Back

CyberStart
Program – Frequently Asked Questions (FAQ)

Program
Overview

What is CyberStart?

CyberStart is an Interreg Central-Baltic project aimed
at addressing the underrepresentation of women in the cybersecurity workforce.
The program offers comprehensive training, mentorship, certification, and
career support to reskill and upskill participants in cybersecurity. The
training program is designed to be practical, hands-on, and industry-relevant,
preparing participants for entry-level positions in the cybersecurity field.

Who can participate?

CyberStart welcomes women who are unemployed or
underemployed and seeking to transition into cybersecurity. Candidates should
possess relevant knowledge in adjacent fields such as:

    
Communication and Network Systems

    
Software Engineering

    
Computer Science

    
Information Technology

    
Other relevant fields with sufficient knowledge of
computer networks, programming, and mathematics

How much does it cost?

CyberStart is free of charge.

Where does it take place?

The program is delivered entirely online via Zoom and
virtual platforms.


Program
Schedule & Attendance

What are the program dates?

The program runs from March 3 to June 9, 2026.
Lectures take place on Tuesdays and Thursdays from 12:00-14:30 (EET).

Note: There is one exception: March 13, 2026
is a Friday
(instead of the usual Tuesday/Thursday schedule). Please mark
this on your calendar if you have other commitments that day.

Full Program Schedule

Date

Topic

Time

03.03.2026

Introduction to Cybersecurity
& Digital Foundations

12:00-14:30

05.03.2026

Network Security

12:00-14:30

10.03.2026

Network Security

12:00-14:30

13.03.2026

Network Security

12:00-14:30

17.03.2026

Practical days

12:00-14:30

19.03.2026

Cryptography, Authentication
& Identity and Access Management (IAM)

12:00-14:30

24.03.2026

Cryptography, Authentication
& Identity and Access Management (IAM)

12:00-14:30

26.03.2026

Application & Web Security

12:00-14:30

31.03.2026

Application & Web Security

12:00-14:30

02.04.2026

Practical days

12:00-14:30

07.04.2026

Security Operations &
Incident Response

12:00-14:30

09.04.2026

Security Operations &
Incident Response

12:00-14:30

14.04.2026

Security Operations &
Incident Response

12:00-14:30

16.04.2026

Practical days

12:00-14:30

21.04.2026

Security Governance, Risk,
Compliance & Privacy (GRC)

12:00-14:30

23.04.2026

Security Governance, Risk,
Compliance & Privacy (GRC)

12:00-14:30

28.04.2026

Practical days

12:00-14:30

30.04.2026

Attacker Mindset & Ethical
Testing (Defender-focused)

12:00-14:30

05.05.2026

Attacker Mindset & Ethical
Testing (Defender-focused)

12:00-14:30

07.05.2026

Capture the Flag

12:00-14:30

12.05.2026

Careers, Employability,
Freelance Opportunities & Cybersecurity Entrepreneurship

12:00-14:30

14.05.2026

Practical days / group work
weekly meetings

12:00-14:30

19.05.2026

Careers, Employability,
Freelance Opportunities & Cybersecurity Entrepreneurship

12:00-14:30

21.05.2026

Practical days / group work
weekly meetings

12:00-14:30

26.05.2026

Cybersecurity Entrepreneurship

12:00-14:30

28.05.2026

Practical days / group work
weekly meetings

12:00-14:30

02.06.2026

Cybersecurity Entrepreneurship

12:00-14:30

04.06.2026

Practical days / group work
weekly meetings

12:00-14:30

09.06.2026

Final presentations

TBA

Can I miss lectures?

Yes, you can miss some live sessions. We understand
that everyone may need to skip a session or a few along the way due to work or
personal commitments. However, the expected time commitment is 10-12 hours
per week
to get the most out of the program. Lecture recordings are
available within one week of the session, so you can catch up at your own pace.

Important: Live-hacking content is only
available during live sessions and will be removed from recordings for ethical
reasons. If you’re interested in this content, we encourage live attendance
when possible.

What if I have a full-time job?

Many participants work full-time. The course is
designed with this in mind:

    
Weekly commitment is approximately 10-12 hours

    
Lectures are only about 20% of the work; the rest is
self-paced study

    
You have flexibility to work on assignments and labs
outside of scheduled times

    
Group work can be scheduled around your availability

What if I need to travel or have other conflicts?

Your situation will be considered on a case-by-case
basis. Please communicate with the organizers about any extended absences or
conflicts as soon as you know about them.

Regarding home lab deadlines: Home labs have a 3-week
deadline from the day the task is given
.

What matters most is your engagement with the learning
materials, completion of assignments, and participation in group work. We’re
flexible and understanding about real-life situations—just communicate with us.

Tips for planning ahead:

    
If you know you’ll be traveling or have conflicts, let
us know early

    
Check the module schedule in advance so you know when
labs are due

    
Plan your lab work with enough buffer time in case
unexpected things come up


Technical
Requirements & Setup

What technology do I need?

    
A good laptop or stationary computer (highly
recommended) – with at least 8GB RAM, capable of running virtual
machines and Docker containers. Both laptops and desktop computers work well.

    
Reliable internet connection

    
Zoom access (links will be provided)

    
LMS access via
https://cyberstart-project.com/courses/cyberstart/

I only have a Mac. Can I still participate?

Yes! Participants with macOS can participate, though
some tools are Windows/Linux-focused. Instructors will provide macOS-compatible
alternatives where possible. Many of the practical tasks can be completed using
Docker or virtual machines on Mac. If you need specific preparation or have
concerns about compatibility, contact the organizers—you won’t be
disadvantaged.

What about equipment with limited specs?

One of the strengths of the program is that each
group will have at least one powerful laptop or stationary computer with
sufficient specs (8GB+ RAM)
. Groups self-organize, so if you have limited
equipment, you can pair with group members. Groups can reorganize easily if
needed.

Do I need a microphone and camera?

    
For lectures: No, you don’t need these. You can
listen to the lecture without your camera or microphone on.

    
For practical days and group work: A microphone
and camera are highly suggested for better collaboration with your
group.


Course
Content & Assessment

What topics are covered?

The course includes 8 modules:

  1. Introduction
    to Cybersecurity & Digital Foundations
  2. Networking Fundamentals
    & Network Security
  3. Cryptography,
    Authentication & Identity and Access Management (IAM)
  4. Application & Web
    Security
  5. Security Operations &
    Incident Response
  6. Security Governance,
    Risk, Compliance & Privacy (GRC)
  7. Attacker Mindset &
    Ethical Testing (Defender-focused)
  8. Careers,
    Employability, Freelance Opportunities & Cybersecurity
    Entrepreneurship

Is there an exam?

No, there is no final exam. Assessment is based on:

    
Self-evaluation quizzes after each lecture (you
can retake if you don’t pass)

What are the learning outcomes?

By the end of the course, you will be able to:

  1. Explain
    core cybersecurity terminology and concepts, and relate them to common
    security specializations
  2. Apply essential tools
    and practices to improve security posture in realistic scenarios
  3. Analyze technical
    evidence to identify suspicious activity
  4. Propose mitigation
    actions and controls, and recommend risk treatment options aligned with
    compliance
  5. Produce
    job-ready deliverables common in industry (e.g., incident reports,
    security policies)

How much time should I dedicate to the course?

The course is equivalent to 6 ECTS credits,
which typically means:

    
Lectures: 32 hours

    
Group work meetings: 32 hours

    
Independent study and labs: 40 hours

    
Learning journal: 20 hours

    
Assignments: 38 hours

    
Total: Approximately 162 hours over the program
duration (~10-12 hours per week)


Home
Labs & Assignments

What are home labs?

Home labs are practical, hands-on exercises
where you deploy real-world applications and tools that are actually used in
production environments (e.g., password managers, security tools, etc.).

These labs are designed to help you:

    
Get experience working with the tools and applications
you’ll encounter in actual cybersecurity roles

    
Learn by doing, not just by reading or listening

    
Understand practical security concepts in realistic
scenarios

    
Build portfolio work you can show to employers

Technical details:

    
Some labs require Docker skills
(containerization)

    
Others use virtual machines for isolated
environments

    
Labs are designed progressively—they get more complex
as you advance through the course

Important: If you lack certain skills (Docker,
virtualization, Linux, etc.), do not worry! This is a perfect learning
opportunity. You’ll work in groups, so teammates can help cover knowledge
gaps
. That’s the point—you’re supposed to learn from each other and
collectively solve the problems.

How do home labs work? (Step-by-step process)

Step 1: You Receive the Task

The lab instructions will be posted on the LMS with
clear requirements and objectives, also explained during a lecturing session.
The instructions will also be explained and discussed in detail during the
lecture session
, so you’ll have the opportunity to ask questions and
clarify expectations before starting.

Step 2: You Complete the Lab (3-week deadline)

    
Work on the assignment at your own pace

    
Collaborate with your group members

    
Document what you did and what you learned

    
Submit your completed work on the LMS

Step 3: You Submit for Peer Review (“Your
Boss”)
Once you finish, you submit your work for peer review. Your
peer reviewer acts as your “boss” and will:

    
Evaluate your submission using provided evaluation
metrics

    
Check if you completed the requirements

    
Assess the quality of your work

    
Give you constructive feedback to help you improve

Step 4: You Receive Feedback Your
“boss” (peer reviewer) will provide detailed feedback on your lab
submission. This is valuable learning—pay attention to their comments and use
them to understand what you did well and what to improve for future
assignments.

Step 5: You Become the Boss and Review Someone
Else’s Lab
You’ll also receive a lab submission from a peer to review. Now
YOU are the “boss.” You’ll:

    
Use the same evaluation metrics provided

    
Give honest, constructive feedback

    
Help your peer improve their understanding

    
Check if they met the lab requirements

This peer-to-peer feedback is a core part of the
learning process. Reviewing others’ work actually deepens your own
understanding!

What’s the deadline for home labs?

Home labs must be submitted 3 weeks after the task
is given
. This timeline:

    
Gives you plenty of time to complete the work at your
own pace

    
Allows peers time to review and provide feedback

    
Keeps the learning momentum going before moving to new
material

    
Accommodates work and personal commitments

Tips for successful home labs:

    
Start early — Don’t wait until the last week to
begin

    
Work with your group — Collaboration is
valuable; ask for help

    
Document your process — Write down what you do
and why; this helps peers understand your thinking

    
Read feedback carefully — Use peer reviews to
improve

    
Test thoroughly — Make sure your lab actually
works before submitting

What is the learning journal?

The learning journal (also called a “learning
diary”) is your personal reflective space where you think
critically about what you learn from each lecture. Think of it like a journal
from your teenage years—but instead of writing about your day, you’re writing
about your learning journey.

Important: This is NOT a summary of the lecture.
Many people make this mistake. Your job is NOT to write down everything the
lecturer said. Instead, you’re reflecting on what you learned and how it
connects to your thinking.

What should you write about?

After each lecture, think about and write on these
questions:

  1. What
    was especially interesting to you?

    
Which concepts caught your attention?

    
What surprised you?

    
What made you think “oh, that’s cool!” or
“I didn’t know that!”?

  1. What was NEW to you?

    
What information didn’t you know before?

    
What challenged your existing understanding?

    
What viewpoints or perspectives had you not considered?

  1. How do the ideas
    relate to your own experience or prior knowledge?

    
Does this connect to things you already knew?

    
Can you think of real-world examples where this
applies?

    
How does this fit into what you already understand
about cybersecurity?

  1. Did the ideas
    presented match your expectations?

    
Did the lecturer say what you expected, or were you
surprised?

    
What assumptions did you have before the lecture?

    
Were your preconceptions confirmed or challenged?

  1. Did this lecture
    change your thinking?

    
Do you now think differently about something because of
this lecture?

    
What’s your new understanding compared to before?

    
How might this change how you approach cybersecurity
problems?

What NOT to write:

❌ Don’t just
summarize the lecture in your own words
❌ Don’t copy slides or lecture notes
❌ Don’t write generic statements like “the lecture was interesting”
❌ Don’t write things you don’t actually understand—be authentic

What a good journal entry looks like:

✅ Personal
reflection: “I always thought encryption was just about hiding data, but
now I understand it’s also about ensuring data hasn’t been tampered
with…”
 ✅ Critical thinking: “The presenter
mentioned that most breaches happen because of human error, not technical
vulnerabilities. This makes me wonder if we should focus more on training than
technology…”
✅ Connection to experience: “The concept of defense-in-depth reminds me of
physical security—you need locks on windows AND doors AND a security system…”

✅ Questions and insights: “I didn’t fully understand X, but it seems
related to Y that was covered in the previous lecture…”

How often and how much?

    
Write after each lecture (so typically 2 times
per week)

    
Length doesn’t matter as much as quality – could be 1
paragraph or 1 page

    
Be honest and authentic – this is for you and your
learning

Why is this important?

    
Deepens learning: Writing forces you to think
more deeply than just listening

    
Retention: Reflecting on concepts helps you
remember them longer

    
Self-awareness: You become aware of your own
learning process and gaps in understanding

    
Portfolio: Your journal becomes a record of your
growth throughout the course

    
Grading: This is one of the completion
requirements for the course

Can I use AI/LLMs for my work?


It’s OK to use LLMs for:

    
Proofreading reports (ONLY proofreading, not writing)

    
Formatting assistance

    
Seeking knowledge (e.g., “how do I deploy a Docker
container?”)


Don’t use LLMs for:

    
Writing reports or assignments

    
Answering self-evaluation quizzes

    
Completing labs for you

Why? The goal is for YOU to learn. LLMs
hallucinate and provide wrong information. You are the one with brains – use
LLMs as a tool to assist, not replace, your thinking.


Group
Work

How are groups formed?

During the first lecture session, you’ll complete a
survey. The organizers will then create groups with the following criteria:

    
Each group has at least one powerful laptop for
practical work

    
Groups are designed to support peer learning

    
Groups self-organize for practical work; you
coordinate your own schedule

Can I change groups?

Yes, groups can be reorganized easily if needed. Talk
to the organizers if you need to make changes.

What happens during practical days?

Practical days (specific dates on the schedule) are
dedicated to:

    
Working on home labs

    
Collaborative group learning

    
Guest lectures (links will be provided)

    
Support sessions for tackling assignments


Learning
Materials & Recordings

Where do I access learning materials?

Everything is available on the LMS (Learning
Management System):
https://cyberstart-project.com/courses/cyberstart/

The LMS contains:

    
Lecture materials

    
Lecture recordings

    
Self-assessment quizzes

    
Space to submit home labs

    
Peer evaluation forms

How are materials and module information provided?

By design, we do NOT provide all course materials
and information upfront.
Instead, we release materials progressively – one
module at a time
. Here’s how it works:

When you’ll receive module information:

    
1 day BEFORE each module’s first session, all
module materials and information will be shared in the #cyberstart-general-announcements
Slack channel

    
This includes:

    
Module overview and learning objectives

    
Home lab assignments and requirements

    
Tools and resources you’ll need

    
Any additional readings or references

Why we do this:

    
Keeps content organized and digestible – Rather
than overwhelming you with 4 months of material, you focus on one module at a
time

    
Allows for flexibility – We can adjust content
based on class progress and feedback

    
Prevents information overload – You’re not
stressed about “what’s coming next” months in advance

    
Maintains engagement – New materials keep the
course fresh and momentum going

    
Improves quality – We can refine modules based
on how earlier ones went

During the session:

    
All module information and materials will be repeated
and discussed again during the lecture

    
Don’t worry if you miss the Slack announcement- it will
all be covered in the live session

Pro tip: Check #cyberstart-general-announcements
1 day before each module starts so you’re prepared and have time to
review before the first session. But if you miss it, you’ll get all the
information during the lecture itself.

When will recordings be available?

Recordings are posted within up to 1 week after
the lecture.

Why isn’t the live-hacking available in recordings?

Live-hacking demonstrations contain sensitive content
and are only available during live sessions for ethical reasons. To access this
content, you’ll need to attend the lecture live.

How do I register for the LMS?

Important: Register with the email address
you used for program registration or provided in Slack
. This helps the
organizers track your progress and participation.


Slack
& Communication

What is Slack used for?

Slack is the primary communication hub for the
program. It’s where announcements are made, questions are answered, and the
community connects.

What are the main Slack channels?

Channel

Purpose

You
Should

#cyberstart-general-announcements

Official updates and important
dates

Turn on notifications

#questions-to-organizers

Ask program/schedule questions

Expect 1-2 day response time

#session-recordings

Lecture and workshop
recordings

Check regularly for new videos

#useful-resources

Learning materials and tools

Bookmark and contribute

#cyber-opportunities

Jobs, internships, events

Check for career opportunities

#cozy-corner

Social chat, peer support,
memes

Build community, relax

#fun-opportunities

Hackathons, meetups,
conferences

Explore beyond cybersecurity

How quickly will my questions be answered?

Questions posted in #questions-to-organizers typically
receive responses within 1-2 days. Complex questions may take longer.


Community
& Code of Conduct

What are the community rules?

We have two main rules:

1. Confidentiality Rule: You are allowed to use
information shared
in the program, but you cannot reveal:

    
The identity of speakers

    
The affiliation of speakers

    
Other participants’ affiliations or identities

2. Safe Space: We encourage free discussion and
open dialogue. All viewpoints are welcome. This is your space to learn, ask
questions, and share ideas without judgment.

Is Slack safe for sharing personal information?

That’s a valid concern. Slack is a third-party platform
and has had security breaches in the past. We recommend being thoughtful about
what personal information you share (like your full name, location, workplace).
That said, we use Slack because it’s an effective collaboration tool. If you
have privacy concerns, you can discuss them with the organizers.


Practical
Information

What do I need before March 3?

    
✅ Check your email
for Slack invite

    
✅ Join the Slack
workspace and turn on notifications

    
✅ Download Zoom (or
ensure you have access)

    
✅ Test your
internet connection and audio

    
✅ Review the course
schedule

    
✅ Get your
laptop/equipment sorted

How do I add the program calendar to my calendar?

Calendar links for both Google Calendar and
iCal/Outlook are available in the #cyberstart-general-announcements
Slack channel. Check the pinned messages or search for “calendar” to
find the links for your preferred calendar application.

Two options are provided:

    
Google Calendar users: Direct link to add the
shared calendar

    
iCal, Outlook, and other calendar applications:
ICS feed link for compatibility

Will there be a certificate?

CyberStart is not an accredited study program.
However, upon successful completion, you’ll receive documentation of
completion equivalent to 6 ECTS credits
that you can use for career
advancement and further education. This documentation recognizes the skills and
knowledge you’ve gained, though it should not be used as a substitute for
formal academic credits where institutional accreditation is required.

Can I work with my group outside of scheduled times?

Absolutely! Practical days are the suggested time to
work together, but groups can meet any time that works for everyone. Use your
group’s preferred communication method (Slack, email, Zoom, etc.) to
coordinate.


Instructor
& Support

Who is teaching this course?

Ismayil Hasanov is the main lecturer. He is:

    
A recent graduate from the University of Turku

    
Currently a PhD student & Project Researcher at the
Cybersecurity Lab, University of Turku

    
Chairperson at TurkuSec ry

    
Board member at VSTKY (ICT Organization of Finland)

    
Co-organizer of the Disarray Conference

    
Active volunteer at Disobey

Additionally, guest lecturers will contribute to
practical days and specialized topics.

How can I get support?

    
Technical/course questions: Post in
#questions-to-organizers

    
Group work issues: Contact your group members or
reach out to Anna

    
Community concerns: Reach out to Madara Plesa

    
LMS problems: Contact Veli

    
General questions: Slack is your friend!


Getting
Started

What should I do first?

  1. Join
    Slack
    using the link you received
  2. Turn on notifications
    for #cyberstart-general-announcements
  3. Register on the LMS
    with your correct email
  4. Review the course
    schedule
    and add to your calendar
  5. Check
    your tech setup
    (Zoom, internet, laptop)

Any last questions?

Ask in #questions-to-organizers! There are no silly
questions – we’re here to support your success.


Additional
Resources

    
Course Syllabus: Available on the LMS

    
Full Course Schedule: Available on the LMS

     LMS Platform:
https://cyberstart-project.com/courses/cyberstart/

    
Questions Slack Channel:
#questions-to-organizers

    
CyberStart Main Website:
https://cyberstart-project.com/#


Welcome to CyberStart! We’re excited to have you on
this journey. See you soon!
🚀