Skip to Content
    • Date: 27 September 2025 - Orientation Seminar
    • Zoom Link Cohort 2025
    • RECORDING: Virtual Seminar Orientation - 20250927
    • CWF Book List
    • DATE: 4 October 2025 - Module 1
    • Session 1.1 The Lattice Framework
    • RECORDING: 1.1 Lattice Framework
    • Session 1.2 Anatomy of a Computer
    • RECORDING: 1.2 Anatomy of a Computer and Networks
    • Session 1.3 Threats, Attacks and Mitigation
    • RECORDING: 1.3 Threats, Attacks and Mitigation
    • Session 1.4 Cybersecurity Hygiene
    • RECORDING: 1.4 Cybersecurity Hygiene
    • 2025-DBIR Executive Summary
    • 2025-WEF Global Cybersecurity Outlook
    • 2024-Microsoft Digital Defense Report
    • 2024-NIST CSF 2.0
    • 2025-DBIR Data Breach Investigations Report
    • Module 1 - Attack ATM - Saturday Live Session
    • VIRTUAL SEMINAR: Module 1 - Intro to Cyber 20251004
    • Session 2.1-Security Operations and Administration - Part 1
    • RECORDING: FoS Module 2.1 Security Operations Administration-Part 1
    • Session 2.2-Security Operations and Administration - Part 2
    • RECORDING: FoS Module 2.2 Security Operations and Administration - Part 2a
    • RECORDING: FoS Module 2.2 Security Operations and Administration - Part 2b
    • REFERENCE: EBOOK_MITRE_10-strategies-cyber-ops-center
    • REFERENCE: ENISA Report - How to setup CSIRT and SOC
    • REFERENCE: Microsoft Security 2025 Future of SecOps
    • READING ASSIGNMENT: Target case study
    • READING ASSIGNMENT: Equifax data breach FAQ_ What happened, who was affected, what was the impact (from CSO Online)
    • READING ASSIGNMENT: Maersk case study (by M. Hypponen)
    • Module 2 - Security Operations and Administration Virtual Seminar
    • VIRTUAL SEMINAR: Module 2 - Security Operations and Administration 20251011
    • FoS 2.3 Access Control 1
    • RECORDING: FoS Module 2.3a Access Control
    • RECORDING: FoS Module 2.3b Access Control
    • RECORDING: FoS Module 2.3c Access Control
    • FoS 2.4 Access Control 2
    • RECORDING: FoS Module 2.4a Trust Architectures
    • RECORDING: FoS Module 2.4b Identity Management Lifecycle
    • RECORDING: FoS Module 2.4c Implementing Access Control
    • REFERENCE: The OpenId Connect Handbook 1_1
    • READING ASSIGNMENT: Capital One Data Breach
    • READING ASSIGNMENT: Snowden and Mass Surveillance
    • CWF-FoS-2.4-AccessControl Virtual Seminar Worksheet
    • VIRTUAL SEMINAR: FoS Module 2.0 Access Control
    • FoS Module 3 Cryptography
    • RECORDING: FoS Module 3 Cryptography - part 1
    • RECORDING: FoS Module 3 Cryptography - part 2
    • OPTIONAL READING AND VIDEOS: Module 3 Cryptography
    • contract-i-3-redacted-31may12-en
    • csc-root-ksk-management-briefing-overview-31mar20-en
    • CWF-FoS-Crypto Virtual Session
    • Virtual Seminar Agenda_FoS Module 3-cryptography
    • VIRTUAL SEMINAR: FoS Module 3 Cryptography - Ask an Expert
    • FoS 4.1 History, Core Concepts
    • RECORDING: FoS Module 4.1 Network and Communication Security - Part 1
    • FoS 4.2 Layered Defense
    • RECORDING: FoS Module 4.2 Network and Communication Security - Part 2
    • FoS 4.3 VPN, Secure Remote Access
    • RECORDING: FoS Module 4.3 Network Security - Part 3
    • FoS 4.4 Network Security Part 4 - Cloud Security
    • RECORDING: FoS Module 4.4 Network Security - Part 4
    • FoS MODULE 5 - Student Handouts
    • SLIDES: Module 5.1 - Introduction to AppSec - SSDLC
    • RECORDING: FoS Module 5.1 Intro to AppSec
    • SLIDES: Module 5.2 - OWASP Top 10
    • RECORDING: FoS Module 5.2 Application and Systems Security - Part 2 - OWASP Top 10
    • SLIDES: Module 5.3 - AI Security
    • RECORDING: FoS Module 5.3 Application and Systems Security Part 3 - EU and AI
    • STUDENT GUIDE Virtual Seminar 7
    • STUDENT HANDOUTS Module 6
    • SLIDES: Module 6.1 - Security Governance
    • RECORDING: FoS Module 6.1 Security Governance
    • EXAMPLE - Information Security Policy
    • HOMEWORK - Password Requirements
    • SLIDES: Module 6.2 - Security Risk
    • RECORDING: FoS Module 6.2 Security Risk
    • SLIDES: Module 6.3 - Security Controls
    • RECORDING: FoS Module 6.3 Security Controls
    • SLIDES: Module 6.4 - Supply Chain Security
    • RECORDING: FoS Module 6.4 Supply Chain Security
    • STUDENT GUIDE: Virtual Seminar - GRC part 1
    • VIRTUAL SEMINAR: Module 6 - Security Risk
    • Case Study: British Library Cyber Incident Review
    • Homework Instructions and Questions
    • SLIDES: Module 7.1 - Incident, Detect, Respond, Forensics
    • RECORDING: FoS Module 7.1 Incident, Detect, Respond, Forensics
    • STUDENT HANDOUT: FoS Module 7.1 Glossary
    • SLIDES: Module 7.2 - Business Continuity Planning and Disaster Recovery
    • RECORDING: Module 7.2 - BCP and DRP
    • SLIDES: Module 7.3 - Cybersecurity Resilience
    • RECORDING: Module 7.3 Cyber Resilience
    • SLIDES: Module 8 - Human Risk Management
    • RECORDING: Module 8 - Human Risk Management and Security Culture
    • SLIDES: Module 8 - Human Risk Management - Case Studies
    • RECORDING: Module 8 - Human Risk Management Case Studies
    • VIRTUAL SEMINAR Modules 7 & 8 - Incident Response, Forensics, BCP and DRP, Human Risk Management