Attention all current and future Cybersecurity Professionals. Let ISSA Education Foundation help fund your academic pursuits with the below scholarships and grants. See below for specific scholarships being offered by ISSAEF and ISSA Chapters, and sponsorships by SANS and ACI Learning.
Sign up for an invitation to apply! Our application season opens each spring, but it’s never too soon to collect references and transcripts.
ISSA Education Foundation is excited to offer multiple opportunities to pursue Cybersecurity
- ISSAEF Scholarships
- ISSA Alamo Chapter Scholarships
- SANS E. Eugene Schultz, Jr. Memorial Training Scholarship
- CSA Professional Development Grant
- ACI Learning Scholarship – Information Security Analyst Certification
ISSAEF & Chapter Scholarship Application Period: February 1 – June 15, 2024
SANS, CSA, & ACI Training Scholarship Application Period: February 1 – April 30, 2024
ISSAEF Scholarships
- $3,500 – E. Eugene Schultz, Jr., Memorial Scholarship for graduate studies
- $3,500 – Howard A. Schmidt Memorial Scholarship for undergraduate studies
- $2,000 – Shon Harris WIS (Women in Security) Memorial Scholarship for either undergraduate or graduate studies
- $2,000 – General Scholarship sponsored by Docent Institute for either undergraduate or graduate studies
To be eligible for an ISSAEF scholarship a student must be pursuing a career in cybersecurity, and must be an active, full-time undergraduate or graduate student in an information security-related program. The applicant must fulfill the eligibility requirements as established by the ISSA Educational Foundation (ISSAEF) Scholarship Committee.
Final selections are determined by the ISSAEF Scholarship Committee members who review and evaluate all materials submitted.
General Guidelines:
- Recipient will be enrolled in an academic program that demonstrates an interest in Information Security but need not be an ISSA member.
- Be classified as a sophomore, junior or senior or enrolled in a Graduate program as of the semester/quarter in which the award is received (Fall Term).
- Recipient must be enrolled in an accredited college or university that is authorized to confer degrees at or above the baccalaureate level except as designated by a Chapter scholarship.
- Checks for the approved scholarship recipients are made payable to the educational institution the recipient will attend.
Scholarship Eligibility Criteria is as Follows:
- Academic Excellence: Applicants must have a cumulative GPA of 2.5 or higher for undergraduates or 3.0 or higher (on a 4.0 scale) for graduates. Please attach an unofficial transcript from the current or most recent institution.
- Work Experience: Security-related work experience and/or completed security coursework.
- Community Service: Volunteer work in the cybersecurity, information technology field, or other relevant areas.
- Extracurricular Activities: Activities relating to information security, such as volunteer work, attendance at conferences, presentations, publications, and cybersecurity competitions.
- Personal Statement: A short narrative describing the applicant’s background, chosen academic program, interests, and goals in the information security field.
- Relevant Certifications/Clubs: List memberships in cybersecurity or information technology professional organizations, certifications, or relevant student clubs.
- Chapter Scholarships: Must be attending a Chapter designated institution.
- Letters of Recommendation: At least one letter of recommendation (two preferred). Must be from a faculty member, a cybersecurity professional, or an individual working in the cybersecurity profession that is familiar with your academic work, cybersecurity interests, or experience in cybersecurity. The letter should include:
- Their name, title, organization, contact information, and the name of the applicant.
- Outline their position and how they know you. Share what characteristics you display in the classroom or workplace, any knowledge of your interest or goals relating to cybersecurity, and the potential for your success in this field.
Recipient Responsibilities
- Each scholarship recipient must be intending to pursue a career in the field of Cybersecurity.
- Recipients are encouraged to consider drafting an article for publication in the ISSA Journal, although this is not a requirement. The Foundation will assist in this effort if desired.
ISSAEF & ISSA Alamo Chapter Scholarships Application
ISSA Alamo Chapter Scholarships
- $1,500 scholarship – George “Chip” Meadows Memorial Scholarship – 4-year San Antonio College or University
- Two $1,000 scholarships – 4-year San Antonio College or University
- Alamo Women’s Scholarship: Focuses on broadening the number of women in the Cybersecurity/Information Security industry.
- Alamo Minority Scholarship: Focuses on broadening the number of underrepresented groups* in the Cybersecurity/Information Security industry. (*Defined as people of color who do not self-identify as White or Caucasian).
- $500 – 2-year San Antonio College
To be eligible for an ISSA Alamo Chapter scholarship a student must be pursuing a career in computer science with a focus on information security or privacy. The applicant must fulfill the eligibility requirements as established by the ISSA Educational Foundation (ISSAEF) Scholarship Committee and the ISSA Alamo Chapter.
Final selections are determined by the ISSAEF Scholarship Committee members who review and evaluate all materials submitted.
General Guidelines:
- Recipient will be enrolled in an academic program that demonstrates an interest in Information Security but need not be an ISSA member.
- Enrolled in a college or university program related to Information Security as of the semester/quarter in which the award is received (Fall Term). Below are some of the eligible Colleges and Universities in the San Antonio, Texas area:
- NE Lakeview College www.alamo.edu/nlc/
- NW Vista College www.alamo.edu/nvc/
- Palo Alto College www.alamo.edu/pac/
- St. Philip’s College www.alamo.edu/spc/
- San Antonio College www.alamo.edu/sac/
- Hallmark University www.hallmarkuniversity.edu/
- Incarnate Word www.uiw.edu/
- Trinity new.trinity.edu
- Univ of Texas at San Antonio www.utsa.edu/
- Recipient must be enrolled in an accredited college or university that is authorized to confer degrees at or above the baccalaureate level except as designated by a Chapter scholarship.
- Checks for the approved scholarship recipients are made payable to the educational institution the recipient will attend.
Scholarship Eligibility Criteria is as Follows:
- Academic Excellence: Applicants must have a cumulative GPA of 2.5 or higher for undergraduate (on a 4.0 scale). Please attach an unofficial transcript from the current or most recent institution.
- Work Experience: Security-related work experience and/or completed security coursework.
- Community Service: Volunteer work in the cybersecurity, information technology field, or other relevant areas.
- Extracurricular Activities: Activities relating to information security, such as volunteer work, attendance at conferences, presentations, publications, and cybersecurity competitions.
- Personal Statement: A short narrative describing the applicant’s background, chosen academic program, interests, and goals in the information security field.
- Relevant Certifications/Clubs: List memberships in cybersecurity or information technology professional organizations, certifications, or relevant student clubs.
- Chapter Scholarships: Must be attending a Chapter designated institution.
- Letters of Recommendation: At least one letter of recommendation (two preferred). Must be from a faculty member, a cybersecurity professional, or an individual working in the cybersecurity profession that is familiar with your academic work, cybersecurity interests, or experience in cybersecurity. The letter should include:
- Their name, title, organization, contact information, and the name of the applicant.
- Outline their position and how they know you. Share what characteristics you display in the classroom or workplace, any knowledge of your interest or goals relating to cybersecurity, and the potential for your success in this field.
Recipient Responsibilities
- Each scholarship recipient must be intending to pursue a career in the field of cybersecurity.
- Recipients are encouraged to consider drafting an article for publication in the ISSA Journal, although this is not a requirement. The Foundation will assist in this effort if desired.
ISSAEF & ISSA Alamo Chapter Scholarships Application
SANS E. Eugene Schultz, Jr. Memorial Training Scholarship
SANS Training Scholarship Eligibility Criteria that will be evaluated includes:
- Must be a resident of North America.
- Professional Development Benefit: A personal statement that clearly outlines how the SANS course will benefit you as you transition into information security, improve your understanding of information security, or advance your career in information security.
- Relevant Certifications/Associations: List of memberships in professional organizations or relevant certifications that you currently hold.
- Resume: Evaluation of your resume as it relates to the selected course of interest.
- Extracurricular Activities Relating to Information Security: List volunteer work, attendance at conferences, presentations, publications, and cybersecurity competitions.
- Community Service: List volunteer work in the cybersecurity, information technology field, or other relevant areas.
- Recipients may only receive this award once in a lifetime.
Final selections are determined by the ISSAEF Scholarship/Grant Committee members who review and evaluate all materials submitted.
SANS Training Scholarship Application
CSA Professional Development Grant
The Cloud Security Alliance (CSA) has provide $2,000 annually to sponsor grants ranging between $250 to $1,000 for individuals seeking to increase their knowledge and understanding of cybersecurity. Do you have interest in a course that could provide ongoing skill development, provide a path to a promotion, or transition into cybersecurity? This opportunity is for you.
General Guidelines :
- Recipient will enroll in a single course which demonstrates an interest in Cybersecurity but need not be an ISSA member.
- These funds do not qualify for academic program tuition reduction.
- Be an information technologist interested in a promotion, professional development, career transition, or any individual wanting to transition into cybersecurity.
- Recipient must notify ISSAEF within 30 days of enrollment.
- Recipient must notify ISSAEF after completion of the course.
- Recipient Checks or Registration Code for approved grant or training scholarship respectively are made payable to the awardee.
- Course must be completed by Dec 31st of the award year.
Professional Development Grant Criteria that will be evaluated includes:
- Professional Development Benefit: A personal statement that clearly outlines how the course will benefit you as you transition into information security,
orimprove your understanding of information security, or advance your career in information security. - Relevant Certifications/Associations: List of memberships in professional organizations or relevant certifications that you currently hold.
- Resume: Evaluation of your resume as it relates to the selected course of interest.
- Extracurricular Activities Relating to Information Security: List volunteer work, attendance at conferences, presentations, publications, and cybersecurity competitions.
- Community Service: List volunteer work in the cybersecurity, information technology field, or other relevant areas.
- Recipients are not eligible to apply for 5 years following their award.
Final selections are determined by the ISSAEF Scholarship Committee members who review and evaluate all materials submitted.
CSA Professional Development Grant Application
ACI Training Scholarship – Information Security Analyst Certification
General Guidelines :
- Must be a resident of the United States.
- Recipient will enroll in the ACI Training program named Information Security Analyst Program.
- Recipient need not be an ISSA member.
- Be an information technologist interested in professional development, career transition, or any individual wanting to transition into cybersecurity.
- Course must be completed by Dec 31st of the award year.
ACI Training Scholarship criteria that will be evaluated includes:
- Professional Development Benefit: A personal statement that clearly outlines how the course will benefit you as you transition into information security, improve your understanding of information security, or advance your career in information security.
- Relevant Certifications/Associations: List of memberships in professional organizations or relevant certifications that you currently hold.
- Resume: Evaluation of your resume as it relates to the selected course of interest.
- Extracurricular Activities Relating to Information Security: List volunteer work, attendance at conferences, presentations, publications, and cybersecurity competitions.
- Community Service: List volunteer work in the cybersecurity, information technology field, or other relevant areas.
Final selections are determined by the ISSAEF Scholarship Committee members who review and evaluate all materials submitted.