-
INTRODUCTION
-
Orientation Seminar - 9 April 2026
- CWF - FoS - 0.1 - Slides.pdf
-
Starter Kit
-
Zoom Link Cohort Spring 2026
-
CWF Book List
-
-
MODULE 1 - INTRODUCTION TO CYBERSECURITY
-
1.1 - The Lattice Framework
- CWF - FoS - 1.1 - Slides.pdf
-
1.2 - Anatomy of a Computer and Network
- CWF - FoS - 1.2 slides
-
1.3 - Threats, Attacks and Mitigation
- CWF - FoS - 1.3 - Slides.pdf
-
1.4 - Cybersecurity Hygiene
- CWF - FoS - 1.4 - Slides.pdf
-
Module 1 - Supporting Material
- 1.1 - The Informational Interview Playbook
- 1.1 - SSCP Exam Outline
- 1.1 - NICE Framework Resource Center
- 1.1 - Cybersecurity Domain Map Henri Jiang
- 1.1 - SANS_AI_CyberSecurity_Careers_Poster_V1.pdf
- 1.1 - Mapping NIS2 Obligations_summary.docx
- 1.1 - Mapping NIS 2 obligations with ECSF role profiles-1.pdf
- 1.1 - European Cybersecurity Skills Framework Role Profiles-2.pdf
- 1.2 - How the Internet Works
- 1.2 - Crash Course on Computer Networks
- 1.2 - Computer Explained in 3 Minutes
- 1.2 - Computer Basics
- 1.3 - The Evolution of Malware
- 1.3 - The Cyber Kill Chain
- 1.3 - Stuxnet
- 1.3 - Steel Mill
- 1.3 - MITRE APT Attack Groups
- 1.3 - ENISA Threat Landscape Report 2024
- 1.3 - Bank of Bangladesh
-
Module 1 - Knowledge Test
- Module 1 Knowledge Test
-
-
MODULE 2 - SECURITY OPERATIONS, ADMINISTRATION AND ACCESS CONTROL
-
2.1 - Security Operations Concepts
- CWF - FoS - 2.1 - Slides.pdf
- Module_2_1_Handout.pdf
-
2.2 - Security Operations Processes
- CWF - FoS - 2.2 - Slides.pdf
- Module_2_2_Handout.pdf
-
Module 2.1 & 2.2 - Reading Assignment A (Security Operations)
- READING ASSIGNMENT_Equifax Case Study.pdf
- READING ASSIGNMENT_ Target case study.pdf
- READING ASSIGNMENT_ Maersk case study (by M. Hypponen).pdf
-
Module 2.1 & 2.2 - Supporting Material (Security Operations)
- 2.1 - MITRE.pdf
- 2.1 - ENISA.pdf
- 2.2 - Microsoft.pdf
- m-trends-2026-en.pdf
-
Module 2.1 & 2.2 Knowledge Test
- https://forms.office.com/e/t3aqJEs21c
-
Module 2.1 & 2.2 - Live Seminar A (Security Operations)
- CWF-FoS-2.1-Security Operations and Administration-virtual seminar.pdf
-
2.3 - Access Control Concepts
- Module 2.3 - Video A
- Module 2.3 - Video B
- Module 2.3 - Video C
- CWF - FoS - 2.3 - Slides.pdf
-
2.4 - Access Control Processes
- CWF - FoS - 2.4 - Slides.pdf
- Video A
- Video B
- Video C
-
Module 2.3 & 2.4 - Supporting Material (Access Control)
- 2.3 - OpenID.pdf
- 2.3 - CapitalOne.pdf
- 2.4 - NIST.pdf
- 2.4 - Zero Trust.pdf
- 2.4 - Zero Trust (AI summ).docx
-
Module 2.3 & 2.4 - Live Seminar B (Access Control)
-
Module 2 - Knowledge Test
- Module 2.3 & 2.4 - Knowledge Test
-
Module 2 - Reading Assignment B
- Capitol One_Reading Assignment
- snowden_nsa.pdf
-
-
MODULE 3 - CRYPTOGRAPHY
-
3.1 - Fundamentals and Cryptographic Methods
- CWF - FoS - 3.1 - Slides.pdf
-
3.2 - PKI and Integrity
- CWF - FoS - 3.2 - Slides.pdf
-
Module 3 - Supporting Material
- 3.1 - Philip Zimmermann
- 3.1 - NIST Key Management Guidelines
- 3.1 - Encryption Modes and Attacks
- 3.2 - OWASP Top 10 - Cryptographic Failures
- 3.2 - NIST Quantum Cryptography
- 3.2 - Example of a key ceremony script.pdf
- 3.2 - CSC-WP-Post-Quantum-Crypto_300925_FINAL.pdf
- ReadMe
- 3.1 - RSA Hack.pdf
-
Module 2.3 & 2.4 - Live Seminar B (Access Control)
Slides that support this live seminar will be shared when the seminar takes place. Please ensure that you complete Reading Assignment B ahead of this Live Seminar.
Rating
0
0
There are no comments for now.