-
INTRODUCTION
-
Orientation Seminar - 9 April 2026
- CWF - FoS - 0.1 - Slides.pdf
-
Starter Kit
-
Zoom Link Cohort Spring 2026
-
CWF Book List
-
-
MODULE 1 - INTRODUCTION TO CYBERSECURITY
-
1.1 - The Lattice Framework
- CWF - FoS - 1.1 - Slides.pdf
-
1.2 - Anatomy of a Computer and Network
- CWF - FoS - 1.2 slides
-
1.3 - Threats, Attacks and Mitigation
- CWF - FoS - 1.3 - Slides.pdf
-
1.4 - Cybersecurity Hygiene
- CWF - FoS - 1.4 - Slides.pdf
-
Module 1 - Supporting Material
- 1.1 - The Informational Interview Playbook
- 1.1 - SSCP Exam Outline
- 1.1 - NICE Framework Resource Center
- 1.1 - Cybersecurity Domain Map Henri Jiang
- 1.1 - SANS_AI_CyberSecurity_Careers_Poster_V1.pdf
- 1.1 - Mapping NIS2 Obligations_summary.docx
- 1.1 - Mapping NIS 2 obligations with ECSF role profiles-1.pdf
- 1.1 - European Cybersecurity Skills Framework Role Profiles-2.pdf
- 1.2 - How the Internet Works
- 1.2 - Crash Course on Computer Networks
- 1.2 - Computer Explained in 3 Minutes
- 1.2 - Computer Basics
- 1.3 - The Evolution of Malware
- 1.3 - The Cyber Kill Chain
- 1.3 - Stuxnet
- 1.3 - Steel Mill
- 1.3 - MITRE APT Attack Groups
- 1.3 - ENISA Threat Landscape Report 2024
- 1.3 - Bank of Bangladesh
-
Module 1 - Knowledge Test
- Module 1 Knowledge Test
-
-
MODULE 2 - SECURITY OPERATIONS, ADMINISTRATION AND ACCESS CONTROL
-
2.1 - Security Operations Concepts
- CWF - FoS - 2.1 - Slides.pdf
- Module_2_1_Handout.pdf
-
2.2 - Security Operations Processes
- CWF - FoS - 2.2 - Slides.pdf
- Module_2_2_Handout.pdf
-
Module 2.1 & 2.2 - Reading Assignment A (Security Operations)
- READING ASSIGNMENT_Equifax Case Study.pdf
- READING ASSIGNMENT_ Target case study.pdf
- READING ASSIGNMENT_ Maersk case study (by M. Hypponen).pdf
-
Module 2.1 & 2.2 - Supporting Material (Security Operations)
- 2.1 - MITRE.pdf
- 2.1 - ENISA.pdf
- 2.2 - Microsoft.pdf
- m-trends-2026-en.pdf
-
Module 2.1 & 2.2 Knowledge Test
- https://forms.office.com/e/t3aqJEs21c
-
Module 2.1 & 2.2 - Live Seminar A (Security Operations)
- CWF-FoS-2.1-Security Operations and Administration-virtual seminar.pdf
-
2.3 - Access Control Concepts
- Module 2.3 - Video A
- Module 2.3 - Video B
- Module 2.3 - Video C
- CWF - FoS - 2.3 - Slides.pdf
-
2.4 - Access Control Processes
- CWF - FoS - 2.4 - Slides.pdf
- Video A
- Video B
- Video C
-
Module 2.3 & 2.4 - Supporting Material (Access Control)
- 2.3 - OpenID.pdf
- 2.3 - CapitalOne.pdf
- 2.4 - NIST.pdf
- 2.4 - Zero Trust.pdf
- 2.4 - Zero Trust (AI summ).docx
-
Module 2.3 & 2.4 - Live Seminar B (Access Control)
-
Module 2.3 & 2.4 - Knowledge Test (Access Control)
- https://forms.cloud.microsoft/e/F4mnHWh47b
-
Module 2.3 & 2.4 - Reading Assignment B (Access Control)
- Capitol One_Reading Assignment
- snowden_nsa.pdf
-
-
MODULE 3 - CRYPTOGRAPHY
-
3.1 - Fundamentals and Cryptographic Methods
- CWF - FoS - 3.1 - Slides.pdf
-
3.2 - PKI and Integrity
- CWF - FoS - 3.2 - Slides.pdf
-
Module 3 - Supporting Material
- 3.1 - Philip Zimmermann
- 3.1 - NIST Key Management Guidelines
- 3.1 - Encryption Modes and Attacks
- 3.2 - OWASP Top 10 - Cryptographic Failures
- 3.2 - NIST Quantum Cryptography
- 3.2 - Example of a key ceremony script.pdf
- 3.2 - CSC-WP-Post-Quantum-Crypto_300925_FINAL.pdf
- ReadMe
- 3.1 - RSA Hack.pdf
-
Module 3 - Live Seminar
- Handout 2 - Briefing.pdf
- Handout 1 - Key Ceremony.pdf
- Agenda.rtf
- CWF-FoS-Crypto Virtual Session.pdf
-
Module 3 - Knowledge Test
- Module 3 - Knowledge Test
-
-
MODULE 4 - NETWORK AND COMMUNICATION SECURITY
-
4.1 - Module Introduction
- CWF - FoS - 4.0 - Slides.pdf
-
4.1 - History, Core Concepts
- CWF - FoS - 4.1 - Slides.pdf
-
4.2 - Layered Defense
- CWF - FoS - 4.2 - Slides.pdf
-
4.3 - VPN, Secure Remote Access
- CWF - FoS - 4.3 - Slides.pdf
-
4.4 - Cloud Security
- CWF - FoS - 4.4 - Slides.pdf
-
4.5 - Supporting Material
-
4.6 - Live Seminar
- Virtual Session Networking.pdf
-
4.7 - Knowledge Test
-
-
MODULE 5 - APPLICATION AND SYSTEMS SECURITY
-
5.0 - Module Introduction
-
5.1 - Secure Software Development Lifecycle
- CWF - FoS - 5.1 - Slides.pdf
-
5.2 - OWASP Top 10
- CWF - FoS - 5.2 - Slides.pdf
-
5.3 - AI Security
- CWF - FoS - 5.3 - Slides.pdf
-
5.4 - Student Handouts
-
5.5 - Homework Bundle
- OWASP Juice Shop - Installation Guide
- OWASP Juice Shop - Initiative
-
5.6 - Supporting Material
- 5.3 - Multilayer Framework for Good Security Practices for AI (by ENISA)
- 5.3 - The State of AI (by McKinsey)
- 5.1 - 2025 Data Breach Investigations Report (by Verizon)
- 5.1 - Breach Podcast by Carbonite - Equifax (on Carbonite)
- 5.1 - Breach Podcast by Carbonite - Equifax (on Spotify)
- 5.1 - Lessons Learned from the Crowdstrike Fail (by Jurjen Bos)
- 5.2 - CVSS Score Calculator (by NIST)
- 5.2 - OWASP DevSecOps Guideline
- 5.2 - The Great Hack - Cambridge Analytica (on Netflix)
- 5.2 - OWASP Top 10 (2025)
- 5.3 - EU AI Act
-
4.6 - Live Seminar
Slide deck from live seminar on Network Security
Rating
0
0
There are no comments for now.
Additional Resources
Content only accessible to course attendees.