Company Name: Document No.
የኢንፎርሜሽንመረብደህንነትአስተዳደር INFORMATI OF/CEC/033
ON NETWORK SECURITY
ADMINISTRATION
Title Issue No. Page No.:
TALENT REGISTRATION 1 Page 1 of 4
Cyber Talent Ethiopia 2025 Registration Form
This form helps us understand your background, skills, and aspirations. Please answer the
following questions thoughtfully, providing specific examples where possible. Each response
should be 150–300 words unless otherwise stated. Submit your responses in a single
document to ThisLink
Warning AI-generated content is strictly prohibited and will result in disqualification
Past Projects
Describe 1–2 significant projects you have worked on, related to cybersecurity, software
development, embedded systems, aerospace, or other technical fields. Highlight your role,
technologies used, challenges faced, and outcomes achieved. (Example: A cybersecurity
project securing a web application or an embedded system for IoT.)
I have worked on several projects related to cyber security, focusing on
protecting computer systems from threats and malware attacks such as
Trojan horses, ransom ware, and spy ware. I utilized security software
like Norton, McAfee, and Kaspersky, along with strategic approaches
such as data backup, encrypting data, anti-spyware and antivirus
programs and use strong passwords. I served as the group leader in
these projects, where we faced several challenges, including the use of
ineffective tools. However, through teamwork and persistence, we
achieved positive out comes. Our classmates and teachers appreciated
our work and provided strong support.
ከመጠቀምዎበፊትትክክለኛውቅጽመሆኑንያረጋግጡ።
PLEASE MAKE SURE THAT THIS IS THE CORRECT ISSUE BEFORE USE
Company Name: Document No.:
የኢንፎርሜሽንመረብደህንነትአስተዳደር INFORMATI OF/CEC/033
ON NETWORK SECURITY
ADMINISTRATION
Title Issue No. Page No.:
TALENT REGISTRATION 1 Page 2 of 4
Hackathons and Competitions
List any hackathons, coding competitions, or technical challenges you have participated
in. Include the event name, date, your contributions, and any achievements (e.g.,
awards, rankings). If you haven’t participated, describe how you’ve engaged with
technical communities or self-driven challenges.
I haven’t joined any competitions yet, but i believe i can handle tough
situations. For example, l inherited money from my grandfather at age
15; I wouldn’t be able to use it until I turn 18. Since such accounts can
be targeted by hackers, i would put the money in a custodial account
and secure it with strong online protection. This includes linking it to my
phone and using a unique 12-16 character password like (S7$Y!tt54?
BmE2). i could also create strong password using python.
Current Courses or Training
Detail any courses, certifications, or training programs you are currently enrolled in or
recently completed. Specify the subject area (e.g., penetration testing, cloud computing)
and platform (e.g., Coursera, TryHackMe…). Explain how these align with your career
goals.
I haven’t taken any formal courses or certifications yet, but I'm here to
learn, contribute meaningfully to your campaign, and earn a
certification. My career goal is to become a remarkable female coder,
representing my country with pride.
ከመጠቀምዎበፊትትክክለኛውቅጽመሆኑንያረጋግጡ።
PLEASE MAKE SURE THAT THIS IS THE CORRECT ISSUE BEFORE USE
Company Name: Document No.:
የኢንፎርሜሽንመረብደህንነትአስተዳደር INFORMATI OF/CEC/033
ON NETWORK SECURITY
ADMINISTRATION
Title Issue No. Page No.:
TALENT REGISTRATION 1 Page 3 of 4
Certificates and Past Accomplishments
Share any certificates, awards, or notable accomplishments relevant to your technical skills.
Include the issuing organization, date, and context (e.g., Certified Ethical Hacker, 2024). If
you lack formal certificates, highlight informal achievements like self-taught skills or
mentorship roles.
I don’t have certifications yet, but I've achieved a lot through self-
learning and mentorship. I've taught myself programming in Python and
Html by attending online classes, watching YouTube tutorials, and
reading books. As a mentor at school, i shared my skills, guided others,
improved projects, and working on graphics and animation. I also helped
build a collaborative team with strong leadership.
Proposed Summer Camp Projects
If selected for the Cyber Talent Ethiopia 2025 Summer Camp, what project(s) would you
like to pursue? Describe 1–2 ideas, specifying the domain (e.g., malware analysis,
avionics), objectives, and potential impact. Explain how these projects align with your
skills and the camp’s goals.
I have a strong desire to join the summer camp and I'm fully committed
to it. I'm passionate about software especially programming, coding, and
developing tools to defend against threats and malware. I will use all my
goals and become a focused and fluent learner.
ከመጠቀምዎበፊትትክክለኛውቅጽመሆኑንያረጋግጡ።
PLEASE MAKE SURE THAT THIS IS THE CORRECT ISSUE BEFORE USE
Company Name: Document No.:
የኢንፎርሜሽንመረብደህንነትአስተዳደር INFORMATI OF/CEC/033
ON NETWORK SECURITY
ADMINISTRATION
Title Issue No. Page No.:
TALENT REGISTRATION 1 Page 4 of 4
University Exit Project (Optional)
If applicable, describe your university exit project or thesis related to cybersecurity, software
development, embedded systems, aerospace, or a relevant technical field. Include the
project title, objectives, technologies used, and key outcomes. If you did not complete a
university exit project, you may skip this question.
I haven't completed university yet; but as a high school student with a
strong interest in software development, I would choose to focus on
simulation projects. One example is a simple team project we did:
Title: operating system simulation
Objective: to understand how a computer operating system works
Technology used: Python, for its simplicity and clarity
Key outcome: gained a basic understanding of how operating system
ከመጠቀምዎበፊትትክክለኛውቅጽመሆኑንያረጋግጡ።
PLEASE MAKE SURE THAT THIS IS THE CORRECT ISSUE BEFORE USE