{"id":14043,"date":"2024-10-24T05:45:54","date_gmt":"2024-10-24T10:45:54","guid":{"rendered":"https:\/\/ndisac.org\/dibscc\/?page_id=14043"},"modified":"2025-11-21T09:39:11","modified_gmt":"2025-11-21T14:39:11","slug":"getting-started-with-cybersecurity","status":"publish","type":"page","link":"https:\/\/ndisac.org\/dibscc\/cyberassist\/getting-started-with-cybersecurity\/","title":{"rendered":"Getting Started with Cybersecurity"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; fullwidth=&#8221;on&#8221; module_class=&#8221;banner-block&#8221; _builder_version=&#8221;4.0.4&#8243; height=&#8221;250px&#8221;][et_pb_fullwidth_header title=&#8221;Getting Started with Cybersecurity&#8221; module_id=&#8221;Aboutpg&#8221; _builder_version=&#8221;4.9.2&#8243; title_font=&#8221;Muli|800|||||||&#8221; title_text_color=&#8221;#ffffff&#8221; title_font_size=&#8221;48px&#8221; content_font=&#8221;Muli||||||||&#8221; content_text_color=&#8221;#ffffff&#8221; content_font_size=&#8221;23px&#8221; subhead_text_color=&#8221;#ffffff&#8221; background_color=&#8221;rgba(255, 255, 255, 0)&#8221; background_image=&#8221;https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2019\/10\/dibscc-home.jpg&#8221; background_layout=&#8221;light&#8221; height=&#8221;250px&#8221; custom_padding=&#8221;5%||10%||false|false&#8221; z_index_tablet=&#8221;500&#8243; title_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; title_text_shadow_vertical_length_tablet=&#8221;0px&#8221; title_text_shadow_blur_strength_tablet=&#8221;1px&#8221; content_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; content_text_shadow_vertical_length_tablet=&#8221;0px&#8221; content_text_shadow_blur_strength_tablet=&#8221;1px&#8221; subhead_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; subhead_text_shadow_vertical_length_tablet=&#8221;0px&#8221; subhead_text_shadow_blur_strength_tablet=&#8221;1px&#8221; content_link_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; content_link_text_shadow_vertical_length_tablet=&#8221;0px&#8221; content_link_text_shadow_blur_strength_tablet=&#8221;1px&#8221; content_ul_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; content_ul_text_shadow_vertical_length_tablet=&#8221;0px&#8221; content_ul_text_shadow_blur_strength_tablet=&#8221;1px&#8221; content_ol_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; content_ol_text_shadow_vertical_length_tablet=&#8221;0px&#8221; content_ol_text_shadow_blur_strength_tablet=&#8221;1px&#8221; content_quote_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; content_quote_text_shadow_vertical_length_tablet=&#8221;0px&#8221; content_quote_text_shadow_blur_strength_tablet=&#8221;1px&#8221; button_one_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; button_one_text_shadow_vertical_length_tablet=&#8221;0px&#8221; button_one_text_shadow_blur_strength_tablet=&#8221;1px&#8221; button_two_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; button_two_text_shadow_vertical_length_tablet=&#8221;0px&#8221; button_two_text_shadow_blur_strength_tablet=&#8221;1px&#8221; box_shadow_horizontal_tablet=&#8221;0px&#8221; box_shadow_vertical_tablet=&#8221;0px&#8221; box_shadow_blur_tablet=&#8221;40px&#8221; box_shadow_spread_tablet=&#8221;0px&#8221; box_shadow_horizontal_image_tablet=&#8221;0px&#8221; box_shadow_vertical_image_tablet=&#8221;0px&#8221; box_shadow_blur_image_tablet=&#8221;40px&#8221; box_shadow_spread_image_tablet=&#8221;0px&#8221; box_shadow_horizontal_button_one_tablet=&#8221;0px&#8221; box_shadow_vertical_button_one_tablet=&#8221;0px&#8221; box_shadow_blur_button_one_tablet=&#8221;40px&#8221; box_shadow_spread_button_one_tablet=&#8221;0px&#8221; box_shadow_horizontal_button_two_tablet=&#8221;0px&#8221; box_shadow_vertical_button_two_tablet=&#8221;0px&#8221; box_shadow_blur_button_two_tablet=&#8221;40px&#8221; box_shadow_spread_button_two_tablet=&#8221;0px&#8221; text_shadow_horizontal_length_tablet=&#8221;0px&#8221; text_shadow_vertical_length_tablet=&#8221;0px&#8221; text_shadow_blur_strength_tablet=&#8221;1px&#8221; button_one_text_size__hover_enabled=&#8221;off&#8221; button_one_text_size__hover=&#8221;null&#8221; button_two_text_size__hover_enabled=&#8221;off&#8221; button_two_text_size__hover=&#8221;null&#8221; button_one_text_color__hover_enabled=&#8221;off&#8221; button_one_text_color__hover=&#8221;null&#8221; button_two_text_color__hover_enabled=&#8221;off&#8221; button_two_text_color__hover=&#8221;null&#8221; button_one_border_width__hover_enabled=&#8221;off&#8221; button_one_border_width__hover=&#8221;null&#8221; button_two_border_width__hover_enabled=&#8221;off&#8221; button_two_border_width__hover=&#8221;null&#8221; button_one_border_color__hover_enabled=&#8221;off&#8221; button_one_border_color__hover=&#8221;null&#8221; button_two_border_color__hover_enabled=&#8221;off&#8221; button_two_border_color__hover=&#8221;null&#8221; button_one_border_radius__hover_enabled=&#8221;off&#8221; button_one_border_radius__hover=&#8221;null&#8221; button_two_border_radius__hover_enabled=&#8221;off&#8221; button_two_border_radius__hover=&#8221;null&#8221; button_one_letter_spacing__hover_enabled=&#8221;off&#8221; button_one_letter_spacing__hover=&#8221;null&#8221; button_two_letter_spacing__hover_enabled=&#8221;off&#8221; button_two_letter_spacing__hover=&#8221;null&#8221; button_one_bg_color__hover_enabled=&#8221;off&#8221; button_one_bg_color__hover=&#8221;null&#8221; button_two_bg_color__hover_enabled=&#8221;off&#8221; button_two_bg_color__hover=&#8221;null&#8221;][\/et_pb_fullwidth_header][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; module_id=&#8221;dibscc-home-about&#8221; _builder_version=&#8221;3.22&#8243;][et_pb_row _builder_version=&#8221;4.1&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.0.47&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.9.2&#8243; vertical_offset_tablet=&#8221;0&#8243; horizontal_offset_tablet=&#8221;0&#8243; z_index_tablet=&#8221;0&#8243; text_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; text_text_shadow_vertical_length_tablet=&#8221;0px&#8221; text_text_shadow_blur_strength_tablet=&#8221;1px&#8221; link_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; link_text_shadow_vertical_length_tablet=&#8221;0px&#8221; link_text_shadow_blur_strength_tablet=&#8221;1px&#8221; ul_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; ul_text_shadow_vertical_length_tablet=&#8221;0px&#8221; ul_text_shadow_blur_strength_tablet=&#8221;1px&#8221; ol_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; ol_text_shadow_vertical_length_tablet=&#8221;0px&#8221; ol_text_shadow_blur_strength_tablet=&#8221;1px&#8221; quote_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; quote_text_shadow_vertical_length_tablet=&#8221;0px&#8221; quote_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_2_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_2_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_2_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_3_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_3_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_3_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_4_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_4_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_4_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_5_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_5_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_5_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_6_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_6_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_6_text_shadow_blur_strength_tablet=&#8221;1px&#8221; box_shadow_horizontal_tablet=&#8221;0px&#8221; box_shadow_vertical_tablet=&#8221;0px&#8221; box_shadow_blur_tablet=&#8221;40px&#8221; box_shadow_spread_tablet=&#8221;0px&#8221;]<\/p>\n<p>The CyberAssist website is designed to provide assistance to all businesses working to achieve risk management and compliance goals for cybersecurity. Whether you\u2019re new to cybersecurity, looking to enhance your current defenses, or understanding your compliance obligations, this website offers vetted resources to accelerate your journey. <strong>Getting started with cybersecurity<\/strong> is made simple with clear, step\u2011by\u2011step guides, beginner\u2011friendly tutorials, and an inventory of essential tools. Each tile below provides curated content and resources so you can focus on the priorities that matter most to your organization, from threat detection and incident response to policy development and audit readiness.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_3,1_3,1_3&#8243; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221;][et_pb_cta title=&#8221;<b>Cybersecurity Fundamentals<\/b>&#8221; button_url=&#8221;https:\/\/ndisac.org\/dibscc\/cyberassist\/getting-started-with-cybersecurity\/cybersecurity-fundamentals\/&#8221; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#00457A&#8221; height=&#8221;300px&#8221; link_option_url=&#8221;https:\/\/ndisac.org\/dibscc\/cyberassist\/getting-started-with-cybersecurity\/cybersecurity-fundamentals\/&#8221; hover_enabled=&#8221;0&#8243; border_radii=&#8221;on|2px|2px|2px|2px&#8221; border_color_all=&#8221;#000000&#8243; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p>Top 10 High Value Controls, Protecting Data in the Cloud, Resources, Benchmarks, Policies, &amp; Guides, and Training.<\/p>\n<p>[\/et_pb_cta][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221;][et_pb_cta title=&#8221;<b>Vulnerability and Threat Information<\/b>&#8221; button_url=&#8221;https:\/\/ndisac.org\/dibscc\/cyberassist\/getting-started-with-cybersecurity\/vulnerability-and-threat-information\/&#8221; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#00457A&#8221; height=&#8221;300px&#8221; link_option_url=&#8221;https:\/\/ndisac.org\/dibscc\/cyberassist\/getting-started-with-cybersecurity\/vulnerability-and-threat-information\/&#8221; border_radii=&#8221;on|2px|2px|2px|2px&#8221; border_color_all=&#8221;#000000&#8243;]The latest threat and vulnerability information from multiple sources including: CISA, US-Cert, National Vulnerability Database, and the MITRE Corporation.[\/et_pb_cta][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221;][et_pb_cta title=&#8221;<b>Regulations and Standards<\/b>&#8221; button_url=&#8221;https:\/\/ndisac.org\/dibscc\/cyberassist\/getting-started-with-cybersecurity\/regulations-and-standards\/&#8221; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#00457A&#8221; height=&#8221;300px&#8221; link_option_url=&#8221;https:\/\/ndisac.org\/dibscc\/cyberassist\/getting-started-with-cybersecurity\/regulations-and-standards\/&#8221; border_radii=&#8221;on|2px|2px|2px|2px&#8221; border_color_all=&#8221;#000000&#8243;]Information about and links to United States and International regulations and standards.[\/et_pb_cta][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_3,1_3,1_3&#8243; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221;][et_pb_cta title=&#8221;<b>CMMC Compliance<\/b>&#8221; button_url=&#8221;https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/&#8221; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#00457A&#8221; height=&#8221;350px&#8221; link_option_url=&#8221;https:\/\/ndisac.org\/dibscc\/cyberassist\/cybersecurity-maturity-model-certification\/&#8221; border_radii=&#8221;on|2px|2px|2px|2px&#8221; border_color_all=&#8221;#000000&#8243;]<\/p>\n<p>Cybersecurity Maturity Model Certification security requirements grouped by level and by domain. Each requirement contains publicly available resources &amp; clarification from CMMC Model v1.02 Appendix B.<\/p>\n<p>[\/et_pb_cta][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221;][et_pb_cta title=&#8221;<b>CCRA<\/b>&#8221; button_url=&#8221;https:\/\/ndisac.org\/dibscc\/cyberassist\/awareness\/cybersecurity-compliance-and-risk-assessment\/&#8221; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#00457A&#8221; height=&#8221;350px&#8221; link_option_url=&#8221;https:\/\/ndisac.org\/dibscc\/cyberassist\/awareness\/cybersecurity-compliance-and-risk-assessment\/&#8221; border_radii=&#8221;on|2px|2px|2px|2px&#8221; border_color_all=&#8221;#000000&#8243;]<\/p>\n<p>Cybersecurity Compliance and Risk Assessment information page containing FAQs, a link to download the CCRA excel spreadsheet, and a contact form.<\/p>\n<p>[\/et_pb_cta][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221;][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; fullwidth=&#8221;on&#8221; module_class=&#8221;banner-block&#8221; _builder_version=&#8221;4.0.4&#8243; height=&#8221;250px&#8221;][et_pb_fullwidth_header title=&#8221;Getting Started with Cybersecurity&#8221; module_id=&#8221;Aboutpg&#8221; _builder_version=&#8221;4.9.2&#8243; title_font=&#8221;Muli|800|||||||&#8221; title_text_color=&#8221;#ffffff&#8221; title_font_size=&#8221;48px&#8221; content_font=&#8221;Muli||||||||&#8221; content_text_color=&#8221;#ffffff&#8221; content_font_size=&#8221;23px&#8221; subhead_text_color=&#8221;#ffffff&#8221; background_color=&#8221;rgba(255, 255, 255, 0)&#8221; background_image=&#8221;https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2019\/10\/dibscc-home.jpg&#8221; background_layout=&#8221;light&#8221; height=&#8221;250px&#8221; custom_padding=&#8221;5%||10%||false|false&#8221; z_index_tablet=&#8221;500&#8243; title_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; title_text_shadow_vertical_length_tablet=&#8221;0px&#8221; [&hellip;]<\/p>\n","protected":false},"author":8,"featured_media":0,"parent":1017,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"Welcome to National Defense ISAC Sites. This is your first post. Edit or delete it, then start blogging!","_et_gb_content_width":"","footnotes":""},"class_list":["post-14043","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Getting Started with Cybersecurity - DIB SCC CyberAssist<\/title>\n<meta name=\"description\" content=\"Helpful information and links are provided to assist organizations who are getting started with cybersecurity.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/getting-started-with-cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Getting Started with Cybersecurity - DIB SCC CyberAssist\" \/>\n<meta property=\"og:description\" content=\"Helpful information and links are provided to assist organizations who are getting started with cybersecurity.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/getting-started-with-cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"DIB SCC CyberAssist\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-21T14:39:11+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/ndisac.org\/dibscc\/cyberassist\/getting-started-with-cybersecurity\/\",\"url\":\"https:\/\/ndisac.org\/dibscc\/cyberassist\/getting-started-with-cybersecurity\/\",\"name\":\"Getting Started with Cybersecurity - DIB SCC CyberAssist\",\"isPartOf\":{\"@id\":\"https:\/\/ndisac.org\/dibscc\/#website\"},\"datePublished\":\"2024-10-24T10:45:54+00:00\",\"dateModified\":\"2025-11-21T14:39:11+00:00\",\"description\":\"Helpful information and links are provided to assist organizations who are getting started with cybersecurity.\",\"breadcrumb\":{\"@id\":\"https:\/\/ndisac.org\/dibscc\/cyberassist\/getting-started-with-cybersecurity\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/ndisac.org\/dibscc\/cyberassist\/getting-started-with-cybersecurity\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/ndisac.org\/dibscc\/cyberassist\/getting-started-with-cybersecurity\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/ndisac.org\/dibscc\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CyberAssist\",\"item\":\"https:\/\/ndisac.org\/dibscc\/cyberassist\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Getting Started with Cybersecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/ndisac.org\/dibscc\/#website\",\"url\":\"https:\/\/ndisac.org\/dibscc\/\",\"name\":\"DIB SCC CyberAssist\",\"description\":\"Cybersecurity Resources for DIB companies and suppliers\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/ndisac.org\/dibscc\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Getting Started with Cybersecurity - DIB SCC CyberAssist","description":"Helpful information and links are provided to assist organizations who are getting started with cybersecurity.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ndisac.org\/dibscc\/cyberassist\/getting-started-with-cybersecurity\/","og_locale":"en_US","og_type":"article","og_title":"Getting Started with Cybersecurity - DIB SCC CyberAssist","og_description":"Helpful information and links are provided to assist organizations who are getting started with cybersecurity.","og_url":"https:\/\/ndisac.org\/dibscc\/cyberassist\/getting-started-with-cybersecurity\/","og_site_name":"DIB SCC CyberAssist","article_modified_time":"2025-11-21T14:39:11+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/ndisac.org\/dibscc\/cyberassist\/getting-started-with-cybersecurity\/","url":"https:\/\/ndisac.org\/dibscc\/cyberassist\/getting-started-with-cybersecurity\/","name":"Getting Started with Cybersecurity - DIB SCC CyberAssist","isPartOf":{"@id":"https:\/\/ndisac.org\/dibscc\/#website"},"datePublished":"2024-10-24T10:45:54+00:00","dateModified":"2025-11-21T14:39:11+00:00","description":"Helpful information and links are provided to assist organizations who are getting started with cybersecurity.","breadcrumb":{"@id":"https:\/\/ndisac.org\/dibscc\/cyberassist\/getting-started-with-cybersecurity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ndisac.org\/dibscc\/cyberassist\/getting-started-with-cybersecurity\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/ndisac.org\/dibscc\/cyberassist\/getting-started-with-cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/ndisac.org\/dibscc\/"},{"@type":"ListItem","position":2,"name":"CyberAssist","item":"https:\/\/ndisac.org\/dibscc\/cyberassist\/"},{"@type":"ListItem","position":3,"name":"Getting Started with Cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/ndisac.org\/dibscc\/#website","url":"https:\/\/ndisac.org\/dibscc\/","name":"DIB SCC CyberAssist","description":"Cybersecurity Resources for DIB companies and suppliers","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ndisac.org\/dibscc\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"rttpg_featured_image_url":null,"rttpg_author":{"display_name":"markcarr","author_link":"https:\/\/ndisac.org\/dibscc\/author\/markcarr\/"},"rttpg_comment":0,"rttpg_category":null,"rttpg_excerpt":"[et_pb_section fb_built=&#8221;1&#8243; fullwidth=&#8221;on&#8221; module_class=&#8221;banner-block&#8221; _builder_version=&#8221;4.0.4&#8243; height=&#8221;250px&#8221;][et_pb_fullwidth_header title=&#8221;Getting Started with Cybersecurity&#8221; module_id=&#8221;Aboutpg&#8221; _builder_version=&#8221;4.9.2&#8243; title_font=&#8221;Muli|800|||||||&#8221; title_text_color=&#8221;#ffffff&#8221; title_font_size=&#8221;48px&#8221; content_font=&#8221;Muli||||||||&#8221; content_text_color=&#8221;#ffffff&#8221; content_font_size=&#8221;23px&#8221; subhead_text_color=&#8221;#ffffff&#8221; background_color=&#8221;rgba(255, 255, 255, 0)&#8221; background_image=&#8221;https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2019\/10\/dibscc-home.jpg&#8221; background_layout=&#8221;light&#8221; height=&#8221;250px&#8221; custom_padding=&#8221;5%||10%||false|false&#8221; z_index_tablet=&#8221;500&#8243; title_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; title_text_shadow_vertical_length_tablet=&#8221;0px&#8221; [&hellip;]","_links":{"self":[{"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/pages\/14043"}],"collection":[{"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/comments?post=14043"}],"version-history":[{"count":78,"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/pages\/14043\/revisions"}],"predecessor-version":[{"id":17363,"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/pages\/14043\/revisions\/17363"}],"up":[{"embeddable":true,"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/pages\/1017"}],"wp:attachment":[{"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/media?parent=14043"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}