RESOURCES BY CC
Cybersecurity. Where do you start when searching for reliable training resources?
Where are the free (and some low cost) engaging learning resources?
Which InfoSec career path is built for you?
Where can you gain trustworthy info?
Resources by CC is inspired by all the things I wished were in one central place when making my career transition into the world of cybersecurity.
Additionally, networking and making connections is just as important as learning the tech.
Remember to take time to focus on this essential part of the equation. Your net worth IS your network.
Stay curious!
Kimberly McKnight
Founder, CybersecurityCentral.org
TABLE OF CONTENTS
CC FAVORITES
Livestream with Gerald Auger, Ph.D., analyzing the stories from the CISO Series Podcast, Cyber Security Headlines. Join in every weekday, M-F at 8am ET. Earn CPE's while you learn!
Simply Cyber YouTube is packed with video gems with everything from A to Z about cybersecurity. Catch the Thursday livestream with interviews pros & new podcasts.
A new blog with contributions from cybersecurity n00bs on what we are learning, some tech, some human side, all our own perspectives and insights.
AASLR: Antisyphon Weekly Training from the Black Hills Information Security Team. What is the topic for each week? Typically a surprise, so tune in to learn and connect!
Outpost Gray on YT provides weekly cybersecurity, technology, and innovation education. Guests include industry leaders discussing current threats, emerging technology & cyber law.
CAREER PATHWAYS
Cyber Career Pathways Tool to explore the Cyber Workforce.
This tool depicts the Cyber Workforce according to five distinct, complimentary, skill communities. It highlights core attributes for 52 core work roles using the NIST-NICE Framework.
CAREER WORKFORCE TRAINING
CyberSkills2Work - tuition-free! Pathways to Cybersecurity Careers - National Cybersecurity Workforce Development Program. Free cybersecurity training and professional development from NCAE-C institutions. Pilots began with only transitioning military/veterans/first responders, but many of these programs also accept U.S. citizens. Military/veterans/first responders typically have first preference.
Training includes career development and job placement. Some programs include industry certifications. Funded by NSA & CISA.
Per Scholas is a national non-profit providing tuition-free tech career training. Thanks to our donors and corporate partners, courses are always offered at no charge to our learners -no cost, no catch. If a course you are interested in is not available in your local area, such as the Cybersecurity program, submit your interest and/or reach out to the admissions team to express your interest. They are friendly and assist with your questions.
Some courses that may not be available currently for Nationwide status may become available throughout the year.
CERTIFICATION TRAINING VIDEOS
CYBERSECURITY CAREER VIDEOS
CYBERSECURITY CONFERENCES
Learn more about SCC from #TeamSC, an inclusive event!
Learn more about BSides Sides St. Pete, a smaller FL con!
Learn more about BSides Sides Orlando. another great FL con!
MENTAL HEALTH & WELLNESS
MILITARY & VETERAN CAREER SUPPORT
FEEE & PAY-WHAT-YOU-CAN TRAINING
Antisyphon Training understands not everyone can afford the high price of most quality infosec training. In order to help more get started in their InfoSec journey, a select group of our courses are priced on a pay scale ($0 - $35) to give students an opportunity to take hands-on, well-known names in the community, regardless of their finances. Powered by Black Hills Information Security - check them out.
TTI helps build fundamental tech skills, or take your tech skills to the next level. The Taggart Institute exists to provide low-cost, high-quality technology training to everyone in a welcoming, supportive community. TTI courses are free of charge, but for those who can afford to purchase courses, there are pay-what-you-wish options—no more than $15.
Hopper’s Roppers is a team dedicated to providing a FREE introduction to cybersecurity and turning students into professionals. Their mission is to create a self-paced curriculum that helps beginners overcome the initial hurdles and provides a path forward. Their goal is to make the site the best place on the internet for beginners to take their first steps into cybersecurity.
PERSONAL BRANDING
READING FOR INFOSEC
Author, Nicole Perlroth: Filled with spies, hackers, arms dealers, and a few unsung heroes, written like a thriller and a reference, an astonishing feat of journalism. Based on years of reporting and interviews, discussing the global cyber arms race.
Author, Kim Zetter: Stuxnet and the Launch of the World's First Digital Weapon. A top cybersecurity journalist tells the story behind the virus that sabotaged Iran’s nuclear efforts and shows how its existence has ushered in a new age of warfare.
Author, Cliff Stoll: Tracking a Spy Through the Maze of Computer Espionage. Before the Internet became widely known as a tool for global terrorists, one perceptive U.S. citizen exposed a hidden network of spies threatening national security.
Author: Mary Aiken, PhD: A groundbreaking exploration of how cyberspace is changing the way we think, feel, and behave. An Expert in Cyberpsychology explains how technology Is shaping our children, behavior, and values.
Author, Andy Greenberg: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers. The true story of the most devastating cyberattack in history and the hunt to identify and track Russian agents behind it.
Author, Michael Bazzell: The new OSINT professional must be self-sustaining and possess their own tools and resources. Become armed with the knowledge to articulate the sources of your findings.
Author, Dr. Joseph T. Wells: The new OSINT professional must be self-sustaining and possess their own tools and resources. You will become a more proficient SME who will be armed with the knowledge and readiness to articulate the sources of your findings.
Author, Phillip Wylie: Starting a career as an ethical hacker. Perfect for IT workers and entry-level information security professionals, this book also belongs on the bookshelves of anyone seeking to transition into penetration testing.
Author: Kevin Mitnick: My Adventures as the World's Most Wanted Hacker. A thrilling true story of intrigue, suspense, unbelievable escapes, and a portrait of a visionary forcing companies to rethink how they protect their most sensitive information.
Authored by Gerald Auger, Ph.D., Jax Scott, Jon Helmus & Kim Nguyen. This book is designed by leading industry experts to help you enter the world of cybersecurity with confidence, with tips for finding your cyber career, from industry leaders.
Author, Mishaal Khan: This book is an amalgamation of two decades of cybersecurity know-how, serving as a practical guide on how to achieve the position of a cybersecurity leader; A CISO. It offers real-life examples, actionable steps, and practical advice.
Author, Joseph Menn: Cult of the Dead Cow is the tale of the oldest, most respected, and most famous American hacking group of all time. Though until now it has remained mostly anonymous.