Cyber Unity Learning

Cyber Unity Learning

Some Background


Diversity in Cybersecurity

Cybersecurity professionals have always had diverse backgrounds, and that isn't changing. More than half of today's cyber talent comes from backgrounds outside of Information Technology (IT). Backgrounds outside of IT are more common for Gen Z and Millennials in the cybersecurity workforce; only 38% of younger generations transitioned from IT, compared to 53% of Gen X and Baby Boomers. This indicates that cybersecurity is becoming better understood as a career opportunity for younger workers and students, but more effort is needed to ensure this broad and nuanced profession is less reliant on IT as the predominant pathway.

Reducing the Workforce Shortage

To reduce workforce in cybersecurity there needs to be more investments and community involvement in providing Innovative cybersecurity training. Starting at the high school level and expanding to include a broader educational base of Historically Black Colleges or Universities (HBCUs), Minority-Serving Institutions (MSIs), Community Colleges, and all 50 states and U.S. Territories.

We are Cyber Unity

National Initiative for Cybersecurity Education (NICE)


We plan to establish an online community using cloud services such as Microsoft 365, Amazon Web Services where we can share and plan to release training curriculum that teaches candidates how to conduct cybersecurity jobs with specific focus on defensive cyber space operations. We are currently evaluating the best platform to use for this concept that minimizes development time while ensuring that progress across discrete subject areas can be measured, tracked, and reported.

We then plan to use live events to allow candidates to unify and participate in the defense or attack of test infrastructure we will build. All of this leads to a measured test (based on age and skill level) against the NICE Framework for a certification in a skill area or work role of their choice resulting in an actual certification showing they successfully can perform their job role(s) leading to expedited hiring for a cybersecurity job function at a partner organization who believes in our approach. We believe this will require either a twelve (12) or twenty-four (24) month commitment from the individual to complete the process as we describe in the next section. While our initial interest targets individuals and young adults in high school or college (ages 14 – 20), ultimately, we are interested in bringing opportunities to under privileged individuals in low-income areas especially those who do not have daily access to technology at home or at school.

Read more

Innovative Cybersecurity Training Initiative


RX5 and CyberPoint would like to introduce you to an Innovative Cybersecurity Training Initiative–Cyber Unity.

Cyber Unity

Cyber Unity is defined as:

1a) the unification of any, and all motivated individuals as a global group to learn about defensive cyber operations through hands-on, real-world activities.

1b) a multi-step cybersecurity education approach using the NICE framework to prepare an individual for work in defensive cyber operations for a participating company regardless of their education status, location, or income.

2) a certification path for individuals who wish to pursue defensive cyber operations as a career path especially those individuals who cannot afford commercial certifications or secondary education.
CyberPoint has conducted (and continues to execute) more than 1 million Defensive Cyber Operations (DCO) for their customers ranging from digital forensics to penetration testing, vulnerability scanning, open-source intelligence, and dark web crawling. Over the last thirteen (13) years across ten (10) countries, our teammates report observing the same two (2) facts:

1) Customers that need cybersecurity expertise but cannot afford it outnumber those whose budgets can afford the yearly or quarterly cost easily by more than 30 to 1.

2) Educational Institutions do not impart real-world skills to graduates preventing them from contributing to mission for at least a year in a field where technology evolves in less than 2 years.

We call our Innovative Cybersecurity Training concept Cyber Unity and it's designed to specifically address these gaps. How do you bridge a gap? A literal bridge represents the traditional method to cross a gap, but this takes time to build and is expensive. Wikipedia defines a spark gap as an arrangement of two conducting electrodes separated by a physical gap usually filled with a gas such as air, designed to allow an electric spark to pass between the conductors.

A spark plug is the device that bridges the spark gap enabling the internal combustion engine and arguably contributed to the development of the modern age. We want to build the spark plug for cybersecurity.

Get Started


Interested? Get involved in Cyber Unity. Start by signing up here. Our process is simple: Train | Live | Challenge. You can start by taking and reviewing some training material. Next, you then participate in an in-person challenge with a live kit. And finally, you end this part of your cybersecurity learning journey with a grand challenge where multiple groups compete against each other.

Cyber Unity Process
Cyber Unity Learning

Get started, get involved and sign up!

Sign up to get started, get involved and to learn more about how you can be a part of Cyber Unity!

Cyber Unity is a process, a place, and a future certification where an interested individual can unite with others and get access to the skills, training, practice, and certification they need to begin a career in cybersecurity and defensive cyberspace operations.


Contact Us


RX5 Cyber EnVision Cyber Unity Center
3317 Atlantic Avenue
Atlantic City, New Jersey 08401
United States
CyberPoint Cyber Unity Center
7142 Columbia Gateway Drive, Suite 100
Columbia, Maryland 21046
United States
Phone: + 1 609.233.7942
Email: contactus@cyberunity.tech