Description
This track is focused on practical defense. You will identify risks, communicate them clearly, and prioritize them in a way the business can act on. We are developing people who can be trusted with live environments, not people who just want to show off exploits.
Duties
- Review simple application flows and identify weak points.
- Assess access control / authentication exposure.
- Document risks in a way non-security people can understand and fix.
- Prioritize: what is critical now vs what can wait. Communicate risk calmly and professionally
Requirements
· You already study or follow cybersecurity topics (access control, privilege escalation, data exposure, weak auth, etc.).
· You understand that security is about responsibility, compliance, and protection — not ego.
· You can explain risk in normal language, not just buzzwords.
· You can write structured,factual notes.
Not eligible if:
- You only want to “hack for fun.”
- You’re not comfortable documenting things professionally.
- You treat security like a game instead of a duty.
Benefits
- Real-world view of security: risk, compliance, auditability, liability.
- Positioning toward Security Analyst / SecOps / Governance & Compliance tracks.
- A maturity signal that hiring managers respect.
Notes
- Registration Window: Oct. 26, 2025 – Nov. 7, 2025
- Program Start: Nov. 26, 2025
- Duration: 4 weeks
- Seats are limited and mindset-filtered
- Application email: [email protected]
- Email Subject: Training Application – Cybersecurity – Season 2
- Include:
- Full name
- What security topics you’ve practiced or studied
- A short example of a security concern you’ve identified (even theoretical is fine if it’s logical) Why you believe you’re not a beginner