Watch Intro Video

Video

Course curriculum

  • 1

    Intro: Finding Your Career in Cybersecurity

  • 2

    Step 1: Exploring the Roles

  • 3

    Chapter 1: Why Cybersecurity

    • Introduction

      FREE PREVIEW
    • The Definition of Cybersecurity and Understanding the Talent Gap

    • Closing the cybersecurity skills gap – Microsoft expands efforts to 23 countries

    • Realizing the impact to organizations

    • Case Study 1: Marine Corps Musician to Cybersecurity Professional

    • Reflection on Case Study 1

    • Chapter 1 Review

  • 4

    Chapter 2: Understanding the Organization Security Functions

    • Introduction

      FREE PREVIEW
    • NIST NICE Framework- Quick Overview

    • Introduction to the NIST Cybersecurity Framework

    • NIST Cybersecurity Framework: Functional Areas

    • NIST Publication: Framework for Improving Critical Infrastructure Cybersecurity

    • Chapter 2 Review

  • 5

    Chapter 3: Overview of the NIST NICE Framework

    • Chapter 3 Introduction

      FREE PREVIEW
    • Understanding the NIST NICE Framework

    • National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework

    • NIST Workforce Categories

    • NIST NICE: Specialty Areas

    • NIST NICE: Work Roles

    • NIST NICE: Work Role Tasks

    • Case Study 2: Conversations with a Penetration Tester

    • Reflection on Case Study 2

    • Chapter 3 Review

    • Chapter 3 Quiz

  • 6

    Chapter 4- Understanding Knowledge, Skills, and Tasks

    • Introduction

      FREE PREVIEW
    • NIST NICE Framework: Tasks

    • NIST NICE Framework: Skills

    • NIST NICE Framework: Knowledge

    • NIST NICE KSA Spreadsheet

    • Job Research Tool: National Initiative for Cybersecurity Careers and Studies

    • Microchallenges: Try Cyber

    • Review

    • Chapter 4 Quiz

    • Step 1 Explore: Workbook Assignment

  • 7

    Soft Skill Development: Personality

    • Introduction to Softskills

    • Your Personality and It's Importance On The Outside

    • Personality Test- NERIS Type Explorer

    • Getting Readyfor Step 2

  • 8

    Step 2: Targeting the Right Environment

    • Introduction to Step 2

  • 9

    Chapter 5: Finding the Right Environment

    • Finding The Right Environment

    • Chapter 5 Introduction

      FREE PREVIEW
    • Consideration #1: Location and Distance/ On-Site or Remote

    • Consideration #2: Organizational Size

    • Consideration #3: Organizational Culture

    • Consideration #4: Corporate Responsibility

    • Consideration #5: Diversity

    • Consideration #6: Work/Life Balance

    • Case Study #3: The Social Responsibility of Business

    • Case Study #3 Reflection

    • Chapter 5 Review

  • 10

    Chapter 6: Finding the Right Industry

    • Introduction

      FREE PREVIEW
    • Consideration #1: Academia

    • Consideration #2: Defense

    • Consideration #3: Energy

    • Consideration #4: Entertainment and Hospitality

    • Video: Cybersecurity in the Music Industry

    • Consideration #5: Financial

    • Video: Financial Sector Cybersecurity

    • Consideration #6: Freelance

    • Cyber Security Freelancing | How To Stay Organised | Cyber Threat Attributes

    • Consideration #7: Healthcare

    • Consideration #8: Manufacturing

    • Consideration #9: Retail

    • Consideration #10: Managed Security Service Providers

    • Consideration #11: Technology

    • Chapter 6 Review.

  • 11

    Chapter 7: Searching For The Right Company

    • Chapter 7 Introduction

      FREE PREVIEW
    • Phase 1: Finding the industry in the area of interest

    • Phase 2: Researching the companies

    • Phase 3: Utilizing The Job Boards and Company Websites

    • Job Boards: Lesson 1 - Understand “who” is posting the listing

    • Job Boards: Lesson 2 - Know how old the posting is

    • Lesson 3: Don’t Auto Apply Your Resume

    • Lesson 4: Organizations May Not Use Job Boards At All

    • Putting Job Board Searching To Practice- Exercise #1

    • Putting the Job Board Search To Practice: Exercise #2

    • Step 2 Target: Workbook Assignment

    • Chapter 7 Review

  • 12

    Soft Skill Development: Empathy

    • Empathy

    • Reflection on Empathy

  • 13

    Introduction To Step 3: Training

  • 14

    Chapter 8: Training Yourself

    • Getting Your Technical Skills: Introduction

    • Getting Your Technical Skills: IBM

    • Getting Your Technical Skills: Utilizing Youtube

    • Getting Your Technical Skills: Cybrary

    • Getting Your Technical Skills: Udemy

    • Getting Your Technical Skills: Coursera

    • Getting Your Technical Skills: Hack The Box

    • Getting Your Technical Skills: Certifications

    • Getting Your Technical Skills: Cybersecurity and Infrastructure Security Agency

    • SANS Veterans Cyber Academy

    • Building Your Home Lab

    • Chapter 8 Review

    • Veteran's Resources For Funding Your Training

  • 15

    Chapter 9: Redefining Your Online Presence

    • Chapter 9: Introduction

      FREE PREVIEW
    • Managing Your Online Persona: Lesson #1- Perception is Reality

    • Managing Your Online Persona: Lesson #2- Privacy Is Your Friend

    • Managing Your Online Persona: Lesson #3- Close Unused Accounts

    • Managing Your Online Persona: Lesson #4- When in Doubt, Remove It

    • Chapter 9: Redefining Your Online Presence Video

    • Reviewing Your Online Persona: Exercise 1- Online Presence Footprint

    • Reviewing Your Online Persona: Exercise 2- Inventory and Clean Up

    • Reviewing Your Online Persona: Exercise 3-

    • Chapter 9 Review

  • 16

    Chapter 10: Improving Your Online Professional Brand

  • 17

    Soft Skill Development: Emotional Intelligence

    • How to Get Started With Emotional Intelligence

    • Emotional Intelligence and How it Impacts Your Team

    • Reflection: Emotional Intelligence

  • 18

    Step 4: Networking

    • Introduction

  • 19

    Chapter 11: Social Media

    • Chapter 11: Introduction

      FREE PREVIEW
    • Some Important Functionality Using LinkedIn

    • LinkedIn Search Functionality: Exercise 1

    • LinkedIn Basic Search Exercise 1 Walkthrough

    • LinkedIn Search Functionality: Exercise 2

    • LinkedIn Basic Search Exercise 2 Walkthrough

    • Advanced LinkedIn Searching Exercise 1

    • LinkedIn Advanced Search Exercise 1 Walkthrough

    • Advanced LinkedIn Searching Exercises

    • LinkedIn Connecting with People Exercise

    • Other Social Media Sites To Use For Networking

    • Chapter 11: Review

  • 20

    Chapter 12: Events and Conferences

    • Introduction

      FREE PREVIEW
    • Local Events and Conferences

    • National Conferences and Events

    • Getting To Know The BSIDES Near You

    • Things To Note

    • Making The Connections- The Business Card

    • Making The Connections- LinkedIn Lessons- QR Code

    • Review

    • Step 4 Networking: Workbook Assignment

  • 21

    Step 5: Developing Your Battleplan

    • Step 5: Introduction

  • 22

    Chapter 13: The Four Phases To Success

    • Introduction

      FREE PREVIEW
    • Situation, Mission, Execution, and Admin/Logistics

    • Example 1: Buying A Car

    • Example 2: Transitioning To A Career In Cybersecurity

    • Step 5: Workbook Assignment

  • 23

    Sticking with it

    • Battle Plan Review with Wilson

    • Course Conclusion

    • Your Feedback!

    • References

Reviews

Unbelievably Insightful

Kyle Schaefer

This course has opened my eyes to what cybersecurity has to offer. The information is vital for anyone who is merely interested in computers, in general, to someone that has a keen interest in using their knowledge of computers for a greater good....

Read More

This course has opened my eyes to what cybersecurity has to offer. The information is vital for anyone who is merely interested in computers, in general, to someone that has a keen interest in using their knowledge of computers for a greater good. This course is a MUST for veterans and non-veterans. alike.

Read Less

Learned a lot from this course.

Kimberly Benkowski

This was a great course. I learned a lot about the field as well as an effective way to navigate my interests. This course helped me understand my interests and which specialty to follow in.

This was a great course. I learned a lot about the field as well as an effective way to navigate my interests. This course helped me understand my interests and which specialty to follow in.

Read Less

STEP 1

Keith Algeo

Text of the first step was helpful. The video of Simon Sinek, was probably one of the best TED talks I have seen. It made me truly think about why I want to do this other than the money.

Text of the first step was helpful. The video of Simon Sinek, was probably one of the best TED talks I have seen. It made me truly think about why I want to do this other than the money.

Read Less

Excellent starting point for any veteran

Michael Blanchard

As an active duty Marine getting ready to transition to the civilian world, it can be overwhelming to grasp all of the civilian career paths available, even within the cyber security field. This course starts off with the essential basics of what ...

Read More

As an active duty Marine getting ready to transition to the civilian world, it can be overwhelming to grasp all of the civilian career paths available, even within the cyber security field. This course starts off with the essential basics of what you need from a job (varies by person) and then using that information about your desires and personality to shape the type of cyber security career you should study and pursue. I found this course to be extremely helpful and it opened my eyes to some paths that I had never considered before, while setting me on a path to pursue them.

Read Less

Instructor

Wilson Bautista Jr.

Senior Instructor

      Wilson Bautista is a retired military officer who is currently the founder of the consulting firm Jün Cyber. His expertise is in the domains of InfoSec leadership, policy, architecture, compliance, and risk. He holds multiple InfoSec and IT certifications as well as a Masters Degree in Information Systems from Boston University. He is an INTP on the Myers-Brigg Type Indicator test with a Driver-Driver personality. As a practitioner of Agile and SecDevOps, he develops innovative, integrated, enterprise-scale cyber security solutions that provide high value to businesses.