-
Cybersecurity Student Resources
- AICPA Cybersecurity Resource Center
- Bro Center of Expertise
- Center for Cyber Safety and Education
- CIS Critical Security Controls
- CompTIA SY0-401 Security+ Training Videos
- CSSIA Cybersecurity Education Resources
- Cybersecurity Associations
- Cybersecurity Canon
- CyberDef DoJo
- Cybersecurity Economics MOOC
- Cybersecurity Internship Program
- CYBERSECURITY NEXUS (CSX) TRAINING PLATFORM
- Cybersecurity skills aren’t taught in college
- Cybertalk Radio
- Cybersecurity Ventures
- CyberSeek supply and demand data for Cybersecurity Jobs
- CyberTexas Foundation
- CyberWire Daily Email News Brief
- Cybrary
- Desperately seeking cybersecurity skills
- InfraGard
- International Computer Science Institute (ICSI)
- National Cybersecurity Student Association
- National Initiative for Cybersecurity Education (NICE)
- NSA Student Programs
- San Antonio Chamber Cybersecurity Council
- San Antonio Cybersecurity Hub
- Security Advisor Alliance
- The Map of Cybersecurity Domains
- The Periodic Table of Cybersecurity Startups
- The Phi Beta Cyber Society
- Watch Cyberwar in Real-Time on This Live Map
-
Cybersecurity Scholarships
- 50 Amazing Computer Science Scholarships
- AFCEA ROTC Scholarship
- AFCEA STEM Majors Scholarships
- Byron Lockhart Capitol Area Council Eagle Scout scholarships
- Center for Cyber Safety and Education Scholarships
-
CyberCorps Scholarship for Service Program (SFS)
- Participating Institutions
- DoD Cybersecurity Scholarship
- DoD Cybersecurity Scholarship Application
- GW's Partnership in Securing Cyberspace through Education and Service (PISCES)
- IUP Institute for Cyber Security Scholarships
- Lance Stafford Larson Student Scholarship
- Microsoft Cybersecurity Scholarship
- NSA Student Programs
- NSF: Cyber Scholarship for Service Program Analysis
- Scholarships for Eagle Scouts awarded by the National Eagle Scout Association
- Scholarships for Eagle Scouts awarded by religious organizations
- Scholarships for Eagle Scouts awarded by civic organizations
- Scholarships for Eagle Scouts awarded by specific schools
- Secretary's Honors Program Cyber Student Volunteer Initiative
- UAH Center for Cybersecurity Research and Education
- USCC Student Scholarships
- US Air Force ROTC
- US Army ROTC
- US Naval ROTC
-
College Cybersecurity Programs
- Bethany College
- CTU Bachelor of Science in Cybersecurity
- Cyber Security Associate of Applied Science
- Darwin Deason Institute for Cyber Security
- DePaul University Cybersecurity (BS)
- Drexel University
- George Mason BAS in Cyber Security
- MIT Applied Cybersecurity
- NYU Tandon School of Engineering MS in Cybersecurity
- Pennsylvania State University
- RIT Cybersecurity MicroMasters
- Stanford Cybersecurity
- Stanford H4D
- St. John’s University Cyber Security Systems BoS Degree
- Texas A&M Cybersecurity Programs
- UoH Cyber Security Institute
- UMUC Bachelor of Science in Cybersecurity
- University of Denver
- USAF Institute of Technology (AFIT) Center for Cyberspace Research (CCR)
- US Army Cyber School
- USC Viterbi School of Engineering MS in Cyber Security Engineering
- Champlain College
- UTSA BBA in Cybersecurity
- UTSA launches first fully online degree program in cybersecurity
- Virginia Cyber Range
-
Cybersecurity Certifications
- Certification Path to become Information Security Architect
- Computing Technology Industry Association (CompTiA)
- CompTIA Career Roadmap
- CompTIA Certifications
- CompTIA SY0-401 Security+
- CompTIA Cybersecurity Analyst (CSA+)
- CompTIA Network+
- CompTIA – Advanced Security Practitioner
- CISSP® - Certified Information Systems Security Professional
- CISA (Certified Information Systems Auditor)
- CISM (Certified Information Security Manager)
- GSEC (GIAC Security Essentials Certification)
- CRISC (Certified in Risk and Information Systems Control)
- SSCP (Systems Security Certified Practitioner)
- CPTC – Certified Penetration Testing Consultant
- CPTE – Certified Penetration Testing Engineer
- CSTA – Certified Security Testing Associate
- GPEN – GIAC Certified Penetration Tester
- OSCP – Offensive Security Certified Professional
- CEH – Certified Ethical Hacker
- ECSA – EC-Council Certified Security Analyst
- CEPT – Certified Expert Penetration Tester
-
Cybersecurity Employers
-
Companies
- AT&T Cybersecurity Jobs
- Booz Allen Hamilton Cybersecurity Jobs
- Cyber Defense Labs
- Cybersecurity 500
- Cybersecurity Job Roles
- Cybersecurity Recruiters
- DataTribe
- Deloitte Cybersecurity Jobs
- Goldman Sachs TechRisk Jobs
- IBM Cybersecurity jobs
- Industrial Internet Consortium Members
- LinkedIn Cybersecurity Job Listings
- Lockheed Martin Cybersecurity Jobs
- Microsoft Cybersecurity Jobs
- National Cybersecurity Excellence Partners (NCEP)
- Pragmatics, Inc. Cybersecurity Jobs
- Raytheon Cybersecurity Jobs
- SAIC Cybersecurity Jobs
- Security Current Company Listings
- TECHEXPO Top Secret
-
Government Agencies
- DHS CYBERSECURITY Jobs
- DISA
- DoD Cyber Mission Force
- DoD Cybersecurity Jobs
- FBI Cyber Crime Unit
- FinCen
- NSA/CSS
- NSA Intelligence Careers
- NITRD Member Agencies
- US Computer Emergency Readiness Team (US-CERT)
-
Military
- USCYBERCOM
- US Army Cyber CoE
- USAF Cyber Support Squadron
- U.S. Fleet Cyber Command
- U.S.M.C MARFORCE Cyber
-
Cybersecurity Research Sources
- 5 Reasons to Become a Cyber Security Professional
- 2016 Federal Cybersecurity Research and Development Strategic Plan
- AT&T Cybersecurity Insights
- Booz Allen Cyber
- CISCO Cybersecurity
- Cost of Cybercrime Predicted to Hit $6 Trillion Annually By 2021, Study Says
- Cybersecurity Act of 2015
- Cybersecurity Enhancement Act of 2014
- Cybersecurity Experts Call for Internet of Things Standards
- Cyber Defense
- Cybersecurity National Action Plan
- Cyber-Security & Risk Management, an evolving ecosystem
- Cyber Threat Intelligence Integration Center
- DISA CYBERSECURITY
- DoD Cyber Crime Center (DC3)
- DoD Cybersecurity
- DoD CYBER STRATEGY
- Executive Order 13636, “Improving Critical Infrastructure Cybersecurity."
- EY Cybersecurity
- FBI Cyber Division
- FEDERAL CYBERSECURITY RESEARCH AND DEVELOPMENT STRATEGIC PLAN
- FinCEN
- GE Information Security Technology Center
- Homeland Security Cyber Security Division
- IBM Study: Data Breach Costs Rising, Now $4 million per Incident
- IBM Watson Cognitive Security
- IBM X-Force Command Centers
- INTEL Security
- ISA Books and Publications
- ISACA CYBERSECURITY NEXUS
- Lockheed Martin Cybersecurity Solutions
- Machine-Learning Algorithm Can Show Whether State Secrets Are Properly Classified
- MalwareCheck.org
- MalwareTechBotnetTracker
- Microsoft Cybercrime Center
- National Cybersecurity Institute
- National Cybersecurity STEM Education Advisory Board
- National Initiative for Cybersecurity Education (NICE)
- NATO Cyber Defence Centre
- NIST Launches Beta Site for the Computer Security Resource Center (CSRC)
- NIST Cybersecurity Framework
- NIST Cyber Security Framework Reference Tool
- NIST Cybersecurity Framework Virtual Events
- NITRD Program
- NSA Cybersecurity
- NSF Cybersecurity
- PhishTank
- SANS Institute Internet Storm Center
- The Map of Cybersecurity Domains (v2.0)
- VMWARE Cybersecurity
- Understanding and Assessing your SCADA Cybersecurity Posture
- Whitehouse Cybersecurity Policies & Initiatives
- Yippy Cybersecurity Search
-
Cybersecurity Reports
- 2016 Trends in Cybersecurity: A Quick Guide to the Most Important Insights in Security
- AI2: Training a big data machine to defend
- A Framework for Programming and Budgeting for Cybersecurity
- Blumberg Capital 2017 State of Cybersecurity
- Center for Applied Internet Data Analysis
- Cybersecurity: a market landscape, in 4 charts
- Cybersecurity in the cognitive era
- Cyber Security Publication Library
- Cybersecurity Social Contract
- Cybersecurity Ventures
- CyberSeek, An Interactive Resource for Cybersecurity Career Information
- CSPRI Research Projects
- Developing an Ontology of the Cyber Security Domain
- Cybersecurity’s Next Step: Artificial Intelligence
- DLA Piper's Data Protection Laws of the World Handbook
- Goggle Scholar cyber security artificial intelligence search
- Industrial Internet Security Framework Technical Report
- Intelligence-Driven Computer Network Defense
- Information Technology - Information Sharing and Analysis Center
- National Cybersecurity Center of Excellence (NCCoE)
- NSA Best Scientific Cybersecurity Paper Competition
- NSF Advisory Commi8ttee for Cyberinfrastructure
- NIST Systems Engineering Guidance
- Semantic Scholar Cybersecurity Search
- Stanford Cybersecurity Library
- Small Business Cybersecurity Workbook
- The Defender’s Dilemma: Charting a Course Toward Cybersecurity
- US-CERT Technical Publications
-
Paths to Learn About Cybersecurity
- BSA Cyber Chip
- CISO Mind Map
- Cybersecurity Canon
- Cybersecurity Definition
- Cyberseek
- Cybersecurity - Homeland Security
- Cyber League
- CyberPatriot Program
- Collegiate Cyber Defense Competition (CCDC)
- Cybersecurity Pros Face Zero Unemployment
- DARPA Cyber Competition Framework for Automated Cybersecurity
- Future of Cybersecurity Innovation
- Get 'em while they're young: One fix for cyber labor shortage
- GenCyber Program
- Glossary of AI Terms for Cyber Security
- Glossary of Cyber Security Terms
- Hacking the Cybersecurity Demand Curve
- Homeland Security Cybersecurity
- How to land a cybersecurity job
- It’s not where you start — it’s how you finish: Addressing the cybersecurity skills gap with a new collar approach
- MIT students and others teaching IBM Watson about cybersecurity
- National Centers of Academic Excellence (CAE)
- NSA/DHS Centers of Academic Excellence
- NICCS Cybersecurity Workforce Framework
- NSA/DHS National Cybersecurity CAE Designated Institutions
- National CyberWatch Cybersecurity Curriculum Model
- National Center for Systems Security and Information Assurance (CSSIA)
- Path to a Career in Cyber by Gary Hayslip
- Plan X: DARPA's Revolutionary Cyber Security Platform
- TechHire Initiative
- Tips for Breaking Into the Cybersecurity Industry
- The Path to a Cybersecurity Governance Career
- The Growing Threats to Cybersecurity
- Top 10 Cities for Security Jobs
- YouTube Cybersecurity Videos
- US-CERT + Publications
- Virus Bulletin
-
Acknowledgements & Introduction to Information Links
- Attending the Congress of Future Science and Technology Leaders empowered me to be a technologist. Congress speakers coached delegates to articulate our vision and ask academic, business and government leaders for advice to help us achieve the next milestone. I did this by creating a detailed LinkedIn profile, researching cybersecurity companies and inviting their officers to connect with me on LinkedIn. I let cybersecurity leaders know that I planned to attend UTSA and major in cybersecurity. Many introduced resources or offered information and guidance when they accepted my invitation.
- Attending GenCyber 2016 at UT Dallas and completing Professor Henson's Cybersecurity and Advanced Cybersecurity programs introduced information that helped me research cybersecurity career information and identify the links on this career map.
- Additional support included Professor Henson mentoring me during GenCyber, Ms. Wristers supporting my high school independent study class which encompassed watching 257 Professor Messer’s CompTIA SY0-401 Security+ video training course, studying to take the CompTIA Security+ certification exam, identifying and researching the links on this map, and years of talking to support staff after studying their company's anti-virus and anti-malware programs.
- The cybersecurity career map project reflects my passion for technology. Since the 4th grade, I have been identifying, learning and using anti-virus programs that have built-in firewalls with HIPS capabilities to understand how these firewalls protect users from internet / network-born threats. I learned how second opinion anti-malware applications can be used when the primary anti-virus software fails to detect all the viruses on client devices. I study how each anti-virus / anti-malware program detects the latest threats by analyzing its signature database information and the algorithms that are used to detect viruses. I study each anti-virus programs’ heuristics / zero-day threat blocking capabilities to understand the behavior and characteristics of suspicious files.
- I learn by reading about cyber security issues and solutions. Many of my LinkedIn contacts share leading edge information that helps me learn new things about cybersecurity threats and solutions. I also learn by identifying new zero-day viruses and recommending that those files be added to anti-malware software programs signature databases. I analyze cloud-based definitions to understand how anti-virus programs can compile multiple signatures into a single signature database to detect a wider range of viruses. I hope the following information helps others develop their interest in cybersecurity. I encourage everyone to use these links as a starting point to create your own XMind Cybersecurity Career Map.
-
Map to Develop A Cybersecurity Career By Will Smith, Senior Lake Travis High School, Class of 2017
- I began learning about technology in grade school. I discovered that I am a technologist. My passion is making technology work for everyone. I want to share this infomration in a format that helps others create their own cybersecurity career path. I plan to attend UT San Antonio and major in cybersecurity. I want to work in a career that makes our technology and country's information technology infrastructure safe from cyberthreats. I created this cybersecurity career map as part of an independent study class during my senior year in high school. I also completed Professor Messer’s CompTIA SY0-401 Security+ 257 video training course and am currently studying to take the CompTIA Security+ certification exam. My interest in cybersecurity began in the 4th grade. Since then, I have learned, installed and used Avast, Avira, AVG, Bitdefender, BullGuard, Cisco PacketTracer, ComboFix, Comodo, DameWare, Dr.Web, Emsisoft, ESET, F-Secure, G-Data, Hitman Pro, Kaspersky, Malwarebytes Anti-Malware, Microsoft Security Essentials, McAfee, Microsoft Windows Defender, Panda, Sophos, Symantec, Trend Micro Anti-Virus and WebRoot. Since grade school. I have been researching and learning how antivirus programs that have built-in firewalls with HIPS capabilities protect users from Internet / network-born threats. I study how an antivirus / anti-malware program detects the latest threats. I learned to do this by analyzing their signature database information and the algorithms the programs use to detect viruses. I study antivirus programs’ heuristics / zero-day threat blocking capabilities to understand the behavior and characteristics of suspicious files. I identify new zero-day viruses and recommend that those files be added to the anti-malware software program’s signature database. I analyze cloud-based definitions to understand how one antivirus program can compile multiple signatures into a single signature database to detect a wider range of viruses. I learned how second-opinion, anti-malware applications can be used when the primary antivirus software fails to detect all the viruses. Since middle school, I have been making developer-level recommendations to improve operating systems, anti-virus & malware programs and cloud services including: Apple OS, Azure, Office365 and Windows OS. Last summer between my junior and senior years in high school, I successfully completed Fundamentals of Cyber Security-GenCyber and Advanced Cyber Security-GenCyber at the University of Texas Dallas. Funded by the National Security Agency and the National Science Foundation. the programs help address the shortfall of skilled cybersecurity professionals. Our GenCyber professor introduced qualified students to knowledge, skills, and technology that are required to maintain cybersecurity systems. During the Advanced Cyber Security GenCyber program, I was introduced to academic tracks to prepare myself for a cybersecurity career. The program also helped me understand how to properly configure Windows and Linux systems to minimize their exposure to cyber-attacks by remote adversaries. Numerous times, I removed malware and viruses from devices that were seriously infected including Apple and Windows OS, Office Programs and Mobile OS. I have completed hundreds of Windows and Apple OS devices and mobile device repairs. I use Adobe Creative Suite, Autodesk Inventor Professional 2017, Qsys - Altera’s System Integration Tool, Parallels Desktop for Mac, VisualStudio Enterprise 2015, VMware Workstation Pro 12 and XMind.