How to use CyBOK
Get started with CyBOK and discover practical ways to apply it. This section includes CyBOK v.1.1, introductory webinars and resources that explain how the Knowledge Areas are structured. You’ll also find case studies, course mapping documents, and guidance for educators and professionals on embedding CyBOK into teaching, training, and curriculum design.
Please apply the filters to find the most relevant resources for you.
Active Filters
Title | Link | Use |
|---|---|---|
CyBOK Introduction |
Introduction to CyBOK for general awareness and understanding. |
|
UK Higher Education provider support |
Guidance for UK Higher Education programme directors applying for NCSC certification, and mapping of training courses onto CyBOK that may be useful to students when choosing a course. |
|
UK Higher Education provider support |
Guidance for UK Higher Education programme directors applying for NCSC certification, and mapping of training courses onto CyBOK that may be useful to students when choosing a course. |
|
UK Higher Education provider support |
Guidance for UK Higher Education programme directors applying for NCSC certification, and mapping of training courses onto CyBOK that may be useful to students when choosing a course. |
|
CyBOK’s Knowledge Areas |
CyBOK-aligned learning resources for programme design and delivery, including domains for the foundation of the CyBOK framework. |
|
Introduction |
Overview of CyBOK’s formation and its definition of cyber security. |
|
Games |
Visual educational resource using CyBOK to engage young learners in cyber security. |
|
Podcast and Webinars |
Short introductions to CyBOK Knowledge Areas. |
|
Cyber in Schools |
Highlights challenges in integrating cyber security into primary and secondary education. |
|
Mapping for Universities |
Mapping tool for Professionals and training providers to align programmes with CyBOK knowledge trees. |
|
Mapping Summary |
This document summarises the process for mapping university degree content to the Cyber Security Body of Knowledge (CyBOK) to support applications for NCSC certification. |
|
Mapping for Universities or Training |
Comparison of HE programmes and professional certifications to highlight graduate knowledge focus. |
|
Characterising the Focus of Cybersecurity Curricular Frameworks |
Overview of differences between CyBOK and other cyber security frameworks. |
|
Meet the Oasis Characters |
Meet the fictional characters in the Oasis Education Series. |
|
Oasis Cyber Detective Episode 1 |
Scenario-based learning applying CyBOK principles to solve cyber security challenges. |
|
Oasis Cyber Detective Episode 2 |
Scenario-based learning applying CyBOK principles to solve cyber security challenges. |
|
Oasis Cyber Detective Episode 3 |
Scenario-based learning applying CyBOK principles to solve cyber security challenges. |
|
Oasis Cyber Detective Episode 4 |
Scenario-based learning applying CyBOK principles to solve cyber security challenges. |
|
Oasis Cyber Detective Episode 5 |
Scenario-based learning applying CyBOK principles to solve cyber security challenges. |
|
Oasis Cyber Detective Episode 6 |
Scenario-based learning applying CyBOK principles to solve cyber security challenges. |
|
Drone Data (Oasis) |
||
Perception Tester (Oasis) |
||
The United Kingdom’s Cyber Security Degree Certification Program: A Cyber Security Body of Knowledge Case Study |
Explore how CyBOK supports certification of UK cyber security degrees and addresses the skills gap. |
|
Report from first CyBOK UK community workshop, 30 October 2019 |
Resources to support community engagement on cyber-related issues. |
|
Identifying the Knowledge Gaps of Future Security Information Workers |
Identification of information security knowledge gaps and strategies to bridge them. |
|
Bringing Cyber To School: Integrating Cyber Security Into Secondary School Education |
The secondary education skills gap and the need for early cyber security education. |
|
Scoping the Cyber Security Body of Knowledge |
Introduction to CyBOK and the areas it covers. |
|
Paper presenting CyBOK as the basis of comparison between cyber security curricular frameworks |
Academic support for integrating CyBOK into education programmes. |
|
CyBOK Version 1.1.0 |
Access to CyBOK v. 1.1. |
|
Cyber Security Body of Knowledge Webinar |
Video introduction to CyBOK, its use, and why it’s important. |
|
Mappings of University and Professional Training Programmes to CyBOK |
Helps employers to assess programme relevance to knowledge requirements of job roles, and learners to choose suitable certifications for their learning and career needs. |
|
CyBOK Mapping Framework – academic and professional programmes |
How to map concepts in academic and professional programmes to CYBOK. |
|
CyBOK Mapping Framework – NCSC Certified Degrees |
Guidance on CyBOK mapping framework for NCSC certification of UK Higher Education programmes. |
|
Webinar – CyBOK Mapping Framework – NCSC Certified Degrees |
Guidance on CyBOK mapping framework for NCSC certification of UK Higher Education programmes. |
|
Framework Appendices |
Tables used for the CyBOK mapping framework of NCSC Certified Degrees. |
|
An A-Z of CyBOK Knowledge Areas Indicative Material |
An alphabetical version of the CyBOK’s knowledge areas indicative material from the NCSC’s degree certification documents. |
|
CyBOK Mapping Reference v1.3 |
Provides a guide to where various topics are discussed within CyBOK. |
|
CyBOK Mapping Reference v1.2 |
Provides a guide to where various topics are discussed within CyBOK. |
|
CyBOK Mapping Reference v1.1 |
Provides a guide to where various topics are discussed within CyBOK. |
|
CyBOK Tabular Representation of Broad Categories and KAs |
Tabular representation of CyBOK Broad Categories, Knowledge Areas and their descriptions. |
|
Knowledge Trees topic list |
A visual tool to explore CyBOK and its Knowledge Areas. |
|
Clickable Knowledge Trees |
A visual tool to explore CyBOK and its Knowledge Areas. |
|
Harvard University USA Exemplar |
A step-by-step implementation of the mapping process by taking an example of one module description from Harvard University, USA. |
|
MIT, USA Exemplar |
A step-by-step implementation of the mapping process by taking an example of one module description from MIT University, USA. |
|
University of Surrey Exemplar |
A step-by-step implementation of the mapping process by taking an example of one module description from University of Surrey, UK. |
|
University of Oxford Exemplar |
A step-by-step implementation of the mapping process by taking an example of one module description from University of Oxford, UK. |
|
University of Bristol Exemplar |
A step-by-step implementation of the mapping process by taking an example of one module description from University of Bristol, UK. |
|
All Framework Guidance Documents |
Resources designed to support UK Higher Education programme directors in the application process for NCSC certification. |
|
COLTRANE: Collaborative Cybersecurity Awareness Learning |
Resources to support cyber security awareness education in HE institutions. |
|
Incorporating Law into Cyber Security Higher Education |
Resources exploring the relationship between law and cyber security concepts. |
|
CertiProf Cyber Security Foundation course |
Foundational knowledge resources for cyber security certification. |
|
Review and update process of Knowledge Guides (KGs) and Topic Guides (TGs) |