Report

Student Intake Questionnaire for the Google.org Cybersecurity Seminars Program

Cybersecurity Seminars

Guidance for Universities

If there is high demand and limited space for the Google.org Cybersecurity Seminars Program, universities may use this intake questionnaire as a guide to help select a diverse and balanced group of students while ensuring maximum impact and inclusion.

This document serves as a preliminary basis for student selection. Universities should make any necessary adjustments to fit their specific needs, student population, and institutional priorities. Universities are encouraged to consult with relevant departments to ensure alignment with academic goals and diversity initiatives.

Considerations for Student Selection:

  • Diversity of Disciplines – A mix of STEM, business, law, social sciences, and other fields to expose more students to cybersecurity.
  • Interest & Motivation – Prioritizing students who express strong reasons for attending, whether academic, professional, or personal.
  • Experience Balance – Ensuring a blend of beginners and those with cybersecurity experience to encourage peer learning.
  • Equitable Access – Providing opportunities to students who may not have previously had exposure to cybersecurity, including those from underrepresented backgrounds.
  • Cybersecurity Skills – Universities may consider students who demonstrate:
  • Technical Proficiency: Familiarity cybersecurity tools (e.g., Wireshark, Metasploit, Burp Suite).
  • Analytical Thinking: Strong problem-solving skills, logical reasoning, and the ability to assess security vulnerabilities.
  • Networking & Systems Knowledge: Understanding of networking fundamentals, operating systems, and cloud security principles.
  • Ethical Hacking & Security Awareness: Prior knowledge or certifications (e.g., CompTIA Security+, CEH) related to cybersecurity best practices.
  • Collaboration & Communication: Ability to work in teams, articulate security concerns, and explain technical concepts to non-technical audiences.
  • Research & Policy Understanding: Interest in cybersecurity law, governance, risk management, and ethical considerations.

This intake questionnaire has been adapted to support universities in their selection process. Please modify it as needed to best suit university objectives.

[TEMPLATE] Student Intake Questionnaire for the Google.org Cybersecurity Seminars Program

Introduction

Thank you for your interest in participating in the Google.org Cybersecurity Seminars Program.  To ensure a diverse and well-balanced group of participants, please complete the form below. Selection will be based on a mix of experience levels, academic backgrounds, and interest in cybersecurity.

Personal & Academic Information

First name:
Last name:
Student ID (if applicable):
University email address:
[Optional]
Phone number:
Degree program:
Year of study:- Undergraduate (Year: ______ )

- Postgraduate (Year: ______ )

- Other:
Academic discipline:- Computer Science

- Engineering

- Business

- Law

- Social Sciences

- Medicine/Health

- Other:

Motivation & Interest

Have you participated before in the Google.org Cybersecurity Seminars Program?- Yes
Please specify:


- No
Why are you interested in participating in the Google.org Cybersecurity Seminars?- I am already studying cybersecurity

- I am not studying cybersecurity but have other experience in cybersecurity

- I think it would be beneficial for my career

- I want to get some real-world experience

- I don’t know much / anything about cybersecurity, and I’m curious to know more

- Hearing that the program is backed by Google.org is exciting

- Other:
How do you see cybersecurity applying to your field of study, or career goals?





[If the student is already studying / interested in cybersecurity (first or second check-box of the second question under Motivation and Interest), proceed to the section below: Cybersecurity Knowledge & Experience. Otherwise, continue to the following section.]

Cybersecurity Knowledge & Experience

Prior knowledge of cybersecurity:- None

- Basic understanding

- Intermediate knowledge

- Advanced knowledge

- Highly skilled with professional certifications
Have you taken any cybersecurity related courses?- Yes
Please specify:



- No
Do you have any professional or practical experience in cybersecurity?

This could include work experience, knowledge of cybersecurity tools (e.g., Wireshark, Metaploist, Burp Suite etc.), or professional certifications (e.g. CompTIA Security+, CEH).
- Yes
Please specify:



- No
Are you a member of any cybersecurity-related student groups or initiatives?- Yes
Please specify:



- No

Professional Interaction

Have you had any work, internship, or volunteer experience where you interacted with external stakeholders (e.g., clients, industry professionals, or external teams)?- Yes
Please specify:



- No
Think of a time when you faced a challenge while working with others - this could be in the work experience above, a group project, a student club, or even an informal setting.

How did you handle the situation, and what was the outcome?
Think of a time where you worked on a group project, club activity, or volunteer initiative where you had to communicate with people outside your usual academic or social circle (this could also be the work experience listed prior).

How did you ensure effective collaboration?
Have you ever interacted with a teacher, mentor, guest speaker, or organization as part of a class, event, or extracurricular activity (this could also be the work experience listed prior)?

How did you approach these interactions, and what did you learn?
- Yes
Please specify:




- No
How would you describe your approach to professional communication in high-pressure or complex situations?
Think of a time where you had to explain something technical or complex to someone who wasn’t familiar with the topic. (For example, helping a friend understand a difficult subject or presenting in class.)

What approach did you take to make sure they understood?
When working with others, how do you make sure you express your ideas clearly and respectfully?
What strategies do you use when discussing different opinions or resolving misunderstandings?

Diversity & Inclusion Considerations [Optional]

Do you belong to any underrepresented group in cybersecurity (e.g., gender, ethnicity, socioeconomic background, first-generation university student)?- Yes
Please specify:



- No

Other

Do you have any specific topics or areas of cybersecurity you are particularly interested in?- Yes
Please specify:



- No
If the session you are applying for is overbooked, would you be open to attending a later session?- Yes, the Summer 2025 Session

- Yes, the Winter 2025/26 Session

- Yes, the Winter 2025/26 Session

- Yes, the Summer 2026 Session
Would you be interested in receiving follow-up materials or opportunities related to cybersecurity?- Yes - from my university

- Yes - from Virtual Routes (implementing partner for the Google.org Cybersecurity Seminars Program)

- No
Authors

James Shires

Co-Director, Community Trustee

YuYing Mak

Project Officer

Thank you for signing up to our newsletter!

Thank you! RSVP received for Student Intake Questionnaire for the Google.org Cybersecurity Seminars Program

Thank you for applying! We will be in touch.

Apply for: Student Intake Questionnaire for the Google.org Cybersecurity Seminars Program

Student Intake Questionnaire for the Google.org Cybersecurity Seminars Program

Loading...

Loading…