This commit is contained in:
Z. Cliffe Schreuders
2023-06-22 11:22:59 +01:00
parent 52634fe2fe
commit 0a82387d32
4 changed files with 75 additions and 80 deletions

View File

@@ -6,7 +6,7 @@ This file is an autogenerated index of the lecture videos referenced by scenario
There are 71 videos with CyBOK metadata.
> Cyber Securtiy Body of Knowledge (CyBOK) Issue 1.1 is Crown Copyright, The National Cyber Security Centre 2021, licensed under the Open Government Licence http://www.nationalarchives.gov.uk/doc/open-government-licence/.
> Cyber Security Body of Knowledge (CyBOK) Issue 1.1 is Crown Copyright, The National Cyber Security Centre 2021, licensed under the Open Government Licence http://www.nationalarchives.gov.uk/doc/open-government-licence/.
# Lecture Videos
@@ -21,7 +21,7 @@ There are 71 videos with CyBOK metadata.
https://www.youtube.com/watch?v=sv1pHuuoW9g
| KA | Topics | Keywords |
| --- | --- | --- |
| (IC) | Foundational Concepts | objectives of cyber security |
@@ -37,7 +37,7 @@ There are 71 videos with CyBOK metadata.
https://www.youtube.com/watch?v=grISRv-CuHE
| KA | Topics | Keywords |
| --- | --- | --- |
| Authentication, Authorisation & Accountability (AAA) | Authorisation | access control; Protecting integrity |
@@ -54,7 +54,7 @@ There are 71 videos with CyBOK metadata.
https://www.youtube.com/watch?v=qzyEdeQ_7ZY
| KA | Topics | Keywords |
| --- | --- | --- |
| Forensics (F) | Artifact Analysis | cryptographic hashing |
@@ -72,7 +72,7 @@ There are 71 videos with CyBOK metadata.
https://www.youtube.com/watch?v=kz7m-iyzSOw
| KA | Topics | Keywords |
| --- | --- | --- |
| Operating Systems & Virtualisation (OSV) | Fundamental Concepts | workflows and vocabulary; architectural principles |
@@ -90,7 +90,7 @@ There are 71 videos with CyBOK metadata.
https://youtu.be/lak1Sued4GY
| KA | Topics | Keywords |
| --- | --- | --- |
| Operating Systems & Virtualisation (OSV) | Human Factors: Incident Management | prepare: incident management planning; BUSINESS CONTINUITY PLAN - AND INCIDENT RESPONSE |
@@ -106,7 +106,7 @@ There are 71 videos with CyBOK metadata.
https://youtu.be/stVomGROfbQ
| KA | Topics | Keywords |
| --- | --- | --- |
| Security Operations & Incident Management (SOIM) | Execute: Mitigation and Countermeasures | Recover data and services after an incident |
@@ -123,7 +123,7 @@ There are 71 videos with CyBOK metadata.
https://youtu.be/n8IKEJUOISY
| KA | Topics | Keywords |
| --- | --- | --- |
| Security Operations & Incident Management (SOIM) | Execute: Mitigation and Countermeasures | Recover data and services after an incident; BACKUP - DIFFERENTIAL; BACKUP - INFERENTIAL |
@@ -140,7 +140,7 @@ There are 71 videos with CyBOK metadata.
https://youtu.be/raR0HstMnjg
| KA | Topics | Keywords |
| --- | --- | --- |
| Security Operations & Incident Management (SOIM) | Execute: Mitigation and Countermeasures | DATA REDUNDANCY; REDUNDANCY IN NETWORK SERVICES |
@@ -159,7 +159,7 @@ There are 71 videos with CyBOK metadata.
https://youtu.be/3oDVTSFhl8Y
| KA | Topics | Keywords |
| --- | --- | --- |
| Security Operations & Incident Management (SOIM) | Execute: Mitigation and Countermeasures | DATA REDUNDANCY |
@@ -175,7 +175,7 @@ There are 71 videos with CyBOK metadata.
https://youtu.be/M6MisvbU32M
| KA | Topics | Keywords |
| --- | --- | --- |
| Security Operations & Incident Management (SOIM) | Monitor: Data Sources | network traffic |
@@ -195,7 +195,7 @@ There are 71 videos with CyBOK metadata.
https://youtu.be/ZUMBsMppsLo
| KA | Topics | Keywords |
| --- | --- | --- |
| Security Operations & Incident Management (SOIM) | Analyse: Analysis Methods | the base-rate fallacy |
@@ -214,7 +214,7 @@ There are 71 videos with CyBOK metadata.
https://youtu.be/nuUm4NO_S1s
| KA | Topics | Keywords |
| --- | --- | --- |
| Security Operations & Incident Management (SOIM) | Monitor: Data Sources | network traffic |
@@ -234,7 +234,7 @@ There are 71 videos with CyBOK metadata.
https://youtu.be/4zYn4hbwKYQ
| KA | Topics | Keywords |
| --- | --- | --- |
| (N/A) | Hints | Technical hint |
@@ -250,7 +250,7 @@ There are 71 videos with CyBOK metadata.
https://youtu.be/Y32tmFrCEBk
| KA | Topics | Keywords |
| --- | --- | --- |
| Security Operations & Incident Management (SOIM) | Monitor: Data Sources | network traffic |
@@ -269,7 +269,7 @@ There are 71 videos with CyBOK metadata.
https://youtu.be/aNvVtF437LI
| KA | Topics | Keywords |
| --- | --- | --- |
| Forensics (F) | Main Memory Forensics | process information; file information; network connections; artifacts and fragments; challenges of live forensics |
@@ -288,7 +288,7 @@ There are 71 videos with CyBOK metadata.
https://www.youtube.com/watch?v=iUInvMrBw3k
| KA | Topics | Keywords |
| --- | --- | --- |
| Forensics (F) | Main Memory Forensics | process information; file information; network connections; artifacts and fragments; challenges of live forensics |
@@ -307,7 +307,7 @@ There are 71 videos with CyBOK metadata.
https://youtu.be/9nyvtJRQ17w
| KA | Topics | Keywords |
| --- | --- | --- |
| Forensics (F) | Main Memory Forensics | process information; file information; network connections |
@@ -323,7 +323,7 @@ There are 71 videos with CyBOK metadata.
https://youtu.be/3kiV0ZJWmMY
| KA | Topics | Keywords |
| --- | --- | --- |
| Forensics (F) | Operating System Analysis | storage forensics; data recovery and file content carving; Timeline analysis |
@@ -341,7 +341,7 @@ There are 71 videos with CyBOK metadata.
https://youtu.be/0EafG4CLwA4
| KA | Topics | Keywords |
| --- | --- | --- |
| Security Operations & Incident Management (SOIM) | Monitor: Data Sources | system and kernel logs; application logs: web server logs and files; Syslog |
@@ -358,7 +358,7 @@ There are 71 videos with CyBOK metadata.
https://youtu.be/14Hv_QodLxs
| KA | Topics | Keywords |
| --- | --- | --- |
| Malware & Attack Technology (MAT) | Malware Analysis | analysis techniques; analysis environments; STATIC ANALYSIS |
@@ -374,7 +374,7 @@ There are 71 videos with CyBOK metadata.
https://youtu.be/quKsZbpvYIY
| KA | Topics | Keywords |
| --- | --- | --- |
| Malware & Attack Technology (MAT) | Malware Analysis | analysis techniques; analysis environments; DYNAMIC ANALYSIS |
@@ -390,7 +390,7 @@ There are 71 videos with CyBOK metadata.
https://youtu.be/CxZx7b3OPsg
| KA | Topics | Keywords |
| --- | --- | --- |
| Malware & Attack Technology (MAT) | Malware Taxonomy | potentially unwanted programs |
@@ -407,7 +407,7 @@ There are 71 videos with CyBOK metadata.
https://youtu.be/3qmmqfBtJio
| KA | Topics | Keywords |
| --- | --- | --- |
| Malware & Attack Technology (MAT) | Malware Taxonomy | dimensions; kinds; potentially unwanted programs |
@@ -423,7 +423,7 @@ There are 71 videos with CyBOK metadata.
https://youtu.be/k3NwrFWuhaY
| KA | Topics | Keywords |
| --- | --- | --- |
| Malware & Attack Technology (MAT) | Malware Detection | ANTI-MALWARE - SYSTEMS; ANTIVIRUS SOFTWARE; MALCODE/MALWARE - COUNTERMEASURES - CODE SIGNING; MALCODE/MALWARE - COUNTERMEASURES - SANDBOXING; MALCODE/MALWARE - THIRD-PARTY CERTIFICATIONS |
@@ -439,7 +439,7 @@ There are 71 videos with CyBOK metadata.
https://youtu.be/chebVVwj1kM
| KA | Topics | Keywords |
| --- | --- | --- |
| Malware & Attack Technology (MAT) | Technical Underpinning | Technical underpinnings for malware analysis: C |
@@ -455,7 +455,7 @@ There are 71 videos with CyBOK metadata.
https://youtu.be/2R4QzDAfzLQ
| KA | Topics | Keywords |
| --- | --- | --- |
| Malware & Attack Technology (MAT) | Technical Underpinning | Technical underpinnings for malware analysis: C |
@@ -471,7 +471,7 @@ There are 71 videos with CyBOK metadata.
https://youtu.be/QbyorEb3WTs
| KA | Topics | Keywords |
| --- | --- | --- |
| Malware & Attack Technology (MAT) | Technical Underpinning | Technical underpinnings for malware analysis: ASM; Technical underpinnings for malware analysis: C |
@@ -487,7 +487,7 @@ There are 71 videos with CyBOK metadata.
https://youtu.be/8b6JokfEFEo
| KA | Topics | Keywords |
| --- | --- | --- |
| Malware & Attack Technology (MAT) | Malware Analysis | analysis techniques |
@@ -503,7 +503,7 @@ There are 71 videos with CyBOK metadata.
https://youtu.be/0zUmUZoEpC4
| KA | Topics | Keywords |
| --- | --- | --- |
| Malware & Attack Technology (MAT) | Malware Analysis | analysis techniques; analysis environments; STATIC ANALYSIS |
@@ -519,7 +519,7 @@ There are 71 videos with CyBOK metadata.
https://youtu.be/m73pHO_0vhI
| KA | Topics | Keywords |
| --- | --- | --- |
| Malware & Attack Technology (MAT) | Malware Analysis | analysis techniques; analysis environments; STATIC ANALYSIS |
@@ -535,7 +535,7 @@ There are 71 videos with CyBOK metadata.
https://youtu.be/6MeJIr3EKKM
| KA | Topics | Keywords |
| --- | --- | --- |
| Malware & Attack Technology (MAT) | Malware Analysis | analysis techniques; analysis environments; DYNAMIC ANALYSIS |
@@ -551,7 +551,7 @@ There are 71 videos with CyBOK metadata.
https://youtu.be/pExTbDVt0Gw
| KA | Topics | Keywords |
| --- | --- | --- |
| Malware & Attack Technology (MAT) | Malware Analysis | analysis techniques; analysis environments; DYNAMIC ANALYSIS |
@@ -567,7 +567,7 @@ There are 71 videos with CyBOK metadata.
https://youtu.be/6XMrHyAqD-4
| KA | Topics | Keywords |
| --- | --- | --- |
| Malware & Attack Technology (MAT) | Malware Analysis | analysis techniques; MALICIOUS ACTIVITIES BY MALWARE |
@@ -583,7 +583,7 @@ There are 71 videos with CyBOK metadata.
https://youtu.be/KJPeZptzl1U
| KA | Topics | Keywords |
| --- | --- | --- |
| Malware & Attack Technology (MAT) | Malware Analysis | analysis techniques; MALICIOUS ACTIVITIES BY MALWARE |
@@ -599,7 +599,7 @@ There are 71 videos with CyBOK metadata.
https://youtu.be/6qeDnjOaRiI
| KA | Topics | Keywords |
| --- | --- | --- |
| Malware & Attack Technology (MAT) | Malware Analysis | analysis techniques; MALICIOUS ACTIVITIES BY MALWARE |
@@ -615,7 +615,7 @@ There are 71 videos with CyBOK metadata.
https://youtu.be/jo_07iOplzA
| KA | Topics | Keywords |
| --- | --- | --- |
| Malware & Attack Technology (MAT) | Attacks and exploitation | EXPLOITATION |
@@ -631,7 +631,7 @@ There are 71 videos with CyBOK metadata.
https://youtu.be/1Hy_166CwRk
| KA | Topics | Keywords |
| --- | --- | --- |
| Malware & Attack Technology (MAT) | Attacks and exploitation | EXPLOITATION |
@@ -647,7 +647,7 @@ There are 71 videos with CyBOK metadata.
https://youtu.be/nVpqjsfii6c
| KA | Topics | Keywords |
| --- | --- | --- |
| Software Security (SS) | Categories of Vulnerabilities | structured output generation vulnerabilities |
@@ -664,7 +664,7 @@ There are 71 videos with CyBOK metadata.
https://youtu.be/PH73lpG2B1M
| KA | Topics | Keywords |
| --- | --- | --- |
| Software Security (SS) | Categories of Vulnerabilities | race condition vulnerabilities |
@@ -681,7 +681,7 @@ There are 71 videos with CyBOK metadata.
https://youtu.be/Du3fVc_ZLiI
| KA | Topics | Keywords |
| --- | --- | --- |
| Software Security (SS) | Categories of Vulnerabilities | Format string attacks |
@@ -697,7 +697,7 @@ There are 71 videos with CyBOK metadata.
https://youtu.be/nwxtlR31hvw
| KA | Topics | Keywords |
| --- | --- | --- |
| Software Security (SS) | Detection of Vulnerabilities | dynamic detection |
@@ -713,7 +713,7 @@ There are 71 videos with CyBOK metadata.
https://youtu.be/vT2PP7VnSNw
| KA | Topics | Keywords |
| --- | --- | --- |
| Software Security (SS) | Detection of Vulnerabilities | dynamic detection |
@@ -729,7 +729,7 @@ There are 71 videos with CyBOK metadata.
https://youtu.be/Zh7IdmnCfy0
| KA | Topics | Keywords |
| --- | --- | --- |
| Software Security (SS) | Categories of Vulnerabilities | memory management vulnerabilities |
@@ -745,7 +745,7 @@ There are 71 videos with CyBOK metadata.
https://youtu.be/WU06L-u0t2Q
| KA | Topics | Keywords |
| --- | --- | --- |
| Software Security (SS) | Categories of Vulnerabilities | memory management vulnerabilities |
@@ -761,7 +761,7 @@ There are 71 videos with CyBOK metadata.
https://youtu.be/j2S-XgY-Fyg
| KA | Topics | Keywords |
| --- | --- | --- |
| Software Security (SS) | Categories of Vulnerabilities | memory management vulnerabilities |
@@ -777,7 +777,7 @@ There are 71 videos with CyBOK metadata.
https://youtu.be/Lf1UPaqPJMM
| KA | Topics | Keywords |
| --- | --- | --- |
| Software Security (SS) | Technical Underpinning | Technical underpinnings for memory management vulnerabilities: the stack |
@@ -793,7 +793,7 @@ There are 71 videos with CyBOK metadata.
https://youtu.be/5OUQ7ExlgKI
| KA | Topics | Keywords |
| --- | --- | --- |
| Software Security (SS) | Technical Underpinning | Technical underpinnings for memory management vulnerabilities: the stack |
@@ -809,7 +809,7 @@ There are 71 videos with CyBOK metadata.
https://youtu.be/oi_CfBe_umU
| KA | Topics | Keywords |
| --- | --- | --- |
| (SSL) | Prescriptive Processes | Microsoft SDL |
@@ -826,7 +826,7 @@ There are 71 videos with CyBOK metadata.
https://youtu.be/Wry2get_RRc
| KA | Topics | Keywords |
| --- | --- | --- |
| (SSL) | Prescriptive Processes | Microsoft SDL |
@@ -843,7 +843,7 @@ There are 71 videos with CyBOK metadata.
https://youtu.be/ywLXfSR5YWk
| KA | Topics | Keywords |
| --- | --- | --- |
| Operating Systems & Virtualisation (OSV) | OS Security Principles | Saltzer and Schroeders principles; newer principles |
@@ -859,7 +859,7 @@ There are 71 videos with CyBOK metadata.
https://youtu.be/v2rChKDAmFg
| KA | Topics | Keywords |
| --- | --- | --- |
| (SSL) | Motivations for Secure Software Lifecycle | vulnerabilities can be exploited without being noticed |
@@ -876,7 +876,7 @@ There are 71 videos with CyBOK metadata.
https://youtu.be/xwsBaNQZozg
| KA | Topics | Keywords |
| --- | --- | --- |
| (SSL) | Prescriptive Processes | Open source secure development |
@@ -892,7 +892,7 @@ There are 71 videos with CyBOK metadata.
https://youtu.be/2I_JSdTu-oI
| KA | Topics | Keywords |
| --- | --- | --- |
| Authentication, Authorisation & Accountability (AAA) | Authentication | user authentication |
@@ -909,7 +909,7 @@ There are 71 videos with CyBOK metadata.
https://youtu.be/pGcJEML1mRo
| KA | Topics | Keywords |
| --- | --- | --- |
| Authentication, Authorisation & Accountability (AAA) | Authentication | user authentication; Cryptography and authentication (hashes and attacks against authentication schemes / passwords) |
@@ -926,7 +926,7 @@ There are 71 videos with CyBOK metadata.
https://youtu.be/icC2Zrno_uM
| KA | Topics | Keywords |
| --- | --- | --- |
| Authentication, Authorisation & Accountability (AAA) | Authentication | user authentication; Cryptography and authentication (hashes and attacks against authentication schemes / passwords) |
@@ -943,7 +943,7 @@ There are 71 videos with CyBOK metadata.
https://youtu.be/Wrg6XZu6Luw
| KA | Topics | Keywords |
| --- | --- | --- |
| Authentication, Authorisation & Accountability (AAA) | Authentication | user authentication; Cryptography and authentication (hashes and attacks against authentication schemes / passwords) |
@@ -960,7 +960,7 @@ There are 71 videos with CyBOK metadata.
https://youtu.be/z4L6Yv5ry1A
| KA | Topics | Keywords |
| --- | --- | --- |
| Authentication, Authorisation & Accountability (AAA) | Authentication | identity management; user authentication; facets of authentication |
@@ -977,7 +977,7 @@ There are 71 videos with CyBOK metadata.
https://youtu.be/-zcnfmoLjYI
| KA | Topics | Keywords |
| --- | --- | --- |
| Authentication, Authorisation & Accountability (AAA) | Authentication | identity management; user authentication; facets of authentication; AUTHENTICATION - BIOMETRICS |
@@ -993,7 +993,7 @@ There are 71 videos with CyBOK metadata.
https://youtu.be/xHs3LB4Yyrk
| KA | Topics | Keywords |
| --- | --- | --- |
| Authentication, Authorisation & Accountability (AAA) | Authentication | identity management; user authentication; facets of authentication; AUTHENTICATION - OTP (ONE-TIME PASSWORD); AUTHENTICATION - TOKENS |
@@ -1009,7 +1009,7 @@ There are 71 videos with CyBOK metadata.
https://youtu.be/c2dPdQmaVyo
| KA | Topics | Keywords |
| --- | --- | --- |
| Authentication, Authorisation & Accountability (AAA) | Authentication | identity management; authentication in distributed systems; user authentication; Network based-authentication with heterogeneous Linux and Windows networks |
@@ -1027,7 +1027,7 @@ There are 71 videos with CyBOK metadata.
https://youtu.be/dCBabesIXo8
| KA | Topics | Keywords |
| --- | --- | --- |
| Authentication, Authorisation & Accountability (AAA) | Authentication | identity management; authentication in distributed systems; user authentication |
@@ -1044,7 +1044,7 @@ There are 71 videos with CyBOK metadata.
https://youtu.be/rhdcxhSDqp4
| KA | Topics | Keywords |
| --- | --- | --- |
| Authentication, Authorisation & Accountability (AAA) | Authentication | identity management; authentication in distributed systems; user authentication; Network based-authentication with heterogeneous Linux and Windows networks |
@@ -1061,7 +1061,7 @@ There are 71 videos with CyBOK metadata.
https://youtu.be/PCXK2cK8tpE
| KA | Topics | Keywords |
| --- | --- | --- |
| Authentication, Authorisation & Accountability (AAA) | Authentication | identity management; authentication in distributed systems; user authentication; Network based-authentication with heterogeneous Linux and Windows networks |
@@ -1079,7 +1079,7 @@ There are 71 videos with CyBOK metadata.
https://youtu.be/yWJyZEFbchQ
| KA | Topics | Keywords |
| --- | --- | --- |
| Authentication, Authorisation & Accountability (AAA) | Authorisation | access control; enforcing access control; theory |
@@ -1097,7 +1097,7 @@ There are 71 videos with CyBOK metadata.
https://youtu.be/i0kO_3ExJv4
| KA | Topics | Keywords |
| --- | --- | --- |
| Authentication, Authorisation & Accountability (AAA) | Authorisation | access control; enforcing access control; ACCESS CONTROL - DAC (DISCRETIONARY ACCESS CONTROL) |
@@ -1115,7 +1115,7 @@ There are 71 videos with CyBOK metadata.
https://youtu.be/viSkkNB777k
| KA | Topics | Keywords |
| --- | --- | --- |
| Authentication, Authorisation & Accountability (AAA) | Authorisation | access control; theory; ACCESS CONTROL - DAC (DISCRETIONARY ACCESS CONTROL); ACCESS CONTROL - MAC (MANDATORY ACCESS CONTROL); ACCESS CONTROL - NDAC (NON-DISCRETIONARY ACCESS CONTROL); ACCESS CONTROL - ROLE-BASED |
@@ -1132,7 +1132,7 @@ There are 71 videos with CyBOK metadata.
https://youtu.be/PGHsb3bg_h4
| KA | Topics | Keywords |
| --- | --- | --- |
| Authentication, Authorisation & Accountability (AAA) | Authorisation | access control; Elevated privileges; Real and effective identity; Vulnerabilities and attacks on access control misconfigurations |
@@ -1149,7 +1149,7 @@ There are 71 videos with CyBOK metadata.
https://youtu.be/Bn3NJhgmdLk
| KA | Topics | Keywords |
| --- | --- | --- |
| Authentication, Authorisation & Accountability (AAA) | Authorisation | access control; ACCESS CONTROL - MATRIX; ACCESS CONTROL LIST (ACL); Vulnerabilities and attacks on access control misconfigurations |
@@ -1166,7 +1166,7 @@ There are 71 videos with CyBOK metadata.
https://youtu.be/OT7ifs8PkHI
| KA | Topics | Keywords |
| --- | --- | --- |
| Authentication, Authorisation & Accountability (AAA) | Authorisation | access control; ACCESS CONTROL LIST (ACL); Vulnerabilities and attacks on access control misconfigurations |
@@ -1183,7 +1183,7 @@ There are 71 videos with CyBOK metadata.
https://youtu.be/f4yBcKkb12g
| KA | Topics | Keywords |
| --- | --- | --- |
| Authentication, Authorisation & Accountability (AAA) | Authorisation | SANDBOX; Application-based access controls: user-based access controls insufficiently limit privileges |
@@ -1202,12 +1202,9 @@ There are 71 videos with CyBOK metadata.
https://youtu.be/Xgs5akM6ayc
| KA | Topics | Keywords |
| --- | --- | --- |
| Authentication, Authorisation & Accountability (AAA) | Authorisation | ACCESS CONTROL - MAC (MANDATORY ACCESS CONTROL); ACCESS CONTROL - NDAC (NON-DISCRETIONARY ACCESS CONTROL); Application-based access controls: user-based access controls insufficiently limit privileges; Rule-based sandboxes; System call interposition; Integrity level access controls |
| Operating Systems & Virtualisation (OSV) | Primitives for Isolation and Mediation | Rule-based controls: Fine grained: AppArmor |
| Software Security (SS) | Mitigating Exploitation | limiting privileges |

View File

@@ -8,7 +8,7 @@ You can browse the list below in terms of the [CyBOK Knowledge Areas, and Topics
> The all lowercase topics and keywords are provided by NCSC for CyBOK mapping, while all caps indicates it is taken from the [CyBOK mapping reference](https://www.cybok.org/media/downloads/CyBOk-mapping-reference-v1.1.pdf), mixed case keywords are ones that we have added.
> Cyber Securtiy Body of Knowledge (CyBOK) Issue 1.1 is Crown Copyright, The National Cyber Security Centre 2021, licensed under the Open Government Licence http://www.nationalarchives.gov.uk/doc/open-government-licence/.
> Cyber Security Body of Knowledge (CyBOK) Issue 1.1 is Crown Copyright, The National Cyber Security Centre 2021, licensed under the Open Government Licence http://www.nationalarchives.gov.uk/doc/open-government-licence/.
# Scenarios Indexed By CyBOK Knowledge Area (KA)
@@ -3448,5 +3448,3 @@ Command to build VMs and start scenario:
```ruby secgen.rb -s scenarios/labs/web_security/websec_lab.xml run```
[View source](scenarios/labs/web_security/websec_lab.xml)

View File

@@ -8,7 +8,7 @@ You can browse the list below in terms of the [CyBOK Knowledge Areas, and Topics
> The all lowercase topics and keywords are provided by NCSC for CyBOK mapping, while all caps indicates it is taken from the [CyBOK mapping reference](https://www.cybok.org/media/downloads/CyBOk-mapping-reference-v1.1.pdf), mixed case keywords are ones that we have added.
> Cyber Securtiy Body of Knowledge (CyBOK) Issue 1.1 is Crown Copyright, The National Cyber Security Centre 2021, licensed under the Open Government Licence http://www.nationalarchives.gov.uk/doc/open-government-licence/.
> Cyber Security Body of Knowledge (CyBOK) Issue 1.1 is Crown Copyright, The National Cyber Security Centre 2021, licensed under the Open Government Licence http://www.nationalarchives.gov.uk/doc/open-government-licence/.
# Scenarios Indexed By CyBOK Knowledge Area (KA)

View File

@@ -6,7 +6,7 @@ This file is an autogenerated index of the lecture videos referenced by scenario
There are <%= VIDEO_HASH.length %> videos with CyBOK metadata.
> Cyber Securtiy Body of Knowledge (CyBOK) Issue 1.1 is Crown Copyright, The National Cyber Security Centre 2021, licensed under the Open Government Licence http://www.nationalarchives.gov.uk/doc/open-government-licence/.
> Cyber Security Body of Knowledge (CyBOK) Issue 1.1 is Crown Copyright, The National Cyber Security Centre 2021, licensed under the Open Government Licence http://www.nationalarchives.gov.uk/doc/open-government-licence/.
# Lecture Videos