Join All-New FREE 5-Day Challenge by Paula Januszkiewicz & CQURE Academy Experts “Do Cyber Security like a PRO”

5 Days. 5 Scenarios. 5 Exclusive CQURE exercise files. 5 Challenging Assignments.
1 Purpose


“Give us 5 days, and we’ll teach you 5 major skills that will jumpstart your journey to becoming a Windows Security Pro.

I’m not even kidding. With our unique CQURE Academy approach, you’ll not only be challenged with real-life case scenarios and deep skill learning modules but you’ll also be among like-minded peers.

So you better suit up, because it’s going to be intense (and also fun!).”

Paula Januszkiewicz
CQURE Academy Founder


I have attended CQURE’s training as someone who is not a security professional, but just an enthusiast, and I feel like I learned a A LOT. The whole training was loaded with information and nice demos of the latest technologies. On top of that — having an opportunity to ask and talk to professionals was priceless.

Marek Chmel

SQL Server DBA | AT&T

Totally professional, total great stuff, in-depth knowledge and a perfect Learning Atmosphere! I like it! Thanks so much for sharing your experience and knowledge!

Martin Weber

CTO | IT.innovation.4U GmbH

All of their classes are based on their real world experience with the products, not just the typical Official Curriculum style classes that teach you things for an exam, but that you will never use. You’ll find that all of the material you’ll learn in the class will be used, at some point, in your security career.

Jack Perry

Security Principal Consultant | Presidio

Course by CQURE Academy is a great course. Intense, deep and revealing. As it also happened before, Paula Januszkiewicz knows how to blow your mind. Even though I am fully aware of how much I still don’t know, after a course such as this Windows is not mysterious anymore.

Doru-Catalin Togea

Information Security Advisor | Norwegian Police

Let me start by saying Paula is amazing!! The passion for the topic really shows. As an engineer with 16 years of experience, I am impressed. Thank you for the education, and entertainment.

Dave Kordyban

Network Engineer | Garrett County Government

We have learned a lot about IIS, hacking and much much more. Our motivation has increased during this course and of course great interest in your work Paula. Impressed with your enthusiastic energic way of presenting.

Styrk Finne

Senior Professional System Engineer | CSC Norway


How does this Challenge work?

We’ve cut out all the unnecessary extras. Everyday, for 5 days, you’ll receive an email with your assignment for the day. Each assignment comes with a scenario, exclusive CQURE exercise file to download, and instructions. Watch the video and read the instructions. Complete the assignment. And crack on… At NO cost.

We’ve made sure each assignment teaches you the important skills you need to have in order to Do Cyber Security like a PRO that produces results that matter.

DAY 1 – LAYING GROUNDWORK Stand in the hacker's shoes and try to bypass LSASS protection to dump lsass.exe memory

In this challenge you will have an opportunity to stand in the hacker’s shoes and try to bypass LSASS protection to dump lsass.exe memory!
You will have an opportunity to learn not only how to extract some information from LSA, but also, you will have to discover what protection has been used and how could it be bypassed.
After successfully completing the challenge, think how to be smarter and protect lsass.exe better.

DAY 2 – STEPPING IT UP Discover File System Virtualization mechanisms

Here your task will be to discover File System Virtualization mechanism and use it to make the app prepared by us running fine in the user context. You will have a chance to learn how to run application with standard user privileges even though it’s requiring an access to some restricted directories.

DAY 3 – *CRACKS KNUCKLES* Become the investigator and use various techniques to break the password!

In this challenge things are getting a little mysterious.
Firstly, you will have to discover the file type and extract it’s content. That will allow you to find further steps and try to hack into protected database containing secrets needed to send us the solution.
You will have to use various useful techniques to discover the file type, break some password and digitally sign your answer.

DAY 4 – ROLL UP YOUR SLEEVES! What the attacker has hidden? Tools behind the real incidents and investigations.

In this challenge, your task would be to discover some hidden persistence mechanisms left by the attacker.
The only thing you would know at the beginning is that somehow, new account is being added despite the fact you are deleting it!
To complete the challenge, you will have to use some techniques and tools used during real incidents and investigations.

DAY 5 – OH, THINGS ARE HOT IN HERE! That hacker was persistent! Discovering Persistence Mechanisms #2

On the last day, your task would be to discover some hidden persistence mechanisms left by the attacker.
The only thing you would know at the beginning is that somehow, during each logon, a file is being created on your desktop.
To complete the challenge, you will have to use some techniques and tools used during real incidents and investigations.

Your teachers

We’re a team of security researchers, working a lot as security consultants in enterprises, medium and small business environments. We are passionate about our craft and always excited about learning and growing. Yes, CQURE experts might be in high demand but we always have time to share our expertise with you. We’ll do our best to be your mentors for the next 5 days.

Paula Januszkiewicz


Paula Januszkiewicz, MVP, MCT and Microsoft Reginal Director has 15 years of experience in the cybersecurity field, performing penetration tests, architecture consulting, trainings and seminars. She has performed hundreds of security projects, including those for governmental organizations and big enterprises, at the same time being a top speaker and a keynote speaker at many well-known conferences, including Microsoft Ignite (rated No 1 Speaker among 1100 speakers at a conference with 26000 attendees), RSA (in 2017 in San Francisco her session was one of the 5 hottest sessions), Black Hat, CyberCrime etc., where she is often rated as No 1 speaker. Her presentations gather thousands of people. In 2019, Paula’s presentation was voted best of Black Hat Asia 2019 Briefings!

Miłosz Piasecki


Miłosz Piasecki is CQURE’s prodigy Cybersecurity Specialist and aspiring team leader with his main focus being programming, networking and most of all Windows security. Miłosz is an enthusiastic, hard-working individual with an interest in social engineering, penetration testing, cryptography and virtualization-based technologies. At CQURE his is also responsible for demos design and creation, building virtual labs and developing scripts. Privately Miłosz is interested in social influence mechanisms, enjoys travelling, skiing, motorcycling and archery.

Who Is It For

The Windows Security Newbie

If you have less than 2 years of experience in Windows systems but are committed to level up in Windows Security, then really, this challenge is perfect for you. We cover the basics, but also give you enough knowledge that you can apply it immediately in your organisation.

The Windows Specialists

We know that you already have tons of experience with Windows systems. However you want to expand your career and are eager to explore the world of cybersecurity. This is a great place to start.

Ye ol’ Windows Security Veterans

You’ve been at it for years, you’ve got tons of knowledge, but are willing to evaluate your current level and get relevant knowledge. You know IT changes at lightning pace, so you want to stay up-to-date in the cybersecurity field.