var lpData = {"site_url":"https:\/\/staging.cyberleadershipinstitute.com","user_id":"0","theme":"astra-child","lp_rest_url":"https:\/\/staging.cyberleadershipinstitute.com\/wp-json\/","nonce":"56c68ad66d","is_course_archive":"","courses_url":"https:\/\/staging.cyberleadershipinstitute.com\/courses-old-learnpress\/","urlParams":[],"lp_version":"4.2.6"};
var gtm4wp_datalayer_name = "dataLayer";
var dataLayer = dataLayer || [];
var twb = {"nonce":"3296f95285","ajax_url":"https:\/\/staging.cyberleadershipinstitute.com\/wp-admin\/admin-ajax.php","plugin_url":"https:\/\/staging.cyberleadershipinstitute.com\/wp-content\/plugins\/photo-gallery\/booster","href":"https:\/\/staging.cyberleadershipinstitute.com\/wp-admin\/admin.php?page=twbbwg_photo-gallery"};
var twb = {"nonce":"3296f95285","ajax_url":"https:\/\/staging.cyberleadershipinstitute.com\/wp-admin\/admin-ajax.php","plugin_url":"https:\/\/staging.cyberleadershipinstitute.com\/wp-content\/plugins\/photo-gallery\/booster","href":"https:\/\/staging.cyberleadershipinstitute.com\/wp-admin\/admin.php?page=twbbwg_photo-gallery"};
var bwg_objectsL10n = {"bwg_field_required":"field is required.","bwg_mail_validation":"This is not a valid email address.","bwg_search_result":"There are no images matching your search.","bwg_select_tag":"Select Tag","bwg_order_by":"Order By","bwg_search":"Search","bwg_show_ecommerce":"Show Ecommerce","bwg_hide_ecommerce":"Hide Ecommerce","bwg_show_comments":"Show Comments","bwg_hide_comments":"Hide Comments","bwg_restore":"Restore","bwg_maximize":"Maximize","bwg_fullscreen":"Fullscreen","bwg_exit_fullscreen":"Exit Fullscreen","bwg_search_tag":"SEARCH...","bwg_tag_no_match":"No tags found","bwg_all_tags_selected":"All tags selected","bwg_tags_selected":"tags selected","play":"Play","pause":"Pause","is_pro":"","bwg_play":"Play","bwg_pause":"Pause","bwg_hide_info":"Hide info","bwg_show_info":"Show info","bwg_hide_rating":"Hide rating","bwg_show_rating":"Show rating","ok":"Ok","cancel":"Cancel","select_all":"Select all","lazy_load":"1","lazy_loader":"https:\/\/staging.cyberleadershipinstitute.com\/wp-content\/plugins\/photo-gallery\/images\/ajax_loader.png","front_ajax":"0","bwg_tag_see_all":"see all tags","bwg_tag_see_less":"see less tags"};
var tve_frontend_options = {"ajaxurl":"https:\/\/staging.cyberleadershipinstitute.com\/wp-admin\/admin-ajax.php","is_editor_page":"","page_events":[],"is_single":"1","social_fb_app_id":"","dash_url":"https:\/\/staging.cyberleadershipinstitute.com\/wp-content\/plugins\/thrive-visual-editor\/thrive-dashboard","queried_object":{"ID":39640,"post_author":"4"},"query_vars":{"page":"","pagename":"cli-african-cyber-leaders-scholarship-application"},"$_POST":[],"translations":{"Copy":"Copy","empty_username":"ERROR: The username field is empty.","empty_password":"ERROR: The password field is empty.","empty_login":"ERROR: Enter a username or email address.","min_chars":"At least %s characters are needed","no_headings":"No headings found","registration_err":{"required_field":"<strong>Error<\/strong>: This field is required","required_email":"<strong>Error<\/strong>: Please type your email address.","invalid_email":"<strong>Error<\/strong>: The email address isn’t correct.","passwordmismatch":"<strong>Error<\/strong>: Password mismatch"}},"routes":{"posts":"https:\/\/staging.cyberleadershipinstitute.com\/wp-json\/tcb\/v1\/posts","video_reporting":"https:\/\/staging.cyberleadershipinstitute.com\/wp-json\/tcb\/v1\/video-reporting","testimonials":"https:\/\/staging.cyberleadershipinstitute.com\/wp-json\/tcb\/v1\/testimonials"},"nonce":"56c68ad66d","allow_video_src":"1","google_client_id":null,"google_api_key":null,"facebook_app_id":null,"lead_generation_custom_tag_apis":["activecampaign","aweber","convertkit","drip","klicktipp","mailchimp","sendlane","zapier"],"post_request_data":[],"user_profile_nonce":"92b8c72159","ip":"18.97.14.90","current_user":[],"post_id":"39640","post_title":"CLI African Cyber Leaders Scholarship Application","post_type":"page","post_url":"https:\/\/staging.cyberleadershipinstitute.com\/cli-african-cyber-leaders-scholarship-application\/","is_lp":"","conditional_display":{"is_tooltip_dismissed":false}};
The Cyber Leadership Institute is sponsoring five full scholarships to eligible African Cyber Leaders, valued at USD2750 each. This equates to one full scholarship into each of our five annual Cyber Leadership cohorts.
This is a strategic effort to empower the next generation of African Cyber Leaders with executive influencing, leadership and strategy execution skills to drive positive change within their organisations. This is also a fantastic opportunity for African Cyber Leaders to strengthen collaboration with their global peers. We will select the scholarship recipient for each cohort based on the following criteria:
Possess at least 7 years’ experience in cyber security. We will consider young leaders with five years’ experience in exceptional circumstances.
A commitment to serving the boarder cyber security industry through active and demonstrable volunteering.
Possess strong ambition to accelerate into a CISO or cyber executive role.
Is located within continental Africa (this scholarship doesn’t extend to Africans in the diaspora)
Is committed to contributing their acquired skills to enhance the resilience of the African digital ecosystem.
WHO SHOULD APPLY:
You are a cyber-leader located within continental Africa.
You have at least seven years of experience in cyber security, ideally with management experience.
You are eager to take this course in full until the end, and you understand the time commitment that this opportunity requires.
You are looking to enhance your technological knowledge with executive leadership skills, so you can thrive in the C-suite and with the board.
The program offers even more unprecedented benefits
A convenient 8-week online program that streamlines your learning
Provides the skills you need to complement your knowledge of technology with the executive skills to thrive at the top of your organization
Offers expert ongoing mentorship and support
Best practices for managing cyber risk and increasing cyber resilience
Includes 12-month premium membership in the Cyber Leadership Hub, which is made up of business leaders who support each other’s participation in cyber resilience, as well as share and co-create methods and toolsets
THE CYBER LEADERSHIP PROGRAM (CLP):
Course Length: 8 Weeks
Next Class - Start Date: 29 January 2024
Delivery Method: Online on-demand classes, with one weekly live Q&A session with the course instructors
Effort: 4-5 hours per week (of self-paced learning)
var starter_templates_zip_preview = {"AstColorPaletteVarPrefix":"--ast-global-color-","AstEleColorPaletteVarPrefix":["ast-global-color-0","ast-global-color-1","ast-global-color-2","ast-global-color-3","ast-global-color-4","ast-global-color-5","ast-global-color-6","ast-global-color-7","ast-global-color-8"]};