Lectures and workshops
for high schools
Mobile Device Security
- Type:
- Workshop
- Duration:
- 45 min
Annotation: The workshop focuses on current threats and vulnerabilities in the field of mobile devices. Participants will be introduced to practical examples of attacks, as well as malware that exploits hardware features of devices. Security measures, proper permission settings, and risks of older versions of operating systems are also discussed. There is also a recommendation for testing tools.
Web Application Security for Beginners
- Type:
- Workshop
- Duration:
- 45 min
Annotation: An introductory workshop into application security with an emphasis on the most common vulnerabilities. Specific examples of risks such as injections, XSS, or insufficient access control are presented. Prevention is also an important part, for example, proper input handling or data encryption. The workshop is suitable for students without previous experience.
User Behavior Analysis in Windows
- Type:
- Workshop
- Duration:
- 45 min
Annotation: The workshop is dedicated to forensic analysis of user data in Windows systems. It focuses on metadata processing, browsing history, email communication and hidden files. Participants will learn to use tools such as ExifTool or OSForensics to detect anomalies. Topics such as encryption and compression are also covered. The emphasis is on the practical side of securing and evaluating data.
Malware for Beginners
- Type:
- Workshop
- Duration:
- 45 min
Annotation: An introduction to the world of malicious software with a focus on types of malware such as viruses, worms, trojans, spyware and ransomware. The symptoms of infection, spread mechanisms and detection methods, including heuristics and machine learning, are explained. The workshop is suitable for anyone who wants to understand the basic principles of cybersecurity.
How safe is my mobile phone?
- Type:
- Lecture
- Duration:
- 45 min
Annotation: The lecture focuses on how users can protect their mobile devices from attacks and misuse. The topics of permissions, exploits, vulnerabilities and ways in which attackers bypass security mechanisms are discussed. Participants will receive practical recommendations for choosing a secure phone and its configuration. Emphasis is also placed on understanding how services such as sandboxing and accessibility services work.
Malicious Code / Malware
- Type:
- Lecture
- Duration:
- 45 min
Annotation: The lecture provides a comprehensive overview of the history, development, and current threats in the field of malware. Famous incidents such as the Morris worm are presented, and various types of malware are explained in detail - viruses, worms, Trojans, spyware, ransomware, and more. Emphasis is placed on methods of spread and detection, as well as examples of real-life cases. The lecture also draws attention to the risks of unknowingly using devices and the Internet.
Know Your Enemy
- Type:
- Lecture
- Duration:
- 45/60 min
Annotation: The lecture focuses on the types of attackers in cyberspace - from hackers, through script kiddies to state-sponsored groups. It helps the participant understand the motivations, goals and techniques of these actors, thereby contributing to a better understanding of defense strategies.
OSINT - Analysis
- Type:
- Workshop
- Duration:
- 45/60 min
Annotation: The workshop introduces the basics of OSINT (Open-Source Intelligence) and shows how publicly available information can be legally obtained and analyzed. Participants will learn to use search techniques, as well as tools for analyzing emails, IP addresses, usernames and metadata.
OSINT - Person Tracking (Trace Labs CTF)
- Type:
- Workshop
- Duration:
- 45/60 min
Annotation: A practical workshop focused on person tracking using OSINT as part of the Trace Labs CTF competition. It shows how to obtain useful information from public sources based on photos, names and other data. It contains specific tools, cases and tips for real-world searches.
Fraudulent systems in cybersecurity
- Type:
- Lecture
- Duration:
- 45 min
Annotation: The lecture focuses on active defense techniques such as honeypots, honeynets, honeytokens and other fraudulent systems used to detect and analyze attacks. It explains the principle of operation of these tools, their classification by level of interaction and real-world scenarios for their deployment. It is supplemented with knowledge from the field of situational awareness, prediction and behavioral analysis.
How to resolve cyber security incidents
- Type:
- Lecture
- Duration:
- 45 min
Annotation: The lecture systematically explains the procedures for resolving cyber security incidents: from detection, through documentation, analysis to recovery. It includes examples of the work of CSIRT teams, analysis of ransomware attacks, the legal framework and recommended tools. It is intended for a more advanced audience. It also includes model situations for incident resolution.
Current Trends in Information Security
- Type:
- Lecture
- Duration:
- 45 min
Annotation: A basic introductory lecture intended primarily for students and the general public. It introduces the concepts of cybersecurity, types of attacks, security incidents and the legal framework for data protection.
Digital Traces Around Us
- Type:
- Workshop
- Duration:
- 45 min
Annotation: The workshop includes practical demonstrations from the field of digital forensics. It focuses on the analysis of system events, file traces and network traffic. It serves as a guide to the real work of a forensic analyst in a simulated environment, including working with practical tools.
Digital Forensics from the Perspective of Data Analysts
- Type:
- Lecture
- Duration:
- 45 min
Annotation: The lecture offers a view of digital forensics through the eyes of data analysts. Explains the connection between forensics and data analytics, evidence visualization and data correlation. It also includes specific cases of how evidence can be obtained from logs, files or network communications.
Forensic Memory Analysis (FA_memory)
- Type:
- Workshop
- Duration:
- 45/60 min
Annotation: Workshop focused on analyzing the contents of operating memory as a key source of evidence. Explains what data can be obtained from RAM, how to work with memory dumps and introduces tools such as Volatility. It shows practical scenarios of malware detection, network activity and process execution.
Internet – good servant, bad master
- Type:
- Lecture
- Duration:
- 45 min
Annotation: A lecture aimed at raising awareness. It presents common Internet pitfalls that can affect everyday life – how user tracking works, password leaks, phishing, or the impact of fake information. The emphasis is on preventive measures and tools for identity verification and protection.
Cryptography
- Type:
- Workshop
- Duration:
- 45/60 min
Annotation: An interactive workshop on cryptography. Participants will learn about the historical development of encryption, the differences between encoding and encryption, symmetric and asymmetric algorithms, hash functions, and real-world deployment of cryptography. It includes practical examples in the CyberChef tool.
Digital forensic analysis
- Type:
- Lecture
- Duration:
- 45/60 min
Annotation: An introduction to digital forensic analysis with an emphasis on the collecting, securing, and evaluating digital traces. It focuses on the process and principles of incident response, practical tools and web browser analysis. It includes practical examples and procedures.
Resolving cyber security incidents
- Type:
- Workshop
- Duration:
- 45/60 min
Annotation: A summary of real cyber incidents, their impact and solutions, the perfect workshop to broaden your knowledge in the field of cybersecurity. It focuses on lessons learned from incidents, procedures for resolving them, and recommendations for institutions.
Lecture – How an attacker got caught in our trap
- Type:
- Lecture
- Duration:
- 45 min
Annotation: The lecture describes real cases of cyber attacks captured using honeypots. Participants will learn about the individual phases of an attack – from reconnaissance to compromise to data exfiltration. The emphasis is on user errors and technical shortcomings that enabled the attack.
Cybercrime and social engineering
- Type:
- Lecture
- Duration:
- 45 min
Annotation: The lecture focuses on the different forms of cybercrime with a focus on social engineering techniques. Participants will learn how attackers manipulate victims, what techniques they most often use and how to protect themselves against them. The content is suitable for both students and IT professionals.
Protection of rights on the Internet
- Type:
- Lecture
- Duration:
- 45 min
Annotation: The lecture focuses on the protection of digital rights of Internet users. It addresses the topic of privacy, regulation, copyright and freedom of expression in the online space. There are examples of violations of rights and recommendations on how to protect yourself from their abuse.
Education in information security
- Type:
- Lecture
- Duration:
- 45 min
Annotation: The lecture focuses on the basics of information security, personal data protection according to the GDPR, and security threats such as social engineering, malware and password leaks. It contains practical advice for both users and organizations on how to protect themselves from attacks and how to properly manage passwords and access data.
Raising security awareness in the field of information security
- Type:
- Lecture
- Duration:
- 45 min
Annotation: The lecture focuses on practical aspects of information security for users. It contains an explanation of the concept of social engineering, examples of phishing attacks, fraudulent emails and manipulations. The emphasis is on proper password management, multi-factor authentication, safe use of mobile devices and recommendations for choosing a secure phone.
Current trends in social engineering
- Type:
- Lecture
- Duration:
- 45 min
Annotation: The lecture focuses on the latest trends in social engineering. It shows how attackers abuse trust, urgency, fake invoices, forged emails and technical support to obtain sensitive data. It contains real examples of fraud, phishing campaigns and recommendations for security measures.