Please ensure Javascript is enabled for purposes of website accessibility UWF CyberSuccess Program sponsored by Regions | University of West Florida
Skip to main content

UWF CyberSuccess Program sponsored by Regions

UWF CyberSuccess Sponsored by Regions Foundation

Regions Foundation Logo_sm

This program is currently not active.


Program Overview

The CyberSuccess Program sponsored by Regions, offered by the University of West Florida’s Center for Cybersecurity, is an intensive cybersecurity training program designed to help individuals launch or advance cybersecurity careers. The program provides FREE cybersecurity training and career development for eligible transitioning military and veterans to prepare and transition them into rewarding cybersecurity jobs along the Cyber Coast (South Alabama and Northeast Florida).

Delivery Format: Online (100% Asynchronous)

Program Information

The program prepares participants for System Administrator work roles. The program will provide asynchronous online training courses, industry certification preparation, and vouchers, digital badges and credentials, professional development, job placement support.

This pathway will be offered for a cohort of 7-8 eligible participants. All costs for eligible and accepted participants will be covered by a grant from the Regions Foundation. 

System Administrator Pathway

This seven-month, five-course training pathway prepares participants for entry-level System Administrator work roles as described in the NICE Cybersecurity Workforce Framework. This program is a great opportunity for those with no/minimal prior IT/cybersecurity experience who want to launch a career in cybersecurity.

Training courses include:

  • CompTIA A+ Exam Prep
  • CompTIA Network+ Exam Prep
  • Linux System Administration
  • Essential Cyber Defenses
  • CompTIA Security+ Exam Prep

The program includes industry certification prep courses and vouchers for CompTIA A+, CompTIA Network+, CompTIA Linux+, and CompTIA Security+.

 Program Benefits

  • Offers a short-term, intensive cybersecurity training pathway and career development support at no cost to eligible participants.
  • Instructor-led courses are taught by UWF faculty and prepare students for cybersecurity careers with foundational knowledge and hand-on skills and exercises via the Florida Cyber Range.
  • Includes industry certification prep courses and vouchers, including CompTIA A+, Network+, Linux,    and Security+.
  • Career development support and access to connect with employers and job opportunities.
  • Provides industry certifications, digital badges, and credentials to document skills and competencies.
  • Program and courses are 100% asynchronous online, making learning accessible and convenient. Some course and program activities may include optional synchronous online, e.g., Q&A sessions, which will be recorded for asynchronous viewing.

Program Eligibility Requirements

To be eligible for program consideration, applicants must meet the following requirements:

  • U.S. citizen or Permanent Resident
  • U.S. military veteran or military transitioning service member
  • High school diploma or equivalent
  • Strong interest in cybersecurity and working in the field upon completion of the program
  • Must be interested in working on the Cyber Coast upon completion of the program
  • Availability to fully participate in program during the entire duration and complete all course and program requirements
  • Some IT or cybersecurity experience
  • Once selected, participants will also need to meet any other program requirements. Some job opportunities may require the ability to obtain a security clearance.

Preferred Requirements:

  • Bachelor’s degree in IT or related area
  • At least two years of IT or cybersecurity experience
  • Security clearance (active or past)

 Program Participation Requirements

This is an intensive training program. Participants must dedicate ample time to participating in and completing all program and course requirements. To succeed in the program, participants should plan to spend approximately 10-20 hours per week on program and course requirements.

All selected applicants must agree and comply with the following:

  • Commit to participate in the program during the entire duration (courses will not run for the entire duration but participants should be available during that time frame).
  • Must have your own working computer with camera and mic and reliable high-speed Internet connection.
  • Participate in all program and course activities and meetings, including scheduled courses, industry certification exam preparation, career development, and information sessions.
  • Dedicate time towards self-study and complete all program and course requirements, including assigned readings, labs, assessments, and surveys each week.
  • Register for industry certification exams during those courses and take the exams within two weeks of each certification course completion. Report the exam date and results to the course instructor.
  • Actively participate in job searches and employment placement efforts during and upon completion of the program.

Application Requirements

We encourage prospective applicants to begin to collect all required documents in the interest of time.

Required Documents:

  • A brief up-to-date resume
  • A copy of unofficial transcripts for your most advanced degree completed (high school, associate's, or bachelor's degree)
  • A 2-page letter of intent that identifies which pathway you are applying for demonstrates your interest and commitment to the program and a cybersecurity career and includes the following components:

(a) Commitment to successfully completing the program and pursuing a career in cybersecurity

(b) Experiences and accomplishments that helped prepare you for this program and a cybersecurity career, including military or first responder experience, IT or cybersecurity education or training, industry certifications, or awards

(c) How this program will help you accomplish your personal and/or professional career aspirations in the field of cybersecurity.

(d) What specific cybersecurity work role(s) or organizations you are interested in working for upon program completion, and why. For more information on the work roles, please visit

(e) Your short-term (1-4 years) and long-term (5+ years) career goals upon successful program completion.

  • At least two professional recommendation letters

If initially selected for the program, you will be required to submit additional documentation to verify your citizenship or permanent residency, and prior military service. You will receive an email requesting this documentation if you are selected. You may want to start gathering this information in the interest of time.

For Veterans Status: Submit a copy of your DD-214/DD 215 or Record of Separation. The Department of Veterans Affairs makes validating military service easy. Just log in to eBenefits and follow these steps:

**Please redact any sensitive information from any documents, including social security number, etc. before submitting them.

For Transitioning Military Personnel: Submit a copy of your Electronic Military Service Record, for example.

  • ERB (Army – Enlisted Record Brief) reflecting full/current active duty service history/li>
  • CDB (Air Force – Career Data Brief)
  • BIR (Marine Corps – Basic Individual Record), reflecting full/current active duty service history
  • ESR (Navy – Electronic Service Record) or NSIPS (Navy Standard Integrated Personnel Systems), reflecting full/current active duty service history
  • El-PDR or USCG Military Record  or DD-214 (National Coast Guard - Electronic Personnel Data Record )

**Please redact any sensitive information from any documents, including social security number, etc before submitting them.

More Information or Questions? Please Contact:

Center for Cybersecurity


UWF CyberSuccess sponsored by Regions Foundation Program Team

Dr. Eman El-Sheikh, Associate Vice President, Center for Cybersecurity

Dr. Guillermo Francia III, Director, Research and Innovation, Center for Cybersecurity

Dr. Dallas Snider, Faculty Fellow, Center for Cybersecurity, and Chair, Department of Information Technology

Guy Garrett, Associate Director, Technology and Training, Center for Cybersecurity


This program is funded by a grant from the Regions Foundation.