From cb1cf68da0822efb2f8ee4ac7d2c86533ecb3134 Mon Sep 17 00:00:00 2001 From: "Z. Cliffe Schreuders" Date: Mon, 26 Apr 2021 23:14:14 +0100 Subject: [PATCH] CyBOK --- README-CyBOK-Lecture-Videos.md | 11 ++- README-CyBOK-Scenarios-Indexed.md | 88 +++++++++++++---------- lib/CyBOK/generate_scenario_index.rb | 7 +- lib/CyBOK/template_CyBOK_scenarios.md.erb | 22 ++++-- lib/CyBOK/template_CyBOK_videos.md.erb | 11 ++- 5 files changed, 91 insertions(+), 48 deletions(-) diff --git a/README-CyBOK-Lecture-Videos.md b/README-CyBOK-Lecture-Videos.md index 351b9b6e4..6351760d1 100644 --- a/README-CyBOK-Lecture-Videos.md +++ b/README-CyBOK-Lecture-Videos.md @@ -1,7 +1,16 @@ -# Lecture Videos +# Cyber Security Lecture Videos and CyBOK + +The Cyber Security Body of Knowledge (CyBOK) is a body of knowledge that aims to encapsulate the various knowledge areas present within cyber security. Scenarios within SecGen now contain XML elements linking them to CyBOK knowledge areas and specific topics within those knowledge areas. Additionally, video content and readings for each scenario are tagged with their CyBOK associations. This file is an autogenerated index of the lecture videos referenced by scenarios -- with CyBOK metadata. +There are 20 videos with CyBOK metadata. + +> Cyber Securtiy Body of Knowledge (CyBOK) Issue 1.0 is Crown Copyright, The National Cyber Security Centre 2021, licensed under the Open Government Licence http://www.nationalarchives.gov.uk/doc/open-government-licence/. + + +# Lecture Videos + ## A video! diff --git a/README-CyBOK-Scenarios-Indexed.md b/README-CyBOK-Scenarios-Indexed.md index 197bc7b70..db4d54339 100644 --- a/README-CyBOK-Scenarios-Indexed.md +++ b/README-CyBOK-Scenarios-Indexed.md @@ -1,63 +1,73 @@ -This file is an autogenerated index and cross referencing of all the scenarios that have CyBOK metadata. +# SecGen Scenarios and CyBOK -# By Knowledge Area +The Cyber Security Body of Knowledge (CyBOK) is a body of knowledge that aims to encapsulate the various knowledge areas present within cyber security. Scenarios within SecGen now contain XML elements linking them to CyBOK knowledge areas and specific topics within those knowledge areas. Additionally, video content and readings for each scenario are tagged with their CyBOK associations. + +This file is an autogenerated index and cross referencing of all the SecGen scenarios that have CyBOK metadata. + +You can browse the list below in terms of the [CyBOK Knowledge Areas, and Topics](#scenarios-indexed-by-knowledge-area-ka). The list of scenarios in the second half of this document includes keywords (also known as "indicative topics" in CyBOK terminology). + +There are 93 scenarios with CyBOK metadata. + +> Cyber Securtiy Body of Knowledge (CyBOK) Issue 1.0 is Crown Copyright, The National Cyber Security Centre 2021, licensed under the Open Government Licence http://www.nationalarchives.gov.uk/doc/open-government-licence/. + +# Scenarios Indexed By CyBOK Knowledge Area (KA) -# AAA +## AAA -## AAA Scenarios +### AAA Scenarios examples/cybok_example.xml
examples/cybok_example_no_systems.xml
labs/authentication_and_access_controls/ads_1_authentication.xml
labs/authentication_and_access_controls/ads_2_pam.xml
labs/authentication_and_access_controls/ads_3_access_controls.xml
labs/authentication_and_access_controls/ads_4_suid.xml
labs/authentication_and_access_controls/ads_5_facls.xml
labs/authentication_and_access_controls/ads_6_containers.xml
labs/authentication_and_access_controls/ads_7_apparmor.xml
labs/labtainers/acl-hackerbot-flags.xml
labs/labtainers/acl.xml
labs/labtainers/file-integrity.xml
labs/labtainers/ldap.xml
labs/labtainers/macs-hash.xml
labs/labtainers/nix-commands.xml
labs/labtainers/onewayhash.xml
labs/labtainers/radius.xml
labs/labtainers/setuid-env.xml
labs/response_and_investigation/1_integrity_protection.xml
labs/response_and_investigation/7_live_analysis.xml
labs/response_and_investigation/8_dead_analysis.xml -## AAA Scenarios by Topics +### AAA Scenarios by Topics | Topic | Scenario | | --- | --- | Authorisation | examples/cybok_example.xml
examples/cybok_example_no_systems.xml
labs/authentication_and_access_controls/ads_3_access_controls.xml
labs/authentication_and_access_controls/ads_4_suid.xml
labs/authentication_and_access_controls/ads_5_facls.xml
labs/authentication_and_access_controls/ads_6_containers.xml
labs/authentication_and_access_controls/ads_7_apparmor.xml
labs/labtainers/acl-hackerbot-flags.xml
labs/labtainers/acl.xml
labs/labtainers/ldap.xml
labs/labtainers/nix-commands.xml
labs/labtainers/setuid-env.xml
labs/response_and_investigation/1_integrity_protection.xml Authentication | labs/authentication_and_access_controls/ads_1_authentication.xml
labs/authentication_and_access_controls/ads_2_pam.xml
labs/labtainers/file-integrity.xml
labs/labtainers/ldap.xml
labs/labtainers/macs-hash.xml
labs/labtainers/onewayhash.xml
labs/labtainers/radius.xml Accountability | labs/response_and_investigation/7_live_analysis.xml
labs/response_and_investigation/8_dead_analysis.xml -# C +## C -## C Scenarios +### C Scenarios examples/cybok_example.xml
examples/cybok_example_no_systems.xml
labs/labtainers/macs-hash.xml
labs/labtainers/onewayhash.xml
labs/labtainers/pubkey.xml
labs/labtainers/ssh-agent.xml
labs/labtainers/sshlab.xml
labs/labtainers/ssl.xml -## C Scenarios by Topics +### C Scenarios by Topics | Topic | Scenario | | --- | --- | Cryptography | examples/cybok_example.xml
examples/cybok_example_no_systems.xml Public-Key Cryptography | labs/labtainers/macs-hash.xml
labs/labtainers/onewayhash.xml
labs/labtainers/ssh-agent.xml
labs/labtainers/sshlab.xml
labs/labtainers/ssl.xml Schemes | labs/labtainers/pubkey.xml -# OSVS +## OSVS -## OSVS Scenarios +### OSVS Scenarios labs/authentication_and_access_controls/ads_1_authentication.xml
labs/authentication_and_access_controls/ads_2_pam.xml
labs/authentication_and_access_controls/ads_3_access_controls.xml
labs/authentication_and_access_controls/ads_4_suid.xml
labs/authentication_and_access_controls/ads_5_facls.xml
labs/authentication_and_access_controls/ads_6_containers.xml
labs/authentication_and_access_controls/ads_7_apparmor.xml
labs/labtainers/acl-hackerbot-flags.xml
labs/labtainers/acl.xml
labs/labtainers/capabilities.xml
labs/labtainers/setuid-env.xml
labs/response_and_investigation/1_integrity_protection.xml
labs/response_and_investigation/2_integrity_detection.xml
labs/response_and_investigation/7_live_analysis.xml -## OSVS Scenarios by Topics +### OSVS Scenarios by Topics | Topic | Scenario | | --- | --- | Primitives for Isolation and Mediation | labs/authentication_and_access_controls/ads_1_authentication.xml
labs/authentication_and_access_controls/ads_2_pam.xml
labs/authentication_and_access_controls/ads_3_access_controls.xml
labs/authentication_and_access_controls/ads_4_suid.xml
labs/authentication_and_access_controls/ads_5_facls.xml
labs/authentication_and_access_controls/ads_6_containers.xml
labs/authentication_and_access_controls/ads_7_apparmor.xml
labs/labtainers/acl-hackerbot-flags.xml
labs/labtainers/acl.xml
labs/labtainers/capabilities.xml
labs/labtainers/setuid-env.xml
labs/response_and_investigation/1_integrity_protection.xml Role of Operating Systems | labs/authentication_and_access_controls/ads_3_access_controls.xml
labs/authentication_and_access_controls/ads_6_containers.xml
labs/labtainers/acl-hackerbot-flags.xml
labs/labtainers/acl.xml OS Hardening | labs/response_and_investigation/2_integrity_detection.xml
labs/response_and_investigation/7_live_analysis.xml -# WMS +## WMS -## WMS Scenarios +### WMS Scenarios labs/authentication_and_access_controls/ads_6_containers.xml
labs/labtainers/sql-inject.xml
labs/web_security/websec_lab.xml -## WMS Scenarios by Topics +### WMS Scenarios by Topics | Topic | Scenario | | --- | --- | Fundamental Concepts and Approaches | labs/authentication_and_access_controls/ads_6_containers.xml
labs/web_security/websec_lab.xml Server-Side Vulnerabilities and Mitigations | labs/labtainers/sql-inject.xml
labs/web_security/websec_lab.xml Client-Side Vulnerabilities and Mitigations | labs/web_security/websec_lab.xml -# SS +## SS -## SS Scenarios +### SS Scenarios labs/authentication_and_access_controls/ads_7_apparmor.xml
labs/introducing_attacks/6_exploitation.xml
labs/labtainers/bufoverflow.xml
labs/labtainers/formatstring.xml
labs/labtainers/pass-crack.xml
labs/labtainers/retlibc.xml
labs/labtainers/sql-inject.xml
labs/software_security_exploitation/1_c_asm_iof.xml
labs/software_security_exploitation/2_race_conditions_format_str.xml
labs/software_security_exploitation/3_bug_hunting_and_fuzzing.xml
labs/software_security_exploitation/4_exploit_development.xml
labs/software_security_exploitation/5_linux_bof_format.xml
labs/software_security_exploitation/6_linux_stack_bof.xml
labs/software_security_exploitation/7_linux_nx_bypass.xml
labs/software_security_exploitation/8_linux_aslr_bypass.xml
labs/web_security/websec_lab.xml -## SS Scenarios by Topics +### SS Scenarios by Topics | Topic | Scenario | | --- | --- | Mitigating Exploitation | labs/authentication_and_access_controls/ads_7_apparmor.xml
labs/labtainers/bufoverflow.xml
labs/labtainers/retlibc.xml
labs/software_security_exploitation/7_linux_nx_bypass.xml
labs/software_security_exploitation/8_linux_aslr_bypass.xml @@ -66,12 +76,12 @@ Authentication | labs/labtainers/pass-crack.xml Prevention of Vulnerabilities | labs/labtainers/sql-inject.xml
labs/software_security_exploitation/1_c_asm_iof.xml
labs/software_security_exploitation/2_race_conditions_format_str.xml
labs/web_security/websec_lab.xml Detection of Vulnerabilities | labs/software_security_exploitation/3_bug_hunting_and_fuzzing.xml -# NS +## NS -## NS Scenarios +### NS Scenarios labs/introducing_attacks/1_intro_linux.xml
labs/introducing_attacks/4_dns_footprinting.xml
labs/introducing_attacks/5_scanning.xml
labs/labtainers/arp-spoof.xml
labs/labtainers/denyhost.xml
labs/labtainers/dmz-example.xml
labs/labtainers/dmz-lab.xml
labs/labtainers/iptables-ics.xml
labs/labtainers/iptables.xml
labs/labtainers/iptables2.xml
labs/labtainers/local-dns.xml
labs/labtainers/nix-commands.xml
labs/labtainers/nmap-discovery.xml
labs/labtainers/nmap-ssh.xml
labs/labtainers/pcapanalysis.xml
labs/labtainers/pubkey.xml
labs/labtainers/radius.xml
labs/labtainers/remote-dns.xml
labs/labtainers/routing-basics.xml
labs/labtainers/routing-basics2.xml
labs/labtainers/snort.xml
labs/response_and_investigation/4_ids.xml
labs/response_and_investigation/5_ids_rules.xml
labs/response_and_investigation/6_exfiltration_detection.xml -## NS Scenarios by Topics +### NS Scenarios by Topics | Topic | Scenario | | --- | --- | Network Protocols and Vulnerability | labs/introducing_attacks/1_intro_linux.xml
labs/labtainers/arp-spoof.xml
labs/labtainers/local-dns.xml
labs/labtainers/remote-dns.xml @@ -80,12 +90,12 @@ Network Defence Tools | labs/labtainers/denyhost.xml
labs/labtainers/dmz-exa Internet Architecture | labs/labtainers/iptables-ics.xml
labs/labtainers/iptables.xml
labs/labtainers/iptables2.xml
labs/labtainers/pubkey.xml
labs/labtainers/radius.xml
labs/labtainers/routing-basics.xml
labs/labtainers/routing-basics2.xml OSI (OPEN SYSTEM INTERCONNECT) MODEL | labs/labtainers/pcapanalysis.xml -# SOIM +## SOIM -## SOIM Scenarios +### SOIM Scenarios labs/introducing_attacks/1_intro_linux.xml
labs/introducing_attacks/2_malware_msf_payloads.xml
labs/introducing_attacks/3_vulnerabilities.xml
labs/introducing_attacks/4_dns_footprinting.xml
labs/introducing_attacks/5_scanning.xml
labs/introducing_attacks/6_exploitation.xml
labs/introducing_attacks/7_post-exploitation.xml
labs/introducing_attacks/8_vulnerability_analysis.xml
labs/labtainers/arp-spoof.xml
labs/labtainers/backups.xml
labs/labtainers/backups2.xml
labs/labtainers/capabilities.xml
labs/labtainers/centos-log.xml
labs/labtainers/centos-log2.xml
labs/labtainers/cyberciege.xml
labs/labtainers/denyhost.xml
labs/labtainers/file-integrity.xml
labs/labtainers/ldap.xml
labs/labtainers/metasploit.xml
labs/labtainers/nmap-ssh.xml
labs/labtainers/packet-introspection.xml
labs/labtainers/pcapanalysis.xml
labs/labtainers/snort.xml
labs/response_and_investigation/2_integrity_detection.xml
labs/response_and_investigation/3_backups_and_recovery.xml
labs/response_and_investigation/4_ids.xml
labs/response_and_investigation/5_ids_rules.xml
labs/response_and_investigation/6_exfiltration_detection.xml -## SOIM Scenarios by Topics +### SOIM Scenarios by Topics | Topic | Scenario | | --- | --- | PENETRATION TESTING | labs/introducing_attacks/1_intro_linux.xml
labs/introducing_attacks/2_malware_msf_payloads.xml
labs/introducing_attacks/3_vulnerabilities.xml
labs/introducing_attacks/4_dns_footprinting.xml
labs/introducing_attacks/5_scanning.xml
labs/introducing_attacks/6_exploitation.xml
labs/introducing_attacks/7_post-exploitation.xml
labs/introducing_attacks/8_vulnerability_analysis.xml
labs/labtainers/metasploit.xml @@ -95,12 +105,12 @@ INCIDENT RESPONSE | labs/labtainers/backups.xml
labs/labtainers/backups2.xml CM (CONFIGURATION MANAGEMENT) | labs/labtainers/denyhost.xml
labs/labtainers/nmap-ssh.xml Analyse: Analysis Methods | labs/labtainers/snort.xml
labs/response_and_investigation/4_ids.xml
labs/response_and_investigation/5_ids_rules.xml
labs/response_and_investigation/6_exfiltration_detection.xml -# MAT +## MAT -## MAT Scenarios +### MAT Scenarios labs/introducing_attacks/2_malware_msf_payloads.xml
labs/introducing_attacks/3_vulnerabilities.xml
labs/introducing_attacks/5_scanning.xml
labs/introducing_attacks/6_exploitation.xml
labs/introducing_attacks/7_post-exploitation.xml
labs/introducing_attacks/8_vulnerability_analysis.xml
labs/labtainers/acl-hackerbot-flags.xml
labs/labtainers/acl.xml
labs/labtainers/bufoverflow.xml
labs/labtainers/formatstring.xml
labs/labtainers/gdblesson.xml
labs/labtainers/ida.xml
labs/labtainers/metasploit.xml
labs/labtainers/retlibc.xml
labs/labtainers/snort.xml
labs/response_and_investigation/4_ids.xml
labs/response_and_investigation/5_ids_rules.xml
labs/response_and_investigation/7_live_analysis.xml
labs/response_and_investigation/8_dead_analysis.xml
labs/software_and_malware_analysis/1_dynamic_and_static_analysis.xml
labs/software_and_malware_analysis/3_c_and_asm.xml
labs/software_and_malware_analysis/4_asm.xml
labs/software_and_malware_analysis/5_ghidra.xml
labs/software_and_malware_analysis/6_ghidra_analysis.xml
labs/software_and_malware_analysis/6_ghidra_with_live_malware_samples.xml
labs/software_and_malware_analysis/7_dynamic.xml
labs/software_and_malware_analysis/8_anti_sre.xml
labs/software_and_malware_analysis/9_malware_behaviour.xml
labs/software_security_exploitation/4_exploit_development.xml
labs/software_security_exploitation/5_linux_bof_format.xml
labs/software_security_exploitation/6_linux_stack_bof.xml
labs/software_security_exploitation/7_linux_nx_bypass.xml
labs/software_security_exploitation/8_linux_aslr_bypass.xml -## MAT Scenarios by Topics +### MAT Scenarios by Topics | Topic | Scenario | | --- | --- | Malware Taxonomy | labs/introducing_attacks/2_malware_msf_payloads.xml
labs/software_and_malware_analysis/1_dynamic_and_static_analysis.xml
labs/software_and_malware_analysis/9_malware_behaviour.xml @@ -110,50 +120,50 @@ Malicious Activities by Malware | labs/introducing_attacks/5_scanning.xml
la MALCODE/MALWARE | labs/labtainers/acl-hackerbot-flags.xml
labs/labtainers/acl.xml Malware Detection | labs/labtainers/snort.xml
labs/response_and_investigation/4_ids.xml
labs/response_and_investigation/5_ids_rules.xml
labs/response_and_investigation/7_live_analysis.xml
labs/response_and_investigation/8_dead_analysis.xml -# F +## F -## F Scenarios +### F Scenarios labs/labtainers/file-deletion.xml
labs/labtainers/file-integrity.xml
labs/labtainers/macs-hash.xml
labs/labtainers/onewayhash.xml
labs/labtainers/packet-introspection.xml
labs/labtainers/pass-crack.xml
labs/labtainers/pcapanalysis.xml
labs/response_and_investigation/2_integrity_detection.xml
labs/response_and_investigation/6_exfiltration_detection.xml
labs/response_and_investigation/7_live_analysis.xml
labs/response_and_investigation/8_dead_analysis.xml -## F Scenarios by Topics +### F Scenarios by Topics | Topic | Scenario | | --- | --- | Operating System Analysis | labs/labtainers/file-deletion.xml
labs/labtainers/file-integrity.xml
labs/response_and_investigation/8_dead_analysis.xml Artifact Analysis | labs/labtainers/macs-hash.xml
labs/labtainers/onewayhash.xml
labs/labtainers/pass-crack.xml
labs/response_and_investigation/2_integrity_detection.xml
labs/response_and_investigation/6_exfiltration_detection.xml Main Memory Forensics | labs/labtainers/packet-introspection.xml
labs/labtainers/pcapanalysis.xml
labs/response_and_investigation/7_live_analysis.xml -# CPS +## CPS -## CPS Scenarios +### CPS Scenarios labs/labtainers/iptables-ics.xml
labs/labtainers/plc-app.xml
labs/labtainers/plc-forensics-adv.xml
labs/labtainers/plc-forensics.xml
labs/labtainers/plc.xml
labs/labtainers/softplc.xml
labs/labtainers/softplc2.xml
labs/labtainers/ssl.xml -## CPS Scenarios by Topics +### CPS Scenarios by Topics | Topic | Scenario | | --- | --- | Cyber-Physical Systems Domains | labs/labtainers/iptables-ics.xml
labs/labtainers/plc-app.xml
labs/labtainers/plc-forensics-adv.xml
labs/labtainers/plc-forensics.xml
labs/labtainers/plc.xml
labs/labtainers/softplc.xml
labs/labtainers/softplc2.xml
labs/labtainers/ssl.xml Cyber-Physical Systems | labs/labtainers/iptables-ics.xml
labs/labtainers/plc-app.xml
labs/labtainers/plc-forensics-adv.xml
labs/labtainers/plc-forensics.xml
labs/labtainers/plc.xml
labs/labtainers/softplc.xml
labs/labtainers/softplc2.xml
labs/labtainers/ssl.xml -# WAM +## WAM -## WAM Scenarios +### WAM Scenarios labs/labtainers/iptables-ics.xml
labs/labtainers/iptables.xml
labs/labtainers/iptables2.xml -## WAM Scenarios by Topics +### WAM Scenarios by Topics | Topic | Scenario | | --- | --- | FIREWALLS | labs/labtainers/iptables-ics.xml
labs/labtainers/iptables.xml
labs/labtainers/iptables2.xml -# HF +## HF -## HF Scenarios +### HF Scenarios labs/labtainers/ssl.xml -## HF Scenarios by Topics +### HF Scenarios by Topics | Topic | Scenario | | --- | --- | Fitting the Task to the Human | labs/labtainers/ssl.xml -# By Scenario +# Scenario CyBOK Keywords ## examples/cybok_example.xml diff --git a/lib/CyBOK/generate_scenario_index.rb b/lib/CyBOK/generate_scenario_index.rb index 595c8bad2..f88b6a1a5 100644 --- a/lib/CyBOK/generate_scenario_index.rb +++ b/lib/CyBOK/generate_scenario_index.rb @@ -1,6 +1,8 @@ require 'erb' require 'nori' -require 'youtube_images' # gem 'youtube_images' +require 'youtube_images' +# if you want to regenerate the indexes you need to install this additional gem: +# gem 'youtube_images' require_relative '../helpers/print.rb' @@ -114,3 +116,6 @@ rescue StandardError => e Print.err "Error writing file: #{e.message}" Print.err e.backtrace.inspect end + +puts "#{SCENARIOS_HASH.length} scenarios with CyBOK metadata" +puts "#{VIDEO_HASH.length} videos with CyBOK metadata" diff --git a/lib/CyBOK/template_CyBOK_scenarios.md.erb b/lib/CyBOK/template_CyBOK_scenarios.md.erb index 5dfb4d61b..2c65ce91d 100644 --- a/lib/CyBOK/template_CyBOK_scenarios.md.erb +++ b/lib/CyBOK/template_CyBOK_scenarios.md.erb @@ -1,17 +1,27 @@ -This file is an autogenerated index and cross referencing of all the scenarios that have CyBOK metadata. +# SecGen Scenarios and CyBOK -# By Knowledge Area +The Cyber Security Body of Knowledge (CyBOK) is a body of knowledge that aims to encapsulate the various knowledge areas present within cyber security. Scenarios within SecGen now contain XML elements linking them to CyBOK knowledge areas and specific topics within those knowledge areas. Additionally, video content and readings for each scenario are tagged with their CyBOK associations. + +This file is an autogenerated index and cross referencing of all the SecGen scenarios that have CyBOK metadata. + +You can browse the list below in terms of the [CyBOK Knowledge Areas, and Topics](#scenarios-indexed-by-knowledge-area-ka). The list of scenarios in the second half of this document includes keywords (also known as "indicative topics" in CyBOK terminology). + +There are <%= SCENARIOS_HASH.length %> scenarios with CyBOK metadata. + +> Cyber Securtiy Body of Knowledge (CyBOK) Issue 1.0 is Crown Copyright, The National Cyber Security Centre 2021, licensed under the Open Government Licence http://www.nationalarchives.gov.uk/doc/open-government-licence/. + +# Scenarios Indexed By CyBOK Knowledge Area (KA) <% KA_TOPIC_SCENARIOS_HASH.each{|ka,hash| %> -# <%= ka %> +## <%= ka %> -## <%= ka %> Scenarios +### <%= ka %> Scenarios <%= @ka_hash[ka].uniq.join("
") %> -## <%= ka %> Scenarios by Topics +### <%= ka %> Scenarios by Topics | Topic | Scenario | | --- | --- |<% hash.each{|topic,hash|%> @@ -20,7 +30,7 @@ KA_TOPIC_SCENARIOS_HASH.each{|ka,hash| } %> -# By Scenario +# Scenario CyBOK Keywords <% SCENARIOS_HASH.each{|scenario,array| diff --git a/lib/CyBOK/template_CyBOK_videos.md.erb b/lib/CyBOK/template_CyBOK_videos.md.erb index c9ce48b4d..9101752f0 100644 --- a/lib/CyBOK/template_CyBOK_videos.md.erb +++ b/lib/CyBOK/template_CyBOK_videos.md.erb @@ -1,7 +1,16 @@ -# Lecture Videos +# Cyber Security Lecture Videos and CyBOK + +The Cyber Security Body of Knowledge (CyBOK) is a body of knowledge that aims to encapsulate the various knowledge areas present within cyber security. Scenarios within SecGen now contain XML elements linking them to CyBOK knowledge areas and specific topics within those knowledge areas. Additionally, video content and readings for each scenario are tagged with their CyBOK associations. This file is an autogenerated index of the lecture videos referenced by scenarios -- with CyBOK metadata. +There are <%= VIDEO_HASH.length %> videos with CyBOK metadata. + +> Cyber Securtiy Body of Knowledge (CyBOK) Issue 1.0 is Crown Copyright, The National Cyber Security Centre 2021, licensed under the Open Government Licence http://www.nationalarchives.gov.uk/doc/open-government-licence/. + + +# Lecture Videos + <% VIDEO_HASH.each{|url,array| %>