Mentoring has many definitions:
“There is no one universally accepted definition of Mentoring. This is because the definition depends very much on why, where and with whom it is being used. There is, however, a generic core to all Mentoring relationships whatever the setting, which is the support is given voluntarily by one person to another.” National Mentoring Network 2014

The Government defines Mentoring as:
“A one-to-one, nonjudgmental relationship in which an individual voluntarily gives time to support and encourage another. This is typically developed at a time of transition in the Mentee’s life, and lasts for a specified and sustained period of time.”


Sign Up Today for Our

“C200- Introduction to Cyber Security”

Course Description: This course provides the foundation for the study of computer system security.  The course centers around the domains comprising the Information Security Common Body of Knowledge.

Chapter 1  What is Cybersecurity

Chapter 2 Why is There a Need for Security (Malicious Software, Threats, Attacks, & Vulnerabilities)

Chapter 3 Legal, Professional, Ethics, and Code of Conduct

Chapter 4 Risk Management

Chapter 5 Network Design Architecture

Chapter 6 Security Technology (IDS, IPS, VPN, Firewalls, Protocols)

Chapter 7 Basic Cryptography

Chapter 8 Physical Security

Chapter 9 Overview of Top Certifications in Demand

“C100 – IT Pro Fundamentals” – Test-Out Certification

Chapter 1 Introductions to Computers

Chapter 2 Networking

Chapter 3 Databases and Programming

Chapter 4 Information systems and Security

These courses prepare you to take the COMPTIA IT Pro Fundamentals and Security+ certification exams.

Mentor Training

MODULE ONE: Understanding the Nature of Mentoring
1.1 What is Mentoring?
1.2 Why Mentor?
1.3 Role of a Mentor
1.4 Differences between Friendship and Mentoring
1.5 Confidentiality
1.6 Key Learning

MODULE 2: Engaging in the Mentoring Process – Setting Goals & Problem Solving
2.1 Professional Development Plan – Aligning Goals and Expectations
2.2 How to Set Them Up for Success
2.3 How do I help them to Become Better People?

MODULE THREE: Setting Boundaries
3.1 The Need for Boundaries
3.2 Security Guidelines
3.3 Personal Boundaries
3.4 Mentor’s Support Structure

MODULE FOUR: The Mentoring Relationship
4.1 Overview
4.2 Planning Meeting
4.3 Three Way Meeting
4.4 First Mentoring Meeting
4.5 Ongoing Meetings
4.6 Ending the Relationship
4.7 Key Learning

MODULE FIVE: Effective Communication
5.1 Effective Listening
5.2 Checking Understanding
5.3 Effective Questioning
5.4 Key Learning

MODULE SIX: Difficult Meetings
6.1 Dealing with Confrontation
6.2 Dealing with Resistance
6.3 Case Study
6.4 Key Learning

Confidentiality Statement.

It is the policy of the Women in Security Mentor Program to protect the confidentiality of its participants. Additionally, mentors are required to keep information about their mentee and his/her family confidential. In order for WinS Mentor Program to provide a responsible and professional service to participants, it is necessary to ask mentors and mentees about the prospective participants including:

  • Participants’ names and images gained from participants themselves,
  • Information gained about participants from outside sources including confidential references. e.g., place of work