JohnMcGovern.com
  • Home
  • Coursework
    • Cybersecurity Fundamentals
    • Cryptography
    • Security Architecture
    • Operational Policy
    • Risk Management
    • Management and Cybersecurity
    • Secure Software Design and Development
    • Network Visualization and Vulnerability Detection
    • Cyber Threat Intelligence
    • Incident Response and Computer Network Forensics
  • Reference Link Library
  • Resume
  • Blog

Reference Link Library

The reference link library provided below is intended to serve as a helpful store of information pointing to the most common cybersecurity industry resources, sites, and documentation. The resources referenced below have proven valuable throughout the USD Cybersecurity Operations and Leadership Program.
​​

CSOL Course-Specific References

Cybersecurity Fundamentals
ACM Special Interest Group on Security, Audit and Control (SIGSAC)
CIS Critical Security Controls (CIS 18)
​Data Center Knowledge
SC Magazine
McAfee Resource Library

Cryptography
CipherTools
GnuPG
Internet Society
Microsoft Security
OpenPGP
OpenSSL
Schneier on Security

Security Architecture
Enterprise Security Architecture - A Business-Driven Approach
​SABSA Enterprise Security Architecture
TOGAF Standard - The Open Group
Open Security Architecture (OSA)
​
​Operational Policy
Educause
HIPAA Journal
​The Brookings Institution: TechStream

Risk Management
BeyondCorp
Compliance Forge​
Federal News Network
James Hamilton: Perspectives

Management and Cybersecurity
Australian Cyber Security Centre (ACSC) Information Security Manual (ISM)
Cybray
Financial Services Sector Coordinating Council
Palo Alto Network Cyberpedia

Secure Software Design and Development
Adobe Common Controls Framework (CCF)
Atlassian Secure Software Development
GitHub Secure Software Development Strategy Essentials
Ockam.io
Open Web Application Security Project (OWASP)

Network Visualization and Vulnerability Detection
Cloudflare Blog
Dragos ICS Security
Google BeyondCorp
Kismet Wireless
Institute of Electrical and Electronics Engineers
Internet Engineering Task Force 
OWASP WebGoat

Cyber Threat Intelligence
Crowdstrike
​Common Vulnerabilities and Exposures (CVE) Program
RecordedFuture
Retail & Hospitality Information Sharing & Analysis Center (RH-ISAC)

​Zscaler

Incident Response and Computer Network Forensics
CyberChef
OpenText EnCase
Scientific Working Group on Digital Evidence (SWGDE)
The Sleuth Kit - Autopsy


Major Industry Websites

Cloud Security Alliance (CSA)
Information Systems Audit and Control Association (ISACA)
SANS Institute
​​

Government Resources

Domestic (U.S)
Department of Justice (DOJ) Cybersecurity Unit
Director of National Intelligence
National Institute of Standards and Technology (NIST)
U.S. Computer Emergency Readiness Team
 
International
Australian Signals Directorate
U.K. National Cyber Security Centre
​

Cybersecurity News

CIO Magazine
CNET
Computerworld
CSO Online
Cyber Insights Magazine
Cybermagazine
Cybersecurity Insiders
Cyberseek US
Daniel Miessler
DarkReading
Graham Cluley
International Association of Privacy Professionals (IAPP)
IT Security Guru
Krebs on Security
PCWorld
Schneier on Security
Security Weekly
Signal Magazine
TaoSecurity
The Hacker News
The Last Watchdog
Threatpost
Troy Hunt
USD Master of Science in Cybersecurity Blog
Wired Security
​

Cybersecurity Vendors & Tools

Akamai Blog
ESET: We Live Security
Sophos: Naked Security
Tripwire: The State of Security
​​

​Certification and Training

ISACA Certifications
ISC2
Pearson Vue
SANS GIAC Certifications
​

​Books

Go-To Reading List
OSU Cybersecurity Canon
​
​Course Texts
Bosworth, S., Kabay, M. E., & Whyne, E. (2014). Computer Security Handbook (6th ed., Vol. 1). Wiley. 
Du, W. (2019). Computer Security: A Hands-on Approach (2nd ed.). Wenliang Du.
Ferguson, N., Schneier, B., & Kohno, T. (2010). Cryptography Engineering. Wiley.
Jensen, C. J., III, McElreath, D. H., & Graves, M. (2017). Introduction to Intelligence Studies (2nd ed.). Routledge.
Sherwood, J., Clark, A., & Lynas, D. (2019). Enterprise Security Architecture: A Business- Driven Approach. Routledge. 

​

Selected NIST Publications

SP 800-12 Rev. 1: An Introduction to Information Security
SP 800-18 Rev. 1: Guide for Developing Security Plans for Federal Information Systems
SP 800-30 Rev. 1: Guide for Conducting Risk Assessments
SP 800-34 Rev. 1: Contingency Planning Guide for Federal Information Systems​
SP 800-37 Rev. 2: Risk Management Framework for Information Systems and Organizations
SP 800-39: Managing Information Security Risk: Organization, Mission, and Information System View​
SP 800-47 Rev. 1: Managing the Security of Information Exchanges
SP 800-53 Rev. 5: Security and Privacy Controls for Information Systems and Organizations
SP 800-101 Rev. 1: Guidelines on Mobile Device Forensics
SP 800-137: Information Security Continuous Monitoring (ISCM) for Federal Information Systems and Organizations
SP 800-171 Rev. 2: Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations​
SP 800-175B Rev. 1: Guideline for Using Cryptographic Standards in the Federal Government: Cryptographic Mechanisms 
FIPS 140-2: Security Requirements for Cryptographic Modules
FIPS 199: Standards for Security Categorization of Federal Information and Information Systems
​FIPS 200: Minimum Security Requirements for Federal Information and Information Systems


References

The links listed on this page were compiled from citations used throughout the USD CSOL program and from the references listed below:

Moore, M., PhD. (n.d.). The Top Cyber Security Blogs and Websites of 2022. University of San Diego. https://onlinedegrees.sandiego.edu/top-cyber-security-blogs-websites/
​
Copyright © 2022 John C. McGovern. All rights reserved.
  • Home
  • Coursework
    • Cybersecurity Fundamentals
    • Cryptography
    • Security Architecture
    • Operational Policy
    • Risk Management
    • Management and Cybersecurity
    • Secure Software Design and Development
    • Network Visualization and Vulnerability Detection
    • Cyber Threat Intelligence
    • Incident Response and Computer Network Forensics
  • Reference Link Library
  • Resume
  • Blog