InfoSec Institute Announces $50,000 Cybersecurity Scholarship Program

Program Grows Awareness of Workforce Diversity Challenges, Widening Skills Gap

InfoSec Institute today announced four new scholarship opportunities for cybersecurity students and aspiring information security professionals. Scholarships target underrepresented groups in cybersecurity and are valued at $12,600 each.

Each award includes certification exam vouchers to give recipients the skills, credentials and experience needed to secure a professional-level cybersecurity position. Available scholarships include:

“The cybersecurity skill shortage affects everyone,” said Jack Koziol, InfoSec Institute CEO. “Companies everywhere are struggling to find the talent they need to keep their data — our data — safe from attacks. Recent reports estimate there are 350,000 open cybersecurity positions in the U.S. right now, and predict a global deficit of 3.5 million cybersecurity jobs by 2021.”

Recipients will receive free enrollment into each of the following award-winning training boot camps:

Security certifications like CompTIA’s Security+ or Network+ are common requirements for many information security roles. The InfoSec Institute 2018 Scholarship Program aims to reduce barriers of entry for scholarship recipients and bring awareness to workforce diversity challenges in the cybersecurity industry.

“The 2017 Global Information Security Workforce Study found minority cybersecurity pros make up just 26% of the security workforce. It’s even worse for women at 11%,” said Koziol. “Perspective and experience can be as important in security roles as technical skills. We hope these scholarships will help encourage new talent to join the industry.”

About InfoSec Institute

InfoSec Institute fortifies organizations of all sizes against security threats with its award-winning security education solutions. Recognizing cybersecurity is everyone’s job, the company provides skills training and certification prep courses for (Read more...)

*** This is a Security Bloggers Network syndicated blog from InfoSec Resources authored by Megan Sawle. Read the original post at: