0% found this document useful (0 votes)
7 views5 pages

Essay W

The document is a registration form for Cyber Talent Ethiopia 2025, aimed at gathering information about applicants' backgrounds, skills, and aspirations in technical fields. It includes sections on past projects, hackathons, current courses, certifications, proposed summer camp projects, and optional university exit projects. The form emphasizes the importance of original content and prohibits AI-generated responses.

Uploaded by

Daniel Adeba
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views5 pages

Essay W

The document is a registration form for Cyber Talent Ethiopia 2025, aimed at gathering information about applicants' backgrounds, skills, and aspirations in technical fields. It includes sections on past projects, hackathons, current courses, certifications, proposed summer camp projects, and optional university exit projects. The form emphasizes the importance of original content and prohibits AI-generated responses.

Uploaded by

Daniel Adeba
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

Company Name: Document No.

የኢንፎርሜሽን መረብ ደህንነት OF/CEC/033


አስተዳደር INFORMATION NETWORK
SECURITY ADMINISTRATION
Title Issue No. Page No.:

TALENT REGISTRATION 1 Page 1 of 5

Cyber Talent Ethiopia 2025 Registration Form

This form helps us understand your background, skills, and aspirations. Please answer the
following questions thoughtfully, providing specific examples where possible. Each response
should be 150–300 words unless otherwise stated. Submit your responses in a single
document to This Link

Warning AI-generated content is strictly prohibited and will result in disqualification

Past Projects
Describe 1–2 significant projects you have worked on, related to cybersecurity, software
development, embedded systems, aerospace, or other technical fields. Highlight your role,
technologies used, challenges faced, and outcomes achieved. (Example: A cybersecurity
project securing a web application or an embedded system for IoT.)

The two past projects I have worked on so far are Hotel Management
System Web application and Cybersecurity Penetration Testing using the
Security Shepherd environment.

 The project of the Hotel Management System has


been the web application software that replace manual working
environment inside the hotel and to optimize the time and resource
effectively and utilize fully software system that helps every
entities in the environment of the Hotel to use it and simplifies the
work flow and speed it up. On the User interface(UI) of the web
application there are interface for each entities such as Manager,
Receiptionist, Practitioner, Guest,Login,Human resource,Signup,
Feedback,Menu and that they entertain to Website and at the
backend or server side there is express, MySQL and every
components needed for the corresponding frontend to make the
operation so safe,secure and functional.
 Cybersecurity Penetration Testing using the

ከመጠቀምዎ በፊት ትክክለኛው ቅጽ መሆኑን ያረጋግጡ ።


PLEASE MAKE SURE THAT THIS IS THE CORRECT ISSUE BEFORE USE
Company Name: Document No.:

የኢንፎርሜሽን መረብ ደህንነት OF/CEC/033


አስተዳደር INFORMATION NETWORK
SECURITY ADMINISTRATION
Title Issue No. Page No.:

TALENT REGISTRATION 1 Page 2 of 5

ከመጠቀምዎ በፊት ትክክለኛው ቅጽ መሆኑን ያረጋግጡ ።


PLEASE MAKE SURE THAT THIS IS THE CORRECT ISSUE BEFORE USE
Company Name: Document No.:

የኢንፎርሜሽን መረብ ደህንነት OF/CEC/033


አስተዳደር INFORMATION NETWORK
SECURITY ADMINISTRATION
Title Issue No. Page No.:

TALENT REGISTRATION 1 Page 3 of 5

Hackathons and Competitions


List any hackathons, coding competitions, or technical challenges you have participated
in. Include the event name, date, your contributions, and any achievements (e.g.,
awards, rankings). If you haven’t participated, describe how you’ve engaged with
technical communities or self-driven challenges.

So far I have participated on the Addis Coding Hackaton held by Addis


Coder which has played great influence on the current generation by
equipping them with the hands on experience with the technologies
recently.

Current Courses or Training


Detail any courses, certifications, or training programs you are currently enrolled in or
recently completed. Specify the subject area (e.g., penetration testing, cloud computing)
and platform (e.g., Coursera, TryHackMe…). Explain how these align with your career
goals.

Currently I am taking IT Training on the Microsoft Azure Field of


Fundamental, Associate and Advanced Level and I have already finished
the Fundamental and Associate one, while continuing on the Advanced
level. This training is second round on which I get this opportunity as
student of Computer Engineering Addis Ababa Technology of 5 th year at
AAiT.
The core concept of the training is on equipping us with the Cloud
Computing of Microsoft Azure based which is the best and needed
subject in the current world of technology and digital age.
The training is being given on online through the instructors of the
Udemy Academy by the facilitations of Demera Software Company
ከመጠቀምዎ በፊት ትክክለኛው ቅጽ መሆኑን ያረጋግጡ ።
PLEASE MAKE SURE THAT THIS IS THE CORRECT ISSUE BEFORE USE
Company Name: Document No.:

የኢንፎርሜሽን መረብ ደህንነት OF/CEC/033


አስተዳደር INFORMATION NETWORK
SECURITY ADMINISTRATION
Title Issue No. Page No.:

TALENT REGISTRATION 1 Page 4 of 5

Certificates and Past Accomplishments

Share any certificates, awards, or notable accomplishments relevant to your technical skills.
Include the issuing organization, date, and context (e.g., Certified Ethical Hacker, 2024). If
you lack formal certificates, highlight informal achievements like self-taught skills or
mentorship roles.

Proposed Summer Camp Projects


If selected for the Cyber Talent Ethiopia 2025 Summer Camp, what project(s) would you
like to pursue? Describe 1–2 ideas, specifying the domain (e.g., malware analysis,
avionics), objectives, and potential impact. Explain how these projects align with your
skills and the camp’s goals.

ከመጠቀምዎ በፊት ትክክለኛው ቅጽ መሆኑን ያረጋግጡ ።


PLEASE MAKE SURE THAT THIS IS THE CORRECT ISSUE BEFORE USE
Company Name: Document No.:

የኢንፎርሜሽን መረብ ደህንነት OF/CEC/033


አስተዳደር INFORMATION NETWORK
SECURITY ADMINISTRATION
Title Issue No. Page No.:

TALENT REGISTRATION 1 Page 5 of 5

University Exit Project (Optional)


If applicable, describe your university exit project or thesis related to cybersecurity, software
development, embedded systems, aerospace, or a relevant technical field. Include the
project title, objectives, technologies used, and key outcomes. If you did not complete a
university exit project, you may skip this question.

ከመጠቀምዎ በፊት ትክክለኛው ቅጽ መሆኑን ያረጋግጡ ።


PLEASE MAKE SURE THAT THIS IS THE CORRECT ISSUE BEFORE USE

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy