Skip to main content

Blog: Cybersecurity

A team of three information security professionals work on computer devices in a server room.
Cybersecurity

Information Security vs. Cybersecurity: What's the Difference?

What does it take to protect companies from data breaches? Whether you go into information security or cybersecurity, these skills are in high demand.
Read more
A penetration tester types code into a laptop.
Cybersecurity

How to Become a Penetration Tester

Cybersecurity experts are needed to find exploits in businesses’ systems. Learn how to become a penetration tester and protect companies with “ethical hacking.”
Read more
The hands of a cybersecurity analyst type in firewall information on a laptop.
Cybersecurity

How to Become a Cybersecurity Analyst

Businesses without adequate security are targets for cyberattacks. Discover how to become a cybersecurity analyst, and enter one of today’s hottest fields.
Read more
A cybersecurity analyst uses a laptop.
Cybersecurity

7 Types of Cybersecurity You Should Know

Because cyber threats come in many forms, so does cybersecurity. Find out about seven types of cybersecurity and the different ways they protect networks.
Read more
Working at night with coffee cup
Cybersecurity

Cybersecurity Horror Stories to Tell In the Dark

In this spirit of Halloween, we’ve created 5 hypothetical horror stories to help inform, entertain, and inspire you to secure your data this season and beyond. Read on to learn how cybersecurity best practices can help you prevent a harrowing tale of your own this Halloween.
Read more
Student with laptop in public place
Cybersecurity

Internet Security Tips for the Back-to-School Season

Between extended time away from home, seasonal sales, and the long Labor Day weekend, the back-to-school season in the U.S. is a great time to ensure your accounts, devices, and data are protected.
Read more

Ready to jumpstart a career in cybersecurity?

Learn the skills you need to fight cybercrime with Fullstack Academy's part-time and full-time bootcamp programs

Spam folder email screen
Cybersecurity

Most Common Phishing Lures in Every State

We explored the most common phishing lures in each U.S. state, as well as the most commonly impersonated organizations in digital scams.
Read more
How to Use OSINT Tools
Cybersecurity

Cyber Bootcamp Student Project: How to Use OSINT Tools

Cybersecurity Bootcamp students learn by doing throughout the project-based curriculum. Watch an example of a completed cybersecurity bootcamp capstone project about open-source intelligence tools.
Read more
Cybersecurity Student Projects Uni version
Cybersecurity

Cybersecurity Bootcamp Student Projects: Mitigating Cyberthreats

Cybersecurity bootcamp students complete a Capstone Project to demonstrate what they’ve learned and offer real-world solutions to potential cyberattacks. Watch a few cybersecurity projects completed and presented by bootcamp students.
Read more
Alumni Story Overcoming Imposter Syndrome to Pursue a Cyber Career
Cybersecurity

Overcoming Imposter Syndrome to Pursue a Cyber Career

Although he enrolled with limited tech experience and skills, Virginia Tech Cybersecurity Bootcamp graduate Kelly Johnson is now confident in his job readiness. Follow his journey.
Read more
Alumni Story From Beginner to Cybersecurity Analyst
Cybersecurity

From Beginner to Cybersecurity Analyst: Kennedy Arnold's Journey with Virginia Tech

Kennedy Arnold is a graduate of the Virginia Tech Cybersecurity Bootcamp who successfully transitioned from beginner to job-ready Cybersecurity professional. Here's her journey of achieving career success through the bootcamp.
Read more
Meet a Cybersecurity Instructor
About Tech Bootcamp

Meet a Cybersecurity Instructor: Josh Mann Shares Industry Insights

Cybersecurity Instructor Josh Mann shares his insights on how to succeed in bootcamp and beyond.
Read more