CyberStart
Program – Frequently Asked Questions (FAQ)
Program
Overview
What is CyberStart?
CyberStart is an Interreg Central-Baltic project aimed
at addressing the underrepresentation of women in the cybersecurity workforce.
The program offers comprehensive training, mentorship, certification, and
career support to reskill and upskill participants in cybersecurity. The
training program is designed to be practical, hands-on, and industry-relevant,
preparing participants for entry-level positions in the cybersecurity field.
Who can participate?
CyberStart welcomes women who are unemployed or
underemployed and seeking to transition into cybersecurity. Candidates should
possess relevant knowledge in adjacent fields such as:
●
Communication and Network Systems
●
Software Engineering
●
Computer Science
●
Information Technology
●
Other relevant fields with sufficient knowledge of
computer networks, programming, and mathematics
How much does it cost?
CyberStart is free of charge.
Where does it take place?
The program is delivered entirely online via Zoom and
virtual platforms.
Program
Schedule & Attendance
What are the program dates?
The program runs from March 3 to June 9, 2026.
Lectures take place on Tuesdays and Thursdays from 12:00-14:30 (EET).
Note: There is one exception: March 13, 2026
is a Friday (instead of the usual Tuesday/Thursday schedule). Please mark
this on your calendar if you have other commitments that day.
Full Program Schedule
Date | Topic | Time |
03.03.2026 | Introduction to Cybersecurity | 12:00-14:30 |
05.03.2026 | Network Security | 12:00-14:30 |
10.03.2026 | Network Security | 12:00-14:30 |
13.03.2026 | Network Security | 12:00-14:30 |
17.03.2026 | Practical days | 12:00-14:30 |
19.03.2026 | Cryptography, Authentication | 12:00-14:30 |
24.03.2026 | Cryptography, Authentication | 12:00-14:30 |
26.03.2026 | Application & Web Security | 12:00-14:30 |
31.03.2026 | Application & Web Security | 12:00-14:30 |
02.04.2026 | Practical days | 12:00-14:30 |
07.04.2026 | Security Operations & | 12:00-14:30 |
09.04.2026 | Security Operations & | 12:00-14:30 |
14.04.2026 | Security Operations & | 12:00-14:30 |
16.04.2026 | Practical days | 12:00-14:30 |
21.04.2026 | Security Governance, Risk, | 12:00-14:30 |
23.04.2026 | Security Governance, Risk, | 12:00-14:30 |
28.04.2026 | Practical days | 12:00-14:30 |
30.04.2026 | Attacker Mindset & Ethical | 12:00-14:30 |
05.05.2026 | Attacker Mindset & Ethical | 12:00-14:30 |
07.05.2026 | Capture the Flag | 12:00-14:30 |
12.05.2026 | Careers, Employability, | 12:00-14:30 |
14.05.2026 | Practical days / group work | 12:00-14:30 |
19.05.2026 | Careers, Employability, | 12:00-14:30 |
21.05.2026 | Practical days / group work | 12:00-14:30 |
26.05.2026 | Cybersecurity Entrepreneurship | 12:00-14:30 |
28.05.2026 | Practical days / group work | 12:00-14:30 |
02.06.2026 | Cybersecurity Entrepreneurship | 12:00-14:30 |
04.06.2026 | Practical days / group work | 12:00-14:30 |
09.06.2026 | Final presentations | TBA |
Can I miss lectures?
Yes, you can miss some live sessions. We understand
that everyone may need to skip a session or a few along the way due to work or
personal commitments. However, the expected time commitment is 10-12 hours
per week to get the most out of the program. Lecture recordings are
available within one week of the session, so you can catch up at your own pace.
Important: Live-hacking content is only
available during live sessions and will be removed from recordings for ethical
reasons. If you’re interested in this content, we encourage live attendance
when possible.
What if I have a full-time job?
Many participants work full-time. The course is
designed with this in mind:
●
Weekly commitment is approximately 10-12 hours
●
Lectures are only about 20% of the work; the rest is
self-paced study
●
You have flexibility to work on assignments and labs
outside of scheduled times
●
Group work can be scheduled around your availability
What if I need to travel or have other conflicts?
Your situation will be considered on a case-by-case
basis. Please communicate with the organizers about any extended absences or
conflicts as soon as you know about them.
Regarding home lab deadlines: Home labs have a 3-week
deadline from the day the task is given.
What matters most is your engagement with the learning
materials, completion of assignments, and participation in group work. We’re
flexible and understanding about real-life situations—just communicate with us.
Tips for planning ahead:
●
If you know you’ll be traveling or have conflicts, let
us know early
●
Check the module schedule in advance so you know when
labs are due
●
Plan your lab work with enough buffer time in case
unexpected things come up
Technical
Requirements & Setup
What technology do I need?
●
A good laptop or stationary computer (highly
recommended) – with at least 8GB RAM, capable of running virtual
machines and Docker containers. Both laptops and desktop computers work well.
●
Reliable internet connection
●
Zoom access (links will be provided)
●
LMS access via
https://cyberstart-project.com/courses/cyberstart/
I only have a Mac. Can I still participate?
Yes! Participants with macOS can participate, though
some tools are Windows/Linux-focused. Instructors will provide macOS-compatible
alternatives where possible. Many of the practical tasks can be completed using
Docker or virtual machines on Mac. If you need specific preparation or have
concerns about compatibility, contact the organizers—you won’t be
disadvantaged.
What about equipment with limited specs?
One of the strengths of the program is that each
group will have at least one powerful laptop or stationary computer with
sufficient specs (8GB+ RAM). Groups self-organize, so if you have limited
equipment, you can pair with group members. Groups can reorganize easily if
needed.
Do I need a microphone and camera?
●
For lectures: No, you don’t need these. You can
listen to the lecture without your camera or microphone on.
●
For practical days and group work: A microphone
and camera are highly suggested for better collaboration with your
group.
Course
Content & Assessment
What topics are covered?
The course includes 8 modules:
- Introduction
to Cybersecurity & Digital Foundations - Networking Fundamentals
& Network Security - Cryptography,
Authentication & Identity and Access Management (IAM) - Application & Web
Security - Security Operations &
Incident Response - Security Governance,
Risk, Compliance & Privacy (GRC) - Attacker Mindset &
Ethical Testing (Defender-focused) - Careers,
Employability, Freelance Opportunities & Cybersecurity
Entrepreneurship
Is there an exam?
No, there is no final exam. Assessment is based on:
●
Self-evaluation quizzes after each lecture (you
can retake if you don’t pass)
What are the learning outcomes?
By the end of the course, you will be able to:
- Explain
core cybersecurity terminology and concepts, and relate them to common
security specializations - Apply essential tools
and practices to improve security posture in realistic scenarios - Analyze technical
evidence to identify suspicious activity - Propose mitigation
actions and controls, and recommend risk treatment options aligned with
compliance - Produce
job-ready deliverables common in industry (e.g., incident reports,
security policies)
How much time should I dedicate to the course?
The course is equivalent to 6 ECTS credits,
which typically means:
●
Lectures: 32 hours
●
Group work meetings: 32 hours
●
Independent study and labs: 40 hours
●
Learning journal: 20 hours
●
Assignments: 38 hours
●
Total: Approximately 162 hours over the program
duration (~10-12 hours per week)
Home
Labs & Assignments
What are home labs?
Home labs are practical, hands-on exercises
where you deploy real-world applications and tools that are actually used in
production environments (e.g., password managers, security tools, etc.).
These labs are designed to help you:
●
Get experience working with the tools and applications
you’ll encounter in actual cybersecurity roles
●
Learn by doing, not just by reading or listening
●
Understand practical security concepts in realistic
scenarios
●
Build portfolio work you can show to employers
Technical details:
●
Some labs require Docker skills
(containerization)
●
Others use virtual machines for isolated
environments
●
Labs are designed progressively—they get more complex
as you advance through the course
Important: If you lack certain skills (Docker,
virtualization, Linux, etc.), do not worry! This is a perfect learning
opportunity. You’ll work in groups, so teammates can help cover knowledge
gaps. That’s the point—you’re supposed to learn from each other and
collectively solve the problems.
How do home labs work? (Step-by-step process)
Step 1: You Receive the Task
The lab instructions will be posted on the LMS with
clear requirements and objectives, also explained during a lecturing session.
The instructions will also be explained and discussed in detail during the
lecture session, so you’ll have the opportunity to ask questions and
clarify expectations before starting.
Step 2: You Complete the Lab (3-week deadline)
●
Work on the assignment at your own pace
●
Collaborate with your group members
●
Document what you did and what you learned
●
Submit your completed work on the LMS
Step 3: You Submit for Peer Review (“Your
Boss”) Once you finish, you submit your work for peer review. Your
peer reviewer acts as your “boss” and will:
●
Evaluate your submission using provided evaluation
metrics
●
Check if you completed the requirements
●
Assess the quality of your work
●
Give you constructive feedback to help you improve
Step 4: You Receive Feedback Your
“boss” (peer reviewer) will provide detailed feedback on your lab
submission. This is valuable learning—pay attention to their comments and use
them to understand what you did well and what to improve for future
assignments.
Step 5: You Become the Boss and Review Someone
Else’s Lab You’ll also receive a lab submission from a peer to review. Now
YOU are the “boss.” You’ll:
●
Use the same evaluation metrics provided
●
Give honest, constructive feedback
●
Help your peer improve their understanding
●
Check if they met the lab requirements
This peer-to-peer feedback is a core part of the
learning process. Reviewing others’ work actually deepens your own
understanding!
What’s the deadline for home labs?
Home labs must be submitted 3 weeks after the task
is given. This timeline:
●
Gives you plenty of time to complete the work at your
own pace
●
Allows peers time to review and provide feedback
●
Keeps the learning momentum going before moving to new
material
●
Accommodates work and personal commitments
Tips for successful home labs:
●
Start early — Don’t wait until the last week to
begin
●
Work with your group — Collaboration is
valuable; ask for help
●
Document your process — Write down what you do
and why; this helps peers understand your thinking
●
Read feedback carefully — Use peer reviews to
improve
●
Test thoroughly — Make sure your lab actually
works before submitting
What is the learning journal?
The learning journal (also called a “learning
diary”) is your personal reflective space where you think
critically about what you learn from each lecture. Think of it like a journal
from your teenage years—but instead of writing about your day, you’re writing
about your learning journey.
Important: This is NOT a summary of the lecture.
Many people make this mistake. Your job is NOT to write down everything the
lecturer said. Instead, you’re reflecting on what you learned and how it
connects to your thinking.
What should you write about?
After each lecture, think about and write on these
questions:
- What
was especially interesting to you?
○
Which concepts caught your attention?
○
What surprised you?
○
What made you think “oh, that’s cool!” or
“I didn’t know that!”?
- What was NEW to you?
○
What information didn’t you know before?
○
What challenged your existing understanding?
○
What viewpoints or perspectives had you not considered?
- How do the ideas
relate to your own experience or prior knowledge?
○
Does this connect to things you already knew?
○
Can you think of real-world examples where this
applies?
○
How does this fit into what you already understand
about cybersecurity?
- Did the ideas
presented match your expectations?
○
Did the lecturer say what you expected, or were you
surprised?
○
What assumptions did you have before the lecture?
○
Were your preconceptions confirmed or challenged?
- Did this lecture
change your thinking?
○
Do you now think differently about something because of
this lecture?
○
What’s your new understanding compared to before?
○
How might this change how you approach cybersecurity
problems?
What NOT to write:
❌ Don’t just
summarize the lecture in your own words
❌ Don’t copy slides or lecture notes
❌ Don’t write generic statements like “the lecture was interesting”
❌ Don’t write things you don’t actually understand—be authentic
What a good journal entry looks like:
✅ Personal
reflection: “I always thought encryption was just about hiding data, but
now I understand it’s also about ensuring data hasn’t been tampered
with…”
✅ Critical thinking: “The presenter
mentioned that most breaches happen because of human error, not technical
vulnerabilities. This makes me wonder if we should focus more on training than
technology…”
✅ Connection to experience: “The concept of defense-in-depth reminds me of
physical security—you need locks on windows AND doors AND a security system…”
✅ Questions and insights: “I didn’t fully understand X, but it seems
related to Y that was covered in the previous lecture…”
How often and how much?
●
Write after each lecture (so typically 2 times
per week)
●
Length doesn’t matter as much as quality – could be 1
paragraph or 1 page
●
Be honest and authentic – this is for you and your
learning
Why is this important?
●
Deepens learning: Writing forces you to think
more deeply than just listening
●
Retention: Reflecting on concepts helps you
remember them longer
●
Self-awareness: You become aware of your own
learning process and gaps in understanding
●
Portfolio: Your journal becomes a record of your
growth throughout the course
●
Grading: This is one of the completion
requirements for the course
Can I use AI/LLMs for my work?
✅
It’s OK to use LLMs for:
●
Proofreading reports (ONLY proofreading, not writing)
●
Formatting assistance
●
Seeking knowledge (e.g., “how do I deploy a Docker
container?”)
❌
Don’t use LLMs for:
●
Writing reports or assignments
●
Answering self-evaluation quizzes
●
Completing labs for you
Why? The goal is for YOU to learn. LLMs
hallucinate and provide wrong information. You are the one with brains – use
LLMs as a tool to assist, not replace, your thinking.
Group
Work
How are groups formed?
During the first lecture session, you’ll complete a
survey. The organizers will then create groups with the following criteria:
●
Each group has at least one powerful laptop for
practical work
●
Groups are designed to support peer learning
●
Groups self-organize for practical work; you
coordinate your own schedule
Can I change groups?
Yes, groups can be reorganized easily if needed. Talk
to the organizers if you need to make changes.
What happens during practical days?
Practical days (specific dates on the schedule) are
dedicated to:
●
Working on home labs
●
Collaborative group learning
●
Guest lectures (links will be provided)
●
Support sessions for tackling assignments
Learning
Materials & Recordings
Where do I access learning materials?
Everything is available on the LMS (Learning
Management System): https://cyberstart-project.com/courses/cyberstart/
The LMS contains:
●
Lecture materials
●
Lecture recordings
●
Self-assessment quizzes
●
Space to submit home labs
●
Peer evaluation forms
How are materials and module information provided?
By design, we do NOT provide all course materials
and information upfront. Instead, we release materials progressively – one
module at a time. Here’s how it works:
When you’ll receive module information:
●
1 day BEFORE each module’s first session, all
module materials and information will be shared in the #cyberstart-general-announcements
Slack channel
●
This includes:
○
Module overview and learning objectives
○
Home lab assignments and requirements
○
Tools and resources you’ll need
○
Any additional readings or references
Why we do this:
●
Keeps content organized and digestible – Rather
than overwhelming you with 4 months of material, you focus on one module at a
time
●
Allows for flexibility – We can adjust content
based on class progress and feedback
●
Prevents information overload – You’re not
stressed about “what’s coming next” months in advance
●
Maintains engagement – New materials keep the
course fresh and momentum going
●
Improves quality – We can refine modules based
on how earlier ones went
During the session:
●
All module information and materials will be repeated
and discussed again during the lecture
●
Don’t worry if you miss the Slack announcement- it will
all be covered in the live session
Pro tip: Check #cyberstart-general-announcements
1 day before each module starts so you’re prepared and have time to
review before the first session. But if you miss it, you’ll get all the
information during the lecture itself.
When will recordings be available?
Recordings are posted within up to 1 week after
the lecture.
Why isn’t the live-hacking available in recordings?
Live-hacking demonstrations contain sensitive content
and are only available during live sessions for ethical reasons. To access this
content, you’ll need to attend the lecture live.
How do I register for the LMS?
Important: Register with the email address
you used for program registration or provided in Slack. This helps the
organizers track your progress and participation.
Slack
& Communication
What is Slack used for?
Slack is the primary communication hub for the
program. It’s where announcements are made, questions are answered, and the
community connects.
What are the main Slack channels?
Channel | Purpose | You |
#cyberstart-general-announcements | Official updates and important | Turn on notifications |
#questions-to-organizers | Ask program/schedule questions | Expect 1-2 day response time |
#session-recordings | Lecture and workshop | Check regularly for new videos |
#useful-resources | Learning materials and tools | Bookmark and contribute |
#cyber-opportunities | Jobs, internships, events | Check for career opportunities |
#cozy-corner | Social chat, peer support, | Build community, relax |
#fun-opportunities | Hackathons, meetups, | Explore beyond cybersecurity |
How quickly will my questions be answered?
Questions posted in #questions-to-organizers typically
receive responses within 1-2 days. Complex questions may take longer.
Community
& Code of Conduct
What are the community rules?
We have two main rules:
1. Confidentiality Rule: You are allowed to use
information shared in the program, but you cannot reveal:
●
The identity of speakers
●
The affiliation of speakers
●
Other participants’ affiliations or identities
2. Safe Space: We encourage free discussion and
open dialogue. All viewpoints are welcome. This is your space to learn, ask
questions, and share ideas without judgment.
Is Slack safe for sharing personal information?
That’s a valid concern. Slack is a third-party platform
and has had security breaches in the past. We recommend being thoughtful about
what personal information you share (like your full name, location, workplace).
That said, we use Slack because it’s an effective collaboration tool. If you
have privacy concerns, you can discuss them with the organizers.
Practical
Information
What do I need before March 3?
●
✅ Check your email
for Slack invite
●
✅ Join the Slack
workspace and turn on notifications
●
✅ Download Zoom (or
ensure you have access)
●
✅ Test your
internet connection and audio
●
✅ Review the course
schedule
●
✅ Get your
laptop/equipment sorted
How do I add the program calendar to my calendar?
Calendar links for both Google Calendar and
iCal/Outlook are available in the #cyberstart-general-announcements
Slack channel. Check the pinned messages or search for “calendar” to
find the links for your preferred calendar application.
Two options are provided:
●
Google Calendar users: Direct link to add the
shared calendar
●
iCal, Outlook, and other calendar applications:
ICS feed link for compatibility
Will there be a certificate?
CyberStart is not an accredited study program.
However, upon successful completion, you’ll receive documentation of
completion equivalent to 6 ECTS credits that you can use for career
advancement and further education. This documentation recognizes the skills and
knowledge you’ve gained, though it should not be used as a substitute for
formal academic credits where institutional accreditation is required.
Can I work with my group outside of scheduled times?
Absolutely! Practical days are the suggested time to
work together, but groups can meet any time that works for everyone. Use your
group’s preferred communication method (Slack, email, Zoom, etc.) to
coordinate.
Instructor
& Support
Who is teaching this course?
Ismayil Hasanov is the main lecturer. He is:
●
A recent graduate from the University of Turku
●
Currently a PhD student & Project Researcher at the
Cybersecurity Lab, University of Turku
●
Chairperson at TurkuSec ry
●
Board member at VSTKY (ICT Organization of Finland)
●
Co-organizer of the Disarray Conference
●
Active volunteer at Disobey
Additionally, guest lecturers will contribute to
practical days and specialized topics.
How can I get support?
●
Technical/course questions: Post in
#questions-to-organizers
●
Group work issues: Contact your group members or
reach out to Anna
●
Community concerns: Reach out to Madara Plesa
●
LMS problems: Contact Veli
●
General questions: Slack is your friend!
Getting
Started
What should I do first?
- Join
Slack using the link you received - Turn on notifications
for #cyberstart-general-announcements - Register on the LMS
with your correct email - Review the course
schedule and add to your calendar - Check
your tech setup (Zoom, internet, laptop)
Any last questions?
Ask in #questions-to-organizers! There are no silly
questions – we’re here to support your success.
Additional
Resources
●
Course Syllabus: Available on the LMS
●
Full Course Schedule: Available on the LMS
● LMS Platform:
https://cyberstart-project.com/courses/cyberstart/
●
Questions Slack Channel:
#questions-to-organizers
●
CyberStart Main Website:
https://cyberstart-project.com/#
Welcome to CyberStart! We’re excited to have you on
this journey. See you soon! 🚀
