
Slajdy z pierwszych wprowadzających zajęć
| Data | Slot | Temat | Prelegent | Materiały |
|---|---|---|---|---|
| Seria 1 | ||||
| 15.10 | 1 i 2 | Introduction Ethical Hacking | Emilia W. | ... |
| 22.10 | 1 | Hacking Wireless Networks | Artur B. | ... |
| 2 | Cryptography | Olga Z. | ... | |
| 29.10 | 1 | 0-days and their exploits overview | Wiktor O. | ... |
| 2 | OSINT & Disinformation introduction | Helena R. | ... | |
| 05.11 | 1 | APT groups | Leon L. | ... |
| 2 | Social Engineering | Jakub K. | ... | |
| 3 | Darknet overview | Franciszek P. | ... | |
| 12.11 | 1 | XSS, CSRF, SSRF | Kuba W. | ... |
| 2 | Blockchain attacks | Mikołaj D. | ... | |
| 19.11 | - | - | - | ... |
| 03.12 | 1 | TOR project overview | Damian S. | ... |
| 2 | Ransomware with examples | Grzegorz S. | ... | |
| 10.12 | 1 | Blockchain security introduction | Maja O. | ... |
| 2 | Blind signatures | Jan L. | ... | |
| 3 | Metasploit introduction | Miłosz W. | ... | |
| Seria 2 | ||||
| 17.12 | 1 | Denial of Service | Artur B. | ... |
| 2 | Leon L. | ... | ||
| 07.01 | 1 | E-voting systems | Jakub K. | ... |
| 2 | Cloud Computing | Damian S. | ... | |
| 3 | Cryptanalysis | Olga Z. | ... | |
| 14.01 | 1 | SQL Injection | Helena R. | ... |
| 2 | Malware Threats | Wiktor O. | ... | |
| 3 | Vulnerability Analysis | Jan L. | ... | |
| 21.01 | 1 | Reconnaissance and Footprinting | Maja O. | ... |
| 2 | Smart contracts | Mikołaj D. | ... | |
| 3 | Hacking Mobile Devices & Platforms | Leon L. | ... | |
| 28.01 | 1 | Hacking IoT | Jakub W. | ... |
| 2 | Evading IDS, Firewalls, and Honeypots | Franciszek P. | ... | |
| 04.02 | 1 | Scanning Networks | Grzegorz S. | ... |
| 2 | ... | |||