WHAT DO THESE INSTITUTIONS SHARE?
These schools, companies, and research centers have let others know about our guides and resources.
What is Cybersecurity Guide?
Over the past few years, Cybersecurity Guide has grown into a massive resource referenced by leading cybersecurity professionals in academia, industry, and beyond.
Our global team of professional cybersecurity writers — leaning on their first-hand experience in the field — conduct interviews and deep-dive research, all in an effort to create the most up-to-date and comprehensive cybersecurity education resource available.On this page
Why trust us?
As any security professional will tell you, “Don’t trust, verify.”
Here are some data points to consider
- Our site has had over 3 million page views
- We have documented dozens of interviews with leading cybersecurity experts based in the US.
- Our work is cited by some of the best university and cybersecurity organizations in the world.
- We hire actual writers with deep subject matter expertise, we use real and verifiable data sources (which are linked in the content), and we have a team of editors routinely fact checking and updating statistics and data.
- We publish new guides, resources, and articles on a weekly basis covering the latest cybersecurity education trends and opportunities related to career development, bootcamps, certifications, and degrees.
Do you know someone who would be a great fit for our expert interview series? Please reach out using the contact form at the bottom of this page.
Cybersecurity is an emerging field with enormous potential and consequences.
According to industry research, and as reported elsewhere on this site (particularly in our Cybersecurity Job Guide), there is a growing need for well-trained cybersecurity experts. In fact, the need is so great that many companies are reporting a talent shortfall.
We have focused on cybersecurity education as the first step in building a much-needed pipeline.
With each academic year, more colleges and universities are adding cybersecurity degree programs. But high-quality information about how all these degree and certification programs have not kept pace. That’s where we come in.
We want this website to serve as a resource for cybersecurity-related educational opportunities. This includes information about cybersecurity degree and certification programs at all levels.
Our goal is to provide the most comprehensive and current information possible.
We work with people across academia and industry to produce the content on this website. We strive to have the most comprehensive listings possible. If you notice a school or program missing from our listings, please email firstname.lastname@example.org or use the contact box below.
Meet the writers
Sam Abdul is a security consultant with over 15 years of experience. He holds bachelor’s degree and master’s degree in computer science from California State of Monterey Bay, and other security certifications. He also provides security expertise for protecting institutional assets and client privacy against cyber threats.
Steven Bowcut, CPP, PSP is editor-in-chief for Brilliance Security Magazine. His 30-year career in the security industry includes work as a security consultant for many private, government, and quasi-government entities. He has published hundreds of articles covering security-related topics and is passionate about security and cybersecurity issues.
Dr. Christine Izuakor is the Founder and CEO of Cyber Pop-up, an on-demand cybersecurity services platform powered by vetted and highly skilled security freelancers. She is a global cybersecurity leader with a decade of experience solving complex cyber challenges at several Fortune 100 companies.
Aireal Liddle is a systems and security administrator with a passion for cybersecurity and writing. As part of her day job, she maintains the security and integrity of her organization’s network and handles all incident and response.
Gray Oshin is a cybersecurity writer and editor with over seven years of experience writing about SaaS, cybersecurity, compliance, and enterprise technology. He holds a Bachelor of Applied Science (BASc) degree from Portland State University and has hundreds of published articles solving complex network engineering challenges at Fortune 500 companies.
Larisa Redins has more than 10 years of experience writing in the tech and cybersecurity space. Some of her notable accomplishments include contributing to MacDirectory Magazine, Risk Management Magazine, DigitalTrends.com, SafetyDetectives.com, MacNewsWorld.com, and LinuxInsider.com.
Howard Poston is a cybersecurity professional by training. He earned a Masters of Cyber Operations at the United States Air Force Institute of Technology (AFIT). He also holds a Certified Ethical Hacker (CEH) certification among other cybersecurity-related certifications.
Hugh Taylor, editor of JournalofCyberPolicy.com, is a Certified Information Security Manager (CISM) who has written about cybersecurity, compliance and enterprise technology for such clients as Microsoft, IBM, SAP, HPE, Oracle, Google and Advanced Micro Devices.
Interested in writing for us? Please drop a line using the contact box below.
Frequently asked questions
- What is Cybersecurity Guide?
Our mission is to be the most comprehensive cybersecurity education website on the internet. It’s no easy task as new cybersecurity degree, bootcamp, certification, and online training programs are being offered every day (or so it seems).
Nonetheless, our goal is to try to provide the most accurate and up-to-date information available. If you have questions or would like to request an update, please use the contact box on this page. We update the site several times a week, and we try to reply to requested information updates within 24 hours.
- What kinds of information will I find on Cybersecurity Guide?
The primary information provided on this site relates to cybersecurity degree programs — including associate’s degrees, bachelor’s degrees, master’s degrees, and PhD degrees — in both online and campus formats.
Additionally, we provide information about professional cybersecurity certification and career opportunities.
- How is this site funded?
Cybersecurity Guide is a product of TriTown Media, an independent media company incorporated in Delaware.
The company’s mission is to present information that is free from bias. Our goal is to present current and accurate information that will have a high value to our readers.
TriTown is committed to building high-quality educational resources around the internet.
To fulfill that mission we do take advertising dollars from reputable marketing companies and we are only interested in working with publishers that partner with leading colleges and universities.
We are transparent in our sponsored content versus organic content. We will never publish an advertisement on our experts’ pages.
We refuse to take money from any special interest groups or any kind of group that is promoting a viewpoint including religious, political, or a particular viewpoint.
We are one hundred percent committed to maintaining this resource as something that is available to everyone. We will never charge a fee for our content. Instead, we will rely on advertising dollars that are aligned with the mission and values outlined above.
- I was contacted to do an expert interview. Now what?
We are constantly reaching out to cybersecurity experts with interview requests. Our goal is simple — rather than recycle the same information found about cybersecurity elsewhere on the internet, we are committed to finding the best and most current information available.
In order for us to do that, we frequently reach out to cybersecurity experts operating at the front lines.
Our expert interviews take a variety of formats, but most likely will happen in the form of a podcast interview that covers each expert’s background, current research or work, advice for today’s cybersecurity students, and a look ahead at industry trends.
Do you know someone who would be a great fit for our cybersecurity expert section? If so, let us know through the contact form below.
Please let us know if you have any feedback or information you would like us to share with our readers.
It’s really important that you fact check and verify tuition rates and admission requirements for all schools and programs. And please let us know if you have any feedback or information you would like us to share with our readers.