Foundation of Security 2025
This is the tenth iteration of the CWF Foundation of Security since the program started offering career transition training tracks in 2017. The idea of a foundational course in cybersecurity is two-fold: one, to give a comprehensive high-level overview of the different domains of cybersecurity as it is practiced in large and small enterprises; and two, to introduce the course participants to foundational concepts, use-cases, and business and technical vocabulary used in the wide field of cybersecurity.
We are aware that it is an impossible task to understand everything there is to know in the Cybersecurity Common Body of Knowledge (CBK) in 14 weeks - so as an important reminder to all the participants: these weeks of intense learning will require some hours of self-study each week to go deeper into each topic of each domain.
References and recommended reading materials will be regularly shared by the CWF team.
| Responsible | Rosanna Kurrer |
|---|---|
| Last Update | 25/01/2026 |
| Completion Time | 1 week 3 hours 14 minutes |
| Members | 12 |
-
INTRODUCTION
-
Date: 27 September 2025 - Orientation Seminar
-
Preview
-
Zoom Link Cohort 2025
-
RECORDING: Virtual Seminar Orientation - 20250927
-
-
CWF BOOK LIST
-
CWF Book List
-
-
MODULE 1: INTRODUCTION TO CYBERSECURITY
-
DATE: 4 October 2025 - Module 1
-
Session 1.1 The Lattice Framework
-
RECORDING: 1.1 Lattice Framework
-
Session 1.2 Anatomy of a Computer
-
RECORDING: 1.2 Anatomy of a Computer and Networks
-
Session 1.3 Threats, Attacks and Mitigation
-
RECORDING: 1.3 Threats, Attacks and Mitigation
-
Session 1.4 Cybersecurity Hygiene
-
RECORDING: 1.4 Cybersecurity Hygiene
-
2025-DBIR Executive Summary
-
2025-WEF Global Cybersecurity Outlook
-
2024-Microsoft Digital Defense Report
-
2024-NIST CSF 2.0
-
2025-DBIR Data Breach Investigations Report
-
Module 1 - Attack ATM - Saturday Live Session
-
VIRTUAL SEMINAR: Module 1 - Intro to Cyber 20251004
-
-
MODULE 2: Part 1 - SECURITY OPERATIONS AND ADMINISTRATION
-
Session 2.1-Security Operations and Administration - Part 1
-
RECORDING: FoS Module 2.1 Security Operations Administration-Part 1
-
Session 2.2-Security Operations and Administration - Part 2
-
RECORDING: FoS Module 2.2 Security Operations and Administration - Part 2a
-
RECORDING: FoS Module 2.2 Security Operations and Administration - Part 2b
-
REFERENCE: EBOOK_MITRE_10-strategies-cyber-ops-center
-
REFERENCE: ENISA Report - How to setup CSIRT and SOC
-
REFERENCE: Microsoft Security 2025 Future of SecOps
-
READING ASSIGNMENT: Target case study
-
READING ASSIGNMENT: Equifax data breach FAQ_ What happened, who was affected, what was the impact (from CSO Online)
-
READING ASSIGNMENT: Maersk case study (by M. Hypponen)
-
Module 2 - Security Operations and Administration Virtual Seminar
-
VIRTUAL SEMINAR: Module 2 - Security Operations and Administration 20251011
-
-
MODULE 2: Part 2 - ACCESS CONTROL
-
FoS 2.3 Access Control 1
-
RECORDING: FoS Module 2.3a Access Control
-
RECORDING: FoS Module 2.3b Access Control
-
RECORDING: FoS Module 2.3c Access Control
-
FoS 2.4 Access Control 2
-
RECORDING: FoS Module 2.4a Trust Architectures
-
RECORDING: FoS Module 2.4b Identity Management Lifecycle
-
RECORDING: FoS Module 2.4c Implementing Access Control
-
REFERENCE: The OpenId Connect Handbook 1_1
-
READING ASSIGNMENT: Capital One Data Breach
-
READING ASSIGNMENT: Snowden and Mass Surveillance
-
CWF-FoS-2.4-AccessControl Virtual Seminar Worksheet
-
VIRTUAL SEMINAR: FoS Module 2.0 Access Control
-
-
MODULE 3: CRYPTOGRAPHY
-
FoS Module 3 Cryptography
-
RECORDING: FoS Module 3 Cryptography - part 1
-
RECORDING: FoS Module 3 Cryptography - part 2
-
Preview
-
OPTIONAL READING AND VIDEOS: Module 3 Cryptography
-
contract-i-3-redacted-31may12-en
-
csc-root-ksk-management-briefing-overview-31mar20-en
-
CWF-FoS-Crypto Virtual Session
-
Virtual Seminar Agenda_FoS Module 3-cryptography
-
VIRTUAL SEMINAR: FoS Module 3 Cryptography - Ask an Expert
-
-
MODULE 4: NETWORK AND COMMUNICATION SECURITY
-
FoS 4.1 History, Core Concepts
-
RECORDING: FoS Module 4.1 Network and Communication Security - Part 1
-
FoS 4.2 Layered Defense
-
RECORDING: FoS Module 4.2 Network and Communication Security - Part 2
-
FoS 4.3 VPN, Secure Remote Access
-
RECORDING: FoS Module 4.3 Network Security - Part 3
-
FoS 4.4 Network Security Part 4 - Cloud Security
-
RECORDING: FoS Module 4.4 Network Security - Part 4
-
-
MODULE 5: APPLICATION AND SYSTEMS SECURITY
-
FoS MODULE 5 - Student Handouts
-
SLIDES: Module 5.1 - Introduction to AppSec - SSDLC
-
RECORDING: FoS Module 5.1 Intro to AppSec
-
SLIDES: Module 5.2 - OWASP Top 10
-
RECORDING: FoS Module 5.2 Application and Systems Security - Part 2 - OWASP Top 10
-
SLIDES: Module 5.3 - AI Security
-
RECORDING: FoS Module 5.3 Application and Systems Security Part 3 - EU and AI
-
STUDENT GUIDE Virtual Seminar 7
-
-
MODULE 6: GOVERNANCE, RISK AND COMPLIANCE
-
STUDENT HANDOUTS Module 6
-
SLIDES: Module 6.1 - Security Governance
-
RECORDING: FoS Module 6.1 Security Governance
-
EXAMPLE - Information Security Policy
-
HOMEWORK - Password Requirements
-
SLIDES: Module 6.2 - Security Risk
-
RECORDING: FoS Module 6.2 Security Risk
-
SLIDES: Module 6.3 - Security Controls
-
RECORDING: FoS Module 6.3 Security Controls
-
SLIDES: Module 6.4 - Supply Chain Security
-
RECORDING: FoS Module 6.4 Supply Chain Security
-
STUDENT GUIDE: Virtual Seminar - GRC part 1
-
VIRTUAL SEMINAR: Module 6 - Security Risk
-
-
Homework for the Holiday
-
Case Study: British Library Cyber Incident Review
-
Homework Instructions and Questions
-
-
MODULE 7: INCIDENT RESPONSE, BUSINESS CONTINUITY PLANNING AND CYBER-RESILIENCE
-
SLIDES: Module 7.1 - Incident, Detect, Respond, Forensics
-
RECORDING: FoS Module 7.1 Incident, Detect, Respond, Forensics
-
STUDENT HANDOUT: FoS Module 7.1 Glossary
-
SLIDES: Module 7.2 - Business Continuity Planning and Disaster Recovery
-
RECORDING: Module 7.2 - BCP and DRP
-
SLIDES: Module 7.3 - Cybersecurity Resilience
-
RECORDING: Module 7.3 Cyber Resilience
-
-
MODULE 8: HUMAN RISK MANAGEMENT
-
SLIDES: Module 8 - Human Risk Management
-
RECORDING: Module 8 - Human Risk Management and Security Culture
-
SLIDES: Module 8 - Human Risk Management - Case Studies
-
RECORDING: Module 8 - Human Risk Management Case Studies
-
VIRTUAL SEMINAR Modules 7 & 8 - Incident Response, Forensics, BCP and DRP, Human Risk Management
-