-
INTRODUCTION
-
Date: 27 September 2025 - Orientation Seminar
-
Zoom Link Cohort 2025
-
RECORDING: Virtual Seminar Orientation - 20250927
-
-
CWF BOOK LIST
-
CWF Book List
-
-
MODULE 1: INTRODUCTION TO CYBERSECURITY
-
DATE: 4 October 2025 - Module 1
-
Session 1.1 The Lattice Framework
-
RECORDING: 1.1 Lattice Framework
-
Session 1.2 Anatomy of a Computer
-
RECORDING: 1.2 Anatomy of a Computer and Networks
-
Session 1.3 Threats, Attacks and Mitigation
-
RECORDING: 1.3 Threats, Attacks and Mitigation
-
Session 1.4 Cybersecurity Hygiene
-
RECORDING: 1.4 Cybersecurity Hygiene
-
2025-DBIR Executive Summary
-
2025-WEF Global Cybersecurity Outlook
-
2024-Microsoft Digital Defense Report
-
2024-NIST CSF 2.0
-
2025-DBIR Data Breach Investigations Report
-
Module 1 - Attack ATM - Saturday Live Session
-
VIRTUAL SEMINAR: Module 1 - Intro to Cyber 20251004
-
-
MODULE 2: Part 1 - SECURITY OPERATIONS AND ADMINISTRATION
-
Session 2.1-Security Operations and Administration - Part 1
-
RECORDING: FoS Module 2.1 Security Operations Administration-Part 1
-
Session 2.2-Security Operations and Administration - Part 2
-
RECORDING: FoS Module 2.2 Security Operations and Administration - Part 2a
-
RECORDING: FoS Module 2.2 Security Operations and Administration - Part 2b
-
REFERENCE: EBOOK_MITRE_10-strategies-cyber-ops-center
-
REFERENCE: ENISA Report - How to setup CSIRT and SOC
-
REFERENCE: Microsoft Security 2025 Future of SecOps
-
READING ASSIGNMENT: Target case study
-
READING ASSIGNMENT: Equifax data breach FAQ_ What happened, who was affected, what was the impact (from CSO Online)
-
READING ASSIGNMENT: Maersk case study (by M. Hypponen)
-
Module 2 - Security Operations and Administration Virtual Seminar
-
VIRTUAL SEMINAR: Module 2 - Security Operations and Administration 20251011
-
-
MODULE 2: Part 2 - ACCESS CONTROL
-
FoS 2.3 Access Control 1
-
RECORDING: FoS Module 2.3a Access Control
-
RECORDING: FoS Module 2.3b Access Control
-
RECORDING: FoS Module 2.3c Access Control
-
FoS 2.4 Access Control 2
-
RECORDING: FoS Module 2.4a Trust Architectures
-
RECORDING: FoS Module 2.4b Identity Management Lifecycle
-
RECORDING: FoS Module 2.4c Implementing Access Control
-
REFERENCE: The OpenId Connect Handbook 1_1
-
READING ASSIGNMENT: Capital One Data Breach
-
READING ASSIGNMENT: Snowden and Mass Surveillance
-
CWF-FoS-2.4-AccessControl Virtual Seminar Worksheet
-
VIRTUAL SEMINAR: FoS Module 2.0 Access Control
-
-
MODULE 3: CRYPTOGRAPHY
-
FoS Module 3 Cryptography
-
RECORDING: FoS Module 3 Cryptography - part 1
-
RECORDING: FoS Module 3 Cryptography - part 2
-
OPTIONAL READING AND VIDEOS: Module 3 Cryptography
-
contract-i-3-redacted-31may12-en
-
csc-root-ksk-management-briefing-overview-31mar20-en
-
CWF-FoS-Crypto Virtual Session
-
Virtual Seminar Agenda_FoS Module 3-cryptography
-
VIRTUAL SEMINAR: FoS Module 3 Cryptography - Ask an Expert
-
-
MODULE 4: NETWORK AND COMMUNICATION SECURITY
-
FoS 4.1 History, Core Concepts
-
RECORDING: FoS Module 4.1 Network and Communication Security - Part 1
-
FoS 4.2 Layered Defense
-
RECORDING: FoS Module 4.2 Network and Communication Security - Part 2
-
FoS 4.3 VPN, Secure Remote Access
-
RECORDING: FoS Module 4.3 Network Security - Part 3
-
FoS 4.4 Network Security Part 4 - Cloud Security
-
RECORDING: FoS Module 4.4 Network Security - Part 4
-
-
MODULE 5: APPLICATION AND SYSTEMS SECURITY
-
FoS MODULE 5 - Student Handouts
-
SLIDES: Module 5.1 - Introduction to AppSec - SSDLC
-
RECORDING: FoS Module 5.1 Intro to AppSec
-
SLIDES: Module 5.2 - OWASP Top 10
-
RECORDING: FoS Module 5.2 Application and Systems Security - Part 2 - OWASP Top 10
-
SLIDES: Module 5.3 - AI Security
-
RECORDING: FoS Module 5.3 Application and Systems Security Part 3 - EU and AI
-
STUDENT GUIDE Virtual Seminar 7
-
-
MODULE 6: GOVERNANCE, RISK AND COMPLIANCE
-
STUDENT HANDOUTS Module 6
-
SLIDES: Module 6.1 - Security Governance
-
RECORDING: FoS Module 6.1 Security Governance
-
EXAMPLE - Information Security Policy
-
HOMEWORK - Password Requirements
-
SLIDES: Module 6.2 - Security Risk
-
RECORDING: FoS Module 6.2 Security Risk
-
SLIDES: Module 6.3 - Security Controls
-
RECORDING: FoS Module 6.3 Security Controls
-
SLIDES: Module 6.4 - Supply Chain Security
-
RECORDING: FoS Module 6.4 Supply Chain Security
-
STUDENT GUIDE: Virtual Seminar - GRC part 1
-
VIRTUAL SEMINAR: Module 6 - Security Risk
-
-
Homework for the Holiday
-
Case Study: British Library Cyber Incident Review
-
Homework Instructions and Questions
-
-
MODULE 7: INCIDENT RESPONSE, BUSINESS CONTINUITY PLANNING AND CYBER-RESILIENCE
-
SLIDES: Module 7.1 - Incident, Detect, Respond, Forensics
-
RECORDING: FoS Module 7.1 Incident, Detect, Respond, Forensics
-
STUDENT HANDOUT: FoS Module 7.1 Glossary
-
SLIDES: Module 7.2 - Business Continuity Planning and Disaster Recovery
-
RECORDING: Module 7.2 - BCP and DRP
-
SLIDES: Module 7.3 - Cybersecurity Resilience
-
RECORDING: Module 7.3 Cyber Resilience
-
-
MODULE 8: HUMAN RISK MANAGEMENT
-
SLIDES: Module 8 - Human Risk Management
-
RECORDING: Module 8 - Human Risk Management and Security Culture
-
SLIDES: Module 8 - Human Risk Management - Case Studies
-
RECORDING: Module 8 - Human Risk Management Case Studies
-
VIRTUAL SEMINAR Modules 7 & 8 - Incident Response, Forensics, BCP and DRP, Human Risk Management
-