Skip to content

Security Awareness

Advanced socio-technical threats and building a culture of cyber-resilience

Szkolenie koncentruje się na nowoczesnych zagrożeniach socjotechnicznych wykorzystujących sztuczną inteligencję oraz strategiach budowania trwałej kultury cyberodporności. Program wykracza poza tradycyjne podejście do security awareness, przedstawiając pracowników jako pierwszą linię obrony. Uczestnicy poznają psychologiczne mechanizmy ataków oraz praktyczne metody budowania organizacyjnej odporności. Zajęcia prowadzone są w formie interaktywnych warsztatów z symulacjami ataków i analizą rzeczywistych przypadków.

2 days Online / On-site
from 2,450 PLN

Cyber security awareness training

A one-day training course focused on building awareness of cyber security threats among an organization's employees. The program focuses on the practical aspects of security in everyday work, presenting real-world threat scenarios and methods to protect against them. Participants will learn the most common attack techniques, learn to recognize manipulation attempts, and osvo good practices for maintaining security in work and private life environments.

1 day Online / On-site
from 1,850 PLN

Cyber security awareness for executives

A one-day training course dedicated to executives, focusing on the strategic aspects of cyber security in an organization. The program is designed to provide managers with the necessary knowledge to make informed IT security decisions. The training uses case studies and discussions, presenting practical aspects of cyber security management.

1 day Online / On-site
from 1,850 PLN

Cyber security basics for Municipality employees

The Cyber Security Basics for Municipal Employees training course is an intensive, one-day course designed specifically for local government employees. In an era of increasing cyber threats, municipal employees need to be aware of potential dangers and be familiar with basic methods of protecting data and information systems.

4 days Online / On-site
from 600 PLN

Cyber security for employees in the context of NIS2 and KSC

The training aims to build cyber security awareness among all employees, as required by the NIS2 Directive and the KSC Law. Delivered in the form of engaging workshops and practical exercises, the program focuses on learning how to recognize modern threats such as phishing and social engineering. Participants will master the key principles of working securely with information systems and learn their role in incident response procedures. The training methodology emphasizes practical examples and building a sense of shared responsibility for protecting company resources.

1 day Online / On-site
from 1,800 PLN

Cyber security for employees of Local Government Units (LGUs)

The training course Cyber Security for Local Government Unit (JST) Employees is an intensive 4-hour course designed specifically for those working in local government administration. In an era of increasing cyber threats, TSU employees need to be aware of potential dangers and know effective methods to protect data and information systems.During the training, participants will learn about the latest trends in cybercrime, with a focus on threats specific to the public sector. Cyber security experts will present practical techniques for identifying and countering attacks such as phishing, ransomware and social engineering.The course also covers legal and organizational aspects of data protection in local government units. Participants will learn how to implement and maintain effective security policies that comply with current regulations and industry best practices.

1 day Online / On-site
from 700 PLN

Cyber security for TSU executives

The training course Cyber Security for Staff of Local Government Units is an intensive 4-hour course designed specifically for employees of local government units. In the face of growing cyber threats, this training is a key element in building digital resilience of public institutions.During the training, participants will explore the practical aspects of cyber security, learning about the latest trends in cyber attacks and effective methods of defense. The course combines theory with practice, offering real-world scenarios and exercises that will allow participants to develop skills in identifying threats and responding to incidents.The presenters are experienced cyber security experts who share their knowledge and experience from the front line of the fight against cybercrime. Their hands-on approach ensures that participants will gain not only theoretical knowledge, but more importantly skills that they can immediately apply in their daily work.

1 day Online / On-site
from 700 PLN

Cyber security for users

The training provides practical cyber security knowledge for non-technical employees. The program focuses on recognizing cyber threats and effectively protecting data and devices on a daily basis. Classes are conducted in the form of interactive workshops, combining theory and practice through the implementation of exercises and simulations of real threats. Available as classroom or online training, with a program tailored to the specifics of the organization.

2 days Online / On-site
from 1,800 PLN

Cyber threats and methods of defense

The Cyber Threats and Defense Methods training course is an intensive, one-day course designed to equip participants with the practical knowledge and skills necessary to effectively protect themselves from today's cyber threats. In the digital age, where hacking attacks evolve at breakneck speed and the consequences of security breaches can be devastating, understanding the nature of cyber threats and mastering defense techniques becomes crucial for any organization.During the training, participants will explore current trends in cybercrime, learning about a variety of attack types - from simple phishing to complex social engineering. Experienced experts in the cyber security industry will present realistic attack scenarios, analyzing them in detail and demonstrating effective defense strategies.The course combines theory and practice, offering participants the opportunity to apply the acquired knowledge in a controlled environment. As a result, students will not only understand the mechanisms of cybercriminals, but also learn how to proactively respond to security incidents and minimize potential threats in their daily work.

1 day Online / On-site
from 700 PLN

End-user security: Protecting the digital footprint

A two-day training focusing on the practical aspects of protecting users' privacy and security in the digital environment. The program covers methods for minimizing the digital footprint, securing personal information and using technology consciously. The training uses workshops and practical exercises.

2 days Online / On-site
from 2,450 PLN

Introduction to IT security issues

The training presents fundamental issues of IT security policy based on global standards and methods proven in large corporations. The program covers the latest security technologies in compliance with the requirements of Polish legislation. Classes are conducted in the form of workshops in a heterogeneous Windows/Linux environment, where participants gain practical skills in implementing security mechanisms and configuring security protocols in client-server architecture.

3 days Online / On-site
from 2,200 PLN

IT security - for non-technical employees

The training provides practical preparation in ICT security awareness and response skills. The program is designed for people with basic computer skills, enabling them to understand the perspective of a potential attacker. Classes are conducted in the form of interactive workshops, combining theory with practical exercises that simulate actual threat situations. Participants acquire the skills necessary to effectively protect both their own data and corporate resources.

1 day Online / On-site
from 1,100 PLN

Safety of office workers

The program was developed based on real cases of attacks and years of experience in the field of cybercrime. The classes combine theory and practice, presenting real-life threat scenarios and effective methods of defense against cybercriminals. Participants learn the mechanisms of criminals and how to identify potential threats in everyday office work.

1 day Online / On-site
from 1,190 PLN

Technical and Operational Security

Advanced applications of SSL/TLS protocols in secure communications

A training course focusing on the practical use of SSL/TLS protocols to secure communications in information systems. Participants will gain an in-depth understanding of how these protocols work, learn how to configure and integrate them into applications, and learn security best practices. The training combines theory with intensive hands-on workshops, enabling participants to gain the skills necessary to effectively implement and manage secure communications in a variety of IT environments.

4 days Online / On-site
from 6,000 PLN

Advanced cryptographic techniques in information systems

Training focusing on the practical application of advanced cryptographic techniques in modern information systems. Participants will gain comprehensive theoretical knowledge and practical skills in the design and implementation of cryptographic mechanisms, from basic algorithms to complex security protocols. The training combines theory with intensive workshops, enabling participants to implement advanced security features on their own and analyze potential threats in real-world scenarios.

5 days Online / On-site
from 6,000 PLN

Basics of z/OS RACF Administration.

This course begins with an introduction to the z/OS environment, TSO and ISPF/PDF, batch processing and z/OS data sets. Hands-on labs allow you to gain experience in viewing and assigning data sets, submitting a batch job, and reviewing job results. After an introduction to z/OS, you will learn, through lectures and exercises, how to use the basic parameters of RACF commands and panels to define users and groups, protect general resources, z/OS data sets and select a basic set of RACF options.

5 days Online / On-site
from 12,000 PLN

Cloudflare - CDN, security and protection against DDoS

Practical training in the implementation and management of Cloudflare services, with a special focus on security aspects and protection against DDoS attacks. Participants will learn the advanced features of the platform, learn to configure and optimize security and monitor the effectiveness of protection. The program includes workshops on real-world examples to gain practical experience in managing website security and performance.

2 days Online / On-site
from 2,450 PLN

Computer network security

The \Computer Network Security\ training course is a comprehensive educational program that combines theory and practice in the field of cyber security. The course includes two levels: basic (2 days) and extended (additional day), allowing participants to gain an in-depth understanding of network infrastructure protection.

2 days Online / On-site
from 3,000 PLN

Cyber security training in public administration

Cyber security training designed for government employees, focusing on the practical aspects of protecting information in an official environment. The program includes identification of modern digital threats, recognition of socio-technical techniques and implementation of effective data security methods. Classes are conducted in the form of interactive workshops using real examples of security incidents, practical exercises and threat simulations.

1 day Online / On-site
from 1,400 PLN

Cybersecurity Roles, Processes & Operating System Security

Poznaj kluczowe role i procesy związane z cyberbezpieczeństwem.

2 days Online / On-site
from 2,450 PLN

Effective RACF Administration

This course prepares you to be a more effective security administrator as you gain experience and confidence in using the RACF z/OS Security Server component. To reinforce the lectures, the course offers hands-on exercises in which you use the RACF z/OS Security Server component to define users, configure group structures, define general resources, protect z/OS data sets and use several RACF tools.

5 days Online / On-site
from 12,000 PLN

Expert issues on cybersecurity

The training focuses on the practical aspects of cybersecurity in the context of the duties of a Security Officer. The program covers legal requirements, risk management and cyber security incident response procedures. Classes are conducted in the form of workshops combining theory with practical aspects of the implementation of the Plenipotentiary's tasks, with particular attention to institutional specifics and legal requirements.

2 days Online / On-site
from 2,200 PLN

Exploiting the Advanced Features of RACF

This course teaches you how to implement some of the advanced features available in RACF. Through a combination of classroom lectures and lab exercises, you will learn how to set up an RRSF environment, including how to use RRSF features to administer the security of remote RACF databases from one centralized location, allowing users to synchronize password changes between several related user IDs, using RRSF features to automatically keep two or more separate RACF databases in sync. Other major features you'll learn about include sysplex RACF data sharing and sysplex communication, RACF support for z/OS UNIX, DB2 security using RACF, Network Job Entry (NJE) security, operator commands, program control and backup, RACF database recovery, PassTickets, digital certificates and program signature.

4 days Online / On-site
from 8,000 PLN

GDPR CIPP/EU Certification

Increase your knowledge of personal data protection and earn the GDPR CIPP/EU certification.

1 day Online / On-site
from 1,500 PLN

How to secure mobile apps

The training focuses on methods of protecting and securing mobile applications. The program covers practical aspects of security testing, attack techniques used by modern intruders and mechanisms that make it difficult to reverse engineer mobile applications. The classes combine theory and practice, also taking into account issues in the area of network security monitoring. Participants will learn tools and methods for testing mobile application security in a real environment.

2 days Online / On-site
from 1,900 PLN

IBM Security QRadar SIEM Advanced Topics.

IBM Security QRadar helps minimize the time gap between the occurrence of suspicious activity and its detection. Attacks and policy violations leave traces in log events and network flows of information systems. To connect the dots, QRadar SIEM correlates these distributed events and flows into crimes that alert you to suspicious activity. Using the skills taught in this course, you will be able to configure the processing of unusual events, work with reference data and develop custom rules.

1 day Online / On-site
from 2,100 PLN

IBM Security QRadar SIEM Administration.

IBM Security QRadar SIEM enables you to minimize the time gap between the occurrence of suspicious activity and its detection. There are many administrative tools you can use to manage your QRadar SIEM deployment. This course covers system configuration, data source configuration, and remote network and service configuration.

2 days Online / On-site
from 4,000 PLN

IBM Storage Protect version 8.1.12 Implementation and Administration

Dowiedz się, jak wdrożyć i administrować środowiskiem IBM Storage Protect.

2 days Online / On-site
from 2,450 PLN

Implementation and management of Public Key Infrastructure (PKI).

A training course designed to provide participants with an in-depth understanding of the concept, implementation and practical application of Public Key Infrastructure (PKI). The training combines theory with intensive hands-on workshops, enabling participants to gain the skills necessary to design, implement and manage PKI-based solutions in business and technology environments.

3 days Online / On-site
from 4,500 PLN

Implementation of PKI and TLS security

A one-day technical training course on the implementation of Public Key Infrastructure (PKI) and TLS protocol. Participants will learn the practical aspects of implementing and managing digital certificates and securing network communications. The training is workshop-based, with an emphasis on practical exercises and real-world problem solving.

1 day Online / On-site
from 1,850 PLN

Implementing RACF Security for CICS/ESA and CICS/TS

This course teaches how to implement security for CICS systems using RACF as an external security manager. The lecture material will first explain the implementation tasks for a CICS system in a single region, and then extend to CICS systems in multiple regions connected to an MRO or ISC. In the class, you will learn both the CICS and RACF definitions necessary to establish effective security controls for CICS. You will learn how to:

5 days Online / On-site
from 12,000 PLN

IMS Security

Learn about Information Management System (IMS) implementation using Resource Access Control Facility (RACF) as an external security manager and installation of provided security exit procedures. Apply classroom lectures with security paper lab exercises in which you configure security definitions.

4 days Online / On-site
from 14,880 PLN

Information analysis

The training develops practical information analysis skills in the context of challenges facing public and private sector organizations. The program focuses on methods for analyzing phenomena, processes and events, as well as creating recommendations and strategic bases. The workshop combines theory and practice, emphasizing the use of analytical tools, forecasting techniques and the creation and analysis of databases. The classes are conducted in an interactive format, where participants work on real cases.

2 days Online / On-site
from 1,700 PLN

Information security

The training introduces a systematic approach to information security based on current industry standards and norms. The program covers aspects of personal data protection, intellectual property and compliance with the National Interoperability Framework. The class focuses on the practical aspects of identifying threats and implementing effective security measures in an organization. The course is conducted in the form of interactive workshops, combining theory with analysis of real cases.

1 day Online / On-site
from 800 PLN

Innovative blockchain applications in business: from theory to practice

A training course focusing on practical applications of blockchain technology in various business sectors beyond cryptocurrencies. Participants will learn advanced blockchain concepts, learn how to design and implement solutions based on the technology, and understand its potential in transforming business processes. The training combines theory with intensive workshops, enabling participants to gain the skills necessary to implement innovative blockchain solutions in real business scenarios.

3 days Online / On-site
from 2,500 PLN

IT security incident analysis

The training focuses on practical methods for analyzing IT security incidents and identifying anomalies in large data sets. The workshop program includes techniques for analyzing text files and network traffic dumps. Participants work on real cases, learning to recognize attack patterns and respond effectively to threats. The classes are conducted in the form of intensive workshops, where theory is immediately verified through practical exercises.

2 days Online / On-site
from 2,200 PLN

Lead Application Security Manager.

Lead Application Security Manager training allows you to develop the knowledge and skills necessary to establish, implement, maintain and continuously improve your application security program. During this training, you will gain an understanding of Secure Software Development Life Cycle (Secure SDLC) best practices. You will learn how to integrate security activities at every stage of application development, from design and coding to testing and deployment, to minimize vulnerabilities and protect against attacks.

5 days Online / On-site
from 6,400 PLN

Lead Cloud Security Manager.

Lead Cloud Security Manager training allows you to gain expertise in establishing, implementing, maintaining and continuously improving a cloud security program based on ISO/IEC 27017 and ISO/IEC 27018 standards. During this training, you will gain knowledge of cloud security concepts and principles, and learn how to manage and maintain a cloud security program to protect data in a cloud environment.

5 days Online / On-site
from 6,500 PLN

Lead Penetration Testing Manager.

Lead Penetration Testing Professional training allows you to develop the knowledge and skills necessary to plan, conduct and manage penetration testing. This training provides an understanding of methodologies and techniques for testing the security of systems, networks and applications. You will learn how to think like an attacker, use a variety of tools and techniques to identify and exploit vulnerabilities, and how to professionally report results to improve the overall security status of an organization.

5 days Online / On-site
from 6,400 PLN

Management and neutralization of DDoS attacks

The training course \Advanced Cybersecurity Strategies: Managing and Neutralizing DDoS Attacks\ is an intensive two-day course designed for IT professionals who want to improve their knowledge and skills in defending against Distributed Denial of Service (DDoS) attacks. In todays digital world, where DDoS attacks are becoming increasingly sophisticated and destructive, the ability to effectively defend against them is critical to maintaining business continuity and protecting an organizations reputation.During the course, participants will explore various aspects of DDoS attacks, from their typology to advanced mitigation techniques. The program includes practical workshops on analyzing network traffic, configuring defense systems and creating effective incident response procedures. Experts with many years of experience in cyber security will share their knowledge by presenting real cases of attacks and strategies for neutralizing them.The training emphasizes practical skills that participants can immediately apply in their organizations. Through interactive sessions, attack simulations and exercises using advanced tools, trainees will learn to identify, analyze and effectively repel DDoS attacks of various types and scales.

2 days Online / On-site
from 3,000 PLN

MITRE ATT&CK - framework taktyk i technik ataku

Szkolenie wprowadza uczestników w świat frameworka MITRE ATT&CK, dostarczając wiedzy o systematyce taktyk i technik wykorzystywanych w atakach cybernetycznych. Program koncentruje się na praktycznym w

2 days Online / On-site
from 2,450 PLN

Modern application security

Advanced training in securing modern applications, focusing on the latest techniques and methods to protect against cyber threats. The program covers practical aspects of security implementation in web, mobile and cloud applications. Participants work on real-world examples, learning to identify security vulnerabilities and implement appropriate protection mechanisms using modern security tools and frameworks.

3 days Online / On-site
from 3,900 PLN

Network security (penetration testing)

The program is designed with an emphasis on the practical aspects of protecting networks from threats and techniques for conducting penetration tests of infrastructure. The training is carried out in the form of workshops, during which participants learn tools to improve the implementation of security tests. The class also covers issues in the area of network security monitoring, which allows for a holistic view of the process of securing network infrastructure.

3 days Online / On-site
from 2,700 PLN

Reverse engineering and code security techniques

An intensive training course focusing on the practical aspects of reverse engineering and methods to protect code from analysis. Participants will learn advanced techniques for binary analysis, debugging and code decompilation on Windows and Linux platforms. The training combines theory with intensive hands-on workshops, enabling participants to gain the skills necessary to effectively analyze and protect software.

5 days Online / On-site
from 6,000 PLN

Security and compliance in the Google Cloud ecosystem

Szkolenie koncentruje się na projektowaniu, wdrażaniu i zarządzaniu bezpieczną infrastrukturą w środowisku Google Cloud Platform. Program obejmuje praktyczne aspekty implementacji mechanizmów bezpieczeństwa, zarządzania tożsamością oraz zapewnienia zgodności z obowiązującymi regulacjami. Zajęcia prowadzone są w formie warsztatów z wykorzystaniem rzeczywistych scenariuszy bezpieczeństwa i najlepszych praktyk branżowych. Szkolenie przygotowuje do egzaminu Professional Cloud Security Engineer oraz do pracy w roli specjalisty ds. bezpieczeństwa chmury.

3 days Online / On-site
from 2,700 PLN

Security Intelligence Fundamentals

Security Intelligence is a fairly new discipline for organizations of all sizes, having evolved from traditional log management and security information and event management solutions. This course focuses on the current IT and security landscape, as well as the business and IT factors behind a holistic approach to IT security, which is a prerequisite for successfully preventing malicious attacks and misuse of valuable enterprise assets.

2 days Online / On-site
from 3,000 PLN

Security of embedded systems (embedded)

An intensive, three-day training course combining theory and practice in securing embedded systems. The program covers the full cycle of secure software development - from architecture design to deployment and testing. Participants will learn the latest techniques for protecting IoT devices and industrial systems through hands-on workshops and case studies. The training is conducted in an interactive format, with an emphasis on sharing experiences and solving real-world problems.

3 days Online / On-site
from 4,000 PLN

Security Operations on AWS

Security Operations on AWS shows you how to effectively use AWS security services to stay secure and compliant in the AWS cloud. The course focuses on AWS-recommended security best practices that you can implement to increase the security of your data and systems in the cloud. The course highlights the security features of key AWS services, including compute, storage, network and database services. This course also addresses common security control objectives and compliance standards, and explores use cases for running regulated workloads on AWS in various verticals around the world. You'll also learn how to leverage AWS services and tools for automation and continuous monitoring - taking your security operations to the next level.

3 days Online / On-site
from 8,600 PLN

Technical aspects of NIS2/KSC implementation

The training provides technical professionals with advanced knowledge and practical skills to implement NIS2 and KSC requirements. The program is delivered through intensive technical workshops with hands-on labs elements, led by experienced practitioners. Participants will learn how to design a secure architecture, manage vulnerabilities, respond to incidents and implement cryptographic mechanisms. The goal is to translate legal requirements into concrete technical and organizational solutions in the IT environment.

3 days Online / On-site
from 4,500 PLN

Web application security

Intensive workshop training in web application security, combining theory and practice through analysis of over a dozen vulnerable systems. The program includes a detailed discussion of typical vulnerabilities, methods for detecting them and techniques for protecting against attacks. Each module begins with a theoretical introduction, followed by practical exercises using real-world examples. Participants receive access to additional materials and documentation to support their own security testing.

3 days Online / On-site
from 2,700 PLN

z/OS Security Server RACF, Implementing and Customization

The z/OS Security Server RACF Training: Implementing and Customization covers creating and managing the RACF database, customizing profiles and features, program control, and multi-layer security.

3 days Online / On-site
from 6,500 PLN

z/VM RACF and DirMaint Implementation

This course introduces students to the implementation of DirMaint and RACF Security Server software products for z/VM. The class focuses on the required steps for implementing DirMaint and RACF Security Server for z/VM in a z/VM 6.3 environment. Students participate in hands-on labs where they install, customize and use these two software products from an end-user and system programmer's point of view.

5 days Online / On-site
from 7,500 PLN

Governance, Risk and Compliance (GRC)

Advanced digital investigation techniques

Training in advanced digital investigation techniques provides in-depth knowledge of forensic analysis of computer systems. The program includes hands-on workshops using professional investigative tools and methodologies applied to real cases. Participants acquire the skills to conduct professional digital investigations, secure electronic evidence and prepare documentation in accordance with industry standards.

3 days Online / On-site
from 3,900 PLN

Advanced Java, JEE and web application security

This intensive four-day training course integrates advanced aspects of Java security, Java Enterprise Edition and web applications. The course provides an in-depth understanding of security mechanisms at all levels of enterprise applications. Through hands-on workshops and case studies, participants learn a holistic approach to securing complex enterprise systems. The program combines theory with extensive hands-on exercises, enabling participants to gain skills in designing and implementing multi-layered security features.

4 days Online / On-site
from 3,500 PLN

Advanced Java Security

This advanced three-day training course focuses on deepening the knowledge of Java application security. The program covers detailed aspects of security at the code, platform and system architecture levels. Participants will learn advanced application security techniques and threat detection and countermeasure methodologies through hands-on workshops and real-world case studies.

3 days Online / On-site
from 3,600 PLN

Advanced PHP and secure coding

Specialized training that combines advanced PHP programming techniques with best practices for secure software development. The program includes an in-depth analysis of security threats and methods to eliminate them at the source code level. The workshop is conducted in the form of intensive practical classes, where participants work on real cases of security breaches and learn how to effectively eliminate them. The training methodology is based on active participation in the process of identifying and remediating security vulnerabilities.

5 days Online / On-site
from 4,450 PLN

Advanced pentesting techniques in OT environments

Szkolenie odpowiada na rosnącą potrzebę weryfikacji rzeczywistego poziomu bezpieczeństwa systemów OT poprzez kontrolowane, symulowane ataki. Program obejmuje intensywne warsztaty praktyczne z maksymalnym naciskiem na ćwiczenia 'hands-on' w bezpiecznym środowisku laboratoryjnym. Uczestnicy zdobywają zaawansowane umiejętności planowania i przeprowadzania testów penetracyjnych specyficznych dla środowisk przemysłowych. Metodyka łączy teoretyczne podstawy z praktycznymi scenariuszami typu Capture The Flag skoncentrowanymi na celach OT, wykorzystując framework MITRE ATT&CK for ICS.

5 days Online / On-site
from 6,350 PLN

Advanced security for C#, ASP.NET and web applications

The training is an advanced workshop program dedicated to the multi-faceted security of web applications developed with Microsoft technologies. Participants will learn advanced techniques for securing C# and ASP.NET applications, with a focus on modern threats and protection methods. The program combines hands-on workshops with analysis of real-world security breaches.

3 days Online / On-site
from 3,600 PLN

Advanced software security - beyond ethical hacking

Specialized advanced training leading participants through new horizons of software security beyond standard penetration testing techniques. The program combines in-depth analysis of advanced attack techniques with methods for detecting and countering them. Participants work with advanced tools and techniques in a dedicated lab environment where they can safely experiment with different threat scenarios. The training uses a methodology based on real-world cases, enabling an understanding of both the attackers and defenders perspectives. Hands-on workshops account for 80% of the training time, ensuring a deep understanding of the concepts presented.

5 days Online / On-site
from 5,050 PLN

Advanced z/OS Security: Crypto, Network, RACF, and Your Enterprise

System z continues to enhance the value of mainframes with robust security solutions to help meet the needs of today's on-demand and service-oriented infrastructures. System z servers have implemented cutting-edge technologies such as high-performance cryptography, multi-level security, a large digital certificate authority and lifecycle management; as well as enhanced Secure Sockets Layer (SSL) performance, advanced Resource Access Control Facility (RACF) and z/OS Intrusion Detection Services. This advanced z/OS security course outlines the evolution of the current z/OS security architecture. It examines in detail the various technologies involved in z/OS Cryptographic Services, z/OS Resource Access Control Facility (RACF) and z/OS Integrated Security Services.

4 days Online / On-site
from 10,000 PLN

Android application security - protection against threats

Specialized training focusing on the security aspects of developing and testing applications for the Android platform. The program guides participants through the entire life cycle of a mobile application, with a special focus on security features specific to the Android ecosystem. Hands-on workshops allow participants to work with real applications and security testing tools. The training combines theory with intensive lab activities, where participants learn to identify and eliminate security threats in mobile applications. The classes use the latest versions of Android and current security mechanisms.

2 days Online / On-site
from 2,450 PLN

Analysis and risk management of open data

The training focuses on methods for analyzing and managing the risks associated with open data in an organization. The program covers threat identification, risk assessment and the design of controls for public data. Participants will learn the practical aspects of protecting data while maintaining its availability and usability. The classes are conducted in the form of workshops using real cases.

3 days Online / On-site
from 3,900 PLN

Anti-Money Laundering (AML) and Countering the Financing of Terrorism (CTF)

Specialized AML/CTF training provides practical knowledge of the latest regulations and methods for detecting suspicious transactions. The workshop program combines theoretical fundamentals with analysis of real cases, enabling participants to gain practical skills in identifying and countering AML/CTF threats. The training takes into account the latest trends in financial crime and methods to combat them.

2 days Online / On-site
from 2,450 PLN

Apache Shiro: Securing Java Applications

The training focuses on the practical aspects of implementing security in Java applications using the Apache Shiro framework. The program covers both the theoretical basics of application security and practical applications of Apache Shiro in real-world scenarios. Participants, through hands-on workshops, learn to design and implement security mechanisms in accordance with industry best practices.

1 day Online / On-site
from 1,650 PLN

API security - protection and access control

The training focuses on key aspects of API security, presenting advanced techniques for protection and access control. The program covers both the theoretical basics of API security and practical methods of security implementation. The workshop enables participants to gain hands-on experience in identifying threats, implementing protection mechanisms and auditing the security of software interfaces.

1 day Online / On-site
from 2,250 PLN

Application security for developers - from basics to advanced techniques

The training combines theory and practice in securing applications at all levels of their operation. Participants will learn about the most common attack vectors and methods to protect against them through practical workshops and exercises. The program covers both basic aspects of security and advanced techniques for securing applications. The class is conducted in a workshop format, where 70% of the time is devoted to practical exercises.

3 days Online / On-site
from 3,600 PLN

Application security in C/C++, ASP.NET and web applications

Intensive specialized training covering advanced aspects of security in applications developed in C/C++, ASP.NET and web applications. The program examines in detail the specific threats and protection methods specific to each of these technologies. Hands-on workshops guide participants through the process of identifying, analyzing and neutralizing vulnerabilities in each technology environment. The classes use real-world examples of vulnerabilities and security incidents, allowing participants to gain hands-on experience in securing applications.

4 days Online / On-site
from 3,500 PLN

Audit and control - alternative sources for obtaining information

The training focuses on advanced methods of obtaining information in audit and control activities. The program covers the practical aspects of working with employees and the use of investigative techniques and white intelligence in detecting organizational fraud. The workshop combines theory and practice, enabling participants to gain the skills to effectively gather and verify information from various sources. The classes are conducted in an interactive format using case studies and simulations of real-life situations.

1 day Online / On-site
from 1,500 PLN

Azure cloud security

The training focuses on key aspects of security in the Microsoft Azure environment, presenting a comprehensive approach to securing resources and data in the cloud. The program covers both the theoretical basics of cloud security and the practical aspects of implementing security in Azure. The workshop is conducted in an interactive format, combining the presentation of best practices with hands-on security configuration and testing exercises.

1 day Online / On-site
from 1,850 PLN

Building information security in accordance with ISO 27005

The training focuses on the practical implementation of an information security management system in accordance with ISO 27005. The program includes workshops on identifying and assessing information security risks and planning security measures. Participants will learn the methodology of risk analysis and how to design effective security measures in an organization. The classes are conducted in the form of workshops using real cases.

3 days Online / On-site
from 3,600 PLN

Best practices in security testing

The training explores the practical aspects of application security testing, focusing on methods for detecting and preventing vulnerabilities in information systems. The workshop program guides participants through the entire security testing process, from planning to test execution to reporting and remediation of found vulnerabilities. The class combines theory with intensive practice in a secure lab environment, where participants can conduct tests themselves and analyze real security breaches.

2 days Online / On-site
from 2,450 PLN

BeyondCorp - Zero Trust security implementation

The training presents an advanced approach to implementing the Zero Trust security model based on the BeyondCorp framework. The program combines theory with practical workshops, during which participants learn to design and implement modern access solutions based on Zero Trust. Particular attention is paid to aspects of the transformation of traditional infrastructure to the Zero Trust model and identity and access management in distributed environments.

2 days Online / On-site
from 2,450 PLN

Business continuity management

The training focuses on building a company's strategic capacity to anticipate and respond to business process disruptions. The program includes practical workshops on identifying critical processes and creating business continuity plans. Classes are conducted in the form of interactive workshops, combining theory and practice through case analysis and team exercises. Participants will acquire the skills necessary to effectively manage risk and create contingency plans.

2 days Online / On-site
from 1,700 PLN

Business continuity practitioner

The training prepares participants for practical implementation and maintenance of business continuity management systems in organizations. The workshop program is designed to impart not only the theoretical underpinnings, but more importantly, the practical skills necessary for effective business continuity management. Participants will learn methodologies and tools to identify critical business processes, assess risks, and design and implement business continuity plans. The workshop is based on real cases and scenarios, allowing participants to gain practical experience in solving real business continuity problems.

2 days Online / On-site
from 2,450 PLN

C# and .NET application security

This intensive workshop training focuses on the practical aspects of securing applications developed in .NET and C#. Participants work on real use cases, learning to identify and fix security vulnerabilities. The program includes both elements of defensive programming and security testing techniques, with a focus on the specifics of the .NET platform.

3 days Online / On-site
from 3,600 PLN

Capture the Flag (CTF) - a practical exercise in cyber security

Intensive hands-on workshops in the form of Capture The Flag (CTF) competitions offer participants the opportunity to develop cyber security skills in a controlled environment. During the training, participants face realistic security challenges as they work to solve task after task. The program combines theory and practice, enabling immediate application of the knowledge gained.

2 days Online / On-site
from 2,450 PLN

CDP - Data Protection Certificate

Professional training in preparation for obtaining a data protection certificate, which covers both the legal and technical aspects of securing information. The program includes practical workshops on implementing security policies and managing data protection. Participants will learn about risk assessment methodologies and security audit techniques in preparation for their role as a data protection specialist.

5 days Online / On-site
from 5,050 PLN

Certified Data Protection Officer (CDPO).

Certified Data Protection Officer training allows you to develop the knowledge and skills necessary to professionally perform the role of a Data Protection Officer (DPO). This training develops the competencies needed to support your organization in complying with the General Data Protection Regulation (GDPR). You will be able to inform, advise and monitor compliance with RODO, as well as work with the supervisory authority.

5 days Online / On-site
from 6,200 PLN

Certified Kubernetes Security Specialist (CKS) - preparation for certification

The training prepares participants for the Certified Kubernetes Security Specialist (CKS) exam, focusing on the practical aspects of securing Kubernetes clusters. The program covers all areas required for the exam, combining theory with intensive hands-on workshops. Participants will learn how to implement advanced security mechanisms and respond to incidents in a production environment.

3 days Online / On-site
from 3,900 PLN

Certified systems security practitioner

An advanced five-day certification training course that prepares you for your role as a systems security practitioner. The program covers a holistic approach to securing information systems, from risk analysis to security implementation. Participants gain practical skills in workshops and labs, working on real cases.

5 days Online / On-site
from 6,350 PLN

CipherTrust Manager - data security management

The training focuses on the practical aspects of managing data security using the CipherTrust Manager platform. The program covers the configuration, implementation and management of security policies, with a particular focus on data protection in hybrid environments. Participants work on real-world scenarios, learning to implement advanced data protection mechanisms.

3 days Online / On-site
from 3,900 PLN

CHFI - Certified Computer Forensics Expert

Intensive training that prepares you for the role of a computer forensics expert, covering both the technical and legal aspects of the process of acquiring and analyzing digital evidence. The program focuses on practical digital investigation techniques, evidence preservation methods and tools used in computer forensics. The workshop is conducted in the form of practical labs using professional investigative tools.

5 days Online / On-site
from 5,050 PLN

CISA - Certified Information Systems Auditor - exam preparation

The training prepares participants for the CISA (Certified Information Systems Auditor) exam. The program covers all exam domains and focuses on the practical aspects of information systems auditing. Classes are conducted in the form of lectures and workshops with solving sample exam tasks. Participants receive training materials in accordance with the latest certification program.

4 days Online / On-site
from 3,500 PLN

CISMP - Certificate in Information Security Management

The training prepares participants for the CISMP (Certificate in Information Security Management Principles), introducing them to the world of professional information security management. The program combines theory with practical aspects of security management, covering key areas of the ISO 27001 standard and industry best practices. Classes are conducted in the form of interactive workshops using real-world cases.

3 days Online / On-site
from 3,600 PLN

CISA - Certified Information Systems Auditor

The training prepares you for the CISA (Certified Information Systems Auditor) exam, an international certificate of competence in information systems auditing. The program covers all CISA exam domains, combining audit theory with practical workshops and case studies. Classes are taught by experienced auditors using real audit scenarios and industry best practices.

4 days Online / On-site
from 3,500 PLN

Cloud application security - strategies and implementation

Advanced hands-on training exploring the security aspects of applications running in a cloud environment. The program covers a multi-layered approach to securing applications, taking into account the specifics of different cloud models and their characteristic threats. Participants work with real deployment scenarios, learning to identify, analyze and neutralize threats present in cloud environments. Hands-on workshops are conducted on popular cloud platforms, allowing participants to gain experience in implementing security mechanisms in different cloud contexts. The training places special emphasis on the practical aspects of securing cloud applications, taking into account the latest trends and threats.

3 days Online / On-site
from 3,600 PLN

Cloud security seminar

The seminar provides an intensive introduction to current challenges and solutions in the area of cloud security. The program is designed so that participants can learn in one day the most important aspects of securing cloud environments and the latest trends in the field. During the course, we combine expert presentations with interactive discussions and case studies, which allows participants not only to gain knowledge, but also to exchange experiences and best practices. The seminar is led by experienced practitioners who share real-life examples and scenarios from their own professional practice.

1 day Online / On-site
from 1,650 PLN

Communications and crisis management planning in cyberspace

The training provides practical knowledge in planning and executing crisis communications for cyber security incidents. The workshop program focuses on the development of the skills necessary to effectively manage crisis communications, with particular attention to the specifics of cyber threats. Participants will learn proven methodologies and tools to prepare an organization for effective internal and external communications during incidents, as well as techniques for building trust and managing reputation in crisis situations.

1 day Online / On-site
from 1,650 PLN

Compatibility with HiTrust Common Security Framework

The training provides a comprehensive understanding of the requirements and process for achieving compliance with the HiTrust CSF security framework. The program includes a detailed discussion of the framework's structure, assessment methodology and practical aspects of implementing security controls. Classes are conducted in the form of workshops, during which participants learn to interpret HiTrust requirements and translate them into concrete actions in the organization. Special emphasis is placed on the practical aspects of preparing for certification and maintaining compliance.

2 days Online / On-site
from 2,450 PLN

Compliance and compliance risk management

The training provides a detailed introduction to compliance risk management in organizations. The program focuses on the practical aspects of implementing and maintaining compliance management systems through workshops with real-life scenarios. Participants learn risk assessment methodologies and techniques for designing and implementing compliance controls. Classes are conducted in the form of interactive workshops, combining theory with practical case studies.

3 days Online / On-site
from 3,600 PLN

CRISC - Certified IT Risk Management Specialist

The training prepares participants for the CRISC (Certified in Risk and Information Systems Control) exam, an internationally recognized certification in IT risk management. The program includes practical workshops and theoretical lectures, during which participants learn about methodologies for identifying, assessing and controlling risks in information systems. Classes are conducted in the form of interactive workshops using real cases and scenarios.

3 days Online / On-site
from 3,600 PLN

CompTIA Security+ (SY0-701) - exam preparation

Intensive training to prepare for the CompTIA Security+ (SY0-701) exam, covering all areas required for certification. The program combines theory with practical laboratory exercises, exam simulations and case studies. Participants receive training materials, access to an e-learning platform and support in preparing for the exam.

5 days Online / On-site
from 6,350 PLN

CRS: Financial reporting and automatic information exchange

The training provides a thorough knowledge of the CRS (Common Reporting Standard) and the automatic exchange of tax information. The program combines theoretical fundamentals with practical workshops on identifying reportable accounts and preparing reports. Participants will learn about client verification procedures and the principles of information exchange between tax jurisdictions.

2 days Online / On-site
from 2,450 PLN

Cyber security and business process management

This advanced training combines aspects of cyber security with business process management. During an intensive workshop, participants will learn methods for integrating security into an organization's key processes. The program focuses on the practical aspects of building secure business processes with security requirements and operational efficiency in mind.

3 days Online / On-site
from 3,900 PLN

Cyber security and RODO - technical and process requirements

The program is designed to discuss in detail the technical and process requirements related to RODO and cyber security. The training combines legal aspects with practical technical solutions, enabling participants to understand and effectively implement the required safeguards. The classes are conducted in the form of workshops, during which real cases and practical scenarios for implementing the legal requirements are discussed.

2 days Online / On-site
from 3,000 PLN

Cyber Security Body of Knowledge (CyBOK).

An advanced training course that includes a systematic review of all cyber security knowledge according to the CyBOK standard. The program is designed to provide participants with structured theoretical and practical knowledge in all key areas of cyber security. The training combines theoretical lectures with practical workshops, allowing participants not only to understand the concepts, but also to apply them in practice.

5 days Online / On-site
from 6,350 PLN

Cyber security basics

The training provides a thorough introduction to the world of cyber security, combining theory and practice. Participants will learn the fundamental principles of protecting IT systems, gaining knowledge through practical exercises and workshops. The program is designed to provide a solid foundation for further development in IT security. The teaching methodology is based on real cases and scenarios.

4 days Online / On-site
from 3,500 PLN

Cyber security incident response team (CERT)

A one-day training course that prepares you to work in a cyber security incident response team. The program focuses on the practical aspects of detecting, analyzing and handling security incidents. Participants will learn about CERT team working methodologies and tools used in daily practice.

1 day Online / On-site
from 1,650 PLN

Cyber security in practice for beginners

A one-day introductory training course to the world of cyber security, focusing on the practical aspects of protecting against basic threats. The course is conducted in the form of a workshop, where participants will learn about the most common types of attacks and methods of defense against them. The program is designed to convey key information in an accessible way, allowing you to quickly get started with IT security.

1 day Online / On-site
from 1,650 PLN

Cyber security using Python

The training focuses on the practical use of the Python language in the area of cyber security. During the intensive workshop, participants will learn techniques for writing security scripts, security analysis tools and methods for automating cyber security tasks. The classes are conducted in a practical form, where each participant implements solutions independently under the guidance of an expert.

2 days Online / On-site
from 2,450 PLN

Cybercrime in Business

A one-day training dedicated to cybercrime threats in the business environment. The program covers analysis of modern attack methods, fraud techniques, and defense strategies. Participants will learn practical aspects of protecting organizations from cybercriminals through case studies and workshops.

1 day Online / On-site
from 1,650 PLN

Cybersecurity AI - Defense Against ChatGPT, Deepfake and Quantum Computing

Comprehensive training addressing new attack vectors utilizing artificial intelligence and defense strategies using machine learning. The program covers threats from deepfakes to automated vulnerability discovery and quantum-ready security. The training combines threat intelligence with practical defense strategies. The board-focused methodology ensures understanding of AI cybersecurity's business impact.

3 days Online / On-site
from 6,200 PLN

Cybersecurity Mesh Architecture (CSMA): designing and implementing integrated security

Szkolenie wprowadza uczestników w koncepcję Cybersecurity Mesh Architecture jako nowoczesne podejście do zabezpieczeń organizacyjnych. Program obejmuje praktyczne aspekty projektowania i implementacji architektury mesh w różnych środowiskach. Uczestnicy poznają strategie integracji narzędzi bezpieczeństwa oraz budowania spójnych polityk ochronnych. Zajęcia prowadzone są w formie warsztatów z case studies i symulacjami architektonicznymi.

2 days Online / On-site
from 2,450 PLN

Data Governance and Data Quality Management

Specjalistyczne szkolenie z data governance i zarządzania jakością danych, które przygotowuje do budowania zrównoważonych programów zarządzania danymi w organizacji. Program obejmuje frameworki, procesy oraz narzędzia niezbędne do zapewnienia jakości danych, zgodności (compliance) i efektywnego wykorzystania danych. Warsztaty koncentrują się na praktycznej implementacji praktyk data governance i praktycznym doświadczeniu z narzędziami jakości danych. Zajęcia prowadzone są w formie studiów przypadków, warsztatów oceny danych oraz sesji rozwoju ram nadzoru.

3 days Online / On-site
from 3,600 PLN

Dark Web - the hidden web

A one-day training course introducing the Dark Web from an organization's security perspective. Participants will learn about the mechanisms of the hidden web, methods of monitoring threats and techniques to protect against data leaks. The program combines theory with practical examples and case studies.

1 day Online / On-site
from 1,850 PLN

Data Protection Officer

Description

2 days Online / On-site
from 1,900 PLN

Data protection practitioner

A two-day practical training course on data protection in organizations. The program covers both legal and technical aspects of securing information. Participants will learn practical methods for implementing data protection mechanisms and managing processing processes. The training uses workshops and case studies.

2 days Online / On-site
from 2,450 PLN

DevOps Security - creating a security strategy in DevOps

The training focuses on integrating security practices with DevOps processes, showing how to effectively implement security in a continuous integration and delivery (CI/CD) environment. During intensive hands-on workshops, participants will learn tools and methodologies to automate security testing and implement security as code principles. The program is designed for practical application of the knowledge gained in daily work.

1 day Online / On-site
from 1,650 PLN

Data protection

The training presents the current legal requirements for the protection of personal data, with particular emphasis on the changes introduced by the RODO. The program covers both the theoretical basis and practical aspects of the application of data protection regulations. Classes are conducted in the form of lectures and workshops, during which participants will learn the principles of data processing and the obligations of organizations in this regard.

1 day Online / On-site
from 900 PLN

DevSecOps - security in the DevOps cycle

The training introduces participants to the world of security integrated with DevOps practices. The program combines theory with hands-on workshops where participants learn to implement security at every stage of the software development cycle. The class focuses on automating security testing, implementing security policies and integrating security tools into CI/CD pipelines. Special emphasis is placed on the practical aspects of securing DevOps processes.

2 days Online / On-site
from 2,450 PLN

Digital identity in telecommunications

The training delves into the topic of digital identity management in the telecommunications sector. The program covers both technical and regulatory aspects related to user verification and authentication. Participants learn about the latest trends and solutions in secure identity management. Classes are conducted in the form of lectures and practical workshops using real cases from the industry.

3 days Online / On-site
from 3,600 PLN

DORA Lead Implementer (DORA Lead Implementer).

The PECB DORA Lead Implementer training course provides the knowledge and skills needed to effectively implement and manage a digital operational resilience framework, as required by the DORA regulation. The training is designed to provide participants with an understanding of DORA, including its five key pillars: ICT risk management, ICT incident management, digital operational resilience testing, ICT third-party risk management, and information sharing.

5 days Online / On-site
from 6,100 PLN

DORA regulation: ensuring digital operational resilience in the financial sector and for ICT providers

Szkolenie przedstawia praktyczne aspekty implementacji rozporządzenia DORA w instytucjach finansowych i u dostawców usług ICT. Program szczegółowo omawia pięć filarów regulacji oraz konkretne kroki wdrożeniowe. Uczestnicy poznają wymagania dotyczące testowania odporności oraz zarządzania ryzykiem dostawców zewnętrznych. Zajęcia prowadzone są w formie warsztatów z analizą praktycznych przypadków z sektora finansowego.

2 days Online / On-site
from 2,450 PLN

Embedded systems security for testers

Advanced training dedicated to security testers who want to specialize in embedded systems and IoT devices. The program combines theoretical fundamentals with practical aspects of security testing in embedded systems. During the workshop, participants work with real devices, learning to identify vulnerabilities specific to embedded systems and methods to secure them. The training covers both hardware and software aspects, providing a comprehensive approach to embedded systems security.

3 days Online / On-site
from 3,600 PLN

Elements of RODO and information security in human resource management

The training is dedicated to HR managers in organizational units without separate security departments. The program combines theory and practice, focusing on implementing the requirements of RODO and the 27001 series of standards in the daily work of HR. During the hands-on workshop, participants will learn how to implement safeguards in HR procedures and learn how to identify and eliminate potential threats to information security. The classes are conducted in an interactive form using real cases and documents.

2 days Online / On-site
from 1,700 PLN

Ethical hacking and countermeasures

An intensive ethical hacking training course that combines theory with practical security testing workshops. The program is structured so that participants can learn the attacker's perspective to better understand and implement effective defense mechanisms. The workshop is conducted in a secure laboratory environment, where participants can practically practice various system penetration techniques and security methods.

5 days Online / On-site
from 5,050 PLN

Ethical hacker - techniques and tools

Ethical Hacking training introduces participants to the world of IT security testing, focusing on legal and ethical methods of vulnerability detection. The workshop program is designed to help participants understand both the technical aspects of penetration testing and the ethical context of their work. Through hands-on exercises in a controlled environment, participants learn to think like an attacker while maintaining a professional approach to information security. The training develops not only technical skills, but also shapes a responsible attitude toward security testing.

5 days Online / On-site
from 5,000 PLN

FinOps: cost management and financial optimization in the cloud

Specjalistyczne szkolenie z FinOps (Financial Operations), które łączy techniczną ekspertyzę chmurową z zarządzaniem finansowym dla optymalizacji wydatków na chmurę i budowania kultury świadomej kosztów. Program obejmuje framework FinOps, strategie optymalizacji kosztów oraz praktyczne narzędzia do zarządzania kosztami chmury w różnych platformach. Warsztaty obejmują praktyczne doświadczenie z narzędziami analizy kosztów i scenariuszami optymalizacji w rzeczywistych warunkach. Zajęcia prowadzone są w formie praktycznych warsztatów, ćwiczeń optymalizacji kosztów oraz studiów przypadków z udanych implementacji FinOps.

2 days Online / On-site
from 2,500 PLN

Fundamentals of automotive cyber security

The training introduces participants to the world of cyber security for today's vehicles, focusing on specific challenges and solutions in the automotive industry. The program combines theory and practice, allowing participants to understand both the architecture of security systems and methods for testing and protecting them. During the course, participants learn not only the technical aspects of securing automotive systems, but also the regulatory context and industry standards. The practical workshops, which account for 60% of the training time, are based on real cases and scenarios encountered in the automotive industry.

3 days Online / On-site
from 5,250 PLN

Fundamentals of biometrics in forensics

A one-day introductory training course on the application of biometrics in digital forensics. The program covers the basics of biometric systems, methods for analyzing biometric data and their use in digital investigations. The training combines theory with practical workshops and case studies.

1 day Online / On-site
from 1,650 PLN

Fundamentals of cyber security - a practical course

Practical introductory training in the world of cyber security, combining theory with intensive laboratory workshops. The program focuses on the fundamental aspects of protecting systems and networks, presenting participants with real-world threat scenarios and security methods. The training uses modern tools and techniques, allowing participants to gain practical skills in a secure test environment.

2 days Online / On-site
from 2,450 PLN

Fundamentals of governance, risk and compliance (GRC)

Fundamental Training in Governance, Risk and Compliance (GRC) introduces participants to a holistic approach to integrated organizational management. The workshop program focuses on the practical aspects of implementing the GRC framework, combining theory with real-world implementation examples. Participants will learn methods for building an effective management system that balances business objectives with regulatory requirements and risk control. The training uses interactive workshops and case studies to impart practical knowledge.

3 days Online / On-site
from 3,900 PLN

Fundamentals of information systems security

The training provides fundamental knowledge of IT systems security. The program combines theory with practical workshops, during which participants learn key aspects of securing IT infrastructure. Classes are conducted in the form of interactive workshops using real-world examples and scenarios. Participants work on prepared test environments where they can safely practice the techniques they learn.

3 days Online / On-site
from 3,600 PLN

GDPR - Certified Information Privacy Professional and Manager prep course.

This course is designed to provide the Data Protection Officer with the full range of competencies to ensure an organization's compliance with the RODO.

4 days Online / On-site
from 17,500 PLN

GDPR - Certified Information Privacy Manager

The training prepares you to earn the Certified Information Privacy Manager (CIPM) certification - the world's first and only certification for managing privacy programs. The program was developed by the International Association of Privacy Professionals (IAPP) and is accredited to ISO 17024:2012. During the training, participants gain the practical knowledge necessary to implement and manage data protection programs in an organization, with a focus on GDPR requirements. The course includes course materials, an exam voucher and a one-year membership to IAPP.

2 days Online / On-site
from 3,000 PLN

Hazard modeling and risk analysis based on STRIDE and qualitative risk analysis

The training course Threat Modeling and Risk Analysis Based on STRIDE and Qualitative Risk Analysis is an intensive one-day course designed for IT and cyber security professionals. Participants will explore advanced techniques for identifying potential threats in IT systems and learn how to effectively assess the associated risks.

1 day Online / On-site
from 1,500 PLN

GDPR - Certified Information Privacy Professional/Europe (CIPP/EU).

The one-day training course covers pan-European and national data protection regulations, basic data protection terminology, and practical concepts on data protection and cross-border data flows. The program is based on official International Association of Privacy Professionals (IAPP) materials and prepares you for the CIPP/E exam. The training combines theory with practical exercises, including solving sample exam questions.

1 day Online / On-site
from 2,200 PLN

HashiCorp Vault - managing secrets

The training provides a hands-on introduction to HashiCorp Vault, focusing on secure secret management in production environments. Participants will learn about system architecture, integration methods and best practices for securing sensitive data. Hands-on workshops allow participants to gain experience in configuring and managing the Vault system. The class combines theory with intensive lab exercises.

2 days Online / On-site
from 2,450 PLN

How to write secure code - practical techniques

Intensive hands-on training that guides participants through advanced techniques for developing secure code in a variety of programming languages and environments. The program offers an in-depth understanding of vulnerability mechanisms and practical methods for addressing them. The workshop consists of 80% hands-on exercises, where participants implement security features in a controlled environment, learning from real-world examples. The training uses the methodology of learning by doing, where each concept is immediately verified through practical application. Classes are conducted in small groups, allowing individual attention to the needs of each participant.

5 days Online / On-site
from 5,050 PLN

How to implement an Information Security Management System?

The training equips participants with the necessary knowledge and skills to effectively manage information security in an organization. The program is based on the international standards of the ISO/IEC 2700X series, combining theory and practice through intensive workshops and case studies. Classes are taught by industry experts who present a systematic approach to information security, taking into account key aspects such as data protection, intellectual property or compliance with the National Interoperability Framework.

4 days Online / On-site
from 3,800 PLN

IBM Qradar SIEM: from basics to advanced techniques

The training focuses on the practical use of the IBM QRadar SIEM platform for monitoring IT infrastructure security. The program combines theory with intensive hands-on workshops where participants learn how to configure, administer and analyze security events. Classes are conducted in the form of hands-on labs using real security scenarios.

2 days Online / On-site
from 2,450 PLN

IBM Security zSecure RACF and SMF Auditing

This course describes the audit problems reported by IBM® Security zSecure™ Audit. The course explains auditing the RACF® database and z/OS subsystems such as CICS, IMS and DB2. You can measure your security and z/OS settings against the security requirements of your chosen policy level. You will also learn about the Access Monitor dataset containing historical statistics of RACF access decisions. This information is used to find profiles, permissions or connections that are unused and can be removed from the RACF database. In addition, you will learn how to review general SMF and RACF audit settings. This course explains how to use and interpret predefined SMF reports and how to create custom SMF reports. Finally, the functions of analyzing library status and changes and the sequential data set are explained.

2 days Online / On-site
from 5,000 PLN

IBM Security zSecure RACF Management Workshop

In this workshop, you will learn how to maintain a Resource Access Control Facility (RACF®) database using IBM® Security zSecure Admin and monitor the system using IBM Security zSecure Audit. During the hands-on exercises, you will be a RACF security administrator at a fictional company. In this simulated professional role, you will learn to define the RACF security environment for a specific department.

2 days Online / On-site
from 5,000 PLN

Identification and escalation of security incidents of the ICT environment

Led by an expert in computer forensics and post-intrusion analysis, the training combines theory with practical live demonstrations. The program covers threat identification, attack techniques and security incident response methods. The class is conducted in an interactive format with demonstrations of actual hacking attacks and detection methods, allowing participants to see the threats and ways to protect themselves in practice.

2 days Online / On-site
from 3,900 PLN

Identity and access management (IAM)

The training delves into the world of identity and access management in modern organizations. The program combines theory and practice, presenting both fundamental concepts and advanced strategies for implementing IAM systems. Classes are taught through hands-on workshops where participants work with real identity management systems, learning how to design and implement access policies. Special emphasis is placed on security and regulatory compliance aspects in the context of digital identity management.

2 days Online / On-site
from 4,200 PLN

Identity and access management with Okta

The training focuses on advanced aspects of identity and access management in an Okta environment. Participants will learn practical methods for implementing and managing IAM solutions, with a focus on security and compliance aspects. The program is delivered in the form of hands-on workshops, during which participants work on real use cases. The classes combine theory with intensive practice, enabling participants to acquire the skills necessary to effectively manage identity in an organization.

2 days Online / On-site
from 2,450 PLN

Identity and Access Management with OpenAM

The training provides practical knowledge in implementing and managing access control systems using the OpenAM platform. The program includes both theoretical aspects and intensive hands-on workshops with system configuration and administration. Participants will learn advanced digital identity management techniques and best practices in access security. The training methodology is based on a practical approach to solving real-world IAM problems.

2 days Online / On-site
from 2,450 PLN

Impact of RODO on the activities of the local government unit

The training course details the practical aspects of implementing and applying RODO regulations in local government units. The program includes an analysis of legal requirements and practical tips for protecting personal data in the daily work of the office. Classes are conducted in the form of workshops using real cases and situations occurring in local government administration. Participants will learn both theoretical and practical aspects of personal data protection in the context of the specifics of local government operations.

1 day Online / On-site
from 900 PLN

Information Security Policy

The training focuses on the practical aspects of developing an Information Security Policy in accordance with ISO/IEC 27001. The program covers a holistic approach to information security management, from identifying risks to creating documentation. Classes are conducted in the form of workshops using real-life examples and cases. Participants gain the qualifications necessary to be an Information Security Manager in their organization.

2 days Online / On-site
from 1,700 PLN

Information Security Management System Auditor

The training provides a systemic approach to information security in the context of personal data protection, intellectual property and the National Interoperability Framework. The program covers the design, implementation and auditing of an Information Security Management System according to the requirements of ISO/IEC 27001:2013 and related standards. The course combines theory with practice through workshops and exercises, preparing participants for the role of an ISMS Auditor authorized to conduct external audits.

5 days Online / On-site
from 4,200 PLN

Interactive Application Security Testing (IAST)

Specialized training on Interactive Application Security Testing (IAST), which combines dynamic analysis with application runtime monitoring. The program focuses on the practical use of IAST tools in the software development process. The workshop covers test environment configuration, test implementation and interpretation of results. Participants work on real applications, learning how to effectively use IAST in their daily work.

2 days Online / On-site
from 2,450 PLN

Internal Auditor of the Information Security Management System.

An intensive course that prepares you for the role of an ISMS internal auditor, based on the international standards of the ISO/IEC 2700X series. The program combines managerial and technical aspects of information security, focusing on practical skills for implementing and auditing the system. The training is conducted by expert practitioners who share real cases and experiences. Participants work on specific examples, analyze documentation and practice conducting organizational and technical security audits.

3 days Online / On-site
from 2,200 PLN

Internet Application Security

The training focuses on practical aspects of securing internet applications against modern threats. The program includes workshops on security testing, source code analysis, and implementation of security mechanisms. Classes are conducted in hands-on lab format using real examples of vulnerabilities and attacks.

2 days Online / On-site
from 2,450 PLN

Introduction to cryptography

Fundamental training in the basics of cryptography, which combines mathematical theory with practical application in securing information systems. Participants will learn both classical and modern cryptographic algorithms, learning their implementation and application in real scenarios. The program includes practical workshops using popular cryptographic libraries and use case analysis.

3 days Online / On-site
from 3,600 PLN

Introduction to digital investigations

A two-day introductory training course in digital forensic investigation methodology. The program covers the basics of forensic analysis, techniques for securing digital evidence and methods of analyzing it. Participants gain practical skills through workshops and analysis of real cases.

2 days Online / On-site
from 2,450 PLN

Introduction to ISO 27001 - the basics of the standard

The training introduces participants to the world of the ISO 27001 information security management system. The program includes a presentation of the standard's key requirements and practical aspects of their implementation in the organization. The classes combine lectures with workshops, during which participants learn the structure of the standard and how to interpret its requirements. The training is conducted based on practical examples and case studies.

1 day Online / On-site
from 1,650 PLN

Introduction to Open Source Cyber Intelligence

The training introduces participants to the world of Open Source Intelligence (OSINT) from a cyber security perspective. Participants learn methodologies for collecting and analyzing information from open sources, data verification techniques and tools to support the intelligence process. The program is delivered in the form of practical workshops, during which participants learn how to effectively use publicly available information in the context of organizational security. The classes combine theory and practice, enabling the acquisition of basic cyber intelligence skills.

1 day Online / On-site
from 1,650 PLN

Investigative analysis of web and mobile applications

The training focuses on advanced forensic analysis techniques for web and mobile applications, guiding participants through the process of detecting and analyzing security incidents. The program combines the theoretical foundations of computer forensics with practical techniques for examining applications for security breaches. Participants work on real cases, learning a methodical approach to collecting and analyzing digital evidence. The classes are implemented in the form of practical workshops, where each participant conducts independent investigations under the guidance of an expert.

3 days Online / On-site
from 3,600 PLN

Investigative audit

Intensive training in investigative auditing combining theory and practice through workshops and exercises. The program covers the methodology of conducting an investigative audit, techniques for protecting an organization from fraud and modern tools of investigative analysis. Classes are conducted in small groups (10-20 people), which ensures high efficiency of practical workshops and situational scenes. Participants work on real cases, learning how to write audit programs, reports and investigative documentation.

4 days Online / On-site
from 6,000 PLN

ISO 21502 Lead Project Manager (ISO 21502 Lead Project Manager).

ISO 21502 Lead Project Manager training allows you to develop the knowledge necessary to implement, manage and maintain a project management process based on ISO 21502. During this training, you will gain an in-depth understanding of project management best practices and learn how to apply integrated project management practices to successfully lead projects.

5 days Online / On-site
from 6,500 PLN

ISO 22301 Lead Auditor (ISO 22301 Lead Auditor).

ISO 22301 Lead Auditor training allows you to develop the knowledge necessary to conduct Business Continuity Management System (BCMS) audits by applying widely recognized auditing principles, procedures and techniques. During this training course, you will gain in-depth knowledge and skills in planning and conducting internal and external audits in accordance with the ISO 19011 and ISO/IEC 17021-1 standards certification process. Through hands-on exercises, you will be able to master audit techniques and gain the competence to manage the audit program, audit team, customer communication and conflict resolution.

5 days Online / On-site
from 6,500 PLN

ISO 22301 Lead Implementer (ISO 22301 Lead Implementer)

ISO 22301 Lead Implementer training allows you to develop the knowledge necessary to support your organization in establishing, implementing, managing, monitoring and maintaining a Business Continuity Management System (BCS) based on ISO 22301. During this training, you will also gain an in-depth understanding of Business Continuity Management Systems best practices to ensure that your organization is prepared to respond to and overcome disruptions. Once you have mastered all the necessary Business Continuity Management Systems concepts, you can take the exam and apply for the PECB Certified ISO 22301 Lead Implementer certification.

5 days Online / On-site
from 5,500 PLN

ISO 22320 Lead Emergency Manager (ISO 22320 Lead Emergency Manager).

ISO 22320 Lead Emergency Manager training allows you to develop the knowledge necessary to implement, manage and maintain an emergency management process based on ISO 22320. During this training you will also gain an in-depth understanding of emergency management best practices and learn how to effectively coordinate emergency response.

5 days Online / On-site
from 6,000 PLN

ISO 26262 Part 6: Secure software development

The training focuses on the practical aspects of implementing the ISO 26262 requirements for developing secure software for the automotive industry. The program covers design, implementation and testing methodologies in line with functional safety requirements. Classes are conducted in a workshop format using case studies and practical examples from the automotive industry.

1 day Online / On-site
from 1,850 PLN

ISO 27001:2022 Data Protection Officer

The training prepares participants to perform the role of Data Protection Officer in an organization in accordance with the requirements of ISO 27001:2022. The program combines theory with practical workshops, during which participants will learn about the duties and responsibilities of the DPO and methods of effective data protection management. Classes are conducted in the form of interactive workshops using real cases and scenarios from the IOD's practice.

2 days Online / On-site
from 2,450 PLN

ISO 28000 Lead Implementer (ISO 28000 Lead Implementer)

ISO 28000 Lead Implementer training allows you to develop the knowledge necessary to support your organization in establishing, implementing, managing and maintaining a Supply Chain Security Management System (SCMS) based on ISO 28000. During this training, you will gain an in-depth understanding of SCMS best practices and learn how to manage and mitigate security risks in the supply chain. Once you have mastered all the necessary SCMS concepts, you can take the exam and apply for the PECB Certified ISO 28000 Lead Implementer certification.

5 days Online / On-site
from 6,400 PLN

ISO 26262 - automotive functional safety

The training provides in-depth knowledge of the ISO 26262 standard, focusing on the practical aspects of ensuring functional safety in automotive systems. The program combines theory with practical workshops, during which participants learn to apply risk analysis and safety system design methodologies. Special emphasis is placed on the practical application of the standard's requirements in the automotive product development process.

4 days Online / On-site
from 6,050 PLN

ISO/IEC 20000 Lead Auditor (ISO/IEC 20000 Lead Auditor).

ISO/IEC 20000 Lead Auditor training allows you to develop the knowledge necessary to conduct IT Service Management System (ITSMS) audits by applying widely recognized auditing principles, procedures and techniques. During this training you will gain in-depth knowledge and skills in planning and conducting internal and external audits in accordance with the ISO 19011 and ISO/IEC 17021-1 certification process.

5 days Online / On-site
from 6,500 PLN

ISO/IEC 20000 Lead Implementer (ISO/IEC 20000 Lead Implementer).

ISO/IEC 20000 Lead Implementer training allows you to develop the knowledge necessary to support your organization in establishing, implementing, managing and maintaining an IT Service Management System (ITSMS) based on the ISO/IEC 20000-1 standard. During this training, you will also gain an in-depth understanding of IT Service Management System best practices and learn how to align your organizations IT services with its business objectives. Once you have mastered all the necessary ITSMS concepts, you can take the exam and apply for the PECB Certified ISO/IEC 20000 Lead Implementer' certification.

5 days Online / On-site
from 6,000 PLN

ISO/IEC 27001 Lead Implementer (ISO/IEC 27001 Lead Implementer)

ISO/IEC 27001 Lead Implementer training allows you to develop the knowledge necessary to support your organization in establishing, implementing, managing, monitoring and maintaining an Information Security Management System (ISMS) in accordance with ISO/IEC 27001. During this training, you will also gain an in-depth understanding of the best practices of Information Security Management Systems to secure your organizations sensitive information and improve overall efficiency and effectiveness. Once you have mastered all the necessary concepts of Information Security Management Systems, you can take the exam and apply for the PECB Certified ISO/IEC 27001 Lead Implementer' certification.

5 days Online / On-site
from 6,400 PLN

ISO/IEC 27001 Lead Auditor (ISO/IEC 27001 Lead Auditor).

ISO/IEC 27001 Lead Auditor training allows you to develop the knowledge necessary to conduct Information Security Management System (ISMS) audits by applying widely recognized auditing principles, procedures and techniques. During this training course, you will gain in-depth knowledge and skills in planning and conducting internal and external audits in accordance with the ISO 19011 and ISO/IEC 17021-1 certification process. Through hands-on exercises, you will be able to master audit techniques and become competent to manage the audit program, audit team, customer communication and conflict resolution.

5 days Online / On-site
from 6,500 PLN

ISO/IEC 27002 Lead Manager (ISO/IEC 27002 Lead Manager)

The ISO/IEC 27002 ISO/IEC 20000 Lead Auditor (ISO/IEC 20000 Lead Auditor) Lead Manager training course allows you to gain expert knowledge of best practices and guidelines for implementing information security safeguards in accordance with ISO/IEC 27002. During this training, you will gain an in-depth understanding of information security safeguards based on their structure and purpose, and learn how to effectively implement and manage them to protect your organization's information.

5 days Online / On-site
from 6,500 PLN

ISO/IEC 27005 Lead Information Security Risk Manager (ISO/IEC 27005 Lead Risk Manager).

ISO/IEC 27005 Lead Risk Manager training develops the competency to master the information security risk management process based on ISO/IEC 27005. This training provides an in-depth understanding of the principles, framework, process and techniques of information security risk management. During this training, you will learn how to identify, assess, analyze, evaluate and treat risks in information security, as well as how to use the risk management process to support an Information Security Management System (ISMS).

3 days Online / On-site
from 6,500 PLN

ISO/IEC 27701 Lead Implementer (ISO/IEC 27701 Lead Implementer).

ISO/IEC 27701 Lead Implementer training allows you to develop the knowledge necessary to support your organization in establishing, implementing, managing, monitoring and maintaining a Privacy Information Management System (PIMS) based on the requirements of ISO/IEC 27701 and the guidelines of ISO/IEC 27552. During this training, you will also gain an in-depth understanding of PIMS best practices and learn how to manage and process data to ensure privacy and compliance with various data protection regimes. Once you have mastered all the necessary concepts of Privacy Information Management Systems, you can take the exam and apply for the PECB Certified ISO/IEC 27701 Lead Implementer certification.

5 days Online / On-site
from 6,200 PLN

JWT - Secure Authentication

The training focuses on the practical aspects of implementing and securing authorization mechanisms based on JWT tokens (JSON Web Tokens). During the intensive workshop, participants will learn both the theoretical basics and practical applications of JWT tokens in modern web applications. The classes are conducted in the form of interactive workshops, where theory is immediately verified in practice through the implementation of specific use cases. Participants will gain the skills necessary to design, implement and audit JWT-based authorization systems.

1 day Online / On-site
from 1,850 PLN

IT security for practitioners

This intensive hands-on training covers a holistic approach to IT security in an enterprise environment. Participants are taken through all key aspects of cyber security, from the basics to advanced techniques for protecting systems and networks. The program is delivered in the form of workshops with real-life scenarios, where theory is immediately translated into practice. Classes are conducted in small groups, allowing each participant to receive individual attention and adjust the pace of learning to their needs.

18 days Online / On-site
from 18,450 PLN

Kali Linux - advanced penetration testing

Advanced penetration testing training focuses on complex techniques for testing the security of IT systems using Kali Linux. The program includes hands-on workshops on advanced penetration methods, creating custom tools and automating testing processes. Participants work on real scenarios, learning a comprehensive approach to security testing.

3 days Online / On-site
from 3,900 PLN

Kali Linux - penetration testing intermediate level

The training provides practical knowledge of performing penetration testing using the Kali Linux distribution. The program focuses on the practical aspects of testing the security of systems and networks. Participants, through workshops and lab exercises, learn to identify and exploit security vulnerabilities and create professional test reports.

2 days Online / On-site
from 2,450 PLN

Java and web application security

The three-day training combines aspects of Java security with web application security. Participants will learn advanced application security techniques through hands-on workshops and real-world case studies. The program focuses on identifying vulnerabilities and implementing effective protection mechanisms in Java and web applications.

3 days Online / On-site
from 3,600 PLN

Lead Cybersecurity Manager.

The Lead Cybersecurity Manager training course allows you to develop expertise in establishing, implementing, maintaining and continuously improving a Cyber Security program based on ISO/IEC 27032 and the NIST Cyber Security Framework. During this training, you will gain an understanding of cyber security and how it relates to other types of IT security. You will also understand the relationship between cyber security and organizational security and learn how to implement a cyber security program that is consistent with best practices and frameworks.

5 days Online / On-site
from 6,500 PLN

Lead Digital Forensics Examiner.

Lead Digital Forensics Examiner training allows you to develop the knowledge and skills necessary to conduct digital forensics investigations. During this training, you will gain an in-depth understanding of digital incident investigation processes and techniques, including collecting, securing, analyzing and presenting digital evidence. You will learn how to apply best practices and specialized tools to investigate different types of devices and systems to uncover the causes of incidents and support investigations.

5 days Online / On-site
from 6,400 PLN

Machine Identity Management: the key to security in the era of automation and the cloud

Szkolenie wprowadza uczestników w specjalistyczny obszar zarządzania tożsamościami maszyn jako kluczowy element współczesnego cyberbezpieczeństwa. Program obejmuje pełny lifecycle tożsamości maszyn od wystawienia po rotację i unieważnienie. Uczestnicy poznają najlepsze praktyki, narzędzia oraz strategie automatyzacji procesów MIM. Zajęcia prowadzone są w formie warsztatów z praktycznymi ćwiczeniami na rzeczywistych scenariuszach.

2 days Online / On-site
from 2,450 PLN

Managing cyber security risks in the supply chain

Intensive training focusing on identifying and managing cyber security risks in the context of the supply chain. Participants will learn risk assessment methodologies, ways to minimize risks, and techniques for monitoring the security of business partners. The program combines theory with practical workshops, using real cases and threat scenarios.

1 day Online / On-site
from 1,850 PLN

Microsoft SDL Core - the basics of a secure development cycle

The training focuses on the practical implementation of the Microsoft Security Development Lifecycle (SDL) methodology in the software development process. The program combines theoretical lectures with practical workshops, during which participants learn key security practices in the software development lifecycle. The training places special emphasis on threat identification, security implementation and security testing at various stages of application development.

2 days Online / On-site
from 2,450 PLN

Modeling effective cybersecurity processes

The advanced training focuses on modeling and optimizing cyber security processes in organizations. The program includes hands-on workshops using the latest methodologies and tools to design effective security procedures. Participants will learn to identify, analyze and improve security processes using proven industry practices.

3 days Online / On-site
from 3,900 PLN

Modeling processes related to RODO

Practical training in modeling and optimizing data protection processes in accordance with RODO requirements. The program focuses on creating effective procedures and documentation, taking into account the specifics of different organizations. Participants work on real-life examples, learning to identify and map personal data processing processes.

3 days Online / On-site
from 3,600 PLN

Nessus Manager - advanced vulnerability scanning

The training provides advanced knowledge on how to use Nessus Manager to perform professional security audits. The program focuses on the practical aspects of configuring, optimizing and managing vulnerability scans in enterprise environments. Participants learn through workshops how to effectively use the tool's advanced features and how to interpret and analyze scan results in the context of organizational security.

4 days Online / On-site
from 4,500 PLN

Network penetration tests

The training provides a hands-on approach to performing penetration testing on computer networks. Participants work in a laboratory environment where they learn techniques for detecting and exploiting system vulnerabilities. The program combines theory with intensive hands-on workshops where trainees conduct actual security tests. The training focuses on a methodical approach to security testing.

5 days Online / On-site
from 5,050 PLN

Network security administrator - advanced course

The training provides the advanced knowledge and skills necessary to perform the role of an expert-level network security administrator. The program combines in-depth theoretical analysis with intensive hands-on workshops where participants work with real threat scenarios and implement advanced security solutions. Particular emphasis is placed on the development of analytical skills and the ability to make strategic decisions regarding network infrastructure security.

5 days Online / On-site
from 6,350 PLN

Network security on Linux systems

The training provides specialized knowledge in network security in Linux environments. The program combines theoretical foundations with intensive hands-on workshops where participants learn to implement, configure and monitor network security mechanisms. Special attention is paid to the practical aspects of protecting network infrastructure and detecting and countering threats in Linux systems.

2 days Online / On-site
from 2,450 PLN

Network and communication security - an advanced approach

Advanced technical training focusing on a comprehensive approach to network and communications security in modern IT environments. The program guides participants through the complex aspects of securing a network infrastructure, from the physical to the application layer. Hands-on workshops allow participants to work with professional network security tools and techniques in a controlled lab environment. The training uses real-life scenarios and cases, allowing participants to understand the practical aspects of implementing network security. Special emphasis is placed on a holistic approach to security, taking into account both technical and operational aspects.

3 days Online / On-site
from 3,600 PLN

NIS 2 Directive Lead Implementer.

The PECB NIS 2 Directive Lead Implementer training course provides the knowledge and skills necessary to implement and manage a cyber security program based on the NIS 2 Directive guidelines. The training is designed to provide an in-depth understanding of the NIS 2 Directive and its requirements, as well as practical guidance on implementing cyber security measures that are effective and compliant with the Directive.

5 days Online / On-site
from 6,200 PLN

NIS2 - Technical and Administrative Requirements

The program has been developed to provide detailed knowledge of the technical and administrative requirements of the NIS2 Directive (Network and Information Security 2). The training covers legal aspects and practical methods of implementing required security measures in the context of European and national regulations. The classes combine theory with practical examples of implementing directive requirements, with particular emphasis on ISO 27001:2022 standards.

2 days Online / On-site
from 3,000 PLN

NIS2/KSC for executives: legal liability, risk management and cyber security strategy

The training is designed to prepare executives for their new legal responsibilities under the NIS2 Directive and amendments to the NSC Law. Delivered through interactive workshops and crisis simulations, the program focuses on legal responsibility, strategic cyber risk management and making informed investment decisions. Participants will gain the skills necessary to oversee security policies and effectively lead organizations in the face of cyber threats. Class methodology emphasizes case study analysis and practical decision-making exercises.

2 days Online / On-site
from 3,000 PLN

OpenVAS - open source vulnerability scanning

The training focuses on the practical use of OpenVAS for professional security testing and vulnerability scanning. The program covers both environment configuration and advanced scanning techniques and analysis of results. The class is conducted in the form of a workshop, where participants work on real-world examples, learning to identify and assess vulnerabilities in various systems. The training methodology emphasizes the practical aspects of using the tool in the daily work of a security specialist.

2 days Online / On-site
from 2,450 PLN

Open Authentication (OAuth) - implementation of secure authentication

The training provides a practical approach to implementing OAuth mechanisms in applications. Participants will learn the details of the OAuth protocol and best practices for its implementation through an intensive hands-on workshop. The program focuses on real implementation scenarios, with an emphasis on security and performance aspects. The classes are conducted in a workshop format, where theory is immediately verified through practical exercises.

1 day Online / On-site
from 1,850 PLN

Node.JS and web application security

Specialized training focusing on security aspects of Node.js applications. The program covers both the theoretical basics of securing applications and practical workshops on implementing protection mechanisms. Participants learn to identify potential threats, apply security best practices and implement effective security features in Node.js applications. The workshop is conducted based on real use cases and current threats.

3 days Online / On-site
from 3,600 PLN

Operational security in the cloud

The training provides a deep understanding of operational security aspects in cloud environments. The program is designed so that participants can learn not only the theoretical basics, but more importantly the practical aspects of securing and monitoring cloud infrastructure. During the workshop, participants learn to identify threats, design controls and implement operational security processes tailored to the specifics of cloud environments. The classes are conducted in the form of interactive workshops, where theory is immediately verified in practice through the implementation of real scenarios for securing cloud environments.

2 days Online / On-site
from 2,450 PLN

OWASP - comprehensive security testing of web applications

Advanced training covering the full range of web application security testing according to the OWASP Testing Guide methodology. The program focuses on practical application of testing techniques, vulnerability identification and methods for securing web applications. The workshop is implemented in the form of intensive hands-on classes, where participants work on real applications and test scenarios. The training methodology is based on a comprehensive approach to security testing, combining various techniques and tools.

3 days Online / On-site
from 3,900 PLN

OWASP - mobile application security testing

Specialized training on methods of testing mobile application security in accordance with the OWASP Mobile Security Testing Guide. The program covers practical aspects of identifying and eliminating security threats specific to the mobile environment. The workshop is conducted in the form of practical classes, during which participants conduct security tests on real mobile applications. The training methodology is based on active participation in the process of detecting and analyzing security vulnerabilities.

3 days Online / On-site
from 3,900 PLN

Panorama of secure coding - trends and best practices

Advanced theoretical and practical training presenting a holistic view of contemporary secure software development practices. The program integrates the latest trends in secure coding with practical techniques for implementing security in various software development environments. The workshop is conducted in an interactive format, where theory is immediately validated through practical exercises on real code examples. Participants learn not only the programming techniques themselves, but also the context of their application and the impact on overall application security. The training places special emphasis on understanding the causes of vulnerabilities and how to eliminate them already at the stage of writing code.

2 days Online / On-site
from 2,450 PLN

Penetration testing - detecting and exploiting vulnerabilities

The training provides a practical approach to penetration testing, focusing on methodologies for detecting and exploiting vulnerabilities in information systems. The program guides participants through the entire security testing process, from planning and reconnaissance, to vulnerability identification, to reporting and remediation recommendations. Hands-on workshops allow participants to gain experience in using professional pentesting tools and techniques.

4 days Online / On-site
from 3,500 PLN

Penetration testing of 5G networks - a professional approach

The training provides an in-depth understanding of the 5G network security testing process, covering both theoretical fundamentals and practical techniques for conducting penetration testing. The program focuses on specific security aspects of 5G architecture, methods for identifying vulnerabilities and techniques for exploiting and securing them. Classes are conducted in the form of intensive hands-on workshops, where participants work on specially prepared test environments that reflect real-world threat scenarios.

5 days Online / On-site
from 5,050 PLN

PCI-DSS Practitioner

A two-day practical training course on the implementation of the Payment Card Industry Data Security Standard (PCI DSS). Participants will learn the requirements of the standard and practical methods of implementation. The program includes workshops and case studies, focusing on the practical aspects of PCI DSS compliance.

2 days Online / On-site
from 2,450 PLN

OWASP Top 10 key application security threats

The training focuses on the top ten application security threats according to the OWASP Top 10 standard. Participants learn the mechanisms of each threat and practical methods to protect against them. The program is implemented through a combination of theory and intensive practical workshops, where participants learn to identify and eliminate vulnerabilities in real applications. The classes are based on actual security breaches.

2 days Online / On-site
from 2,450 PLN

Penetration testing using Nmap

The training focuses on the practical use of the Nmap tool in penetration testing and security audits. Participants will learn advanced network scanning and analysis techniques using this versatile tool. The program is implemented in the form of practical workshops, where theory is immediately verified in the laboratory. Students work on specially prepared test environments, learning to identify and analyze vulnerabilities in network infrastructure.

2 days Online / On-site
from 2,450 PLN

Penetration testing using Python and Kali Linux

A hands-on training course combining Python programming skills with security testing of information systems. Participants will learn techniques for creating their own penetration testing tools and learn how to use existing Python libraries in the Kali Linux environment. The training is in a workshop format, where theory is immediately translated into practice in a secure lab environment.

2 days Online / On-site
from 2,450 PLN

Personal Data Protection in Practice - RODO

The training provides a comprehensive knowledge of personal data protection and the practical aspects of implementing RODO in an organization. The program combines elements of theoretical lectures with intensive practical workshops, during which participants will gain the skills necessary to effectively manage personal data processing processes. Classes are conducted with the use of the case study method and interactive group exercises, which allows for effective assimilation of knowledge and its application in everyday work.

1 day Online / On-site
from 1,300 PLN

PKI: Implementation and management

Advanced Public Key Infrastructure (PKI) training focusing on the practical aspects of implementing and managing PKI systems in an enterprise environment. The program covers architecture design, implementation of certificate services and certificate lifecycle management. The workshop is conducted in the form of practical exercises on real use cases, with emphasis on security and regulatory compliance aspects.

3 days Online / On-site
from 3,600 PLN

Practical about RODO - data protection reform in healthcare

Description

1 day Online / On-site
from 900 PLN

Personal data protection under the RODO

The training takes the form of a practical workshop focusing on imparting basic theoretical knowledge and practical skills on the Personal Data Protection Regulation. The program combines theory and practice, focusing on real situations and challenges related to the implementation of the RODO. Classes are conducted using examples and exercises that allow participants to understand the practical aspects of applying the regulations.

1 day Online / On-site
from 900 PLN

Practical about RODO/GDPR - EU data protection reform

The training presents practical aspects of implementing and applying the RODO/GDPR regulations in the daily operations of an organization. The program focuses on practical solutions and examples of implementation of the regulation's requirements. The classes are conducted in the form of workshops, during which participants learn about specific cases and solutions used in various organizations. Special emphasis is placed on the practical application of the regulations and building effective data protection mechanisms.

1 day Online / On-site
from 900 PLN

Protection of Sensitive and Business Data for Board Members and TOP Managers

Online training dedicated to board members and high-level executives, focusing on building awareness of sensitive and business data protection. The program covers the most important legal aspects and practical solutions for managing data processing risks. The training is delivered in the form of an interactive online workshop with elements of lectures and case analysis to ensure effective assimilation of key data protection issues in the context of management responsibility.

1 day Online / On-site
from 1,500 PLN

Refresher program for compliance officers and MLROs

The refresher program for Money Laundering Reporting Officers (MLROs) and compliance officers focuses on updating their knowledge of the latest AML regulations and trends. The one-day workshop includes an overview of regulatory changes, new threats and evolving industry best practices. Participants are provided with the up-to-date knowledge needed to effectively carry out their MLRO responsibilities.

1 day Online / On-site
from 1,850 PLN

Risk management in information security

The training focuses on the practical aspects of risk management in information security in accordance with the requirements of international standards ISO/IEC 27005, 27001 and 27002. The program combines theoretical foundations with practical workshops, during which participants will learn methods of risk estimation and IT tools for risk analysis. The classes are conducted in the form of interactive workshops, where theory is interspersed with practical exercises and case analysis.

3 days Online / On-site
from 2,700 PLN

Safety by design

A one-day training course focusing on the Security by Design methodology in system and application development. Participants will learn practical techniques for implementing security at the design stage. The program combines theory with practice, using real-world examples and design workshops.

1 day Online / On-site
from 1,850 PLN

SC-200T00: Microsoft Security Operations Analyst

This official Microsoft training prepares participants for the SC-200 certification exam. The course covers threat investigation and response using Microsoft Sentinel, Microsoft Defender for Cloud, and Microsoft 365 Defender. Participants will learn to configure security tools, investigate threats, and respond to incidents in Microsoft environments.

4 days Online / On-site
from 3,800 PLN

Secure development and testing of web applications

Advanced hands-on training that integrates the web application development process with secure software development methodologies. The program guides participants through the full application lifecycle, from architecture design to production deployment, with a focus on security aspects at each stage. The hands-on workshops allow participants to gain experience in implementing security features and verifying them through testing. The classes use real project scenarios, allowing practical application of the concepts learned in a controlled laboratory environment.

3 days Online / On-site
from 3,600 PLN

Secure .NET programming

Advanced training focusing on aspects of secure software development in .NET, with particular emphasis on OWASP standards. The program covers practical aspects of security implementation, vulnerability identification and application protection techniques. The workshop is conducted in the form of intensive practical classes, where participants work on real cases of security breaches. The training methodology combines theory with immediate application of knowledge in practice.

3 days Online / On-site
from 3,600 PLN

Secure Java programming (with OWASP)

The training provides an in-depth understanding of the principles of secure Java programming in accordance with OWASP guidelines. The workshop program combines theoretical fundamentals of application security with intensive hands-on exercises on real-world threat examples. Participants learn how to identify, prevent and fix common security vulnerabilities using OWASP recommended best practices and implementing security mechanisms in Java applications.

3 days Online / On-site
from 3,600 PLN

RODO (GDPR) and business process management (BPM).

Specialized training that combines the requirements of RODO with the practice of business process management. The course focuses on the design and alignment of business processes with data protection requirements. Participants will learn the practical aspects of implementing RODO compliance in the context of BPM and will learn how to identify and secure processes that process personal data.

3 days Online / On-site
from 4,450 PLN

Secure programming in PHP

This hands-on training focuses on methods of implementing security in PHP applications. Participants will learn about the most common security threats and how to protect against them. The program combines theory with intensive hands-on workshops where participants learn to identify and fix security vulnerabilities. Classes are conducted in a workshop format using real-world examples of threats.

3 days Online / On-site
from 3,600 PLN

Securing email with ProtonMail

The training provides thorough preparation for implementing and managing secure email communications using ProtonMail. The program is designed so that participants can learn both the theoretical basics and the practical aspects of email encryption. During the workshop, participants learn to configure the environment, implement security policies and manage keys. The classes are conducted in a workshop format, where each issue is immediately verified in practice.

1 day Online / On-site
from 1,850 PLN

Securing network services - best practices

The training focuses on the practical aspects of securing network infrastructure in an enterprise environment. Participants will learn best practices and industry standards for protecting network services through a combination of theoretical classes and intensive hands-on workshops. During the course, students will work with real-world threat scenarios, learning to identify and appropriately respond to potential attacks. The program is designed to give participants practical skills that can be immediately applied in their daily work.

4 days Online / On-site
from 3,500 PLN

Securing Windows with PowerShell automation

Comprehensive training that combines advanced Windows security techniques with task automation using PowerShell. The program focuses on the practical aspects of implementing and managing security in a Windows environment, with a particular emphasis on using scripts to automate routine administrative tasks. The workshop is conducted in the form of intensive hands-on activities, during which participants create their own solutions to automate security-related processes.

6 days Online / On-site
from 4,500 PLN

Security analyst - comprehensive course

An extensive training course to prepare for a security analyst position, covering all key aspects of cyber security. The program is designed so that participants can gain both theoretical knowledge and practical skills necessary for the analyst's daily work. The workshop is conducted in the form of interactive classes, during which participants work with real tools and scenarios, learning threat analysis, incident response and security implementation.

5 days Online / On-site
from 5,050 PLN

Security and forensic analysis of mobile devices

A one-day training course focusing on security and forensic analysis of mobile devices. The program covers device security techniques, forensic analysis methods and data recovery. Participants will learn practical aspects through workshops and exercises on real cases.

1 day Online / On-site
from 1,850 PLN

Security-Enhanced Linux (SELinux) - advanced security.

Specialized training on advanced SELinux configuration and management in a production environment. The workshop program focuses on the practical aspects of implementing security policies, diagnosing problems and optimizing SELinux configuration. Participants will learn advanced techniques for securing systems using MAC (Mandatory Access Control) mechanisms.

1 day Online / On-site
from 1,650 PLN

Security in Apache Kafka

A specialized training course dedicated to the comprehensive security of the Apache Kafka platform in a production environment. The training program guides you through all key aspects of security, from authentication and authorization, to data encryption, to security auditing and monitoring. During intensive hands-on workshops, participants implement security mechanisms in various scenarios, learning to identify and mitigate potential threats. The teaching methodology combines security theory with the practical aspects of its implementation in the context of message streaming systems.

1 day Online / On-site
from 1,850 PLN

Security in OpenStack - protecting cloud infrastructure

Specialized training focusing on security aspects of the OpenStack environment, from basic security to advanced techniques for protecting cloud infrastructure. The program covers practical aspects of security policy implementation, threat detection and incident response. Participants work on real scenarios, learning to identify and neutralize security threats. The training is conducted in a workshop format with an emphasis on practical application of knowledge in a production environment.

2 days Online / On-site
from 2,450 PLN

Security in the AWS cloud

A three-day advanced training course dedicated to a holistic approach to security in an Amazon Web Services environment. The workshop program systematically develops participants' knowledge in designing, implementing and maintaining a secure cloud infrastructure. Participants learn advanced AWS security mechanisms, incident monitoring and response methods, and security auditing techniques through hands-on exercises. The training uses real-life scenarios and use cases, allowing them to understand not only the theoretical aspects of security, but also their practical application in a production environment.

3 days Online / On-site
from 3,900 PLN

Security in Python - best practices

The training focuses on the practical aspects of developing secure software in Python. The program guides participants through the process of identifying, analyzing and eliminating common security threats found in Python applications. During the workshop, participants will learn the best practices for securing code, starting with basic security principles, through advanced application protection techniques and security testing methods. The class combines theory with practical exercises, where participants learn from real-world examples under the guidance of an experienced expert.

2 days Online / On-site
from 2,450 PLN

Security in the cloud

Specialized training on security issues in cloud environments. The program covers practical aspects of securing infrastructure, data and applications in the cloud. Participants will learn about best practices, industry standards and tools for ensuring security in various cloud models. The training is conducted in a workshop format, where theory is immediately validated through practical exercises on real cases.

2 days Online / On-site
from 2,950 PLN

Security management - strategies and practices

The training presents an advanced approach to security management in an organization, combining theory with practical aspects of implementing security strategies. The program is designed so that participants can learn effective methods for identifying threats, analyzing risks and implementing appropriate safeguards. Classes are conducted in the form of interactive workshops, where theory is immediately verified through practical scenarios and case studies.

2 days Online / On-site
from 2,450 PLN

Security of embedded systems

Advanced training on embedded systems security that combines theory with practical aspects of securing IoT devices and industrial systems. The program covers a holistic approach to security, from threat analysis to security implementation, with a special focus on the specifics of embedded systems. The workshop is conducted on real devices and platforms, allowing participants to gain hands-on experience in securing embedded systems.

3 days Online / On-site
from 4,450 PLN

Security of .NET, C# and ASP.NET development

The training offers an in-depth look at the security aspects of application development on the .NET platform. During the hands-on workshop, participants will learn techniques for identifying and countering security threats specific to .NET, C# and ASP.NET technologies. The program includes both theoretical fundamentals and hands-on security implementation exercises in real-world development scenarios.

2 days Online / On-site
from 2,450 PLN

Security of wireless and telecommunications networks

The training provides in-depth knowledge of securing wireless networks and telecommunications systems. The program combines theoretical foundations with intensive hands-on workshops where participants learn to identify threats, implement security measures and monitor the security of wireless infrastructure. Special attention is given to the practical aspects of protecting Wi-Fi networks, cellular systems and telecommunications infrastructure in production environments.

5 days Online / On-site
from 5,050 PLN

Security policy management

The training focuses on the practical aspects of creating and implementing an effective security policy in an organization. The program covers all key elements of information security management, from risk analysis to security implementation and monitoring its effectiveness. The class is conducted in a workshop format, where participants work on real cases and create documentation that they can later use in their organization.

5 days Online / On-site
from 5,050 PLN

Social engineering in cyber security

The training focuses on the practical aspects of social engineering in the context of cyber security. Participants will learn about the psychological mechanisms used in social engineering attacks and methods of defense against them. The program combines theoretical knowledge with practical exercises, enabling them to understand manipulation techniques and build effective protection strategies.

2 days Online / On-site
from 2,450 PLN

Security testing - methodologies and tools

Advanced hands-on training in application security testing methodologies and tools. The program guides participants through a systematic testing process, from planning to reporting results. Hands-on workshops provide experience in using professional testing tools and techniques. Participants work in a dedicated lab environment where they can safely experiment with various test scenarios. The training emphasizes the practical aspects of testing and interpretation of results.

2 days Online / On-site
from 2,450 PLN

Standard Java security features

The two-day training focuses on the standard security mechanisms available in Java and the JVM platform. Participants will learn the basic principles of Java application security through hands-on workshops and exercises. The class combines theory with practice, enabling them to gain skills in identifying and implementing security features in Java applications.

2 days Online / On-site
from 2,450 PLN

Systems and network security

The training provides a comprehensive approach to the security of computer systems and networks. The program covers both the theoretical basics of security and the practical aspects of protecting IT infrastructure. Participants learn through workshops how to identify threats, implement safeguards and manage security incidents in a production environment.

2 days Online / On-site
from 2,450 PLN

Snyk - securing applications and infrastructure

The training focuses on the practical use of the Snyk platform to identify and eliminate vulnerabilities in application code and infrastructure. The program covers both the basic functions of the tool, as well as advanced techniques for automation and integration into the software development process. The classes are conducted in the form of workshops, during which participants work with real projects, learning how to effectively use Snyk's capabilities in their daily work. Special emphasis is placed on the practical aspects of implementing security in the application lifecycle.

2 days Online / On-site
from 2,450 PLN

Server room security and maintenance - best practices

The training provides practical knowledge in managing server room security and maintenance. Participants will learn proven methods for securing physical and digital infrastructure, as well as procedures to ensure the continuity of data center operations. The program was developed based on real cases and scenarios, with an emphasis on the practical aspects of server room management. The classes are conducted in a workshop format, where theory is immediately verified in practice.

2 days Online / On-site
from 2,450 PLN

The basics of corporate cyberwarfare

The training introduces participants to the world of modern cyber security threats targeting businesses. The program focuses on understanding the tactics, techniques and procedures used in attacks on organizations and methods to defend against them. Participants learn about real cases of cyber attacks, how to recognize signs of intrusion and how to plan defense strategies. The training combines theory with practical workshops simulating attack and defense scenarios in a secure environment.

2 days Online / On-site
from 2,450 PLN

The basics of cyber resilience

A two-day training course providing a solid foundation in building an organization's resilience to cyber attacks. Participants will learn the practical aspects of implementing protective mechanisms, risk management and building a security culture. The program combines theory and practice, using case studies and workshop exercises.

2 days Online / On-site
from 2,450 PLN

The NIS2 directive in practice: preparing your organization

Szkolenie przedstawia praktyczne aspekty wdrażania wymogów dyrektywy NIS2 w organizacjach. Program obejmuje szczegółową analizę obowiązków podmiotów kluczowych i ważnych oraz konkretne kroki implementacyjne. Uczestnicy poznają metodologie zarządzania ryzykiem cybernetycznym oraz procedury raportowania incydentów. Zajęcia prowadzone są w formie warsztatów z analizą case studies i praktycznymi ćwiczeniami compliance.

2 days Online / On-site
from 2,450 PLN

The basics of the SOC analyst's job

A one-day introductory training course for Security Operations Center (SOC) analysts. During the hands-on workshop, participants will learn the basic tools and methodologies used in the daily work of a SOC analyst. The training focuses on a practical approach to monitoring the security of IT systems and responding to detected threats. The class is conducted in a workshop format using real-world examples and scenarios.

1 day Online / On-site
from 1,650 PLN

Ubuntu security - best practices and tools

The training focuses on the practical aspects of securing the Ubuntu system in a production environment. The program combines theoretical security fundamentals with intensive hands-on workshops where participants learn advanced techniques for securing the system. The classes are conducted in the form of interactive workshops using real-world threat scenarios. The training will emphasize the implementation of best practices and the use of specialized security tools.

2 days Online / On-site
from 2,450 PLN

Understanding IPSec VPN - secure network communications

The training provides a comprehensive understanding of IPSec VPN technology, focusing on the practical aspects of implementing secure communications in corporate networks. The program is carefully designed to guide participants from the fundamentals of security protocols, through advanced configuration techniques, to effective troubleshooting. Classes are conducted in the form of intensive workshops, where theory is immediately verified in practice through the configuration of real VPN solutions. Participants work on professional network equipment, learning to implement and manage secure VPN tunnels in production-like conditions.

2 days Online / On-site
from 2,450 PLN

Understanding and managing the malware threat

A one-day training course focused on identifying and countering malware threats. Participants will learn malware analysis techniques, methods to protect systems, and incident response strategies. The program includes hands-on workshops using malware analysis tools and threat response scenarios in a test environment.

1 day Online / On-site
from 1,850 PLN

Web application security - best practices

Intensive hands-on training dedicated to securing web applications against modern threats. The program includes a systematic approach to identifying, analyzing and neutralizing vulnerabilities in web applications. Participants work with real examples of vulnerabilities, learning how to detect and eliminate them. The class is conducted in a workshop format, where theory is immediately verified through practical exercises in a controlled test environment. The training places special emphasis on understanding attack mechanisms and implementing effective security measures.

2 days Online / On-site
from 2,450 PLN

WEBAP - Web Application Security

Advanced web application security training that combines theory with hands-on security testing workshops. The program covers penetration testing methodology, vulnerability identification and techniques for securing web applications. Participants work in a specially prepared laboratory environment where they can safely test various attack scenarios and defense methods. The classes are conducted in the form of interactive workshops with an emphasis on practical application of the knowledge gained.

4 days Online / On-site
from 3,500 PLN

WiFi network security - threats and protection

The training provides practical knowledge in securing wireless networks against modern threats. The program combines theory with intensive workshop classes, during which participants learn methods of attacks on WiFi networks and how to effectively secure them. Classes are conducted in the form of practical labs, where students work with real equipment and tools used in wireless network security testing.

3 days Online / On-site
from 3,600 PLN

Whistleblower Protection - Implementing Internal Reporting Systems

This training provides a comprehensive overview of the EU Whistleblower Directive (2019/1937) and its implementation requirements for organizations. Participants will learn how to design, deploy, and manage internal reporting channels that comply with legal obligations while protecting reporter confidentiality. The course covers GDPR intersections, building a speak-up culture, and handling reports effectively and lawfully.

1 day Online / On-site
from 1,900 PLN

Zscaler - security in the cloud

The training focuses on the practical use of the Zscaler platform to secure cloud environments in the enterprise. The program combines theoretical fundamentals of cloud security with hands-on workshops on the Zscaler platform. Participants work on real deployment scenarios, learning how to configure and manage security in a modern Zero Trust architecture. The classes are conducted in the form of interactive workshops, where each theoretical element is immediately translated into practical exercises.

2 days Online / On-site
from 2,450 PLN

Other Trainings

Advanced applications of SSL/TLS protocols in secure communications

&13; &13; Training description&13; &13; &13; &13; The training course details the practical aspects of implementing and applying RODO regulations in local government units. The program includes an...

Advanced security for C#, ASP.NET and web applications

&13; &13; Training description&13; &13; &13; &13; The training is an advanced workshop program dedicated to the multi-faceted security of web applications developed with Microsoft technologies....

Application security in C/C++, ASP.NET and web applications

&13; &13; Training description&13; &13; &13; &13; Intensive specialized training covering advanced aspects of security in applications developed in C/C++, ASP.NET and web applications. The program...

Cybersecurity Mesh Architecture (CSMA): designing and implementing integrated security

&13; &13; Training description&13; &13; &13; Szkolenie wprowadza uczestników w koncepcję Cybersecurity Mesh Architecture jako nowoczesne podejście do zabezpieczeń organizacyjnych. Program obejmuje...

Data protection

&13; &13; Training description&13; &13; &13; &13; The training presents the current legal requirements for the protection of personal data, with particular emphasis on the changes introduced by the...

ISO/IEC 27001 Lead Auditor (ISO/IEC 27001 Lead Auditor).

Training description ISO/IEC 27001 Lead Auditor training allows you to develop the knowledge necessary to conduct Information Security Management System ISMS audits by applying widely recognized...

ISO/IEC 27001 Lead Implementer (ISO/IEC 27001 Lead Implementer)

Training description ISO/IEC 27001 Lead Implementer training allows you to develop the knowledge necessary to support your organization in establishing, implementing, managing, monitoring and...

ISO/IEC 27002 Lead Manager (ISO/IEC 27002 Lead Manager)

Training description The ISO/IEC 27002 ISO/IEC 20000 Lead Auditor ISO/IEC 20000 Lead Auditor Lead Manager training course allows you to gain expert knowledge of best practices and guidelines for...

ISO/IEC 27701 Lead Implementer (ISO/IEC 27701 Lead Implementer).

Training description ISO/IEC 27701 Lead Implementer training allows you to develop the knowledge necessary to support your organization in establishing, implementing, managing, monitoring and...

ISO/IEC 27005 Lead Information Security Risk Manager (ISO/IEC 27005 Lead Risk Manager).

Training description ISO/IEC 27005 Lead Risk Manager training develops the competency to master the information security risk management process based on ISO/IEC 27005. This training provides an...

MITRE ATT&CK - a framework of tactics and attack techniques.

&13; &13; Training description&13; &13; &13; &13; The training introduces participants to the world of the MITRE ATT&CK framework, providing knowledge of the systematics of tactics and...

Machine Identity Management: the key to security in the era of automation and the cloud

&13; &13; Training description&13; &13; &13; Szkolenie odpowiada na rosnącą potrzebę weryfikacji rzeczywistego poziomu bezpieczeństwa systemów OT poprzez kontrolowane, symulowane ataki. Program...

Node.JS and web application security

&13; &13; Training description&13; &13; &13; &13; Specialized training focusing on security aspects of Node.js applications. The program covers both the theoretical basics of securing applications...

Practical about RODO/GDPR - EU data protection reform

&13; &13; Training description&13; &13; &13; &13; The training presents practical aspects of implementing and applying the RODO/GDPR regulations in the daily operations of an organization. The...

Security of .NET, C# and ASP.NET development

&13; &13; Training description&13; &13; &13; &13; The training offers an in-depth look at the security aspects of application development on the .NET platform. During the hands-on workshop,...

Cybersecurity Training — From Awareness to Pentesting and Compliance

A comprehensive security training portfolio covering three areas: security awareness, technical cybersecurity training, and governance, risk and compliance (GRC). Programs for security specialists, IT administrators, data protection officers and senior management.

Security Awareness

Training programs building a cybersecurity culture within organizations. Programs on phishing recognition, safe use of email and networks, personal data protection and incident response. Dedicated awareness workshops for public sector management — in the context of NIS2 directive requirements.

Technical Security — Pentesting, SIEM, SOC

Advanced training in ethical hacking and penetration testing (web applications, networks, cloud infrastructure). Workshops on SIEM configuration and operation, building Security Operations Centers (SOC), incident response and forensics. Programs on network security (firewall, IDS/IPS), cryptography, zero trust and access control.

GRC — ISO 27001, GDPR, NIS2, DORA

Training preparing for ISO 27001 implementation and certification (Lead Implementer, Lead Auditor). Programs in risk management, security auditing and regulatory compliance — GDPR for data protection officers (DPO), NIS2 for essential service operators, DORA for the financial sector.

Cloud Security and DevSecOps

Training on cloud security (AWS, Azure, GCP) — shared responsibility, IAM, encryption and monitoring. DevSecOps workshops integrating security into CI/CD pipelines. Programs on threat hunting, ransomware response and machine identity management.

Frequently Asked Questions

What cybersecurity trainings does EITT offer?

We offer training in three areas: awareness (building security culture), technical (pentesting, network security, application security) and GRC (ISO 27001, GDPR, NIS2, risk management).

Who are the security trainings for?

For cybersecurity specialists, IT administrators, senior management, data protection officers (DPO) and employees of organizations subject to the NIS2 directive.

Do you offer NIS2 training?

Yes, we offer training preparing for NIS2 directive and national cybersecurity law requirements — both for senior management and operational staff.

Didn't find the training?

We design custom training programs on request. Describe your needs and we'll prepare a dedicated offer.

Ask about training
Request Training
Call us +48 22 487 84 90