1. Cybersecurity Student Resources
    1. AICPA Cybersecurity Resource Center
    2. Bro Center of Expertise
    3. Center for Cyber Safety and Education
    4. CIS Critical Security Controls
    5. CompTIA SY0-401 Security+ Training Videos
    6. CSSIA Cybersecurity Education Resources
    7. Cybersecurity Associations
    8. Cybersecurity Canon
    9. CyberDef DoJo
    10. Cybersecurity Economics MOOC
    11. Cybersecurity Internship Program
    13. Cybersecurity skills aren’t taught in college
    14. Cybertalk Radio
    15. Cybersecurity Ventures
    16. CyberSeek supply and demand data for Cybersecurity Jobs
    17. CyberTexas Foundation
    18. CyberWire Daily Email News Brief
    19. Cybrary
    20. Desperately seeking cybersecurity skills
    21. InfraGard
    22. International Computer Science Institute (ICSI)
    23. National Cybersecurity Student Association
    24. National Initiative for Cybersecurity Education (NICE)
    25. NSA Student Programs
    26. San Antonio Chamber Cybersecurity Council
    27. San Antonio Cybersecurity Hub
    28. Security Advisor Alliance
    29. The Map of Cybersecurity Domains
    30. The Periodic Table of Cybersecurity Startups
    31. The Phi Beta Cyber Society
    32. Watch Cyberwar in Real-Time on This Live Map
  2. Cybersecurity Scholarships
    1. 50 Amazing Computer Science Scholarships
    2. AFCEA ROTC Scholarship
    3. AFCEA STEM Majors Scholarships
    4. Byron Lockhart Capitol Area Council Eagle Scout scholarships
    5. Center for Cyber Safety and Education Scholarships
    6. CyberCorps Scholarship for Service Program (SFS)
      1. Participating Institutions
    7. DoD Cybersecurity Scholarship
    8. DoD Cybersecurity Scholarship Application
    9. GW's Partnership in Securing Cyberspace through Education and Service (PISCES)
    10. IUP Institute for Cyber Security Scholarships
    11. Lance Stafford Larson Student Scholarship
    12. Microsoft Cybersecurity Scholarship
    13. NSA Student Programs
    14. NSF: Cyber Scholarship for Service Program Analysis
    15. Scholarships for Eagle Scouts awarded by the National Eagle Scout Association
    16. Scholarships for Eagle Scouts awarded by religious organizations
    17. Scholarships for Eagle Scouts awarded by civic organizations
    18. Scholarships for Eagle Scouts awarded by specific schools
    19. Secretary's Honors Program Cyber Student Volunteer Initiative
    20. UAH Center for Cybersecurity Research and Education
    21. USCC Student Scholarships
    22. US Air Force ROTC
    23. US Army ROTC
    24. US Naval ROTC
  3. College Cybersecurity Programs
    1. Bethany College
    2. CTU Bachelor of Science in Cybersecurity
    3. Cyber Security Associate of Applied Science
    4. Darwin Deason Institute for Cyber Security
    5. DePaul University Cybersecurity (BS)
    6. Drexel University
    7. George Mason BAS in Cyber Security
    8. MIT Applied Cybersecurity
    9. NYU Tandon School of Engineering MS in Cybersecurity
    10. Pennsylvania State University
    11. RIT Cybersecurity MicroMasters
    12. Stanford Cybersecurity
    13. Stanford H4D
    14. St. John’s University Cyber Security Systems BoS Degree
    15. Texas A&M Cybersecurity Programs
    16. UoH Cyber Security Institute
    17. UMUC Bachelor of Science in Cybersecurity
    18. University of Denver
    19. USAF Institute of Technology (AFIT) Center for Cyberspace Research (CCR)
    20. US Army Cyber School
    21. USC Viterbi School of Engineering MS in Cyber Security Engineering
    22. Champlain College
    23. UTSA BBA in Cybersecurity
    24. UTSA launches first fully online degree program in cybersecurity
    25. Virginia Cyber Range
  4. Cybersecurity Certifications
    1. Certification Path to become Information Security Architect
    2. Computing Technology Industry Association (CompTiA)
    3. CompTIA Career Roadmap
    4. CompTIA Certifications
    5. CompTIA SY0-401 Security+
    6. CompTIA Cybersecurity Analyst (CSA+)
    7. CompTIA Network+
    8. CompTIA – Advanced Security Practitioner
    9. CISSP® - Certified Information Systems Security Professional
    10. CISA (Certified Information Systems Auditor)
    11. CISM (Certified Information Security Manager)
    12. GSEC (GIAC Security Essentials Certification)
    13. CRISC (Certified in Risk and Information Systems Control)
    14. SSCP (Systems Security Certified Practitioner)
    15. CPTC – Certified Penetration Testing Consultant
    16. CPTE – Certified Penetration Testing Engineer
    17. CSTA – Certified Security Testing Associate
    18. GPEN – GIAC Certified Penetration Tester
    19. OSCP – Offensive Security Certified Professional
    20. CEH – Certified Ethical Hacker
    21. ECSA – EC-Council Certified Security Analyst
    22. CEPT – Certified Expert Penetration Tester
  5. Cybersecurity Employers
    1. Companies
      1. AT&T Cybersecurity Jobs
      2. Booz Allen Hamilton Cybersecurity Jobs
      3. Cyber Defense Labs
      4. Cybersecurity 500
      5. Cybersecurity Job Roles
      6. Cybersecurity Recruiters
      7. DataTribe
      8. Deloitte Cybersecurity Jobs
      9. Goldman Sachs TechRisk Jobs
      10. IBM Cybersecurity jobs
      11. Industrial Internet Consortium Members
      12. LinkedIn Cybersecurity Job Listings
      13. Lockheed Martin Cybersecurity Jobs
      14. Microsoft Cybersecurity Jobs
      15. National Cybersecurity Excellence Partners (NCEP)
      16. Pragmatics, Inc. Cybersecurity Jobs
      17. Raytheon Cybersecurity Jobs
      18. SAIC Cybersecurity Jobs
      19. Security Current Company Listings
      20. TECHEXPO Top Secret
    2. Government Agencies
      2. DISA
      3. DoD Cyber Mission Force
      4. DoD Cybersecurity Jobs
      5. FBI Cyber Crime Unit
      6. FinCen
      7. NSA/CSS
      8. NSA Intelligence Careers
      9. NITRD Member Agencies
      10. US Computer Emergency Readiness Team (US-CERT)
    3. Military
      2. US Army Cyber CoE
      3. USAF Cyber Support Squadron
      4. U.S. Fleet Cyber Command
      5. U.S.M.C MARFORCE Cyber
  6. Cybersecurity Research Sources
    1. 5 Reasons to Become a Cyber Security Professional
    2. 2016 Federal Cybersecurity Research and Development Strategic Plan
    3. AT&T Cybersecurity Insights
    4. Booz Allen Cyber
    5. CISCO Cybersecurity
    6. Cost of Cybercrime Predicted to Hit $6 Trillion Annually By 2021, Study Says
    7. Cybersecurity Act of 2015
    8. Cybersecurity Enhancement Act of 2014
    9. Cybersecurity Experts Call for Internet of Things Standards
    10. Cyber Defense
    11. Cybersecurity National Action Plan
    12. Cyber-Security & Risk Management, an evolving ecosystem
    13. Cyber Threat Intelligence Integration Center
    15. DoD Cyber Crime Center (DC3)
    16. DoD Cybersecurity
    18. Executive Order 13636, “Improving Critical Infrastructure Cybersecurity."
    19. EY Cybersecurity
    20. FBI Cyber Division
    22. FinCEN
    23. GE Information Security Technology Center
    24. Homeland Security Cyber Security Division
    25. IBM Study: Data Breach Costs Rising, Now $4 million per Incident
    26. IBM Watson Cognitive Security
    27. IBM X-Force Command Centers
    28. INTEL Security
    29. ISA Books and Publications
    31. Lockheed Martin Cybersecurity Solutions
    32. Machine-Learning Algorithm Can Show Whether State Secrets Are Properly Classified
    33. MalwareCheck.org
    34. MalwareTechBotnetTracker
    35. Microsoft Cybercrime Center
    36. National Cybersecurity Institute
    37. National Cybersecurity STEM Education Advisory Board
    38. National Initiative for Cybersecurity Education (NICE)
    39. NATO Cyber Defence Centre
    40. NIST Launches Beta Site for the Computer Security Resource Center (CSRC)
    41. NIST Cybersecurity Framework
    42. NIST Cyber Security Framework Reference Tool
    43. NIST Cybersecurity Framework Virtual Events
    44. NITRD Program
    45. NSA Cybersecurity
    46. NSF Cybersecurity
    47. PhishTank
    48. SANS Institute Internet Storm Center
    49. The Map of Cybersecurity Domains (v2.0)
    50. VMWARE Cybersecurity
    51. Understanding and Assessing your SCADA Cybersecurity Posture
    52. Whitehouse Cybersecurity Policies & Initiatives
    53. Yippy Cybersecurity Search
  7. Cybersecurity Reports
    1. 2016 Trends in Cybersecurity: A Quick Guide to the Most Important Insights in Security
    2. AI2: Training a big data machine to defend
    3. A Framework for Programming and Budgeting for Cybersecurity
    4. Blumberg Capital 2017 State of Cybersecurity
    5. Center for Applied Internet Data Analysis
    6. Cybersecurity: a market landscape, in 4 charts
    7. Cybersecurity in the cognitive era
    8. Cyber Security Publication Library
    9. Cybersecurity Social Contract
    10. Cybersecurity Ventures
    11. CyberSeek, An Interactive Resource for Cybersecurity Career Information
    12. CSPRI Research Projects
    13. Developing an Ontology of the Cyber Security Domain
    14. Cybersecurity’s Next Step: Artificial Intelligence
    15. DLA Piper's Data Protection Laws of the World Handbook
    16. Goggle Scholar cyber security artificial intelligence search
    17. Industrial Internet Security Framework Technical Report
    18. Intelligence-Driven Computer Network Defense
    19. Information Technology - Information Sharing and Analysis Center
    20. National Cybersecurity Center of Excellence (NCCoE)
    21. NSA Best Scientific Cybersecurity Paper Competition
    22. NSF Advisory Commi8ttee for Cyberinfrastructure
    23. NIST Systems Engineering Guidance
    24. Semantic Scholar Cybersecurity Search
    25. Stanford Cybersecurity Library
    26. Small Business Cybersecurity Workbook
    27. The Defender’s Dilemma: Charting a Course Toward Cybersecurity
    28. US-CERT Technical Publications
  8. Paths to Learn About Cybersecurity
    1. BSA Cyber Chip
    2. CISO Mind Map
    3. Cybersecurity Canon
    4. Cybersecurity Definition
    5. Cyberseek
    6. Cybersecurity - Homeland Security
    7. Cyber League
    8. CyberPatriot Program
    9. Collegiate Cyber Defense Competition (CCDC)
    10. Cybersecurity Pros Face Zero Unemployment
    11. DARPA Cyber Competition Framework for Automated Cybersecurity
    12. Future of Cybersecurity Innovation
    13. Get 'em while they're young: One fix for cyber labor shortage
    14. GenCyber Program
    15. Glossary of AI Terms for Cyber Security
    16. Glossary of Cyber Security Terms
    17. Hacking the Cybersecurity Demand Curve
    18. Homeland Security Cybersecurity
    19. How to land a cybersecurity job
    20. It’s not where you start — it’s how you finish: Addressing the cybersecurity skills gap with a new collar approach
    21. MIT students and others teaching IBM Watson about cybersecurity
    22. National Centers of Academic Excellence (CAE)
    23. NSA/DHS Centers of Academic Excellence
    24. NICCS Cybersecurity Workforce Framework
    25. NSA/DHS National Cybersecurity CAE Designated Institutions
    26. National CyberWatch Cybersecurity Curriculum Model
    27. National Center for Systems Security and Information Assurance (CSSIA)
    28. Path to a Career in Cyber by Gary Hayslip
    29. Plan X: DARPA's Revolutionary Cyber Security Platform
    30. TechHire Initiative
    31. Tips for Breaking Into the Cybersecurity Industry
    32. The Path to a Cybersecurity Governance Career
    33. The Growing Threats to Cybersecurity
    34. Top 10 Cities for Security Jobs
    35. YouTube Cybersecurity Videos
    36. US-CERT + Publications
    37. Virus Bulletin
  9. Acknowledgements & Introduction to Information Links
    1. Attending the Congress of Future Science and Technology Leaders empowered me to be a technologist. Congress speakers coached delegates to articulate our vision and ask academic, business and government leaders for advice to help us achieve the next milestone. I did this by creating a detailed LinkedIn profile, researching cybersecurity companies and inviting their officers to connect with me on LinkedIn. I let cybersecurity leaders know that I planned to attend UTSA and major in cybersecurity. Many introduced resources or offered information and guidance when they accepted my invitation.
    2. Attending GenCyber 2016 at UT Dallas and completing Professor Henson's Cybersecurity and Advanced Cybersecurity programs introduced information that helped me research cybersecurity career information and identify the links on this career map.
    3. Additional support included Professor Henson mentoring me during GenCyber, Ms. Wristers supporting my high school independent study class which encompassed watching 257 Professor Messer’s CompTIA SY0-401 Security+ video training course, studying to take the CompTIA Security+ certification exam, identifying and researching the links on this map, and years of talking to support staff after studying their company's anti-virus and anti-malware programs.
    4. The cybersecurity career map project reflects my passion for technology. Since the 4th grade, I have been identifying, learning and using anti-virus programs that have built-in firewalls with HIPS capabilities to understand how these firewalls protect users from internet / network-born threats. I learned how second opinion anti-malware applications can be used when the primary anti-virus software fails to detect all the viruses on client devices. I study how each anti-virus / anti-malware program detects the latest threats by analyzing its signature database information and the algorithms that are used to detect viruses. I study each anti-virus programs’ heuristics / zero-day threat blocking capabilities to understand the behavior and characteristics of suspicious files.
    5. I learn by reading about cyber security issues and solutions. Many of my LinkedIn contacts share leading edge information that helps me learn new things about cybersecurity threats and solutions. I also learn by identifying new zero-day viruses and recommending that those files be added to anti-malware software programs signature databases. I analyze cloud-based definitions to understand how anti-virus programs can compile multiple signatures into a single signature database to detect a wider range of viruses. I hope the following information helps others develop their interest in cybersecurity. I encourage everyone to use these links as a starting point to create your own XMind Cybersecurity Career Map.
  10. Map to Develop A Cybersecurity Career By Will Smith, Senior Lake Travis High School, Class of 2017
    1. I began learning about technology in grade school. I discovered that I am a technologist. My passion is making technology work for everyone. I want to share this infomration in a format that helps others create their own cybersecurity career path. I plan to attend UT San Antonio and major in cybersecurity. I want to work in a career that makes our technology and country's information technology infrastructure safe from cyberthreats. I created this cybersecurity career map as part of an independent study class during my senior year in high school. I also completed Professor Messer’s CompTIA SY0-401 Security+ 257 video training course and am currently studying to take the CompTIA Security+ certification exam. My interest in cybersecurity began in the 4th grade. Since then, I have learned, installed and used Avast, Avira, AVG, Bitdefender, BullGuard, Cisco PacketTracer, ComboFix, Comodo, DameWare, Dr.Web, Emsisoft, ESET, F-Secure, G-Data, Hitman Pro, Kaspersky, Malwarebytes Anti-Malware, Microsoft Security Essentials, McAfee, Microsoft Windows Defender, Panda, Sophos, Symantec, Trend Micro Anti-Virus and WebRoot. Since grade school. I have been researching and learning how antivirus programs that have built-in firewalls with HIPS capabilities protect users from Internet / network-born threats. I study how an antivirus / anti-malware program detects the latest threats. I learned to do this by analyzing their signature database information and the algorithms the programs use to detect viruses. I study antivirus programs’ heuristics / zero-day threat blocking capabilities to understand the behavior and characteristics of suspicious files. I identify new zero-day viruses and recommend that those files be added to the anti-malware software program’s signature database. I analyze cloud-based definitions to understand how one antivirus program can compile multiple signatures into a single signature database to detect a wider range of viruses. I learned how second-opinion, anti-malware applications can be used when the primary antivirus software fails to detect all the viruses. Since middle school, I have been making developer-level recommendations to improve operating systems, anti-virus & malware programs and cloud services including: Apple OS, Azure, Office365 and Windows OS. Last summer between my junior and senior years in high school, I successfully completed Fundamentals of Cyber Security-GenCyber and Advanced Cyber Security-GenCyber at the University of Texas Dallas. Funded by the National Security Agency and the National Science Foundation. the programs help address the shortfall of skilled cybersecurity professionals. Our GenCyber professor introduced qualified students to knowledge, skills, and technology that are required to maintain cybersecurity systems. During the Advanced Cyber Security GenCyber program, I was introduced to academic tracks to prepare myself for a cybersecurity career. The program also helped me understand how to properly configure Windows and Linux systems to minimize their exposure to cyber-attacks by remote adversaries. Numerous times, I removed malware and viruses from devices that were seriously infected including Apple and Windows OS, Office Programs and Mobile OS. I have completed hundreds of Windows and Apple OS devices and mobile device repairs. I use Adobe Creative Suite, Autodesk Inventor Professional 2017, Qsys - Altera’s System Integration Tool, Parallels Desktop for Mac, VisualStudio Enterprise 2015, VMware Workstation Pro 12 and XMind.