Cybersecurity Master Annual Program 2024

Apply Now!

Time for cha(lle)nge!

You are already the cybersecurity specialist. It took you years to reach your current level, we appreciate it. Cybersecurity is a complex maze and we don’t have to convince you that industry is developing rapidly. Along with acquiring new skills, you must constantly update your knowledge. We can help you. If you want to dive deeper into your specialization or would like to step into the unknown and discover cybersecurity areas you don’t know much, then we have something for you – the Cybersecurity Master Annual Program 2024.

It is designed by CQURE Experts as a continuous learning program that will keep you on top of the latest developments in this ever-changing industry. Each month, you’ll explore new dimensions of cybersecurity to become a better version of yourself as a professional.

In the cybersecurity industry we appreciate theoreticians, but on the battlefield those who make the difference are defenders with a lot of practical experience. Our Experts have been dealing with online threats for many years, effectively supporting companies in the fight against criminals. Learn from the best and stay CQURE.

How is this training different from others?

Only the Newest Content

You’ll only learn crucial and relevant things. We run all workshops LIVE and always with the newest content to give you relevant industry skills.

Only the Most Effective Learning

We know you’re busy, so we’re not going to waste your time with high-level theory and irrelevant reading material. You’ll get to dive into juicy, practical stuff in our demo-intensive workshops for the most effective (and useful) learning.

Only PROVEN Tools and Techniques

It’s our mission to give you ONLY the proven tools and techniques that will position you as a credible cybersecurity specialist in the real world. Everything you’ll learn has been vetted by passionate practitioners from the CQURE team. 

Only cool experts!

The best part is you’ll get to learn from some of the best cybersecurity specialists in their field: Paula Januszkiewicz, Mike Jankowski-Lorek PhD, Sami Laiho, Michael Grafnetter, Artur Kalinowski, Ronald Harmsen, Piotr Pawlik, Damian Widera and Michał Furmankiewicz.

Course Formula


You’ll get access to the LIVE classes – 14 modules consisting of 8 hours of interactive and demo-intensive workshops on our special interactive platform.


You can enroll in separate modules or in the full program. The decision is yours.

Home-work assignments

You’ll get the author’s unique pre-work and post-work assignments for self-study.

12-Month Access

You’ll get a full year online access to the live sessions recording. The downloads are yours to keep.

Updated Knowledge

The course is packed with the newest cybersecurity findings, insights and tools.

Interactive classroom

You will be able to ask questions and engage with the experts during and after the workshop. 

Course Syllabus

Module 1

Securing Windows Platform: Windows 11 & Windows Server 2022

January 25, 2024

Students will recognize and disable unnecessary services, implement secure service accounts, rights, permissions and privileges:

  1. Defining and disabling unnecessary services
  2. Implementing secure service accounts
  3. Implementing rights, permissions and privileges
  4. Code signing

Module 2

Hardening Active Directory Infrastructure

February 29, 2024

Students will understand modern identity attack techniques, including the Pass-the-Hash, Pass-the-Ticket, Kerberoasting and others. Further, they will learn what can be done to mitigate the threat from such attacks and how to do it.

  1. Modern Identity Attack Techniques
  2. Preventing Credential Theft and Misuse
  3. Recommended AD Configuration Options
  4. OS-Level Credential Protection Features: LSA Protected Process,
  5. Credential Guard, and RDP Restricted Admin Mode
  6. Detecting Backdoors in Active Directory

Module 3

Mastering Public Key Infrastructure (PKI), Certificate Services

March 28, 2024

Students become familiar with cryptography basics and the essence of Public Key Infrastructure. Further CQURE Expert will show best practices for PKI architecture. Students will also learn about attacks on certificate infrastructure and mitigations.

  1. Cryptography basics
  2. Essence of PKI
  3. Best practices for PKI Architecture
  4. Active Directory Certificate Services Migration
  5. Attacks on Certificates Infrastructure & Mitigations

Module 4

Mastering Monitoring Operations in Azure

July 25, 2024

Students become familiar with Microsoft EDR and SIEM solutions.

  1. Microsoft 365 security from SOC Analyst perspective
  2. Microsoft 365 Defender for Endpoint – EDR story
  3. Detection and Response with Sentinel – Let’s attack Contoso network

Module 5

Implementing Privileged Access Workstations

May 30, 2024

Students will understand and be able to implement and manage On-Prem and Cloud-service Privileged Access Workstations.

  1. Privileged Access Workstations – how and why?
  2. Different hardware and VM solutions for implementing PAWs
  3. Difference between normal and privileged access
  4. Implementing and Managing On-prem PAWs
  5. Implementing and Managing Cloud-service PAWs

Module 6

Incident Response, Collecting and Analyzing Digital Evidence

June 27, 2024

Students will learn the general idea on good practices regarding the evidence gathering. They will be able to perform memory dumps, analyze them and recognize indicators of compromise. Students will also learn how to dump and analyze forensic data from disks, and how to properly extract as well as interpret evidence.

  1. Evidence Gathering
  2. Memory: Dumping and Analysis
  3. Memory: Indicators of compromise 
  4. Disk: dumping & analysis
  5. Disk: extracting and interpreting evidence

Module 7

Securing SQL Server

April 25, 2024

Students will understand SQL Server Security baseline and will be able to effectively manage logins and passwords for MS SQL servers.

  1. SQL Server Security Baseline Concepts
  2. SQL Server Instance Security
  3. Managing Logins & Passwords

Module 8

Mastering Code Security

August 29, 2024

The task to create and maintain secure applications, or fixing existing applications, can be difficult. It is no different for APIs. This module has been designed to give you an overview and working understanding of how to develop secure APIs and Web applications.

  1. Introduction to OWASP Secure Coding
  2. Authentication and Access Control
  3. Hardening your API and Web application

Module 9

Advancing at PowerShell for Security and Administration

September 26, 2024

Students will be able to utilize specific PowerShell tools related to security, such as DSInternals. They will learn advanced PowerShell features which will allow them to audit Active Directory for vulnerabilities.

  1. PowerShell security and specific hacktools (like DSInternals)
  2. Advanced PowerShell course
  3. Auditing Active Directory using PowerShell

Module 10

Implementing Secure Azure Active Directory

October 31, 2024

Students will become familiar with the most important Azure Active Directory security settings. After completing the module they will be able to implement: AAD Identity Protection, AAD PI and AAD Password Protection.

  1. Azure AD security settings
  2. AAD Identity Protection
  3. AAD Privileged Identity Management (PIM)
  4. AAD Password Protection

Module 11

Pentesting Web Applications

November 28, 2024

Students will become familiar with key aspects of web application pentesting. They will learn what vulnerabilities are often found in web apps and how they may be exploited. This knowledge can be useful both for offensive and defensive purposes – it might be interesting also to web app developers.

  1. Cross Site Scripting
  2. Injections
  3. Insecure File Handling
  4. Testing API

Module 12

Configuring Application Whitelisting

December 12, 2024

Students will be able to implement, manage and troubleshoot AppLocker.

  1. Whitelisting in General
  2. Implementing AppLocker
  3. Managing AppLocker
  4. Troubleshooting AppLocker

Module 13

Building Secure Cluster Infrastructure in the Cloud

March 14, 2024

Students will become familiar with all configuration parameters for the Azure Kubernetes Services from the security perspective. Further, they will learn how to plan optimal specification and design to secure cluster infrastructure by going through:

  1. Planning and designing the secure cluster infrastructure in Azure
  2. Securing DevOps pipeline for AKS
  3. Confidential computing with AKS

Module 14

Cyber Threat Intelligence

October 17, 2024

Students will become familiar with threat intelligence and modeling. Further, they will learn how to use open-source intelligence tools and techniques. During this module CQURE Experts will present different patterns attacks.

  1. Threat Intelligence, Assessment and Threat Modeling 
  2. Open-Source Intelligence Tools and Techniques
  3. Patterns of Attack
Apply Now!

Click here to browse the modules:


Paula Januszkiewicz

Founder and CEO of CQURE, MVP

Harvard Business School graduate, member of the Technical Advisory Board at the Royal Bank of Scotland/Natwest, and world-class cybersecurity Expert with over 19 years of experience in the field and access to the source code of Windows. She delivers keynotes and sessions at the biggest world conferences, being often a top-rated speaker. Together with her Team, she also designs security awareness programs, performs architecture consulting, and creates various security tools (CQTools).

Mike Jankowski-Lorek, PhD

CQURE Director of Consulting, Cybersecurity Expert, Trainer

Cybersecurity Expert with more than 20 years of experience in the field. Dr. Mike designs and implements solutions for organization identity and access, databases, network, as well as security monitoring and management. He also has a Ph.D. in Computer Science and since 2007, he has been a teacher at the Polish-Japanese Academy of Information Technology in Warsaw. His areas of expertise include Windows Infrastructure Security, cloud solutions, and Database Servers Security.

Michael Grafnetter


Michael is an expert on Active Directory security who works as a cybersecurity consultant, trainer, and researcher. He is best known as the author of the open-source Directory Services Internals (DSInternals) PowerShell module and Thycotic Weak Password Finder, tools used by security auditors and penetration testers worldwide. He holds a master’s degree in Software Engineering and is Microsoft MVP.

Sami Laiho


Sami Laiho is one of the world’s leading professionals in the Windows OS troubleshooting and security. Sami has been working with and teaching OS troubleshooting, management and security for more than 25 years. In 2018, Sami’s two sessions were evaluated as the Top 2 sessions (out of 1700+ sessions) at Microsoft Ignite in Orlando.

Ronald Harmsen

MCT, Solution & Software Architect

Ronald Harmsen is a solution architect, developer, trainer and speaker based in the Netherlands. Ronald has been active in professional software development since the mid-90s and has worked on projects for a range of large international companies as well as SME’s and startups. His focus is on delivering well engineered, maintainable and secure software. When not working on customer projects, Ronald consults and trains several teams in Scandinavia, UK, Netherlands & Belgium in achieving this by applying DevOps principles, Event Driven Architectures and Domain Driven Design. Currently he mainly works with technologies like Microsoft Azure, Kubernetes and software development in dotnet, building IoT and microservice based cloud-first systems. Ronald can also be found as a speaker on development conferences and meetups.

Artur Kalinowski


During almost 20 years of his IT career Artur developed his skills in cybersecurity from different perspectives. His experience ranges from a forensic analytics and a university lecturer to a security administrator. Artur worked for government, financial institutions and for global cybersecurity companies. He is an active member of Institute of Computer Forensics Association and an author of the book “Methods of surveillance and elements of computer forensics”.  His passion is music.  Artur is playing keyboard instruments and creates music with the use of software FL Studio. He likes reading about myths, legends and conspiracy theories.

Piotr Pawlik


Piotr Pawlik is CQURE’s Cybersecurity Expert, System Engineer and Unified Communications Expert with experience in design, implementation, and support for Microsoft solutions. During his work for Orange Business Services, Piotr was responsible for planning and deployment of security solutions for the biggest customers in Poland (insurance, banking, education and government sectors) and many customers located in Europe. Piotr’s main areas of expertise are: Microsoft Private Cloud (Hyper-V virtualization and System Center 2012), Microsoft Public Cloud (Office 365 and Azure), Microsoft Exchange Server 2010/2013, Lync Server 2010/2013, Office Communications Servers and Windows Server family. His additional experience includes disaster recovery, capacity planning, virtualization and business continuity. Excellent problem-solving skills and interpersonal skills.

Damian Widera


Software engineer with over 20 years of professional experience in all aspects of data platform development. He has participated in a number of projects in international environments and possesses practical knowledge of procedures and tools which are necessary for successful implementation of such projects. Damian currently focuses on building solutions based on Microsoft Azure environment including complex database driven systems, machine learning, big data processing, tuning and optimization. As an experienced trainer, speaker and columnist, he is always eager to take part in new engagements. In 2022, for the 14th time, he has been awarded Microsoft’s Data Platform MVP. In addition, he holds various Microsoft Certifications since 2004:  Microsoft Certified Trainer, Solution Developer and Application Developer for .NET, Database Administrator, Microsoft Certified Solutions Expert.

Michał Furmankiewicz


Experienced professional (with 16+ years in business) working in various roles as a consultant, architect and team leader, keen on problem-solving and business enablement through technology.
Michał has spent the last 10 years working with various Cloud technologies on the market helping customers to understand the broader concept, build solutions and get the business outcome. He’s very goal oriented and passionate about making things happen including whoever is required to make the job done.

Who Is It For

Ambitious Beginners in Cybersecurity

If you are a beginner with 1-2 years experience in cybersecurity, challenges define who you are. This training will hone your skills to detect today’s sophisticated cyberattacks and accelerate your career prospects in the field.

Specialists in IT

If you have 4-5 years experience in IT and want to spin off into cybersecurity, this training will give you all the relevant foundation and specialist skillsets to carve an exciting new career in cybersecurity. 

Cybersecurity Specialists

This program is relevant for specialists with 3-5 years and more. You will polish up your skills, learn the most current tools and techniques relevant for the newest systems, and boost your reputation.

If you need to register for the course while your company proceeds with formalities,
please contact us at

What CQURE Academy Students say

All of their classes are based on their real world experience with the products, not just the typical Official Curriculum style classes that teach you things for an exam, but that you will never use. You’ll find that all of the material you’ll learn in the class will be used, at some point, in your security career.

Jack Perry

Security Principal Consultant | Presidio

Totally professional, total great stuff, in-depth knowledge and a perfect Learning Atmosphere! I like it! Thanks so much for sharing your experience and knowledge!

Martin Weber

CTO | IT.innovation.4U GmbH

Let me start by saying Paula is amazing!! The passion for the topic really shows. As an engineer with 16 years of experience, I am impressed. Thank you for the education, and entertainment.

Dave Kordyban

Network Engineer | Garrett County Government

With “Cybersecurity Master Annual Program” You Will Get:

  1. A LIVE, online certification program divided into 14 modules and spread over 12 months. Additionally, you will receive an access to the bonus module 13 and 14, during which you will learn how to build secure cluster infrastructure in the cloud and become familiar with cyber threat intelligence!
  2. 14 x 8-hour workshops conducted LIVE every month on the last Thursday of each month (except for December, which will be conducted a week earlier) in EU time zones.
  3. The syllabus covers 14 modules to equip you with 14 essential cybersecurity skills for Windows systems: Securing Windows platforms, System forensics, Pentesting web applications, Hardening Active Directory infrastructure, Implementing privileged access workstations, Implementing secure Azure Active Directory, Mastering PKI, Mastering Code Security, Configuring application whitelisting, Empowering the Powershell, Mastering monitoring operations and threat intelligence, Securing SQL server.
  4. The workshops are interactive and demo-intensive. You’ll have the opportunity to ask questions after every workshop.
  5. All live workshops will be recorded and accessible for students any time in case you miss a live workshop or want to review what you’ve learned. You will have access to each workshop recording for 12 months after the live training.
  6. During the 12-month training, you’ll gain access to our exclusive Discord community server, where you can connect with other learners for networking activities, support for home assignments, motivation, and more.
  7. Official CQURE certificate for “Cybersecurity Master Annual Program”.
  8. With the flexibility to learn these certifiable skills online from qualified experts, there’s no excuse not to dive in and take your future into your own hands.
Join The Full 12-Month Program
  • 104 hours of live workshops
  • Includes 12 modules and bonus modules 13&14
  • Demo-intensive content from real case scenarios
  • Created by TOP industry experts
  • 12 months access
  • Discord community access
  • Pre-work assignment
  • Live-workshop and access to the recording
  • Home assignment
  • Final exam
Regular Price: $5999

Apply Now

Enroll In Modules By Your Choice
  • 8 hours of live workshop
  • Choose as many modules as you want
  • Demo-intensive content from real case scenarios
  • Created by TOP industry experts
  • 12 months access
  • Discord community access
  • Pre-work assignment
  • Live-workshop and access to the recording
  • Home assignment
Regular Price: $799

Choose Your Modules

Frequently Asked Questions