-
INTRODUCTION
-
Orientation Seminar - 9 April 2026
- CWF - FoS - 0.1 - Slides.pdf
-
Starter Kit
-
Zoom Link Cohort Spring 2026
-
CWF Book List
-
-
MODULE 1 - INTRODUCTION TO CYBERSECURITY
-
1.1 - The Lattice Framework
- CWF - FoS - 1.1 - Slides.pdf
-
1.2 - Anatomy of a Computer and Network
- CWF - FoS - 1.2 slides
-
1.3 - Threats, Attacks and Mitigation
- CWF - FoS - 1.3 - Slides.pdf
-
1.4 - Cybersecurity Hygiene
- CWF - FoS - 1.4 - Slides.pdf
-
Module 1 - Supporting Material
- 1.1 - The Informational Interview Playbook
- 1.1 - SSCP Exam Outline
- 1.1 - NICE Framework Resource Center
- 1.1 - Cybersecurity Domain Map Henri Jiang
- 1.1 - SANS_AI_CyberSecurity_Careers_Poster_V1.pdf
- 1.1 - Mapping NIS2 Obligations_summary.docx
- 1.1 - Mapping NIS 2 obligations with ECSF role profiles-1.pdf
- 1.1 - European Cybersecurity Skills Framework Role Profiles-2.pdf
- 1.2 - How the Internet Works
- 1.2 - Crash Course on Computer Networks
- 1.2 - Computer Explained in 3 Minutes
- 1.2 - Computer Basics
- 1.3 - The Evolution of Malware
- 1.3 - The Cyber Kill Chain
- 1.3 - Stuxnet
- 1.3 - Steel Mill
- 1.3 - MITRE APT Attack Groups
- 1.3 - ENISA Threat Landscape Report 2024
- 1.3 - Bank of Bangladesh
-
Module 1 - Knowledge Test
- Module 1 Knowledge Test
-
-
MODULE 2 - SECURITY OPERATIONS, ADMINISTRATION AND ACCESS CONTROL
-
2.1 - Security Operations Concepts
- CWF - FoS - 2.1 - Slides.pdf
- Module_2_1_Handout.pdf
-
2.2 - Security Operations Processes
- CWF - FoS - 2.2 - Slides.pdf
- Module_2_2_Handout.pdf
-
Module 2.1 & 2.2 - Reading Assignment A (Security Operations)
- READING ASSIGNMENT_Equifax Case Study.pdf
- READING ASSIGNMENT_ Target case study.pdf
- READING ASSIGNMENT_ Maersk case study (by M. Hypponen).pdf
-
Module 2.1 & 2.2 - Supporting Material (Security Operations)
- 2.1 - MITRE.pdf
- 2.1 - ENISA.pdf
- 2.2 - Microsoft.pdf
- m-trends-2026-en.pdf
-
Module 2.1 & 2.2 Knowledge Test
- https://forms.office.com/e/t3aqJEs21c
-
Module 2.1 & 2.2 - Live Seminar A (Security Operations)
- CWF-FoS-2.1-Security Operations and Administration-virtual seminar.pdf
-
2.3 - Access Control Concepts
- Module 2.3 - Video A
- Module 2.3 - Video B
- Module 2.3 - Video C
- CWF - FoS - 2.3 - Slides.pdf
-
2.4 - Access Control Processes
- CWF - FoS - 2.4 - Slides.pdf
- Video A
- Video B
- Video C
-
Module 2.3 & 2.4 - Supporting Material (Access Control)
- 2.3 - OpenID.pdf
- 2.3 - CapitalOne.pdf
- 2.4 - NIST.pdf
- 2.4 - Zero Trust.pdf
- 2.4 - Zero Trust (AI summ).docx
-
Module 2.3 & 2.4 - Live Seminar B (Access Control)
-
Module 2.3 & 2.4 - Knowledge Test (Access Control)
- https://forms.cloud.microsoft/e/F4mnHWh47b
-
Module 2.3 & 2.4 - Reading Assignment B (Access Control)
- Capitol One_Reading Assignment
- snowden_nsa.pdf
-
-
MODULE 3 - CRYPTOGRAPHY
-
3.1 - Fundamentals and Cryptographic Methods
- CWF - FoS - 3.1 - Slides.pdf
-
3.2 - PKI and Integrity
- CWF - FoS - 3.2 - Slides.pdf
-
Module 3 - Supporting Material
- 3.1 - Philip Zimmermann
- 3.1 - NIST Key Management Guidelines
- 3.1 - Encryption Modes and Attacks
- 3.2 - OWASP Top 10 - Cryptographic Failures
- 3.2 - NIST Quantum Cryptography
- 3.2 - Example of a key ceremony script.pdf
- 3.2 - CSC-WP-Post-Quantum-Crypto_300925_FINAL.pdf
- ReadMe
- 3.1 - RSA Hack.pdf
-
Module 3 - Live Seminar
- Handout 2 - Briefing.pdf
- Handout 1 - Key Ceremony.pdf
- Agenda.rtf
- CWF-FoS-Crypto Virtual Session.pdf
-
Module 3 - Knowledge Test
- Module 3 - Knowledge Test
-
-
MODULE 4 - NETWORK AND COMMUNICATION SECURITY
-
4.1 - Module Introduction
- CWF - FoS - 4.0 - Slides.pdf
-
4.1 - History, Core Concepts
- CWF - FoS - 4.1 - Slides.pdf
-
4.2 - Layered Defense
- CWF - FoS - 4.2 - Slides.pdf
-
Module 3 - Live Seminar
This live seminar session introduces participants to the core concepts of cryptography within a broader cybersecurity context.
The session dives into the fundamentals of cryptography, covering cryptographic methods, Public Key Infrastructures (PKI), and integrity mechanisms. A case study on the 2011 RSA Security breach will explore how attackers exploited phishing and insufficient network segmentation to steal authentication seed values — compromising customers worldwide.
The session also features a Key Ceremony online role-play modeled on ICANN's KSK signing process, giving participants giving participants an understanding of how every step in the ceremony is carefully logged, witnessed, and observed to ensure accountability and trust in the process.
Rating
0
0
There are no comments for now.
Additional Resources
Content only accessible to course attendees.