LET'S CHAT
ABOUT TRAINING
Aneta Jandziś
+48 516 824 029
aj@securitum.pl

Practical IT security training

GDPR from the perspective of a hacker OSINT/OPSEC live application hacking live network hacking IoT security network security monitoring Linux security AD security Windows security DDoS protection access to training recordings active ITsec community knowledge sharing platform regular trainings Sekurak.Academy preparation for the CEH exam advanced network security network security/penetration testing Active Directory security Windows security introduction to OWASP Top Ten web applications security mobile applications security frontend security REST API security advanced web applications security for programmers |testers | securitydepartments for system | network administrators introduction to IT security home Wi-Fi network security private equipment vs corporate equipment protection against ransomware smartphone security basics of a secure Office suite how to create secure passwords? how to protect against data leaks? QR codes AI voice attacks SMS attacks phishing common attacks on internet users FOR OFFICE WORKERS FOR IT SECURITY ADEPTS FOR IT DEPARTMENTS

Why US

Securitum training courses are conducted by IT security enthusiasts who love sharing their practical experience in this area. They always make sure that the knowledge provided is up-to-date, adapted to the various needs and proficiency levels of all participants.

Securitum has been present in the IT security industry since 2009. Continuously from 2010 onwards, as a company, and then a group of companies, it has been providing cybersecurity training and security audits.

It is distinguished by the fusion of these two areas of expertise: continuous knowledge acquisition and transfer along with its use in everyday work.

We carry out approximately 800 security audits and 130 training sessions annually.

This impressive number of projects proves that:

  • we train so effectively because we are practitioners examining thousands of security systems a year;
  • we audit so well because we are constantly training and improving our competences, following dynamic changes in the IT Security market.

We only invite people with outstanding knowledge in the field of cybersecurity to cooperate with us. Importantly, this knowledge results from their many years of practical experience. The core of the training team are Securitum auditors who, by performing hundreds of audits a year, always have up-to-date knowledge about current threats and ways to defend against them. We also cooperate with leading specialists in the cybersecurity market, valuing their knowledge, experience, as well as the ability to convey messages effectively and attractively to participants.

Our coaching team is outstanding in the market, because we are:

  • practitioners who on a daily basis conduct security audits, administer and maintain large IT networks, develop and implement advanced security policies, etc.;
  • speakers at significant industry conferences;
  • authors of the best-rated presentations and cited specialist articles;
  • the best bughunters of global systems;
  • holders of international certificates recognized in the IT world.

The distinctive Securitum training program is inspired by the professional experience of trainers. Learnings are also tailored to the needs and capabilities of the recipients to whom each of them is addressed. The issues discussed are often case studies built on experiences of pentesters, auditors, engineers and bughunters.

The Securitum training outshines the competition, as we have:

  • a unique program inspired by security errors from real systems;
  • constantly updated range of training (new types of attacks, new, real-life examples);
  • supplementing the program with new training resulting from newly emerging cyber threats (on average, several new training courses per year);
  • comprehensiveness of the offer allowing for the development of employees’ career paths – modules for beginners and advanced, discussion of cases from the everyday work of pentesters and bughunters;
  • working in the LAB on physical devices (routers, switches, cameras);
  • modification of the closed training agenda at the request of the Ordering Party.

Securitum training courses are tailored to the needs of recipients and their stage of development in the area of IT security: from the Sekurak Academy (intended mainly for people at the beginning of their cybersecurity career), to advanced training (intended for experts in the subject) or sessions finished with the international CEH certificate. Regardless of the level of proficiency, training offered by Securitum is always provided with access to additional materials and support from the instructors: online and onsite.

Especially in the case of workshop training the help of trainers is mainly provided by:

  • individual support during exercise;
  • showcase of various techniques to be used, guiding tips, assistance in solving technical problems on your own;
  • following the pace of work of the participants of a given edition;
  • time for participant's questions and group discussions.

The strength of Securitum is its practical approach to each topic: learning by doing and encouraging people to solve the problems discussed on their own, often in the form of proof-of-concept. It is attention to detail and sensitivity to every aspect of IT security in various scenarios that could be encountered in life.

The usefulness of the topics discussed in the everyday tasks performed by Securitum training participants is mainly guaranteed by:

  • understanding the process – thanks to the workshop format,
  • understanding the effects of various attacks,
  • remembering, practicing and later using the acquired information.

The founder of the company – Michał Sajdak – is recognizable in the Polish and foreign environment as a professional and very competent trainer, an excellent speaker, and effective pentester. Furthermore, he is an editor of the sekurak.pl portal, as well as books devoted to various IT security issues.

The Securitum team includes enthusiasts who follow their own paths, develop their interests every day, look for ways to know more the next day and then to use this knowledge or to pass it on. Their passion is contagious.

200+

Number of B2B clients

180+

TRAINING EDITIONS
IN 2023

50.000+

PARTICIPANTS IN ONLINE AND
ONSITE TRAINING in 2023

Securitum Books

Since 2019, Securitum has been publishing books in the IT security field. Their authors are Polish practitioners who deal with the discussed topics on a daily basis. A practical approach to the presented topics are hallmarks of these publications, as is the desire to provide the reader with the most important information, without excessive theory.

Securitum books

Introduction to IT Security

It is a good reference point for administrators, programmers, testers and managers who seriously consider delving into the IT security world.

Authors of chapters in volume 1

Łukasz Basa | Gynvael Coldwind | Tomasz Dacka | Marcin Dudek | Bartosz Jerzman | Konrad Jędrzejczyk | Wojciech Lesicki | Paweł Maziarz | Marcin Piosek | Iwona Polak | Piotr Ptaszek | Marek Rzepecki | Michał Sajdak | Wiktor Sędkowski | Grzegorz Trawiński | Tomasz Turba | Krzysztof Wosiński | Marek Zmysłowski

See alsoChapter: Penetration TestsContents
The first Securitum book

Security of Web Applications

The book collects basic information about security problems of web applications and discusses in detail the basic technical issues. It makes a solid foundation for a programmer, pentester or bughunter.

Authors

Michał Bentkowski | Artur Czyż | Rafał ‛bl4de’ Janicki | Jarosław Kamiński | Adrian ‛vizzdoom’ Michalczyk | Mateusz Niezabitowski | Marcin Piosek | Michał Sajdak | Grzegorz Trawiński | Bohdan Widła

See alsoChapter: Basics of the HTTP ProtocolChapter: Cross-Site Scripting (XSS) VulnerabilityContents

Opinions of participants

Feedback received after training sessions

Huge practical knowledge of the presenter.

It was great, best trainer ever :)

Great work, fluent live coding without just copy-pasting was really engaging.

Amazing job, especially interactive demos where we tried to exploit specially prepared systems.

Thank you! It was one of the best training sessions I participated in!

10/10, Michal is an expert at what he does, that much is obvious and he also has a flair for communicating & presenting.

Excellent, couldn't be better. Appreciated the good humour as well ;)

Extremely knowledgeable, great presentation skills.

Very good speaker who explains quite well things so the training is very accessible even if I'm not a technical champion. All was very clear and interesting, thanks again for that!

Deep knowledge of the whole browser stack by the trainer. Getting first-hand state-of-the-art knowledge on browser security from him.

I loved the fact that the training was not only touching some security basics, but also covering very sophisticated attacks.

The trainer did a very good job. You can see that he is an expert on the matter.

Trainers

Kamil Jarosiński Securitum

TOMASZ TURBA

  • Security specialist, in the IT industry since 2006, has gone through all career levels
  • Works at Securitum as a trainer, pentester and analyst
  • Author of cybersecurity training and winner of multiple awards for publications on IT security topics
  • Has cooperated with many institutions as a security consultant, pentester and GDPR inspector and has experience as head of the CSIRT team
  • Speaker during the Mega Sekurak Hacking Party
  • Editor at sekurak.pl
  • Editor of books published by Securitum
Michal Sajdak Securitum

Michał Sajdak

  • Creator of the sekurak.pl portal, founder of Securitum
  • Author of security researches described on Polish and foreign websites
  • Nearly 20 years of experience in the IT industry, holds CEH, CISSP and CTT+ certificates
  • Has been conducting IT security training in Poland and abroad for over 10 years
  • Managing editor of books published by Securitum
  • Speaker at conferences: Mega Sekurak Hacking Party, Secure, PWNing, PLNOG, Confidence, SEMAFOR, WTH, OWASP Poland
Michal Wnekowicz Securitum

Michał Wnękowicz

  • Security consultant and pentester at Securitum
  • Conducts Cyber Awareness training and lectures on many different security topics
  • Security Research Manager at Securitum Research Blog
  • Author publishing on sekurak.pl
  • Speaker at the Mega Sekurak Hacking Party, Sekurak Awareness Party conferences and at industry meetings, including but not limited to universities
Marek Rzepecki Securitum

Marek Rzepecki

  • Passionate about security, holds an OSCP certificate
  • Security consultant and pentester at Securitum
  • Specializes in hacking web applications, APIs, mobile applications and conducts DDoS attacks
  • At Securitum, he trains in network security, Cyber Awareness and web application security
  • After hours searches for vulnerabilities under bug bounty programs
  • Speaker at security conferences: Mega Sekurak Hacking Party, Confidence
  • One of the co-authors of the book Introduction to IT Security
Maciej Szymczak Securitum

Maciej Szymczak

  • IT security consultant at Securitum, ITSEC enthusiast with a passion for sharing knowledge
  • 12 years in IT, full-time pentester and trainer since 2017 – hundreds of completed projects and thousands of trained people in Poland and abroad
  • Speaker at Mega Sekurak Hacking Party conferences and online presentations
  • One of the co-authors of the book Introduction to IT Security
Krzysztof Wosinski Securitum

Krzysztof Wosiński

  • Certified IT systems security tester (Certified Ethical Hacker) specializing in military systems and open source intelligence (OSINT), in which he defended his PhD thesis in 2023
  • For several years has been dealing with issues of quality and safety of military hardware and software, produced for Polish and American customers
  • At Securitum, conducts training in the fields of OSINT, network security and counteracting disinformation
  • Author of popular series on the sekurak.pl website OSINT HINTS and Thursdays with OSINT
  • One of the co-authors of the book Introduction to IT Security
  • In his free time, explores issues related to social engineering and OSINT, and creates tools to improve open source intelligence
Kamil Jarosiński Securitum

Kamil Jarosiński

  • Security consultant and pentester at Securitum
  • Has been conducting penetration tests and training in the field of web application and API security for over 7 years
  • Passionate about IT system security and sharing knowledge
  • Speaker at industry conferences, including Mega Sekurak Hacking Party
  • Participant in bug bounty programs
  • One of the co-authors of the book Introduction to IT Security

FAQ

Currently open trainings are conducted remotely, and have the same program as stationary trainings. Participants perform the same exercises, the instructor is at their disposal throughout the duration of the training.

We train mainly via our YouTube channel (@sekurakTV) and Google Meet. On each platform, you can ask the trainer questions. In case of the closed training, we can use the platform used by the client.

We provide stationary training for closed groups of any sizes; all details are discussed with the client (companies/organizations, etc.).

Most of the training is available to participants in the form of video recordings. Some workshop training courses with available labs (e.g. CEH Exam Preparation or Network Security/Penetration Testing) are only available in live format and are not recorded. Information about the availability of video recordings are always provided in the training description.

Yes. We offer trainings of various levels of difficulty. For both beginners and those who already have experience in cybersecurity. Our training courses are marked with stars (from 1 to 3). Training with one star is at the beginner level, two - intermediate, and three - advanced. We especially encourage you to take an interest in our new project - the Sekurak Academy. There are at least 15 "live" training courses for participants each semester and an excellent community of "cybersecurity experts". They will be happy to address your questions, doubts or advice on professional development. At the Academy, trainings are of varying levels.

Yes. We often run various promotional campaigns. We encourage you to subscribe to our newsletter, which is the best source of information about trainings and discounts. Feel free to visit sekurak.pl and our social media to learn more.

Yes. We organize Mega Sekurak Hacking Party conferences once or twice a year. You can learn more about the event itself at hackingparty.pl.