Category: FAQ

  • I’m new to cybersecurity. What should I read and listen to?

    By

    in

    Peter W. Singer and Allan Friedman’s Cybersecurity and Cyberwar: What Everyone Needs to Know, is a great place to start. Although already a bit dated, the National Academies’ report At the Nexus of Cybersecurity and Public Policy explains why cybersecurity is important, why it is a wicked problem, and the public policy issues in cybersecurity.…

  • How can I find externships and internships?

    By

    in

    In addition to the standard tools provided by your career services department, we recommend a direct-approach strategy. That is, if you find a cybersecurity company that deeply interests you, directly approach them and ask about opportunities. Many startups and smaller companies are too busy to run formal externship programs. They’ll be delighted to hear from…

  • What is cybersecurity?

    By

    in

    Everyone now has a stake in the healthy functioning of communications and control networks, in the devices and services dependent on these networks, and by implication, in all the complicated infrastructure required to keep networks, devices, and services operating. There is no simple answer to the question of what cybersecurity is. This is because both…

  • What is Cybersecurity in Context and should I take it?

    By

    in

    Cybersecurity in Context is a three-credit course housed in the School of Law and Information. As such, it is open to law and graduate students, and undergraduates by permission.  Based on a course in the I School’s online Masters of Information and Cybersecurity (MICS) program, Cybersecurity in Context is a podium lecture course (with discussion)…

  • What Berkeley courses and labs are focused on cybersecurity?

    By

    in

    Many faculty members at Berkeley teach privacy and cybersecurity related courses. Because there is no one single source for course information, you may have to do some digging to find the right match for you. We recommend that you focus on faculty members and investigate their webpages. Keep in mind that in addition to their…

  • What websites should I check out?

    By

    in

    There are so many. Here are just a few of our favorites that have a focus on policy: Lawfare, Just Security, Krebs on Security, CSO Online, and Schneier on Security.

  • What resources for improving my skills are available to me as a Berkeley student?

    By

    in

    Luckily for you, dear Berkeley student, the campus has several fantastic resources for learning many of the skills we recommend that you develop.  LinkedIn Learning (formerly Lynda.com) is available to the entire Berkeley community and it has good quality online, go-at-your-own-pace courses in the Bash command line, in cybersecurity management, the technical domains of cybersecurity…

  • So you’re interested in studying or pursuing a career in cybersecurity and privacy?

    By

    in

    That’s great. Berkeley has fantastic resources for your intellectual journey and career. This FAQ offers three pieces of high-level advice, and links to many resources and ideas.  First, keep in mind that “cybersecurity” is a relatively ill-defined and quickly changing field. This means that you’ll have to  think creatively in order to best develop your…

  • How can I get involved with a public-private cybersecurity partnership?

    By

    in

    If you work in a security role in the private sector, particularly if you work in one of the 17 areas designated as critical infrastructure, you can join one of the many public-private cybersecurity partnerships. These partnerships are a key place where knowledge transfer happens in cybersecurity. Many of these groups are coordinated by law…

  • What is the FCRG and why should I take it?

    By

    in

    The Future of Cybersecurity Reading Group (FCRG) is a discussion seminar that examines contemporary scholarship and policy entrepreneurship in cybersecurity. Hosted by the Law and Information Schools, FCRG is open to enrollment for all law, graduate, and undergraduate students. In our weekly discussions, students explore cybersecurity from different disciplinary perspectives, and with different depths of…