This book teaches scientific methods for generating impactful knowledge, validating theories, and adding critical rigor to the cyber security field. It shows how to develop a research plan, beginning by starting research with a question, then offers an introduction to the broad range of useful research methods for cyber security research: observational, mathematical, experimental, and applied. Each research method chapter concludes with recommended outlines and suggested templates for submission to peer reviewed venues. The book concludes with information on cross-cutting issues within cyber security research.