- INTRODUCTION
- CWF BOOK LIST
-
MODULE 1: INTRODUCTION TO CYBERSECURITY
-
DATE: 4 October 2025 - Module 1
-
Session 1.1 The Lattice Framework
-
RECORDING: 1.1 Lattice Framework
-
Session 1.2 Anatomy of a Computer
-
RECORDING: 1.2 Anatomy of a Computer and Networks
-
Session 1.3 Threats, Attacks and Mitigation
-
RECORDING: 1.3 Threats, Attacks and Mitigation
-
Session 1.4 Cybersecurity Hygiene
-
RECORDING: 1.4 Cybersecurity Hygiene
-
2025-DBIR Executive Summary
-
2025-WEF Global Cybersecurity Outlook
-
2024-Microsoft Digital Defense Report
-
2024-NIST CSF 2.0
-
2025-DBIR Data Breach Investigations Report
-
Module 1 - Attack ATM - Saturday Live Session
-
VIRTUAL SEMINAR: Module 1 - Intro to Cyber 20251004
-
-
MODULE 2: Part 1 - SECURITY OPERATIONS AND ADMINISTRATION
-
Session 2.1-Security Operations and Administration - Part 1
-
RECORDING: FoS Module 2.1 Security Operations Administration-Part 1
-
Session 2.2-Security Operations and Administration - Part 2
-
RECORDING: FoS Module 2.2 Security Operations and Administration - Part 2a
-
RECORDING: FoS Module 2.2 Security Operations and Administration - Part 2b
-
REFERENCE: EBOOK_MITRE_10-strategies-cyber-ops-center
-
REFERENCE: ENISA Report - How to setup CSIRT and SOC
-
REFERENCE: Microsoft Security 2025 Future of SecOps
-
READING ASSIGNMENT: Target case study
-
READING ASSIGNMENT: Equifax data breach FAQ_ What happened, who was affected, what was the impact (from CSO Online)
-
READING ASSIGNMENT: Maersk case study (by M. Hypponen)
-
Module 2 - Security Operations and Administration Virtual Seminar
-
VIRTUAL SEMINAR: Module 2 - Security Operations and Administration 20251011
-
-
MODULE 2: Part 2 - ACCESS CONTROL
-
FoS 2.3 Access Control 1
-
RECORDING: FoS Module 2.3a Access Control
-
RECORDING: FoS Module 2.3b Access Control
-
RECORDING: FoS Module 2.3c Access Control
-
FoS 2.4 Access Control 2
-
RECORDING: FoS Module 2.4a Trust Architectures
-
RECORDING: FoS Module 2.4b Identity Management Lifecycle
-
RECORDING: FoS Module 2.4c Implementing Access Control
-
REFERENCE: The OpenId Connect Handbook 1_1
-
READING ASSIGNMENT: Capital One Data Breach
-
READING ASSIGNMENT: Snowden and Mass Surveillance
-
CWF-FoS-2.4-AccessControl Virtual Seminar Worksheet
-
VIRTUAL SEMINAR: FoS Module 2.0 Access Control
-
-
MODULE 3: CRYPTOGRAPHY
-
FoS Module 3 Cryptography
-
RECORDING: FoS Module 3 Cryptography - part 1
-
RECORDING: FoS Module 3 Cryptography - part 2
-
ADDITIONAL VIDEO: Learn Cryptography | Encryption Modes and Attacks
-
OPTIONAL READING AND VIDEOS: Module 3 Cryptography
-
contract-i-3-redacted-31may12-en
-
csc-root-ksk-management-briefing-overview-31mar20-en
-
CWF-FoS-Crypto Virtual Session
-
Virtual Seminar Agenda_FoS Module 3-cryptography
-
VIRTUAL SEMINAR: FoS Module 3 Cryptography - Ask an Expert
-
-
MODULE 4: NETWORK AND COMMUNICATION SECURITY
-
FoS 4.1 History, Core Concepts
-
RECORDING: FoS Module 4.1 Network and Communication Security - Part 1
-
FoS 4.2 Layered Defense
-
RECORDING: FoS Module 4.2 Network and Communication Security - Part 2
-
FoS 4.3 VPN, Secure Remote Access
-
RECORDING: FoS Module 4.3 Network Security - Part 3
-
FoS 4.4 Network Security Part 4 - Cloud Security
-
RECORDING: FoS Module 4.4 Network Security - Part 4
-
-
MODULE 5: APPLICATION AND SYSTEMS SECURITY
-
FoS MODULE 5 - Student Handouts
-
SLIDES: Module 5.1 - Introduction to AppSec - SSDLC
-
RECORDING: FoS Module 5.1 Intro to AppSec
-
SLIDES: Module 5.2 - OWASP Top 10
-
RECORDING: FoS Module 5.2 Application and Systems Security - Part 2 - OWASP Top 10
-
SLIDES: Module 5.3 - AI Security
-
RECORDING: FoS Module 5.3 Application and Systems Security Part 3 - EU and AI
-
STUDENT GUIDE Virtual Seminar 7
-
-
MODULE 6: GOVERNANCE, RISK AND COMPLIANCE
-
STUDENT HANDOUTS Module 6
-
SLIDES: Module 6.1 - Security Governance
-
RECORDING: FoS Module 6.1 Security Governance
-
EXAMPLE - Information Security Policy
-
HOMEWORK - Password Requirements
-
SLIDES: Module 6.2 - Security Risk
-
RECORDING: FoS Module 6.2 Security Risk
-
SLIDES: Module 6.3 - Security Controls
-
RECORDING: FoS Module 6.3 Security Controls
-
SLIDES: Module 6.4 - Supply Chain Security
-
RECORDING: FoS Module 6.4 Supply Chain Security
-
STUDENT GUIDE: Virtual Seminar - GRC part 1
-
VIRTUAL SEMINAR: Module 6 - Security Risk
-
- Homework for the Holiday
-
MODULE 7: INCIDENT RESPONSE, BUSINESS CONTINUITY PLANNING AND CYBER-RESILIENCE
-
SLIDES: Module 7.1 - Incident, Detect, Respond, Forensics
-
RECORDING: FoS Module 7.1 Incident, Detect, Respond, Forensics
-
STUDENT HANDOUT: FoS Module 7.1 Glossary
-
SLIDES: Module 7.2 - Business Continuity Planning and Disaster Recovery
-
RECORDING: Module 7.2 - BCP and DRP
-
SLIDES: Module 7.3 - Cybersecurity Resilience
-
RECORDING: Module 7.3 Cyber Resilience
-
-
MODULE 8: HUMAN RISK MANAGEMENT
-
SLIDES: Module 8 - Human Risk Management
-
RECORDING: Module 8 - Human Risk Management and Security Culture
-
SLIDES: Module 8 - Human Risk Management - Case Studies
-
RECORDING: Module 8 - Human Risk Management Case Studies
-
VIRTUAL SEMINAR Modules 7 & 8 - Incident Response, Forensics, BCP and DRP, Human Risk Management
-
ADDITIONAL VIDEO: Learn Cryptography | Encryption Modes and Attacks
NOTE: This video covers topics that are interesting for those who are interested in taking the SSCP certification exam.
This is part 4 of our series on cryptography and cryptographic risk. The series is intended to teach you about cryptography from the point of view of things that can go wrong.
In this video Graham discusses encryption modes of operation and attacks.
Part 1: https://www.youtube.com/watch?v=3t7C2hOJNy8
Part 2: https://www.youtube.com/watch?v=osX3A4wdwcs
Part 3: https://www.youtube.com/watch?v=O4HBoOMd1Bo
Between 2013 and 2017, Cryptosense ran training courses on Cryptography and Crypto Risk, mostly in Venice. We trained dozens of security architects, consultants and pen-testers in how cryptography is commonly mis-used and how to avoid those mistakes. Feedback was always positive and we continue to receive requests to re-run the training, but we're fully occupied these days with Cryptosense Analyzer Platform, our tool for discovering and analzying cryptography use. So, we decided to record the training and release it here on the Cryptosense YouTube channel.
/////
Find out more about Cryptosense: https://cryptosense.com
Follow us on Twitter: https://twitter.com/cryptosense
/////
Cryptosense CEO Dr. Graham Steel was formerly an academic researcher before founding Cryptosense in 2013. His cryptography expertise is the basis for the company's 'Analyzer' technology which allows customers to protect themselves against losing sensitive data.
Rating
0
0
There are no comments for now.