{"id":1593784,"date":"2025-08-19T13:52:55","date_gmt":"2025-08-19T11:52:55","guid":{"rendered":"https:\/\/academy.asseco.pl\/?post_type=webinar&#038;p=1593784"},"modified":"2025-08-26T10:58:20","modified_gmt":"2025-08-26T08:58:20","slug":"ddos-jako-zaslona-dymna-wprowadzenie-do-ethical-hackingu","status":"publish","type":"webinar","link":"https:\/\/academy.asseco.pl\/en\/webinar\/ddos-jako-zaslona-dymna-wprowadzenie-do-ethical-hackingu\/","title":{"rendered":"DDoS jako zas\u0142ona dymna &#8211; Wprowadzenie do Ethical Hackingu"},"content":{"rendered":"<section class=\"o-section c-hero c-hero--secondary c-hero--normal  u-color--main-1 u-font--func-1 u-color--error-1 u-color-opacity-0 has-normal-font-size\"id=\"section_1\"\n>\n  \n\n    <div class=\"o-wrapper c-hero__container\">\n          <div class=\"c-breadcrumbs__wrapper o-layout__itemo-flex o-flex--grids u-hidden@less-then-large\">\n    <div class=\"o-flex__item u-flex-12\/12\">\n        <div class=\"c-breadcrumbs\"><span><span><a href=\"https:\/\/academy.asseco.pl\/en\/\">Asseco Academy<\/a><\/span><\/span><\/div>\n    <\/div>\n<\/div>        <div class=\"c-hero__content \">\n\n            <h2 class=\"c-heading c-heading--h1 c-hero__title u-margin-bottom-tiny \"><span style=\"text-shadow: 5px 5px 10px #000000;\">DDoS jako zas\u0142ona dymna <br \/>\r\n&#8211; Wprowadzenie do Ethical Hackingu<br \/>\r\n<\/span><\/h2>\n      <div class=\"c-hero__desc\">\n     \n<\/div>            \n      \n                <\/div>\n  <\/div>\n<\/section>\n\n\n<section class=\"o-section c-simple  has-normal-font-size \"id=\"section_2\"\n  >\n    <div class=\"o-wrapper \">\n    <div class=\"c-simple__container o-flex o-flex--grids o-flex--centered\">\n          <div class=\"c-simple__image o-flex__item    u-flex-6\/12@large   \">\n                                            <img decoding=\"async\" src=\"https:\/\/academy.asseco.pl\/wp-content\/uploads\/2025\/08\/Frame-34946641-1.webp\" alt=\"\" class=\" u-image--border-radius   u-image--box-shadow \"\/>\n                                    <\/div>\n          <div class=\"c-simple__content o-flex__item   u-flex-6\/12@large \">\n        <h2 class=\"c-heading c-heading--h2 c-simple__title \"><\/h2>                          <div class=\"c-simple__desc\">\n    <p><strong>Zapraszamy do udzia\u0142u w nadchodz\u0105cym webinarze!<\/strong><\/p>\n<p><strong>Data:<\/strong> 04.09.2025<br \/>\n<strong>Godzina:<\/strong> 18:00-19:00<br \/>\n<strong>Prowadz\u0105cy:<\/strong> Artur Grygoruk<\/p>\n \n<\/div>                                  <a\n    href=\"https:\/\/assecods.webex.com\/weblink\/register\/r4159585b1212d0ca286f2b7f3cca0489\"\n    target=\"\"\n        class=\"c-button c-button--error\n                                                                c-simple__cta\n    \"\n    >\n        Do\u0142\u0105cz do webinaru\n    <\/a>\n              <\/div>\n    <\/div>\n  <\/div>\n<\/section>\n\n\n<section class=\"o-section c-simple c-simple--alternative has-normal-font-size \"id=\"section_3\"\n  >\n    <div class=\"o-wrapper \">\n    <div class=\"c-simple__container o-flex o-flex--grids o-flex--centered\">\n          <div class=\"c-simple__image o-flex__item    u-flex-6\/12@large   \">\n                                            <img decoding=\"async\" src=\"https:\/\/academy.asseco.pl\/wp-content\/uploads\/2025\/08\/man-reviews-documents-while-video-call-570x400.jpg\" alt=\"DDoS od \u015brodka: poznaj atak i obron\u0119 IT\" class=\" u-image--border-radius   u-image--box-shadow \"\/>\n                                    <\/div>\n          <div class=\"c-simple__content o-flex__item   u-flex-6\/12@large \">\n        <h2 class=\"c-heading c-heading--h2 c-simple__title  u-font--error-1\">DDoS od \u015brodka: poznaj atak i obron\u0119 IT<\/h2>                          <div class=\"c-simple__desc\">\n    <p data-start=\"114\" data-end=\"354\">Czy wiesz, co zrobi\u0107, gdy Twoja strona, system lub aplikacja nagle przestaj\u0105 odpowiada\u0107? Chcesz zobaczy\u0107 atak DDoS \u201eod \u015brodka\u201d \u2013 oczami hakera? Ten webinar to praktyczne wprowadzenie do jednego z najcz\u0119stszych zagro\u017ce\u0144 w \u015bwiecie cyfrowym.<\/p>\n<p data-start=\"356\" data-end=\"627\">Poka\u017cemy, jak rozpozna\u0107 symptomy ataku, jakie s\u0105 jego typowe wektory i jak zespo\u0142y bezpiecze\u0144stwa reaguj\u0105 w pierwszych krytycznych minutach. Dowiesz si\u0119 te\u017c, jakie kompetencje pozwalaj\u0105 skutecznie chroni\u0107 infrastruktur\u0119 IT i jak rozwija\u0107 je w ramach etycznego hackingu.<\/p>\n \n<\/div>                              <\/div>\n    <\/div>\n  <\/div>\n<\/section>\n\n\n<section class=\"o-section c-simple  has-normal-font-size \"id=\"section_4\"\n  >\n    <div class=\"o-wrapper \">\n    <div class=\"c-simple__container o-flex o-flex--grids o-flex--centered\">\n          <div class=\"c-simple__image o-flex__item    u-flex-6\/12@large   \">\n                                            <img decoding=\"async\" src=\"https:\/\/academy.asseco.pl\/wp-content\/uploads\/2025\/08\/malicious-software-virus-cybercrime-system-warning-hacked-alert-cyberattack-online-network-data-breach-risk-website-compromised-information-concept.webp\" alt=\"Podczas webinaru\" class=\" u-image--border-radius   u-image--box-shadow \"\/>\n                                    <\/div>\n          <div class=\"c-simple__content o-flex__item   u-flex-6\/12@large \">\n        <h2 class=\"c-heading c-heading--h2 c-simple__title  u-font--error-1\">Podczas webinaru<\/h2>                          <div class=\"c-simple__desc\">\n    <p>1. Wprowadzenie \u2013 sk\u0105d si\u0119 bior\u0105 ataki DDoS i dlaczego s\u0105 tak gro\u017ane<br \/>\n2. Atak w praktyce \u2013 jak wygl\u0105da DDoS od \u015brodka<br \/>\n3. Jak reagowa\u0107 \u2013 pierwsze minuty podczas ataku<br \/>\n4. Od obrony do kompetencji \u2013 jak rozwija\u0107 si\u0119 jako Ethical Hacker<br \/>\n5. Q&amp;A \u2013 pytania uczestnik\u00f3w i rozmowa z ekspertem<\/p>\n<p>Webinar jest dla os\u00f3b technicznych i mened\u017cer\u00f3w IT, kt\u00f3rzy chc\u0105 lepiej zrozumie\u0107, jak wygl\u0105da cyberatak w praktyce i jak mu zapobiega\u0107.<\/p>\n \n<\/div>                              <\/div>\n    <\/div>\n  <\/div>\n<\/section>\n\n\n<section class=\"o-section c-icons has-normal-font-size u-padding-bottom-none \"id=\"section_5\"\n>\n  \n  <div class=\"o-wrapper c-icons__container \">\n\n            <h2 class=\"c-heading c-heading--h2 c-icons__title   u-font--error-1\">Prowadz\u0105cy<\/h2>    <div class=\"c-icons__desc\">\n    <p>&nbsp;<\/p>\n<div style=\"display: flex; align-items: center; background-color: white; border: 1px solid #ffffff; border-radius: 8px; box-shadow: 0 4px 8px rgba(0, 0, 0, 0.2); padding: 16px; max-width: 1200px; margin: 0 auto;\">\n<p>&nbsp;<\/p>\n<div style=\"flex-grow: 1; margin-right: 30px;\">\n<p style=\"color: #ff3b30; font-size: 1.5em; margin: 0;\"><img decoding=\"async\" class=\"wp-image-1552339 alignleft\" src=\"https:\/\/academy.asseco.pl\/wp-content\/uploads\/2025\/08\/Prelegent_zoom-18-300x300.webp\" alt=\"\" width=\"138\" height=\"138\" srcset=\"https:\/\/academy.asseco.pl\/wp-content\/uploads\/2025\/08\/Prelegent_zoom-18-300x300.webp 300w, https:\/\/academy.asseco.pl\/wp-content\/uploads\/2025\/08\/Prelegent_zoom-18-150x150.webp 150w, https:\/\/academy.asseco.pl\/wp-content\/uploads\/2025\/08\/Prelegent_zoom-18-350x350.webp 350w, https:\/\/academy.asseco.pl\/wp-content\/uploads\/2025\/08\/Prelegent_zoom-18.webp 400w\" sizes=\"(max-width: 138px) 100vw, 138px\" \/><strong>Artur Grygoruk<\/strong><\/p>\n<p data-start=\"65\" data-end=\"345\"><strong>Konsultant i ekspert ds. cyberbezpiecze\u0144stwa z ponad 10-letnim do\u015bwiadczeniem<\/strong> w bran\u017cy IT, pracuj\u0105cy w takich firmach jak Samsung, Orange, EY, Cisco Systems i NTT. Obecnie Senior Security Consultant w NTT Ltd, specjalizuje si\u0119 w technologii Cisco Firepower NGFW (CCNP Security). <strong>Akredytowany trener<\/strong> ISACA (CISM, CRISC) i EC-Council (CEH), posiadacz licznych certyfikat\u00f3w z zakresu bezpiecze\u0144stwa (m.in. ISSAP, CCSP, CSSLP, CISM, CRISC, CISA, PCNSE).<\/p>\n<\/div>\n<\/div>\n \n<\/div>        <div class=\"\">\n      <div class=\"c-icons__content  o-flex o-flex--grids o-flex--grids-stretched      \">\n              <\/div>\n    <\/div>\n      <\/div>\n<\/section>\n\n\n\n\n<section class=\"o-section js-postlist c-post-list  has-normal-font-size\"id=\"section_6\"\n>\n  <div class=\"c-loader  js-loader\">\n  <div class=\"lds-dual-ring\"><\/div>\n<\/div>\n    <div class=\"o-wrapper c-post-list__container o-flex o-flex--wrap\">\n                <h2 class=\"c-heading c-heading--h2 c-post-list__title u-flex-12\/12 u-text--center   u-font--error-1\">Szkolenia pog\u0142\u0119biaj\u0105ce zagadnienie<\/h2>                <div class=\"c-post-list__content o-flex__item u-flex-12\/12\">\n\n      \n      <div class=\"o-flex o-flex--grids o-flex--grids-stretched   js-postlist-posts\">\n                \n                                \n                            \n        \n    <div class=\"o-flex o-flex--centered\" style=\"width: 100%;\">\n              <p class=\"u-text--smaller\">Sorry, no articles in the selected category.<\/p>\n          <\/div>\n      <\/div>\n    <\/div>\n      <\/div>\n<\/section>\n\n\n\n\n<section class=\"o-section js-postlist c-post-list  has-normal-font-size\"id=\"section_7\"\n>\n  <div class=\"c-loader  js-loader\">\n  <div class=\"lds-dual-ring\"><\/div>\n<\/div>\n    <div class=\"o-wrapper c-post-list__container o-flex o-flex--wrap\">\n                <h2 class=\"c-heading c-heading--h2 c-post-list__title u-flex-12\/12 u-text--center   u-font--error-1\">Artyku\u0142y zwi\u0105zane z tematem<\/h2>                <div class=\"c-post-list__content o-flex__item u-flex-12\/12\">\n\n      \n      <div class=\"o-flex o-flex--grids o-flex--grids-stretched   js-postlist-posts\">\n                \n                                \n                            \n        \n      \n          <div class=\"c-post-list__item o-flex__item u-flex-1\/1 u-flex-1\/2@medium u-flex-1\/1@large  c-post-list__item--title-auto \">\n    \n            \n                      <a href=\"https:\/\/academy.asseco.pl\/learning-center\/nas-to-nie-dotyczy-polska-numerem-1-na-swiecie-w-atakach-ransomware\/\" class=\"o-link c-tease c-tease--learning-center c-tease--learning-center-postlist\">\n    <div class=\"o-flex o-flex--grids\">\n              <div class=\"o-flex__item u-flex-1\/1 u-flex-4\/12@large\">\n          <div class=\"c-tease__image   \" style=\"background-image: url(https:\/\/academy.asseco.pl\/wp-content\/uploads\/2025\/03\/ataki_hakerskie_artykul-270x160.webp)\">\n            <img decoding=\"async\" class=\"c-tease__image-elem\" src=\"https:\/\/academy.asseco.pl\/wp-content\/uploads\/2025\/03\/ataki_hakerskie_artykul-270x160.webp\" alt=\"\u201eNas to nie dotyczy\u201d &#8211; Polska na celowniku atak\u00f3w ransomware\"\/>\n          <\/div>\n        <\/div>\n            <div class=\"o-flex__item u-flex-1\/1 u-flex-8\/12@large\">\n        <div class=\"c-tease__content u-padding-vertical-big \">\n          <div class=\"o-flex o-flex--grids\">\n            <div class=\"o-flex__item u-flex-1\/2@large\">\n              <div class=\"c-tease__meta u-font-color--6 u-text--smallest\">\n                05.08.2025\n              <\/div>\n            <\/div>\n            <div class=\"o-flex__item u-flex-1\/2@large\">\n              <div class=\"c-tease__meta u-font-color--6 u-text--smallest u-text-right\">\n                \n              <\/div>\n            <\/div>\n          <\/div>\n          <h3 class=\"c-heading c-tease__title u-text-left\">\u201eNas to nie dotyczy\u201d &#8211; Polska na celowniku atak\u00f3w ransomware<\/h3>\n          <p class=\"c-tease__excerpt u-text--smallest u-text--regular \">\n            W pierwszej po\u0142owie 2025 roku Polska znalaz\u0142a si\u0119 na pierwszym miejscu na \u015bwiecie pod wzgl\u0119dem liczb&#8230;\n          <\/p>\n          <div class=\"o-flex o-flex--grids\">\n            <div class=\"o-flex__item u-flex-8\/12@large\">\n              <div class=\"c-tease__tags\">\n                              <\/div>\n            <\/div>\n            <div class=\"o-flex__item u-flex-4\/12@large\">\n              <div class=\"u-text-right c-tease__arrow\">\n                <span class=\"u-font-color--4 u-text--smaller\">Read more   <?xml version=\"1.0\" encoding=\"UTF-8\"?>\n<svg width=\"21px\" height=\"14px\" viewBox=\"0 0 21 14\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\">\n    <title>037A658E-A652-4E83-BB55-B03E10E31442<\/title>\n    <g id=\"Strony\" stroke=\"none\" stroke-width=\"1\" fill=\"none\" fill-rule=\"evenodd\">\n        <g id=\"Strona-Glowna---Biala\" transform=\"translate(-1204.000000, -2068.000000)\" fill=\"#00A3E0\">\n            <g id=\"panels\/glowna\/s3\" transform=\"translate(0.000000, 1294.000000)\">\n                <g id=\"kafelki\" transform=\"translate(375.000000, 217.000000)\">\n                    <g id=\"box\/czego-uczymy\" transform=\"translate(600.000000, 312.000000)\">\n                        <g id=\"ico\/arrow2\" transform=\"translate(229.000000, 245.000000)\">\n                            <polygon id=\"Path\" points=\"14.4564256 0 13.0478151 1.43307634 17.1865514 5.94919168 0 5.94919168 0 7.9758871 17.1865514 7.9758871 13.0478151 12.5669237 14.4564256 14 21 6.96247183\"><\/polygon>\n                        <\/g>\n                    <\/g>\n                <\/g>\n            <\/g>\n        <\/g>\n    <\/g>\n<\/svg><\/span>\n              <\/div>\n            <\/div>\n          <\/div>\n\n\n        <\/div>\n      <\/div>\n    <\/div>\n  <\/a>\n\n                    \n    <\/div>\n  \n      <\/div>\n    <\/div>\n      <\/div>\n<\/section>\n\n\n<div class=\"u-flex-12\/12\"><div class=\"o-wrapper u-padding-horizontal-none\">\n<p><\/p>\n<\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>Chcesz zobaczy\u0107 atak DDoS \u201eod \u015brodka\u201d oczami hakera? Ten webinar to praktyczne wprowadzenie do jednego z najcz\u0119stszych zagro\u017ce\u0144 w \u015bwiecie cyfrowym.<\/p>\n","protected":false},"featured_media":1593798,"parent":0,"menu_order":14,"template":"","class_list":["post-1593784","webinar","type-webinar","status-publish","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>DDoS jako zas\u0142ona dymna - Wprowadzenie do Ethical Hackingu<\/title>\n<meta name=\"description\" content=\"Czy wiesz, co zrobi\u0107, gdy Twoja strona, system lub aplikacja nagle przestaj\u0105 odpowiada\u0107? Chcesz zobaczy\u0107 atak DDoS \u201eod \u015brodka\u201d \u2013 oczami hakera? Ten webinar to praktyczne wprowadzenie do jednego z najcz\u0119stszych zagro\u017ce\u0144 w \u015bwiecie cyfrowym.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/academy.asseco.pl\/en\/webinar\/ddos-jako-zaslona-dymna-wprowadzenie-do-ethical-hackingu\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"DDoS jako zas\u0142ona dymna - Wprowadzenie do Ethical Hackingu\" \/>\n<meta property=\"og:description\" content=\"Czy wiesz, co zrobi\u0107, gdy Twoja strona, system lub aplikacja nagle przestaj\u0105 odpowiada\u0107? Chcesz zobaczy\u0107 atak DDoS \u201eod \u015brodka\u201d \u2013 oczami hakera? Ten webinar to praktyczne wprowadzenie do jednego z najcz\u0119stszych zagro\u017ce\u0144 w \u015bwiecie cyfrowym.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/academy.asseco.pl\/en\/webinar\/ddos-jako-zaslona-dymna-wprowadzenie-do-ethical-hackingu\/\" \/>\n<meta property=\"og:site_name\" content=\"Asseco Academy\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-26T08:58:20+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/academy.asseco.pl\/wp-content\/uploads\/2022\/07\/triathlon-running-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"724\" \/>\n\t<meta property=\"og:image:height\" content=\"483\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/academy.asseco.pl\/wp-content\/uploads\/2022\/07\/triathlon-running-1.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/academy.asseco.pl\/en\/webinar\/ddos-jako-zaslona-dymna-wprowadzenie-do-ethical-hackingu\/\",\"url\":\"https:\/\/academy.asseco.pl\/en\/webinar\/ddos-jako-zaslona-dymna-wprowadzenie-do-ethical-hackingu\/\",\"name\":\"DDoS jako zas\u0142ona dymna - Wprowadzenie do Ethical Hackingu\",\"isPartOf\":{\"@id\":\"https:\/\/academy.asseco.pl\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/academy.asseco.pl\/en\/webinar\/ddos-jako-zaslona-dymna-wprowadzenie-do-ethical-hackingu\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/academy.asseco.pl\/en\/webinar\/ddos-jako-zaslona-dymna-wprowadzenie-do-ethical-hackingu\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/academy.asseco.pl\/wp-content\/uploads\/2025\/08\/back-anonymous-robot-hacker-concept-hacking-cybersecurity-cybercrime-cyberattack-etc-scaled.webp\",\"datePublished\":\"2025-08-19T11:52:55+00:00\",\"dateModified\":\"2025-08-26T08:58:20+00:00\",\"description\":\"Czy wiesz, co zrobi\u0107, gdy Twoja strona, system lub aplikacja nagle przestaj\u0105 odpowiada\u0107? Chcesz zobaczy\u0107 atak DDoS \u201eod \u015brodka\u201d \u2013 oczami hakera? Ten webinar to praktyczne wprowadzenie do jednego z najcz\u0119stszych zagro\u017ce\u0144 w \u015bwiecie cyfrowym.\",\"breadcrumb\":{\"@id\":\"https:\/\/academy.asseco.pl\/en\/webinar\/ddos-jako-zaslona-dymna-wprowadzenie-do-ethical-hackingu\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/academy.asseco.pl\/en\/webinar\/ddos-jako-zaslona-dymna-wprowadzenie-do-ethical-hackingu\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/academy.asseco.pl\/en\/webinar\/ddos-jako-zaslona-dymna-wprowadzenie-do-ethical-hackingu\/#primaryimage\",\"url\":\"https:\/\/academy.asseco.pl\/wp-content\/uploads\/2025\/08\/back-anonymous-robot-hacker-concept-hacking-cybersecurity-cybercrime-cyberattack-etc-scaled.webp\",\"contentUrl\":\"https:\/\/academy.asseco.pl\/wp-content\/uploads\/2025\/08\/back-anonymous-robot-hacker-concept-hacking-cybersecurity-cybercrime-cyberattack-etc-scaled.webp\",\"width\":2560,\"height\":1463},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/academy.asseco.pl\/en\/webinar\/ddos-jako-zaslona-dymna-wprowadzenie-do-ethical-hackingu\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Asseco Academy\",\"item\":\"https:\/\/academy.asseco.pl\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Webinar\",\"item\":\"https:\/\/academy.asseco.pl\/en\/webinar\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"DDoS jako zas\u0142ona dymna &#8211; Wprowadzenie do Ethical Hackingu\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/academy.asseco.pl\/en\/#website\",\"url\":\"https:\/\/academy.asseco.pl\/en\/\",\"name\":\"Asseco Academy\",\"description\":\"Asseco Academy\",\"publisher\":{\"@id\":\"https:\/\/academy.asseco.pl\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/academy.asseco.pl\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/academy.asseco.pl\/en\/#organization\",\"name\":\"Asseco Academy\",\"url\":\"https:\/\/academy.asseco.pl\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/academy.asseco.pl\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/academy.asseco.pl\/wp-content\/uploads\/2020\/04\/asseco_academy.png\",\"contentUrl\":\"https:\/\/academy.asseco.pl\/wp-content\/uploads\/2020\/04\/asseco_academy.png\",\"width\":197,\"height\":26,\"caption\":\"Asseco Academy\"},\"image\":{\"@id\":\"https:\/\/academy.asseco.pl\/en\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"DDoS jako zas\u0142ona dymna - Wprowadzenie do Ethical Hackingu","description":"Czy wiesz, co zrobi\u0107, gdy Twoja strona, system lub aplikacja nagle przestaj\u0105 odpowiada\u0107? Chcesz zobaczy\u0107 atak DDoS \u201eod \u015brodka\u201d \u2013 oczami hakera? Ten webinar to praktyczne wprowadzenie do jednego z najcz\u0119stszych zagro\u017ce\u0144 w \u015bwiecie cyfrowym.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/academy.asseco.pl\/en\/webinar\/ddos-jako-zaslona-dymna-wprowadzenie-do-ethical-hackingu\/","og_locale":"en_US","og_type":"article","og_title":"DDoS jako zas\u0142ona dymna - Wprowadzenie do Ethical Hackingu","og_description":"Czy wiesz, co zrobi\u0107, gdy Twoja strona, system lub aplikacja nagle przestaj\u0105 odpowiada\u0107? Chcesz zobaczy\u0107 atak DDoS \u201eod \u015brodka\u201d \u2013 oczami hakera? Ten webinar to praktyczne wprowadzenie do jednego z najcz\u0119stszych zagro\u017ce\u0144 w \u015bwiecie cyfrowym.","og_url":"https:\/\/academy.asseco.pl\/en\/webinar\/ddos-jako-zaslona-dymna-wprowadzenie-do-ethical-hackingu\/","og_site_name":"Asseco Academy","article_modified_time":"2025-08-26T08:58:20+00:00","og_image":[{"width":724,"height":483,"url":"https:\/\/academy.asseco.pl\/wp-content\/uploads\/2022\/07\/triathlon-running-1.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_image":"https:\/\/academy.asseco.pl\/wp-content\/uploads\/2022\/07\/triathlon-running-1.jpg","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/academy.asseco.pl\/en\/webinar\/ddos-jako-zaslona-dymna-wprowadzenie-do-ethical-hackingu\/","url":"https:\/\/academy.asseco.pl\/en\/webinar\/ddos-jako-zaslona-dymna-wprowadzenie-do-ethical-hackingu\/","name":"DDoS jako zas\u0142ona dymna - Wprowadzenie do Ethical Hackingu","isPartOf":{"@id":"https:\/\/academy.asseco.pl\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/academy.asseco.pl\/en\/webinar\/ddos-jako-zaslona-dymna-wprowadzenie-do-ethical-hackingu\/#primaryimage"},"image":{"@id":"https:\/\/academy.asseco.pl\/en\/webinar\/ddos-jako-zaslona-dymna-wprowadzenie-do-ethical-hackingu\/#primaryimage"},"thumbnailUrl":"https:\/\/academy.asseco.pl\/wp-content\/uploads\/2025\/08\/back-anonymous-robot-hacker-concept-hacking-cybersecurity-cybercrime-cyberattack-etc-scaled.webp","datePublished":"2025-08-19T11:52:55+00:00","dateModified":"2025-08-26T08:58:20+00:00","description":"Czy wiesz, co zrobi\u0107, gdy Twoja strona, system lub aplikacja nagle przestaj\u0105 odpowiada\u0107? Chcesz zobaczy\u0107 atak DDoS \u201eod \u015brodka\u201d \u2013 oczami hakera? Ten webinar to praktyczne wprowadzenie do jednego z najcz\u0119stszych zagro\u017ce\u0144 w \u015bwiecie cyfrowym.","breadcrumb":{"@id":"https:\/\/academy.asseco.pl\/en\/webinar\/ddos-jako-zaslona-dymna-wprowadzenie-do-ethical-hackingu\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/academy.asseco.pl\/en\/webinar\/ddos-jako-zaslona-dymna-wprowadzenie-do-ethical-hackingu\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/academy.asseco.pl\/en\/webinar\/ddos-jako-zaslona-dymna-wprowadzenie-do-ethical-hackingu\/#primaryimage","url":"https:\/\/academy.asseco.pl\/wp-content\/uploads\/2025\/08\/back-anonymous-robot-hacker-concept-hacking-cybersecurity-cybercrime-cyberattack-etc-scaled.webp","contentUrl":"https:\/\/academy.asseco.pl\/wp-content\/uploads\/2025\/08\/back-anonymous-robot-hacker-concept-hacking-cybersecurity-cybercrime-cyberattack-etc-scaled.webp","width":2560,"height":1463},{"@type":"BreadcrumbList","@id":"https:\/\/academy.asseco.pl\/en\/webinar\/ddos-jako-zaslona-dymna-wprowadzenie-do-ethical-hackingu\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Asseco Academy","item":"https:\/\/academy.asseco.pl\/en\/"},{"@type":"ListItem","position":2,"name":"Webinar","item":"https:\/\/academy.asseco.pl\/en\/webinar\/"},{"@type":"ListItem","position":3,"name":"DDoS jako zas\u0142ona dymna &#8211; Wprowadzenie do Ethical Hackingu"}]},{"@type":"WebSite","@id":"https:\/\/academy.asseco.pl\/en\/#website","url":"https:\/\/academy.asseco.pl\/en\/","name":"Asseco Academy","description":"Asseco Academy","publisher":{"@id":"https:\/\/academy.asseco.pl\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/academy.asseco.pl\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/academy.asseco.pl\/en\/#organization","name":"Asseco Academy","url":"https:\/\/academy.asseco.pl\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/academy.asseco.pl\/en\/#\/schema\/logo\/image\/","url":"https:\/\/academy.asseco.pl\/wp-content\/uploads\/2020\/04\/asseco_academy.png","contentUrl":"https:\/\/academy.asseco.pl\/wp-content\/uploads\/2020\/04\/asseco_academy.png","width":197,"height":26,"caption":"Asseco Academy"},"image":{"@id":"https:\/\/academy.asseco.pl\/en\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/academy.asseco.pl\/en\/wp-json\/wp\/v2\/webinar\/1593784","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/academy.asseco.pl\/en\/wp-json\/wp\/v2\/webinar"}],"about":[{"href":"https:\/\/academy.asseco.pl\/en\/wp-json\/wp\/v2\/types\/webinar"}],"version-history":[{"count":0,"href":"https:\/\/academy.asseco.pl\/en\/wp-json\/wp\/v2\/webinar\/1593784\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/academy.asseco.pl\/en\/wp-json\/wp\/v2\/media\/1593798"}],"wp:attachment":[{"href":"https:\/\/academy.asseco.pl\/en\/wp-json\/wp\/v2\/media?parent=1593784"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}