Hack Your CyberSecurity Career!

Women CyberSecurity Society
Women CyberSecurity Society
  • Sign In
  • Create Account

  • Bookings
  • My Account
  • Signed in as:

  • filler@godaddy.com


  • Bookings
  • My Account
  • Sign out

Signed in as:

filler@godaddy.com

  • Home
  • Contact
  • Donate
  • Subscribe
  • About
    • Board of Directors
    • Announcements
    • Cybersecurity FAQ's
    • Partner With Us
  • Programs
    • Membership
  • Shop
  • Industry Resources
  • Get Involved
    • Inspiring Women in Cyber
    • Join a Chapter
    • Workforce Directory
    • Volunteer
    • Sponsorship
    • Partners
  • Policies
    • Policies

Account


  • Bookings
  • My Account
  • Sign out


  • Sign In
  • Bookings
  • My Account
Canadian Centre for Cyber Security. Career Guide and resources for students.

CyberSecurity Career Guide for Students

Today’s cyber security professionals know that the best solutions come from diverse teams. Having people of different backgrounds and experiences working together on a problem creates the best, most effective solutions.


  • Types of careers
  • Who is hiring?
  • Career pathways
  • Cyber security education

Learn more

(ISC)² Pledges One Million FREE Certified in Cybersecurity

See yourself in cybersecurity. You don’t need experience — just the passion and drive to enter a demanding and rewarding field, one that opens limitless opportunities worldwide.

To help close the cybersecurity workforce gap and diversify (ISC)² is offering FREE training and certification to one million people.

Find out more

Cyber Threat Maps

Stay Safe From Gender-Based Online Violence & Hate

Cybersecurity For older Adults

Examine these cybersecurity threat maps to see where the latest attacks are happening live.

Learn more

Cybersecurity For older Adults

Stay Safe From Gender-Based Online Violence & Hate

Cybersecurity For older Adults

Digital Safety for Older Adults is a one-hour presentation filled with tops and tools to protect yourself and loved ones from becoming a victim to cybercrime and online fraud. 

Learn more

Stay Safe From Gender-Based Online Violence & Hate

Stay Safe From Gender-Based Online Violence & Hate

Stay Safe From Gender-Based Online Violence & Hate

  1. Enable 2-factor authentication for email and social media accounts.
  2. Use a password manager
  3. Never provide your personal information to strangers...

Learn more

Ride Sharing Safety for Women

Ride Sharing Safety for Women

Stay Safe From Gender-Based Online Violence & Hate

With the advent of ride sharing services like Uber and Lyft, the environment for sexual assault happening is increasing. Check out this comprehensive guide on how to stay safe and options in case it happens.

Learn more

Scholarships

Ride Sharing Safety for Women

Security Domains

Learn more about industry and women in cybersecurity scholarships from various sources.

Learn more

Security Domains

Ride Sharing Safety for Women

Security Domains

Learn about the 8 domains of cybersecurity.

Learn more

Hacker News

Security Roles

Hacker News

Keep up to date with latest attacks, data breaches and security news!

Learn more

Tools

Security Roles

Hacker News

The Center For Internet Security offers   a variety of tools, memberships, and services to help organizations around the world start secure and stay secure. 

Learn more

Security Roles

Security Roles

Security Roles

Learn more about the various types of security roles.  Technical and non-technical.

Learn more

Jobs

FREE Cybersecurity Training & Certifications

Security Roles

Browses some of the latest jobs across Canada, USA and the UK.

Learn more

Research

FREE Cybersecurity Training & Certifications

FREE Cybersecurity Training & Certifications

Read about the latest research of women in cybersecurity around the globe.  

Learn more

FREE Cybersecurity Training & Certifications

FREE Cybersecurity Training & Certifications

FREE Cybersecurity Training & Certifications

Cybersecurity For Kids

Cyber Learning Hub

Google

AWS

Cisco

SANS

Qualys

Splunk

OWASP

Cybrary

Udemy

Coursera

EdX

DataCamp

ICS2

Learn more

Stay Safe From Gender-Based Online Violence & Hate

Enable 2-factor authentication for email and social media accounts

Google Authenticator is a free app that can be used to help you setup multi-factor authentication for all your email and social media accounts. This provides a second layer of security as you confirm who you are before gaining access to your accounts.

Block People You don't Want To Interact With

Several sites and services offer free blocking services.  Including email programs which allows the user to block senders or  mark  emails as Spam or Junk  so the emails don't land in your Inbox.  For an example, see

how to block an email address using Gmail.

Use a password manager

Password managers like LastPass, 1Password, KeyPass (free) all help you organize your passwords and stores them securely in one location. You literally have to remember one password to access all your accounts securely.  


For additional information on password management, visit here or The Canadian Centre for Cyber Security. 

Never provide your personal information to strangers.

Cyber criminals use several methods that include Phishing (email), Smishing (text) and Vishing (phone) to trick users into handing over personal and corporate information. Instead of answering questions via these methods reach out to the business directly from a known phone number or person your trust. Remember, emails, and phone numbers are easily spoofed.

Never share sexually explicit images

Customers have questions, you have answers. Display the most frequently asked questions, so everybody benefits.

Use a VPN to maintain your privacy

Have you opened a new location, redesigned your shop, or added a new product or service? Don't keep it to yourself, let folks know.

Don't reuse or share passwords

All too often people reuse and share their passwords because it's easy to remember and have someone as backup in case you forget. However, that is not recommended as passwords and accounts are often compromised online without your knowledge. Sign up or visit HaveIBeenPwned to check if your email has been compromised. If so, reset your password immediately and use a strong complex password.

Disconnect and cover webcams when not in use

A current trend by cyber criminals is to hack a persons video camera to spy on them or take pictures which they may use to harass and victimize later for financial profit. 

Never meet online acquaintances alone

If you've met someone online and would like to connect in person,  bring along a trusted friend and meet in a public place. In these circumstances, it's best to tell a second person who you are meeting and where.

Staying Safe Online

FREE On-Demand 1.5 hr. self paced learning - Cyber Security Best Practices for Kids

Insight into cybersecurity attacks and tips and tricks that will keep you safe in your online interactions. 

Find out more

DIVERSITY HIRING 101

5 Tips To A Successful Diversity Program

  • Buy-In From The Top
  • Develop A Policy
  • Get Everyone on Board
  • Set Measurable Goals
  • Audit Your Program

Download PDF

Cybersecurity For Beginners - 3 Part Series

Part 1 What is Cybersecurity - Cybersecurity For Beginners (pdf)Download
Part 2 History of Cybersecurity - Cybersecurity For Beginners (pdf)Download
Part 3 Cybersecurity Basics - Cybersecurity For Beginners (pdf)Download

Useful Links

How to Start a New Career in Cybersecurity

National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework

How to Start a New Career in Cybersecurity

Read our blog from 2020 to learn about cybersecurity and how to transition or advance your career in the industry.  


Read

NICCS Career Pathways

National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework

How to Start a New Career in Cybersecurity

 https://niccs.us-cert.gov/workforce-development/cyber-career-pathways

National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework

National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework

National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework

https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-181.pdf?trackDocs=NIST.SP.800-181.pdf  

Frequently Asked Questions

Please reach us at contact@womencybersecuritysociety.org if you cannot find an answer to your question.

Many avenues exist to start a career in cybersecurity. Below are a few tips to get you started.


Firstly, you need to determine if you'd like to go the traditional or non-traditional route. 


Traditional schooling takes a long time, is more expensive, mostly onsite and you may graduate finding the information you learned is outdated and you don't feel ready for the job market. However, there's a lot to be said for the strong foundations which you'll have time to absorb which includes networking and protocols that you'll use your entire career. 


There is a plethora of non-traditional trainings available which grow daily. However, be choosy and do your research before jumping in. The upside is flexibility, reduced time with micro-credentials, lower cost and remote learning options for 24/7 learning environments. 


Check out our WCS2 Pro Membership which offers advanced access to two 24/7 learning platforms where you get to decide what, when and where you learn.  


Yes, you can begin a career in cybersecurity without a technical background.  There are several domains to choose from that aligns with your interests and goals. 


No, there are two pathways to begin a career in cybersecurity; technical or non-technical. You can begin your career focusing on governance and begin as an auditor, sales engineer, project manager, account executive and more.


Non-technical learning opportunities that focus on governance, compliance, privacy, policy and risk.  Check out a few of these regulations to learn more: 

  • PCI DSS (Payment Card Industry Data Security Standard)
  • SOX/C-SOX (Sarbanes-Oxley)
  • PIPEDA (Personal Information Protection and Electronic Documents Act)
  • FOIP (Freedom of Information & Protection of Privacy)
  • GDPR (General Data Protection Regulation)

Other more technical frameworks include:

  • ISO27001
  • NIST Cybersecurity Framework
  • CMMC


Click here to learn more.





Scholarship Information

WCS2 Scholarships

The Women CyberSecurity Society offers annual membership scholarships throughout the year. The may include mentoring as well as an All-Inclusive PRO Membership.  These scholarship offerings are posted online through social media and in our nonprofit newsletter. 


Create a free account, subscribe to receive updates and follow us on social media to be notified of future promotions.

international women in Cyber Day Scholarships

The International Women in Cyber Day Scholarships are offered in September, during the IWCD Symposium.  On September 15, 2021, twenty scholarships were awarded to women and underrepresented individuals to obtain Security+ training and certifications totaling in excess of $40,000.


Create your free account on the International Women in Cyber Day website to receive updates.

Subscribe

Academic Scholarships

Coming soon!

Industry Scholarships

Coming soon!

Scholarship Scams

Scholarship scams take advantage of students looking to help fund their education. We reveal how to spot and avoid common scholarship scams, as well as what to do if you've been caught out by one.

Find out more

scholarship FAQs

Commonly asked questions about applying for and accepting a scholarship.  More details coming soon!

Threat Hunting Basics

Cyber Threat Kill Chain (png)

Download

WCS2 Introduction to Threat Hunting Workshop Presentation (pdf)

Download

FireEye Analysis Tools Logos (png)

Download

Threat Hunting Trojan Horse Behavior Map

Threat Heat Maps

Copyright © 2018-2022 Women CyberSecurity Society Inc. |  All Rights Reserved

  • Contact
  • Donate
  • Subscribe
  • Events
  • Blog
  • Policies

Cookie Policy

This website uses cookies. By continuing to use this site, you accept our use of cookies.

DeclineAccept