Training Identification and escalation of security incidents of the ICT environment
Practical information about training
- CATEGORY: Security
- SUBCATEGORY: Governance, Risk and Compliance (GRC)
- TRAINING CODE: SC-ZR-21
- DURATION: 2 days
- PRICE INFORMATION from: 3900 PLN net
- LANGUAGE OF TRAINING: polish
- FORM OF IMPLEMENTATION: stationary, online
Training description
Led by an expert in computer forensics and post-intrusion analysis, the training combines theory with practical live demonstrations. The program covers threat identification, attack techniques and security incident response methods. The class is conducted in an interactive format with demonstrations of actual hacking attacks and detection methods, allowing participants to see the threats and ways to protect themselves in practice.
Participant profile
- IT systems administrators
- Information security specialists
- Network engineers
- Employees of incident response teams
- Security analysts
- Mobile systems administrators
- Those responsible for IoT security
- IT security professionals
Agenda
- Elements of Information Security
- Common security problems in IT systems
- Selected network layer security issues
- How to protect your network – elements of security monitoring
- Web application security
- Security of mobile infrastructure (phones, tablets)
- Security of operating systems and infrastructure software components
- IoT security
Benefits
To learn about real hacking attack techniques through practical demonstrations. Gain skills in detecting and analyzing security incidents. Acquire practical knowledge of securing IT systems and mobile infrastructure. Developing the ability to respond to critical situations. Learning about network security monitoring methods. Understanding threats and security in the IoT area.
Required preparation of participants
- Basic knowledge of operating systems
- General knowledge of computer networks
- Understand the basics of IT security
- Experience in systems administration
Issues
- Security incident management
- Incident analysis methodology
- Hacking attack techniques
- Network security monitoring
- Web application security
- Mobile device security
- Protection of operating systems
- IoT infrastructure security
- Incident response procedures
- Malware analysis
- Intrusion detection techniques
- Methods of securing systems
Do you have any questions?
Feel free to contact us.
Adrian Kwiatkowski
+48 532 774 376
adrian.kwiatkowski@eitt.pl
31 Ząbkowska Street 03-736 Warsaw
Forms of training delivery
Stationary training
- Training at the customer's premises or at a designated location
- Training room equipped with the necessary equipment
- Training materials in electronic form
- Coffee breaks and lunch
- Direct interaction with the trainer
- Networking in a group
- Workshop exercises in teams
Remote training
- Virtual training environment
- Electronic materials
- Interactive online exercises
- Breakout rooms for group work
- Technical support during the training
- Recordings of the session (optional)
Possibility of funding
The training can be financed with public funds under:
- National Training Fund (KFS)
- Development Services Base (BUR)
- EU projects implemented by PARP
- HR Academy Program (PARP)
- Regional operational programs
If you are interested in funding, our team will help you prepare the required documentation.
HAVE A QUESTION?
Contact us for more information about our training, programs and cooperation. We will be happy to answer all your inquiries!
They trusted us
Get to know our company

Do you have any questions?
Feel free to contact us.
Adrian Kwiatkowski
+48 532 774 376
adrian.kwiatkowski@eitt.pl
31 Ząbkowska Street 03-736 Warsaw
FAQ - Frequently Asked Questions
- One-pager invitation with deadlines
- Project kick-off
- Strategic leadership and thinking
- Communication and Cooperation. Conflict management
- Motivating, engaging and difficult decisions in business
- Managing Change and Innovation. Leadership in crisis
- Building the organization of the future
- Best practices workshop - retrospective; creating a coherent program for middle and lower management levels























