Cyber Security Fundamentals
Barkley, J. (n.d.). ROLE BASED ACCESS CONTROL [PDF]. Maryland: Software Diagnostics and Conformance Testing National Institute of
Standards and Technology.
Hunter, N. (2020, September 24). Role-Based Access Control for a Complex Enterprise. Retrieved September 28, 2020, from
https://thycotic.com/company/blog/2020/09/01/role-based-access-control-for-a-complex-enterprise/
Zhang, E. (2019, July 15). What is Role-Based Access Control (RBAC)Examples, Benefits, and More. Retrieved September 27, 2020, from
https://digitalguardian.com/blog/what-role-based-access-control
Standards and Technology.
Hunter, N. (2020, September 24). Role-Based Access Control for a Complex Enterprise. Retrieved September 28, 2020, from
https://thycotic.com/company/blog/2020/09/01/role-based-access-control-for-a-complex-enterprise/
Zhang, E. (2019, July 15). What is Role-Based Access Control (RBAC)Examples, Benefits, and More. Retrieved September 27, 2020, from
https://digitalguardian.com/blog/what-role-based-access-control
Cryptography
Ferguson, N., Kohno, T., & Schneier, B. (2010). Cryptography engineering: design principles and practical applications. Indianapolis, IN: Wiley Pub., Inc.
Giordani, J. (2021, June 3). Council post: How to balance trade-offs between security and privacy in it. Forbes. Retrieved April 14, 2022, from
https://www.forbes.com/sites/forbestechcouncil/2021/06/03/how-to-balance-trade-offs-between-security-and-privacy-in-it/?sh=26d27fef66a6
Paar, C., & Pelzl, J. (2010). Understanding cryptography: A textbook for students and Practitioners. Scholars Portal.
Giordani, J. (2021, June 3). Council post: How to balance trade-offs between security and privacy in it. Forbes. Retrieved April 14, 2022, from
https://www.forbes.com/sites/forbestechcouncil/2021/06/03/how-to-balance-trade-offs-between-security-and-privacy-in-it/?sh=26d27fef66a6
Paar, C., & Pelzl, J. (2010). Understanding cryptography: A textbook for students and Practitioners. Scholars Portal.
Security Architecture
Sherwood, J., Clark, A., & Lynas, D. (2005). Enterprise security architecture a business-driven approach. Boca Raton, FL: CRC Press.
Vaillant, M. (2020, May 20). A Case Study in Complete Dominance. Retrieved December 6,2020, from https://www.mattvaillant.com/blog/amazon-a-case-
study-in-complete-dominance
Vaillant, M. (2020, May 20). A Case Study in Complete Dominance. Retrieved December 6,2020, from https://www.mattvaillant.com/blog/amazon-a-case-
study-in-complete-dominance
Cybersecurity Law & Policy
Grama, J. L. (2022). Legal and privacy issues in information security. Jones & Bartlett Learning.
Pitchkites, M. (2022, November 14).26 cyber security statistics, Facts & Trends in 2022.Cloudwards. Retrieved November 18, 2022,
from https://www.cloudwards.net/cyber-security-statistics/
Schreider, T. (2020). Cybersecurity Law, standards and regulations. Rothstein Publishing
Pitchkites, M. (2022, November 14).26 cyber security statistics, Facts & Trends in 2022.Cloudwards. Retrieved November 18, 2022,
from https://www.cloudwards.net/cyber-security-statistics/
Schreider, T. (2020). Cybersecurity Law, standards and regulations. Rothstein Publishing
Risk Management
Boyle, S., Bodeau, D., & Graubart, R. (2010, September 30). Cyber security governance - mitre corporation. A Component of MITRE's Cyber Prep Methodology.
Retrieved April 11, 2023, from https://www.mitre.org/sites/default/files/pdf/10_3710.pdf
Initiative, J. T. F. T. (2012, September 17). Guide for Conducting Risk Assessments. CSRC. Retrieved April 10, 2023, from
https://csrc.nist.gov/publications/detail/sp/800-30/rev-1/final
Whitman, M. E., & Mattord, H. J. (2019). Management of Information Security. Cengage.
Retrieved April 11, 2023, from https://www.mitre.org/sites/default/files/pdf/10_3710.pdf
Initiative, J. T. F. T. (2012, September 17). Guide for Conducting Risk Assessments. CSRC. Retrieved April 10, 2023, from
https://csrc.nist.gov/publications/detail/sp/800-30/rev-1/final
Whitman, M. E., & Mattord, H. J. (2019). Management of Information Security. Cengage.
Management and Cyber Security
Uche, N. (2022). High demand cybersecurity skills. Retrieved December 4, 2022, from https://www.forbes.com/sites/louiscolumbus/2020/11/01/what-are-
the- fastest-growing-cybersecurity-skills-in-2021/?sh=270243645d73.
CyberSeek. (2022, October 17).Cybersecurity remains one of the most in demand professions.Retrieved December 6, 2022, from https://www.prnewswire.com
news-releases/cybersecurity-remains-one-of-the-most-in-demand- professions-new-data-from-cyberseek-confirms-301651014.html
the- fastest-growing-cybersecurity-skills-in-2021/?sh=270243645d73.
CyberSeek. (2022, October 17).Cybersecurity remains one of the most in demand professions.Retrieved December 6, 2022, from https://www.prnewswire.com
news-releases/cybersecurity-remains-one-of-the-most-in-demand- professions-new-data-from-cyberseek-confirms-301651014.html
Secure Software Design and Development
Gropper, A. (2011, September 09). Open-Source Health Care Software. Retrieved October 02, 2021, fromhttps://journalofethics.ama-assn.org/article/open-
source-health-care-software/2011-09
Hendrix, R. W. (n.d.). Lambda. Retrieved October 02, 2021, from https://aws.amazon.com/lambda/
Journal of Ethics: American Medical Association. (n.d.). Retrieved September 20, 201, fromhttps://journalofethics.ama-assn.org/home Rangel, D. (2015).
DynamoDB: Everything you need to know about Amazon Web Service's NoSQLdatabase. Retrieved from https://aws.amazon.com/dynamodb
source-health-care-software/2011-09
Hendrix, R. W. (n.d.). Lambda. Retrieved October 02, 2021, from https://aws.amazon.com/lambda/
Journal of Ethics: American Medical Association. (n.d.). Retrieved September 20, 201, fromhttps://journalofethics.ama-assn.org/home Rangel, D. (2015).
DynamoDB: Everything you need to know about Amazon Web Service's NoSQLdatabase. Retrieved from https://aws.amazon.com/dynamodb
Network Visualization and Vulnerability Detection
Chandel, R. (2022, January 12). Comprehensive guide on metasploitable 2. Hacking Articles.Retrieved February 26, 2023, from
https://www.hackingarticles.in/comprehensive-guide-on-metasploitable-2/
Nagios Library. Nagios XI documentation. (2023). Retrieved February 25, 2023, fromhttps://library.nagios.com/library/products/nagios-xi/documentation
Welcome to the Ubuntu Manpage Repository. Ubuntu Manpage: Welcome. (2019). Retrieved
Zabbix Manual. Documentation (2023). Retrieved February 27, 2023, from \https://www.zabbix.com/documentation/current/en/manual
https://www.hackingarticles.in/comprehensive-guide-on-metasploitable-2/
Nagios Library. Nagios XI documentation. (2023). Retrieved February 25, 2023, fromhttps://library.nagios.com/library/products/nagios-xi/documentation
Welcome to the Ubuntu Manpage Repository. Ubuntu Manpage: Welcome. (2019). Retrieved
Zabbix Manual. Documentation (2023). Retrieved February 27, 2023, from \https://www.zabbix.com/documentation/current/en/manual
Cyber Threat Intelligence
Crowdstrike: We stop breaches. crowdstrike.com. (2022, February 23). Retrieved March 1, 2022, fromhttps://www.crowdstrike.com/
Cybersecurity spending worldwide 2021.Retrieved March 1,2022, from https://www.statista.com/statistics/991304/worldwide-cybersecurity- spending/
Johnson, J. (2021, February 16). Leading cause of ransomware infection 2020. Statista. Retrieved March1, 2022, from
https://www.statista.com/statistics/700965/leading-cause-of-ransomware-infection
Cybersecurity spending worldwide 2021.Retrieved March 1,2022, from https://www.statista.com/statistics/991304/worldwide-cybersecurity- spending/
Johnson, J. (2021, February 16). Leading cause of ransomware infection 2020. Statista. Retrieved March1, 2022, from
https://www.statista.com/statistics/700965/leading-cause-of-ransomware-infection
Incident Response and Computer Network Forensics
Sherwood, J., Clark, A., & Lynas, D. (2005). Enterprise security architecture a business-drivenapproach. Boca Raton, FL: CRC Press.
Vaillant, M. (2020, May 20). A Case Study in Complete Dominance. Retrieved December 6,2020, from https://www.mattvaillant.com/blog/amazon-a-case- study-in-complete-dominance
Vaillant, M. (2020, May 20). A Case Study in Complete Dominance. Retrieved December 6,2020, from https://www.mattvaillant.com/blog/amazon-a-case- study-in-complete-dominance