- INTRODUCTION
- CWF BOOK LIST
-
MODULE 1: INTRODUCTION TO CYBERSECURITY
-
DATE: 4 October 2025 - Module 1
-
Session 1.1 The Lattice Framework
-
RECORDING: 1.1 Lattice Framework
-
Session 1.2 Anatomy of a Computer
-
RECORDING: 1.2 Anatomy of a Computer and Networks
-
Session 1.3 Threats, Attacks and Mitigation
-
RECORDING: 1.3 Threats, Attacks and Mitigation
-
Session 1.4 Cybersecurity Hygiene
-
RECORDING: 1.4 Cybersecurity Hygiene
-
2025-DBIR Executive Summary
-
2025-WEF Global Cybersecurity Outlook
-
2024-Microsoft Digital Defense Report
-
2024-NIST CSF 2.0
-
2025-DBIR Data Breach Investigations Report
-
Module 1 - Attack ATM - Saturday Live Session
-
VIRTUAL SEMINAR: Module 1 - Intro to Cyber 20251004
-
-
MODULE 2: Part 1 - SECURITY OPERATIONS AND ADMINISTRATION
-
Session 2.1-Security Operations and Administration - Part 1
-
RECORDING: FoS Module 2.1 Security Operations Administration-Part 1
-
Session 2.2-Security Operations and Administration - Part 2
-
RECORDING: FoS Module 2.2 Security Operations and Administration - Part 2a
-
RECORDING: FoS Module 2.2 Security Operations and Administration - Part 2b
-
REFERENCE: EBOOK_MITRE_10-strategies-cyber-ops-center
-
REFERENCE: ENISA Report - How to setup CSIRT and SOC
-
REFERENCE: Microsoft Security 2025 Future of SecOps
-
READING ASSIGNMENT: Target case study
-
READING ASSIGNMENT: Equifax data breach FAQ_ What happened, who was affected, what was the impact (from CSO Online)
-
READING ASSIGNMENT: Maersk case study (by M. Hypponen)
-
Module 2 - Security Operations and Administration Virtual Seminar
-
VIRTUAL SEMINAR: Module 2 - Security Operations and Administration 20251011
-
-
MODULE 2: Part 2 - ACCESS CONTROL
-
FoS 2.3 Access Control 1
-
RECORDING: FoS Module 2.3a Access Control
-
RECORDING: FoS Module 2.3b Access Control
-
RECORDING: FoS Module 2.3c Access Control
-
FoS 2.4 Access Control 2
-
RECORDING: FoS Module 2.4a Trust Architectures
-
RECORDING: FoS Module 2.4b Identity Management Lifecycle
-
RECORDING: FoS Module 2.4c Implementing Access Control
-
REFERENCE: The OpenId Connect Handbook 1_1
-
READING ASSIGNMENT: Capital One Data Breach
-
READING ASSIGNMENT: Snowden and Mass Surveillance
-
CWF-FoS-2.4-AccessControl Virtual Seminar Worksheet
-
VIRTUAL SEMINAR: FoS Module 2.0 Access Control
-
-
MODULE 3: CRYPTOGRAPHY
-
FoS Module 3 Cryptography
-
RECORDING: FoS Module 3 Cryptography - part 1
-
RECORDING: FoS Module 3 Cryptography - part 2
-
ADDITIONAL VIDEO: Learn Cryptography | Encryption Modes and Attacks
-
OPTIONAL READING AND VIDEOS: Module 3 Cryptography
-
contract-i-3-redacted-31may12-en
-
csc-root-ksk-management-briefing-overview-31mar20-en
-
CWF-FoS-Crypto Virtual Session
-
Virtual Seminar Agenda_FoS Module 3-cryptography
-
VIRTUAL SEMINAR: FoS Module 3 Cryptography - Ask an Expert
-
-
MODULE 4: NETWORK AND COMMUNICATION SECURITY
-
FoS 4.1 History, Core Concepts
-
RECORDING: FoS Module 4.1 Network and Communication Security - Part 1
-
FoS 4.2 Layered Defense
-
RECORDING: FoS Module 4.2 Network and Communication Security - Part 2
-
FoS 4.3 VPN, Secure Remote Access
-
RECORDING: FoS Module 4.3 Network Security - Part 3
-
FoS 4.4 Network Security Part 4 - Cloud Security
-
RECORDING: FoS Module 4.4 Network Security - Part 4
-
-
MODULE 5: APPLICATION AND SYSTEMS SECURITY
-
FoS MODULE 5 - Student Handouts
-
SLIDES: Module 5.1 - Introduction to AppSec - SSDLC
-
RECORDING: FoS Module 5.1 Intro to AppSec
-
SLIDES: Module 5.2 - OWASP Top 10
-
RECORDING: FoS Module 5.2 Application and Systems Security - Part 2 - OWASP Top 10
-
SLIDES: Module 5.3 - AI Security
-
RECORDING: FoS Module 5.3 Application and Systems Security Part 3 - EU and AI
-
STUDENT GUIDE Virtual Seminar 7
-
-
MODULE 6: GOVERNANCE, RISK AND COMPLIANCE
-
STUDENT HANDOUTS Module 6
-
SLIDES: Module 6.1 - Security Governance
-
RECORDING: FoS Module 6.1 Security Governance
-
EXAMPLE - Information Security Policy
-
HOMEWORK - Password Requirements
-
SLIDES: Module 6.2 - Security Risk
-
RECORDING: FoS Module 6.2 Security Risk
-
SLIDES: Module 6.3 - Security Controls
-
RECORDING: FoS Module 6.3 Security Controls
-
SLIDES: Module 6.4 - Supply Chain Security
-
RECORDING: FoS Module 6.4 Supply Chain Security
-
STUDENT GUIDE: Virtual Seminar - GRC part 1
-
VIRTUAL SEMINAR: Module 6 - Security Risk
-
- Homework for the Holiday
-
MODULE 7: INCIDENT RESPONSE, BUSINESS CONTINUITY PLANNING AND CYBER-RESILIENCE
-
SLIDES: Module 7.1 - Incident, Detect, Respond, Forensics
-
RECORDING: FoS Module 7.1 Incident, Detect, Respond, Forensics
-
STUDENT HANDOUT: FoS Module 7.1 Glossary
-
SLIDES: Module 7.2 - Business Continuity Planning and Disaster Recovery
-
RECORDING: Module 7.2 - BCP and DRP
-
SLIDES: Module 7.3 - Cybersecurity Resilience
-
RECORDING: Module 7.3 Cyber Resilience
-
-
MODULE 8: HUMAN RISK MANAGEMENT
-
SLIDES: Module 8 - Human Risk Management
-
RECORDING: Module 8 - Human Risk Management and Security Culture
-
SLIDES: Module 8 - Human Risk Management - Case Studies
-
RECORDING: Module 8 - Human Risk Management Case Studies
-
VIRTUAL SEMINAR Modules 7 & 8 - Incident Response, Forensics, BCP and DRP, Human Risk Management
-
Starter Kit
This starter kit serves as a guide to the start of the Foundation of Security course. It outlines practical information such as the course schedule, modules and assessment, and the CWF Learning Manage Platform and the SIgnal cohort chat group.
Rating
0
0
There are no comments for now.