Cybersecurity tracks
Compare the cybersecurity paths CyberPath can match users into.
Each card explains who the domain fits, what the work looks like, the skills it rewards, and where a beginner can start. Use search, category filters, and beginner mode to narrow the field.
Product Security
Application Security
Help product teams ship features that are secure by design, not patched at the end.
Who this fits
Great for people who like software, product thinking, APIs, authentication, and partnering with builders instead of working in isolation.
Difficulty
Beginner friendly with coding interest
Typical tasks
Starter modules
Secure Coding Foundations
Build the mental model behind secure product work.
Application Review Workflow
Learn how security reviews fit into product delivery.
Platform Security
Cloud Security
Protect cloud platforms, identities, and infrastructure patterns before misconfigurations become incidents.
Who this fits
Best for people who are curious about cloud platforms, infrastructure diagrams, identity, permissions, and the relationship between reliability and security.
Difficulty
Technical and infrastructure-oriented
Typical tasks
Starter modules
Cloud Security Core Concepts
Build a foundation in infrastructure thinking.
Guardrails and Platform Safety
Learn how cloud security gets operationalized.
Engineering
Security Engineering
Build the internal systems, automations, and guardrails that make security durable across the company.
Who this fits
A strong fit for people who enjoy coding, workflows, platform thinking, and building reliable systems that make the whole organization safer.
Difficulty
Technical and builder-heavy
Typical tasks
Starter modules
Security Systems Thinking
Understand how engineering work turns policy into productized controls.
Automation and Guardrails
Learn the mechanics of reducing repetitive security work.
Operations
SOC / Blue Team
Monitor, triage, and improve defensive visibility so suspicious activity gets caught early.
Who this fits
Ideal for people who like monitoring, pattern recognition, calm decisions under time pressure, and making noisy signals easier to understand.
Difficulty
Fast-paced and analytical
Typical tasks
Starter modules
Blue Team Foundations
Start with the mental model behind defensive monitoring.
Detection and Visibility
Learn what makes visibility practical, not just noisy.
Incident Response
DFIR
Reconstruct incidents, preserve context, and help teams understand what happened and what to do next.
Who this fits
A strong fit for people who enjoy investigations, timelines, evidence, and careful reasoning more than speculation or rapid-fire feature work.
Difficulty
Analytical and investigation-heavy
Typical tasks
Starter modules
Incident Response Foundations
Build the vocabulary and process for response work.
Timeline and Root-Cause Analysis
Learn how responders turn fragments into a coherent story.
Research
Threat Intelligence
Connect external trends, adversary behavior, and internal context so teams focus on what matters most.
Who this fits
Great for people who love research, context gathering, written analysis, and answering ‘what does this mean for us?’ with evidence.
Difficulty
Analytical and research-oriented
Typical tasks
Starter modules
Threat Intelligence Cycle
Learn how raw information becomes something teams can act on.
Operationalizing Intelligence
Make intelligence useful to blue teams, leaders, and risk owners.
Governance
GRC / Policy / Risk / Compliance
Turn security expectations into policies, controls, risk decisions, and audit-ready clarity.
Who this fits
A strong choice for people who like structure, frameworks, documentation, stakeholder work, and making complex requirements manageable.
Difficulty
Structured and communication-heavy
Typical tasks
Starter modules
Risk and Governance Foundations
Understand the operating model behind governance work.
Frameworks Without the Jargon Trap
Learn how to use standards as tools instead of checklists.
Human-Centered Security
Security Awareness / Human Factor
Improve how people understand, trust, and act on security through education, behavior design, and program feedback.
Who this fits
Excellent for people who enjoy communication, learning design, psychology, storytelling, and helping others change behavior without fear tactics.
Difficulty
Beginner friendly and communication-led
Typical tasks
Starter modules
Human-Centered Security Basics
Learn how people and systems influence each other.
Designing Awareness Programs
Build a program that feels useful instead of mandatory.
Offensive Simulation
Penetration Testing / Red Team
Safely simulate attacker thinking in authorized environments to validate where defenses and assumptions break down.
Who this fits
Best for people who enjoy curiosity, systems exploration, technical challenge, and translating security weaknesses into clear remediation guidance.
Difficulty
Technical and lab-oriented
Typical tasks
Starter modules
Authorized Testing Foundations
Understand the purpose and boundaries of offensive simulation.
Testing Workflow Basics
Learn the phases of structured assessment work.
Privacy
Privacy / Data Protection
Help organizations collect, use, retain, and protect data responsibly across products and operations.
Who this fits
A strong fit for people who care about data use, customer trust, documentation, and how legal, product, and security teams align around responsible choices.
Difficulty
Structured and cross-functional
Typical tasks
Starter modules
Privacy Foundations
Start with the principles behind responsible data use.
Privacy Reviews in Product Work
Learn how privacy shows up during real decisions.