The Toolkit activities help you navigate and investigate careers. Work through them in any order.
Right arrow icon
Go back to Careers

Cybersecurity

  • Do you like detective work and crime shows?
  • Do you like to take things apart to see how they work?
  • Do you want a job where you can protect people from harm?
  • Do you want to work in a growing tech field?

Download Facilitator Guide

CLICK HERE

Cybersecurity could be your future career.

Cybersecurity specialists make sure that computer systems and networks are designed and operating in a way that they are safe from digital attacks. They are the people responsible for protecting our digital spaces. They defend against cyber criminals who attempt to destroy data, extort money from users, or disrupt normal business operations.   Cybersecurity professionals protect governments and companies from having secrets stolen, being defrauded, held up for ransom and otherwise victimized.

Working in cybersecurity requires being able to get inside a criminal’s mind to try to figure out how they think and operate.  Cyber attacks are a serious and constant problem.

In this Toolkit, you will explore what it's like to work in cybersecurity, what kind of jobs are available, and how you can prepare for careers in cybersecurity.  There are activities for you to figure out whether you enjoy this kind of work. If you persist through the activities it is an indicator that this could be a field where you’ll be successful as a career.

Cybersecurity could be your future career path.

Want to get started right now?

Try to get a friend or classmate to give you their phone’s passcode. What is the most effective way to get this passcode?

  • Ask them directly to borrow their phone with a fake reason you need it
  • Offer to give them your passcode in exchange for theirs
  • Send them a text pretending to be someone who needs the code (get creative - pretend you’re a phone company representative)
  • Borrow their phone and go through the recently deleted notes app (many people keep their passwords stored in notes.)
  • What is another idea you come up with?

All of these are common methods of cyber attack.

  • Honey Trap - a threat actor fakes an online relationship to gather sensitive information.
  • Quid Pro Quo - a threat actor pretends to provide something in exchange for the target's information or assistance.
  • Spear Phishing - a threat actor sends a fraudulent email disguised as a legitimate email, often pretending to be from a trusted source. The message is meant to trick the recipient into clicking on a link that installs malware.
  • Imposter Domains and Websites - criminals register look-a-like “domains” such as www.homedep0t.com where the letter “o” has been replaced with a zero.  This allows criminals to pretend to be an actual company, entice users to interact with a fake website and combine this with phishing emails.  Sometimes fake websites contain fraudulent phone numbers that will trick users into calling a number where the operator on the other end is posing as an employee of a real company.

You can learn more about hacking by watch these short videos - here and here

Learn cybersecurity on your own

Here’s a good way to learn some cyber security technical skills.Option 1 - Play around for a few minutes, a few hours or as long as you want. Visit TryHackMe

Steps
  • Sign up. It’s free.  There is no charge and it is safe to use the site.
  • Choose your level. There are beginner friendly videos and tutorials.
    - Try the tasks in the ‘Introduction to Cybersecurity’ module
    - You can earn a badge of completion for each of the modules you work through
    - Spend as much or little time as you want,
  • You’ll be hacking and defending in no time at all.
Try hack me homepage screenshot.

Do you enjoy doing these kinds of activities?  Are you good at them? Would you enjoy these kinds of challenges everyday?  Cybersecurity could be your future career path.

Meet a few Professionals who work in the Field

CYBERSECURITY ANALYST INTHE U.S. ARMY
Jenny Rogers
US ARMY
INFORMATION SECURITY/ FORENSICS ANALYST
Jenny Rogers
US ARMY

Understand the Biz

Consider Where You Can Work
There are many different jobs within cybersecurity.

Leadership dashboard

This is a table of organization of a cybersecurity team in a large company.

  • The yellow boxes refer to teams.  Each box can represent many people.
  • Each of the green boxes represents a director or Vice President (VP).
  • The blue boxes are the executives who lead the team.

This team has a Chief Technology Officer (CTO) and a Chief Information Security Officer (CISO) who both report to the Chief Executive Officer (CEO), who is the head of the company.

The CISO is responsible for all cybersecurity issues in the company.  They have divided the work into 3 teams:

The Job Outlook

Cybersecurity is a “Bright Outlook” career. It is in high demand. Infact, there is a national shortage of cybersecurity professionals. Clicking this heatmap to find your state and see how many open jobs there are right now.

How much can you earn? Salaries for junior roles as penetration testers can begin around $45k and salaries increase with additional training and experience.

A screenshot of the job outlook dashboard

Career Paths

Cybersecurity is a field where you often create your own pathway.  Read how Antonio, Steven, Tennisha and Ivan got started in cybersecurity careers.

Here is what a pathway in cybersecurity could look like:

  • Get your foot in the door.  Get started by learning:
    - IT/Support Desk/Networking, or
    - Software Engineering/Coding

    IT technician jobs provide experience dealing with software, hardware, and networking which is the foundation of cybersecurity roles.  You can also pivot into cybersecurity if you know coding languages, which is necessary to keep systems secure.
  • Get your first job in cybersecurity:  A typical starting role is a Cybersecurity Analyst. Analysts monitor computer systems, look for patterns and anomalies, and respond to incidents. They work in a Cybersecurity Operations Center (SOC).
Read More

Career Paths

Cybersecurity is a field where you often create your own pathway.  Read how Antonio, Steven, Tennisha and Ivan got started in cybersecurity careers.

Here is what a pathway in cybersecurity could look like:

  • Get your foot in the door.  Get started by learning:
    - IT/Support Desk/Networking, or
    - Software Engineering/Coding

    IT technician jobs provide experience dealing with software, hardware, and networking which is the foundation of cybersecurity roles.  You can also pivot into cybersecurity if you know coding languages, which is necessary to keep systems secure.
  • Get your first job in cybersecurity:  A typical starting role is a Cybersecurity Analyst. Analysts monitor computer systems, look for patterns and anomalies, and respond to incidents. They work in a Cybersecurity Operations Center (SOC).
  • Take on more responsibility: As people learn more about vulnerabilities in the network, they take on roles such as Penetration Testers, Ethical Hackers, Threat Hunters. People in these positions review, audit and assess systems for gaps, and then recommend solutions. In these positions people are familiar with programming languages.
  • Build the systems for defense: Engineers administer systems, manage teams and build systems to withstand cyber attacks.
  • Become the CISO: Once you get promoted to the executive team, you work with other parts of the organization keeping the systems and data secure. The company’s livelihood depends on you!

One path to a career in cybersecurity is to take on more and more responsibility.  Cybersecurity can also be a springboard to jobs in other fields like Data Science, Law Enforcement, Project Management, etc.  To learn more, click around on the website of the National Initiative For Cybersecurity Careers And Studies.

Movie Break

In Life Hackers three young aspiring cybersecurity professionals delve into the possibilities of cybersecurity careers by talking to leaders in the field. (54 minutes)]

One path to a career in cybersecurity is to take on more and more responsibility.  Cybersecurity can also be a springboard to jobs in other fields like Data Science, Law Enforcement, Project Management, etc.  To learn more, click around on the website of the National Initiative For Cybersecurity Careers And Studies.

Movie Break

In Life Hackers three young aspiring cybersecurity professionals delve into the possibilities of cybersecurity careers by talking to leaders in the field. (54 minutes)]

Skills to Pay the Bills

Take stock of the skills you already have:

Hands typing on a keyboard illustration
You like to tinker.

You drive your family crazy because you’re always taking things apart to see how they work.  But they also call you when something needs to be fixed.

Jigsaw puzzle illustration
You are a problem solver.

You like to figure things out and you are not afraid of hard challenges.  You’re curious. You always want to know more.

Three hands thumbs up illustration
You are a good communicator.

You work well in teams. You get along with others. You understand that coordination is important.  In cybersecurity things move quickly -  you have to respond to people to calm them down.

Coding development icon
You don’t need a technical background to get into cybersecurity.

Many people who enter cybersecurity have a wide range of backgrounds and interests – all of which can come in handy in cybersecurity.  Fields of interest include criminal justice and law, psychology and human behavior, archeology and forensic analysis, math, languages - just to name a few.  Knowledge of multiple languages, especially Russian and Chinese, is an asset.  You learn the technical aspects quickly when you build on your non-technical background.  

Skills you will Learn

Postsecondary training is essential to enter a cybersecurity field.

Accountant illustration
Many people pursue the college route

to earn an Associate or Bachelors degree in Computer Science or Cybersecurity.

Hands working on a laptop illustration
Take online courses.

Learn on your own and prep for certification exams, like the IBM Professional Certificate

Chip under a magnifying glass illustration
Enroll in a cybersecurity bootcamp.

Bootcamps provide short intensive training for the certification tests.  The advantages are that you learn with a cohort and get assistance finding a job.  Look into tuition-free bootcamps with cybersecurity programs, like nPower, Per Scholas, or Evolve Academy. For more information, check out AccessCyber’s Guide to Bootcamps.

Review the information on bootcamps in the Toolkit here.

Top rated website illustration
Certifications are a golden ticket.

Cybersecurity is one of those fields where you need to demonstrate up-to-date skills and one way to show your skills is through industry recognized certifications.  With a shortage of skilled workers in cybersecurity, companies are increasingly hiring people with talent and certifications.

Research the top certifications in cybersecurity, such as Certified Information Systems Security Professional (CISSP)Certified Network Associate or Network Professional (CCNA or CCNP)

Review the information on certifications in the Toolkit here.

Get Started Now for Free

Take one of the free online courses at Try Hack Me.  As you work your way through the free courses, you’ll earn badges that show off what you know when it comes time to apply to postsecondary programs

VISIT TRYHACKME

Review a Job Description

Job Descriptions are the way a company recruits and hires talent. You can learn a lot from a Job Description about the skills and qualifications you need to prepare for the job.  Even if you are not ready to apply for a job now, learning to read the Job Description can help you prepare for what you need to learn after high school.

This company is hiring a Junior Security Operations Center (SOC) Analyst. This is an entry level job. Read the job description and take note of all the skills you need to apply for the job. As you read, look for the technical skills that you will need to learn, and the human behavior skills that you are already good at.

A pdf of a job description.
Two sheets of paper.
GET PREPARED

Make Your Plan

Be ready to apply to this job in a few years by writing a paragraph of less than 250 words explaining why you want the job and why you will be a good fit for the company.

In your paragraph, include:
  • Why you want to pursue a career in Cybersecurity and specifically why a position on the SOC interests you
  • What skills you have that will be an asset for this kind of job
  • What skills you need to learn after high school, and what certifications you intend to pursue
  • What is the career path you see for yourself in the future?

Keep this paragraph as part of your career plan.

Find Your Tech Career
What do you Like?
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Cybersecurity
Games, Puzzles, Fixing Things
Numbers, Solving Gnarly Problems
Cybersecurity specialists are responsible for protecting our digital spaces. They defend against cyber criminals who attempt to destroy data, etc.
Visit Now
A greater than sign
Project Management
Working with People
Project Managers are responsible for making sure the project runs on time, on budget & to the customer’s satisfaction.
Visit Now
A greater than sign
UX Design
Art, Design, Social Media
Learning Languages, Apps
User Experience (UX) Designers are people who design many of the products we use - physical objects, websites, apps, games, etc.
Visit Now
A greater than sign
Customer Success Management
Working with People
Customer Success Managers make sure customers are satisfied with a product or service
Visit Now
A greater than sign
Data Analyst
Numbers, Solving Gnarly Problems
Data analysts use data to answer business questions and solve problems. Data can be used to tell a story and change the way we do things.
Visit Now
A greater than sign
ETL Developer
Games, Puzzles, Fixing Things
Numbers, Solving Gnarly Problems
ETL Developers extract data from one source to another
Visit Now
A greater than sign
IT Support
Working with People
Games, Puzzles, Fixing Things
Learning Languages, Apps
IT Support manages problems relating to hardware and software
Visit Now
A greater than sign
Digital Marketing
Working with People
Art, Design, Social Media
Learning Languages, Apps
Digital Marketers attract attention to a product or service
Visit Now
A greater than sign
Business Analyst
Working with People
Art, Design, Social Media
Business Analyst perform an important function of "translating" between business and technology teams.
Visit Now
A greater than sign
Software Developer
Art, Design, Social Media
Learning Languages, Apps
Games, Puzzles, Fixing Things
The people who build websites and applications are called Software Developers and are engaged in writing or creating computer code.
Visit Now
A greater than sign
Product Manager
Working with People
Numbers, Solving Gnarly Problems
Art, Design, Social Media
Visit Now
A greater than sign
Machine Learning Engineer
Games, Puzzles, Fixing Things
Numbers, Solving Gnarly Problems
Visit Now
A greater than sign