10:00
(1h) |**Introduction to Azure Public Cloud**
Rafał Nowakowski
{++5 minutes break++} | 81 | |10:05 - 11:05
(1h) |**Security aspects of Azure Kubernetes clusters deployment and applications delivery** :material-new-box:
Michał Ziółek
{++5 minutes break++} | 82 | |11:10 - 12:10
(1h) |**Cryptography - basics**
Jacek Kocyba
{++**20** minutes break++} | 83 | |12:30 - 13:30
(1h) |**Shadow IT**
Jacek Kocyba
{++5 minutes break++} | 84 | |13:35 - 14:35
(1h) |**CISSP – Introduction** :material-new-box:
Krystian Tokarz
{++5 minutes break++} | 85 | |14:40 - 16:00
(1h 20m) |**Introduction to secret scanning** :material-new-box:
Patryk Zachnik, Mateusz Majstrak| 86 | 87 | === "DAY 6" 88 | 89 | 2025-04-05 09:00 – 16:00 +0200 (CEST) 90 | 91 | |Time |Lecture | 92 | |---------------------------|-------------------------------------------------------------------------------| 93 | |09:00 - 10:00
(1h) |**Secure Configuration Monitoring**
Maciej Wróbel
{++5 minutes break++} | 94 | |10:05 - 11:05
(1h) |**Secure Configuration Monitoring**
Maciej Wróbel
{++5 minutes break++} | 95 | |11:10 - 12:10
(1h) |**Secure SDLC**
Maciej Wróbel
{++**20** minutes break++} | 96 | |12:30 - 13:30
(1h) |**Secure SDLC**
Maciej Wróbel
{++5 minutes break++} | 97 | |13:35 - 15:05
(1h 30m) |**Malware Analysis**
Mirosław Koczenasz | 98 | 99 | === "DAY 7" 100 | 101 | 2025-04-12 09:00 – 16:00 +0200 (CEST) 102 | 103 | |Time |Lecture | 104 | |---------------------------|---------------------------------------------------------------------------------------------------------------| 105 | |09:00 - 10:00
(1h) |**Vulnerability Assessment – introduction**
Damian Krawczyk
{++5 minutes break++} | 106 | |10:05 - 11:05
(1h) |**Vulnerability Assessment – demo**
Łukasz Jankowski
{++5 minutes break++} | 107 | |11:10 - 12:10
(1h) |**Vulnerability Assessment – demo**
Łukasz Jankowski
{++**20** minutes break++} | 108 | |12:30 - 13:30
(1h) |**Vulnerability Assessment – practice**
Damian Krawczyk
{++5 minutes break++} | 109 | |13:35 - 14:35
(1h) |**Vulnerability Assessment for containers - theory**
Krzysztof Kozak, Łukasz Galos
{++5 minutes break++} | 110 | |14:40 - 15:40
(1h) |**Vulnerability Assessment for containers - demo/lab**
Krzysztof Kozak, Łukasz Galos | 111 | 112 | === "DAY 8" 113 | 114 | 2025-04-26 09:00 – 16:00 +0200 (CEST) 115 | 116 | |Time |Lecture | 117 | |---------------------------|---------------------------------------------------------------------------------------------------| 118 | |09:00 - 10:00
(1h) |**Security data processing automation**
Piotr Furmaniak, Adam Majstrak
{++5 minutes break++} | 119 | |10:05 - 11:05
(1h) |**Security data processing automation**
Piotr Furmaniak, Adam Majstrak
{++5 minutes break++} | 120 | |11:10 - 12:10
(1h) |**Building ETL for Security data**
Michał Kocur
{++**20** minutes break++} | 121 | |12:30 - 13:30
(1h) |**Building ETL for Security data**
Michał Kocur
{++5 minutes break++} | 122 | |13:35 - 14:35
(1h) |**Vulnerability management then and now - the evolution
of approaches to risk measurement and analysis**:material-new-box:
**``GUEST LECTURE``**
[Cezar Cichocki][cezar-cichocki-in], [OpenBIZ][openbiz]
{++5 minutes break++} | 123 | |14:40 - 14:25
(25min) |**Closing session**
Damian Krawczyk, Łukasz Jankowski | 124 | 125 | === "EXAM" 126 | 127 | 2025-05-10 10:00 – 11:00 +0200 (CEST) 128 | 129 | ## Assessment 130 | 131 | Here are some opinions from our training participants in **CRC'25**: 132 | 133 | ![CRC Cybersecurity survey 2025](crc-cybersecurity-survey-2025-light.webp#only-light){ width="600" } 134 | ![CRC Cybersecurity survey 2025](crc-cybersecurity-survey-2025-dark.webp#only-dark){ width="600" } -------------------------------------------------------------------------------- /docs/crc/2025/summary.csv: -------------------------------------------------------------------------------- 1 | **Number of hours**,**45 hours** 2 | **Number of meetings**,"**8 meetings, 8 Saturdays**" 3 | **Form of meeting**,**on-line** 4 | **Schedule**,2025-03-01 09:00 – 16:00 +0100 (CET) DAY 1/8
2025-03-08 09:00 – 16:00 +0100 (CET) DAY 2/8
2025-03-15 09:00 – 16:00 +0100 (CET) DAY 3/8
2025-03-22 09:00 – 16:00 +0100 (CET) DAY 4/8
2025-03-29 09:00 – 16:00 +0100 (CET) DAY 5/8
2025-04-05 09:00 – 16:00 +0200 (CEST) DAY 6/8
2025-04-12 09:00 – 16:00 +0200 (CEST) DAY 7/8
2025-04-26 09:00 – 16:00 +0200 (CEST) DAY 8/8
2025-05-10 10:00 – 11:00 +0200 (CEST) FINAL EXAM -------------------------------------------------------------------------------- /docs/crc/2025/topics.csv: -------------------------------------------------------------------------------- 1 | #,Topic,Trainer 2 | 1,Kickoff meeting,"Łukasz Jankowski [:material-linkedin:][lukasz-jankowski-in],
Damian Krawczyk [:material-web:][damian-krawczyk-web]" 3 | 2,Cyber awareness,Sławomir Staciwa [:material-linkedin:][slawomir-staciwa-in] 4 | 3,Data Protection - Compliance,Dagmara Adamczyk [:material-linkedin:][dagmara-adamczyk-in] 5 | 4 :material-new-box:,Legal aspects of cyber security,Judyta Berc [:material-linkedin:][judyta-berc-in] 6 | 5,IT Risk Management - Basics,Askaniusz Ferens [:material-linkedin:][askaniusz-ferens-in] 7 | 6,IT Risk Management - Governance,Justyna Chochla-Wojdyła [:material-linkedin:][justyna-chochla-wojdyla-in] 8 | 7 :material-new-box:,IT Risk Management - Analysis,Anna Maszybrocka [:material-linkedin:][anna-maszybrocka-in] 9 | 8 :material-new-box:,IT Risk Management - Monitoring and reporting,Daniel Leon 10 | 9 :material-new-box:,IT Risk Management - On-prem vs Cloud,Piotr Czarnik [:material-linkedin:][piotr-czarnik-in] 11 | 10,Risk Management - Compliance,Kamila Juszczyk [:material-linkedin:][kamila-juszczyk-in] 12 | 11,Risk Management - Operational Risk Management,Oskar Marszalik [:material-linkedin:][oskar-marszalik-in] 13 | 12,Risk Management - Audits,Kamila Juszczyk [:material-linkedin:][kamila-juszczyk-in] 14 | 13,Identity and Access Management,Paweł Matyszok [:material-linkedin:][pawel-matyszok-in] 15 | 14,Password vaults,Mateusz Kozieł [:material-linkedin:][mateusz-koziel-in] 16 | 15,Cryptography - Basics,Jacek Kocyba [:material-linkedin:][jacek-kocyba-in] 17 | 16,Shadow IT,Jacek Kocyba [:material-linkedin:][jacek-kocyba-in] 18 | 17,Vulnerability Assessment,"Łukasz Jankowski [:material-linkedin:][lukasz-jankowski-in],
Damian Krawczyk [:material-web:][damian-krawczyk-web]" 19 | 18,Vulnerability Assessment for containers,"Krzysztof Kozak [:material-linkedin:][krzysztof-kozak-in],
Łukasz Galos [:material-linkedin:][lukasz-galos-in]" 20 | 19 :material-new-box:,Introduction to secret scanning,"Patryk Zachnik [:material-linkedin:][patryk-zachnik-in], Mateusz Majstrak [:material-linkedin:][mateusz-majstrak-in]" 21 | 20,Secure Configuration Monitoring,Maciej Wróbel [:material-linkedin:][maciej-wrobel-in] 22 | 21,Secure SDLC,Maciej Wróbel [:material-linkedin:][maciej-wrobel-in] 23 | 22,Introduction to Offensive tooling,Michał Kucharski [:material-web:][michal-kucharski-web] 24 | 23,OSINT in the service of Offensive Security,Maciej Pypeć [:material-linkedin:][maciej-pypec-in] 25 | 24,Offensive Cybersecurity - Red Teaming theory,Jakub Plusczok [:material-linkedin:][jakub-plusczok-in] 26 | 25,Offensive Cybersecurity - Red Teaming workshop,Jakub Plusczok [:material-linkedin:][jakub-plusczok-in] 27 | 26,Offensive Cybersecurity - DDOS,Gerard Żmuda [:material-linkedin:][gerard-zmuda-in] 28 | 27,Defensive Cybersecurity - SIEM + SOAR + Proxy,Daniel Jeczeń [:material-linkedin:][daniel-jeczen-in] 29 | 28,Defensive Cybersecurity - Malware Analysis,Mirosław Koczenasz 30 | 29,Building ETL for Security data,Michał Kocur [:material-linkedin:][michal-kocur-in] 31 | 30,Security data processing automation,"Piotr Furmaniak [:material-linkedin:][piotr-furmaniak-in],
Adam Majstrak [:material-web:][adam-majstrak-web]" 32 | 31,Introduction to Azure Public Cloud,Rafał Nowakowski [:material-linkedin:][rafal-nowakowski-in] 33 | 32 :material-new-box:,Security aspects of Azure Kubernetes clusters deployment and applications delivery,Michał Ziółek [:material-linkedin:][michal-ziolek-in] 34 | 33 :material-new-box:, CISSP – Introduction,Krystian Tokarz [:material-linkedin:][krystian-tokarz-in] -------------------------------------------------------------------------------- /docs/crc/faq.md: -------------------------------------------------------------------------------- 1 | --- 2 | title: FAQ 3 | description: Do you have questions? Find the answers here. 4 | --- 5 | 6 | # FAQ 7 | 8 | ## Who can join this course? 9 | 10 | Training organized within the CRC education program can be joined only by university students and graduates up to 2 years after graduation. The determinant is a student ID card (active) or just a graduate up to 2 years after graduation. 11 | 12 | ## When does the next edition start? 13 | 14 | Usually, the CRC education program registration is open at the beginning of February. 15 | 16 | ## Will sessions be recorded? 17 | 18 | No. 19 | 20 | ## Will you share the materials for the study? 21 | 22 | Yes. 23 | 24 | ## Is 100% attendance required to pass? 25 | 26 | No. You need to have: 27 | 28 | - 75% attendance score at classes, e.g., if we have eight days of meetings, you can miss 2 of these eight days. (*This requirement may be subject to change for a given year*). 29 | - 70% of correct answers on the final exam. (*This requirement may be subject to change for a given year*). 30 | 31 | ## What languages do I need to know? 32 | 33 | - *English* – to take the entrance and final exams and read all materials we share. 34 | - *Polish* – to understand what we say to you, all classes are conducted in Polish. 35 | 36 | -------------------------------------------------------------------------------- /docs/crc/index.md: -------------------------------------------------------------------------------- 1 | --- 2 | title: Corporate Readiness Certificate 3 | description: The educational program providing participants with recent knowledge and practical skills. 4 | --- 5 | 6 | # Corporate Readiness Certificate 7 | 8 | ![CRC logo](/assets/images/crc-logo.png){ align=left width="250" } 9 | 10 | The Corporate Readiness Certificate is an educational program launched in 2014. 11 | 12 | Companies operating in the Silesian region in Poland implemented this program in close cooperation with the academic community and Universities. Cooperating companies deal with broadly understood services of the IT industry. 13 | 14 | The CRC program offers active students who are open to acquiring new knowledge and practical skills, which provides unique opportunities for professional development. 15 | The CRC program gives the possibility to gain additional specialist knowledge in IT and work management systems in large enterprises, learn about new areas of business activity, and increase the chances of participants on the labor market! 16 | 17 | 18 | 19 | ## Business partners 20 | - [Accenture](https://www.accenture.com), 21 | - [EY](https://www.ey.com), 22 | - [Kyndryl](https://www.kyndryl.com), 23 | - [ING Hubs Poland](https://inghubspoland.com/en) 24 | 25 | ## Social media 26 | 27 | If you want to know more or don't want to miss next year's edition, follow the business partners and social media pages of the CRC education program: 28 | 29 | * [CRC profile at LinkedIn](https://www.linkedin.com/company/corporate-readiness-certificate) 30 | * [CRC profile at Instagram](https://www.instagram.com/program_crc/) 31 | * [CRC profile at Facebook](https://m.facebook.com/ProgramCRC/) 32 | -------------------------------------------------------------------------------- /docs/crc/instruction/crcep-invitation.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/cybersecuritystream/cybersecuritystream.github.io/ab572f2b8254a8b64a0914a3f1c21b878bbccb32/docs/crc/instruction/crcep-invitation.png -------------------------------------------------------------------------------- /docs/crc/instruction/crcep-join.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/cybersecuritystream/cybersecuritystream.github.io/ab572f2b8254a8b64a0914a3f1c21b878bbccb32/docs/crc/instruction/crcep-join.png -------------------------------------------------------------------------------- /docs/crc/instruction/crcep-member.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/cybersecuritystream/cybersecuritystream.github.io/ab572f2b8254a8b64a0914a3f1c21b878bbccb32/docs/crc/instruction/crcep-member.png -------------------------------------------------------------------------------- /docs/crc/instruction/crcep-watch-star.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/cybersecuritystream/cybersecuritystream.github.io/ab572f2b8254a8b64a0914a3f1c21b878bbccb32/docs/crc/instruction/crcep-watch-star.png -------------------------------------------------------------------------------- /docs/crc/instruction/cybersecuritystream-invitation.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/cybersecuritystream/cybersecuritystream.github.io/ab572f2b8254a8b64a0914a3f1c21b878bbccb32/docs/crc/instruction/cybersecuritystream-invitation.png -------------------------------------------------------------------------------- /docs/crc/instruction/cybersecuritystream-invitation.webp: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/cybersecuritystream/cybersecuritystream.github.io/ab572f2b8254a8b64a0914a3f1c21b878bbccb32/docs/crc/instruction/cybersecuritystream-invitation.webp -------------------------------------------------------------------------------- /docs/crc/instruction/cybersecuritystream-join.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/cybersecuritystream/cybersecuritystream.github.io/ab572f2b8254a8b64a0914a3f1c21b878bbccb32/docs/crc/instruction/cybersecuritystream-join.png -------------------------------------------------------------------------------- /docs/crc/instruction/cybersecuritystream-join.webp: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/cybersecuritystream/cybersecuritystream.github.io/ab572f2b8254a8b64a0914a3f1c21b878bbccb32/docs/crc/instruction/cybersecuritystream-join.webp -------------------------------------------------------------------------------- /docs/crc/instruction/cybersecuritystream-member.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/cybersecuritystream/cybersecuritystream.github.io/ab572f2b8254a8b64a0914a3f1c21b878bbccb32/docs/crc/instruction/cybersecuritystream-member.png -------------------------------------------------------------------------------- /docs/crc/instruction/cybersecuritystream-member.webp: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/cybersecuritystream/cybersecuritystream.github.io/ab572f2b8254a8b64a0914a3f1c21b878bbccb32/docs/crc/instruction/cybersecuritystream-member.webp -------------------------------------------------------------------------------- /docs/crc/instruction/github-new-account.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/cybersecuritystream/cybersecuritystream.github.io/ab572f2b8254a8b64a0914a3f1c21b878bbccb32/docs/crc/instruction/github-new-account.png -------------------------------------------------------------------------------- /docs/crc/instruction/github-notification-settings.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/cybersecuritystream/cybersecuritystream.github.io/ab572f2b8254a8b64a0914a3f1c21b878bbccb32/docs/crc/instruction/github-notification-settings.png -------------------------------------------------------------------------------- /docs/crc/instruction/github-notification-settings.webp: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/cybersecuritystream/cybersecuritystream.github.io/ab572f2b8254a8b64a0914a3f1c21b878bbccb32/docs/crc/instruction/github-notification-settings.webp -------------------------------------------------------------------------------- /docs/crc/instruction/index.md: -------------------------------------------------------------------------------- 1 | --- 2 | title: Instruction 3 | description: Read carefully to join the CRC classes of this edition successfully. 4 | --- 5 | 6 | # Instruction 7 | 8 | !!! warning 9 | 10 | **Start following the instructions below only after receiving the invitation to the GitHub organization via email.** 11 | 12 | 1. Join the `cybersecuritystream` organization at GitHub by clicking a green button ++"[Join @cybersecuritystream]"++ in the invitation message send to your e-mail address given during registration to the Corporate Readiness Certificate (CRC) educational program. 13 | 14 | ??? note 15 | 16 | Invitation with below message will be send from noreply@github.com e-mail address. 17 | 18 | ![](cybersecuritystream-invitation.webp){ loading=lazy width="400"} 19 | 20 | 2. Login using your GitHub account if you already heave it or create new GitHub account. 21 | 22 | ??? warning "Verify your e-mail address at GitHub!" 23 | 24 | If you decide to create new GitHub account you can use any e-mail address, but **remember to verify your e-mail address at GitHub**. 25 | 26 | 3. After login with your GitHub account, confirm joining the organization by clicking a green button ++"[Join Cybersecurity Stream]"++. 27 | 28 | ??? note 29 | 30 | **Do not** mark the checkbox for GitHub Copilot. 31 | 32 | ![](cybersecuritystream-join.webp){ loading=lazy width="500" } 33 | 34 | 4. Go to [github.com/settings/organizations](https://github.com/settings/organizations) and check if you see the `cybersecuritystream` organization on the list of organizations at GitHub to which you belong. 35 | 36 | ??? note 37 | 38 | Here is what you should see: 39 | 40 | ![](cybersecuritystream-member.webp){ loading=lazy width="600" } 41 | 42 | If you don't see `cybersecuritystream` on the list of organizations go back to invitation message mentioned in the first point and click again a green button ++"[Join @cybersecuritystream]"++. 43 | You should see prompt to join the Cybersecurity Stream, click a green button ++"[Join Cybersecurity Stream]"++ as shown below. 44 | 45 | ![](cybersecuritystream-join.webp){ loading=lazy width="500" } 46 | 47 | 5. Check rest of the details in GitHub *private* [repository][repository] dedicated for these lectures. 48 | 49 | ??? tip 50 | 51 | *All communication will be send to you via GitHub notifications.* + 52 | **Remember to click as shown below for this [repository][repository]:** 53 | 54 | * 👁 ++"[Watch]"++ > ++"[All activity]"++ 55 | * ⭐️ ++"[Star]"++ 56 | 57 | ![](crcep-watch-star.png){ loading=lazy } 58 | 59 | ??? tip 60 | 61 | Check you your GitHub profile notifications settings: 62 | 63 | 1. Go to profile settings [https://github.com/settings/profile](https://github.com/settings/profile) 64 | 2. Go to notification settings [https://github.com/settings/notifications](https://github.com/settings/notifications) 65 | 3. Make sure that for **Participating, @mentions and custom** you have marked option to notify you via **Email**. 66 | 67 | ![](github-notification-settings.webp){ loading=lazy width="600" } 68 | 69 | 70 | 6. Check [passing criteria][passing-criteria] for current edition ✅. 71 | 72 | 7. Say hello 👋 to everyone and [introduce yourself][repository-discussion-hello]. 73 | 74 | 8. Feel free to start a new [discussions][repository-discussions]. Remember to tag appropriate group to make sure that they will receive notification about your post: 75 | - `@cybersecuritystream/trainers-2025` 76 | - `@cybersecuritystream/group-2025` 77 | 78 | 9. Check [lectures timetable][lectures-timetable] 🗓 and [JOIN][join] the classes! 79 | 80 | !!! tip 81 | 82 | You can install GitHub app on your smartphone, go to [github.com/mobile](https://github.com/mobile) to have even easier access to all information needed or to take a part in discussions. 83 | 84 | [lectures-timetable]: https://cybersecuritystream.github.io/crc/2025/#schedule "lectures timetable" 85 | [passing-criteria]: https://github.com/cybersecuritystream/cybersecurity-2025#passing-criteria "passing criteria" 86 | [repository]: https://github.com/cybersecuritystream/cybersecurity-2025 "repository" 87 | [repository-discussions]: https://github.com/cybersecuritystream/cybersecurity-2025/discussions "discussions" 88 | [repository-discussion-hello]: https://github.com/cybersecuritystream/cybersecurity-2025/discussions/1 "introduce yourself" 89 | [join]: https://github.com/cybersecuritystream/cybersecurity-2025#join "JOIN" -------------------------------------------------------------------------------- /docs/crc/previous/index.md: -------------------------------------------------------------------------------- 1 | --- 2 | title: Previous CRC editions 3 | description: Check out past lectures, attendee assessments, and testimonials. 4 | --- 5 | 6 | # Previous editions 7 | 8 | Check out previous training editions, which we have continuously improved since 2017! 9 | 10 |
11 | 12 | - :material-chevron-right-circle: [__CRC 2024 edition__](../2024/index.md) 13 | - :material-chevron-right-circle: [__CRC 2023 edition__](../2023/index.md) 14 | - :material-chevron-right-circle: [__CRC 2022 edition__](../2022/index.md) 15 | - :material-chevron-right-circle: [__CRC 2021 edition__](../2021/index.md) 16 | - :material-chevron-right-circle: [__CRC 2019 edition__](../2019/index.md) 17 | - :material-chevron-right-circle: [__CRC 2018 edition__](../2018/index.md) 18 | - :material-chevron-right-circle: [__CRC 2017 edition__](../2017/index.md) 19 | 20 |
21 | -------------------------------------------------------------------------------- /docs/index.md: -------------------------------------------------------------------------------- 1 | --- 2 | hide: 3 | - navigation 4 | - toc 5 | title: Cybersecurity Stream 6 | description: Free cybersecurity training for students and graduates. 7 | social: 8 | cards_layout_options: 9 | title: Cybersecurity Stream 10 | --- 11 | 12 | # Welcome 13 | 14 | If you are reading this, it means that you want to expand your Cybersecurity knowledge. 15 | 16 | You've come to the right place! Our CRC lectures are not just about passive learning. They are interactive sessions that are specifically designed to prepare you for corporate Cybersecurity roles. You will have the opportunity to listen, discuss, and even participate in the tasks we tackle daily. If you are intrigued by Information Security and wish to deepen your understanding in this field, we extend a warm invitation for you to join us. 17 | 18 | We hope to see you at our lectures! 19 | 20 | [Read about 2025 edition :material-rocket-launch:](crc/2025/index.md){ .md-button } 21 | 22 | ## Training statistics 23 | 24 | 25 |
26 | 27 |
28 | 29 | 30 | 31 | 32 | ## Training testimonials 33 | 34 | !!! quote "2024 training participant" 35 | 36 | This was one of the best courses on Cybersecurity I have ever attended. Loved the timeline and how you built the momentum for the most difficult parts to come, leading us through the basics first. I have already recommended it to my friends for the upcoming year. Loved the classes and the tutors who did an amazing job explaining even the hardest concepts, plus being extremely friendly and approachable at the same time. My personal fav - IAM, wow that guy did great! :) Kudos to the organizers, great job! 37 | 38 | Check the rest of the feedback we got for the [CRC 2024](crc/2024/index.md) edition. 39 | 40 | !!! quote "2023 training participant" 41 | 42 | This was one of the best experiences I’ve had during my time at a university. 43 | 44 | Check the rest of the feedback we got for the [CRC 2023](crc/2023/index.md) edition. 45 | 46 | !!! quote "2022 training participant" 47 | 48 | It was a great adventure, comparing to other CRC course that i participated you definitely exceeded my expectations, I will recommend your course to others, thanks :) 49 | 50 | Check the rest of the feedback we got for the [CRC 2022](crc/2022/index.md) edition. 51 | -------------------------------------------------------------------------------- /docs/javascripts/chart-2019.js: -------------------------------------------------------------------------------- 1 | document.addEventListener("DOMContentLoaded", function() { 2 | if (document.getElementById("bar-chart-horizontal-2019")) { 3 | new Chart(document.getElementById("bar-chart-horizontal-2019"), { 4 | type: 'bar', 5 | data: { 6 | labels: ["2019"], 7 | datasets: [ 8 | { 9 | label: "Signed-up", 10 | backgroundColor: ["#3e95cd"], 11 | data: [36] 12 | }, 13 | { 14 | label: "Passed entrance exam", 15 | backgroundColor: ["#8e5ea2"], 16 | data: [25] 17 | }, 18 | { 19 | label: "Attend classes", 20 | backgroundColor: ["#F8CF60"], 21 | data: [23] 22 | }, 23 | { 24 | label: "Passed final exam", 25 | backgroundColor: ["#EC5F3B"], 26 | data: [11] 27 | }, 28 | { 29 | label: "Certified", 30 | backgroundColor: ["#84C678"], 31 | data: [11] 32 | } 33 | ] 34 | }, 35 | options: { 36 | legend: { display: true }, 37 | responsive: true, 38 | plugins: { 39 | title: { 40 | display: true, 41 | text: 'Cybersecurity lectures summary: 2019' 42 | } 43 | }, 44 | interaction: { 45 | intersect: false, 46 | mode: 'index' 47 | } 48 | } 49 | }); 50 | } 51 | }); -------------------------------------------------------------------------------- /docs/javascripts/chart-2021.js: -------------------------------------------------------------------------------- 1 | document.addEventListener("DOMContentLoaded", function() { 2 | if (document.getElementById("bar-chart-horizontal-2021")) { 3 | new Chart(document.getElementById("bar-chart-horizontal-2021"), { 4 | type: 'bar', 5 | data: { 6 | labels: ["2021"], 7 | datasets: [ 8 | { 9 | label: "Signed-up", 10 | backgroundColor: ["#3e95cd"], 11 | data: [53] 12 | }, 13 | { 14 | label: "Passed entrance exam", 15 | backgroundColor: ["#8e5ea2"], 16 | data: [39] 17 | }, 18 | { 19 | label: "Attend classes", 20 | backgroundColor: ["#F8CF60"], 21 | data: [39] 22 | }, 23 | { 24 | label: "Passed final exam", 25 | backgroundColor: ["#EC5F3B"], 26 | data: [31] 27 | }, 28 | { 29 | label: "Certified", 30 | backgroundColor: ["#84C678"], 31 | data: [31] 32 | } 33 | ] 34 | }, 35 | options: { 36 | legend: { display: true }, 37 | responsive: true, 38 | plugins: { 39 | title: { 40 | display: true, 41 | text: 'Cybersecurity lectures summary: 2021' 42 | } 43 | }, 44 | interaction: { 45 | intersect: false, 46 | mode: 'index' 47 | } 48 | } 49 | }); 50 | } 51 | }); -------------------------------------------------------------------------------- /docs/javascripts/chart-2022.js: -------------------------------------------------------------------------------- 1 | document.addEventListener("DOMContentLoaded", function() { 2 | if (document.getElementById("bar-chart-horizontal-2022")) { 3 | new Chart(document.getElementById("bar-chart-horizontal-2022"), { 4 | type: 'bar', 5 | data: { 6 | labels: ["2022"], 7 | datasets: [ 8 | { 9 | label: "Signed-up", 10 | backgroundColor: ["#3e95cd"], 11 | data: [124] 12 | }, 13 | { 14 | label: "Passed entrance exam", 15 | backgroundColor: ["#8e5ea2"], 16 | data: [98] 17 | }, 18 | { 19 | label: "Attend classes", 20 | backgroundColor: ["#F8CF60"], 21 | data: [73] 22 | }, 23 | { 24 | label: "Passed final exam", 25 | backgroundColor: ["#EC5F3B"], 26 | data: [64] 27 | }, 28 | { 29 | label: "Certified", 30 | backgroundColor: ["#84C678"], 31 | data: [64] 32 | } 33 | ] 34 | }, 35 | options: { 36 | legend: { display: true }, 37 | responsive: true, 38 | plugins: { 39 | title: { 40 | display: true, 41 | text: 'Cybersecurity lectures summary: 2022' 42 | } 43 | }, 44 | interaction: { 45 | intersect: false, 46 | mode: 'index' 47 | } 48 | } 49 | }); 50 | } 51 | }); -------------------------------------------------------------------------------- /docs/javascripts/chart-2023.js: -------------------------------------------------------------------------------- 1 | document.addEventListener("DOMContentLoaded", function() { 2 | if (document.getElementById("bar-chart-horizontal-2023")) { 3 | new Chart(document.getElementById("bar-chart-horizontal-2023"), { 4 | type: 'bar', 5 | data: { 6 | labels: ["2023"], 7 | datasets: [ 8 | { 9 | label: "Signed-up", 10 | backgroundColor: ["#3e95cd"], 11 | data: [109] 12 | }, 13 | { 14 | label: "Passed entrance exam", 15 | backgroundColor: ["#8e5ea2"], 16 | data: [100] 17 | }, 18 | { 19 | label: "Attend classes", 20 | backgroundColor: ["#F8CF60"], 21 | data: [83] 22 | }, 23 | { 24 | label: "Passed final exam", 25 | backgroundColor: ["#EC5F3B"], 26 | data: [65] 27 | }, 28 | { 29 | label: "Certified", 30 | backgroundColor: ["#84C678"], 31 | data: [65] 32 | } 33 | ] 34 | }, 35 | options: { 36 | legend: { display: true }, 37 | responsive: true, 38 | plugins: { 39 | title: { 40 | display: true, 41 | text: 'Cybersecurity lectures summary: 2023' 42 | } 43 | }, 44 | interaction: { 45 | intersect: false, 46 | mode: 'index' 47 | } 48 | } 49 | }); 50 | } 51 | }); -------------------------------------------------------------------------------- /docs/javascripts/chart-2024.js: -------------------------------------------------------------------------------- 1 | document.addEventListener("DOMContentLoaded", function() { 2 | if (document.getElementById("bar-chart-horizontal-2024")) { 3 | new Chart(document.getElementById("bar-chart-horizontal-2024"), { 4 | type: 'bar', 5 | data: { 6 | labels: ["2024"], 7 | datasets: [ 8 | { 9 | label: "Signed-up", 10 | backgroundColor: ["#3e95cd"], 11 | data: [190] 12 | }, 13 | { 14 | label: "Passed entrance exam", 15 | backgroundColor: ["#8e5ea2"], 16 | data: [139] 17 | }, 18 | { 19 | label: "Attend classes", 20 | backgroundColor: ["#F8CF60"], 21 | data: [95] 22 | }, 23 | { 24 | label: "Passed final exam", 25 | backgroundColor: ["#EC5F3B"], 26 | data: [86] 27 | }, 28 | { 29 | label: "Certified", 30 | backgroundColor: ["#84C678"], 31 | data: [86] 32 | } 33 | ] 34 | }, 35 | options: { 36 | legend: { display: true }, 37 | responsive: true, 38 | plugins: { 39 | title: { 40 | display: true, 41 | text: 'Cybersecurity lectures summary: 2024' 42 | } 43 | }, 44 | interaction: { 45 | intersect: false, 46 | mode: 'index' 47 | } 48 | } 49 | }); 50 | } 51 | }); -------------------------------------------------------------------------------- /docs/javascripts/chart-2025.js: -------------------------------------------------------------------------------- 1 | document.addEventListener("DOMContentLoaded", function() { 2 | if (document.getElementById("bar-chart-horizontal-2025")) { 3 | new Chart(document.getElementById("bar-chart-horizontal-2025"), { 4 | type: 'bar', 5 | data: { 6 | labels: ["2025"], 7 | datasets: [ 8 | { 9 | label: "Signed-up", 10 | backgroundColor: ["#3e95cd"], 11 | data: [167] 12 | }, 13 | { 14 | label: "Passed entrance exam", 15 | backgroundColor: ["#8e5ea2"], 16 | data: [130] 17 | }, 18 | { 19 | label: "Attend classes", 20 | backgroundColor: ["#F8CF60"], 21 | data: [98] 22 | }, 23 | { 24 | label: "Passed final exam", 25 | backgroundColor: ["#EC5F3B"], 26 | data: [78] 27 | }, 28 | { 29 | label: "Certified", 30 | backgroundColor: ["#84C678"], 31 | data: [78] 32 | } 33 | ] 34 | }, 35 | options: { 36 | legend: { display: true }, 37 | responsive: true, 38 | plugins: { 39 | title: { 40 | display: true, 41 | text: 'Cybersecurity lectures summary: 2025' 42 | } 43 | }, 44 | interaction: { 45 | intersect: false, 46 | mode: 'index' 47 | } 48 | } 49 | }); 50 | } 51 | }); -------------------------------------------------------------------------------- /docs/javascripts/chart-all.js: -------------------------------------------------------------------------------- 1 | document.addEventListener("DOMContentLoaded", function() { 2 | if (document.getElementById("bar-chart-horizontal-all")) { 3 | new Chart(document.getElementById("bar-chart-horizontal-all"), { 4 | type: 'bar', 5 | data: { 6 | labels: ["2019", "2021", "2022", "2023", "2024", "2025"], 7 | datasets: [ 8 | { 9 | label: "Signed-up", 10 | backgroundColor: ["#3e95cd"], 11 | data: [36, 53, 124, 109, 190, 167] 12 | }, 13 | { 14 | label: "Passed entrance exam", 15 | backgroundColor: ["#8e5ea2"], 16 | data: [25, 39, 98, 100, 139, 130] 17 | }, 18 | { 19 | label: "Attend classes", 20 | backgroundColor: ["#F8CF60"], 21 | data: [23, 39, 73, 83, 95, 98] 22 | }, 23 | { 24 | label: "Passed final exam", 25 | backgroundColor: ["#EC5F3B"], 26 | data: [11, 31, 64, 65, 86, 78] 27 | }, 28 | { 29 | label: "Certified", 30 | backgroundColor: ["#84C678"], 31 | data: [11, 31, 64, 65, 86, 78] 32 | } 33 | ] 34 | }, 35 | options: { 36 | legend: { display: true }, 37 | responsive: true, 38 | plugins: { 39 | title: { 40 | display: true, 41 | text: 'Cybersecurity lectures summary: 2019-2025' 42 | } 43 | }, 44 | interaction: { 45 | intersect: false, 46 | mode: 'index' 47 | } 48 | } 49 | }); 50 | } 51 | }); -------------------------------------------------------------------------------- /docs/projects-initiatives/index.md: -------------------------------------------------------------------------------- 1 | --- 2 | title: Projects & Initiatives 3 | description: Other interesting projects and initiatives. 4 | hide: 5 | - navigation 6 | - toc 7 | --- 8 | 9 | --8<-- "includes/links.md" 10 | 11 | # Projects & Initiatives 12 | 13 | In this section, you will find other projects and initiatives in which *Cybersecurity Stream* members are involved. Check this out, you may find it interesting for you, your family or friends! Stay secure! 14 | 15 |
16 | 17 | - __NTHW__ :flag_us: / :flag_pl: 18 | 19 | --- 20 | 21 | [![Stars](https://img.shields.io/github/stars/notthehiddenwiki?label=Stars&style=social)](https://github.com/notthehiddenwiki) 22 | 23 | Not The Hidden Wiki is the largest free repository of links and community on cybersecurity. 24 | Useful for both beginners and experts. Check out the GitHub repo! 25 | 26 | [:octicons-arrow-right-24: GitHub repository](https://github.com/notthehiddenwiki/nthw) 27 | 28 | --- 29 | 30 | Michał Kucharski "(M. Kucharskov)" [:material-web:][michal-kucharski-web] 31 | 32 | - __MHKI__ :flag_pl: 33 | 34 | --- 35 | 36 | The Museum of the History of Computers and information technology in Katowice showcases over 4,900 devices, with 300 on display. Exhibits cover 70 years of computing, including 50 Polish-made machines. 37 | Visitors can enjoy a two-hour guided tour through computing history. 38 | 39 | (pl. Muzeum historii komputerów i informatyki) 40 | 41 | [:octicons-arrow-right-24: Museum website](https://www.muzeumkomputerow.edu.pl) 42 | 43 | --- 44 | 45 | Sławomir Staciwa [:material-linkedin:][slawomir-staciwa-in] 46 | 47 | - __SPOD 2.0__ :flag_pl: 48 | 49 | --- 50 | 51 | The association, which was established as a platform for the exchange of experiences between Data Protection Officers, coordinators, compliance officers, data protection and information enthusiasts from various industries spread across the country. 52 | 53 | (pl. Stowarzyszenie Praktyków Ochrony Danych) 54 | 55 | [:octicons-arrow-right-24: Association website](https://spod2.pl) 56 | 57 | --- 58 | 59 | Dagmara Adamczyk [:material-linkedin:][dagmara-adamczyk-in] 60 | 61 | - __Modern technology block - part 3__ :flag_pl: 62 | 63 | --- 64 | 65 | Radio show on Radio Katowice on new technologies and cyber security! 66 | 67 | (pl. Blok nowoczesnych technologii - część 3) 68 | 69 | Listen **every Tuesday at 21:10**! 70 | 71 | [:octicons-arrow-right-24: Program schedule](https://www.radio.katowice.pl/ramowka.html) 72 | 73 | --- 74 | 75 | Sławomir Staciwa [:material-linkedin:][slawomir-staciwa-in] 76 | 77 | - __17 53c__ :flag_pl: 78 | 79 | --- 80 | 81 | Foundation and association dedicated to promoting cybersecurity through education, research, events, and collaboration with experts and institutions. 82 | 83 | [:octicons-arrow-right-24: Association website](https://1753c.io) 84 | 85 | --- 86 | 87 | Jakub Plusczok [:material-linkedin:][jakub-plusczok-in] 88 | 89 | - __Cyber Mocni__ :flag_pl: 90 | 91 | --- 92 | 93 | An initiative led by ING Hubs Poland experts to educate children, teenagers and seniors about online safety through interactive school visits and engaging lessons on cybersecurity threats, digital responsibility, and safe internet use. 94 | 95 | [:octicons-arrow-right-24: Article](https://inghubspoland.com/news/cyber-mocni-take-care-of-childrens-online-safety) 96 | 97 | --- 98 | 99 | Kamila Juszczyk [:material-linkedin:][kamila-juszczyk-in], 100 | Karolina Sieruga [:material-linkedin:][karolina-sieruga-in], 101 | Jakub Plusczok [:material-linkedin:][jakub-plusczok-in] 102 | 103 | - __LimberDuck__ :flag_us: / :flag_pl: 104 | 105 | --- 106 | 107 | [![Stars](https://img.shields.io/github/stars/limberduck?label=Stars&style=social)](https://github.com/limberduck) 108 | 109 | Open-source tools designed to streamline and automate the work of cybersecurity professionals in the area of Vulnerability Management. 110 | 111 | [:octicons-arrow-right-24: Project website](https://limberduck.org) 112 | 113 | --- 114 | 115 | Damian Krawczyk [:material-web:][damian-krawczyk-web] 116 | 117 |
118 | -------------------------------------------------------------------------------- /docs/stylesheet/extra.css: -------------------------------------------------------------------------------- 1 | /* 2 | * Copyright (c) 2016-2023 Martin Donath 3 | * Alex Voss 4 | * 5 | * Permission is hereby granted, free of charge, to any person obtaining a copy 6 | * of this software and associated documentation files (the "Software"), to 7 | * deal in the Software without restriction, including without limitation the 8 | * rights to use, copy, modify, merge, publish, distribute, sublicense, and/or 9 | * sell copies of the Software, and to permit persons to whom the Software is 10 | * furnished to do so, subject to the following conditions: 11 | * 12 | * The above copyright notice and this permission notice shall be included in 13 | * all copies or substantial portions of the Software. 14 | * 15 | * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR 16 | * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, 17 | * FITNESS FOR A PARTICULAR PURPOSE AND NON-INFRINGEMENT. IN NO EVENT SHALL THE 18 | * AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER 19 | * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING 20 | * FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS 21 | * IN THE SOFTWARE. 22 | */ 23 | 24 | :root { 25 | --md-status--inprogress: url('data:image/svg+xml;charset=utf-8,') 26 | } 27 | .md-status--inprogress::after { 28 | mask-image: var(--md-status--inprogress); 29 | -webkit-mask-image: var(--md-status--inprogress); 30 | } 31 | -------------------------------------------------------------------------------- /includes/abbreviations.md: -------------------------------------------------------------------------------- 1 | *[CRC]: Corporate Readiness Certificate 2 | *[IAM]: Identity and Access Management 3 | *[OSINT]: Open source intelligence 4 | *[DDOS]: Distributed denial of service 5 | *[SIEM]: Security Information and Event Management 6 | *[SOAR]: Security Orchestration, Automation and Response 7 | *[ETL]: Extract, Transform and Load 8 | *[SDLC]: Software Development Life Cycle 9 | *[CISSP]: Certified Information Systems Security Professional -------------------------------------------------------------------------------- /includes/links.md: -------------------------------------------------------------------------------- 1 | [krzysztof-kuznik-in]: https://linkedin.com/in/cybersec-ninja 2 | [maciej-wrobel-in]: https://www.linkedin.com/in/maciejwrobel 3 | [askaniusz-ferens-in]: https://www.linkedin.com/in/asek-ferens 4 | [slawomir-staciwa-in]: https://www.linkedin.com/in/sstaciwa 5 | [damian-krawczyk-web]: https://www.damiankrawczyk.com 6 | [lukasz-jankowski-in]: https://www.linkedin.com/in/lukasz-jan-jankowski 7 | [jacek-kocyba-in]: https://www.linkedin.com/in/jacek-kocyba-49a5a2a0 8 | [mateusz-koziel-in]: https://www.linkedin.com/in/mateusz-koziel 9 | [jakub-plusczok-in]: https://www.linkedin.com/in/jakubplusczok 10 | [kamila-juszczyk-in]: https://www.linkedin.com/in/kamila-juszczyk 11 | [katarzyna-kowalski-in]: https://www.linkedin.com/in/katarzyna-kowalski 12 | [karolina-sieruga-in]: https://www.linkedin.com/in/karolina-sieruga 13 | [gerard-zmuda-in]: https://linkedin.com/in/gerard-zmuda 14 | [daniel-jeczen-in]: https://linkedin.com/in/daniel-jeczen 15 | [rafal-nowakowski-in]: https://linkedin.com/in/rafal-n 16 | [dagmara-adamczyk-in]: https://www.linkedin.com/in/adamczykdagmara 17 | [anna-maszybrocka-in]: https://www.linkedin.com/in/anna-maszybrocka) 18 | [justyna-chochla-wojdyla-in]: https://www.linkedin.com/in/justyna-chochla 19 | [pawel-matyszok-in]: https://www.linkedin.com/in/pawelmatyszok 20 | [krzysztof-kozak-in]: https://www.linkedin.com/in/krzysztof-kozak-IT 21 | [lukasz-galos-in]: https://www.linkedin.com/in/lukasz-galos 22 | [michal-kucharski-web]: https://kucharskov.pl 23 | [maciej-pypec-in]: https://linkedin.com/in/maciej-pypec 24 | [jakub-szumera-in]: https://www.linkedin.com/in/jakubsz 25 | [michal-kocur-in]: https://www.linkedin.com/in/michal-kocur 26 | [piotr-furmaniak-in]: https://www.linkedin.com/in/piotr-furmaniak-4b2a07224 27 | [adam-majstrak-web]: https://codehub.com.pl 28 | [judyta-berc-in]: https://www.linkedin.com/in/judyta-berc-569730211 29 | [anna-maszybrocka-in]: https://www.linkedin.com/in/anna-maszybrocka 30 | [piotr-czarnik-in]: https://www.linkedin.com/in/piotr-czarnik-5a2b20124 31 | [oskar-marszalik-in]: https://www.linkedin.com/in/oskar-marszalik-30a169215 32 | [patryk-zachnik-in]: https://www.linkedin.com/in/patrykzachnik 33 | [mateusz-majstrak-in]: https://www.linkedin.com/in/mateusz-majstrak 34 | [michal-ziolek-in]: https://pl.linkedin.com/in/mz256 35 | [krystian-tokarz-in]: https://www.linkedin.com/in/krystian-tokarz-a9a8b159 36 | [openbiz]: https://www.openbiz.pl 37 | [cezar-cichocki-in]: https://www.linkedin.com/in/cezar-cichocki-53953732a -------------------------------------------------------------------------------- /mkdocs.yml: -------------------------------------------------------------------------------- 1 | site_name: Cybersecurity Stream 2 | site_url: https://cybersecuritystream.github.io 3 | repo_url: https://github.com/cybersecuritystream/cybersecuritystream.github.io 4 | edit_uri: edit/main/docs/ 5 | repo_name: cybersecuritystream.github.io 6 | 7 | theme: 8 | palette: 9 | # Palette toggle for automatic mode 10 | - media: "(prefers-color-scheme)" 11 | primary: orange 12 | accent: light blue 13 | toggle: 14 | icon: material/brightness-auto 15 | name: Switch to light mode 16 | 17 | # Palette toggle for light mode 18 | - media: "(prefers-color-scheme: light)" 19 | primary: orange 20 | accent: deep orange 21 | scheme: default 22 | toggle: 23 | icon: material/brightness-7 24 | name: Switch to dark mode 25 | 26 | # Palette toggle for dark mode 27 | - media: "(prefers-color-scheme: dark)" 28 | primary: orange 29 | accent: deep orange 30 | scheme: slate 31 | toggle: 32 | icon: material/brightness-4 33 | name: Switch to system preference 34 | name: material 35 | language: en 36 | custom_dir: overrides 37 | logo: assets/logo.png 38 | favicon: assets/favicon.png 39 | icon: 40 | repo: fontawesome/brands/github 41 | features: 42 | # - navigation.instant 43 | # - navigation.instant.progress 44 | - navigation.tabs 45 | - navigation.top 46 | - navigation.tracking 47 | - navigation.footer 48 | - announce.dismiss 49 | - navigation.indexes 50 | - content.code.copy 51 | - content.tooltips 52 | # - content.action.view 53 | 54 | plugins: 55 | - search 56 | - glightbox: 57 | zoomable: true 58 | draggable: true 59 | skip_classes: 60 | - skip-lightbox 61 | - git-authors: 62 | show_email_address: false 63 | - git-revision-date-localized: 64 | type: timeago 65 | enable_creation_date: true 66 | timezone: Europe/Warsaw 67 | locale: en 68 | fallback_to_build_date: false 69 | - table-reader 70 | - social 71 | - blog: 72 | enabled: true 73 | - rss: 74 | match_path: "blog/posts/.*" 75 | date_from_meta: 76 | as_creation: date.created 77 | as_update: date.updated 78 | 79 | extra: 80 | generator: true 81 | social: 82 | - icon: fontawesome/brands/github 83 | link: http://github.com/cybersecuritystream 84 | name: Cybersecurity Stream at GitHub 85 | status: 86 | new: New 87 | inprogress: In progress 88 | 89 | 90 | copyright: Copyright © 2017 - 2025 Cybersecurity Stream 91 | 92 | markdown_extensions: 93 | - admonition 94 | - footnotes 95 | - pymdownx.details 96 | - pymdownx.superfences: 97 | custom_fences: 98 | - name: mermaid 99 | class: mermaid 100 | format: !!python/name:pymdownx.superfences.fence_code_format 101 | - toc: 102 | permalink: '#' 103 | permalink_title: Direct link to this section 104 | - attr_list 105 | - pymdownx.emoji: 106 | emoji_index: !!python/name:material.extensions.emoji.twemoji 107 | emoji_generator: !!python/name:material.extensions.emoji.to_svg 108 | - pymdownx.tasklist: 109 | custom_checkbox: true 110 | - md_in_html 111 | - pymdownx.highlight: 112 | anchor_linenums: true 113 | line_spans: __span 114 | pygments_lang_class: true 115 | - pymdownx.inlinehilite 116 | - pymdownx.snippets: 117 | auto_append: 118 | - includes/abbreviations.md 119 | - abbr 120 | - pymdownx.critic 121 | - pymdownx.caret 122 | - pymdownx.keys 123 | - pymdownx.mark 124 | - pymdownx.tilde 125 | - pymdownx.tabbed: 126 | alternate_style: true 127 | slugify: !!python/object/apply:pymdownx.slugs.slugify 128 | kwds: 129 | case: lower 130 | 131 | extra_javascript: 132 | - javascripts/chart.min.js 133 | - javascripts/chart-all.js 134 | - javascripts/chart-2025.js 135 | - javascripts/chart-2024.js 136 | - javascripts/chart-2023.js 137 | - javascripts/chart-2022.js 138 | - javascripts/chart-2021.js 139 | - javascripts/chart-2019.js 140 | 141 | extra_css: 142 | - stylesheets/extra.css 143 | 144 | watch: 145 | - includes 146 | 147 | nav: 148 | - Home: index.md 149 | - CRC: 150 | - crc/index.md 151 | - crc/2025/index.md 152 | - crc/instruction/index.md 153 | - crc/faq.md 154 | - Previous editions: 155 | - crc/previous/index.md 156 | - crc/2024/index.md 157 | - crc/2023/index.md 158 | - crc/2022/index.md 159 | - crc/2021/index.md 160 | - crc/2019/index.md 161 | - crc/2018/index.md 162 | - crc/2017/index.md 163 | - Projects & Initiatives: projects-initiatives/index.md 164 | - Blog: 165 | - blog/index.md -------------------------------------------------------------------------------- /overrides/main.html: -------------------------------------------------------------------------------- 1 | {% extends "base.html" %} 2 | 3 | {% block announce %} 4 | 5 | Registration for 6 | 7 | CRC 2025 8 | 9 | is CLOSED! 10 | {% endblock %} -------------------------------------------------------------------------------- /overrides/partials/copyright.html: -------------------------------------------------------------------------------- 1 | 22 | 23 | 24 | -------------------------------------------------------------------------------- /overrides/partials/header.html: -------------------------------------------------------------------------------- 1 | 22 | 23 | 24 | {% set class = "md-header" %} 25 | {% if "navigation.tabs.sticky" in features %} 26 | {% set class = class ~ " md-header--shadow md-header--lifted" %} 27 | {% elif "navigation.tabs" not in features %} 28 | {% set class = class ~ " md-header--shadow" %} 29 | {% endif %} 30 | 31 | 32 |
33 | 110 | 111 | 112 | {% if "navigation.tabs.sticky" in features %} 113 | {% if "navigation.tabs" in features %} 114 | {% include "partials/tabs.html" %} 115 | {% endif %} 116 | {% endif %} 117 |
-------------------------------------------------------------------------------- /overrides/partials/nav.html: -------------------------------------------------------------------------------- 1 | {#- 2 | This file was automatically generated - do not edit 3 | -#} 4 | {% import "partials/nav-item.html" as item with context %} 5 | {% set class = "md-nav md-nav--primary" %} 6 | {% if "navigation.tabs" in features %} 7 | {% set class = class ~ " md-nav--lifted" %} 8 | {% endif %} 9 | {% if "toc.integrate" in features %} 10 | {% set class = class ~ " md-nav--integrated" %} 11 | {% endif %} 12 | -------------------------------------------------------------------------------- /requirements.txt: -------------------------------------------------------------------------------- 1 | mkdocs-material>=9.5.27 2 | mkdocs-git-authors-plugin>=0.9.2 3 | mkdocs-git-revision-date-localized-plugin>=1.3.0 4 | mkdocs-glightbox>=0.4.0 5 | mkdocs-table-reader-plugin>=3.1.0 6 | mkdocs-material[imaging]>=9.5.27 7 | mkdocs-rss-plugin>=1.17.1 --------------------------------------------------------------------------------