Everyone now has a stake in the healthy functioning of communications and control networks, in the devices and services dependent on these networks, and by implication, in all the complicated infrastructure required to keep networks, devices, and services operating. There is no simple answer to the question of what cybersecurity is. This is because both … Continue Reading »
That’s great. Berkeley has fantastic resources for your intellectual journey and career. This FAQ offers three pieces of high-level advice, and links to many resources and ideas. First, keep in mind that “cybersecurity” is a relatively ill-defined and quickly changing field. This means that you’ll have to think creatively in order to best develop your … Continue Reading »
Peter W. Singer and Allan Friedman’s Cybersecurity and Cyberwar: What Everyone Needs to Know, is a great place to start. Although already a bit dated, the National Academies’ report At the Nexus of Cybersecurity and Public Policy explains why cybersecurity is important, why it is a wicked problem, and the public policy issues in cybersecurity. … Continue Reading »
In addition to the standard tools provided by your career services department, we recommend a direct-approach strategy. That is, if you find a cybersecurity company that deeply interests you, directly approach them and ask about opportunities. Many startups and smaller companies are too busy to run formal externship programs. They’ll be delighted to hear from … Continue Reading »
Cybersecurity in Context is a three-credit course housed in the School of Law and Information. As such, it is open to law and graduate students, and undergraduates by permission. Based on a course in the I School’s online Masters of Information and Cybersecurity (MICS) program, Cybersecurity in Context is a podium lecture course (with discussion) … Continue Reading »
Many faculty members at Berkeley teach privacy and cybersecurity related courses. Because there is no one single source for course information, you may have to do some digging to find the right match for you. We recommend that you focus on faculty members and investigate their webpages. Keep in mind that in addition to their … Continue Reading »
There are so many. Here are just a few of our favorites that have a focus on policy: Lawfare, Just Security, Krebs on Security, CSO Online, and Schneier on Security.
Luckily for you, dear Berkeley student, the campus has several fantastic resources for learning many of the skills we recommend that you develop. LinkedIn Learning (formerly Lynda.com) is available to the entire Berkeley community and it has good quality online, go-at-your-own-pace courses in the Bash command line, in cybersecurity management, the technical domains of cybersecurity … Continue Reading »
If you work in a security role in the private sector, particularly if you work in one of the 17 areas designated as critical infrastructure, you can join one of the many public-private cybersecurity partnerships. These partnerships are a key place where knowledge transfer happens in cybersecurity. Many of these groups are coordinated by law … Continue Reading »
The Future of Cybersecurity Reading Group (FCRG) is a discussion seminar that examines contemporary scholarship and policy entrepreneurship in cybersecurity. Hosted by the Law and Information Schools, FCRG is open to enrollment for all law, graduate, and undergraduate students. In our weekly discussions, students explore cybersecurity from different disciplinary perspectives, and with different depths of … Continue Reading »
There are many options available for technical training. Here are a few suggestions. TryHackMe has excellent labs to build skills. Jetbrains offers free access to its coding and other teaching modules to those who have a university email account. The Federal Virtual Training Environment (FedVTE) provides free online cybersecurity training to U.S. government employees, Federal … Continue Reading »
We hear this question regularly and we are certain that many other students don’t even ask because they do not see cybersecurity as a field with a place for them. The answer is yes! There is a place for you. At the same time, a number of barriers can make the cybersecurity field unwelcoming to … Continue Reading »
WISP: Women in Security & Privacy has many Berkeley alumna and provides meaningful mentoring opportunities and interesting programming The Mozilla Foundation has a major commitment to privacy and security of its users, and sponsors a mailing list of privacy events. The Bay Area chapter of the Open Web Application Security Project (OWASP) organizes meetups. SF … Continue Reading »
San Francisco is home to one of the biggest industry conferences on cybersecurity: RSA. This is a massive event that is great for networking, and it has a student event known as College Day. We regularly receive free RSA passes for enrolled students, so check in with us about it. CLTC also maintains a RSA … Continue Reading »
Many podcasts cover cybersecurity. Some of our favorites are Darknet Diaries, Steptoe’s Cyberlaw podcast, Cyber from the Start by CSIS:, CSIS Cybersecurity and Technology, Beers with Talos, Rational Security, Privacy, Security & OSINT Show, and Berkeley Technology Law Journal (student podcast).