{"id":529,"date":"2021-09-29T16:00:35","date_gmt":"2021-09-29T16:00:35","guid":{"rendered":"http:\/\/he-cyberdegrees-org-sonic.lndo.site\/?p=529"},"modified":"2023-10-12T15:28:54","modified_gmt":"2023-10-12T15:28:54","slug":"resources","status":"publish","type":"post","link":"https:\/\/www.cyberdegrees.org\/resources\/","title":{"rendered":"Top Cybersecurity Resources on CyberDegrees.org"},"content":{"rendered":"<p>Cybersecurity is a red-hot career field &mdash; fast-paced, rapidly growing, and high paying. And no wonder: <a href=\"https:\/\/www.accenture.com\/_acnmedia\/PDF-165\/Accenture-State-Of-Cybersecurity-2021.pdf\" target=\"_blank\" rel=\"noopener\">Accenture&rsquo;s State of Cybersecurity Report 2021<\/a> states that the number of cyberattacks increased 31% between 2020 and 2021.<\/p>\r\n<p>Now more than ever, the world needs smart, driven cyberdefenders to help battle the onslaught. The potential for remote work doesn't hurt the appeal, either.<\/p>\r\n<p>Research from the <a href=\"https:\/\/www.eeoc.gov\/special-report\/diversity-high-tech\" target=\"_blank\" rel=\"noopener\">U.S. Equal Employment Opportunity Commission<\/a> shows that the tech industry, compared to private industry overall, is very white (63.5 - 68.5%) and very male (52-64%).<\/p>\r\n<p>Cybersecurity career opportunities and education pathways might be more readily available to those who identify with that descriptor, which is where our list of cybersecurity resources come in.<\/p>\r\n<p>The following list includes everything from certification opportunities to diversity, equity, and inclusion resources.<\/p>\r\n\r\n<section class=\"-mx-4 md:-mx-1\/2vw py-12 md:py-16 mt-12 md:my-16 relative md:left-1\/2 md:right-1\/2 md:w-screen bg-accent-light\">\n    <div class=\"container content\">\n        \r\n\r\n\n  \n  \n  <a class=\"subnav-waypoint\" name=\"dei\" id=\"dei\"><\/a>\n\n\r\n<h2>Diversity, Equity, and Inclusion Expansion<\/h2>\r\n<p>A <a href=\"https:\/\/www.cyberdegrees.org\/resources\/diversity-in-cybersecurity\/\">diverse cybersecurity team<\/a> avoids more errors, makes more money, and loses fewer members. The cybersecurity sector is now branching out to include more <a href=\"https:\/\/www.isc2.org\/-\/media\/Files\/Research\/Innovation-Through-Inclusion-Report.ashx\" target=\"_blank\" rel=\"noopener\">professionals from historically underrepresented groups<\/a>.<\/p>\r\n<p>Find out more about how to overcome obstacles and be part of expanding diversity and inclusion in the field.<\/p>\r\n\r\n  \n\n  <section class=\"cards pt-2 pb-12 lg:pt-16 lg:pb-20 relative text-center text-gray-700 \" data-cy=\"cards\">\n    <div class=\"bg-full-width absolute top-0 right-1\/2 left-1\/2 block h-full w-screen -mr-1\/2vw -ml-1\/2vw bg-quaternary-700 \"><\/div>\n    \n    <div class=\"grid grid-cols-1 gap-4 md:grid-cols-2 lg:grid-cols-4\">\n        \r\n<div class=\"cards-item bg-white flex flex-col justify-start mt-0 overflow-hidden rounded shadow\" data-cy=\"cards-item\">\n  <img decoding=\"async\"\n          src=\"https:\/\/www.cyberdegrees.org\/wp-content\/uploads\/2021\/12\/Women_In_Cyber-425x230-c-default.jpg\"\n        alt=\"Guide for Women in Cybersecurity\"\n  \/>\n  <div class=\"cards-item__content h-full flex flex-col p-6\">\n    <h4 class=\"cards-item__title\">Guide for Women in Cybersecurity<\/h4>\n    <div class=\"flex flex-col\">\n      <p class=\"cards-item__text text-xs leading-5\"><\/p>\n          <\/div>\n    <div class=\"flex mt-auto flex-col justify-between\">\n      <a class=\"sonic-btn large w-full md:w-max mx-auto bg-secondary-700 uppercase\" href=\"https:\/\/www.cyberdegrees.org\/resources\/women-in-cybersecurity\/\">\n        Learn More\n      <\/a>\n    <\/div>\n  <\/div>\n<\/div>\n\r\n<div class=\"cards-item bg-white flex flex-col justify-start mt-0 overflow-hidden rounded shadow\" data-cy=\"cards-item\">\n  <img decoding=\"async\"\n          src=\"https:\/\/res.cloudinary.com\/highereducation\/images\/f_auto,q_auto\/v1664377167\/CyberDegrees.org\/Cyber_Listings_HBCU_441690b71\/Cyber_Listings_HBCU_441690b71.jpg?_i=AA\"\n        alt=\"HBCUs With the Best Cybersecurity Programs\"\n  \/>\n  <div class=\"cards-item__content h-full flex flex-col p-6\">\n    <h4 class=\"cards-item__title\">HBCUs With the Best Cybersecurity Programs<\/h4>\n    <div class=\"flex flex-col\">\n      <p class=\"cards-item__text text-xs leading-5\"><\/p>\n          <\/div>\n    <div class=\"flex mt-auto flex-col justify-between\">\n      <a class=\"sonic-btn large w-full md:w-max mx-auto bg-secondary-700 uppercase\" href=\"https:\/\/www.cyberdegrees.org\/listings\/best-hbcu-programs\/\">\n        Learn More\n      <\/a>\n    <\/div>\n  <\/div>\n<\/div>\n\r\n<div class=\"cards-item bg-white flex flex-col justify-start mt-0 overflow-hidden rounded shadow\" data-cy=\"cards-item\">\n  <img decoding=\"async\"\n          src=\"https:\/\/res.cloudinary.com\/highereducation\/images\/f_auto,q_auto\/v1664376746\/CyberDegrees.org\/Most_Diverse_Programs_22_3805f36b1\/Most_Diverse_Programs_22_3805f36b1.jpg?_i=AA\"\n        alt=\"Most Diverse Cybersecurity Programs\"\n  \/>\n  <div class=\"cards-item__content h-full flex flex-col p-6\">\n    <h4 class=\"cards-item__title\">Most Diverse Cybersecurity Programs<\/h4>\n    <div class=\"flex flex-col\">\n      <p class=\"cards-item__text text-xs leading-5\"><\/p>\n          <\/div>\n    <div class=\"flex mt-auto flex-col justify-between\">\n      <a class=\"sonic-btn large w-full md:w-max mx-auto bg-secondary-700 uppercase\" href=\"https:\/\/www.cyberdegrees.org\/listings\/most-diverse-cybersecurity-schools\/\">\n        Learn More\n      <\/a>\n    <\/div>\n  <\/div>\n<\/div>\n\r\n<div class=\"cards-item bg-white flex flex-col justify-start mt-0 overflow-hidden rounded shadow\" data-cy=\"cards-item\">\n  <img decoding=\"async\"\n          src=\"https:\/\/res.cloudinary.com\/highereducation\/images\/f_auto,q_auto\/v1664383501\/CyberDegrees.org\/GettyImages-102754951_4453a4e14\/GettyImages-102754951_4453a4e14.jpg?_i=AA\"\n        alt=\"Scholarships for LGBTQIA+ Students\"\n  \/>\n  <div class=\"cards-item__content h-full flex flex-col p-6\">\n    <h4 class=\"cards-item__title\">Scholarships for LGBTQIA+ Students<\/h4>\n    <div class=\"flex flex-col\">\n      <p class=\"cards-item__text text-xs leading-5\"><\/p>\n          <\/div>\n    <div class=\"flex mt-auto flex-col justify-between\">\n      <a class=\"sonic-btn large w-full md:w-max mx-auto bg-secondary-700 uppercase\" href=\"https:\/\/www.cyberdegrees.org\/resources\/lgbtq-scholarships\/\">\n        Learn More\n      <\/a>\n    <\/div>\n  <\/div>\n<\/div>\n\r\n\n    <\/div>\n\n    \n  <\/section>\n\n\n\n\r\n\r\n\n    <\/div>\n<\/section>\n\r\n\r\n\n  \n  \n  <a class=\"subnav-waypoint\" name=\"careers\" id=\"careers\"><\/a>\n\n\r\n<h2>Careers<\/h2>\r\n<p>In-demand, lucrative, and personally rewarding, <a href=\"https:\/\/www.cyberdegrees.org\/jobs\/\">cybersecurity careers<\/a> make a top choice for tech-savvy professionals. They may especially appeal to people with a natural, if <a href=\"https:\/\/news.usc.edu\/trojan-family\/girls-learn-math-bias-gender-ability-stem\/\" target=\"_blank\" rel=\"nofollow noopener\">perhaps unnurtured<\/a>, interest in mathematics and coding.<\/p>\r\n<p>As of 2022, the <a href=\"https:\/\/www.bls.gov\/ooh\/computer-and-information-technology\/information-security-analysts.htm#tab-1\" target=\"_blank\" rel=\"noopener\">Bureau of Labor Statistics<\/a> (BLS) projects that information <a href=\"https:\/\/www.cyberdegrees.org\/jobs\/security-analyst\/\">security analysts jobs<\/a> will grow by 35% between 2021 and 2031. These jobs pay a median salary of $102,600. Learn more about other leading cybersecurity careers at the links below.<\/p>\r\n<ul class=\"ssr-columns-custom-style grid md:grid-cols-2 gap-5\">\r\n<li><sonic-icon icon=\"chevron-right\" type=\"solid\" size=\"xsmall\" color=\"#1222B6\"><\/sonic-icon><strong><a href=\"https:\/\/www.cyberdegrees.org\/jobs\/cryptographer\/\" target=\"_blank\" rel=\"noopener\">Cryptographer Career Overview<\/a><\/strong><\/li>\r\n<li><sonic-icon icon=\"chevron-right\" type=\"solid\" size=\"xsmall\" color=\"#1222B6\"><\/sonic-icon><strong><a href=\"https:\/\/www.cyberdegrees.org\/jobs\/security-specialist\/\" target=\"_blank\" rel=\"noopener\">Cybersecurity Specialist Career Overview<\/a><\/strong><\/li>\r\n<li><sonic-icon icon=\"chevron-right\" type=\"solid\" size=\"xsmall\" color=\"#1222B6\"><\/sonic-icon><strong><a href=\"https:\/\/www.cyberdegrees.org\/jobs\/security-architect\/\" target=\"_blank\" rel=\"noopener\">Security Architect Career Overview<\/a><\/strong><\/li>\r\n<li><sonic-icon icon=\"chevron-right\" type=\"solid\" size=\"xsmall\" color=\"#1222B6\"><\/sonic-icon><strong><a href=\"https:\/\/www.cyberdegrees.org\/jobs\/security-engineer\/\" target=\"_blank\" rel=\"noopener\">Security Engineer Career Overview<\/a><\/strong><\/li>\r\n<li><sonic-icon icon=\"chevron-right\" type=\"solid\" size=\"xsmall\" color=\"#1222B6\"><\/sonic-icon><strong><a href=\"https:\/\/www.cyberdegrees.org\/jobs\/chief-information-security-officer-ciso\/\" target=\"_blank\" rel=\"noopener\">What Is a Chief Information Security Officer?<\/a><\/strong><\/li>\r\n<li><sonic-icon icon=\"chevron-right\" type=\"solid\" size=\"xsmall\" color=\"#1222B6\"><\/sonic-icon><strong><a href=\"https:\/\/www.cyberdegrees.org\/jobs\/computer-forensics\/\" target=\"_blank\" rel=\"noopener\">What Is a Computer Forensics Analyst?<\/a><\/strong><\/li>\r\n<li><sonic-icon icon=\"chevron-right\" type=\"solid\" size=\"xsmall\" color=\"#1222B6\"><\/sonic-icon><strong><a href=\"https:\/\/www.cyberdegrees.org\/jobs\/penetration-tester\/\" target=\"_blank\" rel=\"noopener\">What Is a Penetration Tester?<\/a><\/strong><\/li>\r\n<li><sonic-icon icon=\"chevron-right\" type=\"solid\" size=\"xsmall\" color=\"#1222B6\"><\/sonic-icon><strong><a href=\"https:\/\/www.cyberdegrees.org\/jobs\/security-manager\/\" target=\"_blank\" rel=\"noopener\">What Is a Security Manager?<\/a><\/strong><\/li>\r\n<\/ul>\r\n\r\n<section class=\"-mx-4 md:-mx-1\/2vw py-12 md:py-16 mt-12 md:my-16 relative md:left-1\/2 md:right-1\/2 md:w-screen bg-accent-light\">\n    <div class=\"container content\">\n        \r\n\n  \n  \n  <a class=\"subnav-waypoint\" name=\"technology\" id=\"technology\"><\/a>\n\n\r\n<h2>Technology<\/h2>\r\n<p>Keeping up with the <a href=\"https:\/\/www.cyberdegrees.org\/resources\/hot-technologies-cyber-security\/\">latest cybersecurity technology<\/a> can be a challenge. As software and coding evolve, security, too, has to change to remain relevant.<\/p>\r\n<p>Discover the latest in cybersecurity technology. From understanding current and emerging threats to locating the best tools and education, they have all the information you need.<\/p>\r\n<p>For more on free cybersecurity resources, skip to our \"Student Journey\" section.<\/p>\r\n\r\n  \n\n  <section class=\"cards pt-2 pb-12 lg:pt-16 lg:pb-20 relative text-center text-gray-700 \" data-cy=\"cards\">\n    <div class=\"bg-full-width absolute top-0 right-1\/2 left-1\/2 block h-full w-screen -mr-1\/2vw -ml-1\/2vw bg-quaternary-700 \"><\/div>\n    \n    <div class=\"grid grid-cols-1 gap-4 md:grid-cols-2 lg:grid-cols-4\">\n        \r\n<div class=\"cards-item bg-white flex flex-col justify-start mt-0 overflow-hidden rounded shadow\" data-cy=\"cards-item\">\n  <img decoding=\"async\"\n          src=\"https:\/\/res.cloudinary.com\/highereducation\/images\/f_auto,q_auto\/v1666365773\/CyberDegrees.org\/Woman-computer-coding-office-desk\/Woman-computer-coding-office-desk.jpg?_i=AA\"\n        alt=\"The Connection Between Coding and Cybersecurity\"\n  \/>\n  <div class=\"cards-item__content h-full flex flex-col p-6\">\n    <h4 class=\"cards-item__title\">The Connection Between Coding and Cybersecurity<\/h4>\n    <div class=\"flex flex-col\">\n      <p class=\"cards-item__text text-xs leading-5\"><\/p>\n          <\/div>\n    <div class=\"flex mt-auto flex-col justify-between\">\n      <a class=\"sonic-btn large w-full md:w-max mx-auto bg-secondary-700 uppercase\" href=\"https:\/\/www.cyberdegrees.org\/resources\/coding-and-cybersecurity\/\">\n        Learn More\n      <\/a>\n    <\/div>\n  <\/div>\n<\/div>\n\r\n<div class=\"cards-item bg-white flex flex-col justify-start mt-0 overflow-hidden rounded shadow\" data-cy=\"cards-item\">\n  <img decoding=\"async\"\n          src=\"https:\/\/www.cyberdegrees.org\/wp-content\/uploads\/2021\/09\/CD_Resources_Common-Cyber-Attacks-425x230-c-default.jpg\"\n        alt=\"What Most Cyberattacks Have in Common\"\n  \/>\n  <div class=\"cards-item__content h-full flex flex-col p-6\">\n    <h4 class=\"cards-item__title\">What Most Cyberattacks Have in Common<\/h4>\n    <div class=\"flex flex-col\">\n      <p class=\"cards-item__text text-xs leading-5\"><\/p>\n          <\/div>\n    <div class=\"flex mt-auto flex-col justify-between\">\n      <a class=\"sonic-btn large w-full md:w-max mx-auto bg-secondary-700 uppercase\" href=\"https:\/\/www.cyberdegrees.org\/resources\/most-common-cyber-attacks\/\">\n        Learn More\n      <\/a>\n    <\/div>\n  <\/div>\n<\/div>\n\r\n<div class=\"cards-item bg-white flex flex-col justify-start mt-0 overflow-hidden rounded shadow\" data-cy=\"cards-item\">\n  <img decoding=\"async\"\n          src=\"https:\/\/res.cloudinary.com\/highereducation\/images\/f_auto,q_auto\/v1664375152\/CyberDegrees.org\/role-of-cyber-in-crypto-and-blockchain_62671fb60\/role-of-cyber-in-crypto-and-blockchain_62671fb60.jpg?_i=AA\"\n        alt=\"The Role of Cybersecurity in Crypto and Blockchain\"\n  \/>\n  <div class=\"cards-item__content h-full flex flex-col p-6\">\n    <h4 class=\"cards-item__title\">The Role of Cybersecurity in Crypto and Blockchain<\/h4>\n    <div class=\"flex flex-col\">\n      <p class=\"cards-item__text text-xs leading-5\"><\/p>\n          <\/div>\n    <div class=\"flex mt-auto flex-col justify-between\">\n      <a class=\"sonic-btn large w-full md:w-max mx-auto bg-secondary-700 uppercase\" href=\"https:\/\/www.cyberdegrees.org\/resources\/crypto-and-blockchain-cybersecurity\/\">\n        Learn More\n      <\/a>\n    <\/div>\n  <\/div>\n<\/div>\n\r\n<div class=\"cards-item bg-white flex flex-col justify-start mt-0 overflow-hidden rounded shadow\" data-cy=\"cards-item\">\n  <img decoding=\"async\"\n          src=\"https:\/\/res.cloudinary.com\/highereducation\/images\/f_auto,q_auto\/v1666267663\/CyberDegrees.org\/Business-man-smiling-laptop\/Business-man-smiling-laptop.jpg?_i=AA\"\n        alt=\"The Difference Between Jobs in IT and Cybersecurity\"\n  \/>\n  <div class=\"cards-item__content h-full flex flex-col p-6\">\n    <h4 class=\"cards-item__title\">The Difference Between Jobs in IT and Cybersecurity<\/h4>\n    <div class=\"flex flex-col\">\n      <p class=\"cards-item__text text-xs leading-5\"><\/p>\n          <\/div>\n    <div class=\"flex mt-auto flex-col justify-between\">\n      <a class=\"sonic-btn large w-full md:w-max mx-auto bg-secondary-700 uppercase\" href=\"https:\/\/www.cyberdegrees.org\/resources\/cybersecurity-jobs-vs-information-technology-jobs\/\">\n        Learn More\n      <\/a>\n    <\/div>\n  <\/div>\n<\/div>\n\r\n\n    <\/div>\n\n    \n  <\/section>\n\n\n\n\r\n\n    <\/div>\n<\/section>\n\r\n\r\n\n  \n  \n  <a class=\"subnav-waypoint\" name=\"government-military\" id=\"government-military\"><\/a>\n\n\r\n<h2>Government and Military<\/h2>\r\n<p>Many veterans continue protecting our country's security by engaging in cybercareers after they leave active service. <a href=\"https:\/\/www.cyberdegrees.org\/resources\/gi-bill\/\">The U.S. government<\/a> helps fund higher education for veterans and current military members through the GI Bill&reg; and other resources.<\/p>\r\n<p>Some cybersecurity experts go to work for the federal government after earning their credentials. These professionals help protect national security, citizen data, and <a href=\"https:\/\/www.cyberdegrees.org\/resources\/cybersecurity-transportation-sector\/\">transportation infrastructure.<\/a><\/p>\r\n\r\n<div class=\"grid md:grid-cols-2 lg:grid-cols-2 gap-5 my-8\"> \n  \r\n\n<div class=\"sonic-interlink duration-500 flex hover:shadow-lg bg-secondary-700 \">\n    <a\n        target=\"_self\"\n        href=\"\/resources\/security-clearances\/\"\n        class=\"flex items-center p-8 relative rounded w-full transition-opacity duration-500 hover:opacity-75\">\n                <span class=\"text-white block w-full\">\n          <span class=\"interlink-content flex justify-between items-center\">\n            <div>\n                                                <span class=\"title leading-snug\">A Quick Guide to Security Clearances<\/span>\n                            <\/div>\n            <sonic-icon class=\"ml-3 md:ml-0\" icon=\"arrow-circle-right\" size=\"small\" color=\"#fff\"><\/sonic-icon>\n          <\/span>\n        <\/span>\n    <\/a>\n<\/div>\n\n\n\r\n\n<div class=\"sonic-interlink duration-500 flex hover:shadow-lg bg-secondary-700 \">\n    <a\n        target=\"_self\"\n        href=\"\/resources\/careers-for-vets\/\"\n        class=\"flex items-center p-8 relative rounded w-full transition-opacity duration-500 hover:opacity-75\">\n                <span class=\"text-white block w-full\">\n          <span class=\"interlink-content flex justify-between items-center\">\n            <div>\n                                                <span class=\"title leading-snug\">Cybersecurity Career Guide for Veterans<\/span>\n                            <\/div>\n            <sonic-icon class=\"ml-3 md:ml-0\" icon=\"arrow-circle-right\" size=\"small\" color=\"#fff\"><\/sonic-icon>\n          <\/span>\n        <\/span>\n    <\/a>\n<\/div>\n\n\n\r\n\n<div class=\"sonic-interlink duration-500 flex hover:shadow-lg bg-secondary-700 \">\n    <a\n        target=\"_self\"\n        href=\"\/resources\/government-cyber-security-careers\/\"\n        class=\"flex items-center p-8 relative rounded w-full transition-opacity duration-500 hover:opacity-75\">\n                <span class=\"text-white block w-full\">\n          <span class=\"interlink-content flex justify-between items-center\">\n            <div>\n                                                <span class=\"title leading-snug\">Government Cybersecurity Careers<\/span>\n                            <\/div>\n            <sonic-icon class=\"ml-3 md:ml-0\" icon=\"arrow-circle-right\" size=\"small\" color=\"#fff\"><\/sonic-icon>\n          <\/span>\n        <\/span>\n    <\/a>\n<\/div>\n\n\n\r\n\n<div class=\"sonic-interlink duration-500 flex hover:shadow-lg bg-secondary-700 \">\n    <a\n        target=\"_self\"\n        href=\"\/resources\/scholarships-military-veterans\/\"\n        class=\"flex items-center p-8 relative rounded w-full transition-opacity duration-500 hover:opacity-75\">\n                <span class=\"text-white block w-full\">\n          <span class=\"interlink-content flex justify-between items-center\">\n            <div>\n                                                <span class=\"title leading-snug\">Cybersecurity Scholarships for Military and Veterans<\/span>\n                            <\/div>\n            <sonic-icon class=\"ml-3 md:ml-0\" icon=\"arrow-circle-right\" size=\"small\" color=\"#fff\"><\/sonic-icon>\n          <\/span>\n        <\/span>\n    <\/a>\n<\/div>\n\n\n\r\n\n<\/div>\n\r\n\r\n<section class=\"-mx-4 md:-mx-1\/2vw py-12 md:py-16 mt-12 md:my-16 relative md:left-1\/2 md:right-1\/2 md:w-screen bg-accent-light\">\n    <div class=\"container content\">\n        \r\n\n  \n  \n  <a class=\"subnav-waypoint\" name=\"degrees\" id=\"degrees\"><\/a>\n\n\r\n<h2>Cybersecurity Degree Programs<\/h2>\r\n<p>Cybersecurity schools prepare students to pursue in-demand careers. While in school, learners may take coursework in advanced math, data analytics, <a href=\"https:\/\/www.cyberdegrees.org\/listings\/computer-science\/best-programs\/\">computer science<\/a>, and technology law.<\/p>\r\n<p>Colleges and universities offer cybersecurity degrees at all levels, from the two-year associate program to a research doctorate. For added affordability, check if your local community college offers these courses.<\/p>\r\n<p>Learn what to expect from an academic program, how to make the process more affordable, and explore our ranking of the <a href=\"https:\/\/www.cyberdegrees.org\/listings\/top-schools\/\">best cybersecurity schools<\/a>.<\/p>\r\n\r\n  \n\n  <section class=\"cards pt-2 pb-12 lg:pt-16 lg:pb-20 relative text-center text-gray-700 \" data-cy=\"cards\">\n    <div class=\"bg-full-width absolute top-0 right-1\/2 left-1\/2 block h-full w-screen -mr-1\/2vw -ml-1\/2vw bg-quaternary-700 \"><\/div>\n    \n    <div class=\"grid grid-cols-1 gap-4 md:grid-cols-2 lg:grid-cols-4\">\n        \r\n<div class=\"cards-item bg-white flex flex-col justify-start mt-0 overflow-hidden rounded shadow\" data-cy=\"cards-item\">\n  <img decoding=\"async\"\n          src=\"https:\/\/www.cyberdegrees.org\/wp-content\/uploads\/2020\/10\/GettyImages-1213479360-425x230-c-default.jpg\"\n        alt=\"Certificate Programs in Cybersecurity\"\n  \/>\n  <div class=\"cards-item__content h-full flex flex-col p-6\">\n    <h4 class=\"cards-item__title\">Certificate Programs in Cybersecurity<\/h4>\n    <div class=\"flex flex-col\">\n      <p class=\"cards-item__text text-xs leading-5\"><\/p>\n          <\/div>\n    <div class=\"flex mt-auto flex-col justify-between\">\n      <a class=\"sonic-btn large w-full md:w-max mx-auto bg-secondary-700 uppercase\" href=\"https:\/\/www.cyberdegrees.org\/listings\/certificate-programs\/\">\n        Learn More\n      <\/a>\n    <\/div>\n  <\/div>\n<\/div>\n\r\n<div class=\"cards-item bg-white flex flex-col justify-start mt-0 overflow-hidden rounded shadow\" data-cy=\"cards-item\">\n  <img decoding=\"async\"\n          src=\"https:\/\/www.cyberdegrees.org\/wp-content\/uploads\/2020\/10\/GettyImages-1187635203-425x230-c-default.jpg\"\n        alt=\"Associate Degrees in Cybersecurity\"\n  \/>\n  <div class=\"cards-item__content h-full flex flex-col p-6\">\n    <h4 class=\"cards-item__title\">Associate Degrees in Cybersecurity<\/h4>\n    <div class=\"flex flex-col\">\n      <p class=\"cards-item__text text-xs leading-5\"><\/p>\n          <\/div>\n    <div class=\"flex mt-auto flex-col justify-between\">\n      <a class=\"sonic-btn large w-full md:w-max mx-auto bg-secondary-700 uppercase\" href=\"https:\/\/www.cyberdegrees.org\/listings\/associate-degrees\/\">\n        Learn More\n      <\/a>\n    <\/div>\n  <\/div>\n<\/div>\n\r\n<div class=\"cards-item bg-white flex flex-col justify-start mt-0 overflow-hidden rounded shadow\" data-cy=\"cards-item\">\n  <img decoding=\"async\"\n          src=\"https:\/\/www.cyberdegrees.org\/wp-content\/uploads\/2020\/10\/GettyImages1-1159379067-425x230-c-default.jpg\"\n        alt=\"Top Bachelor's in Cybersecurity Programs\"\n  \/>\n  <div class=\"cards-item__content h-full flex flex-col p-6\">\n    <h4 class=\"cards-item__title\">Top Bachelor's in Cybersecurity Programs<\/h4>\n    <div class=\"flex flex-col\">\n      <p class=\"cards-item__text text-xs leading-5\"><\/p>\n          <\/div>\n    <div class=\"flex mt-auto flex-col justify-between\">\n      <a class=\"sonic-btn large w-full md:w-max mx-auto bg-secondary-700 uppercase\" href=\"https:\/\/www.cyberdegrees.org\/listings\/bachelors-degrees\/\">\n        Learn More\n      <\/a>\n    <\/div>\n  <\/div>\n<\/div>\n\r\n<div class=\"cards-item bg-white flex flex-col justify-start mt-0 overflow-hidden rounded shadow\" data-cy=\"cards-item\">\n  <img decoding=\"async\"\n          src=\"https:\/\/res.cloudinary.com\/highereducation\/images\/f_auto,q_auto\/v1664375220\/CyberDegrees.org\/best-master-cyber-programs_4743668e5\/best-master-cyber-programs_4743668e5.jpg?_i=AA\"\n        alt=\"Top Master's in Cybersecurity Programs\"\n  \/>\n  <div class=\"cards-item__content h-full flex flex-col p-6\">\n    <h4 class=\"cards-item__title\">Top Master's in Cybersecurity Programs<\/h4>\n    <div class=\"flex flex-col\">\n      <p class=\"cards-item__text text-xs leading-5\"><\/p>\n          <\/div>\n    <div class=\"flex mt-auto flex-col justify-between\">\n      <a class=\"sonic-btn large w-full md:w-max mx-auto bg-secondary-700 uppercase\" href=\"https:\/\/www.cyberdegrees.org\/listings\/masters-degrees\/\">\n        Learn More\n      <\/a>\n    <\/div>\n  <\/div>\n<\/div>\n\r\n\n    <\/div>\n\n    \n  <\/section>\n\n\n\n\r\n\n    <\/div>\n<\/section>\n\r\n\r\n<h2>Other Degree Programs<\/h2>\r\n<p>Not all cybersecurity professionals hold a degree in the field. If you were interested in a cybersecurity career, but never encouraged or equipped to pursue it, there are alternatives.<\/p>\r\n<p>Plenty of <a href=\"https:\/\/www.cyberdegrees.org\/listings\/\">parallel programs<\/a> offer the appropriate academic background for graduates to enter the field of cybersecurity.<\/p>\r\n<p>In addition to exploring the majors and concentrations listed below, search for cybersecurity and related <a href=\"https:\/\/www.cyberdegrees.org\/states\/\">programs by state<\/a> to find the best-fitting degree program.<\/p>\r\n<ul class=\"ssr-columns-custom-style grid md:grid-cols-2 gap-5\">\r\n<li><sonic-icon icon=\"chevron-right\" type=\"solid\" size=\"xsmall\" color=\"#1222B6\"><\/sonic-icon><strong><a href=\"https:\/\/www.cyberdegrees.org\/listings\/best-computer-forensics-bachelors\/\" target=\"_blank\" rel=\"noopener\">Bachelor's Degrees in Computer Forensics<\/a><\/strong><\/li>\r\n<li><sonic-icon icon=\"chevron-right\" type=\"solid\" size=\"xsmall\" color=\"#1222B6\"><\/sonic-icon><strong><a href=\"http:\/\/cyberdegrees.org\/listings\/best-computer-forensics-programs\/\" target=\"_blank\" rel=\"noopener\">Master's in Computer Forensics Degrees<\/a><\/strong><\/li>\r\n<li><sonic-icon icon=\"chevron-right\" type=\"solid\" size=\"xsmall\" color=\"#1222B6\"><\/sonic-icon><strong><a href=\"https:\/\/www.cyberdegrees.org\/listings\/best-information-assurance-bachelors\/\" target=\"_blank\" rel=\"noopener\">Bachelor's Degrees in Information Assurance<\/a><\/strong><\/li>\r\n<li><sonic-icon icon=\"chevron-right\" type=\"solid\" size=\"xsmall\" color=\"#1222B6\"><\/sonic-icon><strong><a href=\"https:\/\/www.cyberdegrees.org\/listings\/top-masters-in-information-assurance-programs\/\" target=\"_blank\" rel=\"noopener\">Master&rsquo;s in Information Assurance Degrees<\/a><\/strong><\/li>\r\n<li><sonic-icon icon=\"chevron-right\" type=\"solid\" size=\"xsmall\" color=\"#1222B6\"><\/sonic-icon><strong><a href=\"https:\/\/www.cyberdegrees.org\/listings\/best-online-bachelors-in-information-technology-programs\/\" target=\"_blank\" rel=\"noopener\">Bachelor's Degrees in Information Technology<\/a><\/strong><\/li>\r\n<li><sonic-icon icon=\"chevron-right\" type=\"solid\" size=\"xsmall\" color=\"#1222B6\"><\/sonic-icon><strong><a href=\"https:\/\/www.cyberdegrees.org\/listings\/top-online-masters-in-information-technology-programs\/\" target=\"_blank\" rel=\"noopener\">Master's in Information Technology Degrees<\/a><\/strong><\/li>\r\n<li><sonic-icon icon=\"chevron-right\" type=\"solid\" size=\"xsmall\" color=\"#1222B6\"><\/sonic-icon><strong><a href=\"https:\/\/www.cyberdegrees.org\/listings\/business-and-technology-concentrations\/best-programs\/\" target=\"_blank\" rel=\"noopener\">Best Degrees for Business and Technology<\/a><\/strong><\/li>\r\n<li><sonic-icon icon=\"chevron-right\" type=\"solid\" size=\"xsmall\" color=\"#1222B6\"><\/sonic-icon><strong><a href=\"https:\/\/www.cyberdegrees.org\/listings\/best-information-systems-security-degrees\/\" target=\"_blank\" rel=\"noopener\">Best Degrees in Information Systems Security<\/a><\/strong><\/li>\r\n<li><sonic-icon icon=\"chevron-right\" type=\"solid\" size=\"xsmall\" color=\"#1222B6\"><\/sonic-icon><strong><a href=\"\/listings\/best-masters-in-data-analytics\/\" >5 Best Master's Degrees in Data Analytics<\/a><\/strong><\/li>\r\n<li><sonic-icon icon=\"chevron-right\" type=\"solid\" size=\"xsmall\" color=\"#1222B6\"><\/sonic-icon><strong><a href=\"\/listings\/best-data-analytics-degrees\/\" >5 Best Bachelor's Degrees in Data Analytics<\/a><\/strong><\/li>\r\n<\/ul>\r\n\r\n<section class=\"-mx-4 md:-mx-1\/2vw py-12 md:py-16 mt-12 md:my-16 relative md:left-1\/2 md:right-1\/2 md:w-screen bg-accent-light\">\n    <div class=\"container content\">\n        \r\n\n  \n  \n  <a class=\"subnav-waypoint\" name=\"student-journey\" id=\"student-journey\"><\/a>\n\n\r\n<h2>Student Journey<\/h2>\r\n<p>Earning a degree never happens overnight. It takes time, money, educational opportunities, and a lot of effort. There are many cybersecurity resources to help motivated students earn <a href=\"https:\/\/www.cyberdegrees.org\/resources\/degree-required-for-cybersecurity-career\/\">the education they need<\/a> to succeed as cybersecurity professionals.<\/p>\r\n<p>The resources listed below are designed to assist students or career switchers on their journey into the cybersecurity field.<\/p>\r\n\r\n  \n\n  <section class=\"cards pt-2 pb-12 lg:pt-16 lg:pb-20 relative text-center text-gray-700 \" data-cy=\"cards\">\n    <div class=\"bg-full-width absolute top-0 right-1\/2 left-1\/2 block h-full w-screen -mr-1\/2vw -ml-1\/2vw bg-quaternary-700 \"><\/div>\n    \n    <div class=\"grid grid-cols-1 gap-4 md:grid-cols-2 lg:grid-cols-4\">\n        \r\n<div class=\"cards-item bg-white flex flex-col justify-start mt-0 overflow-hidden rounded shadow\" data-cy=\"cards-item\">\n  <img decoding=\"async\"\n          src=\"https:\/\/res.cloudinary.com\/highereducation\/images\/f_auto,q_auto\/v1664375234\/CyberDegrees.org\/GettyImages-657110430_58007ebb4\/GettyImages-657110430_58007ebb4.jpg?_i=AA\"\n        alt=\"Free Online Cybersecurity Courses\"\n  \/>\n  <div class=\"cards-item__content h-full flex flex-col p-6\">\n    <h4 class=\"cards-item__title\">Free Online Cybersecurity Courses<\/h4>\n    <div class=\"flex flex-col\">\n      <p class=\"cards-item__text text-xs leading-5\"><\/p>\n          <\/div>\n    <div class=\"flex mt-auto flex-col justify-between\">\n      <a class=\"sonic-btn large w-full md:w-max mx-auto bg-secondary-700 uppercase\" href=\"https:\/\/www.cyberdegrees.org\/resources\/free-online-courses\/\">\n        Learn More\n      <\/a>\n    <\/div>\n  <\/div>\n<\/div>\n\r\n<div class=\"cards-item bg-white flex flex-col justify-start mt-0 overflow-hidden rounded shadow\" data-cy=\"cards-item\">\n  <img decoding=\"async\"\n          src=\"https:\/\/res.cloudinary.com\/highereducation\/images\/f_auto,q_auto\/v1664375533\/CyberDegrees.org\/cyber-professional-looking-at-data_607432847\/cyber-professional-looking-at-data_607432847.jpg?_i=AA\"\n        alt=\"How to Pay for a Degree in Cybersecurity\"\n  \/>\n  <div class=\"cards-item__content h-full flex flex-col p-6\">\n    <h4 class=\"cards-item__title\">How to Pay for a Degree in Cybersecurity<\/h4>\n    <div class=\"flex flex-col\">\n      <p class=\"cards-item__text text-xs leading-5\"><\/p>\n          <\/div>\n    <div class=\"flex mt-auto flex-col justify-between\">\n      <a class=\"sonic-btn large w-full md:w-max mx-auto bg-secondary-700 uppercase\" href=\"https:\/\/www.cyberdegrees.org\/resources\/how-to-pay-for-a-degree\/\">\n        Learn More\n      <\/a>\n    <\/div>\n  <\/div>\n<\/div>\n\r\n<div class=\"cards-item bg-white flex flex-col justify-start mt-0 overflow-hidden rounded shadow\" data-cy=\"cards-item\">\n  <img decoding=\"async\"\n          src=\"https:\/\/res.cloudinary.com\/highereducation\/images\/f_auto,q_auto\/v1664376698\/CyberDegrees.org\/GettyImages-1307905638_3927aef22\/GettyImages-1307905638_3927aef22.jpg?_i=AA\"\n        alt=\"What Degree Do You Need to Work in Cybersecurity?\"\n  \/>\n  <div class=\"cards-item__content h-full flex flex-col p-6\">\n    <h4 class=\"cards-item__title\">What Degree Do You Need to Work in Cybersecurity?<\/h4>\n    <div class=\"flex flex-col\">\n      <p class=\"cards-item__text text-xs leading-5\"><\/p>\n          <\/div>\n    <div class=\"flex mt-auto flex-col justify-between\">\n      <a class=\"sonic-btn large w-full md:w-max mx-auto bg-secondary-700 uppercase\" href=\"https:\/\/www.cyberdegrees.org\/resources\/degree-required-for-cybersecurity-career\/\">\n        Learn More\n      <\/a>\n    <\/div>\n  <\/div>\n<\/div>\n\r\n<div class=\"cards-item bg-white flex flex-col justify-start mt-0 overflow-hidden rounded shadow\" data-cy=\"cards-item\">\n  <img decoding=\"async\"\n          src=\"https:\/\/www.cyberdegrees.org\/wp-content\/uploads\/2020\/10\/GettyImages-1171161026-425x230-c-default.jpg\"\n        alt=\"Internet Safety and Cybersecurity Awareness for Students\"\n  \/>\n  <div class=\"cards-item__content h-full flex flex-col p-6\">\n    <h4 class=\"cards-item__title\">Internet Safety and Cybersecurity Awareness for Students<\/h4>\n    <div class=\"flex flex-col\">\n      <p class=\"cards-item__text text-xs leading-5\"><\/p>\n          <\/div>\n    <div class=\"flex mt-auto flex-col justify-between\">\n      <a class=\"sonic-btn large w-full md:w-max mx-auto bg-secondary-700 uppercase\" href=\"https:\/\/www.cyberdegrees.org\/resources\/internet-safety-for-college-students\/\">\n        Learn More\n      <\/a>\n    <\/div>\n  <\/div>\n<\/div>\n\r\n\n    <\/div>\n\n    \n  <\/section>\n\n\n\n\r\n\n    <\/div>\n<\/section>\n\r\n\r\n\n  \n  \n  <a class=\"subnav-waypoint\" name=\"continuing-education\" id=\"continuing-education\"><\/a>\n\n\r\n<h2>Continuing Education<\/h2>\r\n<p>You don't have to earn a degree at all to land a cybersecurity job. In that way, cybersecurity is equitable; it has a finish line you can meet regardless of the resources you were given or denied earlier in life.<\/p>\r\n<p>Certifications, <a href=\"https:\/\/www.cyberdegrees.org\/listings\/best-cyber-security-bootcamps\/\">cybersecurity bootcamps<\/a>, and other skill-building resources may provide the necessary background to get started.<\/p>\r\n<p>Because the subject itself is constantly evolving, current professionals can also benefit from continuing education opportunities.<\/p>\r\n\r\n<div class=\"grid md:grid-cols-2 lg:grid-cols-2 gap-5 my-8\"> \n  \r\n\n<div class=\"sonic-interlink duration-500 flex hover:shadow-lg bg-secondary-700 \">\n    <a\n        target=\"_self\"\n        href=\"\/resources\/certifications\/\"\n        class=\"flex items-center p-8 relative rounded w-full transition-opacity duration-500 hover:opacity-75\">\n                <span class=\"text-white block w-full\">\n          <span class=\"interlink-content flex justify-between items-center\">\n            <div>\n                                                <span class=\"title leading-snug\">A Guide to Cybersecurity Certifications<\/span>\n                            <\/div>\n            <sonic-icon class=\"ml-3 md:ml-0\" icon=\"arrow-circle-right\" size=\"small\" color=\"#fff\"><\/sonic-icon>\n          <\/span>\n        <\/span>\n    <\/a>\n<\/div>\n\n\n\r\n\n<div class=\"sonic-interlink duration-500 flex hover:shadow-lg bg-secondary-700 \">\n    <a\n        target=\"_self\"\n        href=\"\/listings\/cyber-security-bootcamps\/\"\n        class=\"flex items-center p-8 relative rounded w-full transition-opacity duration-500 hover:opacity-75\">\n                <span class=\"text-white block w-full\">\n          <span class=\"interlink-content flex justify-between items-center\">\n            <div>\n                                                <span class=\"title leading-snug\">A Guide to Cybersecurity Bootcamps<\/span>\n                            <\/div>\n            <sonic-icon class=\"ml-3 md:ml-0\" icon=\"arrow-circle-right\" size=\"small\" color=\"#fff\"><\/sonic-icon>\n          <\/span>\n        <\/span>\n    <\/a>\n<\/div>\n\n\n\r\n\n<div class=\"sonic-interlink duration-500 flex hover:shadow-lg bg-secondary-700 \">\n    <a\n        target=\"_self\"\n        href=\"\/resources\/cybersecurity-programming-languages\"\n        class=\"flex items-center p-8 relative rounded w-full transition-opacity duration-500 hover:opacity-75\">\n                <span class=\"text-white block w-full\">\n          <span class=\"interlink-content flex justify-between items-center\">\n            <div>\n                                                <span class=\"title leading-snug\">Programming Languages Used in Cybersecurity<\/span>\n                            <\/div>\n            <sonic-icon class=\"ml-3 md:ml-0\" icon=\"arrow-circle-right\" size=\"small\" color=\"#fff\"><\/sonic-icon>\n          <\/span>\n        <\/span>\n    <\/a>\n<\/div>\n\n\n\r\n\n<div class=\"sonic-interlink duration-500 flex hover:shadow-lg bg-secondary-700 \">\n    <a\n        target=\"_self\"\n        href=\"\/resources\/transitioning-from-general-it\/\"\n        class=\"flex items-center p-8 relative rounded w-full transition-opacity duration-500 hover:opacity-75\">\n                <span class=\"text-white block w-full\">\n          <span class=\"interlink-content flex justify-between items-center\">\n            <div>\n                                                <span class=\"title leading-snug\">Transitioning From General IT to Cybersecurity<\/span>\n                            <\/div>\n            <sonic-icon class=\"ml-3 md:ml-0\" icon=\"arrow-circle-right\" size=\"small\" color=\"#fff\"><\/sonic-icon>\n          <\/span>\n        <\/span>\n    <\/a>\n<\/div>\n\n\n\r\n\n<\/div>\n\r\n\r\n\r\n<section class=\"-mx-4 md:-mx-1\/2vw py-12 md:py-16 mt-12 md:my-16 relative md:left-1\/2 md:right-1\/2 md:w-screen bg-accent-light\">\n    <div class=\"container content\">\n        \r\n\n  \n  \n  <a class=\"subnav-waypoint\" name=\"resources\" id=\"resources\"><\/a>\n\n\r\n<h2>More Resources<\/h2>\r\n<p>We're always building our <a href=\"https:\/\/www.cyberdegrees.org\/resources\/the-big-list\/\">list of cybersecurity resources<\/a> so we can provide relevant, up-to-date cybersecurity information for all students and emerging professionals, including those who have traditionally been left out of this field.<\/p>\r\n<p>Our resources don't stop with our school rankings and career profiles. We also offer a full array of information from safety tips to information on diversity, the hottest new technologies, and more.<\/p>\r\n\r\n  \n\n  <section class=\"cards pt-2 pb-12 lg:pt-16 lg:pb-20 relative text-center text-gray-700 \" data-cy=\"cards\">\n    <div class=\"bg-full-width absolute top-0 right-1\/2 left-1\/2 block h-full w-screen -mr-1\/2vw -ml-1\/2vw bg-quaternary-700 \"><\/div>\n    \n    <div class=\"grid grid-cols-1 gap-4 md:grid-cols-2 lg:grid-cols-4\">\n        \r\n<div class=\"cards-item bg-white flex flex-col justify-start mt-0 overflow-hidden rounded shadow\" data-cy=\"cards-item\">\n  <img decoding=\"async\"\n          src=\"https:\/\/res.cloudinary.com\/highereducation\/images\/f_auto,q_auto\/v1664903872\/CyberDegrees.org\/Woman-smiling-video-call-computer-headphones\/Woman-smiling-video-call-computer-headphones.jpg?_i=AA\"\n        alt=\"Internet Safety Tips While Working From Home\"\n  \/>\n  <div class=\"cards-item__content h-full flex flex-col p-6\">\n    <h4 class=\"cards-item__title\">Internet Safety Tips While Working From Home<\/h4>\n    <div class=\"flex flex-col\">\n      <p class=\"cards-item__text text-xs leading-5\"><\/p>\n          <\/div>\n    <div class=\"flex mt-auto flex-col justify-between\">\n      <a class=\"sonic-btn large w-full md:w-max mx-auto bg-secondary-700 uppercase\" href=\"https:\/\/www.cyberdegrees.org\/resources\/internet-safety-tips-wfh\/\">\n        Learn More\n      <\/a>\n    <\/div>\n  <\/div>\n<\/div>\n\r\n<div class=\"cards-item bg-white flex flex-col justify-start mt-0 overflow-hidden rounded shadow\" data-cy=\"cards-item\">\n  <img decoding=\"async\"\n          src=\"https:\/\/res.cloudinary.com\/highereducation\/images\/f_auto,q_auto\/v1666267663\/CyberDegrees.org\/Business-man-smiling-laptop\/Business-man-smiling-laptop.jpg?_i=AA\"\n        alt=\"The Difference Between Jobs in IT and Cybersecurity\"\n  \/>\n  <div class=\"cards-item__content h-full flex flex-col p-6\">\n    <h4 class=\"cards-item__title\">The Difference Between Jobs in IT and Cybersecurity<\/h4>\n    <div class=\"flex flex-col\">\n      <p class=\"cards-item__text text-xs leading-5\"><\/p>\n          <\/div>\n    <div class=\"flex mt-auto flex-col justify-between\">\n      <a class=\"sonic-btn large w-full md:w-max mx-auto bg-secondary-700 uppercase\" href=\"https:\/\/www.cyberdegrees.org\/resources\/cybersecurity-jobs-vs-information-technology-jobs\/\">\n        Learn More\n      <\/a>\n    <\/div>\n  <\/div>\n<\/div>\n\r\n<div class=\"cards-item bg-white flex flex-col justify-start mt-0 overflow-hidden rounded shadow\" data-cy=\"cards-item\">\n  <img decoding=\"async\"\n          src=\"https:\/\/www.cyberdegrees.org\/wp-content\/uploads\/2020\/10\/GettyImages-1033177256-425x230-c-default.jpg\"\n        alt=\"Additional Resources for Professionals and Students\"\n  \/>\n  <div class=\"cards-item__content h-full flex flex-col p-6\">\n    <h4 class=\"cards-item__title\">Additional Resources for Professionals and Students<\/h4>\n    <div class=\"flex flex-col\">\n      <p class=\"cards-item__text text-xs leading-5\"><\/p>\n          <\/div>\n    <div class=\"flex mt-auto flex-col justify-between\">\n      <a class=\"sonic-btn large w-full md:w-max mx-auto bg-secondary-700 uppercase\" href=\"https:\/\/www.cyberdegrees.org\/resources\/the-big-list\/\">\n        Learn More\n      <\/a>\n    <\/div>\n  <\/div>\n<\/div>\n\r\n<div class=\"cards-item bg-white flex flex-col justify-start mt-0 overflow-hidden rounded shadow\" data-cy=\"cards-item\">\n  <img decoding=\"async\"\n          src=\"https:\/\/res.cloudinary.com\/highereducation\/images\/f_auto,q_auto\/v1664375690\/CyberDegrees.org\/Cyber_Resources_Org_for_Underrep_Populations_383315c58\/Cyber_Resources_Org_for_Underrep_Populations_383315c58.jpg?_i=AA\"\n        alt=\"Resources and Organizations for Underrepresented Populations\"\n  \/>\n  <div class=\"cards-item__content h-full flex flex-col p-6\">\n    <h4 class=\"cards-item__title\">Resources and Organizations for Underrepresented Populations<\/h4>\n    <div class=\"flex flex-col\">\n      <p class=\"cards-item__text text-xs leading-5\"><\/p>\n          <\/div>\n    <div class=\"flex mt-auto flex-col justify-between\">\n      <a class=\"sonic-btn large w-full md:w-max mx-auto bg-secondary-700 uppercase\" href=\"https:\/\/www.cyberdegrees.org\/resources\/cybersecurity-resources-for-underrepresented-populations\/\">\n        Learn More\n      <\/a>\n    <\/div>\n  <\/div>\n<\/div>\n\r\n\n    <\/div>\n\n    \n  <\/section>\n\n\n\n\r\n\n    <\/div>\n<\/section>\n\r\n\r\n\r\n\n  \n  \n  <a class=\"subnav-waypoint\" name=\"faq\" id=\"faq\"><\/a>\n\n\r\n<h2>FAQ About Cybersecurity Information on CyberDegrees.org<\/h2>\r\n<h3>Is the content on CyberDegrees.org written or reviewed by experts?<\/h3>\r\n<p>At CyberDegrees.org, <a href=\"https:\/\/www.cyberdegrees.org\/contributors\">our expertise<\/a> goes right up to the Ph.D. level. Our writers love learning new things, and our expert reviewers include data engineers, diversity experts, and human resources leaders. We make sure nothing gets past us.<\/p>\r\n<h3>How does CyberDegrees.org rank school programs?<\/h3>\r\n<p>Using reliable, nonpartisan data sourced from the <a href=\"https:\/\/nces.ed.gov\/\" target=\"_blank\" rel=\"noopener\">National Center for Education Statistics<\/a>, we rank school programs using our own <a href=\"https:\/\/www.cyberdegrees.org\/methodology\/\">unique methodology<\/a>. We factor in many different points when considering where to place programs, for example: graduation rate, admission rate, and, where possible, inclusion of DEI into the curricula. and no school can pay for a spot in our rankings.<\/p>\r\n<h3>What is the privacy policy on CyberDegrees.org?<\/h3>\r\n<p>CyberDegrees.org is an initiative of Red Ventures, a portfolio of platforms that connect people with the information they need to make important decisions. As such, CyberDegrees.org abides by its <a href=\"https:\/\/www.cyberdegrees.org\/privacy-policy\/\">parent company's policies<\/a> regarding data collection, protection, and sharing.<\/p>\r\n<h3>Where can I learn more about CyberDegrees.org?<\/h3>\r\n<p>Our <a href=\"https:\/\/www.cyberdegrees.org\/about-this-site\/\">About Us<\/a> page offers detailed information about our site, our ranking methodology, contributors, and reviewers.<\/p>\r\n\r\n<hr>\r\n\r\n<p><em>GI Bill&reg; is a registered trademark of the U.S. Department of Veterans Affairs (VA). More information about education benefits offered by VA is available at the official U.S. government website at <a href=\"https:\/\/www.benefits.va.gov\/gibill\/\" target=\"_blank\" rel=\"noopener\">https:\/\/www.benefits.va.gov\/gibill\/<\/a>.<\/em><\/p>\r\n\r\n<p><em>Page last reviewed Nov 3, 2022<\/em><\/p>","protected":false},"excerpt":{"rendered":"Need to know more about cyber degrees, careers, and how to carve out space for yourself in the industry? Explore our cybersecurity resources.","protected":false},"author":5,"featured_media":6986,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"templates\/template-dcs.php","format":"standard","meta":{"_cloudinary_featured_overwrite":false,"footnotes":""},"categories":[1],"states":[],"resources-overview":[33],"degrees":[],"jobs-overview":[],"rankings":[],"class_list":["post-529","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","resources-overview-all"],"acf":[],"menu_order":0,"_links":{"self":[{"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/posts\/529","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/comments?post=529"}],"version-history":[{"count":3,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/posts\/529\/revisions"}],"predecessor-version":[{"id":8022,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/posts\/529\/revisions\/8022"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/media\/6986"}],"wp:attachment":[{"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/media?parent=529"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/categories?post=529"},{"taxonomy":"states","embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/states?post=529"},{"taxonomy":"resources-overview","embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/resources-overview?post=529"},{"taxonomy":"degrees","embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/degrees?post=529"},{"taxonomy":"jobs-overview","embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/jobs-overview?post=529"},{"taxonomy":"rankings","embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/rankings?post=529"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}