-
INTRODUCTION
-
Orientation Seminar - 9 April 2026
- CWF - FoS - 0.1 - Slides.pdf
-
Starter Kit
-
Zoom Link Cohort Spring 2026
-
CWF Book List
-
-
MODULE 1 - INTRODUCTION TO CYBERSECURITY
-
1.1 - The Lattice Framework
- CWF - FoS - 1.1 - Slides.pdf
-
1.2 - Anatomy of a Computer and Network
- CWF - FoS - 1.2 slides
-
1.3 - Threats, Attacks and Mitigation
- CWF - FoS - 1.3 - Slides.pdf
-
1.4 - Cybersecurity Hygiene
- CWF - FoS - 1.4 - Slides.pdf
-
Module 1 - Supporting Material
- 1.1 - The Informational Interview Playbook
- 1.1 - SSCP Exam Outline
- 1.1 - NICE Framework Resource Center
- 1.1 - Cybersecurity Domain Map Henri Jiang
- 1.1 - SANS_AI_CyberSecurity_Careers_Poster_V1.pdf
- 1.1 - Mapping NIS2 Obligations_summary.docx
- 1.1 - Mapping NIS 2 obligations with ECSF role profiles-1.pdf
- 1.1 - European Cybersecurity Skills Framework Role Profiles-2.pdf
- 1.2 - How the Internet Works
- 1.2 - Crash Course on Computer Networks
- 1.2 - Computer Explained in 3 Minutes
- 1.2 - Computer Basics
- 1.3 - The Evolution of Malware
- 1.3 - The Cyber Kill Chain
- 1.3 - Stuxnet
- 1.3 - Steel Mill
- 1.3 - MITRE APT Attack Groups
- 1.3 - ENISA Threat Landscape Report 2024
- 1.3 - Bank of Bangladesh
-
Module 1 - Knowledge Test
- Module 1 Knowledge Test
-
-
MODULE 2 - SECURITY OPERATIONS, ADMINISTRATION AND ACCESS CONTROL
-
2.1 - Security Operations Concepts
- CWF - FoS - 2.1 - Slides.pdf
- Module_2_1_Handout.pdf
-
2.2 - Security Operations Processes
- CWF - FoS - 2.2 - Slides.pdf
- Module_2_2_Handout.pdf
-
Module 2.1 & 2.2 - Reading Assignment A (Security Operations)
- READING ASSIGNMENT_Equifax Case Study.pdf
- READING ASSIGNMENT_ Target case study.pdf
- READING ASSIGNMENT_ Maersk case study (by M. Hypponen).pdf
-
Module 2.1 & 2.2 - Supporting Material (Security Operations)
- 2.1 - MITRE.pdf
- 2.1 - ENISA.pdf
- 2.2 - Microsoft.pdf
- m-trends-2026-en.pdf
-
Module 2.1 & 2.2 Knowledge Test
- https://forms.office.com/e/t3aqJEs21c
-
Module 2.1 & 2.2 - Live Seminar A (Security Operations)
- CWF-FoS-2.1-Security Operations and Administration-virtual seminar.pdf
-
2.3 - Access Control Concepts
- Module 2.3 - Video A
- Module 2.3 - Video B
- Module 2.3 - Video C
- CWF - FoS - 2.3 - Slides.pdf
-
2.4 - Access Control Processes
- CWF - FoS - 2.4 - Slides.pdf
- Video A
- Video B
- Video C
-
Module 2.3 & 2.4 - Supporting Material (Access Control)
- 2.3 - OpenID.pdf
- 2.3 - CapitalOne.pdf
- 2.4 - NIST.pdf
- 2.4 - Zero Trust.pdf
- 2.4 - Zero Trust (AI summ).docx
-
Module 2.3 & 2.4 - Live Seminar B (Access Control)
-
Module 2.3 & 2.4 - Knowledge Test (Access Control)
- https://forms.cloud.microsoft/e/F4mnHWh47b
-
Module 2.3 & 2.4 - Reading Assignment B (Access Control)
- Capitol One_Reading Assignment
- snowden_nsa.pdf
-
-
MODULE 3 - CRYPTOGRAPHY
-
3.1 - Fundamentals and Cryptographic Methods
- CWF - FoS - 3.1 - Slides.pdf
-
3.2 - PKI and Integrity
- CWF - FoS - 3.2 - Slides.pdf
-
Module 3 - Supporting Material
- 3.1 - Philip Zimmermann
- 3.1 - NIST Key Management Guidelines
- 3.1 - Encryption Modes and Attacks
- 3.2 - OWASP Top 10 - Cryptographic Failures
- 3.2 - NIST Quantum Cryptography
- 3.2 - Example of a key ceremony script.pdf
- 3.2 - CSC-WP-Post-Quantum-Crypto_300925_FINAL.pdf
- ReadMe
- 3.1 - RSA Hack.pdf
-
Module 3 - Supporting Material
This is supporting material to the videos 3.1 - Fundamentals and Cryptographic Methods, and 3.2 - PKI and Integrity. This material is optional and will not be quizzed in the Knowledge Test to this module. It can however help the reader to gain an even better understanding of some of the more complex aspects of cryptography.
The video in Supporting Material 3.1 - Encryption Methods and attacks, is part (4) of a freely available video course on cryptography. If you would really like to get into crypto further, we recommend watching the full series.
Rating
0
0
There are no comments for now.
Additional Resources
Content only accessible to course attendees.