-
INTRODUCTION
-
Orientation Seminar - 9 April 2026
- CWF - FoS - 0.1 - Slides.pdf
-
Starter Kit
-
Zoom Link Cohort Spring 2026
-
CWF Book List
-
-
MODULE 1 - INTRODUCTION TO CYBERSECURITY
-
1.1 - The Lattice Framework
- CWF - FoS - 1.1 - Slides.pdf
-
1.2 - Anatomy of a Computer and Network
- CWF - FoS - 1.2 slides
-
1.3 - Threats, Attacks and Mitigation
- CWF - FoS - 1.3 - Slides.pdf
-
1.4 - Cybersecurity Hygiene
- CWF - FoS - 1.4 - Slides.pdf
-
Module 1 - Supporting Material
- 1.1 - The Informational Interview Playbook
- 1.1 - SSCP Exam Outline
- 1.1 - NICE Framework Resource Center
- 1.1 - Cybersecurity Domain Map Henri Jiang
- 1.1 - SANS_AI_CyberSecurity_Careers_Poster_V1.pdf
- 1.1 - Mapping NIS2 Obligations_summary.docx
- 1.1 - Mapping NIS 2 obligations with ECSF role profiles-1.pdf
- 1.1 - European Cybersecurity Skills Framework Role Profiles-2.pdf
- 1.2 - How the Internet Works
- 1.2 - Crash Course on Computer Networks
- 1.2 - Computer Explained in 3 Minutes
- 1.2 - Computer Basics
- 1.3 - The Evolution of Malware
- 1.3 - The Cyber Kill Chain
- 1.3 - Stuxnet
- 1.3 - Steel Mill
- 1.3 - MITRE APT Attack Groups
- 1.3 - ENISA Threat Landscape Report 2024
- 1.3 - Bank of Bangladesh
-
Module 1 - Knowledge Test
- Module 1 Knowledge Test
-
-
MODULE 2 - SECURITY OPERATIONS, ADMINISTRATION AND ACCESS CONTROL
-
2.1 - Security Operations Concepts
- CWF - FoS - 2.1 - Slides.pdf
- Module_2_1_Handout.pdf
-
2.2 - Security Operations Processes
- CWF - FoS - 2.2 - Slides.pdf
- Module_2_2_Handout.pdf
-
Module 2.1 & 2.2 - Reading Assignment A (Security Operations)
- READING ASSIGNMENT_Equifax Case Study.pdf
- READING ASSIGNMENT_ Target case study.pdf
- READING ASSIGNMENT_ Maersk case study (by M. Hypponen).pdf
-
Module 2.1 & 2.2 - Supporting Material (Security Operations)
- 2.1 - MITRE.pdf
- 2.1 - ENISA.pdf
- 2.2 - Microsoft.pdf
- m-trends-2026-en.pdf
-
Module 2.1 & 2.2 Knowledge Test
- https://forms.office.com/e/t3aqJEs21c
-
Module 2.1 & 2.2 - Live Seminar A (Security Operations)
- CWF-FoS-2.1-Security Operations and Administration-virtual seminar.pdf
-
2.3 - Access Control Concepts
- Module 2.3 - Video A
- Module 2.3 - Video B
- Module 2.3 - Video C
- CWF - FoS - 2.3 - Slides.pdf
-
2.4 - Access Control Processes
- CWF - FoS - 2.4 - Slides.pdf
- Video A
- Video B
- Video C
-
Module 2.3 & 2.4 - Supporting Material (Access Control)
- 2.3 - OpenID.pdf
- 2.3 - CapitalOne.pdf
- 2.4 - NIST.pdf
- 2.4 - Zero Trust.pdf
- 2.4 - Zero Trust (AI summ).docx
-
Module 2.3 & 2.4 - Live Seminar B (Access Control)
-
Module 2.3 & 2.4 - Knowledge Test (Access Control)
- https://forms.cloud.microsoft/e/F4mnHWh47b
-
Module 2.3 & 2.4 - Reading Assignment B (Access Control)
- Capitol One_Reading Assignment
- snowden_nsa.pdf
-
-
MODULE 3 - CRYPTOGRAPHY
-
3.1 - Fundamentals and Cryptographic Methods
- CWF - FoS - 3.1 - Slides.pdf
-
3.2 - PKI and Integrity
- CWF - FoS - 3.2 - Slides.pdf
-
Module 3 - Supporting Material
- 3.1 - Philip Zimmermann
- 3.1 - NIST Key Management Guidelines
- 3.1 - Encryption Modes and Attacks
- 3.2 - OWASP Top 10 - Cryptographic Failures
- 3.2 - NIST Quantum Cryptography
- 3.2 - Example of a key ceremony script.pdf
- 3.2 - CSC-WP-Post-Quantum-Crypto_300925_FINAL.pdf
- ReadMe
- 3.1 - RSA Hack.pdf
-
3.2 - PKI and Integrity
In this video we will dive deeper into public key infrastructures, and the concept of integrity in crypto. If you would like to dive deeper into some additional learning material that supports this session, please refer to Module 3 - Supporting Material.
Rating
0
0
There are no comments for now.
Additional Resources
Content only accessible to course attendees.