
Frequently Asked Questions (FAQ)
About Program Requirements
Q: What are the technical requirements for the program?
The program is designed to integrate seamlessly with standard school computer labs and internet connectivity. Minimal hardware and software requirements are needed.
Q: Do teachers need prior cybersecurity expertise?
No. We provide comprehensive training and ongoing support to equip teachers with the necessary knowledge and resources.
Q: What is the time commitment for teachers?
Teachers will participate in a 3-hour onboarding session and dedicate time to facilitating the program as needed. We provide flexible scheduling options to accommodate school schedules.
Q: What is the time commitment for students?
The program can be delivered after school, as a student chapter, or as a club, allowing for flexible scheduling. The time commitment will vary depending on the chosen format and student engagement.
Q: What resources are provided to teachers?
Teachers receive detailed lesson plans, access to a resource portal, training sessions, ongoing assistance, and access to cybersecurity experts through a dedicated Discord channel.
Q: What materials do students need?
Students will primarily use online resources and virtual labs. Access to a computer, tools listed and internet connection is required.
Q: Are there any certifications offered through the program? (IF CISCO netacad cyber essentials is included)
The program provides students with a foundation in cybersecurity principles and practices, which can help them prepare for industry-recognized certifications such as the CompTIA Security+ certification. However, the program itself does not award the certification; students would need to pursue that separately.
Q: How is student data privacy handled?
We adhere to strict data privacy and security standards to protect student information. We are fully compliant with the Family Educational Rights and Privacy Act (FERPA) and any applicable state-specific privacy laws. We implement industry-standard security measures to ensure the confidentiality and integrity of student data.
Q: Is the program accessible to students with disabilities?
Yes, we are committed to providing an inclusive and accessible learning environment for all students, in accordance with the Americans with Disabilities Act (ADA) and other applicable laws. We will work with schools to accommodate specific needs
Q: What is the typical structure of a weekly session?
Each weekly session typically includes:
· A brief introduction to the topic
· A concise overview of key concepts
· A hands-on "Do It Now" activity
· Engaging CTF practice challenges
· A wrap-up and review
Q: What specific cybersecurity skills will students learn?
In the ‘How to CTF course” students will develop skills in areas such as:
· Open Source Intelligence (OSINT)
· Cryptography
· Social Engineering Awareness
· Steganography
· Networking Fundamentals
· Logic Puzzles
· File Forensics
Q: How are students assessed in the program?
Student progress is evaluated through a combination of methods, including:
· Pre and post-session quizzes to gauge understanding
· Participation in hands-on activities
· Completion of CTF practice challenges and final CTF
Q: What software do students need?
Students will primarily use online resources and virtual labs. Access to a computer with internet connection and a web browser is required. Any specific software tools, such as ExifTool (as an example), will be clearly identified, and installation instructions will be provided.
Q: What ongoing support is provided to teachers?
In addition to the initial training, teachers receive ongoing support through:
· A dedicated online forum or Discord channel for Q&A and discussion
· Regularly updated resource portal with new materials and tips
· Direct email/phone support for urgent issues
Q: What is the teaching philosophy behind the “How to CTF” course?
The program emphasizes hands-on learning through gamified CTF challenges. We believe in fostering a student-centered environment that encourages exploration, problem-solving, and collaboration.
About Enrollment
Q: Who is eligible to enroll in the cybersecurity program?
The program is designed for students in grades 9-12. No prior cybersecurity experience is required. Students with an interest in technology, problem-solving, and critical thinking will benefit greatly.
Q: How do schools become a Founding School?
We are selecting a limited number of schools nationwide to become Founding Schools in our pilot program. Founding Schools receive the complete RCYC program at no cost for the first year. To apply, please visit [link], fill out [form], or contact us via [email address or phone number] to discuss the benefits and requirements.
Q: What is the deadline to apply for the Founding School program?
The deadline to apply is [Month, Year]. We encourage early applications as spots are limited.
Q: What is the enrollment process for students?
Once your school has partnered with us, we will provide you with enrollment materials and instructions. Student enrollment is managed through the school's RCYC chapter.
Q: Can individual students enroll directly?
At this time, we are working exclusively with schools to implement the program. However, we encourage students to share their interest with a teacher or school administrator, as they might not have seen this opportunity.
Q: What happens after the first year of free access for Founding Schools?
Founding Schools will receive a 20% discount on multi-year partnerships after the first year. We will discuss renewal options with you well in advance.
Q: What are the requirements for starting an RCYC chapter?
To launch an RCYC chapter, schools should follow these key steps:
· Secure administrative approval from the school.
· Designate a committed Chapter Advisor (teacher or staff member).
· Complete the official RCYC Chapter Registration Form.
· Meet the minimum student membership requirements.
· Establish a chapter structure with student officers and guidelines.
· Create a consistent meeting schedule.
· Plan how RCYC activities will be delivered within the chapter.
Contact Information:
For any further questions, please contact us at:
Email: [Your Email Address]
Phone: [Your Phone Number]
Website: [Your Website Address]