Cyber Careers

Job Portals

CyberSeek: To help close the cybersecurity skills gap, CyberSeek provides detailed, actionable data about supply and demand in the cybersecurity job market.

National Initiative for Cybersecurity Careers and Studies (NICCS): NICCS is a ONE-STOP RESOURCE for careers in Cybersecurity.

Cybersecurity Careers: Cybersecurity careers are complex and many roles can be found with banks, retailers and government organizations. Find Degree Programs Now.

DHS Cybersecurity Internship Program: Interns will apply concepts, protocols, and tools acquired through coursework in the real world by working side by side with experts in cybersecurity.

NSA Student Internship Program: The NSA Student Internship Program offers internship positions in several areas, including Operations Research Technology, Cryptanalysis and Signals Analysis, CAE Cyber Operations, and more.

  • Black Hat: Black Hat is a conference that provides security training, consulting, and briefings to hackers, corporations, and government agencies around the world
  • DEF CON: DEF CON is one of the world's largest and most notable hacker conventions, held annually in Las Vegas, Nevada.
  • LayerOne: LayerOne is an information security conference located in Los Angeles, California that features speakers from a diverse background that focus not just on the nuts and bolts of technology but the social impact as well.
  • Engima: The Enigma Conference centers on a single track of engaging talks covering a wide range of topics in security and privacy.

Most cybersecurity classes at Green River are based on Industry Certifications. Some of those certifications include:

  • Cisco CCST Cybersecurity: The Cisco Certified Support Technician (CCST) Cybersecurity certification validates a candidate's skills and knowledge of entry-level cybersecurity concepts and topics, including security principles, network security and endpoint security concepts, vulnerability assessment and risk management, and incident handling.
  • Cisco CCNA: CCNA exam covers networking fundamentals, IP services, security fundamentals, automation and programmability. Designed for agility and versatility, CCNA validates that you have the skills required to manage and optimize today's most advanced networks.
  • Cisco DevNet Associate:  This certification validates your ability to implement basic network applications using Cisco platforms as a base, and to implement automation workflows across network, security, collaboration, and computing infrastructure.
  • CompTIA A+: The CompTIA A+ certification is an entry-level qualification in the information technology (IT) industry
  • CompTIA Cloud+CompTIA Cloud+ shows you have the expertise needed to deploy and automate secure cloud environments and protect mission-critical applications and data.
  • CompTIA Security+CompTIA Security+ is a global certification that validates the baseline skills necessary to perform core security functions and pursue an IT security career.
  • CompTIA Linux+: CompTIA Linux+ validates the competencies required of an early career systems administrator supporting Linux systems.
  • Microsoft Azure Administrator: An Azure administrator often serves as part of a larger team dedicated to implementing an organization's cloud infrastructure. Azure administrators also coordinate with other roles to deliver Azure networking, security, database, application development, and DevOps solutions.
  • Microsoft Security, Compliance, and Identity Fundamentals: This exam is targeted to those looking to familiarize themselves with the fundamentals of security, compliance, and identity (SCI) across cloud-based and related Microsoft services.
  • ISC2 Certified Information Systems Security Professional (CISSP): 

Green River College Cybersecurity 101
(https://www.greenriver.edu/campus/information-security/)
Green River College cybersecurity resources and tools

Cybersecurity Awareness training
(https://learnsecurity.amazon.com)
Keep yourself secure online by taking Amazon's cybersecurity awareness training and learn about cyber risks like phishing and social engineering.

Phishing Quiz: Jigsaw
(https://phishingquiz.withgoogle.com)
Can you spot when you're being phished? Identifying phishing can be harder than you think. Take the quiz to see how you do.

Multifactor Authentication
(https://www.microsoft.com/en-us/security/business/identity-access/azure-active-directory-mfa-multi-factor-authentication)
Multifactor Authentication (MFA) protects you from cybersecurity breaches. ... Safeguard your organization with a seamless identity solution.

Halt bad practices
(https://www.cisa.gov/news-events/news/bad-practices-0)
CISA is developing a catalog of Bad Practices that are exceptionally risky, especially in organizations supporting Critical Infrastructure or NCFs.

CYBERSECURITY BASICS
(https://www.ftc.gov/system/files/attachments/cybersecurity-small-business/cybersecuirty_sb_factsheets_all.pdf)
Knowing some cybersecurity basics and putting them in practice will help you protect your business and reduce the risk of a cyber attack. PROTECT.

Telework Security Basics
(https://www.nist.gov/blogs/cybersecurity-insights/telework-security-basics)
Mar 19, 2020 — Simply enabling the PIN, fingerprint, or facial ID feature will prevent people from getting on your device should you walk away from it.

Keep your computer secure at home
(https://support.microsoft.com/en-us/windows/keep-your-computer-secure-at-home-c348f24f-a4f0-de5d-9e4a-e0fc156ab221)
Tips to protect your computer · Use a firewall · Keep all software up to date · Use antivirus software and keep it current · Make sure your passwords are well- ...

Create and use strong passwords
(https://support.microsoft.com/en-us/windows/create-and-use-strong-passwords-c5cebb49-8c53-4f5e-2bc4-fe357ca048eb)
One of the most important ways to ensure that your online accounts are safe and secure is to protect your passwords. Follow this advice to help keep your accounts out of the wrong hands.