Which Cybersecurity career path are you interested in pursuing?
Choose your own adventure. Pick a guided path, build a custom path, discover something random, find the best path for a specific role, or hunt for the most respected credentials.
NIST Cybersecurity & AI Glossary
10,000+ terms from CSRC and the Trustworthy AI Resource Center
MITRE Common Weakness Enumeration
Software & hardware weakness catalog from MITRE
MITRE CAPEC — Common Attack Pattern Enumeration
Attack pattern catalog from MITRE
Notable Cybersecurity Conferences
Major annual conferences that shape the cybersecurity industry — from hacker conventions to cloud vendor summits, academic research to governance leadership
Dates are approximate and based on historical scheduling. Check official sites for current year dates.
Exploit-DB Google Hacking Database
GHDB dork categories mapped to CWE weakness classes — real-world reconnaissance tradecraft
NVD Threat Landscape Pulse
Recent CVEs across all cached weakness classes, sorted by severity — with CISA KEV flags
Lightcast Skills Taxonomy
Labor market skill demand data mapped across all 23 career paths
CISA Known Exploited Vulnerabilities Catalog
Vulnerabilities with known active exploitation — mandatory remediation for federal agencies
Threat Modeling Reference
Methodologies, tools, and guides for systematic threat identification and risk assessment
Cybersecurity White Papers & Reference Architecture
Curated collection of foundational and current white papers from NIST, OWASP, CISA, CSA, and industry leaders
NIST Frameworks & Implementation Guides
Authoritative Special Publications, frameworks, and quick-start guides from the National Institute of Standards and Technology
MITRE ATT&CK Enterprise
Adversary tactics, techniques, and procedures (TTPs) cataloged across the enterprise attack lifecycle
Resume Optimizer
Paste your resume to analyze skill gaps against cybersecurity career paths and labor market demand
🔒 Your resume is analyzed entirely in your browser. No resume text is stored, transmitted, or logged. Only skill names you choose to save are kept in your browser's local storage.
Industry Threat & Breach Reports
Annual and periodic threat intelligence publications from leading security vendors and government agencies
Community & Support Organizations
Professional associations, support organizations, mentorship programs, and peer communities advancing cybersecurity careers