• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Cybersecurity Guide

  • PROGRAMS BY STATE
    • Alabama
    • Alaska
    • Arizona
    • Arkansas
    • California
    • Colorado
    • Connecticut
    • Delaware
    • Florida
    • Georgia
    • Hawaii
    • Idaho
    • Illinois
    • Indiana
    • Iowa
    • Kansas
    • Kentucky
    • Louisiana
    • Maine
    • Maryland
    • Massachusetts
    • Michigan
    • Minnesota
    • Mississippi
    • Missouri
    • Montana
    • Nebraska
    • Nevada
    • New Hampshire
    • New Jersey
    • New Mexico
    • New York
    • North Carolina
    • North Dakota
    • Ohio
    • Oklahoma
    • Oregon
    • Pennsylvania
    • Rhode Island
    • South Carolina
    • South Dakota
    • Tennessee
    • Texas
    • Utah
    • Vermont
    • Virginia
    • Washington
    • Washington, DC
    • Wisconsin
    • West Virginia
    • Wyoming
  • CERTIFICATIONS
    • Certified Information Systems Auditor (CISA)
    • Certified Ethical Hacker (CEH)
    • Certified Information Security Systems Professional (CISSP)
  • DEGREES
    • associate’s in cybersecurity
    • bachelor’s in cybersecurity
    • master’s in cybersecurity
    • cybersecurity analytics degree
    • MBA in cybersecurity
    • phd in cybersecurity
    • cybersecurity law degree
    • master’s in information security
  • ONLINE PROGRAMS
    • Online Certificate in Cybersecurity
    • online bachelor’s in cybersecurity
    • online IT degree
    • online master’s in cybersecurity
    • Online master’s in information security
    • online phd in cybersecurity
  • CAREER GUIDES
    • Security Engineer
    • Chief Information Security Officer
    • Security Analyst
    • Computer Forensics
    • Security Consultant
    • Digital Forensics
    • Cryptographer
    • Security Administrator
    • Penetration Tester
    • Security Software Developer
    • Security Specialist
    • Security Code Auditor
    • Security Architect
    • Malware Analyst
    • Data Protection Officer
    • Cybercrime Investigator
    • Cryptanalyst
    • Security Incident Responder
  • Experts
  • RESOURCES CENTER
    • Job Guide
    • Veteran’s Guide
    • Women’s Guide
    • Certification Guide
    • Internship Guide
    • Security Clearance Guide
    • Ethical Hacker Guide
    • Coding for Cybersecurity Guide
    • Cybersecurity 101
    • Student Guide to Internet Safety
    • Scholarship Guide
    • Cybersecurity Math Guide
    • Small Business Guide
    • COVID-19 Guide

About us

WHAT DO THESE INSTITUTIONS SHARE?

  • Georgia Tech
  • Marquette University
  • University of Michigan
  • Texas Woman's University
  • The University of Maine
  • The Ohio State University
  • NYU
  • NC State University
  • Washington State University

These schools and research centers have let others know about our guides and resources.

Why now?

Cybersecurity is an emerging field with a ton of potential.

According to industry research, and as reported elsewhere on this site (particularly in our Cybersecurity Job Guide), there is a growing need for well-trained cybersecurity experts. In fact, the need is so great that many companies are reporting a talent shortfall.

We have focused on cybersecurity education as the first step in building a much-needed pipeline. 

With each academic year, more colleges and universities are adding cybersecurity degree programs. But high-quality information about how all these degree and certification programs have not kept pace. That’s where we come in.

We want this website to serve as a resource for cybersecurity-related educational opportunities. This includes information about cybersecurity degree and certification programs at all levels.

Our goal is to provide the most comprehensive and current information possible. 

We work with people across academia and industry to produce the content on this website. If you spot information that needs updating, please reach out via our contact box below. 

Meet the writers

Contributing writers

Aireal Liddle is a systems and security administrator with a passion for cybersecurity and writing. As part of her day job, she maintains the security and integrity of her organization’s network and handles all incident and response. She regularly attends cybersecurity conferences such as Black Hat USA and Def Con. In the past, she has worked with organizations such as Cybrary.it and PocketPrep.com to create content. Her certifications include CompTIA A+, CompTIA Security+, CSSA, and CSSP. She has also completed the Certified Ethical Hacker (CEH) coursework.

Steven Bowcut, CPP, PSP is editor-in-chief for Brilliance Security Magazine. His 30-year career in the security industry includes work as a security consultant for many private, government, and quasi-government entities. He has published hundreds of articles covering security-related topics and is passionate about security and cybersecurity issues.

Interested in writing for us? Please drop a line using the contact box below.

Frequently asked questions

  • What is Cybersecurity Guide?

Our mission is to be the most comprehensive cybersecurity education website on the internet. It’s no easy task as new cybersecurity degree, certification, and online training programs are being offered every day (or so it seems).

Nonetheless, our goal is to try to provide the most accurate and up-to-date information available. If you have questions or would like to request an update, please use the contact box on this page. We update the site several times a week, and we try to reply to requested information updates within 24 hours.

  • What kinds of information will I find on Cybersecurity Guide?

The primary information provided on this site relates to cybersecurity degree programs — including associate’s degrees, bachelor’s degrees, master’s degrees, and Ph.D. degrees — in both online and campus formats.

Additionally, we provide information about professional cybersecurity certification and career opportunities.

  • How is this site funded?

Cybersecurity Guide is a product of TriTown Media, an independent media company incorporated in Delaware. 

The company’s mission is to present information that is free from bias. Our goal is to present current and accurate information that will have a high value to our readers. 

TriTown is committed to building high-quality educational resources around the internet. 

To fulfill that mission we do take advertising dollars from reputable marketing companies and we are only interested in working with publishers that partner with leading colleges and universities.

We are transparent in our sponsored content versus organic content. We will never publish an advertisement on our experts’ pages. 

We refuse to take money from any special interest groups or any kind of group that is promoting a viewpoint including religious, political, or a particular viewpoint. 

We are one hundred percent committed to maintaining this resource as something that is available to everyone. We will never charge a fee for our content. Instead, we will rely on advertising dollars that are aligned with the mission and values outlined above. 

  • I was contacted to do an expert interview. Now what?

We are constantly reaching out to cybersecurity experts with interview requests. Our goal is simple. Rather than recycle the same information found about cybersecurity elsewhere on the internet, we are committed to finding the best and most current information available.

In order for us to do that, we frequently reach out to cybersecurity experts operating at the front lines. 

Our expert interviews usually consist of between 10 to 15 questions that cover each expert’s background, current research or work, advice for today’s cybersecurity students, and a look ahead at industry trends. 

Do you know someone who would be a great fit for our cybersecurity expert section? If so, let us know through the contact form below.

Please let us know if you have any feedback or information you would like us to share with our readers.

It’s really important that you fact check and verify tuition rates and admission requirements for all schools and programs. And please let us know if you have any feedback or information you would like us to share with our readers.

Contact Us

Primary Sidebar

  • CERTIFICATIONS
    • CISA
    • CEH
    • CISSP
  • CAREERS
    • Security Engineer
    • Chief Information Security Officer
    • Security Analyst
    • Computer Forensics
    • Security Consultant
    • Digital Forensics
    • Cryptographer
    • Security Administrator
    • Penetration Tester
    • Security Software Developer
    • Security Specialist
    • Security Code Auditor
    • Security Architect
    • Malware Analyst
    • Data Protection Officer
    • Cybercrime Investigator
    • Cryptanalyst
    • Security Incident Responder
    • Chief Privacy Officer
    • Risk Manager
  • RESOURCE CENTER
    • Centers for Academic Excellence
    • Job Guide
    • Veteran’s Guide
    • Women’s Guide
    • Internship Guide
    • Security Clearance Guide
    • Ethical Hacker Guide
    • Coding for Cybersecurity Guide
    • Cybersecurity 101
    • Student Guide to Internet Safety
    • Scholarship Guide
    • Cybersecurity Math Guide
    • Small Business Guide
    • COVID-19 Guide
    • Cybersecurity for K-12 students

  • Home
  • About Us
  • Privacy Policy
  • Terms of Use
  • Experts
  • Online Degree Options
  • Popular Careers
  • Campus Programs


Copyright © 2021 · Cybersecurity Guide · All Rights Reserved

California Consumer Protection Act (CCPA)

Opt-Out Request

If you would like to opt out of the sale of your information as defined under the California Consumer Privacy Act (CCPA), please complete the form below.

By submitting this form, you certify that you are a California resident, that the information is correct and you are the person to whom it relates.

We use cookies to ensure that we give you the best experience on our website. Ok