Teaching and Learning materials
Here we offer you an extensive collection of teaching materials to help you expand your knowledge and prepare for various topics.
Our goal is to provide you with easy and convenient access to quality educational materials. Whether you are a pupil, student, teacher or simply a passionate learner, here you will find a variety of resources to assist you in your learning process.
This website contains a wide range of educational materials on various cyber security topics. You can download these materials directly from our site and save them to your own device. This gives you the flexibility to use the content anytime, anywhere, whether at home, at school or on the go.
The educational materials we offer here have been carefully selected and created by subject matter experts. We strive to provide you with only trustworthy and up-to-date information so that you can get the most out of your learning experience.
To access the teaching materials, simply navigate through our website and browse the different categories. Click on the materials you want for a detailed description and then download them with just one click. It’s quick, easy and free!
We update our collection regularly to make sure you have access to the latest teaching materials. So feel free to visit us often to stay up to date.
Take advantage of this great opportunity to expand your knowledge and enrich your learning journey. Download your desired teaching materials today and immerse yourself in the fascinating world of learning!
We hope you find exactly what you are looking for on our website and wish you every success in your learning!
Cyber Range
Type: Exercise
CS-awareness education:
Awareness: Understand the technical and non-technical cyber security domains and their interrelationships in the overall concept.
Collaboration: The participants work in groups of up to 20 people to be able to complete the exercise. Students from all fields of knowledge can participate in the exercise. This fosters interdisciplinary experience and non-technical fields gain an awareness of the challenges of cyber security
Reflection: Participants must then reflect on the actions they have taken and discuss how they could have developed a better solution with the information given. They must also be able to include other areas such as risk management, law, etc.
Learning Domain
- NIST (identify, protect, detect, respond)
- Cybok: System Security (operating systems & virtualisation security; hardware security; network security; web & mobile security) Risk Management & Governance; Security Operations & incident Management
Hack-the-Box
Type: Exercise
CS-awareness education:
Awareness: Understanding how attackers proceed and how these steps can be detected in the defence, risk assessment via own infrastructure, tool supported cyber security
Collaboration: Students work on the assignment alone, but can be advised to exchange experiences and learning through reflection.
Reflection: Students are encouraged to reflect on the automated tools for detecting incidents, reflection on one’s own technical skills – what are the deficits and how can they be eliminated through teamwork or tools?
Learning Domain
IT Forensic
Type: Lectures & Exercise
CS-awareness education:
Awareness: Through this exercise, students learn the importance of developing pre-incident measures and establishing pre-mortem forensics in order to conduct sound analyses. Further, through the exercise, they develop competencies in the area of IT risk management and are able to perform complete risk analyses.
Collaboration: Individual exercise
Reflection: Students can reflect on their own systematic analysis skills through the exercise, and receive valuable feedback when they share their results and methodological approach with other students and rethink their approach.
Learning Domain
- CyBOk: Risk Management, Human Factors, Adversarial Behaviours, Forensics, Web & Mobile Security
Password hygiene
Type: Lectures & exercise
CS-awareness education:
Awareness: Understanding the challenges associated to the creation of strong passwords and the difficulties that arise from password systems in practice.
Collaboration: Working in groups, creating a Board document for senior stakeholders and non-technical audiences, creating a company policy document.
Reflection: Reflection on existing guidance for creating strong passwords, reflection on the challenges posed by setting strong passwords, critical reflection on the limitations and impact of password guides created for end-users.
Learning Domain
- CyBOK Knowledge Areas: Web and Mobile Security, Authentication, Authorisation & Accountability.
Security and Risk Management
Type: Assignment & Exercise
CS-awareness education:
Awareness: Understanding the challenges of conducting security and risk assessments for SMEs.
Collaboration: Working in groups, creating a risk assessment plan for a company and, considering the barriers to knowledge for non-technical audiences.
Reflection: Reflection on existing security advice and using a risk assessment tool, reflecting on the challenges associated to creating risk assessment plans and, group-reflection on existing guidance (clarity, understandability and, ease for implementation).
Learning Domain
- CyBOK: Knowledge Areas: Systems Security (Operating Systems & Virtualisation Security; Hardware Security; Network Security; Web and Mobile Security, Risk Management & Governance; Security Operations & Incident Management.
- NIST: identify, protect, detect, respond
Security policy
Type: Exercise, Project
CS-awareness education:
Awareness: Understanding the importance of a clear security policy and the challenges associated to creating it.
Collaboration: Working in groups, creating a security policy document for a company and, inclusion of non-technical audiences.
Reflection: Reflection on existing security policies and critically evaluating them, reflecting on the challenges associated to creating security policies, self-reflection on the created security policy and, reflection on peers’ security policies.
Learning Domain
- CyBOK Knowledge Areas: Risk Management & Governance, Human Factors, Security Operations & Incident Management
- NIST: Policies and ethics, privacy and security principles, threats and vulnerabilities
Usable security in practice
Type: Exercise/Project, Assignment
CS-awareness education:
Awareness: Understanding the importance of usability of security and privacy features facing end users and the challenges associated to creating usable security in practice.
Collaboration: Working in groups, collectively evaluating the usability of security and privacy features of various services, inclusion of non-technical audiences and, collectively presenting.
Reflection: Reflection on the usability of security and privacy features, critically evaluating existing services in terms of their effectiveness, efficiency and satisfaction for users, reflecting on aspects raised by their own group and other groups.
Learning Domain
- CyBOK Knowledge Areas: • Human Factors: Infrastructure Security (Cyberphysical Systems Security; Hardware Security; Network Security), • Systems Security (Operating Systems & Virtualisation Security; Hardware Security; Network Security; Web and Mobile Security
- NIST: privacy and security principles, threats and vulnerabilities
Understanding CS through use of Open Data
Type: Lectures & Exercise
CS-awareness education:
Awareness: During the exercise students gain understanding of the main issues related to cyber threats and their impact on different sectors by finding, creating and manipulating open data sets. This is done in a company context, which makes students aware of the relevance of these issues for different industries.
Collaboration: By working in small groups, students are encouraged to discuss and act together and share their insights in a joint outcome: a presentation of their findings on cybersecurity threats impact, supported by visualisations of data.
Reflection: During and at the end of the exercise, students reflect on existing threats and their cost, availability of open data about cybersecurity and different impact on different kind of industries. Furthermore, they are encouraged to reflect on common answers or discrepancies in data.
Learning Domain
- CyBOK Knowledge Areas: Human, Organisational & Regulatory Aspects, Distributed Systems Security
Defending privacy: auditing and incident handling
Type: Lectures & Exercise
CS-awareness education:
Awareness: Understanding the role of audits in privacy protection and the importance of communication and teamwork for handling incidents.
Collaboration: Working in teams, communication and presenting outcomes.
Reflection: After each phase there is a reflection round on the relevant GDPR sections, the developed concepts and the way in which it was developed and applied.
Learning Domain
- CyBOK Knowledge Areas: Privacy
- NIST: Identify, Protect, Detect, React, Recover
- ACM/IEEE: Legal lens, protection – organisational and technical measures
General Data Protection Regulation (GDPR) challenges
Type: Lectures & Exercise
CS-awareness education:
Awareness: Understanding the role of privacy and impact of GDPR on IT project.
Collaboration: Working in teams, communication and presenting results.
Reflection: After each phase, there is a reflection round on the relevant GDPR sections, the developed solution and the way it was developed.
Learning Domain
- CyBOK Knowledge Areas: Privacy
- NIST: Identify, protect
- ACM/IEEE: Legal lens, protection
A secure cloud-based CSCW environment
Type: Lectures & Exercise
CS-awareness education:
Awareness: Understanding the role of security and privacy protection in cloud computing environments, considering essential business processes and the threat landscape.
Collaboration: Working in teams, organising work as goal-oriented team
Reflection: After each phase there is a reflection round on the relevant analysis, the result and the way it was developed and applied.
Learning Domain
- CyBOK Knowledge Areas: Privacy
- NIST: Identify, protect
- ACM/IEEE: Leval lens, organisational lens, protection, organisation and technical measures
Reflection on CS cases
Type: Exercise, assignment
CS-awareness education:
Awareness: Develop a better and more holistic understanding of the human context of cybersecurity, by applying their knowledge in a professional/organisational context, focusing on different roles and responsibilities in the organisation, and also considering the emotional aspects of cybersecurity.
Collaboration: These assignments are intended as group work (4-6 students), in which students collaborate in order to answer open reflective questions for a specific case together. The supportive questions are open and general, can have more than one answer, and different answers may give rise to further discussion. In this way, students can build on each other’s ideas, take different roles under considerations and experience how cyber security in professional context is always a collaborative endeavour.
Reflection: The core of this exercise is reflection on incidents in context. By asking questions and sharing their ideas, students will be trying to understand the particular case and think of ways to solve it. The students can use different models (e.g., NIST cyber security framework) as a foundation of or to support the reflective process. Besides solving or reflecting on incident handling, another phase in the reflective process is thinking about prevention: what should be done or improved to prevent these incidents from happening? In this phase also, students can used different models to make recommendations.
Learning Domain
- CyBOK: Human, Organisational & Regulatory Aspects