Introduction to Various Path in Cybersecurity