Overview
Day 2 - Section 4: The Right Words
CPE/CMU Credits: 2.5
The word is mightier than the sword. You'll learn how to pick the right words to inform and persuade your readers. You'll find out how to make sure your words are:
- Clear: Use words your readers understand.
- Concise: Cut words you don't need.
- Consistent: Use parallel structure and uniform style.
- Correct: Use proper terms and spelling.
The key to using the right words is deliberate practice. You'll have many opportunities to improve poorly worded cybersecurity text.
Day 2 - Section 5: The Right Tone
CPE/CMU Credits: 2
Tone is the key to creating a bond with your reader. You'll learn how to make your tone:
- Professional and appropriate for the reader
- Responsive to difficult situations
- Constructive, helping the reader solve problems
- Persuasive, motivating the reader to take action or make a decision
Real-world examples will help you learn to spot tone problems, so you can turn them into writing that says just what your reader will understand and appreciate.
Day 2 - Section 6: The Right Information - Cybersecurity Incident Reports
CPE/CMU Credits: 0.5
What do readers of your cybersecurity incident report want to know? You'll learn to include the right information in such writing, so you can:
- Inform your readers about the incident
- Instill confidence that the proper steps have been taken
- Address concerns about relevant business risks
- Highlight the need for improvements, if any
The best way to learn how to write a good incident report is to look for problems in bad ones. You'll have many opportunities to do this.
Day 2 - Section 7: The Right Information - Pen Testing and Other Security Assessment Reports
CPE/CMU Credits: 0.5
Learn how to craft a security assessment report so the readers truly benefit from your insights. Master the skill of including just the right information to:
- Describe assessment methodology and scope
- Provide meaningful analysis, rather than raw findings
- Offer guidance that readers appreciate
- Include figures to support your conclusions
You'll review many problematic penetration testing and other security assessment reports, so you'll understand how to avoid their pitfalls.
Day 2 - Section 8: The Right Information - Malware and Other Threat Reports
CPE/CMU Credits: 0.5
Writing about cybersecurity threats, such as phishing messages, malware infections, and attack groups, can be challenging because of the multiple audiences that might read the reports. Learn how to include the right information in such writing, so your readers:
- Understand why the threat is relevant
- Know what to do after reviewing your report
- Trust the basis for your analysis
- Appreciate your research and advice
Guess what? You'll learn to include the right information in threat reports with the help of hands-on exercises, during which you'll spot and fix information-related weaknesses.