• Services
    ▼
    • PENETRATION TESTS
      ▼
      • Web Application Penetration Testing
      • Mobile Application Penetration Testing
      • IoT Penetration Testing
      • Network Infrastructure Penetration Testing
      • Vulnerability Scanning
      • Source Code Vulnerability Review
    • RED TEAMING & SOCIAL ENGINEERING
      ▼
      • Blue Team – Incident Response Processes
      • Social Engineering
      • Threat-Led Penetration Testing (TLPT)
      • OSINT – Open Source Intelligence
      • CyberAwareness Employee Training
    • CYBERSECURITY, ISO & COMPLIANCE
      ▼
      • ISO Standards Implementation
      • Ensuring Regulatory Compliance
      • vCISO
  • Trainings
  • Products
  • EU Projects
  • Case studies
  • Blog
  • About us
  • Contact
  • Polish
  • English
CyberForces
  • Services
    • PENETRATION TESTS
      • Web Application Penetration Testing
      • Mobile Application Penetration Testing
      • IoT Penetration Testing
      • Network Infrastructure Penetration Testing
      • Vulnerability Scanning
      • Source Code Vulnerability Review
    • RED TEAMING AND SOCIAL ENGINEERING
      • Red Teaming
      • Blue Team – Incident Response Processes
      • Social Engineeringphishing, smishing, vishing, physical entry (infiltration)
      • Threat-Led Penetration Testing (TLPT)
      • OSINT – Open Source Intelligence
      • CyberAwareness Employee Training
    • CYBERSECURITY, ISO AND COMPLIANCE
      • ISO Standards ImplementationISO 27001, ISO 22301, ISO 9001, ISO 42001, ISO 31000, ISO 27017
      • Ensuring Regulatory ComplianceNIS2, ISO /SOC2, PCI DSS, BAFA
      • vCISO
  • Trainings
  • Products
  • EU Projects
  • Resources
    • Case studies
    • Blog
  • About us
  • Contact
  • Polish
  • English
Select Page

Trainings Categories

  • Business Training
    • Cybersecurity
    • Project Management
    • Project Tools
    • Soft Skills
  • IT Training
    • Artificial Intelligence (AI)
    • Certification
    • Cybersecurity
    • Programming
    • Testing and Automation
    • UX and Design

Duration

  • 1 day (4 hours) (1)
  • 1 day (7 hours) (1)
  • 1 day (8 hours) (13)
  • 2 days (14 hours) (25)
  • 2 days (16 hours) (23)
  • 3 days (21 hours) (17)
  • 3 days (24 hours) (4)
  • 3-5 hours (1)
  • 5 days (35 hours) (5)

Format

  • Business Simulation (1)
  • Case study (22)
  • Discussions (1)
  • Exercises (76)
  • Group Work (12)
  • Lectures (58)
  • Live Hacking (4)
  • On-site (1)
  • Online (1)
  • Penetration testing (1)
  • Presentations (59)
  • Workshops (43)

Level

  • Advanced (52)
  • Basic (1)
  • Beginner (74)
  • Intermediate (54)
Home / Katalog szkoleń

Showing 82–90 of 91 results

  • Placeholder

    JavaScript programming

    View more
  • Placeholder

    ABC of Artificial Intelligence

    View more
  • Placeholder

    AI adoption and transformation without stress and anxiety – training for management and HR staff

    View more
  • Placeholder

    AI adoption and transformation without stress and anxiety – for employees

    View more
  • Placeholder

    Increase efficiency with AI – automate simple tasks in your daily work

    View more
  • Placeholder

    AI and Security Awareness – How to Safely Use Artificial Intelligence Tools

    View more
  • Placeholder

    UX

    View more
  • Placeholder

    Design Ops – design operations

    View more
  • Placeholder

    Design System Management

    View more
  • ←
  • 1
  • 2
  • 3
  • …
  • 7
  • 8
  • 9
  • 10
  • 11
  • →
  • Follow
  • Follow
  • Follow

Services

Penetration tests

Trainings

Products

Red Teaming and Social Engineering

Security Audits

Company

About us

Contact

Privacy Policy

Knowledge base

Blog

Case studies

Contact us

 [email protected]
 +48 881 369 112

TestArmy Group S.A. 9/5 Petuniowa, 53-238 Wrocław, Poland