CyBOK Version 1.1 including all 21 knowledge areas is available to download. Read more about CyBOK 1.1

Please note that CyBOK v1.0 has been updated, and CyBOK v1.1 was released in 2021.

Knowledgebase

Knowledgebase – CyBOK v1.0

Following broad community engagement both in the UK and internationally, CyBOK v1.0 was launched and released in October 2019. A wealth of authoritative sources was synthesised into the 19 Knowledge Areas (KAs) below, divided into five high-level categories through a wide range of both national and international community consultations.​

We would like to understand how the CyBOK is being used and its uptake. We request that organisations using, or intending to use, CyBOK for the purpose of education, training, course development, professional development get in touch to let us know.​

Contact us at contact@cybok.org.

Relationships between KAs

The different KAs in CyBOK are not orthogonal and relate to each other in many ways. The key relationships are captured in the table and diagram. These are not exhaustive but indicate main connection points between the KAs.

Dependencies on external knowledge

CyBOK KAs are written to be largely self- contained. However, there is basic knowledge and understanding of concepts that is required in several cases to fully engage with and understand the content of the KA. These external dependencies are noted in the table . Where possible, we refer to relevant knowledge in the IEEE Software Engineering Body of Knowledge Version 3.0 (SWEBOK) and the ACM Computer Science Curriculum 2013.

Introduction to CyBOK

Risk Management & Governance

Privacy & Online Rights

Law & Regulation

Security Operations & Incident Management

Adversarial Behaviours

Malware & Attack Technologies

Operating Systems & Virtualisation Security

Distributed Systems Security

Authentication, Authorisation & Accountability

Software Security

Secure Software Lifecycle

Web & Mobile Security

Network Security

Physical Layer and Telecommunications Security

Cyber Physical Systems

Hardware Security