top of page
stm-academy kurs cyberbezpieczeństwa

FOR COMPANIES

SECURITY OF WEB APPLICATIONS

The training focused on web applications. It explains in detail all the most common programming errors that can be found in web applications.

Get the details

APPLICATION SECURITY FOR DEVELOPERS

  • Java application code analysis,

  • .NET application code analysis,

  • PHP application code analysis.

The block will discuss selected vulnerabilities of the server-side type. The presenters will show both errors in the source code itself and their practical use by the attacker. In addition, issues related to dependency security and code audit methodology will be discussed. The summary of this part of the training will be the presentation of the best practices of writing secure code of the selected technology.

Get the details

sowa symbol Stm-academy

NETWORK AND 

INFRASTRUCTURE

SECURITY 

The training is focused on scanning the network and detecting vulnerable services. It includes various means of remotely executing commands on servers and privilege escalation techniques that can be used to gain unauthorized access to administrative accounts.

Get the details

RED TEAMING

The training consists of conducting a series of attack simulations that will reflect the methods of operation of cyber criminals, the social engineering, and the tools they use, based on modeled target-oriented scenarios.

Get the details

C CODE ANALYSIS 

AND LOCAL EXPLOITATION

The training covers the basics of the Linux operating system and its security model. It teaches reverse analysis of programs written in the C programming language and the practical use of found vulnerabilities in order to escalate privileges or obtain remote code execution.

 

Most of the services available on the Internet are based on Linux. Its knowledge is an integral part of a full security audit.

Get the details

 MALWARE ANALYSIS

The training concerns malware analysis, and tracking API calls. Thanks to it, you will learn how to decrypt network traffic, bypass certificate pinning, and obtain IoC (Indicators of Compromise) using static and dynamic analysis.

 

Malware analysis is an essential skill for any SOC incident response team as well as an application security auditor.

Get the details

formularz firma
Report to us!

Thank you for reporting!

I consent to the processing of personal data provided in the form in accordance with the Personal Data Protection Act for the purpose of:

I have been informed that providing the telephone number is voluntary, but necessary to respond to the contact request and that I have the right to access, change, delete, and stop processing the data. The administrator of personal data is STM Academy Sp. zoo. with its registered office at ul. Żwirki i Wigury 16a, 02-092 Warsaw. You can find the Information Clause on page

student cyberbezpieczeństwa stm-academy

CAREER DEVELOPMENT IN CYBERSEC

Our course is running stationary on weekends in Warsaw at Campus Business Garden at ul. Żwirki i Wigury 16a.

Classes are held in a spacious room equipped with the necessary equipment for each participant. There are two lecturers for each group - the main one and the supporting one. Groups may not exceed 20 people.

Classes are held on our proprietary cyber range platform - HackingDept. You will have access to it 24/7 during the training and 30 days after completing the course.

BENEFITS

1

Development of participants' competences in the field of cybersecurity

2

Easier communication between IT departments in the organization

3

Access to the proprietary cyber range platform 24/7 during the training and 30 days after completing the course

4

Opportunity to develop

careers in CyberSec and retraining of human resources

TEST DRIVE

We don't want to convince everyone that we are the best. Just sign up for a free 2-hour test drive and see for yourself that there is no more advanced training on the market.

IMG_0402.heic
bottom of page