Harmony Tech is proud to provide the Graduate Information Security Scholarship of $1,000 for students enrolled in a graduate degree program with cybersecurity, information assurance or information security focus.
Full Description
If you happen to be awarded, you should know that scholarship funds will not be given to you but will be sent directly to the school and the money can only be used for expenses related to tuition, fees, and books.
The criteria for determining the winner will be based on:
- Prior academic success
- High school GPA
- Academic awards and other merit-based scholarships
- High school involvement
- Demonstrated need for funding
- Volunteer work
- Letters of recommendation
Who's eligible?
In order to make this scholarship available only to those deserving ones and to make the selection process easier, the scholarship provider has set some eligibility and application requirements that each applicant has to meet prior to applying.
These are the criteria to be met:
- He/she must be a United States citizen enrolled in a graduate degree program with a cybersecurity, information assurance or information security focus
- His/her academic standing has to be excellent with an overall GPA of 3.50
- The applicant must be attending a regionally-accredited college or university program either online or on-campus
- He/she may be attending part or full time
How to Apply
The application process starts with submitting the following documents and files as attachments to a single email message to scholarships@harmony-tech.com
Bear in mind the fact that late applications will not be considered and that the deadline for submissions is August 1st.
Eligible applicants must submit unofficial transcripts from your current / most recent educational institution, at least three letters of recommendation in which the recommenders will speak about the following:
- How long have you known the applicant?
- What is your relationship to the candidate?
- What skills or abilities does the applicant have that will support them in completing the information systems security degree program?
- What other information about the applicant should be taken into consideration?
They are also required to provide their resume or curriculum vitae and a cover letter outlining their educational and personal background and the reasons for choosing their major and why they think they will be successful in the information systems security field.
Related Scholarships