Workshop by Piotr Goetzen with security topics

IT job market - how to plan the future
Threads in IT systems: sniffing, "is encrypted traffic secure?", social engineering, phishing, etc.
Attacking the identity: key loggers, identity and access management, shoulder surfing, spoofing, attacks to passwords, "what does Internet now about us?"
Ethical hacking
Golden rules for Internet security
Being in the cloud (development of IT systems from PC-via-VM-Cloud/containers)
Threads in IT systems: sniffing, "is encrypted traffic secure?", social engineering, phishing, etc.
Attacking the identity: key loggers, identity and access management, shoulder surfing, spoofing, attacks to passwords, "what does Internet now about us?"
Ethical hacking
Golden rules for Internet security
Being in the cloud (development of IT systems from PC-via-VM-Cloud/containers)