
Register for the next cohort now starting in May!
Join our first cohort which takes place on 4-28 of May, 2026. Spots are filling up quickly, contact us today.

Join our first cohort which takes place on 4-28 of May, 2026. Spots are filling up quickly, contact us today.
CybHER: Women's Cyber Security Training Cohort


We focus on live instruction by professionals with practical experience, tailored support from teaching assistants, real-world skills, and career support.
A Windows or Mac machine with at least 8GB RAM is required.
The bootcamp costs 1500 EUR. Discounts, scholarships, and financing options may be available.
The first cohort of the bootcamp classes will take place starting May 4th to the 28th. The time is 7:45-9:45 PM EEST, Monday-Thursday. Students will be expected to complete ~5 hours of individual learning per week in addition to live instruction time.
In this module, we will meet each other, learn about the CyberLab platform that we’ll be using for the bootcamp, and get our feet wet with the basics of cyber security. In the second half of the week, we’ll start to get a little bit more technical: we’ll learn how to figure out where in the (cyber) world we are, how data travels to other places, and how to organize our own home – the Linux file system.
In the second module, we’ll start to get into the details of how things run in cyberspace at the technical level. We’ll learn to identify ourselves and find other computers as well as figure out where we can find useful programs running on those other computers. Next, we’ll learn how we can scan other computers to find out even more details about them. Finally, we’ll see how we can analyze data flows to find information that’s useful for security.
In week 3, we’ll start to dive deeper into the tools we can use to protect ourselves and our networks. We’ll learn how to plan our defenses, how they work together, and how we can operate them. We’ll use firewalls to block bad connections, network detection tools to alert us on things that got through, and log analysis tools to put the whole mystery together. Finally, we’ll start to work on our final project – a professional consulting project with a partner organization.
In the last module, we’ll learn about our own vulnerabilities and how the other side tries to take advantage of them. The better we understand attacks, the more we’ll be able to protect ourselves effectively. We’ll learn how they find our weaknesses and conduct our first hacking attacks in a safe environment this week as well. Finally, we’ll present our professional project, and end the bootcamp with a virtual or in-person celebration!
The process starts with registering at the following form: https://share-eu1.hsforms.com/2AuGXbETtTyu9rsDV8ATDMQ2g38sc
Next, a Guild Security member will reach out to you to conduct an interview to assess your motivation and aptitude before acceptance to the bootcamp.
