0% found this document useful (0 votes)
150 views4 pages

Course Links

Doc intéressant

Uploaded by

abassibn2017
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
150 views4 pages

Course Links

Doc intéressant

Uploaded by

abassibn2017
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

Cybersecurity Foundations

with Malcolm Shore

Course Links
Chapter Video Resource Title URL

Introduction What you ISACA https://www.isaca.org/resources/cobit


should
know

NIST http://www.nist.gov/cyberframework/

Cyber Pre-cyber TakeDown http://www.takedown.com/


Threats threats

Emergence of Information Is Beautiful https://www.informationisbeautiful.


cyber threats – World’s Biggest Data net/visualizations/worlds-biggest-data-
Breaches and Hacks breaches-hacks/

Understanding Intelligence-Driven https://www.lockheedmartin.com/


the Cyber Kill Computer Network content/dam/lockheed-martin/rms/
Chain Defense Informed by documents/cyber/LM-White-Paper-Intel-
Analysis of Adversary Driven-Defense.pdf
Campaigns and
Intrusion Kill Chains

Lockheed Martin https://www.lockheedmartin.com/


Cyber Emergency en-us/capabilities/cyber/cyber-kill-
Response Team chain.html

Frameworks
for Protection
against Cyber
Threats

Cybersecurity NIST SP 800-53 https://csrc.nist.gov/publications/


control Rev. 5: Security and detail/sp/800-53/rev-5/final
framework Privacy Controls for
Information Systems
and Organizations

PCI https://listings.pcisecuritystandards.
Data Security org/documents/PCI-DSS-v4_0.pdf
Standard

Cybersecurity Foundations with Malcolm Shore 1 of 4


ISO/IEC 27002 https://www.iso.org/standard/
75652.html

Cybersecurity Standard of Good https://www.securityforum.org/


Standard of Practice for Information solutions-and-insights/standard-
Good Practice Security of-good-practice-for-information-
security-2020/

Good Practices – https://www.dnb.nl/media/yffn1wji/


Information good-practice-ib-2019-2020.pdf
Security

Making Why Security Is a https://www.dsisecurity.


Cybersecurity Business Issue com/2021/06/15/why-security-is-a-
Effective business-issue/

Architecting Enterprise Security https://www.isaca.org/resources/


for security Architecture – A Top- isaca-journal/issues/2017/volume-4/
Down Approach enterprise-security-architecturea-top-
down-approach

Protecting The Heartbleed Bug https://www.malwarebytes.com/


payment blog/news/2019/09/everything-you-
card data need-to-know-about-the-heartbleed-
vulnerability

Card Skimming http://www.scambusters.org/


Scam skimming.html

World’s Biggest https://informationisbeautiful.net/


Data Breaches visualizations/worlds-biggest-data-
& Hacks breaches-hacks/

PCI Security https://www.pcisecuritystandards.org/


Standards security_standards/

Clouding the CSA https://cloudsecurityalliance.org/


issues Security Guidance artifacts/security-guidance-v4/
for Critical Areas of
Focus in Cloud
Computing v4.0

Cloud Controls https://cloudsecurityalliance.org/


Matrix v3.0.1 artifacts/cloud-controls-matrix-v3-0-1-
Info Sheet info-sheet

Securing Common Criteria https://www.commoncriteriaportal.org/


things on the
internet

Cybersecurity Foundations with Malcolm Shore 2 of 4


Cybersecurity https://cybersecurity-magazine.com/
Magazine – What what-exactly-is-security-assurance/
Exactly Is Security
Assurance?

Detecting and Incident Forum of Incident https://www.first.org/about/history


Managing management Response and
Cyber basics Security Teams
Incidents (FIRST)

Cybersecurity & https://www.cisa.gov/uscert


Infrastructure
Security Agency

FIRST https://www.first.org/conference/
Conference

Measuring CREST Cyber Security https://www.crest-approved.org/


incident Incident Response approved-services/cyber-security-
management Maturity Assessment incident-response-maturity-
maturity assessment/

Financial Services https://www.fsisac.com/


Information Sharing
and Analysis Center
(FS-ISAC)

Structured https://stix.mitre.org/
Threat Information
eXpression (STIX) 1.x
Archive Website

TheHive Project https://thehive-project.org/

European Union https://www.enisa.europa.eu/topics/


Agency for training-and-exercises/trainings-for-
Cybersecurity cybersecurity-specialists
(ENISA)

Cyber Cybersecurity ICANN – Will There https://www.icann.org/ar/blogs/


Diplomacy goes global Really Be a New details/will-there-really-be-a-new-
Russian Internet? russian-internet-11-1-2008-en

Torfox – The Great https://cs.stanford.edu/people/


Firewall of China: eroberts/cs181/projects/2010-11/
Background FreedomOfInformationChina/the-
great-firewall-of-china-background/
index.html

Cybersecurity Foundations with Malcolm Shore 3 of 4


Understanding UN General Assembly– http://un.org/disarmament/ict-security
cyber norms Developments in
the Field of
Information and
Telecommunications
in the Context of
International Security

UN Office for http://cyberdiplomacy.


Disarmament disarmamenteducation.org/home
Affairs –
Cyberdiplomacy

Cybil and the Global Forum on https://thegfce.org/


Global Forum Cyber Expertise
on Cyber (GFCE)
Expertise

Cybill Tools & https://cybilportal.org/publications/


Publications

Cybil Projects https://cybilportal.org/projects/?_sft_


country=cambodia

The Traffic ENISA – https://www.enisa.europa.eu/


Light Control Considerations topics/csirts-in-europe/glossary/
(TLP) on the Traffic considerations-on-the-traffic-light-
Light Protocol protocol

Conclusion What’s next LinkedIn Learning https://www.linkedin.com/learning/


Security Courses topics/security-3

LinkedIn Learning https://www.linkedin.com/learning/


Instructor Malcolm instructors/malcolm-shore
Shore

Cybersecurity Foundations with Malcolm Shore 4 of 4

You might also like