Who is this project for?
We recommend it to women who want to enter the world of IT and test their potential for advancement in the popular cybersecurity track.
See the participants’ success stories!
The aim of the “Cybersecurity Basics” course is to discuss the most important concepts, areas and tools used in the world of cybersecurity. This will enable participants to identify the most interesting further education and development direction for themselves. The ratio is approximately 80/20 training/workshop – depending on the final level of sophistication of the participants. In addition, female graduates will additionally receive free access to another online course on cyber security. It will be on an external online platform, 6 h in Polish, for independent work.
What will you gain from participating?
No one needs to be convinced that cyber security (cybersecurity) is hugely important today for both individuals and companies. What hacking attacks are we also know, and we don’t wish anyone to experience them. If you think this branch of IT could be your path to growth, just check it out.
What is the schedule?
The course is 4 meetings with cybersecurity expert Marta Galinska, who will introduce the world of cybersecurity. There will be 3 meetings of 2 h each and 1 meeting of 3 h. The last meeting will be longer. There will be an exercise/workshop that will summarize the work on this compedium of knowledge.
Meeting dates: August 1, 5, 8, 12, 2024 (6:00-8:00 pm, with the last meeting exceptionally 6:00-21:00 pm)
The workshop will be led by Marta, who trains and helps secure against cyber attacks on a daily basis. She has the knowledge and the desire to share it with the widest possible audience. We are happy that she will also lead the course at our Foundation!
Agenda
Introduction – cyber security and risk management, Types of attacks, OSI layers, Business continuity: backup, DRaS.
Network protection – networking, network segmentation, firewall, Mail protection, SD-WAN, VPN and remote access, Cryptography, Vulnerability management
Application protection – WAF and OWASP Top10, Secure code (DevOps and SecOps), SOC, Introduction to MITRE ATT&CK® framework, Kill Chain, Endpoint device protection – XDR vs antivirus, Mobile device protection – MDM
Sociotechnique and prevention methods, AI and deepfakes, Cyber hygiene and physical protection, Top experts (vendors) in the cybersecurity industry (Gartner), Certification paths, Technical workshops (E.g., based on a description of company X’s current infrastructure and the threats it faces – propose actions and tools that company X should secure itself with – where will you start? What questions will you ask? What tools will you use? – the topic is subject to change and will be presented at the meeting).
Participation is free, but registration is required.
Would you like to become our partner?
Are you a company or organization that values education and is committed to achieving sustainable development goals?