This page is a non-exhaustive list of resources that I found helpful or have been recommended by trusted sources on my own security journey. I put this together because I often have a lot of folks DM me to know some ways they can become more familiar with “cybersecurity.” This is not a curriculum or guide.  I called this Learn Cyber because most would agree that “cybersecurity” is an umbrella term and these are resources to “learn” from- but it’s important to note that the meaning of words are always evolving so I also put a little vocab list below of some words I’ve seen frequently used over the last couple weeks in regards to protesting, safety, accountability, and intelligence gathering. Below are mostly beginner resources for technical familiarity, however please know the security industry is a vast field that is not exclusive of critical non-technical roles like marketing and sales which also deserve to be explored. If you have anything you think should be added feel free to let me know as I hope to modify and organize this over time when possible 🙂


cybersecurity: refers to the body of technologies, processes, and practices designed to protect networks, devices, programs, and data from attack, damage, or unauthorized access. (digitalguardian.com)

information security: the state of being protected against the unauthorized use of information, especially electronic data, or the measures taken to achieve this. (wikipedia)

information technology: the study or use of systems (especially computers and telecommunications) for storing, retrieving, and sending information. (wikipedia)

surveillance: the monitoring of behavior, activities, or information for the purpose of information gathering, influencing, managing or directing. (wikipedia)

privacy: the state or condition of being free from being observed or disturbed by other people. (oxford)

information privacy: the relationship between the collection and dissemination of data, technology, the public expectation of privacy, legal and political issues surrounding them. It is also known as data privacy or data protection. (wikipedia)

psyops: psychological operations are operations to convey selected information and indicators to audiences to influence their emotions, motives, and objective reasoning, and ultimately the behavior of governments, organizations, groups, and individuals.(wikipedia)

hacker: somebody who is interested in breaking things apart and then figuring out how to put them back together (@racheltobac)


We are so often conditioned to think of security in digital spaces as corporate-focused. However, individuals also have a personal threat model and for marginalized communities it’s important to understand how identities viewed through the lens of an algorithm can be an impact to someone’s safety and security. The books below illustrate this in ways that are digestible for both technical and non-technical people.

Thanks in part to Google for their support of this resource page.