mirror of
https://github.com/cliffe/SecGen.git
synced 2026-02-21 11:18:06 +00:00
fix typo
This commit is contained in:
@@ -6,7 +6,7 @@ This file is an autogenerated index of the lecture videos referenced by scenario
|
||||
|
||||
There are 71 videos with CyBOK metadata.
|
||||
|
||||
> Cyber Securtiy Body of Knowledge (CyBOK) Issue 1.1 is Crown Copyright, The National Cyber Security Centre 2021, licensed under the Open Government Licence http://www.nationalarchives.gov.uk/doc/open-government-licence/.
|
||||
> Cyber Security Body of Knowledge (CyBOK) Issue 1.1 is Crown Copyright, The National Cyber Security Centre 2021, licensed under the Open Government Licence http://www.nationalarchives.gov.uk/doc/open-government-licence/.
|
||||
|
||||
|
||||
# Lecture Videos
|
||||
@@ -21,7 +21,7 @@ There are 71 videos with CyBOK metadata.
|
||||
|
||||
https://www.youtube.com/watch?v=sv1pHuuoW9g
|
||||
|
||||
|
||||
|
||||
| KA | Topics | Keywords |
|
||||
| --- | --- | --- |
|
||||
| (IC) | Foundational Concepts | objectives of cyber security |
|
||||
@@ -37,7 +37,7 @@ There are 71 videos with CyBOK metadata.
|
||||
|
||||
https://www.youtube.com/watch?v=grISRv-CuHE
|
||||
|
||||
|
||||
|
||||
| KA | Topics | Keywords |
|
||||
| --- | --- | --- |
|
||||
| Authentication, Authorisation & Accountability (AAA) | Authorisation | access control; Protecting integrity |
|
||||
@@ -54,7 +54,7 @@ There are 71 videos with CyBOK metadata.
|
||||
|
||||
https://www.youtube.com/watch?v=qzyEdeQ_7ZY
|
||||
|
||||
|
||||
|
||||
| KA | Topics | Keywords |
|
||||
| --- | --- | --- |
|
||||
| Forensics (F) | Artifact Analysis | cryptographic hashing |
|
||||
@@ -72,7 +72,7 @@ There are 71 videos with CyBOK metadata.
|
||||
|
||||
https://www.youtube.com/watch?v=kz7m-iyzSOw
|
||||
|
||||
|
||||
|
||||
| KA | Topics | Keywords |
|
||||
| --- | --- | --- |
|
||||
| Operating Systems & Virtualisation (OSV) | Fundamental Concepts | workflows and vocabulary; architectural principles |
|
||||
@@ -90,7 +90,7 @@ There are 71 videos with CyBOK metadata.
|
||||
|
||||
https://youtu.be/lak1Sued4GY
|
||||
|
||||
|
||||
|
||||
| KA | Topics | Keywords |
|
||||
| --- | --- | --- |
|
||||
| Operating Systems & Virtualisation (OSV) | Human Factors: Incident Management | prepare: incident management planning; BUSINESS CONTINUITY PLAN - AND INCIDENT RESPONSE |
|
||||
@@ -106,7 +106,7 @@ There are 71 videos with CyBOK metadata.
|
||||
|
||||
https://youtu.be/stVomGROfbQ
|
||||
|
||||
|
||||
|
||||
| KA | Topics | Keywords |
|
||||
| --- | --- | --- |
|
||||
| Security Operations & Incident Management (SOIM) | Execute: Mitigation and Countermeasures | Recover data and services after an incident |
|
||||
@@ -123,7 +123,7 @@ There are 71 videos with CyBOK metadata.
|
||||
|
||||
https://youtu.be/n8IKEJUOISY
|
||||
|
||||
|
||||
|
||||
| KA | Topics | Keywords |
|
||||
| --- | --- | --- |
|
||||
| Security Operations & Incident Management (SOIM) | Execute: Mitigation and Countermeasures | Recover data and services after an incident; BACKUP - DIFFERENTIAL; BACKUP - INFERENTIAL |
|
||||
@@ -140,7 +140,7 @@ There are 71 videos with CyBOK metadata.
|
||||
|
||||
https://youtu.be/raR0HstMnjg
|
||||
|
||||
|
||||
|
||||
| KA | Topics | Keywords |
|
||||
| --- | --- | --- |
|
||||
| Security Operations & Incident Management (SOIM) | Execute: Mitigation and Countermeasures | DATA REDUNDANCY; REDUNDANCY IN NETWORK SERVICES |
|
||||
@@ -159,7 +159,7 @@ There are 71 videos with CyBOK metadata.
|
||||
|
||||
https://youtu.be/3oDVTSFhl8Y
|
||||
|
||||
|
||||
|
||||
| KA | Topics | Keywords |
|
||||
| --- | --- | --- |
|
||||
| Security Operations & Incident Management (SOIM) | Execute: Mitigation and Countermeasures | DATA REDUNDANCY |
|
||||
@@ -175,7 +175,7 @@ There are 71 videos with CyBOK metadata.
|
||||
|
||||
https://youtu.be/M6MisvbU32M
|
||||
|
||||
|
||||
|
||||
| KA | Topics | Keywords |
|
||||
| --- | --- | --- |
|
||||
| Security Operations & Incident Management (SOIM) | Monitor: Data Sources | network traffic |
|
||||
@@ -195,7 +195,7 @@ There are 71 videos with CyBOK metadata.
|
||||
|
||||
https://youtu.be/ZUMBsMppsLo
|
||||
|
||||
|
||||
|
||||
| KA | Topics | Keywords |
|
||||
| --- | --- | --- |
|
||||
| Security Operations & Incident Management (SOIM) | Analyse: Analysis Methods | the base-rate fallacy |
|
||||
@@ -214,7 +214,7 @@ There are 71 videos with CyBOK metadata.
|
||||
|
||||
https://youtu.be/nuUm4NO_S1s
|
||||
|
||||
|
||||
|
||||
| KA | Topics | Keywords |
|
||||
| --- | --- | --- |
|
||||
| Security Operations & Incident Management (SOIM) | Monitor: Data Sources | network traffic |
|
||||
@@ -234,7 +234,7 @@ There are 71 videos with CyBOK metadata.
|
||||
|
||||
https://youtu.be/4zYn4hbwKYQ
|
||||
|
||||
|
||||
|
||||
| KA | Topics | Keywords |
|
||||
| --- | --- | --- |
|
||||
| (N/A) | Hints | Technical hint |
|
||||
@@ -250,7 +250,7 @@ There are 71 videos with CyBOK metadata.
|
||||
|
||||
https://youtu.be/Y32tmFrCEBk
|
||||
|
||||
|
||||
|
||||
| KA | Topics | Keywords |
|
||||
| --- | --- | --- |
|
||||
| Security Operations & Incident Management (SOIM) | Monitor: Data Sources | network traffic |
|
||||
@@ -269,7 +269,7 @@ There are 71 videos with CyBOK metadata.
|
||||
|
||||
https://youtu.be/aNvVtF437LI
|
||||
|
||||
|
||||
|
||||
| KA | Topics | Keywords |
|
||||
| --- | --- | --- |
|
||||
| Forensics (F) | Main Memory Forensics | process information; file information; network connections; artifacts and fragments; challenges of live forensics |
|
||||
@@ -288,7 +288,7 @@ There are 71 videos with CyBOK metadata.
|
||||
|
||||
https://www.youtube.com/watch?v=iUInvMrBw3k
|
||||
|
||||
|
||||
|
||||
| KA | Topics | Keywords |
|
||||
| --- | --- | --- |
|
||||
| Forensics (F) | Main Memory Forensics | process information; file information; network connections; artifacts and fragments; challenges of live forensics |
|
||||
@@ -307,7 +307,7 @@ There are 71 videos with CyBOK metadata.
|
||||
|
||||
https://youtu.be/9nyvtJRQ17w
|
||||
|
||||
|
||||
|
||||
| KA | Topics | Keywords |
|
||||
| --- | --- | --- |
|
||||
| Forensics (F) | Main Memory Forensics | process information; file information; network connections |
|
||||
@@ -323,7 +323,7 @@ There are 71 videos with CyBOK metadata.
|
||||
|
||||
https://youtu.be/3kiV0ZJWmMY
|
||||
|
||||
|
||||
|
||||
| KA | Topics | Keywords |
|
||||
| --- | --- | --- |
|
||||
| Forensics (F) | Operating System Analysis | storage forensics; data recovery and file content carving; Timeline analysis |
|
||||
@@ -341,7 +341,7 @@ There are 71 videos with CyBOK metadata.
|
||||
|
||||
https://youtu.be/0EafG4CLwA4
|
||||
|
||||
|
||||
|
||||
| KA | Topics | Keywords |
|
||||
| --- | --- | --- |
|
||||
| Security Operations & Incident Management (SOIM) | Monitor: Data Sources | system and kernel logs; application logs: web server logs and files; Syslog |
|
||||
@@ -358,7 +358,7 @@ There are 71 videos with CyBOK metadata.
|
||||
|
||||
https://youtu.be/14Hv_QodLxs
|
||||
|
||||
|
||||
|
||||
| KA | Topics | Keywords |
|
||||
| --- | --- | --- |
|
||||
| Malware & Attack Technology (MAT) | Malware Analysis | analysis techniques; analysis environments; STATIC ANALYSIS |
|
||||
@@ -374,7 +374,7 @@ There are 71 videos with CyBOK metadata.
|
||||
|
||||
https://youtu.be/quKsZbpvYIY
|
||||
|
||||
|
||||
|
||||
| KA | Topics | Keywords |
|
||||
| --- | --- | --- |
|
||||
| Malware & Attack Technology (MAT) | Malware Analysis | analysis techniques; analysis environments; DYNAMIC ANALYSIS |
|
||||
@@ -390,7 +390,7 @@ There are 71 videos with CyBOK metadata.
|
||||
|
||||
https://youtu.be/CxZx7b3OPsg
|
||||
|
||||
|
||||
|
||||
| KA | Topics | Keywords |
|
||||
| --- | --- | --- |
|
||||
| Malware & Attack Technology (MAT) | Malware Taxonomy | potentially unwanted programs |
|
||||
@@ -407,7 +407,7 @@ There are 71 videos with CyBOK metadata.
|
||||
|
||||
https://youtu.be/3qmmqfBtJio
|
||||
|
||||
|
||||
|
||||
| KA | Topics | Keywords |
|
||||
| --- | --- | --- |
|
||||
| Malware & Attack Technology (MAT) | Malware Taxonomy | dimensions; kinds; potentially unwanted programs |
|
||||
@@ -423,7 +423,7 @@ There are 71 videos with CyBOK metadata.
|
||||
|
||||
https://youtu.be/k3NwrFWuhaY
|
||||
|
||||
|
||||
|
||||
| KA | Topics | Keywords |
|
||||
| --- | --- | --- |
|
||||
| Malware & Attack Technology (MAT) | Malware Detection | ANTI-MALWARE - SYSTEMS; ANTIVIRUS SOFTWARE; MALCODE/MALWARE - COUNTERMEASURES - CODE SIGNING; MALCODE/MALWARE - COUNTERMEASURES - SANDBOXING; MALCODE/MALWARE - THIRD-PARTY CERTIFICATIONS |
|
||||
@@ -439,7 +439,7 @@ There are 71 videos with CyBOK metadata.
|
||||
|
||||
https://youtu.be/chebVVwj1kM
|
||||
|
||||
|
||||
|
||||
| KA | Topics | Keywords |
|
||||
| --- | --- | --- |
|
||||
| Malware & Attack Technology (MAT) | Technical Underpinning | Technical underpinnings for malware analysis: C |
|
||||
@@ -455,7 +455,7 @@ There are 71 videos with CyBOK metadata.
|
||||
|
||||
https://youtu.be/2R4QzDAfzLQ
|
||||
|
||||
|
||||
|
||||
| KA | Topics | Keywords |
|
||||
| --- | --- | --- |
|
||||
| Malware & Attack Technology (MAT) | Technical Underpinning | Technical underpinnings for malware analysis: C |
|
||||
@@ -471,7 +471,7 @@ There are 71 videos with CyBOK metadata.
|
||||
|
||||
https://youtu.be/QbyorEb3WTs
|
||||
|
||||
|
||||
|
||||
| KA | Topics | Keywords |
|
||||
| --- | --- | --- |
|
||||
| Malware & Attack Technology (MAT) | Technical Underpinning | Technical underpinnings for malware analysis: ASM; Technical underpinnings for malware analysis: C |
|
||||
@@ -487,7 +487,7 @@ There are 71 videos with CyBOK metadata.
|
||||
|
||||
https://youtu.be/8b6JokfEFEo
|
||||
|
||||
|
||||
|
||||
| KA | Topics | Keywords |
|
||||
| --- | --- | --- |
|
||||
| Malware & Attack Technology (MAT) | Malware Analysis | analysis techniques |
|
||||
@@ -503,7 +503,7 @@ There are 71 videos with CyBOK metadata.
|
||||
|
||||
https://youtu.be/0zUmUZoEpC4
|
||||
|
||||
|
||||
|
||||
| KA | Topics | Keywords |
|
||||
| --- | --- | --- |
|
||||
| Malware & Attack Technology (MAT) | Malware Analysis | analysis techniques; analysis environments; STATIC ANALYSIS |
|
||||
@@ -519,7 +519,7 @@ There are 71 videos with CyBOK metadata.
|
||||
|
||||
https://youtu.be/m73pHO_0vhI
|
||||
|
||||
|
||||
|
||||
| KA | Topics | Keywords |
|
||||
| --- | --- | --- |
|
||||
| Malware & Attack Technology (MAT) | Malware Analysis | analysis techniques; analysis environments; STATIC ANALYSIS |
|
||||
@@ -535,7 +535,7 @@ There are 71 videos with CyBOK metadata.
|
||||
|
||||
https://youtu.be/6MeJIr3EKKM
|
||||
|
||||
|
||||
|
||||
| KA | Topics | Keywords |
|
||||
| --- | --- | --- |
|
||||
| Malware & Attack Technology (MAT) | Malware Analysis | analysis techniques; analysis environments; DYNAMIC ANALYSIS |
|
||||
@@ -551,7 +551,7 @@ There are 71 videos with CyBOK metadata.
|
||||
|
||||
https://youtu.be/pExTbDVt0Gw
|
||||
|
||||
|
||||
|
||||
| KA | Topics | Keywords |
|
||||
| --- | --- | --- |
|
||||
| Malware & Attack Technology (MAT) | Malware Analysis | analysis techniques; analysis environments; DYNAMIC ANALYSIS |
|
||||
@@ -567,7 +567,7 @@ There are 71 videos with CyBOK metadata.
|
||||
|
||||
https://youtu.be/6XMrHyAqD-4
|
||||
|
||||
|
||||
|
||||
| KA | Topics | Keywords |
|
||||
| --- | --- | --- |
|
||||
| Malware & Attack Technology (MAT) | Malware Analysis | analysis techniques; MALICIOUS ACTIVITIES BY MALWARE |
|
||||
@@ -583,7 +583,7 @@ There are 71 videos with CyBOK metadata.
|
||||
|
||||
https://youtu.be/KJPeZptzl1U
|
||||
|
||||
|
||||
|
||||
| KA | Topics | Keywords |
|
||||
| --- | --- | --- |
|
||||
| Malware & Attack Technology (MAT) | Malware Analysis | analysis techniques; MALICIOUS ACTIVITIES BY MALWARE |
|
||||
@@ -599,7 +599,7 @@ There are 71 videos with CyBOK metadata.
|
||||
|
||||
https://youtu.be/6qeDnjOaRiI
|
||||
|
||||
|
||||
|
||||
| KA | Topics | Keywords |
|
||||
| --- | --- | --- |
|
||||
| Malware & Attack Technology (MAT) | Malware Analysis | analysis techniques; MALICIOUS ACTIVITIES BY MALWARE |
|
||||
@@ -615,7 +615,7 @@ There are 71 videos with CyBOK metadata.
|
||||
|
||||
https://youtu.be/jo_07iOplzA
|
||||
|
||||
|
||||
|
||||
| KA | Topics | Keywords |
|
||||
| --- | --- | --- |
|
||||
| Malware & Attack Technology (MAT) | Attacks and exploitation | EXPLOITATION |
|
||||
@@ -631,7 +631,7 @@ There are 71 videos with CyBOK metadata.
|
||||
|
||||
https://youtu.be/1Hy_166CwRk
|
||||
|
||||
|
||||
|
||||
| KA | Topics | Keywords |
|
||||
| --- | --- | --- |
|
||||
| Malware & Attack Technology (MAT) | Attacks and exploitation | EXPLOITATION |
|
||||
@@ -647,7 +647,7 @@ There are 71 videos with CyBOK metadata.
|
||||
|
||||
https://youtu.be/nVpqjsfii6c
|
||||
|
||||
|
||||
|
||||
| KA | Topics | Keywords |
|
||||
| --- | --- | --- |
|
||||
| Software Security (SS) | Categories of Vulnerabilities | structured output generation vulnerabilities |
|
||||
@@ -664,7 +664,7 @@ There are 71 videos with CyBOK metadata.
|
||||
|
||||
https://youtu.be/PH73lpG2B1M
|
||||
|
||||
|
||||
|
||||
| KA | Topics | Keywords |
|
||||
| --- | --- | --- |
|
||||
| Software Security (SS) | Categories of Vulnerabilities | race condition vulnerabilities |
|
||||
@@ -681,7 +681,7 @@ There are 71 videos with CyBOK metadata.
|
||||
|
||||
https://youtu.be/Du3fVc_ZLiI
|
||||
|
||||
|
||||
|
||||
| KA | Topics | Keywords |
|
||||
| --- | --- | --- |
|
||||
| Software Security (SS) | Categories of Vulnerabilities | Format string attacks |
|
||||
@@ -697,7 +697,7 @@ There are 71 videos with CyBOK metadata.
|
||||
|
||||
https://youtu.be/nwxtlR31hvw
|
||||
|
||||
|
||||
|
||||
| KA | Topics | Keywords |
|
||||
| --- | --- | --- |
|
||||
| Software Security (SS) | Detection of Vulnerabilities | dynamic detection |
|
||||
@@ -713,7 +713,7 @@ There are 71 videos with CyBOK metadata.
|
||||
|
||||
https://youtu.be/vT2PP7VnSNw
|
||||
|
||||
|
||||
|
||||
| KA | Topics | Keywords |
|
||||
| --- | --- | --- |
|
||||
| Software Security (SS) | Detection of Vulnerabilities | dynamic detection |
|
||||
@@ -729,7 +729,7 @@ There are 71 videos with CyBOK metadata.
|
||||
|
||||
https://youtu.be/Zh7IdmnCfy0
|
||||
|
||||
|
||||
|
||||
| KA | Topics | Keywords |
|
||||
| --- | --- | --- |
|
||||
| Software Security (SS) | Categories of Vulnerabilities | memory management vulnerabilities |
|
||||
@@ -745,7 +745,7 @@ There are 71 videos with CyBOK metadata.
|
||||
|
||||
https://youtu.be/WU06L-u0t2Q
|
||||
|
||||
|
||||
|
||||
| KA | Topics | Keywords |
|
||||
| --- | --- | --- |
|
||||
| Software Security (SS) | Categories of Vulnerabilities | memory management vulnerabilities |
|
||||
@@ -761,7 +761,7 @@ There are 71 videos with CyBOK metadata.
|
||||
|
||||
https://youtu.be/j2S-XgY-Fyg
|
||||
|
||||
|
||||
|
||||
| KA | Topics | Keywords |
|
||||
| --- | --- | --- |
|
||||
| Software Security (SS) | Categories of Vulnerabilities | memory management vulnerabilities |
|
||||
@@ -777,7 +777,7 @@ There are 71 videos with CyBOK metadata.
|
||||
|
||||
https://youtu.be/Lf1UPaqPJMM
|
||||
|
||||
|
||||
|
||||
| KA | Topics | Keywords |
|
||||
| --- | --- | --- |
|
||||
| Software Security (SS) | Technical Underpinning | Technical underpinnings for memory management vulnerabilities: the stack |
|
||||
@@ -793,7 +793,7 @@ There are 71 videos with CyBOK metadata.
|
||||
|
||||
https://youtu.be/5OUQ7ExlgKI
|
||||
|
||||
|
||||
|
||||
| KA | Topics | Keywords |
|
||||
| --- | --- | --- |
|
||||
| Software Security (SS) | Technical Underpinning | Technical underpinnings for memory management vulnerabilities: the stack |
|
||||
@@ -809,7 +809,7 @@ There are 71 videos with CyBOK metadata.
|
||||
|
||||
https://youtu.be/oi_CfBe_umU
|
||||
|
||||
|
||||
|
||||
| KA | Topics | Keywords |
|
||||
| --- | --- | --- |
|
||||
| (SSL) | Prescriptive Processes | Microsoft SDL |
|
||||
@@ -826,7 +826,7 @@ There are 71 videos with CyBOK metadata.
|
||||
|
||||
https://youtu.be/Wry2get_RRc
|
||||
|
||||
|
||||
|
||||
| KA | Topics | Keywords |
|
||||
| --- | --- | --- |
|
||||
| (SSL) | Prescriptive Processes | Microsoft SDL |
|
||||
@@ -843,7 +843,7 @@ There are 71 videos with CyBOK metadata.
|
||||
|
||||
https://youtu.be/ywLXfSR5YWk
|
||||
|
||||
|
||||
|
||||
| KA | Topics | Keywords |
|
||||
| --- | --- | --- |
|
||||
| Operating Systems & Virtualisation (OSV) | OS Security Principles | Saltzer and Schroeder’s principles; newer principles |
|
||||
@@ -859,7 +859,7 @@ There are 71 videos with CyBOK metadata.
|
||||
|
||||
https://youtu.be/v2rChKDAmFg
|
||||
|
||||
|
||||
|
||||
| KA | Topics | Keywords |
|
||||
| --- | --- | --- |
|
||||
| (SSL) | Motivations for Secure Software Lifecycle | vulnerabilities can be exploited without being noticed |
|
||||
@@ -876,7 +876,7 @@ There are 71 videos with CyBOK metadata.
|
||||
|
||||
https://youtu.be/xwsBaNQZozg
|
||||
|
||||
|
||||
|
||||
| KA | Topics | Keywords |
|
||||
| --- | --- | --- |
|
||||
| (SSL) | Prescriptive Processes | Open source secure development |
|
||||
@@ -892,7 +892,7 @@ There are 71 videos with CyBOK metadata.
|
||||
|
||||
https://youtu.be/2I_JSdTu-oI
|
||||
|
||||
|
||||
|
||||
| KA | Topics | Keywords |
|
||||
| --- | --- | --- |
|
||||
| Authentication, Authorisation & Accountability (AAA) | Authentication | user authentication |
|
||||
@@ -909,7 +909,7 @@ There are 71 videos with CyBOK metadata.
|
||||
|
||||
https://youtu.be/pGcJEML1mRo
|
||||
|
||||
|
||||
|
||||
| KA | Topics | Keywords |
|
||||
| --- | --- | --- |
|
||||
| Authentication, Authorisation & Accountability (AAA) | Authentication | user authentication; Cryptography and authentication (hashes and attacks against authentication schemes / passwords) |
|
||||
@@ -926,7 +926,7 @@ There are 71 videos with CyBOK metadata.
|
||||
|
||||
https://youtu.be/icC2Zrno_uM
|
||||
|
||||
|
||||
|
||||
| KA | Topics | Keywords |
|
||||
| --- | --- | --- |
|
||||
| Authentication, Authorisation & Accountability (AAA) | Authentication | user authentication; Cryptography and authentication (hashes and attacks against authentication schemes / passwords) |
|
||||
@@ -943,7 +943,7 @@ There are 71 videos with CyBOK metadata.
|
||||
|
||||
https://youtu.be/Wrg6XZu6Luw
|
||||
|
||||
|
||||
|
||||
| KA | Topics | Keywords |
|
||||
| --- | --- | --- |
|
||||
| Authentication, Authorisation & Accountability (AAA) | Authentication | user authentication; Cryptography and authentication (hashes and attacks against authentication schemes / passwords) |
|
||||
@@ -960,7 +960,7 @@ There are 71 videos with CyBOK metadata.
|
||||
|
||||
https://youtu.be/z4L6Yv5ry1A
|
||||
|
||||
|
||||
|
||||
| KA | Topics | Keywords |
|
||||
| --- | --- | --- |
|
||||
| Authentication, Authorisation & Accountability (AAA) | Authentication | identity management; user authentication; facets of authentication |
|
||||
@@ -977,7 +977,7 @@ There are 71 videos with CyBOK metadata.
|
||||
|
||||
https://youtu.be/-zcnfmoLjYI
|
||||
|
||||
|
||||
|
||||
| KA | Topics | Keywords |
|
||||
| --- | --- | --- |
|
||||
| Authentication, Authorisation & Accountability (AAA) | Authentication | identity management; user authentication; facets of authentication; AUTHENTICATION - BIOMETRICS |
|
||||
@@ -993,7 +993,7 @@ There are 71 videos with CyBOK metadata.
|
||||
|
||||
https://youtu.be/xHs3LB4Yyrk
|
||||
|
||||
|
||||
|
||||
| KA | Topics | Keywords |
|
||||
| --- | --- | --- |
|
||||
| Authentication, Authorisation & Accountability (AAA) | Authentication | identity management; user authentication; facets of authentication; AUTHENTICATION - OTP (ONE-TIME PASSWORD); AUTHENTICATION - TOKENS |
|
||||
@@ -1009,7 +1009,7 @@ There are 71 videos with CyBOK metadata.
|
||||
|
||||
https://youtu.be/c2dPdQmaVyo
|
||||
|
||||
|
||||
|
||||
| KA | Topics | Keywords |
|
||||
| --- | --- | --- |
|
||||
| Authentication, Authorisation & Accountability (AAA) | Authentication | identity management; authentication in distributed systems; user authentication; Network based-authentication with heterogeneous Linux and Windows networks |
|
||||
@@ -1027,7 +1027,7 @@ There are 71 videos with CyBOK metadata.
|
||||
|
||||
https://youtu.be/dCBabesIXo8
|
||||
|
||||
|
||||
|
||||
| KA | Topics | Keywords |
|
||||
| --- | --- | --- |
|
||||
| Authentication, Authorisation & Accountability (AAA) | Authentication | identity management; authentication in distributed systems; user authentication |
|
||||
@@ -1044,7 +1044,7 @@ There are 71 videos with CyBOK metadata.
|
||||
|
||||
https://youtu.be/rhdcxhSDqp4
|
||||
|
||||
|
||||
|
||||
| KA | Topics | Keywords |
|
||||
| --- | --- | --- |
|
||||
| Authentication, Authorisation & Accountability (AAA) | Authentication | identity management; authentication in distributed systems; user authentication; Network based-authentication with heterogeneous Linux and Windows networks |
|
||||
@@ -1061,7 +1061,7 @@ There are 71 videos with CyBOK metadata.
|
||||
|
||||
https://youtu.be/PCXK2cK8tpE
|
||||
|
||||
|
||||
|
||||
| KA | Topics | Keywords |
|
||||
| --- | --- | --- |
|
||||
| Authentication, Authorisation & Accountability (AAA) | Authentication | identity management; authentication in distributed systems; user authentication; Network based-authentication with heterogeneous Linux and Windows networks |
|
||||
@@ -1079,7 +1079,7 @@ There are 71 videos with CyBOK metadata.
|
||||
|
||||
https://youtu.be/yWJyZEFbchQ
|
||||
|
||||
|
||||
|
||||
| KA | Topics | Keywords |
|
||||
| --- | --- | --- |
|
||||
| Authentication, Authorisation & Accountability (AAA) | Authorisation | access control; enforcing access control; theory |
|
||||
@@ -1097,7 +1097,7 @@ There are 71 videos with CyBOK metadata.
|
||||
|
||||
https://youtu.be/i0kO_3ExJv4
|
||||
|
||||
|
||||
|
||||
| KA | Topics | Keywords |
|
||||
| --- | --- | --- |
|
||||
| Authentication, Authorisation & Accountability (AAA) | Authorisation | access control; enforcing access control; ACCESS CONTROL - DAC (DISCRETIONARY ACCESS CONTROL) |
|
||||
@@ -1115,7 +1115,7 @@ There are 71 videos with CyBOK metadata.
|
||||
|
||||
https://youtu.be/viSkkNB777k
|
||||
|
||||
|
||||
|
||||
| KA | Topics | Keywords |
|
||||
| --- | --- | --- |
|
||||
| Authentication, Authorisation & Accountability (AAA) | Authorisation | access control; theory; ACCESS CONTROL - DAC (DISCRETIONARY ACCESS CONTROL); ACCESS CONTROL - MAC (MANDATORY ACCESS CONTROL); ACCESS CONTROL - NDAC (NON-DISCRETIONARY ACCESS CONTROL); ACCESS CONTROL - ROLE-BASED |
|
||||
@@ -1132,7 +1132,7 @@ There are 71 videos with CyBOK metadata.
|
||||
|
||||
https://youtu.be/PGHsb3bg_h4
|
||||
|
||||
|
||||
|
||||
| KA | Topics | Keywords |
|
||||
| --- | --- | --- |
|
||||
| Authentication, Authorisation & Accountability (AAA) | Authorisation | access control; Elevated privileges; Real and effective identity; Vulnerabilities and attacks on access control misconfigurations |
|
||||
@@ -1149,7 +1149,7 @@ There are 71 videos with CyBOK metadata.
|
||||
|
||||
https://youtu.be/Bn3NJhgmdLk
|
||||
|
||||
|
||||
|
||||
| KA | Topics | Keywords |
|
||||
| --- | --- | --- |
|
||||
| Authentication, Authorisation & Accountability (AAA) | Authorisation | access control; ACCESS CONTROL - MATRIX; ACCESS CONTROL LIST (ACL); Vulnerabilities and attacks on access control misconfigurations |
|
||||
@@ -1166,7 +1166,7 @@ There are 71 videos with CyBOK metadata.
|
||||
|
||||
https://youtu.be/OT7ifs8PkHI
|
||||
|
||||
|
||||
|
||||
| KA | Topics | Keywords |
|
||||
| --- | --- | --- |
|
||||
| Authentication, Authorisation & Accountability (AAA) | Authorisation | access control; ACCESS CONTROL LIST (ACL); Vulnerabilities and attacks on access control misconfigurations |
|
||||
@@ -1183,7 +1183,7 @@ There are 71 videos with CyBOK metadata.
|
||||
|
||||
https://youtu.be/f4yBcKkb12g
|
||||
|
||||
|
||||
|
||||
| KA | Topics | Keywords |
|
||||
| --- | --- | --- |
|
||||
| Authentication, Authorisation & Accountability (AAA) | Authorisation | SANDBOX; Application-based access controls: user-based access controls insufficiently limit privileges |
|
||||
@@ -1202,12 +1202,9 @@ There are 71 videos with CyBOK metadata.
|
||||
|
||||
https://youtu.be/Xgs5akM6ayc
|
||||
|
||||
|
||||
|
||||
| KA | Topics | Keywords |
|
||||
| --- | --- | --- |
|
||||
| Authentication, Authorisation & Accountability (AAA) | Authorisation | ACCESS CONTROL - MAC (MANDATORY ACCESS CONTROL); ACCESS CONTROL - NDAC (NON-DISCRETIONARY ACCESS CONTROL); Application-based access controls: user-based access controls insufficiently limit privileges; Rule-based sandboxes; System call interposition; Integrity level access controls |
|
||||
| Operating Systems & Virtualisation (OSV) | Primitives for Isolation and Mediation | Rule-based controls: Fine grained: AppArmor |
|
||||
| Software Security (SS) | Mitigating Exploitation | limiting privileges |
|
||||
|
||||
|
||||
|
||||
|
||||
@@ -8,7 +8,7 @@ You can browse the list below in terms of the [CyBOK Knowledge Areas, and Topics
|
||||
|
||||
> The all lowercase topics and keywords are provided by NCSC for CyBOK mapping, while all caps indicates it is taken from the [CyBOK mapping reference](https://www.cybok.org/media/downloads/CyBOk-mapping-reference-v1.1.pdf), mixed case keywords are ones that we have added.
|
||||
|
||||
> Cyber Securtiy Body of Knowledge (CyBOK) Issue 1.1 is Crown Copyright, The National Cyber Security Centre 2021, licensed under the Open Government Licence http://www.nationalarchives.gov.uk/doc/open-government-licence/.
|
||||
> Cyber Security Body of Knowledge (CyBOK) Issue 1.1 is Crown Copyright, The National Cyber Security Centre 2021, licensed under the Open Government Licence http://www.nationalarchives.gov.uk/doc/open-government-licence/.
|
||||
|
||||
# Scenarios Indexed By CyBOK Knowledge Area (KA)
|
||||
|
||||
@@ -3448,5 +3448,3 @@ Command to build VMs and start scenario:
|
||||
```ruby secgen.rb -s scenarios/labs/web_security/websec_lab.xml run```
|
||||
|
||||
[View source](scenarios/labs/web_security/websec_lab.xml)
|
||||
|
||||
|
||||
|
||||
@@ -8,7 +8,7 @@ You can browse the list below in terms of the [CyBOK Knowledge Areas, and Topics
|
||||
|
||||
> The all lowercase topics and keywords are provided by NCSC for CyBOK mapping, while all caps indicates it is taken from the [CyBOK mapping reference](https://www.cybok.org/media/downloads/CyBOk-mapping-reference-v1.1.pdf), mixed case keywords are ones that we have added.
|
||||
|
||||
> Cyber Securtiy Body of Knowledge (CyBOK) Issue 1.1 is Crown Copyright, The National Cyber Security Centre 2021, licensed under the Open Government Licence http://www.nationalarchives.gov.uk/doc/open-government-licence/.
|
||||
> Cyber Security Body of Knowledge (CyBOK) Issue 1.1 is Crown Copyright, The National Cyber Security Centre 2021, licensed under the Open Government Licence http://www.nationalarchives.gov.uk/doc/open-government-licence/.
|
||||
|
||||
# Scenarios Indexed By CyBOK Knowledge Area (KA)
|
||||
|
||||
|
||||
@@ -6,7 +6,7 @@ This file is an autogenerated index of the lecture videos referenced by scenario
|
||||
|
||||
There are <%= VIDEO_HASH.length %> videos with CyBOK metadata.
|
||||
|
||||
> Cyber Securtiy Body of Knowledge (CyBOK) Issue 1.1 is Crown Copyright, The National Cyber Security Centre 2021, licensed under the Open Government Licence http://www.nationalarchives.gov.uk/doc/open-government-licence/.
|
||||
> Cyber Security Body of Knowledge (CyBOK) Issue 1.1 is Crown Copyright, The National Cyber Security Centre 2021, licensed under the Open Government Licence http://www.nationalarchives.gov.uk/doc/open-government-licence/.
|
||||
|
||||
|
||||
# Lecture Videos
|
||||
|
||||
Reference in New Issue
Block a user