This commit is contained in:
Z. Cliffe Schreuders
2021-04-26 23:14:14 +01:00
parent 479fe1f70c
commit cb1cf68da0
5 changed files with 91 additions and 48 deletions

View File

@@ -1,7 +1,16 @@
# Lecture Videos
# Cyber Security Lecture Videos and CyBOK
The Cyber Security Body of Knowledge (CyBOK) is a body of knowledge that aims to encapsulate the various knowledge areas present within cyber security. Scenarios within SecGen now contain XML elements linking them to CyBOK knowledge areas and specific topics within those knowledge areas. Additionally, video content and readings for each scenario are tagged with their CyBOK associations.
This file is an autogenerated index of the lecture videos referenced by scenarios -- with CyBOK metadata.
There are 20 videos with CyBOK metadata.
> Cyber Securtiy Body of Knowledge (CyBOK) Issue 1.0 is Crown Copyright, The National Cyber Security Centre 2021, licensed under the Open Government Licence http://www.nationalarchives.gov.uk/doc/open-government-licence/.
# Lecture Videos
## A video!

View File

@@ -1,63 +1,73 @@
This file is an autogenerated index and cross referencing of all the scenarios that have CyBOK metadata.
# SecGen Scenarios and CyBOK
# By Knowledge Area
The Cyber Security Body of Knowledge (CyBOK) is a body of knowledge that aims to encapsulate the various knowledge areas present within cyber security. Scenarios within SecGen now contain XML elements linking them to CyBOK knowledge areas and specific topics within those knowledge areas. Additionally, video content and readings for each scenario are tagged with their CyBOK associations.
This file is an autogenerated index and cross referencing of all the SecGen scenarios that have CyBOK metadata.
You can browse the list below in terms of the [CyBOK Knowledge Areas, and Topics](#scenarios-indexed-by-knowledge-area-ka). The list of scenarios in the second half of this document includes keywords (also known as "indicative topics" in CyBOK terminology).
There are 93 scenarios with CyBOK metadata.
> Cyber Securtiy Body of Knowledge (CyBOK) Issue 1.0 is Crown Copyright, The National Cyber Security Centre 2021, licensed under the Open Government Licence http://www.nationalarchives.gov.uk/doc/open-government-licence/.
# Scenarios Indexed By CyBOK Knowledge Area (KA)
# AAA
## AAA
## AAA Scenarios
### AAA Scenarios
examples/cybok_example.xml</br>examples/cybok_example_no_systems.xml</br>labs/authentication_and_access_controls/ads_1_authentication.xml</br>labs/authentication_and_access_controls/ads_2_pam.xml</br>labs/authentication_and_access_controls/ads_3_access_controls.xml</br>labs/authentication_and_access_controls/ads_4_suid.xml</br>labs/authentication_and_access_controls/ads_5_facls.xml</br>labs/authentication_and_access_controls/ads_6_containers.xml</br>labs/authentication_and_access_controls/ads_7_apparmor.xml</br>labs/labtainers/acl-hackerbot-flags.xml</br>labs/labtainers/acl.xml</br>labs/labtainers/file-integrity.xml</br>labs/labtainers/ldap.xml</br>labs/labtainers/macs-hash.xml</br>labs/labtainers/nix-commands.xml</br>labs/labtainers/onewayhash.xml</br>labs/labtainers/radius.xml</br>labs/labtainers/setuid-env.xml</br>labs/response_and_investigation/1_integrity_protection.xml</br>labs/response_and_investigation/7_live_analysis.xml</br>labs/response_and_investigation/8_dead_analysis.xml
## AAA Scenarios by Topics
### AAA Scenarios by Topics
| Topic | Scenario |
| --- | --- |
Authorisation | examples/cybok_example.xml</br>examples/cybok_example_no_systems.xml</br>labs/authentication_and_access_controls/ads_3_access_controls.xml</br>labs/authentication_and_access_controls/ads_4_suid.xml</br>labs/authentication_and_access_controls/ads_5_facls.xml</br>labs/authentication_and_access_controls/ads_6_containers.xml</br>labs/authentication_and_access_controls/ads_7_apparmor.xml</br>labs/labtainers/acl-hackerbot-flags.xml</br>labs/labtainers/acl.xml</br>labs/labtainers/ldap.xml</br>labs/labtainers/nix-commands.xml</br>labs/labtainers/setuid-env.xml</br>labs/response_and_investigation/1_integrity_protection.xml
Authentication | labs/authentication_and_access_controls/ads_1_authentication.xml</br>labs/authentication_and_access_controls/ads_2_pam.xml</br>labs/labtainers/file-integrity.xml</br>labs/labtainers/ldap.xml</br>labs/labtainers/macs-hash.xml</br>labs/labtainers/onewayhash.xml</br>labs/labtainers/radius.xml
Accountability | labs/response_and_investigation/7_live_analysis.xml</br>labs/response_and_investigation/8_dead_analysis.xml
# C
## C
## C Scenarios
### C Scenarios
examples/cybok_example.xml</br>examples/cybok_example_no_systems.xml</br>labs/labtainers/macs-hash.xml</br>labs/labtainers/onewayhash.xml</br>labs/labtainers/pubkey.xml</br>labs/labtainers/ssh-agent.xml</br>labs/labtainers/sshlab.xml</br>labs/labtainers/ssl.xml
## C Scenarios by Topics
### C Scenarios by Topics
| Topic | Scenario |
| --- | --- |
Cryptography | examples/cybok_example.xml</br>examples/cybok_example_no_systems.xml
Public-Key Cryptography | labs/labtainers/macs-hash.xml</br>labs/labtainers/onewayhash.xml</br>labs/labtainers/ssh-agent.xml</br>labs/labtainers/sshlab.xml</br>labs/labtainers/ssl.xml
Schemes | labs/labtainers/pubkey.xml
# OSVS
## OSVS
## OSVS Scenarios
### OSVS Scenarios
labs/authentication_and_access_controls/ads_1_authentication.xml</br>labs/authentication_and_access_controls/ads_2_pam.xml</br>labs/authentication_and_access_controls/ads_3_access_controls.xml</br>labs/authentication_and_access_controls/ads_4_suid.xml</br>labs/authentication_and_access_controls/ads_5_facls.xml</br>labs/authentication_and_access_controls/ads_6_containers.xml</br>labs/authentication_and_access_controls/ads_7_apparmor.xml</br>labs/labtainers/acl-hackerbot-flags.xml</br>labs/labtainers/acl.xml</br>labs/labtainers/capabilities.xml</br>labs/labtainers/setuid-env.xml</br>labs/response_and_investigation/1_integrity_protection.xml</br>labs/response_and_investigation/2_integrity_detection.xml</br>labs/response_and_investigation/7_live_analysis.xml
## OSVS Scenarios by Topics
### OSVS Scenarios by Topics
| Topic | Scenario |
| --- | --- |
Primitives for Isolation and Mediation | labs/authentication_and_access_controls/ads_1_authentication.xml</br>labs/authentication_and_access_controls/ads_2_pam.xml</br>labs/authentication_and_access_controls/ads_3_access_controls.xml</br>labs/authentication_and_access_controls/ads_4_suid.xml</br>labs/authentication_and_access_controls/ads_5_facls.xml</br>labs/authentication_and_access_controls/ads_6_containers.xml</br>labs/authentication_and_access_controls/ads_7_apparmor.xml</br>labs/labtainers/acl-hackerbot-flags.xml</br>labs/labtainers/acl.xml</br>labs/labtainers/capabilities.xml</br>labs/labtainers/setuid-env.xml</br>labs/response_and_investigation/1_integrity_protection.xml
Role of Operating Systems | labs/authentication_and_access_controls/ads_3_access_controls.xml</br>labs/authentication_and_access_controls/ads_6_containers.xml</br>labs/labtainers/acl-hackerbot-flags.xml</br>labs/labtainers/acl.xml
OS Hardening | labs/response_and_investigation/2_integrity_detection.xml</br>labs/response_and_investigation/7_live_analysis.xml
# WMS
## WMS
## WMS Scenarios
### WMS Scenarios
labs/authentication_and_access_controls/ads_6_containers.xml</br>labs/labtainers/sql-inject.xml</br>labs/web_security/websec_lab.xml
## WMS Scenarios by Topics
### WMS Scenarios by Topics
| Topic | Scenario |
| --- | --- |
Fundamental Concepts and Approaches | labs/authentication_and_access_controls/ads_6_containers.xml</br>labs/web_security/websec_lab.xml
Server-Side Vulnerabilities and Mitigations | labs/labtainers/sql-inject.xml</br>labs/web_security/websec_lab.xml
Client-Side Vulnerabilities and Mitigations | labs/web_security/websec_lab.xml
# SS
## SS
## SS Scenarios
### SS Scenarios
labs/authentication_and_access_controls/ads_7_apparmor.xml</br>labs/introducing_attacks/6_exploitation.xml</br>labs/labtainers/bufoverflow.xml</br>labs/labtainers/formatstring.xml</br>labs/labtainers/pass-crack.xml</br>labs/labtainers/retlibc.xml</br>labs/labtainers/sql-inject.xml</br>labs/software_security_exploitation/1_c_asm_iof.xml</br>labs/software_security_exploitation/2_race_conditions_format_str.xml</br>labs/software_security_exploitation/3_bug_hunting_and_fuzzing.xml</br>labs/software_security_exploitation/4_exploit_development.xml</br>labs/software_security_exploitation/5_linux_bof_format.xml</br>labs/software_security_exploitation/6_linux_stack_bof.xml</br>labs/software_security_exploitation/7_linux_nx_bypass.xml</br>labs/software_security_exploitation/8_linux_aslr_bypass.xml</br>labs/web_security/websec_lab.xml
## SS Scenarios by Topics
### SS Scenarios by Topics
| Topic | Scenario |
| --- | --- |
Mitigating Exploitation | labs/authentication_and_access_controls/ads_7_apparmor.xml</br>labs/labtainers/bufoverflow.xml</br>labs/labtainers/retlibc.xml</br>labs/software_security_exploitation/7_linux_nx_bypass.xml</br>labs/software_security_exploitation/8_linux_aslr_bypass.xml
@@ -66,12 +76,12 @@ Authentication | labs/labtainers/pass-crack.xml
Prevention of Vulnerabilities | labs/labtainers/sql-inject.xml</br>labs/software_security_exploitation/1_c_asm_iof.xml</br>labs/software_security_exploitation/2_race_conditions_format_str.xml</br>labs/web_security/websec_lab.xml
Detection of Vulnerabilities | labs/software_security_exploitation/3_bug_hunting_and_fuzzing.xml
# NS
## NS
## NS Scenarios
### NS Scenarios
labs/introducing_attacks/1_intro_linux.xml</br>labs/introducing_attacks/4_dns_footprinting.xml</br>labs/introducing_attacks/5_scanning.xml</br>labs/labtainers/arp-spoof.xml</br>labs/labtainers/denyhost.xml</br>labs/labtainers/dmz-example.xml</br>labs/labtainers/dmz-lab.xml</br>labs/labtainers/iptables-ics.xml</br>labs/labtainers/iptables.xml</br>labs/labtainers/iptables2.xml</br>labs/labtainers/local-dns.xml</br>labs/labtainers/nix-commands.xml</br>labs/labtainers/nmap-discovery.xml</br>labs/labtainers/nmap-ssh.xml</br>labs/labtainers/pcapanalysis.xml</br>labs/labtainers/pubkey.xml</br>labs/labtainers/radius.xml</br>labs/labtainers/remote-dns.xml</br>labs/labtainers/routing-basics.xml</br>labs/labtainers/routing-basics2.xml</br>labs/labtainers/snort.xml</br>labs/response_and_investigation/4_ids.xml</br>labs/response_and_investigation/5_ids_rules.xml</br>labs/response_and_investigation/6_exfiltration_detection.xml
## NS Scenarios by Topics
### NS Scenarios by Topics
| Topic | Scenario |
| --- | --- |
Network Protocols and Vulnerability | labs/introducing_attacks/1_intro_linux.xml</br>labs/labtainers/arp-spoof.xml</br>labs/labtainers/local-dns.xml</br>labs/labtainers/remote-dns.xml
@@ -80,12 +90,12 @@ Network Defence Tools | labs/labtainers/denyhost.xml</br>labs/labtainers/dmz-exa
Internet Architecture | labs/labtainers/iptables-ics.xml</br>labs/labtainers/iptables.xml</br>labs/labtainers/iptables2.xml</br>labs/labtainers/pubkey.xml</br>labs/labtainers/radius.xml</br>labs/labtainers/routing-basics.xml</br>labs/labtainers/routing-basics2.xml
OSI (OPEN SYSTEM INTERCONNECT) MODEL | labs/labtainers/pcapanalysis.xml
# SOIM
## SOIM
## SOIM Scenarios
### SOIM Scenarios
labs/introducing_attacks/1_intro_linux.xml</br>labs/introducing_attacks/2_malware_msf_payloads.xml</br>labs/introducing_attacks/3_vulnerabilities.xml</br>labs/introducing_attacks/4_dns_footprinting.xml</br>labs/introducing_attacks/5_scanning.xml</br>labs/introducing_attacks/6_exploitation.xml</br>labs/introducing_attacks/7_post-exploitation.xml</br>labs/introducing_attacks/8_vulnerability_analysis.xml</br>labs/labtainers/arp-spoof.xml</br>labs/labtainers/backups.xml</br>labs/labtainers/backups2.xml</br>labs/labtainers/capabilities.xml</br>labs/labtainers/centos-log.xml</br>labs/labtainers/centos-log2.xml</br>labs/labtainers/cyberciege.xml</br>labs/labtainers/denyhost.xml</br>labs/labtainers/file-integrity.xml</br>labs/labtainers/ldap.xml</br>labs/labtainers/metasploit.xml</br>labs/labtainers/nmap-ssh.xml</br>labs/labtainers/packet-introspection.xml</br>labs/labtainers/pcapanalysis.xml</br>labs/labtainers/snort.xml</br>labs/response_and_investigation/2_integrity_detection.xml</br>labs/response_and_investigation/3_backups_and_recovery.xml</br>labs/response_and_investigation/4_ids.xml</br>labs/response_and_investigation/5_ids_rules.xml</br>labs/response_and_investigation/6_exfiltration_detection.xml
## SOIM Scenarios by Topics
### SOIM Scenarios by Topics
| Topic | Scenario |
| --- | --- |
PENETRATION TESTING | labs/introducing_attacks/1_intro_linux.xml</br>labs/introducing_attacks/2_malware_msf_payloads.xml</br>labs/introducing_attacks/3_vulnerabilities.xml</br>labs/introducing_attacks/4_dns_footprinting.xml</br>labs/introducing_attacks/5_scanning.xml</br>labs/introducing_attacks/6_exploitation.xml</br>labs/introducing_attacks/7_post-exploitation.xml</br>labs/introducing_attacks/8_vulnerability_analysis.xml</br>labs/labtainers/metasploit.xml
@@ -95,12 +105,12 @@ INCIDENT RESPONSE | labs/labtainers/backups.xml</br>labs/labtainers/backups2.xml
CM (CONFIGURATION MANAGEMENT) | labs/labtainers/denyhost.xml</br>labs/labtainers/nmap-ssh.xml
Analyse: Analysis Methods | labs/labtainers/snort.xml</br>labs/response_and_investigation/4_ids.xml</br>labs/response_and_investigation/5_ids_rules.xml</br>labs/response_and_investigation/6_exfiltration_detection.xml
# MAT
## MAT
## MAT Scenarios
### MAT Scenarios
labs/introducing_attacks/2_malware_msf_payloads.xml</br>labs/introducing_attacks/3_vulnerabilities.xml</br>labs/introducing_attacks/5_scanning.xml</br>labs/introducing_attacks/6_exploitation.xml</br>labs/introducing_attacks/7_post-exploitation.xml</br>labs/introducing_attacks/8_vulnerability_analysis.xml</br>labs/labtainers/acl-hackerbot-flags.xml</br>labs/labtainers/acl.xml</br>labs/labtainers/bufoverflow.xml</br>labs/labtainers/formatstring.xml</br>labs/labtainers/gdblesson.xml</br>labs/labtainers/ida.xml</br>labs/labtainers/metasploit.xml</br>labs/labtainers/retlibc.xml</br>labs/labtainers/snort.xml</br>labs/response_and_investigation/4_ids.xml</br>labs/response_and_investigation/5_ids_rules.xml</br>labs/response_and_investigation/7_live_analysis.xml</br>labs/response_and_investigation/8_dead_analysis.xml</br>labs/software_and_malware_analysis/1_dynamic_and_static_analysis.xml</br>labs/software_and_malware_analysis/3_c_and_asm.xml</br>labs/software_and_malware_analysis/4_asm.xml</br>labs/software_and_malware_analysis/5_ghidra.xml</br>labs/software_and_malware_analysis/6_ghidra_analysis.xml</br>labs/software_and_malware_analysis/6_ghidra_with_live_malware_samples.xml</br>labs/software_and_malware_analysis/7_dynamic.xml</br>labs/software_and_malware_analysis/8_anti_sre.xml</br>labs/software_and_malware_analysis/9_malware_behaviour.xml</br>labs/software_security_exploitation/4_exploit_development.xml</br>labs/software_security_exploitation/5_linux_bof_format.xml</br>labs/software_security_exploitation/6_linux_stack_bof.xml</br>labs/software_security_exploitation/7_linux_nx_bypass.xml</br>labs/software_security_exploitation/8_linux_aslr_bypass.xml
## MAT Scenarios by Topics
### MAT Scenarios by Topics
| Topic | Scenario |
| --- | --- |
Malware Taxonomy | labs/introducing_attacks/2_malware_msf_payloads.xml</br>labs/software_and_malware_analysis/1_dynamic_and_static_analysis.xml</br>labs/software_and_malware_analysis/9_malware_behaviour.xml
@@ -110,50 +120,50 @@ Malicious Activities by Malware | labs/introducing_attacks/5_scanning.xml</br>la
MALCODE/MALWARE | labs/labtainers/acl-hackerbot-flags.xml</br>labs/labtainers/acl.xml
Malware Detection | labs/labtainers/snort.xml</br>labs/response_and_investigation/4_ids.xml</br>labs/response_and_investigation/5_ids_rules.xml</br>labs/response_and_investigation/7_live_analysis.xml</br>labs/response_and_investigation/8_dead_analysis.xml
# F
## F
## F Scenarios
### F Scenarios
labs/labtainers/file-deletion.xml</br>labs/labtainers/file-integrity.xml</br>labs/labtainers/macs-hash.xml</br>labs/labtainers/onewayhash.xml</br>labs/labtainers/packet-introspection.xml</br>labs/labtainers/pass-crack.xml</br>labs/labtainers/pcapanalysis.xml</br>labs/response_and_investigation/2_integrity_detection.xml</br>labs/response_and_investigation/6_exfiltration_detection.xml</br>labs/response_and_investigation/7_live_analysis.xml</br>labs/response_and_investigation/8_dead_analysis.xml
## F Scenarios by Topics
### F Scenarios by Topics
| Topic | Scenario |
| --- | --- |
Operating System Analysis | labs/labtainers/file-deletion.xml</br>labs/labtainers/file-integrity.xml</br>labs/response_and_investigation/8_dead_analysis.xml
Artifact Analysis | labs/labtainers/macs-hash.xml</br>labs/labtainers/onewayhash.xml</br>labs/labtainers/pass-crack.xml</br>labs/response_and_investigation/2_integrity_detection.xml</br>labs/response_and_investigation/6_exfiltration_detection.xml
Main Memory Forensics | labs/labtainers/packet-introspection.xml</br>labs/labtainers/pcapanalysis.xml</br>labs/response_and_investigation/7_live_analysis.xml
# CPS
## CPS
## CPS Scenarios
### CPS Scenarios
labs/labtainers/iptables-ics.xml</br>labs/labtainers/plc-app.xml</br>labs/labtainers/plc-forensics-adv.xml</br>labs/labtainers/plc-forensics.xml</br>labs/labtainers/plc.xml</br>labs/labtainers/softplc.xml</br>labs/labtainers/softplc2.xml</br>labs/labtainers/ssl.xml
## CPS Scenarios by Topics
### CPS Scenarios by Topics
| Topic | Scenario |
| --- | --- |
Cyber-Physical Systems Domains | labs/labtainers/iptables-ics.xml</br>labs/labtainers/plc-app.xml</br>labs/labtainers/plc-forensics-adv.xml</br>labs/labtainers/plc-forensics.xml</br>labs/labtainers/plc.xml</br>labs/labtainers/softplc.xml</br>labs/labtainers/softplc2.xml</br>labs/labtainers/ssl.xml
Cyber-Physical Systems | labs/labtainers/iptables-ics.xml</br>labs/labtainers/plc-app.xml</br>labs/labtainers/plc-forensics-adv.xml</br>labs/labtainers/plc-forensics.xml</br>labs/labtainers/plc.xml</br>labs/labtainers/softplc.xml</br>labs/labtainers/softplc2.xml</br>labs/labtainers/ssl.xml
# WAM
## WAM
## WAM Scenarios
### WAM Scenarios
labs/labtainers/iptables-ics.xml</br>labs/labtainers/iptables.xml</br>labs/labtainers/iptables2.xml
## WAM Scenarios by Topics
### WAM Scenarios by Topics
| Topic | Scenario |
| --- | --- |
FIREWALLS | labs/labtainers/iptables-ics.xml</br>labs/labtainers/iptables.xml</br>labs/labtainers/iptables2.xml
# HF
## HF
## HF Scenarios
### HF Scenarios
labs/labtainers/ssl.xml
## HF Scenarios by Topics
### HF Scenarios by Topics
| Topic | Scenario |
| --- | --- |
Fitting the Task to the Human | labs/labtainers/ssl.xml
# By Scenario
# Scenario CyBOK Keywords
## examples/cybok_example.xml

View File

@@ -1,6 +1,8 @@
require 'erb'
require 'nori'
require 'youtube_images' # gem 'youtube_images'
require 'youtube_images'
# if you want to regenerate the indexes you need to install this additional gem:
# gem 'youtube_images'
require_relative '../helpers/print.rb'
@@ -114,3 +116,6 @@ rescue StandardError => e
Print.err "Error writing file: #{e.message}"
Print.err e.backtrace.inspect
end
puts "#{SCENARIOS_HASH.length} scenarios with CyBOK metadata"
puts "#{VIDEO_HASH.length} videos with CyBOK metadata"

View File

@@ -1,17 +1,27 @@
This file is an autogenerated index and cross referencing of all the scenarios that have CyBOK metadata.
# SecGen Scenarios and CyBOK
# By Knowledge Area
The Cyber Security Body of Knowledge (CyBOK) is a body of knowledge that aims to encapsulate the various knowledge areas present within cyber security. Scenarios within SecGen now contain XML elements linking them to CyBOK knowledge areas and specific topics within those knowledge areas. Additionally, video content and readings for each scenario are tagged with their CyBOK associations.
This file is an autogenerated index and cross referencing of all the SecGen scenarios that have CyBOK metadata.
You can browse the list below in terms of the [CyBOK Knowledge Areas, and Topics](#scenarios-indexed-by-knowledge-area-ka). The list of scenarios in the second half of this document includes keywords (also known as "indicative topics" in CyBOK terminology).
There are <%= SCENARIOS_HASH.length %> scenarios with CyBOK metadata.
> Cyber Securtiy Body of Knowledge (CyBOK) Issue 1.0 is Crown Copyright, The National Cyber Security Centre 2021, licensed under the Open Government Licence http://www.nationalarchives.gov.uk/doc/open-government-licence/.
# Scenarios Indexed By CyBOK Knowledge Area (KA)
<%
KA_TOPIC_SCENARIOS_HASH.each{|ka,hash|
%>
# <%= ka %>
## <%= ka %>
## <%= ka %> Scenarios
### <%= ka %> Scenarios
<%= @ka_hash[ka].uniq.join("</br>") %>
## <%= ka %> Scenarios by Topics
### <%= ka %> Scenarios by Topics
| Topic | Scenario |
| --- | --- |<%
hash.each{|topic,hash|%>
@@ -20,7 +30,7 @@ KA_TOPIC_SCENARIOS_HASH.each{|ka,hash|
}
%>
# By Scenario
# Scenario CyBOK Keywords
<%
SCENARIOS_HASH.each{|scenario,array|

View File

@@ -1,7 +1,16 @@
# Lecture Videos
# Cyber Security Lecture Videos and CyBOK
The Cyber Security Body of Knowledge (CyBOK) is a body of knowledge that aims to encapsulate the various knowledge areas present within cyber security. Scenarios within SecGen now contain XML elements linking them to CyBOK knowledge areas and specific topics within those knowledge areas. Additionally, video content and readings for each scenario are tagged with their CyBOK associations.
This file is an autogenerated index of the lecture videos referenced by scenarios -- with CyBOK metadata.
There are <%= VIDEO_HASH.length %> videos with CyBOK metadata.
> Cyber Securtiy Body of Knowledge (CyBOK) Issue 1.0 is Crown Copyright, The National Cyber Security Centre 2021, licensed under the Open Government Licence http://www.nationalarchives.gov.uk/doc/open-government-licence/.
# Lecture Videos
<%
VIDEO_HASH.each{|url,array|
%>