Cybersecurity tracks

Compare the cybersecurity paths CyberPath can match users into.

Each card explains who the domain fits, what the work looks like, the skills it rewards, and where a beginner can start. Use search, category filters, and beginner mode to narrow the field.

Product Security

Application Security

Help product teams ship features that are secure by design, not patched at the end.

Who this fits

Great for people who like software, product thinking, APIs, authentication, and partnering with builders instead of working in isolation.

Difficulty

Beginner friendly with coding interest

Typical tasks

Review authentication, session, and API designs before features launch
Translate common vulnerability themes into secure engineering guidance

Starter modules

Secure Coding Foundations

Build the mental model behind secure product work.

Application Review Workflow

Learn how security reviews fit into product delivery.

Platform Security

Cloud Security

Protect cloud platforms, identities, and infrastructure patterns before misconfigurations become incidents.

Who this fits

Best for people who are curious about cloud platforms, infrastructure diagrams, identity, permissions, and the relationship between reliability and security.

Difficulty

Technical and infrastructure-oriented

Typical tasks

Review cloud architectures for risky trust relationships and weak access controls
Improve IAM, secrets, and infrastructure standards across environments

Starter modules

Cloud Security Core Concepts

Build a foundation in infrastructure thinking.

Guardrails and Platform Safety

Learn how cloud security gets operationalized.

Engineering

Security Engineering

Build the internal systems, automations, and guardrails that make security durable across the company.

Who this fits

A strong fit for people who enjoy coding, workflows, platform thinking, and building reliable systems that make the whole organization safer.

Difficulty

Technical and builder-heavy

Typical tasks

Design internal tooling for risk detection, workflows, or review automation
Create secure defaults that improve developer and operator experience

Starter modules

Security Systems Thinking

Understand how engineering work turns policy into productized controls.

Automation and Guardrails

Learn the mechanics of reducing repetitive security work.

Operations

SOC / Blue Team

Monitor, triage, and improve defensive visibility so suspicious activity gets caught early.

Who this fits

Ideal for people who like monitoring, pattern recognition, calm decisions under time pressure, and making noisy signals easier to understand.

Difficulty

Fast-paced and analytical

Typical tasks

Review alerts and determine what is real, urgent, or likely noise
Improve detection logic and escalation quality over time

Starter modules

Blue Team Foundations

Start with the mental model behind defensive monitoring.

Detection and Visibility

Learn what makes visibility practical, not just noisy.

Incident Response

DFIR

Reconstruct incidents, preserve context, and help teams understand what happened and what to do next.

Who this fits

A strong fit for people who enjoy investigations, timelines, evidence, and careful reasoning more than speculation or rapid-fire feature work.

Difficulty

Analytical and investigation-heavy

Typical tasks

Build incident timelines from available evidence and system context
Support containment decisions with clear technical findings

Starter modules

Incident Response Foundations

Build the vocabulary and process for response work.

Timeline and Root-Cause Analysis

Learn how responders turn fragments into a coherent story.

Research

Threat Intelligence

Connect external trends, adversary behavior, and internal context so teams focus on what matters most.

Who this fits

Great for people who love research, context gathering, written analysis, and answering ‘what does this mean for us?’ with evidence.

Difficulty

Analytical and research-oriented

Typical tasks

Research relevant threat activity and summarize likely business impact
Track patterns across incidents, campaigns, or industry changes

Starter modules

Threat Intelligence Cycle

Learn how raw information becomes something teams can act on.

Operationalizing Intelligence

Make intelligence useful to blue teams, leaders, and risk owners.

Governance

GRC / Policy / Risk / Compliance

Turn security expectations into policies, controls, risk decisions, and audit-ready clarity.

Who this fits

A strong choice for people who like structure, frameworks, documentation, stakeholder work, and making complex requirements manageable.

Difficulty

Structured and communication-heavy

Typical tasks

Run risk discussions and document realistic mitigation plans
Map controls to policies, frameworks, and operating evidence

Starter modules

Risk and Governance Foundations

Understand the operating model behind governance work.

Frameworks Without the Jargon Trap

Learn how to use standards as tools instead of checklists.

Human-Centered Security

Security Awareness / Human Factor

Improve how people understand, trust, and act on security through education, behavior design, and program feedback.

Who this fits

Excellent for people who enjoy communication, learning design, psychology, storytelling, and helping others change behavior without fear tactics.

Difficulty

Beginner friendly and communication-led

Typical tasks

Create training, campaigns, and clear guidance that people can actually use
Measure where confusion or risky habits are showing up

Starter modules

Human-Centered Security Basics

Learn how people and systems influence each other.

Designing Awareness Programs

Build a program that feels useful instead of mandatory.

Offensive Simulation

Penetration Testing / Red Team

Safely simulate attacker thinking in authorized environments to validate where defenses and assumptions break down.

Who this fits

Best for people who enjoy curiosity, systems exploration, technical challenge, and translating security weaknesses into clear remediation guidance.

Difficulty

Technical and lab-oriented

Typical tasks

Assess how controls hold up inside approved test scopes and lab environments
Document realistic attack paths without drifting into vague fear or unsafe advice

Starter modules

Authorized Testing Foundations

Understand the purpose and boundaries of offensive simulation.

Testing Workflow Basics

Learn the phases of structured assessment work.

Privacy

Privacy / Data Protection

Help organizations collect, use, retain, and protect data responsibly across products and operations.

Who this fits

A strong fit for people who care about data use, customer trust, documentation, and how legal, product, and security teams align around responsible choices.

Difficulty

Structured and cross-functional

Typical tasks

Map where sensitive data is collected, stored, and shared
Support privacy reviews for new features and business changes

Starter modules

Privacy Foundations

Start with the principles behind responsible data use.

Privacy Reviews in Product Work

Learn how privacy shows up during real decisions.