Career Tools

Static Security Certification Progression Chart v7.0

Security Cert Chart

460 IT security certifications arranged on a chart with basic information and links to each certification’s website.
Plan your continuing education path and browse other security domains.

Security Career Roadmap 2022

IT Career Roadmap

A chart of security work roles grouped NICE Framework specialty areas. See what positions typically make and plan your next step.

Most Recent Cyber Book Reviews

The Fifth Domain: A Solid Modern History for 2021

y fSummary The Fifth Domain: Defending Our Country, Our Companies, and Ourselves in the Age of Cyber Threats by Richard A. Clarke and Robert K. Knacke is a follow up to their 2010 novel Cyber War: The Next Threat to National Security and What to Do about It. This...

Rise of the Locusts: Cyber Bait and Switch

Synopsis Rise of the Locusts by Mark Goodwin is the first novel in his Cyber Armageddon series. The series follows a SOC Supervisor at a financial institute from the discovery of a breach through to the shutdown of critical infrastructure in the United States. The...

The Gam3: LitRPG with a little hacking

Synopsis The Gam3 is a 3 book series by the young author Cosimo Yap. The series follows the literary RPG style which blends the conventions of role-playing video games with a science fiction novel. In this style, the main protagonist is interacting with an RPG game...

The Latest

The Fifth Domain: A Solid Modern History for 2021

The Fifth Domain: A Solid Modern History for 2021

y fSummary The Fifth Domain: Defending Our Country, Our Companies, and Ourselves in the Age of Cyber Threats by Richard A. Clarke and Robert K. Knacke is a follow up to their 2010 novel Cyber War: The Next Threat to National Security and What to Do about It. This...

The Fifth Domain: A Solid Modern History for 2021

y fSummary The Fifth Domain: Defending Our Country, Our Companies, and Ourselves in the Age of Cyber Threats by Richard A. Clarke and Robert K. Knacke is a follow up to their 2010 novel Cyber War: The Next Threat to National Security and What to Do about It. This...

Rise of the Locusts: Cyber Bait and Switch

Synopsis Rise of the Locusts by Mark Goodwin is the first novel in his Cyber Armageddon series. The series follows a SOC Supervisor at a financial institute from the discovery of a breach through to the shutdown of critical infrastructure in the United States. The...

The Gam3: LitRPG with a little hacking

Synopsis The Gam3 is a 3 book series by the young author Cosimo Yap. The series follows the literary RPG style which blends the conventions of role-playing video games with a science fiction novel. In this style, the main protagonist is interacting with an RPG game...

Gray Day: How to Catch a Spy

Synopsis Gray Day is a first hand account by the former FBI agent Eric O'Neill on his direct involvement in capturing the Russian mole Robert Hanssen. This story was dramatized in the 2007 movie "Breach". Robert Hanssen was a tech saavy FBI agent who started selling...

Zer0es: A Sci-Fi thriller with a little hacking

Synopsis Zeroes is a technothriller set in mid 2010's that follows fiver hackers with different backgrounds. Two are more traditional skilled hackers while the other three have specialized niches: social engineering, scamming, and an old-school BBS admin. The story...

Dawn of the Code War: The U.S. was innocent, we swear!

My Reaction This novel was a rough read but has some unique insights that make it worth finishing. I personally learned a lot about attacks conducted by the Chinese and Iranian nation states. I had heard of many, but some of the less public ones were interesting to...

The Plot to Hack America: the 2016 Elections

Synopsis (heavy bias) Going into the 2020 elections, I thought it would be good to get some insights on how Russian cyber efforts affected the 2016 elections. The Plot to Hack America: How Putin's Cyberspies and WikiLeaks Tried to Steal the 2016 Election seemed liked...

The Art of Intrusion

Synopsis Kevin Mitnik's follow up to The Art of Deception is a closer look at some famous and not so famous hacks of the 90's. It focuses much more on the logistical and technical side of early hacking. It is again styled as anecdotes from both the author and people...

Security Certification Roadmap October 2020 Update

Feature Updates This year has seen a big rise in popularity of the Security Certification Roadmap. In order to keep the information on there as useful as possible, I have made the following changes: Aligned the columns with (ISC)2 CBK security domainsMoved...

The Art of Deception

Synopsis At the time of my reading, The Art of Deception was 18 years old. It was published in 2001 and covered the career of a hacker that spanned from from the 80's to the turn of the millennium. As such, much of the information on specific technologies and tactics...

Countdown to Zero Day

Synopsis Countdown to Zero Day, by Kim Zetter, is an in depth accounting of how the Stuxnet malware package was developed, discovered, and what impact it had on the world. Kim Zetter gives a behind the scenes peak from the perspective of malware researchers from...

Security Certification Roadmap July 2020 Update

Feature Updates Thanks to word of mouth from Reddit and LinkedIn, the Security Certification Roadmap has become more popular than I expected. Because of this increased traffic, I figured it would be important to make the page presentable. The following "features" are...

Taking Up Serpents: Snakes, why’d it have to be Snakes

Synopsis The follow up to Invasion of Privacy, Taking up Serpents is another techno-thriller in Ian Sutherland's Brody Taylor series. It continues the story of Brody, a white hat hacker this time following up on things that happen in the previous novel. Brody is on...

Dark Territory: The Secret History of Cyber War

Synopsis Dark Territory was an interesting history of how the U.S. government has approached information security from Reagan's era through Obama's presidency. As the title suggests, most of the focus was on the offensive side of cyber. This meant that a majority of...

Invasion of Privacy: Fantasy for Pentesters

Synopsis Invasion of Privacy is Ian Sutherland’s first full novel and a follow up to the short story Social Engineer. While reading Social Engineer is not necessary before picking up Invasion of Privacy, it follows the same protagonist for whom the series is named –...

CyberStorm: A Techno Thriller for the Masses

My Reaction For IT and cyber security professionals, CyberStorm is a decent read that is just techy enough to relate to, but not techy enough to remind you of your day job. Matthew Mather does a good job creating a scenario that is believable. Although I do not think...

The Fifth Domain: A Solid Modern History for 2021

y fSummary The Fifth Domain: Defending Our Country, Our Companies, and Ourselves in the Age of Cyber Threats by Richard A. Clarke and Robert K. Knacke is a follow up to their 2010 novel Cyber War: The Next Threat to National Security and What to Do about It. This...

Rise of the Locusts: Cyber Bait and Switch

Synopsis Rise of the Locusts by Mark Goodwin is the first novel in his Cyber Armageddon series. The series follows a SOC Supervisor at a financial institute from the discovery of a breach through to the shutdown of critical infrastructure in the United States. The...