Skip to content

Commit 9db6887

Browse files
page migrated to cybersecuritystream.github.io
1 parent 34386a5 commit 9db6887

1 file changed

Lines changed: 139 additions & 131 deletions

File tree

README.adoc

Lines changed: 139 additions & 131 deletions
Original file line numberDiff line numberDiff line change
@@ -63,7 +63,7 @@ image:https://img.shields.io/github/stars/crcep/cybersecurity?label=Stars&style=
6363
image:https://img.shields.io/badge/dynamic/json?style=social&label=What's new?&query=%24%5B0%5D.commit.message&url=https%3A%2F%2Fapi.github.com%2Frepos%2Fcrcep%2Fcybersecurity%2Fcommits%3Fpath%3DREADME.adoc[GitHub Repo changes,link="https://github.com/crcep/cybersecurity/commits/main"]
6464

6565
[.text-center]
66-
kbd:[This year's enrollment is closed already.]
66+
OUR NEW SPACE: https://cybersecuritystream.github.io[kbd:[cybersecuritystream.github.io]]
6767

6868
image::https://avatars.githubusercontent.com/u/83579804[CRC logo, 300, align="center"]
6969
// image::https://user-images.githubusercontent.com/9287709/222753033-f1db6841-d617-43c3-a7e4-003ff85b5e7c.png[CRC logo, 300, align="center"]
@@ -119,6 +119,7 @@ new Chart(document.getElementById("bar-chart-horizontal"), {
119119
39,
120120
73,
121121
83,
122+
95,
122123
]
123124
},
124125
{
@@ -129,6 +130,7 @@ new Chart(document.getElementById("bar-chart-horizontal"), {
129130
31,
130131
64,
131132
65,
133+
86,
132134
]
133135
},
134136
{
@@ -139,6 +141,7 @@ new Chart(document.getElementById("bar-chart-horizontal"), {
139141
31,
140142
64,
141143
65,
144+
86,
142145
]
143146
}
144147
]
@@ -166,140 +169,145 @@ new Chart(document.getElementById("bar-chart-horizontal"), {
166169
[#2024]
167170
== 2024
168171

172+
[NOTE]
173+
====
174+
Are you looking for a 2024 sum-up? It's in your new space. Click the red button below to check it out!
169175
[.text-center]
170-
kbd:[This year's enrollment is closed already.]
171-
172-
[cols=".^2,3",align="center"]
173-
|===
174-
| *Number of hours* | `40 hours`
175-
| *Number of meetings* | `8 meetings, 8 Saturdays`
176-
| *Form of meeting* | `on-line`
177-
| *Schedule*
178-
a|
179-
* `2024-03-02 09:00-14:10 +0100 (CET)` `DAY 1/8` +
180-
* `2024-03-09 09:00-14:00 +0100 (CET)` `DAY 2/8` +
181-
* `2024-03-16 09:00-14:50 +0100 (CET)` `DAY 3/8` +
182-
* `2024-03-23 09:00-16:00 +0100 (CET)` `DAY 4/8` +
183-
* `2024-04-06 09:00-13:40 +0200 (CEST)` `DAY 5/8` +
184-
* `2024-04-13 09:00-14:40 +0200 (CEST)` `DAY 6/8` +
185-
* `2024-04-20 09:00-14:50 +0200 (CEST)` `DAY 7/8` +
186-
* `2024-04-27 09:00-16:00 +0200 (CEST)` `DAY 8/8` +
187-
* `2024-05-11 10:00-11:00 +0200 (CEST)` `FINAL EXAM`
188-
189-
|===
190-
191-
[cols="^.^1,.^10,.^6",align="center"]
192-
|===
193-
| ^|Topic ^|Trainer
194-
195-
|{counter:index-2024}| Kickoff meeting
196-
a|* Łukasz Jankowski {lukasz-jankowski-linkedin}
197-
* Damian Krawczyk {damian-krawczyk-linkedin} {damian-krawczyk-website}
198-
199-
|{counter:index-2024}| Cyber awareness
200-
a|* Sławomir Staciwa {slawomir-staciwa-linkedin}
201-
202-
|{counter:index-2024}| Data Protection - Compliance
203-
a|* Dagmara Adamczyk {dagmara-adamczyk-linkedin}
204-
205-
|{counter:index-2024}| IT Risk Management - Basics
206-
a|* Askaniusz Ferens {askaniusz-ferens-linkedin}
207-
* Anna Maszybrocka {anna-maszybrocka-linkedin}
208-
209-
|{counter:index-2024}| IT Risk Management - Governance
210-
a|* Justyna Chochla-Wojdyła {justyna-chochla-wojdyla-linkedin}
211-
212-
|{counter:index-2024}| Risk Management - Operational Risk Management
213-
a|* Katarzyna Nowrot {katarzyna-nowrot-linkedin}
214-
215-
|{counter:index-2024}| Risk Management - Compliance
216-
a|* Kamila Juszczyk {kamila-juszczyk-linkedin}
217-
218-
|{counter:index-2024}| Risk Management - Audits
219-
a|* Karolina Sieruga {karolina-sieruga-linkedin}
220-
221-
|{counter:index-2024}| Identity and Access Management
222-
a|* Paweł Matyszok {pawel-matyszok-linkedin}
223-
224-
|{counter:index-2024}| Password vaults
225-
a|* Mateusz Kozieł {mateusz-koziel-linkedin}
226-
227-
|{counter:index-2024}| Cryptography - Basics
228-
a|* Jacek Kocyba {jacek-kocyba-linkedin}
229-
230-
|{counter:index-2024}| Shadow IT
231-
a|* Jacek Kocyba {jacek-kocyba-linkedin}
232-
233-
|{counter:index-2024}| Vulnerability Assessment
234-
a|* Łukasz Jankowski {lukasz-jankowski-linkedin}
235-
* Damian Krawczyk {damian-krawczyk-linkedin} {damian-krawczyk-website}
236-
237-
|{counter:index-2024}| Vulnerability Assessment for containers
238-
a|* Krzysztof Kozak {krzysztof-kozak-linkedin}
239-
* Łukasz Galos {lukasz-galos-linkedin}
240-
241-
|{counter:index-2024}| Secure Configuration Monitoring
242-
a|* Maciej Wróbel {maciej-wrobel-linkedin}
243-
244-
|{counter:index-2024}| Secure Software Development Lifecycle Management
245-
a|* Maciej Wróbel {maciej-wrobel-linkedin}
246-
247-
|{counter:index-2024}| Introduction to Offensive tooling
248-
a|* Michał Kucharski {michal-kucharski-website}
249-
250-
|{counter:index-2024}| OSINT in the service of Offensive Security
251-
a|* Maciej Pypeć {maciej-pypec-linkedin}
252-
253-
|{counter:index-2024}| Offensive Cybersecurity - Red Teaming theory
254-
a|* Jakub Plusczok {jakub-plusczok-linkedin}
255-
256-
|{counter:index-2024}| Offensive Cybersecurity - Red Teaming workshop
257-
a|* Jakub Plusczok {jakub-plusczok-linkedin}
258-
259-
|{counter:index-2024}| Offensive Cybersecurity - DDOS
260-
a|* Gerard Żmuda {gerard-zmuda-linkedin}
261-
262-
|{counter:index-2024}| Defensive Cybersecurity - Threat Hunting
263-
a|* Jakub Szumera {jakub-szumera-linkedin}
264-
265-
|{counter:index-2024}| Defensive Cybersecurity - SIEM + SOAR + Proxy
266-
a|* Daniel Jeczeń {daniel-jeczen-linkedin}
267-
268-
|{counter:index-2024}| Defensive Cybersecurity - Malware Analysis
269-
a|* Mirosław Koczenasz
270-
271-
|{counter:index-2024}| Building ETL for Security data
272-
a|* Michał Kocur {michal-kocur-linkedin}
273-
274-
|{counter:index-2024}| Security data processing automation
275-
a|* Piotr Furmaniak {piotr-furmaniak-linkedin}
276-
* Adam Majstrak {adam-majstrak-website}
277-
278-
|{counter:index-2024}| Introduction to Azure Public Cloud
279-
a|* Rafał Nowakowski {rafal-nowakowski-linkedin}
280-
|===
281-
282-
[#lectures-timetable-2024]
283-
=== lectures timetable
284-
285-
++++
286-
<iframe src="https://calendar.google.com/calendar/embed?height=600&wkst=2&bgcolor=%23ffffff&ctz=Europe%2FWarsaw&showTitle=1&title=CRC%20Cybersecurity%202024&showPrint=0&mode=AGENDA&hl=en_GB&showCalendars=0&showTabs=0&showDate=0&showNav=0&showTz=0&src=23a824a3917660f5a5c3aac192bda4cdbe407eb4054cec704ab4de953ed4dc9c%40group.calendar.google.com&color=%23EF6C00" style="border-width:0" width="100%" height="400" frameborder="0" scrolling="no"></iframe>
287-
++++
288-
289-
[TIP]
176+
https://cybersecuritystream.github.io[kbd:[cybersecuritystream.github.io]]
290177
====
291-
To subscribe and have always up-to-date schedule in your smartphone 📲.
292178

293-
- click btn:[+ Google Calendar] button above, if you are on Android.
294-
295-
- click https://calendar.google.com/calendar/ical/23a824a3917660f5a5c3aac192bda4cdbe407eb4054cec704ab4de953ed4dc9c%40group.calendar.google.com/public/basic.ics[HERE] or copy below address of *CRC Cybersecurity 2024* calendar in iCal format if you are on iPhone.
296-
297-
298-
====
299179

300-
----
301-
https://calendar.google.com/calendar/ical/23a824a3917660f5a5c3aac192bda4cdbe407eb4054cec704ab4de953ed4dc9c%40group.calendar.google.com/public/basic.ics
302-
----
180+
// [cols=".^2,3",align="center"]
181+
// |===
182+
// | *Number of hours* | `40 hours`
183+
// | *Number of meetings* | `8 meetings, 8 Saturdays`
184+
// | *Form of meeting* | `on-line`
185+
// | *Schedule*
186+
// a|
187+
// * `2024-03-02 09:00-14:10 +0100 (CET)` `DAY 1/8` +
188+
// * `2024-03-09 09:00-14:00 +0100 (CET)` `DAY 2/8` +
189+
// * `2024-03-16 09:00-14:50 +0100 (CET)` `DAY 3/8` +
190+
// * `2024-03-23 09:00-16:00 +0100 (CET)` `DAY 4/8` +
191+
// * `2024-04-06 09:00-13:40 +0200 (CEST)` `DAY 5/8` +
192+
// * `2024-04-13 09:00-14:40 +0200 (CEST)` `DAY 6/8` +
193+
// * `2024-04-20 09:00-14:50 +0200 (CEST)` `DAY 7/8` +
194+
// * `2024-04-27 09:00-16:00 +0200 (CEST)` `DAY 8/8` +
195+
// * `2024-05-11 10:00-11:00 +0200 (CEST)` `FINAL EXAM`
196+
//
197+
// |===
198+
//
199+
// [cols="^.^1,.^10,.^6",align="center"]
200+
// |===
201+
// | ^|Topic ^|Trainer
202+
//
203+
// |{counter:index-2024}| Kickoff meeting
204+
// a|* Łukasz Jankowski {lukasz-jankowski-linkedin}
205+
// * Damian Krawczyk {damian-krawczyk-linkedin} {damian-krawczyk-website}
206+
//
207+
// |{counter:index-2024}| Cyber awareness
208+
// a|* Sławomir Staciwa {slawomir-staciwa-linkedin}
209+
//
210+
// |{counter:index-2024}| Data Protection - Compliance
211+
// a|* Dagmara Adamczyk {dagmara-adamczyk-linkedin}
212+
//
213+
// |{counter:index-2024}| IT Risk Management - Basics
214+
// a|* Askaniusz Ferens {askaniusz-ferens-linkedin}
215+
// * Anna Maszybrocka {anna-maszybrocka-linkedin}
216+
//
217+
// |{counter:index-2024}| IT Risk Management - Governance
218+
// a|* Justyna Chochla-Wojdyła {justyna-chochla-wojdyla-linkedin}
219+
//
220+
// |{counter:index-2024}| Risk Management - Operational Risk Management
221+
// a|* Katarzyna Nowrot {katarzyna-nowrot-linkedin}
222+
//
223+
// |{counter:index-2024}| Risk Management - Compliance
224+
// a|* Kamila Juszczyk {kamila-juszczyk-linkedin}
225+
//
226+
// |{counter:index-2024}| Risk Management - Audits
227+
// a|* Karolina Sieruga {karolina-sieruga-linkedin}
228+
//
229+
// |{counter:index-2024}| Identity and Access Management
230+
// a|* Paweł Matyszok {pawel-matyszok-linkedin}
231+
//
232+
// |{counter:index-2024}| Password vaults
233+
// a|* Mateusz Kozieł {mateusz-koziel-linkedin}
234+
//
235+
// |{counter:index-2024}| Cryptography - Basics
236+
// a|* Jacek Kocyba {jacek-kocyba-linkedin}
237+
//
238+
// |{counter:index-2024}| Shadow IT
239+
// a|* Jacek Kocyba {jacek-kocyba-linkedin}
240+
//
241+
// |{counter:index-2024}| Vulnerability Assessment
242+
// a|* Łukasz Jankowski {lukasz-jankowski-linkedin}
243+
// * Damian Krawczyk {damian-krawczyk-linkedin} {damian-krawczyk-website}
244+
//
245+
// |{counter:index-2024}| Vulnerability Assessment for containers
246+
// a|* Krzysztof Kozak {krzysztof-kozak-linkedin}
247+
// * Łukasz Galos {lukasz-galos-linkedin}
248+
//
249+
// |{counter:index-2024}| Secure Configuration Monitoring
250+
// a|* Maciej Wróbel {maciej-wrobel-linkedin}
251+
//
252+
// |{counter:index-2024}| Secure Software Development Lifecycle Management
253+
// a|* Maciej Wróbel {maciej-wrobel-linkedin}
254+
//
255+
// |{counter:index-2024}| Introduction to Offensive tooling
256+
// a|* Michał Kucharski {michal-kucharski-website}
257+
//
258+
// |{counter:index-2024}| OSINT in the service of Offensive Security
259+
// a|* Maciej Pypeć {maciej-pypec-linkedin}
260+
//
261+
// |{counter:index-2024}| Offensive Cybersecurity - Red Teaming theory
262+
// a|* Jakub Plusczok {jakub-plusczok-linkedin}
263+
//
264+
// |{counter:index-2024}| Offensive Cybersecurity - Red Teaming workshop
265+
// a|* Jakub Plusczok {jakub-plusczok-linkedin}
266+
//
267+
// |{counter:index-2024}| Offensive Cybersecurity - DDOS
268+
// a|* Gerard Żmuda {gerard-zmuda-linkedin}
269+
//
270+
// |{counter:index-2024}| Defensive Cybersecurity - Threat Hunting
271+
// a|* Jakub Szumera {jakub-szumera-linkedin}
272+
//
273+
// |{counter:index-2024}| Defensive Cybersecurity - SIEM + SOAR + Proxy
274+
// a|* Daniel Jeczeń {daniel-jeczen-linkedin}
275+
//
276+
// |{counter:index-2024}| Defensive Cybersecurity - Malware Analysis
277+
// a|* Mirosław Koczenasz
278+
//
279+
// |{counter:index-2024}| Building ETL for Security data
280+
// a|* Michał Kocur {michal-kocur-linkedin}
281+
//
282+
// |{counter:index-2024}| Security data processing automation
283+
// a|* Piotr Furmaniak {piotr-furmaniak-linkedin}
284+
// * Adam Majstrak {adam-majstrak-website}
285+
//
286+
// |{counter:index-2024}| Introduction to Azure Public Cloud
287+
// a|* Rafał Nowakowski {rafal-nowakowski-linkedin}
288+
// |===
289+
//
290+
// [#lectures-timetable-2024]
291+
// === lectures timetable
292+
//
293+
// ++++
294+
// <iframe src="https://calendar.google.com/calendar/embed?height=600&wkst=2&bgcolor=%23ffffff&ctz=Europe%2FWarsaw&showTitle=1&title=CRC%20Cybersecurity%202024&showPrint=0&mode=AGENDA&hl=en_GB&showCalendars=0&showTabs=0&showDate=0&showNav=0&showTz=0&src=23a824a3917660f5a5c3aac192bda4cdbe407eb4054cec704ab4de953ed4dc9c%40group.calendar.google.com&color=%23EF6C00" style="border-width:0" width="100%" height="400" frameborder="0" scrolling="no"></iframe>
295+
// ++++
296+
//
297+
// [TIP]
298+
// ====
299+
// To subscribe and have always up-to-date schedule in your smartphone 📲.
300+
//
301+
// - click btn:[+ Google Calendar] button above, if you are on Android.
302+
//
303+
// - click https://calendar.google.com/calendar/ical/23a824a3917660f5a5c3aac192bda4cdbe407eb4054cec704ab4de953ed4dc9c%40group.calendar.google.com/public/basic.ics[HERE] or copy below address of *CRC Cybersecurity 2024* calendar in iCal format if you are on iPhone.
304+
//
305+
//
306+
// ====
307+
//
308+
// ----
309+
// https://calendar.google.com/calendar/ical/23a824a3917660f5a5c3aac192bda4cdbe407eb4054cec704ab4de953ed4dc9c%40group.calendar.google.com/public/basic.ics
310+
// ----
303311

304312

305313
[#2023]

0 commit comments

Comments
 (0)