You either do the work or you're out
Every stage ends with a report. If the grader passes you, you move on. If not, you revise until the deadline. No participation trophies.
A free, selective internship for young Africans who are ready to do the work. Five foundation stages, then one specialist track. Real breaches to investigate โ not videos to watch. You pay nothing. Ever.



How it works
You will not sit through lectures. You will investigate a simulated breach, find the flaws, write the report, and defend it. Most people who start don't finish. The ones who do have something real to show.

Every stage ends with a report. If the grader passes you, you move on. If not, you revise until the deadline. No participation trophies.
Not a quiz engine. Real cybersecurity practitioners read your reports and give you the kind of feedback you'd get in a working SOC.
Every stage produces an artefact โ a writeup, a forensic report, a pentest finding. By Stage 5 you have a portfolio, not just a certificate.
Make it to Stage 5 and we cover your Security+ or ISO 27001 voucher. Weekly data credits too, if cost is what's in your way.
Why UBI
Cybersecurity is one of the few fields in Africa where demand massively outstrips supply โ and the paths in are mostly paywalled. TRAN is the path we wished we had.
The earlier stages are fair. Later stages are not gentle. If you cannot handle pressure here, you cannot handle it in a real SOC โ and we would rather find that out now than have it happen on the job.
Recruiters across Africa keep telling us the same thing: they receive a hundred certificates and no evidence anyone can actually do the work. What you produce here is evidence.
No tuition. No exam fees if we accept you and you reach Stage 5 โ we cover it. No weekly data bill if you qualify for the scholarship. The only thing you bring is effort.
Every stage is a scenario: logs to read, attacks to reconstruct, a report to write. The work mirrors what a junior analyst actually does in their first three months.
At Stage 5 you start meeting cybersecurity teams. If your work is good, they already know who you are by the time you apply.
The first cohort is already helping the second. That is the part we did not plan for, and the part we are most proud of.
3.5M
Unfilled cyber jobs
Free
Cost to participate
30+
Countries
The journey
Stages 0โ4 build your security foundation across all domains. At Stage 5, you choose a specialization and go deep.
Set up your environment, meet your cohort, complete your first security challenge.
Think like a defender and an attacker. Risk thinking, threat modeling, attack surfaces.
Networks, systems, cloud โ understand the environments you'll be protecting or testing.
Vulnerability scanning, log analysis, basic exploitation. See both sides of the coin.
A cross-domain scenario that tests everything. Defend, attack, document, report.
SOC, Ethical Hacking, or GRC โ pick the domain that matches your career goals.
Hands-on labs with industry-standard tools specific to your chosen track.
Complex scenarios that push your expertise โ no hand-holding, just execution.
Work cross-functionally. Build, break, or audit real systems with your team.
Final project judged by industry professionals. Prove you're ready.
Specializations
After completing the general foundation, you specialize in the domain that matches your career goals.

Monitor, detect, and respond to security incidents in real-time. Master SIEM tools and incident playbooks.

Think like an attacker. Perform penetration tests, exploit vulnerabilities, and write professional reports.

Governance, Risk & Compliance. Build security policies, run risk assessments, and drive compliance.
From the network
SOC AnalysisUBI pushed me harder than any bootcamp I've tried. The elimination pressure forced me to level up fast. I landed a SOC analyst role before the program even ended.
Ethical HackingThe ethical hacking track is the real deal. The pentest labs were indistinguishable from actual client environments. This program prepared me for day-one impact.
GRCAs someone pivoting from IT to GRC, UBI gave me hands-on compliance experience that no certification could. The team projects were incredibly valuable.
FAQ
Yes. The entire program is free. No hidden fees, no paywalls. We believe talent shouldn't be gated by finances.
You need basic IT literacy โ comfort with the command line, networking concepts, and some scripting. This isn't a from-zero program; it assumes you've done at least 6 months of self-study.
You're eliminated from the program. Each stage has tasks with strict deadlines. If you miss the deadline or don't meet the quality bar, you're out. It's competitive by design.
At Stage 5. Stages 0โ4 are general โ everyone does the same work. At Stage 5, you choose between SOC Analysis, Ethical Hacking, or GRC based on your interests and strengths.
Approximately 10 weeks โ roughly one week per stage. Later stages may take slightly longer due to increased complexity and team projects.
Yes. UBI is 100% remote. Interns participate from 30+ countries. Team meetings happen via Zoom or Google Meet.
Our hiring network includes companies actively recruiting for cybersecurity roles. Finalists get direct access to this network. We can't guarantee an offer, but the odds are strongly in your favor.
2026 Cohort
Applications take about fifteen minutes. We read every one. If you make it through screening, we will send you your first stage within the week.