top of page
 STM Academy Mural

STM Academy

Cybersecurity training for students, companies and state institutions.

In Poland, as of today, there are about 17,000 demands for positions in the Cybersecurity industry and everything indicates that this number will increase year by year.

 

Every year we face the problem of finding specialists in Cybersecurity, which is why we decided to conduct training ourselves for people who can start working in various positions in the field of cybersecurity, especially since we have the necessary tools and the best specialists in Poland._

wykładowca bugman STM Academy

OUR TEAM

Our team consists only of enthusiasts - experienced penetration testers and IT security researchers and programmers. We have two things in common: we love hacking and we want to share it. We believe that only through practical training, not only in defense but also in offense, you can keep pace with today's constantly changing world. In our opinion, one of the best ways to polish the techniques of finding and exploiting bugs is the international IT security competition called Capture The Flag.

Lecturers at STM Academy are members of the best Polish CTF groups. Together with them, we are successful in global struggles. Our greatest success in 2022 was "Poland Can Into Space" taking 1st place in the "Hack-a-Sat" competition organized by the US military.

FOR COMPANIES

dron STM Academy

Our course takes place in Warsaw at Campus Business Garden at ul. Żwirki i Wigury 16a.

Classes are held in a room equipped with the necessary equipment for each participant. There are two lecturers for each group - the main one and the supporting one. Groups may not exceed 20 people.

Classes are held on our proprietary cyber range platform - HackingDept. You will have access to it 24/7 during the training and 30 days after completing the course.

If you are interested in training that is not in our offer, we also have dedicated training. Contact us and we will prepare the training you need.

Trainings we have in our offer:

  • Mobile and web application security

  • Network and infrastructure security

  • Application security for developers

  • Red teaming

  • C code analysis and local exploitation

  • Malware analysis

bottom of page